Patents by Inventor Gi Tae Kim

Gi Tae Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12189819
    Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.
    Type: Grant
    Filed: May 14, 2022
    Date of Patent: January 7, 2025
    Assignee: Fasoo
    Inventors: Dae Woo Choi, Woo Seok Kwon, Myeong Sik Hwang, Sang Wook Kim, Gi Tae Kim
  • Publication number: 20240259313
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Application
    Filed: October 23, 2023
    Publication date: August 1, 2024
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Patent number: 11816245
    Abstract: The present disclosure relates to a method for analysis on interim result data in a de-identification procedure, an apparatus for the same, a computer program for the same, and a recording medium storing computer program thereof. A method for de-identification according to an example of the present disclosure may include: generating a first interim result data by applying a first de-identification process to an initial data; generating a first analysis metric for the first interim result data; and generating a final result data based on the first interim result data, when the first analysis metric satisfies a first de-identification criterion.
    Type: Grant
    Filed: April 10, 2020
    Date of Patent: November 14, 2023
    Assignee: FASOO CO., LTD.
    Inventors: Gi Tae Kim, Sung Wook Jo, Myeong Sik Hwang
  • Patent number: 11811661
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: November 7, 2023
    Assignee: Nytell Software LLC
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Publication number: 20220277106
    Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.
    Type: Application
    Filed: May 14, 2022
    Publication date: September 1, 2022
    Applicant: FASOO CO., LTD
    Inventors: Dae Woo CHOI, Woo Seok KWON, Myeong Sik HWANG, Sang Wook KIM, Gi Tae KIM
  • Patent number: 11354436
    Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.
    Type: Grant
    Filed: June 27, 2017
    Date of Patent: June 7, 2022
    Assignee: FASOO.COM CO., LTD.
    Inventors: Dae Woo Choi, Woo Seok Kwon, Myeong Sik Hwang, Sang Wook Kim, Gi Tae Kim
  • Publication number: 20200327253
    Abstract: The present disclosure relates to a method for analysis on interim result data in a de-identification procedure, an apparatus for the same, a computer program for the same, and a recording medium storing computer program thereof. A method for de-identification according to an example of the present disclosure may include: generating a first interim result data by applying a first de-identification process to an initial data; generating a first analysis metric for the first interim result data; and generating a final result data based on the first interim result data, when the first analysis metric satisfies a first de-identification criterion.
    Type: Application
    Filed: April 10, 2020
    Publication date: October 15, 2020
    Inventors: Gi Tae KIM, Sung Wook JO, Myeong Sik HWANG
  • Publication number: 20200083397
    Abstract: A manufacturing method of a display apparatus includes mounting a plurality of inorganic light emitting diodes on a substrate, forming a black molding layer having a low refractive index and configured to surround the plurality of inorganic light emitting diodes such that front light emitting surfaces of the plurality of inorganic light emitting diodes that are directed to a front side of the display apparatus are exposed, and assembling a plurality of unit modules each comprising the substrate, the plurality of inorganic light emitting diode, and the black molding layer to be adjacent to each other.
    Type: Application
    Filed: September 9, 2019
    Publication date: March 12, 2020
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Tack Mo LEE, Jung Hoon Yoon, Gi Tae Kim, Won Yong Lee, Won Soon Park
  • Publication number: 20190273684
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Application
    Filed: November 27, 2018
    Publication date: September 5, 2019
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Publication number: 20190228183
    Abstract: Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified.
    Type: Application
    Filed: June 27, 2017
    Publication date: July 25, 2019
    Applicant: FASOO. COM CO., LTD
    Inventors: Dae Woo CHOI, Woo Seok KWON, Myeong Sik HWANG, Sang Wook KIM, Gi Tae KIM
  • Patent number: 10178028
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: January 8, 2019
    Assignee: Nytell Software LLC
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Publication number: 20170155588
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Application
    Filed: August 10, 2016
    Publication date: June 1, 2017
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Patent number: 9438516
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Grant
    Filed: May 10, 2011
    Date of Patent: September 6, 2016
    Assignee: Nytell Software LLC
    Inventors: Kirk K. Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Patent number: 8301744
    Abstract: Systems and methods for efficiently provisioning and assuring Quality of Service (QoS) between user networks communicating over a DiffServ-enabled network, with QoS management transparency to SIP user agents. The system comprises user networks communicating via a core network, each user network having a source and destination SIP user agent respectively, a SIP proxy server between the source SIP user agent and destination SIP user agent, a Bandwidth Manager to provision a pipe between the source user network and the destination user network, wherein the pipe has a specified bandwidth, and a QoS Agent for accepting and/or rejecting a SIP session based on availability of bandwidth in the pipe; wherein the SIP proxy server is configured to forward an incoming SIP request to the QoS Agent. The method comprises provisioning a pipe between the SIP user agents or their respective user networks, and allowing/rejecting incoming SIP sessions based on the available bandwidth in the pipe.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: October 30, 2012
    Assignee: Telcordia Technologies, Inc.
    Inventors: Tony Bogovic, Shrirang Gadgil, Gi Tae Kim, Narayanan Natarajan, Abdelhakim Hafid
  • Publication number: 20110211480
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Application
    Filed: May 10, 2011
    Publication date: September 1, 2011
    Applicant: TELCORDIA LICENSING COMPANY, LLC
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Patent number: 7957276
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Grant
    Filed: April 28, 2005
    Date of Patent: June 7, 2011
    Assignee: Telcordia Licensing Company, LLC
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Patent number: 7760643
    Abstract: A policy change management scheme for network resource management through dynamic policy adaptations especially suitable for DiffServ-enabled MPLS networks is presented. The scheme incorporates automated resource adaptation capabilities to assure QoS for user traffic and to promote resource utilization in DiffServ-enabled MPLS networks. A suite of resource management policies, an ordered set of methods for adjusting policies, and interfaces to a companion policy-based network management system are provided. The policies are periodically adjusted based on predictive bandwidth estimation algorithms ensuring optimal resource allocation to individual service classes and enabling adjustment of resources for handling current traffic and traffic expected for the near future.
    Type: Grant
    Filed: April 9, 2007
    Date of Patent: July 20, 2010
    Assignee: Telcordia Technologies, Inc.
    Inventors: Gi Tae Kim, George Lapiotis, Narayanan Natarajan
  • Publication number: 20100036953
    Abstract: Systems and methods for efficiently provisioning and assuring Quality of Service (QoS) between user networks communicating over a DiffServ-enabled network, with QoS management transparency to SIP user agents. The system comprises user networks communicating via a core network, each user network having a source and destination SIP user agent respectively, a SIP proxy server between the source SIP user agent and destination SIP user agent, a Bandwidth Manager to provision a pipe between the source user network and the destination user network, wherein the pipe has a specified bandwidth, and a QoS Agent for accepting and/or rejecting a SIP session based on availability of bandwidth in the pipe; wherein the SIP proxy server is configured to forward an incoming SIP request to the QoS Agent. The method comprises provisioning a pipe between the SIP user agents or their respective user networks, and allowing/rejecting incoming SIP sessions based on the available bandwidth in the pipe.
    Type: Application
    Filed: August 8, 2008
    Publication date: February 11, 2010
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Tony Bogovic, Shrirang Gadgil, Gi Tae Kim, Narayanan Natarajan, Abdelhakim Hafid
  • Publication number: 20100011118
    Abstract: In a secure network where the network characteristics are not known, a call admission control algorithm and a preemption control algorithm based on a destination node informing the source node of the observed carried traffic are used to regulate the amount of traffic that needs to be preempted by the source. The amount of traffic that needs to be preempted is based on the carried traffic measured at the destination node. The traffic to be preempted is based on the priority of the traffic, where the lowest priority traffic is the first to be preempted until the amount of traffic preempted is sufficient to allow the remaining traffic to pass through the network without congestion.
    Type: Application
    Filed: April 28, 2005
    Publication date: January 14, 2010
    Inventors: Kirk Chang, Gi Tae Kim, John Unger, John Sucec, Sunil Samtani
  • Publication number: 20080247314
    Abstract: A policy change management scheme for network resource management through dynamic policy adaptations especially suitable for DiffServ-enabled MPLS networks is presented. The scheme incorporates automated resource adaptation capabilities to assure QoS for user traffic and to promote resource utilization in DiffServ-enabled MPLS networks. A suite of resource management policies, an ordered set of methods for adjusting policies, and interfaces to a companion policy-based network management system are provided. The policies are periodically adjusted based on predictive bandwidth estimation algorithms ensuring optimal resource allocation to individual service classes and enabling adjustment of resources for handling current traffic and traffic expected for the near future.
    Type: Application
    Filed: April 9, 2007
    Publication date: October 9, 2008
    Inventors: Gi Tae Kim, George Lapiotis, Narayanan Natarajan