Patents by Inventor Jang Joong Kim

Jang Joong Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11980229
    Abstract: An aerosol generating system includes: a cavity configured to accommodate at least a portion of a cigarette; a first induction coil located around the cavity; a second induction coil located around the cavity and connected to the first induction coil in parallel; and a battery configured to supply an alternating current to the first induction coil and the second induction coil, wherein the first induction coil and the second induction coil have different resonant frequencies.
    Type: Grant
    Filed: June 24, 2020
    Date of Patent: May 14, 2024
    Assignee: KT&G CORPORATION
    Inventors: In Su Park, Sung Jong Ki, Young Joong Kim, Jang Won Seo, John Tae Lee, Sun Hwan Jung, Eun Mi Jeoung
  • Publication number: 20140366134
    Abstract: The present invention relates to a malicious code blocking method using a management system for monitoring a state of a vaccine, and more specifically, to a malicious code blocking method using a management system for monitoring a state of a vaccine, in which the management system connected through the Internet monitors in real-time whether or not a vaccine program installed in an individual user terminal normally operates and transmits an alarm to a user when the vaccine program does not operate normally, thereby removing a malicious code. According to the present invention, because an error or a paralyzed state of a vaccine program which cannot be easily understood by general users is informed in real-time, the vaccine program can be promptly normalized regardless of the knowledge and interest of a user, and thus it is effective in that infection and additional damage of the malicious code can be prevented.
    Type: Application
    Filed: June 9, 2014
    Publication date: December 11, 2014
    Inventors: JANG JOONG KIM, SONG JIN KIM, JUN SEOB KIM
  • Publication number: 20140096089
    Abstract: An electronic device includes a display, at least one processor, a memory, and a mind-map user interface stored in the memory, executed by the processor, and configured to create or edit a plurality of topic objects which are formed of user-entered input data and connected to each other in a hierarchical tree structure. The processor is configured to display on the display the plurality of topic objects distributed in the hierarchical tree structure when the mind-map user interface is executed. At least one of the plurality of topic objects contains text string data including numeric data and an arithmetic identifier, and also at least one of the plurality of topic objects contains text string data including a function identifier which indicates a predefined function.
    Type: Application
    Filed: September 24, 2013
    Publication date: April 3, 2014
    Applicant: ESTsoft Corp.
    Inventor: Jang-Joong KIM
  • Publication number: 20140085340
    Abstract: Provided are a method and electronic device for simply manipulating a scale or rotation of a graphic on a display. The method is performed by any electronic device that includes a display, a processor, a memory and a program, or by any storage medium that can be read by a computer storing commands executable in an electronic device. This program may display a graphic on the display when executed by the processor. A user can simply scale up/down or rotate a graphic through a two-step manipulation of a touch and a touch-and-drag.
    Type: Application
    Filed: September 23, 2013
    Publication date: March 27, 2014
    Applicant: ESTsoft Corp.
    Inventor: Jang-Joong KIM
  • Publication number: 20130238574
    Abstract: The present invention relates to a cloud system and a method for compressing and sending a file in the cloud system, wherein when a user who accesses a cloud computing system and uploads or downloads files requests a target compression file to be compressed, whether the same file as the target compression file is stored in the cloud system or not is check and if, as a result of the check, the same file is present, an ID code of the target compression file is stored while compressing the target compression file. In accordance with the present invention, there are advantages in that a load of the cloud system can be reduced and there is a marginal network band because the same file is not redundantly stored if the same file is present in the cloud system.
    Type: Application
    Filed: July 28, 2011
    Publication date: September 12, 2013
    Applicant: ESTsoft Corp.
    Inventor: Jang-Joong Kim
  • Patent number: 8359648
    Abstract: In a method of defending a Distributed Denial of Service (DDoS) attack, an attack target server determines whether the attack target server suffers a DDoS attack from a plurality of terminals and, according to a result of the determination, informs a control server that the attack target server suffers the DDoS attack by transmitting its own information to the control server. The control server which has received the information of the attack target server confirms the plurality of terminals which transmits data to the attack target server and transmits an attack prevention message to the plurality of confirmed terminals. Each of the plurality of terminals which has received the attack prevention message determines whether the terminal launches the DDoS attack and, according to a result of the determination, blocking the DDoS attack.
    Type: Grant
    Filed: September 1, 2009
    Date of Patent: January 22, 2013
    Assignee: ESTsoft Corp.
    Inventor: Jang Joong Kim
  • Publication number: 20110231415
    Abstract: The present invention relates to a web search system and a method thereof based on a web page connection time and a web page visiting frequency. The web search system and the method thereof based on the web page connection time and the web page visiting frequency according to an embodiment of the present invention comprises the steps of: extracting the web page connection time of a user; calculating an accumulated connection time of the web page using the extracted connection time; and providing a list of web pages searched by the user after sorting the web pages in order of a ratio of the accumulated connection time.
    Type: Application
    Filed: November 28, 2008
    Publication date: September 22, 2011
    Applicant: ESTsoft Corp
    Inventor: Jang-Joong Kim
  • Publication number: 20100058471
    Abstract: In a method of defending a Distributed Denial of Service (DDoS) attack, an attack target server determines whether the attack target server suffers a DDoS attack from a plurality of terminals and, according to a result of the determination, informs a control server that the attack target server suffers the DDoS attack by transmitting its own information to the control server. The control server which has received the information of the attack target server confirms the plurality of terminals which transmits data to the attack target server and transmits an attack prevention message to the plurality of confirmed terminals. Each of the plurality of terminals which has received the attack prevention message determines whether the terminal launches the DDoS attack and, according to a result of the determination, blocking the DDoS attack.
    Type: Application
    Filed: September 1, 2009
    Publication date: March 4, 2010
    Applicant: ESTSOFT CORP.
    Inventor: Jang-Joong KIM
  • Publication number: 20080288776
    Abstract: The present invention relates to a security method using a virtual keyboard, and more specifically, to a security method using a virtual keyboard, in which a user may input information through the virtual keyboard using a mouse when the user logs into a web server by inputting an identification (ID) and a password, and the inputted password is transmitted to the web server after being encrypted, so that personal information is prevented from being leaked by a hacking program and a safe connection is established. According to the present invention, risk of personal information leakage that can be occurred when an ID and a password are inputted through a keyboard may be greatly reduced, and it is effective in that even when a symmetric key is leaked, which is least expected, decipher of data is prevented by maintaining security of a private key.
    Type: Application
    Filed: May 9, 2008
    Publication date: November 20, 2008
    Inventor: Jang-joong Kim