Patents by Inventor Hyoung-Chun Kim

Hyoung-Chun Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130166449
    Abstract: A method and an apparatus for authorizing online financial transactions are provided. The apparatus for authorizing online financial transactions includes: randomly selecting, using an apparatus for authorizing online financial transactions, a portion of main transaction information corresponding to a user and combining the selected information to create authorization information; converting the authorization information into a form displayed to the user through a specific process; providing the main transaction information and the converted authorization information to the user; receiving user select information, which is recognized by the user and is part of the main transaction information, and the converted authorization information provided to the user; and comparing the user select information with the authorization information and determining whether the user recognizes the authorization information based on the comparison results.
    Type: Application
    Filed: May 25, 2012
    Publication date: June 27, 2013
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jung-Hwan MOON, Byung-Joon KIM, Hyoung-Chun KIM, Sang-Woo PARK, E-Joong YOON
  • Publication number: 20130124687
    Abstract: An apparatus and method for detecting altered Uniform Resource Locators (URLs) are provided. The apparatus includes a Uniform Resource Locator (URL) information collection unit, a URL HTTP header analysis unit, a URL alteration determination unit, and a control unit. The URL information collection unit collects linked URL information in a web page selected by a user, from a web site. The URL HTTP header analysis unit analyzes the HTTP header information of the URL information. If, as a result of the analysis of the HTTP header information, information about redirection from the URL of the URL information to another URL exists, the URL alteration determination unit determines that the URL is an altered URL. If it is determined that the URL is an altered URL, the control unit extracts the URL information of the URL prior to the alteration and then provides the URL information to the user.
    Type: Application
    Filed: July 16, 2012
    Publication date: May 16, 2013
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Dong-Su NAM, Nam-Deok CHO, Hyoung-Chun KIM, Sang-Woo PARK, E-Joong YOON
  • Publication number: 20130055386
    Abstract: An apparatus and method for preventing falsification of a client screen is provided, in which a web server dynamically generates URIs and provides them to clients, thus preventing the falsification of client screens due to a web injection attack or a memory hacking attack. The apparatus includes a random web generation unit for converting an identical web page into random URIs that are randomly generated, at a request of a plurality of clients, generating different random web sources, and providing the different random web sources to the respective clients. A web falsification determination unit compares display web source eigenvalues respectively generated by the clients with respect to any one of the random web sources with a generative web source eigenvalue for the one of the random web sources, thus determining whether screens corresponding to the random web sources displayed on the respective clients have been falsified.
    Type: Application
    Filed: November 23, 2011
    Publication date: February 28, 2013
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Byung-Joon KIM, Jung-Hwan MOON, Hyoung-Chun KIM, Sang-Woo PARK, E-Joong YOON
  • Publication number: 20120328696
    Abstract: The present application describes a composition comprising a neuroprotective effective amount of an antioxidant acetylsalicylic acid maltol ester (AME).
    Type: Application
    Filed: August 30, 2012
    Publication date: December 27, 2012
    Applicants: Hutecs Korea Pharmaceutical Co., Ltd., Kangwon National University
    Inventor: Hyoung-Chun Kim
  • Publication number: 20120266242
    Abstract: An apparatus for defending a Distributed Denial of Service (DDoS) attack from a mobile terminal is provided. The apparatus includes a monitoring unit, a transmission/non-transmission inquiry unit, and a critical file management unit. The monitoring unit monitors all network data transmitted from a mobile terminal to the outside based on the current mode of the mobile terminal. The transmission/non-transmission inquiry unit asks a user whether to transmit corresponding network data to the outside based on the results of monitoring. The critical file management unit manages a critical file which includes information about at least one protocol used by the mobile terminal and at least one service provided using the protocol.
    Type: Application
    Filed: February 15, 2012
    Publication date: October 18, 2012
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jin-Seok YANG, Hyoung-Chun KIM
  • Patent number: 8171521
    Abstract: A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: May 1, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Young Han Choi, Hyoung Chun Kim, Tae Ghyoon Kim, Do Hoon Lee, Eungki Park
  • Patent number: 7975273
    Abstract: Provided are a fuzzing system and method of a distributed computing environment (DCE) remote procedure call (RPC) object. The fuzzing system includes a file manager, a random data generator, a RPC packet, and a packet injector. The file manager obtains necessary information by parsing and analyzing an idl file for a target object for fuzzing and a file having information about a Named Pipe file. The random data generator generates a random value using a system clock as a factor. The RPC packet creator embodies protocols used for RPC communication by functions and generating a RPC packet for RPC communication. The packet injector inserts the necessary information and the random value into the generated RPC packet and transmits the generated RPC packet to the target object for fuzzing.
    Type: Grant
    Filed: December 24, 2007
    Date of Patent: July 5, 2011
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jin Seok Yang, Tae Ghyoon Kim, Hyoung Chun Kim, Soonjwa Hong, Do Hoon Lee
  • Patent number: 7937765
    Abstract: Provided are a system and method for checking the security of a personal computer (PC). The system and method automatically check security to protect a PC from computer hacking, viruses, worms, Trojan horses, etc., and inform or cure a vulnerable point. The system and method automatically check and modify all the security check items so that a user who may not have professional computer knowledge can readily cope with a cyber attack, and describe the vulnerable point and the result of the cure to the user with ease. Therefore, the system and method can maintain a PC in its up-to-date state to prevent damage from a cyber attack, and minimize damage from a cyber threat against the main system and service.
    Type: Grant
    Filed: November 8, 2007
    Date of Patent: May 3, 2011
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Kang San Kim, Hyoung Chun Kim, Soon Jwa Hong, Eung Ki Park, Choon Sik Park
  • Publication number: 20110039807
    Abstract: The present application describes a composition comprising a neuroprotective effective amount of an antioxidant acetylsalicylic acid maltol ester (AME).
    Type: Application
    Filed: August 13, 2009
    Publication date: February 17, 2011
    Inventor: Hyoung-Chun Kim
  • Publication number: 20110027354
    Abstract: The present application describes a composition comprising a neuroprotective effective amount of N-methyl-N-propynyl-2-phenylethylamine (MPPE).
    Type: Application
    Filed: March 31, 2009
    Publication date: February 3, 2011
    Inventor: Hyoung-Chun Kim
  • Patent number: 7691874
    Abstract: The present application discloses a pharmaceutical composition for treating Parkinson's disease and psychotropic intoxication/abusive potential, which contains a morphinan compound.
    Type: Grant
    Filed: May 13, 2005
    Date of Patent: April 6, 2010
    Assignees: Green Cross Corp.
    Inventor: Hyoung-Chun Kim
  • Publication number: 20090094585
    Abstract: Provided is a method and apparatus for analyzing an exploit code included in a nonexecutable file using a target program with vulnerability in a virtual environment. The method includes the steps of: loading a nonexecutable file including the exploit code by a target program, the target program being executed in a virtual environment and includes vulnerability; analyzing a register value of the target program and determining if the register value of the target program indicates a normal code region; storing log information on operation of the target program when the register value indicates a region other than the normal code region; and extracting and analyzing the exploit code included in the nonexecutable file based on the stored log information. In this method, the exploit code is analyzed in the virtual environment, thereby preventing damage caused by execution of the exploit code.
    Type: Application
    Filed: March 27, 2008
    Publication date: April 9, 2009
    Inventors: Young Han CHOI, Hyoung Chun KIM, Do Hoon LEE
  • Publication number: 20080313701
    Abstract: A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    Type: Application
    Filed: February 29, 2008
    Publication date: December 18, 2008
    Inventors: Young Han CHOI, Hyoung Chun KIM, Tae Ghyoon KIM, Do Hoon LEE, Eungki PARK
  • Publication number: 20080263572
    Abstract: Provided are a fuzzing system and method of a distributed computing environment (DCE) remote procedure call (RPC) object. The fuzzing system includes a file manager, a random data generator, a RPC packet, and a packet injector. The file manager obtains necessary information by parsing and analyzing an idl file for a target object for fuzzing and a file having information about a Named Pipe file. The random data generator generates a random value using a system clock as a factor. The RPC packet creator embodies protocols used for RPC communication by functions and generating a RPC packet for RPC communication. The packet injector inserts the necessary information and the random value into the generated RPC packet and transmits the generated RPC packet to the target object for fuzzing.
    Type: Application
    Filed: December 24, 2007
    Publication date: October 23, 2008
    Inventors: Jin Seok YANG, Tae Ghyoon KIM, Hyoung Chun KIM, Soonjwa HONG, Do Hoon LEE
  • Publication number: 20080115220
    Abstract: Provided are a system and method for checking the security of a personal computer (PC). The system and method automatically check security to protect a PC from computer hacking, viruses, worms, Trojan horses, etc., and inform or cure a vulnerable point. The system and method automatically check and modify all the security check items so that a user who may not have professional computer knowledge can readily cope with a cyber attack, and describe the vulnerable point and the result of the cure to the user with ease. Therefore, the system and method can maintain a PC in its up-to-date state to prevent damage from a cyber attack, and minimize damage from a cyber threat against the main system and service.
    Type: Application
    Filed: November 8, 2007
    Publication date: May 15, 2008
    Inventors: Kang San Kim, Hyoung Chun Kim, Soon Jwa Hong, Eung Ki Park, Choon Sik Park
  • Publication number: 20080115016
    Abstract: A system and method for analyzing a file format to perform a software security test are provided. The system includes a file scanner for monitoring a program that loads an unknown file on a memory and parsing function parameters of the loaded file, and a file analyzer for receiving the parsing data from the file scanner and extracting a field location and a data type of the unknown file format.
    Type: Application
    Filed: September 6, 2007
    Publication date: May 15, 2008
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Young Han CHOI, Hyoung Chun Kim, Soon Jwa Hong
  • Publication number: 20050256147
    Abstract: The present application discloses a pharmaceutical composition for treating Parkinson's disease and psychotropic intoxication/abusive potential, which contains a morphinan compound.
    Type: Application
    Filed: May 13, 2005
    Publication date: November 17, 2005
    Applicants: GREEN CROSS CORP.
    Inventor: Hyoung-Chun KIM