Patents by Inventor Gi Tae Kim

Gi Tae Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240136844
    Abstract: Disclosed is an apparatus and method for controlling step charging of a secondary battery. A charging control unit determines a SOC, an OCV and a polarization voltage of the secondary battery, determines an OCV deviation corresponding to a difference between the OCV and a predefined minimum OCV value, determines a correction factor corresponding to the polarization voltage and the OCV deviation, determines a look-up SOC by correcting the SOC according to the correction factor, determines the magnitude of a charging current corresponding to the look-up SOC, and provides the determined charging current to a charging device.
    Type: Application
    Filed: December 5, 2023
    Publication date: April 25, 2024
    Applicant: LG ENERGY SOLUTION, LTD.
    Inventors: Jin-Hyung LIM, Young-Jin KIM, Gi-Min NAM, Hyoung Jun AHN, Kyu-Chul LEE, Won-Tae JOE
  • Patent number: 11961775
    Abstract: In one example, a semiconductor device can comprise a substrate, a device stack, first and second internal interconnects, and an encapsulant. The substrate can comprise a first and second substrate sides opposite each other, a substrate outer sidewall between the first substrate side and the second substrate side, and a substrate inner sidewall defining a cavity between the first substrate side and the second substrate side. The device stack can be in the cavity and can comprise a first electronic device, and a second electronic device stacked on the first electronic device. The first internal interconnect can be coupled to the substrate and the device stack. The encapsulant can cover the substrate inner sidewall and the device stack and can fill the cavity. Other examples and related methods are disclosed herein.
    Type: Grant
    Filed: November 8, 2022
    Date of Patent: April 16, 2024
    Assignee: Amkor Technology Singapore Holding Pte. Ltd.
    Inventors: Gyu Wan Han, Won Bae Bang, Ju Hyung Lee, Min Hwa Chang, Dong Joo Park, Jin Young Khim, Jae Yun Kim, Se Hwan Hong, Seung Jae Yu, Shaun Bowers, Gi Tae Lim, Byoung Woo Cho, Myung Jea Choi, Seul Bee Lee, Sang Goo Kang, Kyung Rok Park
  • Publication number: 20240067065
    Abstract: Provided is a duct docking device for a ventilation seat of a vehicle. The duct docking device enables air to be easily blown to a seatback and a seat cushion with a passenger in a seat using only one blower by enabling a seatback duct mounted at the seatback and a seat cushion duct mounted at the seat cushion to be hermetically docked through a connector duct, etc. at an unfolded position of the seatback in which a passenger can sit, and by enabling the seatback duct mounted at the seatback and the seat cushion duct mounted at the seat cushion to be separated from each other at a folded position of the seatback in consideration of that there is no passenger in the seat.
    Type: Application
    Filed: December 21, 2022
    Publication date: February 29, 2024
    Inventors: Deok Soo Lim, Sang Hark Lee, Sang Soo Lee, Jung Sang You, Sang Do Park, Chan Ho Jung, Gun Chu Park, Gi Tae Jo, Jin Sik Kim, Hee Dong Yoon, Ho Sub Lim, Jae Hyun Park
  • Patent number: 11816245
    Abstract: The present disclosure relates to a method for analysis on interim result data in a de-identification procedure, an apparatus for the same, a computer program for the same, and a recording medium storing computer program thereof. A method for de-identification according to an example of the present disclosure may include: generating a first interim result data by applying a first de-identification process to an initial data; generating a first analysis metric for the first interim result data; and generating a final result data based on the first interim result data, when the first analysis metric satisfies a first de-identification criterion.
    Type: Grant
    Filed: April 10, 2020
    Date of Patent: November 14, 2023
    Assignee: FASOO CO., LTD.
    Inventors: Gi Tae Kim, Sung Wook Jo, Myeong Sik Hwang
  • Patent number: 11811661
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: November 7, 2023
    Assignee: Nytell Software LLC
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Publication number: 20220277106
    Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.
    Type: Application
    Filed: May 14, 2022
    Publication date: September 1, 2022
    Applicant: FASOO CO., LTD
    Inventors: Dae Woo CHOI, Woo Seok KWON, Myeong Sik HWANG, Sang Wook KIM, Gi Tae KIM
  • Patent number: 11354436
    Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.
    Type: Grant
    Filed: June 27, 2017
    Date of Patent: June 7, 2022
    Assignee: FASOO.COM CO., LTD.
    Inventors: Dae Woo Choi, Woo Seok Kwon, Myeong Sik Hwang, Sang Wook Kim, Gi Tae Kim
  • Publication number: 20200327253
    Abstract: The present disclosure relates to a method for analysis on interim result data in a de-identification procedure, an apparatus for the same, a computer program for the same, and a recording medium storing computer program thereof. A method for de-identification according to an example of the present disclosure may include: generating a first interim result data by applying a first de-identification process to an initial data; generating a first analysis metric for the first interim result data; and generating a final result data based on the first interim result data, when the first analysis metric satisfies a first de-identification criterion.
    Type: Application
    Filed: April 10, 2020
    Publication date: October 15, 2020
    Inventors: Gi Tae KIM, Sung Wook JO, Myeong Sik HWANG
  • Publication number: 20200083397
    Abstract: A manufacturing method of a display apparatus includes mounting a plurality of inorganic light emitting diodes on a substrate, forming a black molding layer having a low refractive index and configured to surround the plurality of inorganic light emitting diodes such that front light emitting surfaces of the plurality of inorganic light emitting diodes that are directed to a front side of the display apparatus are exposed, and assembling a plurality of unit modules each comprising the substrate, the plurality of inorganic light emitting diode, and the black molding layer to be adjacent to each other.
    Type: Application
    Filed: September 9, 2019
    Publication date: March 12, 2020
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Tack Mo LEE, Jung Hoon Yoon, Gi Tae Kim, Won Yong Lee, Won Soon Park
  • Publication number: 20190273684
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Application
    Filed: November 27, 2018
    Publication date: September 5, 2019
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Publication number: 20190228183
    Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.
    Type: Application
    Filed: June 27, 2017
    Publication date: July 25, 2019
    Applicant: FASOO. COM CO., LTD
    Inventors: Dae Woo CHOI, Woo Seok KWON, Myeong Sik HWANG, Sang Wook KIM, Gi Tae KIM
  • Patent number: 10178028
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: January 8, 2019
    Assignee: Nytell Software LLC
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Publication number: 20170155588
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Application
    Filed: August 10, 2016
    Publication date: June 1, 2017
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Patent number: 9438516
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Grant
    Filed: May 10, 2011
    Date of Patent: September 6, 2016
    Assignee: Nytell Software LLC
    Inventors: Kirk K. Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Patent number: 8301744
    Abstract: Systems and methods for efficiently provisioning and assuring Quality of Service (QoS) between user networks communicating over a DiffServ-enabled network, with QoS management transparency to SIP user agents. The system comprises user networks communicating via a core network, each user network having a source and destination SIP user agent respectively, a SIP proxy server between the source SIP user agent and destination SIP user agent, a Bandwidth Manager to provision a pipe between the source user network and the destination user network, wherein the pipe has a specified bandwidth, and a QoS Agent for accepting and/or rejecting a SIP session based on availability of bandwidth in the pipe; wherein the SIP proxy server is configured to forward an incoming SIP request to the QoS Agent. The method comprises provisioning a pipe between the SIP user agents or their respective user networks, and allowing/rejecting incoming SIP sessions based on the available bandwidth in the pipe.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: October 30, 2012
    Assignee: Telcordia Technologies, Inc.
    Inventors: Tony Bogovic, Shrirang Gadgil, Gi Tae Kim, Narayanan Natarajan, Abdelhakim Hafid
  • Publication number: 20110211480
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Application
    Filed: May 10, 2011
    Publication date: September 1, 2011
    Applicant: TELCORDIA LICENSING COMPANY, LLC
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Patent number: 7957276
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Grant
    Filed: April 28, 2005
    Date of Patent: June 7, 2011
    Assignee: Telcordia Licensing Company, LLC
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Patent number: 7760643
    Abstract: A policy change management scheme for network resource management through dynamic policy adaptations especially suitable for DiffServ-enabled MPLS networks is presented. The scheme incorporates automated resource adaptation capabilities to assure QoS for user traffic and to promote resource utilization in DiffServ-enabled MPLS networks. A suite of resource management policies, an ordered set of methods for adjusting policies, and interfaces to a companion policy-based network management system are provided. The policies are periodically adjusted based on predictive bandwidth estimation algorithms ensuring optimal resource allocation to individual service classes and enabling adjustment of resources for handling current traffic and traffic expected for the near future.
    Type: Grant
    Filed: April 9, 2007
    Date of Patent: July 20, 2010
    Assignee: Telcordia Technologies, Inc.
    Inventors: Gi Tae Kim, George Lapiotis, Narayanan Natarajan
  • Publication number: 20100036953
    Abstract: Systems and methods for efficiently provisioning and assuring Quality of Service (QoS) between user networks communicating over a DiffServ-enabled network, with QoS management transparency to SIP user agents. The system comprises user networks communicating via a core network, each user network having a source and destination SIP user agent respectively, a SIP proxy server between the source SIP user agent and destination SIP user agent, a Bandwidth Manager to provision a pipe between the source user network and the destination user network, wherein the pipe has a specified bandwidth, and a QoS Agent for accepting and/or rejecting a SIP session based on availability of bandwidth in the pipe; wherein the SIP proxy server is configured to forward an incoming SIP request to the QoS Agent. The method comprises provisioning a pipe between the SIP user agents or their respective user networks, and allowing/rejecting incoming SIP sessions based on the available bandwidth in the pipe.
    Type: Application
    Filed: August 8, 2008
    Publication date: February 11, 2010
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Tony Bogovic, Shrirang Gadgil, Gi Tae Kim, Narayanan Natarajan, Abdelhakim Hafid
  • Publication number: 20100011118
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Application
    Filed: April 28, 2005
    Publication date: January 14, 2010
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani