Patents by Inventor Jeong Nyeo Kim
Jeong Nyeo Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130054974Abstract: A source authentication method and apparatus according to the present invention are disclosed. The source authentication method is performed with respect to a transmission packet on a message transmission side, and includes generating a first hash value to which a first hash function is applied using a message to be included in a next packet and a key value, and generating the transmission packet including the first hash value, wherein the key value is one of at least one key value generated in advance by applying a second hash function. Meanwhile, according to the present invention, effective low-cost multicast authentication may be performed by reducing a variety of loads such as buffer management, key calculation costs, and the like.Type: ApplicationFiled: August 23, 2012Publication date: February 28, 2013Applicant: Electronics and Telecommunications Research InstituteInventors: Bo Heung Chung, Jeong Nyeo Kim
-
Patent number: 8234698Abstract: An anonymous authentication-based private information management (PIM) system and method are provided. The PIM method includes receiving an anonymous certificate not including user information from an anonymous certification authority; generating an anonymous document including the anonymous certificate and some of the user information; and providing the anonymous document to a web service provider so as to be authenticated and thus provided with a web service by the web service provider. Thus, only a minimum of user information may be provided to the web service provider. In addition, it is possible to strengthen a user's right to self-determination and control over the exposure and use of his or her personal information by allowing a user to manage his or her own personal information or entrusting the PIM server to manage user information. Moreover, it is possible to protect the privacy of a user by preventing the exposure of user information.Type: GrantFiled: May 14, 2009Date of Patent: July 31, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Yun Kyung Lee, Seung Wan Han, Sok Joon Lee, Byung Ho Chung, Jeong Nyeo Kim
-
Publication number: 20120163585Abstract: A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values.Type: ApplicationFiled: December 21, 2011Publication date: June 28, 2012Applicant: Electronics and Telecommunications Research InstittuteInventors: Yong-Je CHOI, Doo Ho Choi, Taesung Kim, Kyunghee Oh, You Sung Kang, Ju Han Kim, Jeong Nyeo Kim, Hyun sook Cho
-
Publication number: 20120117090Abstract: Disclosed are a system and method for managing digital contents. An exemplary embodiment according to the present invention provides to a system for managing digital contents, including a learning module extracting feature vectors of input digital contents and performing column subspace mapping on the feature vectors to calculate a column subspace projection matrix; an index module using the matrix to perform an index work on the digital contents and then, storing the matrix and the digital contents; and a search module performing the column subspace mapping on the feature vectors of query data when the query data for searching the digital contents are input and searching the digital contents indexed by the matrix having high similarity to the mapped feature vectors of the query data.Type: ApplicationFiled: November 1, 2011Publication date: May 10, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Han Sung Lee, Yun Su Chung, So Hee Park, Yong Jin Lee, Jeong Nyeo Kim, Hyun Sook Cho
-
Publication number: 20120032781Abstract: Disclosed herein is a remote personal authentication system and method using biometrics. The remote personal authentication method using biometrics includes receiving a biometric information of a user remotely detected by a biometric information collection device; decrypting, in a hardware security module (HSM) of the user, the received biometric information and biometric information stored in the HSM; and performing personal authentication for the user by comparing the decrypted biometric information with each other in the HSM.Type: ApplicationFiled: August 4, 2011Publication date: February 9, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Dae-Sung MOON, Jang-Hee YOO, Byung-Jun KANG, Yun-Su CHUNG, Jeong-Nyeo KIM
-
Publication number: 20110302130Abstract: Provided is an intelligent video information retrieval apparatus capable of multi-dimensional video indexing and retrieval. The intelligent video information retrieval apparatus includes an event detector configured to detect pieces of event information from footage collected by a plurality of video capture devices, a data mart builder configured to generate a data cube using the detected pieces of event information, and capture time and capture location information related to the pieces of event information, and store and manage the generated data cube, and a video retriever configured to receive an event retrieval condition from a user to retrieve event information corresponding to the received event retrieval condition using the data cube, and output the retrieval result to the user.Type: ApplicationFiled: June 2, 2011Publication date: December 8, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Han-Sung LEE, Yun-Su Chung, Jeong-Nyeo Kim, Ki-Young Moon, So-Hee Park, Yong-Jin Lee
-
Publication number: 20110055556Abstract: Provided is a method for providing an anonymous public key infrastructure (PKI) in a user terminal. The method includes receiving a real-name certificate from a real-name PKI service domain, requesting an anonymous certificate to an anonymous PKI service domain, and receiving the anonymous certificate from the anonymous PKI service domain. Accordingly, the method can ensure anonymity when a user uses a service by providing the anonymous certificate in association with the PKI-based real-name certificate.Type: ApplicationFiled: July 11, 2008Publication date: March 3, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Byeong Cheol Choi, So Hee Park, Jeong Nyeo Kim
-
Publication number: 20100161970Abstract: A user terminal and a method of managing user information are provided. The method includes issuing a request for issuance of a certificate for a user to a certification authority; generating a document including at least part of user information using a certificate issued by the certification authority; and issuing a subscription request to a desired web service provider by providing the document including the at least part of the user information to the desired web service provider. Therefore, it is possible to strengthen the user's right to self-determination and control over the exposure and use of his or her personal information. In addition, it is possible to improve the reliability of user information provided to each website by the user.Type: ApplicationFiled: October 20, 2009Publication date: June 24, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Yun Kyung LEE, Byung Ho CHUNG, Jeong Nyeo KIM, Seung Wan HAN, Sok Joon LEE
-
Publication number: 20100146603Abstract: An anonymous authentication-based private information management (PIM) system and method are provided. The PIM method includes receiving an anonymous certificate not including user information from an anonymous certification authority; generating an anonymous document including the anonymous certificate and some of the user information; and providing the anonymous document to a web service provider so as to be authenticated and thus provided with a web service by the web service provider. Thus, only a minimum of user information may be provided to the web service provider. In addition, it is possible to strengthen a user's right to self-determination and control over the exposure and use of his or her personal information by allowing a user to manage his or her own personal information or entrusting the PIM server to manage user information. Moreover, it is possible to protect the privacy of a user by preventing the exposure of user information.Type: ApplicationFiled: May 14, 2009Publication date: June 10, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Yun Kyung LEE, Seung Wan HAN, Sok Joon LEE, Byung Ho CHUNG, Jeong Nyeo KIM
-
Publication number: 20100138929Abstract: Conditionally traceable anonymous service system is provided. The system respectively separates subject conforming real name, subject conforming anonymity, subject requesting verification for an anonymity certification means, so that privacy of a user is hardly violated, the present invention can acquire real name information for the user only when a trace for a user is surely requested.Type: ApplicationFiled: November 19, 2009Publication date: June 3, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Seung Wan HAN, Sok Joon LEE, Yun Kyung LEE, Sin Hyo KIM, Jeong Nyeo KIM
-
Publication number: 20100122080Abstract: The present invention can't independently know real name information of a user unless a server of an authority treating real name certificate and a server of an authority treating pseudonym certificate collaborate mutually, so that privacy of a user isn't infringed. The present invention can acquire real name information of a user with collaboration of real name certification sever and pseudonym certification sever only if you need real name information for a user.Type: ApplicationFiled: November 9, 2009Publication date: May 13, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Sok Joon LEE, Seung Wan HAN, Yun Kyung LEE, Byung Ho CHUNG, Jeong Nyeo KIM
-
Publication number: 20100077167Abstract: A data storage device having a smart card based copy protection function is provided. The data storage device encodes data using the temper resistant key of the smart card as the encoding seed, stores the encoded data, and transmits the encoded data to other device. Therefore, it is impossible to modulate or to make the illegal copy of stored or transmitted data, and the reliability of the storage device can be improved.Type: ApplicationFiled: October 9, 2007Publication date: March 25, 2010Inventors: Byeong Cheol Choi, Seung Wan Han, Byung Ho Chung, Jeong Nyeo Kim
-
Publication number: 20100074440Abstract: There is provided a high-speed pipelined ARIA encryption apparatus. The high-speed pipelined ARIA encryption apparatus includes a round key generator for generating a plurality of round keys required for performing an encryption operation using a master key formed to have uniform bits, a plurality of round units whose number is in proportion to the number of times of round operations corresponding to the number of bit of an input value to receive the round keys and the input value and to perform the round operations, and a plurality of pipelined register provided between the round units to transmit the output value of a previous round unit as the input value of the next round unit. A plurality of round units are provided and pipelined registers are inserted between the round units so that it is possible to improve the performance of processing a large amount of data and to perform ARIA encryption at high speed.Type: ApplicationFiled: July 24, 2009Publication date: March 25, 2010Applicant: Electronics Telecommunications Research InstituteInventors: Sang Woo LEE, Byung Ho Chung, Jeong Nyeo Kim
-
Publication number: 20100077477Abstract: The present invention relates to a system for automatically managing integrity reference information and a method of managing the same. The system includes one or more systems, a system management server, and an integrity management server. The systems are connected over a network and communication with each other. Each of the systems has an integrity measurement program to generate integrity information. The system management server has registration information about each of the systems connected over the network and registration information about a program distributed to each of the systems. Further, the system management server controls network access by each of the systems.Type: ApplicationFiled: April 16, 2009Publication date: March 25, 2010Inventors: Jae Deok LIM, Byeong Cheol CHOI, So Hee PARK, Jeong Nyeo KIM
-
Patent number: 7664950Abstract: A method for dynamically changing an intrusion detection rule in a kernel level intrusion detection system is disclosed. The method includes the steps of: a) generating a replica of the intrusion detection rule in a kernel area; b) changing the replica of the intrusion detection rule according to a request of changing the intrusion detection rule from the kernel area; and c) changing a currently applied intrusion detection rule by exchanging a value of a pointer representing the intrusion detection rule with a value of a pointer representing the changed replica of the intrusion detection rule.Type: GrantFiled: December 29, 2003Date of Patent: February 16, 2010Assignee: Electronics and Telecommunications Research InstituteInventors: Bo-Heung Chung, Seungho Ryu, Jeong-Nyeo Kim, Sung-Won Sohn, Chee-Hang Park
-
Publication number: 20100036781Abstract: Provided are an apparatus and method for detecting illegal motion picture data. The apparatus includes a key frame extractor for extracting a plurality of key frames from motion picture data, a characteristic value file generator for detecting characteristic values of the extracted key frames and generating a characteristic value file, and an illegality determiner for measuring degree of similarity between a previously stored learning model file and the characteristic value file and determining whether or not the motion picture data is legal according to the degree of similarity.Type: ApplicationFiled: May 14, 2009Publication date: February 11, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Byeong Cheol CHOI, Seung Wan HAN, Chi Yoon JEONG, Jae Deok LIM, So Hee PARK, Jeong Nyeo KIM
-
Patent number: 7571309Abstract: Provided are a method and apparatus for providing a security mechanism guaranteeing transparency at a transport layer. The method includes: receiving a data packet from an application program, and searching key information corresponding to the data packet in key information database; determining whether to request a key exchange module of an application layer for a new key negotiation according to a result obtained by searching key information; and performing encrypting/decrypting based on key information when the key exchange module stores key negotiation information obtained by the new key negotiation in a kernel. The apparatus encrypts/decrypts the data packet at the transport layer of the kernel, thereby providing the application program with security transparency, effectively controlling and making it easily expansible.Type: GrantFiled: April 12, 2005Date of Patent: August 4, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Geon Woo Kim, Sun Hee Lim, Sang Su Lee, Ki Hyun Kim, Jeong Nyeo Kim, Jong Soo Jang
-
Publication number: 20090119763Abstract: Provided is a method and system for providing an SSO service enabling the use of Web services in different trusted domains through a one-time authentication process. In the method, mutual authentication information is issued from a trusted third party to each of ID-federation service providers managing each of trusted domains, and an ID federation established between the ID-federation service provider and a user in the trusted domain of the ID-federation service provider. The first ID-federation service provider managing the first trusted domain, to which the user belongs to, is confirmed when a Web service provider in the second trusted domain receives a login request from the user in the first trusted domain. User authentication and mutual authentication arc performed between the first ID-federation service provider and a second ID-federation service provider managing the second trusted domain.Type: ApplicationFiled: July 30, 2008Publication date: May 7, 2009Inventors: So-Hee PARK, Byeong-Cheol CHOI, Jae-Deok LIM, Jeong-Nyeo KIM
-
Patent number: 7290279Abstract: Disclosed is an access control method using a token having security attributes in a computer system when a user gains access to a specific file. The computer system adopts a token having encryption, modification, execution, and provision attributes to determine access permission or access denial between a user and a file in such a way that a file access request is controlled. The access control method enciphers a file and stores the enciphered file in a storage unit, so that it can maintain security of the file even though the storage unit is stolen. The access control method enables a system manager to read only enciphered contents of the file when the system manager performs a data backup operation, thereby eliminating limitations in commonly operating a system simultaneously with maintaining file security.Type: GrantFiled: October 25, 2002Date of Patent: October 30, 2007Assignee: Electronics and Telecommunications Research InstituteInventors: Sung Kyong Eun, Jeong Nyeo Kim, Jong Gook Ko, So Young Doo, Joon Suk Yu, Jae Deok Lim
-
Patent number: 7158024Abstract: A packet intrusion detection rule simplification apparatus and method and an intrusion detection apparatus and method are provided. Test conditions of at least one intrusion detection rules are rearranged based on test items, and the same test conditions for the same test items are grouped. Group rules having a connection structure of the test conditions are generated so that the test items and orders of the intrusion detection rules are satisfied. A common rule consisting of test conditions existing at the test start positions in the connection structure of the group rules is generated. Next, packet intrusion detection is performed by using the common rule, and the packet intrusion detection is performed by using the group rules. According, it is possible to reduce a load involved in the intrusion detection process by using the grouped and simplified intrusion detection rules.Type: GrantFiled: December 3, 2004Date of Patent: January 2, 2007Assignee: Electronics and Telecommunications Research InstituteInventors: Bo Heung Chung, Seungho Ryu, Jeong Nyeo Kim, Jong Soo Jang