Patents by Inventor Jee Sook Eun

Jee Sook Eun has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110099271
    Abstract: Provided are a system and method for enforcing a radio frequency identification (RFID) event management policy. The system includes a policy definer for defining an RFID event management policy to be used by a client to manage an apparatus on the basis of an RFID event, a policy storage for storing the RFID event management policy, a policy determiner for selecting the RFID event management policy stored in the policy storage using a profile of the client included in an RFID event management policy request when the RFID event management policy request is received from the client, and a policy enforcer converting the selected RFID event management policy according to a standard executable by the client.
    Type: Application
    Filed: May 28, 2010
    Publication date: April 28, 2011
    Inventors: Joo Sang PARK, Hyo Chan Bang, Hee Sook Mo, Jee Sook Eun, Se Won Oh, Jae Gak Hwang, Jong Suk Chae, Kwang Hoon Kim, Ji Hye Song, Sun Jin Kim, Hyung Jin Ahn
  • Publication number: 20100146511
    Abstract: Provided is a policy-based data processing system and method. A pattern analyzer of the data processing system generates a pattern handler based on a pattern, schedules the generated pattern handler based on a policy to filter and group data, generates a processing function corresponding to a process type for each data type of event data into an object module, and uses it by handling it through a pattern handler.
    Type: Application
    Filed: August 17, 2009
    Publication date: June 10, 2010
    Applicants: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE, WAREPLUS CO., LTD.
    Inventors: Hee Sook MO, Hyochan BANG, Jee Sook EUN, Se Won OH, Jae Gak HWANG, Cheol Sig PYO, Jong-Suk CHAE, Jae Guen KIM, Gi Su KIM, Jai Yeol KIM
  • Publication number: 20100141402
    Abstract: Provided is a method and apparatus for recognizing a radio frequency identification tag reader. In order to obtain protocol addresses of a plurality of radio frequency identification (hereinafter referred to as RFID) tag readers, a request message including a timestamp indicating a generation time is generated and transmitted, and a response message for the request message from one of the plurality of RFID readers is received. When the timestamp included in the response message satisfies a set condition, a hardware address and a protocol address of the RFID reader are extracted from the response message.
    Type: Application
    Filed: November 24, 2009
    Publication date: June 10, 2010
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jee Sook EUN, Hee Sook MO, Hyochan BANG, Se Won OH, Jae Gak HWANG, Cheol Sig PYO, Jong-Suk CHAE
  • Publication number: 20100134289
    Abstract: An RFID reader controlling device based on a plurality of RFID reader protocols receives control instructions for controlling RFID readers from application devices providing services, and confirms RFID reader protocol types corresponding to control instructions to confirm whether communication channels corresponding to RFID reader protocols are generated. Further, the RFID reader controlling device transmits the control instructions to the RFID readers through the communication channels and transmits the control results of the RFID readers corresponding to the control instructions.
    Type: Application
    Filed: July 29, 2009
    Publication date: June 3, 2010
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Se Won OH, Hee-Sook MO, Jee Sook EUN, Jae-Gak HWANG, Cheol Sig PYO
  • Patent number: 7730305
    Abstract: An authentication method for link protection between an OLT and an ONU newly connected thereto in an EPON, which is implemented in a data link layer to which cryptography is applied. First, an authentication key is distributed to both the OLT and an ONU. The OLT (or ONU) generates first and second random values, generates an authentication request frame containing the random values, and transmits it to the ONU (or OLT). The ONU generates a first hash value according to a hash function using the random values contained in the request frame, and transmits an authentication response frame containing the first hash value to the OLT. The OLT compares the first hash value with a second hash value calculated by it according to the has function using the two random values and an authentication key distributed to it, and transmits an authentication result frame to the ONU.
    Type: Grant
    Filed: April 29, 2005
    Date of Patent: June 1, 2010
    Assignee: Electronics and Telecommunications Research Instutute
    Inventors: Jee Sook Eun, Tae Whan Yoo, Yool Kwon, Kyeong Soo Han
  • Patent number: 7724899
    Abstract: A method for controlling a security channel for reducing system load by extending the use period of a security association key is provided. In this method, an upper bit initial value of an initialization vector of an encryption algorithm and a using range thereof are shared between a transmitting side and a receiving side when a security channel is created. Then, a secure association is created between a transmitting side and a receiving side by setting an association number, a next packet number which is a lower bit value of an initialization vector, and a secure association key. Afterward, a packet number is modified whenever a frame is transmitted until all of packet numbers are used. When all packet numbers are used, the upper bit value of the initialization vector changes.
    Type: Grant
    Filed: December 7, 2006
    Date of Patent: May 25, 2010
    Assignee: Electronics and Telecommunications Research Insitute
    Inventors: Kyeong Soo Han, Jee Sook Eun, Yool Kwon
  • Publication number: 20090232313
    Abstract: A method and device for controlling security of a communication channel between an OLT and an ONU in a secure channel control system of EPON formed of the OLT and the ONU having a cryptographic module, a key management module and a transmitter/receiver for transmitting/receiving frames, the method comprising the steps of: a) distributing a key between the OLT and the ONU; b) transferring the distributed key to the encryption modules of the OLT and ONU; c) activating a corresponding encryption module using the distributed key at one of the OLT and the ONU which starts a security function activation; d) transmitting an encryption module information message including activation state information of the corresponding encryption module from the side (transmitting side) having the activated encryption module to an opponent side (receiving side); and e) activating an encryption module by checking activation state information of the encryption module at the receiving side.
    Type: Application
    Filed: December 5, 2006
    Publication date: September 17, 2009
    Inventors: Jee Sook Eun, Kyeong Soo Han, Yool Kwon
  • Patent number: 7571310
    Abstract: The present invention provides a method for detecting a security module for link protection in an EPON, wherein an OLT and an ONU in the EPON can check whether or not an encryption module is present in each other and check the configuration of each other in order to avoid loss of a message when the message is encrypted for link protection between the OLT and the ONU in the EPON.
    Type: Grant
    Filed: May 25, 2005
    Date of Patent: August 4, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jee Sook Eun, Yool Kwon
  • Publication number: 20090161874
    Abstract: A key management method for encrypting a frame in an Ethernet passive optical network (EPON) is provided. In the method, secure parameters including secure keys and their association numbers which are used in the present or will be used in the next by each secure channel are managed by composing a key information table. Then, it determines whether an association number of a received encryption frame is valid or not with reference to the key information table if the encryption frame of which association number has been changed is received. A secure key changes if the association number is determined to be valid, and the secure key does not change if the association number is not valid.
    Type: Application
    Filed: December 5, 2006
    Publication date: June 25, 2009
    Inventors: Jee Sook Eun, Yool Kwon
  • Publication number: 20090140843
    Abstract: The present invention relates to an RFID application interface method and a system thereof. In the present invention, an RFID middleware system changes a control request input from a user or an RFID application system according to a communication protocol of an RFID device to be controlled, and sends it to the RFID device. Also, when the user or the RFID application system inputs a data process policy that is common to various RFID devices of a logical RFID device group, the RFID middleware system generates data process rules that are suitable for communication capability and data processing capability of each RFID device based on the data process policy and provides an interface that allows processing of data by a corresponding RFID device.
    Type: Application
    Filed: October 22, 2008
    Publication date: June 4, 2009
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Hyo Chan BANG, Jee Sook EUN, Se Won OH, Jae Heum LEE, Jong-Hyun PARK, Hyung-Jin AHN, Kwang-Hoon KIM
  • Patent number: 7502328
    Abstract: Provided is a method of monitoring link performance and diagnosing an active link state without interrupting traffic in an Ethernet passive optical network (EPON) while the link is in the active state.
    Type: Grant
    Filed: November 22, 2005
    Date of Patent: March 10, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Ho Sook Lee, Jee Sook Eun, Tae Whan Yoo, Bong Tae Kim