Patents by Inventor Jae Cheol Ryou
Jae Cheol Ryou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11146385Abstract: Provided is a security communication method in a NFV environment and a system thereof. A security communication method in the NFV environment according to an exemplary embodiment of the present invention is a security communication method between virtualized network functions (VNF) in a network function virtualization (NFV) environment including: performing authentication between a first VNF and a second VNF by an element manager using a hash chain; generating secret keys based on its own hash chains by the first VNF and the second VNF which are authenticated; and performing the communication by the first VNF and the second VNF using its own secret keys.Type: GrantFiled: November 29, 2018Date of Patent: October 12, 2021Assignee: The Industry & Academic Cooperation in Chungnam National UniversityInventors: Jae Cheol Ryou, Hyun Jin Kim
-
Publication number: 20210028923Abstract: Provided is a security communication method in a NFV environment and a system thereof. A security communication method in the NFV environment according to an exemplary embodiment of the present invention is a security communication method between virtualized network functions (VNF) in a network function virtualization (NFV) environment including: performing authentication between a first VNF and a second VNF by an element manager using a hash chain; generating secret keys based on its own hash chains by the first VNF and the second VNF which are authenticated; and performing the communication by the first VNF and the second VNF using its own secret keys.Type: ApplicationFiled: November 29, 2018Publication date: January 28, 2021Inventors: Jae Cheol RYOU, Hyun Jin KIM
-
Publication number: 20120144208Abstract: An indexed table based code encrypting device adapted to encrypt an executable file of a computer program includes: an index creator configured to classify codes of the executable file into code blocks using a call code and store the number of calls and start addresses of the code blocks; and a block encrypter configured to encrypt the code blocks with encryption keys. An encryption key of a code block (hereinafter, first type code block) called once is created by using a code block calling the first type code block and an encryption key of a code block (hereinafter, second type code block) called twice or more is created by using a random number. The encryption keys of the first and second type code blocks are stored in the executable file.Type: ApplicationFiled: January 31, 2011Publication date: June 7, 2012Applicant: The Industry & Academic Cooperation in Chungnam National UniversityInventors: Seungjoo KIM, Dongho WON, Sungkyu CHO, Donghwi SHIN, Hyesuk JO, Donghyun CHOI, Jae-Cheol RYOU
-
Publication number: 20120011566Abstract: Disclosed is a method for sensor network authentication based on an XOR chain, which authenticates a transmitting node and a message in a sensor network including a central server, a plurality of transmitting nodes, and a plurality of receiving nodes, the method comprising the steps of: (a) receiving an initial key from the central server, generating a key chain from the initial key, generating a first key chain parameter sequence from the key chain, generating authentication information by XORing all the first key chain parameter sequence, and generating a second key chain parameter sequence by XORing each parameter of the first key chain parameter sequence with the authentication information, by each of the transmitting nodes; (b) transmitting first and second parameters of the same position in the first and second key chain parameter sequences of the transmitting node together with a message by the transmitting node; and (c) XORing the first and second parameters and comparing a result of the XOR operationType: ApplicationFiled: November 2, 2010Publication date: January 12, 2012Applicant: The Industry & Academic Cooperation in Chungnam National University(IAC)Inventors: Heung-Youl Youm, Don-gu Yeo, Jae-Cheol Ryou
-
Publication number: 20110249816Abstract: Disclosed is a hybrid key management method for a supervisory control and data acquisition (SCADA) system in which a master terminal unit (MTU), a plurality of sub-master terminal units (sub-MTUs), and a plurality of remote terminal units (RTUs) are sequentially and hierarchically structured, the hybrid key management method comprising the steps of: (a) creating, by the MTU and the sub-MTUs, their own secret numbers and making and exchanging digital signatures; (b) creating, by the MTU, group keys; and (c) distributing, by the MTU, the group keys to the sub-MTUs and encrypting and decrypting the group keys using the secret numbers.Type: ApplicationFiled: September 2, 2010Publication date: October 13, 2011Applicant: The Industry & Academic Cooperation in Chungnam National University (IAC)Inventors: Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim, Jae-Cheol Ryou
-
Publication number: 20110158405Abstract: Disclosed is a shared key management method for SCADA system in which a master terminal unit (MTU), a plurality of sub-master terminal units (sub-MTUs), and a plurality of remote terminal units (RTUs) are sequentially and hierarchically structured, comprising the steps of: generating shared keys of a group key in a tree structure by the MTU, the tree structure including a binary tree ranging from a root node corresponding to the MTU to intermediate nodes corresponding to the sub-MTUs; storing shared keys of descendant nodes and ancestor nodes of an intermediate node of a sub-MTU by the sub-MTU; and updating, upon updating of a shared key of an intermediate node, all shared keys of on-path nodes from the updated intermediate node to the root node, the shared keys of the on-path nodes being updated using their own shared keys and shared keys of off-path child nodes.Type: ApplicationFiled: February 26, 2010Publication date: June 30, 2011Applicant: The Industry & Academy Cooperation in Chungnam National University (IAC)Inventors: Donghyun CHOI, Dongho Won, Seungjoo Kim, Jae-Cheol Ryou
-
Patent number: 7837098Abstract: Provided is a method and apparatus for establishing online a shared key that is required to perform a security communication between an automatic teller machine (ATM) and a host. Through this, it is possible to reduce costs and procedures that may be required to use or operate a certificate authority. Also, it is possible to reduce overheads that may occur in generating and verifying a certificate. Accordingly, it is possible to more securely prevent a leakage of the shared key.Type: GrantFiled: March 26, 2009Date of Patent: November 23, 2010Assignee: Nautilus Hyosung Inc.Inventor: Jae Cheol Ryou
-
Publication number: 20100153421Abstract: The present invention discloses a device and method for detecting a packed PE (portable executable) file. In the device and method for detecting a packed PE file, information for detecting packing are extracted by analyzing the header of a target file, and a record containing characteristic values shown only in a packed PE file is created by using the extracted information. The packing of the target file is detected by calculating the similarity with a PE file which is not packed based on the created record and comparing it with a derived threshold value. Therefore, a packed PE file can be detected even if it is packed by a packing method which is not well-known.Type: ApplicationFiled: May 1, 2009Publication date: June 17, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Yang Seo CHOI, Ik Kyun KIM, Jin Tae OH, Jae Cheol RYOU
-
Publication number: 20100116878Abstract: Provided is a method and apparatus for establishing online a shared key that is required to perform a security communication between an automatic teller machine (ATM) and a host. Through this, it is possible to reduce costs and procedures that may be required to use or operate a certificate authority. Also, it is possible to reduce overheads that may occur in generating and verifying a certificate. Accordingly, it is possible to more securely prevent a leakage of the shared key.Type: ApplicationFiled: March 26, 2009Publication date: May 13, 2010Applicant: NAUTILUS HYOSUNG INC.Inventor: Jae Cheol RYOU
-
Publication number: 20030225841Abstract: A system and method for preventing spam mails. A spam mail information collection server extracts base information for spam mail determination from header information of spam mails received at false mail addresses, databases the extracted spam mail determination base information and provides the databased spam mail determination base information to at least one mail server. The mail server receives the spam mail determination base information and stores it in a database. Upon receiving a new mail, the mail server analyzes header information of the received new mail, searches the spam mail determination base information database for the analyzed header information to determine whether the new mail is a spam mail, and blocks the reception of the new mail if the mail is determined to be a spam mail.Type: ApplicationFiled: December 4, 2002Publication date: December 4, 2003Inventors: Sang-Hern Song, Ki-Young Baek, Jae-Cheol Ryou, Jong-Hu Lee
-
Publication number: 20030187797Abstract: A method for issuing and settling an electronic check. An electronic check management server includes a user registration module, an electronic check issuance module, and an electronic check settlement module that are respectively executable by software. An issuer computer includes a user registration module and an electronic check issuance module that are respectively executable by software. A payee computer includes a user registration module and an electronic check settlement module that are respectively executable by software. Therefore, the method adopts a client as an electronic check issuer to quickly issue the electronic check, and transmits an issued electronic check to a payee via an E-mail using a P2P method, thereby establishing secure remittance/settlement services.Type: ApplicationFiled: December 4, 2002Publication date: October 2, 2003Inventors: Sang-Hern Song, Ki-Young Baek, Jae-Cheol Ryou, Jong-Hu Lee