Patents by Inventor Hyun Kyu Seo

Hyun Kyu Seo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190163919
    Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.
    Type: Application
    Filed: January 30, 2019
    Publication date: May 30, 2019
    Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
  • Publication number: 20190163920
    Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.
    Type: Application
    Filed: January 30, 2019
    Publication date: May 30, 2019
    Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
  • Publication number: 20190163921
    Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.
    Type: Application
    Filed: January 30, 2019
    Publication date: May 30, 2019
    Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
  • Patent number: 10268825
    Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: April 23, 2019
    Assignee: International Business Machines Corporation
    Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
  • Patent number: 10223535
    Abstract: A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. The multiple security routines are sorted according to the real-time trends, such that the sorting establishes an order of priority for running each of the multiple security routines based on the real-time trends. A percentage of sorted security routines to execute on the computer system is executed in their order of priority to identify one or more computer security issues for the computer system. One or more processors then execute a resolution program to resolve the one or more computer security issues that are identified for the computer system.
    Type: Grant
    Filed: December 14, 2016
    Date of Patent: March 5, 2019
    Assignee: International Business Machines Corporation
    Inventors: Elizabeth A. Holz, Hyun Kyu Seo, Ronald B. Williams
  • Publication number: 20190028689
    Abstract: A system, computer program product and computer-implemented method for presenting data. The system includes a sensor that obtains a measurement related to a viewing parameter of a viewer in the environment, a presentation surface that provides data for viewing by the viewer, and a processor. The viewing parameter of the viewer indicates the viewer's ability to perceive the data. The processor determines the viewing parameter of the viewer from the obtained measurement and dynamically alters a presentation parameter of the presentation surface based at least in part on the viewing parameter of the viewer.
    Type: Application
    Filed: July 19, 2017
    Publication date: January 24, 2019
    Inventors: Andrew S. Aaron, Hariklia Deligianni, David O.S. Melville, Mark E. Podlaseck, Hyun Kyu Seo
  • Patent number: 10171054
    Abstract: An approach is provided that compares inputs received at a system to a set of rules. The rules include both static rules as well as dynamic rules. The approach retrieves audio adjustments based on the comparison of inputs to the rules. The approach then automatically adjusts an output of an audio system based on the retrieved audio adjustment.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Kathryn Orenstein, Hyun Kyu Seo
  • Patent number: 10089452
    Abstract: A fingerprint scanner includes a fingerprint scanner plate, a rotating platform aligned below the fingerprint scanner plate, a light mounted on the rotating platform, a camera, one or more processors, and a memory device. The camera captures multiple images of shadows in grooves in a fingerprint of a user's finger that is pressed against the fingerprint scanner plate as the light moves on the rotating platform. The one or more processors analyze the multiple images of the shadows in the grooves in the fingerprint to determine a depth and shape of the grooves in the fingerprint, and then generate an original digital fingerprint file that represents the shape and depth of the fingerprint grooves on the user's fingerprint. The processor(s) store the original digital fingerprint file for use in future biometric verification of the user.
    Type: Grant
    Filed: September 2, 2016
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventor: Hyun Kyu Seo
  • Publication number: 20180276361
    Abstract: A method and/or computer system generates a three-dimensional image of a fingerprint. One or more sensors detect a first user's finger being pressed against a first fingerprint scanner, where the first user's finger has a first user's fingerprint that comprises fingerprint ridges that form fingerprint grooves. A light source on a rotating platform transmits offset light against the first user's finger as the light source rotates on the rotating platform. A camera captures shadow images of shadows in the fingerprint grooves. One or more processors receive and analyze the shadow images in order to determine a shape and depth of the fingerprint grooves. The processor(s) generate a first digital fingerprint file that represents the shape and depth of the fingerprint grooves, and store the first digital fingerprint file for use in future biometric verification of the first user.
    Type: Application
    Filed: May 29, 2018
    Publication date: September 27, 2018
    Inventor: HYUN KYU SEO
  • Publication number: 20180165457
    Abstract: A computer-implemented method improves a computer system's security. A description of real-time trends, for multiple computer security issues from a third party resource is associated with multiple security routines for a computer system. The multiple security routines are sorted according to the real-time trends, such that the sorting establishes an order of priority for running each of the multiple security routines based on the real-time trends. A percentage of sorted security routines to execute on the computer system is executed in their order of priority to identify one or more computer security issues for the computer system. One or more processors then execute a resolution program to resolve the one or more computer security issues that are identified for the computer system.
    Type: Application
    Filed: December 14, 2016
    Publication date: June 14, 2018
    Inventors: ELIZABETH A. HOLZ, HYUN KYU SEO, RONALD B. WILLIAMS
  • Publication number: 20180157842
    Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 7, 2018
    Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
  • Patent number: 9954882
    Abstract: Software that automatically detects anomalous attributes indicative of a potential intrusion in a computing system. The software performs the following operations: (i) determining a baseline pattern for one or more attributes of a computing system, based on a first set of statistical thresholds determined for received values of the one or more attributes, wherein the received values correspond to one or more time periods, and on a second set of statistical thresholds determined for a first subset of values of the received values of the one or more attributes, wherein each value of the first subset exceeds the first set of statistical thresholds; and (ii) in response to identifying, based on the determined baseline pattern, anomalous values in monitored additional values of the one or more attributes, sending an alert to a user of the computing system indicating that a potential intrusion in the computing system has occurred.
    Type: Grant
    Filed: July 27, 2016
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Hyun Kyu Seo, Ronald B. Williams, Gideon Zenz
  • Publication number: 20180068100
    Abstract: A fingerprint scanner includes a fingerprint scanner plate, a rotating platform aligned below the fingerprint scanner plate, a light mounted on the rotating platform, a camera, one or more processors, and a memory device. The camera captures multiple images of shadows in grooves in a fingerprint of a user's finger that is pressed against the fingerprint scanner plate as the light moves on the rotating platform. The one or more processors analyze the multiple images of the shadows in the grooves in the fingerprint to determine a depth and shape of the grooves in the fingerprint, and then generate an original digital fingerprint file that represents the shape and depth of the fingerprint grooves on the user's fingerprint. The processor(s) store the original digital fingerprint file for use in future biometric verification of the user.
    Type: Application
    Filed: September 2, 2016
    Publication date: March 8, 2018
    Inventor: HYUN KYU SEO
  • Publication number: 20170155674
    Abstract: Software that automatically detects anomalous attributes indicative of a potential intrusion in a computing system. The software performs the following operations: (i) determining a baseline pattern for one or more attributes of a computing system, based on a first set of statistical thresholds determined for received values of the one or more attributes, wherein the received values correspond to one or more time periods, and on a second set of statistical thresholds determined for a first subset of values of the received values of the one or more attributes, wherein each value of the first subset exceeds the first set of statistical thresholds; and (ii) in response to identifying, based on the determined baseline pattern, anomalous values in monitored additional values of the one or more attributes, sending an alert to a user of the computing system indicating that a potential intrusion in the computing system has occurred.
    Type: Application
    Filed: July 27, 2016
    Publication date: June 1, 2017
    Inventors: Hyun Kyu Seo, Ronald B. Williams, Gideon Zenz
  • Patent number: 9471778
    Abstract: Software that automatically creates baselines from time series data of computer system activity, thereby providing immediate value from observed system data. The software performs the following operations: (i) receiving values of one or more attributes of a computing system that correspond to one or more time periods; (ii) determining a first set of statistical thresholds for the received values, wherein the received values include a subset of values that exceed the first set of statistical thresholds; (iii) determining a second set of statistical thresholds for the subset of values that exceed the first set of statistical thresholds; and (iv) determining a baseline pattern for the one or more attributes based, at least in part, on the determined first set of statistical thresholds and the determined second set of statistical thresholds.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventors: Hyun Kyu Seo, Ronald B. Williams, Gideon Zenz