Patents by Inventor Hyun Yi

Hyun Yi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240123133
    Abstract: The present invention relates to a device capable of wrapping the outer wall of a blood vessel, and a method for manufacturing the device. If the device for wrapping the outer wall of a blood vessel of the present invention is used, the outer wall of a blood vessel is wrapped, and, thereby, vortex generation can be significantly decreased by controlling abnormal expansion of the blood vessel which can occur due to the difference in the characteristics of blood vessels in a vein-artery graft model. The present invention saves a blood vessel from a low-oxygen state by promoting generation of new blood vessels on the outer wall of the blood vessel via a regenerative inflammatory response caused by the material of the device, and provides synergy effects such as prevention of vascular stenosis and reinforcement of an outer muscular layer by guiding venous muscular cells to the outside.
    Type: Application
    Filed: October 19, 2020
    Publication date: April 18, 2024
    Inventors: Mi-Lan KANG, Se Won YI, Jeong-Kee YOON, Dae-Hyun KIM
  • Patent number: 11951130
    Abstract: The present invention relates to an antigen-binding molecule comprising a heavy chain variable region comprising a heavy-chain complementarity-determining region 1 (HCDR1) comprising an amino acid sequence represented by Sequence No. 1, an HCDR2 comprising an amino acid sequence represented by Sequence No. 2, and an HCDR3 comprising an amino acid sequence represented by Sequence No. 3; a light-chain variable region comprising a light-chain complementarity-determining region 1 (LCDR1) comprising an amino acid sequence represented by Sequence No. 4, an LCDR2 comprising an amino acid sequence represented by Sequence No. 5, and an LCDR3 comprising an amino acid sequence represented by Sequence No. 6; wherein the antigen-binding molecule is a T cell receptor (TCR); and to a cell line expressing the same.
    Type: Grant
    Filed: March 1, 2021
    Date of Patent: April 9, 2024
    Assignee: Eutilex Co., Ltd.
    Inventors: Byoung S. Kwon, Young Ho Kim, Kwang Hee Kim, Ji Won Chung, Young Gyoon Chang, Bo Rim Yi, Jung Yun Lee, Seung Hyun Lee, Sun Woo Im, Jin Kyung Choi, Hyun Tae Son, Eun Hye Yoo
  • Patent number: 11950494
    Abstract: Provided is an organometallic compound represented by Formula 1, an organic light-emitting device including the same, and an electronic apparatus including the organic light-emitting device. M(L1)n1(L2)n2??<Formula 1> M, L1, L2, n1, and n2 in Formula 1 are the same as described in the present specification.
    Type: Grant
    Filed: October 1, 2020
    Date of Patent: April 2, 2024
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jeoungin Yi, Seungyeon Kwak, Juhyun Kim, Sangho Park, Sunyoung Lee, Jiyoun Lee, Yoonhyun Kwak, Hyun Koo, Sunghun Lee, Hyeonho Choi
  • Patent number: 11934495
    Abstract: A device for automatically identifying anti-analysis techniques by using the signature extraction, includes an extraction unit which extracts a DEX file and an ELF file from an application file after unpacking the application file, which is in an APK format and includes compressed execution code to be executed on Android, a detection unit which receives the acquired signature classified according to types of the signature, analytically compares the input signature with the signature stored in a database, and detects the signature used in anti-analysis techniques, and a determination unit which determines according to the detected signature what anti-analysis technique is applied to the application. According to the present invention, it is possible to enable an appropriate and quick response to damages due to malicious applications by shortening the time required for analysis and automatically recognizing the application to which the anti-analysis technique is applied.
    Type: Grant
    Filed: November 26, 2018
    Date of Patent: March 19, 2024
    Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATION
    Inventors: Jeong Hyun Yi, Min Koo Kang
  • Patent number: 11928220
    Abstract: A method for evaluating the risk of data leakage in an application includes the steps of: extracting a DEX (Dalvik Executable) file and a so (Shared Object) file by decompressing an APK file of a mobile application; extracting DEX code information from the DEX file by parsing the DEX file; translating a content of the so file into IR (Intermediate Representation); extracting IR code information from the translated IR; generating a call-reference structure between the DEX file and the so file by processing the extracted DEX code information and the extracted IR code information; and outputting weakness information according to a risk designated in advance based on the generated call-reference structure. Accordingly, it is possible to extend the call-reference coverage of an android application.
    Type: Grant
    Filed: April 1, 2021
    Date of Patent: March 12, 2024
    Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATION
    Inventors: Jeong Hyun Yi, Minseong Choi, Sunjun Lee
  • Patent number: 11915822
    Abstract: Disclosed herein is a medical image reading assistant apparatus. The medical image reading assistant apparatus includes a computing system. The computing system includes: a receiver interface configured to receive a first medical image and a second medical image following the first medical image; and at least one processor configured to: generate follow-up information between first findings on the first medical image and second findings on the second medical image by comparing the locations of the first findings and the locations of the second findings; select at least some of the first findings as first valid findings based on a first threshold of diagnostic assistant information for each of the first findings; set a second threshold of diagnostic assistant information for each of the second findings based on the follow-up information; and select at least some of the second findings as second valid findings based on the second threshold.
    Type: Grant
    Filed: November 30, 2021
    Date of Patent: February 27, 2024
    Assignee: Coreline Soft Co., Ltd.
    Inventors: Jaeyoun Yi, Donghoon Yu, Yongjin Chang, Hyun Gi Seo
  • Patent number: 11886589
    Abstract: A process wrapping method for bypassing native code anti-analysis includes receiving an execution instruction intended to run in an application from an Android framework when the application starts, extracting metadata of string and method from a compiled OAT file using an oatdump tool in the Android framework, determining if anti-analysis techniques are applied by comparing with information of a database (DB) based on the transmitted execution instruction and the extracted metadata, modifying the execution instruction based on the determined information when the anti-analysis technique is applied, and sending the modified execution instruction back to the Android framework. Accordingly, it is possible to provide an environment in which malicious applications to which anti-analysis techniques are applied can be easily analyzed.
    Type: Grant
    Filed: January 28, 2021
    Date of Patent: January 30, 2024
    Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATION
    Inventors: Jeong Hyun Yi, Yong Gu Shin
  • Patent number: 11809557
    Abstract: A mobile malicious code classification method based on feature selection includes extracting Application Programming Interface (API) feature information including a package name, a class name, a method name and a description from a malicious application of a predefined category, vectorizing a training dataset generated using the package name, the class name and the method name in the API feature information for deep learning, learning the vectorized training dataset to generate a classifier, probabilistically classifying to fit a target malicious application into a category, and defining the category of the target malicious application using a result of the classification and outputting a classification important API. Accordingly, it is possible to deal with malicious behaviors of malicious applications quickly and prevent damage caused by the malicious behaviors.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: November 7, 2023
    Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATION
    Inventors: Jeong Hyun Yi, Eun Byeol Ko
  • Patent number: 11768938
    Abstract: A mobile application malicious behavior pattern detection method based on Application Programming Interface (API) call graph extraction includes extracting an API Call Graph (ACG) representing an API call flow from benign applications and applications which perform malicious behavior, generating and vectorizing a training dataset for deep learning using the extracted ACG, generating a deep learning algorithm prediction model by training with the vectorized training dataset, extracting ACG features used in the malicious behavior from the generated prediction model and extracting a malicious behavior pattern from an intersection of the malicious applications, and classifying an application which performs malicious behavior through similarity comparison between the extracted malicious behavior pattern and a pattern extracted from the target application. Accordingly, it is possible to detect the malicious behavior itself using the ACG representing an API call flow.
    Type: Grant
    Filed: November 26, 2020
    Date of Patent: September 26, 2023
    Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATION
    Inventors: Jeong Hyun Yi, Jin Sung Kim
  • Patent number: 11705884
    Abstract: A bulk acoustic resonator includes: a substrate; a first electrode disposed on the substrate; a piezoelectric layer disposed to cover at least a portion of the first electrode; a second electrode disposed to cover at least a portion of the piezoelectric layer; a metal pad connected to the first electrode and the second electrode; and a protective layer disposed to cover at least the metal pad.
    Type: Grant
    Filed: July 30, 2020
    Date of Patent: July 18, 2023
    Assignee: Samsung Electro-Mechanics Co., Ltd.
    Inventors: Chang Hyun Lim, Sang Hyun Yi, Yong Suk Kim, Sung Jun Lee, Jae Hyoung Gil, Dong Hyun Park
  • Patent number: 11430617
    Abstract: An example portable electronic device includes a front glass cover; a rear cover; a bezel surrounding a space defined by the front cover and the rear cover, the bezel including a portion including an opening; a display device built in the space; and a plate including a plane parallel to the front cover within the space. The example electronic device includes a key movably inserted in the opening; a support structure mounted on the plate or a portion of the bezel and including a hole through which the key passes; a dome button mounted on the support structure and arranged to face the first surface of the key and the hole so that the key can be pressed; and a waterproof structure including a flexible material.
    Type: Grant
    Filed: January 19, 2021
    Date of Patent: August 30, 2022
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jong-Min Choi, Hyuk-Jae Jang, Woong-Chan Kim, Jung-Tae Kim, Dae-Hyeong Park, Sang-Hyun Yi, Jae-Ryang Lee, Jeong-Goo Jeon, Sung-Gun Cho, Sung-Joo Cho, Young-Sik Choi, Soon-Woong Yang, Min-Sung Lee
  • Publication number: 20220245259
    Abstract: A method for evaluating the risk of data leakage in an application includes the steps of: extracting a DEX (Dalvik Executable) file and a so (Shared Object) file by decompressing an APK file of a mobile application; extracting DEX code information from the DEX file by parsing the DEX file; translating a content of the so file into IR (Intermediate Representation); extracting IR code information from the translated IR; generating a call-reference structure between the DEX file and the so file by processing the extracted DEX code information and the extracted IR code information; and outputting weakness information according to a risk designated in advance based on the generated call-reference structure. Accordingly, it is possible to extend the call-reference coverage of an android application.
    Type: Application
    Filed: April 1, 2021
    Publication date: August 4, 2022
    Inventors: Jeong Hyun YI, Minseong CHOI, Sunjun LEE
  • Patent number: 11403371
    Abstract: Provided is a method for bypassing an analysis evasion technique, which includes: loading a dummy DEX file; parsing a dummy method containing a dummy code from the dummy DEX file; a bypass point identifying step of determining whether a function to be currently called is a bypass target function to which the analysis evasion technique is applied; a branch target point changing step of changing information according to the determination result so that the dummy code is executed instead of the call target function; and a dummy code executing step of transmitting the dummy code to a framework of the application, so that a modulated framework is executed with a bypass code.
    Type: Grant
    Filed: August 18, 2020
    Date of Patent: August 2, 2022
    Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATION
    Inventors: Jeong Hyun Yi, Sunjun Lee
  • Publication number: 20220207296
    Abstract: A code sequence based intelligent key code identification method includes extracting Smali code sequence by decompiling an application, vectorizing the extracted Smali code sequence to construct a training dataset, training a deep learning model with the vectorized Smali code sequence to generate a classifier, generating a category classification result using Smali code sequence of a target application as input of the classifier, and identifying and providing important Smali code sequence from which the classification result of the target application is derived. Accordingly, it is possible to objectively evaluate the application using Smali code sequence of the application being actually run.
    Type: Application
    Filed: January 28, 2021
    Publication date: June 30, 2022
    Inventors: Jeong Hyun YI, Yeong Hun BAN
  • Publication number: 20220179955
    Abstract: A mobile malicious code classification method based on feature selection includes extracting Application Programming Interface (API) feature information including a package name, a class name, a method name and a description from a malicious application of a predefined category, vectorizing a training dataset generated using the package name, the class name and the method name in the API feature information for deep learning, learning the vectorized training dataset to generate a classifier, probabilistically classifying to fit a target malicious application into a category, and defining the category of the target malicious application using a result of the classification and outputting a classification important API. Accordingly, it is possible to deal with malicious behaviors of malicious applications quickly and prevent damage caused by the malicious behaviors.
    Type: Application
    Filed: January 29, 2021
    Publication date: June 9, 2022
    Inventors: Jeong Hyun YI, Eun Byeol KO
  • Publication number: 20220164447
    Abstract: A mobile application malicious behavior pattern detection method based on Application Programming Interface (API) call graph extraction includes extracting an API Call Graph (ACG) representing an API call flow from benign applications and applications which perform malicious behavior, generating and vectorizing a training dataset for deep learning using the extracted ACG, generating a deep learning algorithm prediction model by training with the vectorized training dataset, extracting ACG features used in the malicious behavior from the generated prediction model and extracting a malicious behavior pattern from an intersection of the malicious applications, and classifying an application which performs malicious behavior through similarity comparison between the extracted malicious behavior pattern and a pattern extracted from the target application. Accordingly, it is possible to detect the malicious behavior itself using the ACG representing an API call flow.
    Type: Application
    Filed: November 26, 2020
    Publication date: May 26, 2022
    Inventors: Jeong Hyun YI, Jin Sung KIM
  • Publication number: 20220164446
    Abstract: A process wrapping method for bypassing native code anti-analysis includes receiving an execution instruction intended to run in an application from an Android framework when the application starts, extracting metadata of string and method from a compiled OAT file using an oatdump tool in the Android framework, determining if anti-analysis techniques are applied by comparing with information of a database (DB) based on the transmitted execution instruction and the extracted metadata, modifying the execution instruction based on the determined information when the anti-analysis technique is applied, and sending the modified execution instruction back to the Android framework. Accordingly, it is possible to provide an environment in which malicious applications to which anti-analysis techniques are applied can be easily analyzed.
    Type: Application
    Filed: January 28, 2021
    Publication date: May 26, 2022
    Inventors: Jeong Hyun YI, Yong Gu SHIN
  • Publication number: 20220156370
    Abstract: An obfuscated identifier detection method based on natural language processing includes: converting an input obfuscated apk to smali code level, inspecting an obfuscated string in identifiers of the smali code acquired from a smali code converter, extracting information necessary for deobfuscation and frequency of the identifiers when there is the obfuscated string, storing frequency, type and name information of identifiers calculated from information extracted from an unobfuscated apk, and acquiring and deobfuscating an identifier type name having a most similar frequency in an identifier name database (DB) using information extracted from an obfuscated information extractor. Accordingly, it is possible to reduce delay in analysis and achieve faster analysis by automatically renaming the code that is difficult to understand due to identifier conversion obfuscation.
    Type: Application
    Filed: November 25, 2020
    Publication date: May 19, 2022
    Inventors: Jeong Hyun YI, Geochang JEON
  • Publication number: 20220149806
    Abstract: A bulk acoustic wave resonator includes: a substrate; a resonant portion including a first electrode, a piezoelectric layer, and a second electrode sequentially stacked on the substrate; and a protective layer disposed on an upper surface of the resonant portion. The protective layer includes: a first protective layer formed of a diamond thin film; and a second protective layer stacked on the first protective layer, and formed of a dielectric material.
    Type: Application
    Filed: April 9, 2021
    Publication date: May 12, 2022
    Applicant: SAMSUNG ELECTRO-MECHANICS CO., LTD.
    Inventors: Tae Kyung LEE, Sang Heon HAN, Sung Joon PARK, Sang Kee YOON, Sang Hyun YI, Jae Goon AUM
  • Patent number: D1018323
    Type: Grant
    Filed: January 28, 2022
    Date of Patent: March 19, 2024
    Assignee: KOLMAR KOREA CO., LTD.
    Inventors: Chang Soo Yi, Jong Hyun Park, Hye Jin Jung, Hee Yoon Kim