Patents by Inventor Gi Tae Kim
Gi Tae Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12189819Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.Type: GrantFiled: May 14, 2022Date of Patent: January 7, 2025Assignee: FasooInventors: Dae Woo Choi, Woo Seok Kwon, Myeong Sik Hwang, Sang Wook Kim, Gi Tae Kim
-
Publication number: 20240259313Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.Type: ApplicationFiled: October 23, 2023Publication date: August 1, 2024Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
-
Patent number: 11816245Abstract: The present disclosure relates to a method for analysis on interim result data in a de-identification procedure, an apparatus for the same, a computer program for the same, and a recording medium storing computer program thereof. A method for de-identification according to an example of the present disclosure may include: generating a first interim result data by applying a first de-identification process to an initial data; generating a first analysis metric for the first interim result data; and generating a final result data based on the first interim result data, when the first analysis metric satisfies a first de-identification criterion.Type: GrantFiled: April 10, 2020Date of Patent: November 14, 2023Assignee: FASOO CO., LTD.Inventors: Gi Tae Kim, Sung Wook Jo, Myeong Sik Hwang
-
Patent number: 11811661Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.Type: GrantFiled: November 27, 2018Date of Patent: November 7, 2023Assignee: Nytell Software LLCInventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
-
Publication number: 20220277106Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.Type: ApplicationFiled: May 14, 2022Publication date: September 1, 2022Applicant: FASOO CO., LTDInventors: Dae Woo CHOI, Woo Seok KWON, Myeong Sik HWANG, Sang Wook KIM, Gi Tae KIM
-
Patent number: 11354436Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.Type: GrantFiled: June 27, 2017Date of Patent: June 7, 2022Assignee: FASOO.COM CO., LTD.Inventors: Dae Woo Choi, Woo Seok Kwon, Myeong Sik Hwang, Sang Wook Kim, Gi Tae Kim
-
Publication number: 20200327253Abstract: The present disclosure relates to a method for analysis on interim result data in a de-identification procedure, an apparatus for the same, a computer program for the same, and a recording medium storing computer program thereof. A method for de-identification according to an example of the present disclosure may include: generating a first interim result data by applying a first de-identification process to an initial data; generating a first analysis metric for the first interim result data; and generating a final result data based on the first interim result data, when the first analysis metric satisfies a first de-identification criterion.Type: ApplicationFiled: April 10, 2020Publication date: October 15, 2020Inventors: Gi Tae KIM, Sung Wook JO, Myeong Sik HWANG
-
Publication number: 20200083397Abstract: A manufacturing method of a display apparatus includes mounting a plurality of inorganic light emitting diodes on a substrate, forming a black molding layer having a low refractive index and configured to surround the plurality of inorganic light emitting diodes such that front light emitting surfaces of the plurality of inorganic light emitting diodes that are directed to a front side of the display apparatus are exposed, and assembling a plurality of unit modules each comprising the substrate, the plurality of inorganic light emitting diode, and the black molding layer to be adjacent to each other.Type: ApplicationFiled: September 9, 2019Publication date: March 12, 2020Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Tack Mo LEE, Jung Hoon Yoon, Gi Tae Kim, Won Yong Lee, Won Soon Park
-
Publication number: 20190273684Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.Type: ApplicationFiled: November 27, 2018Publication date: September 5, 2019Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
-
Publication number: 20190228183Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.Type: ApplicationFiled: June 27, 2017Publication date: July 25, 2019Applicant: FASOO. COM CO., LTDInventors: Dae Woo CHOI, Woo Seok KWON, Myeong Sik HWANG, Sang Wook KIM, Gi Tae KIM
-
Patent number: 10178028Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.Type: GrantFiled: August 10, 2016Date of Patent: January 8, 2019Assignee: Nytell Software LLCInventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
-
Publication number: 20170155588Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.Type: ApplicationFiled: August 10, 2016Publication date: June 1, 2017Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
-
Patent number: 9438516Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.Type: GrantFiled: May 10, 2011Date of Patent: September 6, 2016Assignee: Nytell Software LLCInventors: Kirk K. Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
-
Patent number: 8301744Abstract: Systems and methods for efficiently provisioning and assuring Quality of Service (QoS) between user networks communicating over a DiffServ-enabled network, with QoS management transparency to SIP user agents. The system comprises user networks communicating via a core network, each user network having a source and destination SIP user agent respectively, a SIP proxy server between the source SIP user agent and destination SIP user agent, a Bandwidth Manager to provision a pipe between the source user network and the destination user network, wherein the pipe has a specified bandwidth, and a QoS Agent for accepting and/or rejecting a SIP session based on availability of bandwidth in the pipe; wherein the SIP proxy server is configured to forward an incoming SIP request to the QoS Agent. The method comprises provisioning a pipe between the SIP user agents or their respective user networks, and allowing/rejecting incoming SIP sessions based on the available bandwidth in the pipe.Type: GrantFiled: August 8, 2008Date of Patent: October 30, 2012Assignee: Telcordia Technologies, Inc.Inventors: Tony Bogovic, Shrirang Gadgil, Gi Tae Kim, Narayanan Natarajan, Abdelhakim Hafid
-
Publication number: 20110211480Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.Type: ApplicationFiled: May 10, 2011Publication date: September 1, 2011Applicant: TELCORDIA LICENSING COMPANY, LLCInventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
-
Patent number: 7957276Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.Type: GrantFiled: April 28, 2005Date of Patent: June 7, 2011Assignee: Telcordia Licensing Company, LLCInventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
-
Patent number: 7760643Abstract: A policy change management scheme for network resource management through dynamic policy adaptations especially suitable for DiffServ-enabled MPLS networks is presented. The scheme incorporates automated resource adaptation capabilities to assure QoS for user traffic and to promote resource utilization in DiffServ-enabled MPLS networks. A suite of resource management policies, an ordered set of methods for adjusting policies, and interfaces to a companion policy-based network management system are provided. The policies are periodically adjusted based on predictive bandwidth estimation algorithms ensuring optimal resource allocation to individual service classes and enabling adjustment of resources for handling current traffic and traffic expected for the near future.Type: GrantFiled: April 9, 2007Date of Patent: July 20, 2010Assignee: Telcordia Technologies, Inc.Inventors: Gi Tae Kim, George Lapiotis, Narayanan Natarajan
-
Publication number: 20100036953Abstract: Systems and methods for efficiently provisioning and assuring Quality of Service (QoS) between user networks communicating over a DiffServ-enabled network, with QoS management transparency to SIP user agents. The system comprises user networks communicating via a core network, each user network having a source and destination SIP user agent respectively, a SIP proxy server between the source SIP user agent and destination SIP user agent, a Bandwidth Manager to provision a pipe between the source user network and the destination user network, wherein the pipe has a specified bandwidth, and a QoS Agent for accepting and/or rejecting a SIP session based on availability of bandwidth in the pipe; wherein the SIP proxy server is configured to forward an incoming SIP request to the QoS Agent. The method comprises provisioning a pipe between the SIP user agents or their respective user networks, and allowing/rejecting incoming SIP sessions based on the available bandwidth in the pipe.Type: ApplicationFiled: August 8, 2008Publication date: February 11, 2010Applicant: TELCORDIA TECHNOLOGIES, INC.Inventors: Tony Bogovic, Shrirang Gadgil, Gi Tae Kim, Narayanan Natarajan, Abdelhakim Hafid
-
Publication number: 20100011118Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.Type: ApplicationFiled: April 28, 2005Publication date: January 14, 2010Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
-
Publication number: 20080247314Abstract: A policy change management scheme for network resource management through dynamic policy adaptations especially suitable for DiffServ-enabled MPLS networks is presented. The scheme incorporates automated resource adaptation capabilities to assure QoS for user traffic and to promote resource utilization in DiffServ-enabled MPLS networks. A suite of resource management policies, an ordered set of methods for adjusting policies, and interfaces to a companion policy-based network management system are provided. The policies are periodically adjusted based on predictive bandwidth estimation algorithms ensuring optimal resource allocation to individual service classes and enabling adjustment of resources for handling current traffic and traffic expected for the near future.Type: ApplicationFiled: April 9, 2007Publication date: October 9, 2008Inventors: Gi Tae Kim, George Lapiotis, Narayanan Natarajan