Patents by Inventor Jeong Hyun Yi

Jeong Hyun Yi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100131763
    Abstract: A mobile system, a service system, and a key authentication method to manage a key in a local wireless communication are provided. The mobile system and the service system may generate a hash value with respect to a public key of the service system using an identical hash function, and output a result corresponding to the hash value.
    Type: Application
    Filed: April 17, 2009
    Publication date: May 27, 2010
    Inventors: Eunah KIM, Jeong Hyun YI, Won Keun KONG
  • Publication number: 20090102606
    Abstract: A tag authentication method, and a tag and reader performing the method are provided. The tag authentication method, including: a reader generating a first random number and transmitting the first random number to a tag; the reader receiving a second random number and a first verification value from the tag; the reader computing a second verification value based on the first random number and the second random number; and the reader comparing the first verification value and the second verification value.
    Type: Application
    Filed: February 21, 2008
    Publication date: April 23, 2009
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Eunah Kim, Jeong Hyun Yi, Taekyoung Kwon, Tae Jin Park
  • Publication number: 20090102655
    Abstract: A mobile privacy protection system using a proxy, a proxy device, and a mobile privacy protection method are provided. The mobile privacy protection system includes: an electronic tag to store predetermined tag information; a proxy device to adjust a privacy level of the electronic tag; and a home server to create new tag information in response to a request from the proxy device wherein the new tag information is used to adjust the privacy level.
    Type: Application
    Filed: February 20, 2008
    Publication date: April 23, 2009
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Jeong Hyun YI, Taekyoung Kwon, Eunah Kim, Tae Jin Park
  • Publication number: 20080262798
    Abstract: A method and system for performing a distributed verification with respect to measurement data in a sensor network. The method of performing the distributed verification with respect to measurement data in a sensor network includes: verifying, by an aggregator, the measurement data received from each of a plurality of sensors; generating, by the aggregator, verification request data by using the verified measurement data; transmitting the verification request data to a verifier; and verifying, by the verifier, the aggregator via a predetermined number of sensors of the plurality of sensors and the verification request data. The method of performing a distributed verification with respect to measurement data in a sensor network further includes transmitting, by the aggregator, an aggregation result with respect to the measurement data to a base station when the aggregator is verified; and verifying, by the base station, the aggregation result.
    Type: Application
    Filed: October 3, 2007
    Publication date: October 23, 2008
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Eun Ah KIM, Jeong Hyun Yi, Alexey Fomin, Alexandria Afanasyeva, Sergey Bezzateev
  • Publication number: 20080226066
    Abstract: A batch verification apparatus and method wherein, the method includes: generating a plurality of secret keys, a plurality of public keys corresponding to the plurality of secret keys, and a plurality of verification values corresponding to the plurality of public keys; calculating a first batch verification value based on the plurality of verification values; calculating a second batch verification value based on the plurality of secret keys and the plurality of verification values; comparing the first batch verification value and the second batch verification value; and determining that a batch of the received plurality of verification values is verified when the first batch verification value is equal to the second batch verification value.
    Type: Application
    Filed: August 3, 2007
    Publication date: September 18, 2008
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Jeong Hyun YI, Eunah Kim, Jung Hae Cheon
  • Publication number: 20080226083
    Abstract: A key calculation method and a shared key generation method, the key calculation method including: generating two keys to perform a key calculation; calculating a first value based on coefficients having an identical coefficient value among coefficients included in each of the two keys; and performing a coordinates operation or an exponentiation operation based on the first value, wherein the calculating of the first value is performed with respect to each of coefficient values included in the two keys, excluding 0.
    Type: Application
    Filed: August 8, 2007
    Publication date: September 18, 2008
    Applicant: Samsung Electronics Co., Ltd
    Inventors: Jeong Hyun YI, Jung Hee Cheon, Taekyoung Kwon, Mun-Kyu Lee, Enuah Kim
  • Publication number: 20080181413
    Abstract: A distributed Rivest Shamir Adleman (RSA) signature generation method in an ad-hoc network and a node of an ad-hoc network. The distributed RSA signature generation method in an ad-hoc network includes distributing key share information, which is generated using a maximum distance separable (MDS) code and a random symmetric matrix, to a plurality of nodes; generating, in a fewer number of nodes than the plurality of nodes, a partial signature using the distributed key share information; transmitting the partial signature to a signature generation node; and generating an RSA signature using the partial signature, in the signature generation node.
    Type: Application
    Filed: November 5, 2007
    Publication date: July 31, 2008
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Jeong Hyun YI, Eunah KIM, Alexandra AFANASEVA, Alexey FOMIN, Sergey BEZZATEEV
  • Publication number: 20080159535
    Abstract: A method of protecting a broadcast frame, the method comprising broadcasting a beacon and a maintenance beacon frame (MBF) from an access point (AP) to a plurality of terminals during a maintenance beacon waiting period (MBWP); and broadcasting broadcast management frames (BMFs) from the AP to the plurality of terminals during a broadcast management frame waiting period (BMFWP), wherein the MBF comprises a BMFs message integrity code (MIC) field including a BMFs MIC calculated from concatenated BMFs to be sent in a current beacon interval.
    Type: Application
    Filed: September 12, 2007
    Publication date: July 3, 2008
    Inventors: Eun Ah Kim, Jeong Hyun Yi, Tae-Chul Jung, Alexey Fomin, Evgeny Linsky, Mikhail Stepanov, Sergei Bezzateev
  • Publication number: 20080155265
    Abstract: A distributed Rivest Shamir Adleman (RSA) signature generation method in an ad-hoc network and a signature generation node are provided, including steps for distributing key information to a plurality of nodes using an RSA parameter and a maximum distance separable (MDS) code, in a dealer node, generating a partial signature using the key information and transmitting the generated partial signature to a signature generation node, in the plurality of nodes, and generating an RSA signature using the partial signature, in the signature generation node, wherein the RSA signature is generated using the partial signature, received from a fewer number of nodes than the entire plurality of nodes.
    Type: Application
    Filed: May 14, 2007
    Publication date: June 26, 2008
    Inventors: Jeong Hyun Yi, Tae-Chul Jung, Eun Ah Kim, Alexandra Afanasyeva, Alexey Fomin
  • Publication number: 20080144816
    Abstract: A public key generation method in Elliptic Curve Cryptography (ECC), and a public key generation system performing the method are provided. The public key generation method includes reducing a sequence length of the signed ternary ?-adic representation of the private key ‘k’ using properties of an elliptic curve, representing a reduced secret key ‘k’ in a signed ternary ?-adic representation; and computing a public key kP by multiplying the ?-adic representation of the private key ‘k’ whose sequence length is reduced on point P on the elliptic curve.
    Type: Application
    Filed: May 24, 2007
    Publication date: June 19, 2008
    Inventors: Jeong Hyun Yi, Sergey Bezzateev, Tae-Chul Jung, Eun Ah Kim, Mikhail Stepanov
  • Publication number: 20080130878
    Abstract: A method for generating, operating, and using a sparse w-NAF key for encryption is disclosed. The method for generating a key comprises generating a string of a number of coefficients, in which at most one coefficient, excluding 0, among a consecutive w number of coefficients, corresponds to a positive odd integer equal to or less than 2w (w being a natural number equal to or more than 2); and outputting the generated string as a key. Accordingly, an encryption is executed through an exponential operation or scalar multiplication using a sparse w-NAF key having the scarce coefficients, excluding 0, such that an encryption pace is improved.
    Type: Application
    Filed: August 13, 2007
    Publication date: June 5, 2008
    Inventors: Jeong-hyun Yi, Jung-hee Cheon, Tae-chul Jung, Tae-Kyoung Kwon, Hong-tae Kim, Mun-kyu Lee
  • Publication number: 20080072038
    Abstract: A key generation method for self-configuration is provided which includes selecting existing nodes as many as a predefined reference number t from nodes which configure a network; transmitting a partial key request message to the selected existing nodes; and generating a node key based on randomized partial keys received in response to the partial key request. Accordingly, when a new node intends to join the network, the existing nodes forming the network can allocate a node key to the new node by themselves. Also, whether the node key of the new node is compromised or not can be verified using the error-checking witness.
    Type: Application
    Filed: March 12, 2007
    Publication date: March 20, 2008
    Inventors: Jeong-hyun Yi, Tae-chul Jung