Patents by Inventor Jeong-Han YUN

Jeong-Han YUN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150350889
    Abstract: A method for transmitting and receiving fake communication data and a base station performing the same are provided. The base station transmits the fake communication data based on a step of selecting targets to and from which the fake communication data are to be transmitted and received among terminals positioned in a set region, a step of controlling a communication amount depending on the selected targets, and a step of transferring the fake communication data to a corresponding terminal depending on a control result or receives the fake communication data through a step of receiving data from a terminal including a fake communication application, a step of confirming whether an identification value meaning fake communication is present in the data, and a step of filtering a traffic with the terminal in the case in which the identification value is present in the data.
    Type: Application
    Filed: September 3, 2014
    Publication date: December 3, 2015
    Inventors: Sungho JEON, Jeong-Han YUN, Woonyon KIM, Jungtaek SEO, Eung Ki PARK
  • Publication number: 20150304839
    Abstract: A technology for preventing leakage of personal information from traffics of terminals by transmitting and receiving fake communication data artificially generated so that an attacker does not identify normal communication between terminals is provided. A method for transmitting fake communication data includes: making a response request to whether or not a fake communication application is presented in an opponent terminal using an address book registered in a terminal; receiving a response corresponding to the response request and selecting targets to and from which the fake communication data are to be transmitted and received in a terminal list corresponding to the received response; controlling a communication amount depending on the selected targets; and transmitting the fake communication data to a corresponding receiving terminal depending on a control result.
    Type: Application
    Filed: September 1, 2014
    Publication date: October 22, 2015
    Inventors: Sungho JEON, Jeong-Han YUN, Woonyon KIM, Jungtaek SEO, Eung Ki PARK
  • Publication number: 20150261810
    Abstract: A data transfer apparatus and method, which fundamentally prevent the possibility of intrusion from an external network into an internal network that provides files, thus enabling data to be reliability transferred in a situation in which information cannot be exchanged. The data transfer apparatus includes an internal network connection unit for receiving data from a host of an internal network. An internal network control unit for performing control such that the data is unidirectionally transmitted. A write control unit checks integrity of the data received from the internal network control unit and detects status of the storage unit. An external network connection unit receives a request from a host of an external network. A read/write control unit searches for, reads, and deletes data stored in the storage unit at a request of the external network host.
    Type: Application
    Filed: December 5, 2014
    Publication date: September 17, 2015
    Inventors: Kyoung-Ho KIM, Jeong-Han YUN, Heemin KIM, Woonyon KIM, Jungtaek SEO, Eung Ki PARK
  • Publication number: 20150215075
    Abstract: The present invention relates to a system and method for unidirectional data transmission. Data is unidirectionally transmitted from a network having a higher security level to a network having a lower security level and a corresponding data verification result is received through a separate line. Hence, it is possible not only to physically block access to the network having a higher security level from the network having a lower security level but also to improve reliability of data delivery by appropriately handling packet loss and bit errors that may occur during data transmission.
    Type: Application
    Filed: September 16, 2013
    Publication date: July 30, 2015
    Inventors: Jong Mock Baek, Moon Suk Choi, Chung Hyo Kim, Yeop Chang, Byung Gil Min, Woo Nyon Kim, Moon Su Jang, Jeong Han Yun
  • Publication number: 20150109936
    Abstract: The present invention presents a network apparatus and a selective information monitoring method using the network apparatus, which allow a user to monitor only required information (the field information of packets) from all received packets. The network apparatus one or more physical interfaces connected to a monitoring target host and configured to receive network packets from the monitoring target host, and a switch fabric module including a configurable monitoring module configured to perform filtering so that selective information is extracted from the network packets collected through the one or more physical interfaces.
    Type: Application
    Filed: May 29, 2014
    Publication date: April 23, 2015
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Heemin KIM, Jeong-Han YUN, Kyoung-Ho KIM, Woonyon KIM, Jungtaek SEO, Eungki PARK
  • Publication number: 20150089646
    Abstract: An apparatus for protecting traffic trend in a network of a control system using artificial communication is provided. In accordance with an embodiment, the apparatus includes a communication terminal device installed in a network and configured to create and filter artificial communication. A communication server device determines whether to create artificial communication at a current time in the communication terminal device, requests a transmitting side-communication terminal device to create artificial communication, and requests a receiving side-communication terminal device to filter the artificial communication.
    Type: Application
    Filed: July 28, 2014
    Publication date: March 26, 2015
    Inventors: Sungho JEON, Jeong-Han YUN, Woonyon KIM, Jungtaek SEO, Choon Soo KIM
  • Publication number: 20150067764
    Abstract: A whitelist-based network switch defines a whitelist and a handling rule based on an access control list, security policies, etc., and monitors and blocks network traffic based on the whitelist and the handling rule. The whitelist-based network switch includes a whitelist monitoring unit for storing a whitelist including permitted communication rules, monitoring one or more packets input through a plurality of switch interfaces based on the whitelist, and permitting communication of each packet conforming to the whitelist, and a whitelist management unit for updating the whitelist and transmitting an updated whitelist to the whitelist monitoring unit.
    Type: Application
    Filed: July 14, 2014
    Publication date: March 5, 2015
    Inventors: Heemin KIM, Jeong-Han YUN, Kyoung-Ho KIM, Woonyon KIM, Jungtaek SEO, Chun soo KIM
  • Publication number: 20140344888
    Abstract: A network security apparatus includes a management unit, a security policies monitoring unit, a security monitoring unit, a log security check unit, and a log transmission unit. The management unit receives network security apparatus setting information, security policies and log generation policies from the outside. The security policies monitoring unit checks whether the security policies comply with a set format. If the security policies comply with the set format, the security monitoring unit monitors whether a communication node communicates in compliance with the security policies. The log security check unit generates a monitoring log based on the log generation policies, and checks whether the monitoring log complies with a log setting format. If the monitoring log complies with the log setting format, the log transmission unit transmits the security log to the outside, thereby performing the outside network security.
    Type: Application
    Filed: May 14, 2014
    Publication date: November 20, 2014
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jeong-Han YUN, Heemin KIM, Kyoung-Ho KIM, Woonyon KIM, Byung-gil MIN