Patents by Inventor Ji-Hoon Cho
Ji-Hoon Cho has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12388624Abstract: An apparatus for sharing data according to one embodiment includes a first combined data generator configured to generate first combined data by combining target data to be shared and a random bit string, a data encryptor configured to generate a ciphertext for the first combined data, a key encryptor configured to generate one or more ciphertexts for a decryption key of the ciphertext for the first combined data using one or more public keys, a second combined data generator configured to generate second combined data by combining the ciphertext for the first combined data, the one or more ciphertexts for the decryption key, and the random bit string, and a data discloser configured to disclose the second combined data to one or more entities to share the target data to be shared.Type: GrantFiled: October 26, 2019Date of Patent: August 12, 2025Assignee: SAMSUNG SDS CO., LTD.Inventors: Kyu-Young Choi, Hyo-Jin Yoon, Min-Kang Song, Seo-Yeon Park, Ji-Hoon Cho
-
Publication number: 20250229518Abstract: The present disclosure relates to a press bonding apparatus for an electrode foil of an all-solid-state secondary battery including an asymmetric rolling press element that may precisely adjust the supply speed and rolling speed while preventing damage to metal foils, thereby improving the uniformity and coating flatness of the electrode foil.Type: ApplicationFiled: June 21, 2024Publication date: July 17, 2025Inventors: Ji Hoon CHO, Jong Ho Seok, Min Chul Kim
-
Publication number: 20250023916Abstract: There is provided a communication device. The communication device may comprise one or more processors; a communication interface; and a memory that stores a computer program executed by the one or more processors, wherein the computer program includes instructions for operations of: forming a general security channel according to a first transport layer security (TLS) protocol that does not support a post-quantum cryptography algorithm with another communication device; forming a communication channel of an application layer (L7) with another communication device through the general security channel; forming a quantum security channel by performing a handshake procedure according to a second TLS protocol that supports the post-quantum cryptography algorithm with another communication device through the communication channel; and communicating with another communication device through the quantum security channel.Type: ApplicationFiled: May 30, 2024Publication date: January 16, 2025Applicant: Samsung SDS Co., Ltd.Inventors: Chang Hoon LEE, Hun Hee Yu, Eun Kyung Kim, Hyo Jin Yoon, Ji Hoon Cho
-
Publication number: 20240405981Abstract: The present disclosure according to at least one embodiment provides a method of processing operations of a polynomial-based security algorithm, the method being performed by a computing system. The method comprises identifying a plurality of operations using secret information in the polynomial-based security algorithm, generating a random index to be applied to the identified operations, and performing the operations using the random index.Type: ApplicationFiled: May 9, 2024Publication date: December 5, 2024Applicants: SAMSUNG SDS CO., LTD., KOOKMIN UNIVERSITY INDUSTRY ACADEMY COOPERATION FOUNDATIONInventors: Sang Yub LEE, Jong Hyeok LEE, Jae Seung HAN, Jae Won HUH, Keon Hee CHOI, Dong Guk HAN, Ji Hoon KWON, Hyo Jin YOON, Ji Hoon CHO
-
Publication number: 20240333484Abstract: Provided are a method for analyzing quantum vulnerability and a system therefor. The method according to some embodiments may include configuring quantum-vulnerable algorithm detection rule based on a type of encryption algorithm, configuring an analysis level for analyzing a quantum vulnerability of target software, from among a plurality of predefined analysis levels, analyzing the target software based on the configured quantum-vulnerable algorithm detection rule, using an analysis technique corresponding to the configured analysis level, and assessing the quantum vulnerability of the target software based on a result of the analyzing.Type: ApplicationFiled: October 24, 2023Publication date: October 3, 2024Applicant: SAMSUNG SDS CO., LTD.Inventors: Eun Kyung KIM, Chang Hoon LEE, Hyo Jin YOON, Ji Hoon CHO
-
Patent number: 12008443Abstract: A method for training an analysis model according to an embodiment includes receiving synthetic data for original data from a client apparatus, determining a hyperparameter value for analysis model training using the synthetic data, receiving a ciphertext for the original data from the client apparatus, and training the analysis model using the determined hyperparameter value and the received cipher text.Type: GrantFiled: October 27, 2020Date of Patent: June 11, 2024Assignee: SAMSUNG SDS CO., LTD.Inventors: Eun Kyung Kim, Hyo Jin Yoon, Ji Hoon Cho, Min Jung Kim, Young Seon Lee
-
Patent number: 11979488Abstract: A method for generating a key stream according to an embodiment includes generating r round keys that are each N-dimensional integer vectors including elements of an integer set defined based on a prime number t, based on a random bit string, an encryption counter, and a secret key that is an N-dimensional integer vector consisting of elements of the integer set , generating a first round output vector x1 by performing a modular addition operation on an initial vector and a first round key RK1 of the r round keys with the prime number t as a modulus, and generating a key stream that is an N-dimensional integer vector consisting of elements of the integer set from the first round output vector x1 by using a second to r-th round keys of the r round keys, and one or more first round functions and a second round function.Type: GrantFiled: October 29, 2021Date of Patent: May 7, 2024Assignees: Samsung SDS Co., Ltd., Korea Advanced Institute of Science and TechnologyInventors: Joo Hee Lee, Duk Jae Moon, Hyo Jin Yoon, Ji Hoon Cho, Seong Kwang Kim, Joo Young Lee, Jin Cheol Ha
-
Patent number: 11853419Abstract: A method for preventing side-channel attack according to an embodiment includes generating an order table which includes a position index value for each bit value of a bit string that is secret information to be generated through a decryption algorithm of an Nth Degree Truncated Polynomial Ring Units (NTRU) LPRime algorithm, shuffling a sort order of the position index value for the each bit value in the order table based on a random number, determining a generation order for the each bit value according to the sort order of the position index value for the each bit value in the order table, and generating the secret information through the decryption algorithm. The secret information is generated by generating the each bit value according to the determined generation order.Type: GrantFiled: February 1, 2021Date of Patent: December 26, 2023Assignees: SAMSUNG SDS CO., LTD., Kookmin University Industry Academy Cooperation FoundationInventors: Ji Hoon Kwon, Joo Hee Lee, Hyo Jin Yoon, Ji Hoon Cho, Dong Guk Han, Bo Yeon Sim, Il Ju Kim, Tae Ho Lee, Jae Seung Han
-
Patent number: 11706032Abstract: A method for user authentication according to one embodiment of the present disclosure includes acquiring authentication information including biometric information of a user, generating a random string and a helper string from the biometric information, generating a secret value that corresponds to the authentication information, generating a private key and a public key using the secret value and the random string, and transmitting the public key to an authentication server.Type: GrantFiled: October 26, 2019Date of Patent: July 18, 2023Assignee: SAMSUNG SDS CO., LTD.Inventors: Kyu-Young Choi, Hee-Jin Park, Ji-Hoon Cho
-
Patent number: 11558171Abstract: A method for encryption according to an embodiment includes generating a ciphertext for a secret key that is an integer vector by using an integer-based first homomorphic encryption algorithm, generating a key stream that is the integer vector from a nonce and the secret key by using a key stream generator, encoding the key stream by using a message encoding function of the first homomorphic encryption algorithm, encoding a message that is a real vector by using a message encoding function of a real number-based second homomorphic encryption algorithm, generating a ciphertext for the message by using a result of the encoding of the key stream and a result of the encoding of the message, and transmitting the nonce, the ciphertext for the secret key, and the ciphertext for the message to an apparatus for converting a ciphertext.Type: GrantFiled: October 27, 2020Date of Patent: January 17, 2023Assignees: SAMSUNG SDS CO., LTD., Korea Advanced Institute of Science and TechnologyInventors: Joo Hee Lee, Duk Jae Moon, Hyo Jin Yoon, Ji Hoon Cho, Eun Kyung Kim, Seong Kwang Kim, Joo Young Lee, Jin Cheol Ha, Won Seok Choi
-
Patent number: 11509460Abstract: A method for performing a matrix multiplication operation being secure against side-channel attacks according to one embodiment, which is performed by a computing device comprising one or more processors and a memory storing one or more programs to be executed by the one or more processors, includes shuffling an order of execution of multiplication operations between elements of a first matrix and elements of a second matrix for a matrix multiplication operation between the first matrix and the second matrix; and performing the matrix multiplication operation based on the shuffled order of execution.Type: GrantFiled: October 26, 2019Date of Patent: November 22, 2022Assignees: SAMSUNG SDS CO.. LTD., Kookmin University Industry Academnv Cooperation FoundationInventors: Kyu-Young Choi, Duk-Jae Moon, Ji-Hoon Cho, Dong Guk Han, Bo Yeon Sim, Jae Geun Moon, Ae Sun Park
-
Publication number: 20220368518Abstract: A method for generating a key stream according to an embodiment includes generating r round keys that are each N-dimensional integer vectors including elements of an integer set defined based on a prime number t, based on a random bit string, an encryption counter, and a secret key that is an N-dimensional integer vector consisting of elements of the integer set , generating a first round output vector x1 by performing a modular addition operation on an initial vector and a first round key RK1 of the r round keys with the prime number t as a modulus, and generating a key stream that is an N-dimensional integer vector consisting of elements of the integer set from the first round output vector x1 by using a second to r-th round keys of the r round keys, and one or more first round functions and a second round function.Type: ApplicationFiled: October 29, 2021Publication date: November 17, 2022Inventors: Joo Hee Lee, Duk Jae Moon, Hyo Jin Yoon, Ji Hoon Cho, Seong Kwang Kim, Joo Young Lee, Jin Cheol Ha
-
Publication number: 20220129547Abstract: A method for preventing side-channel attack according to an embodiment includes generating an order table which includes a position index value for each bit value of a bit string that is secret information to be generated through a decryption algorithm of an Nth Degree Truncated Polynomial Ring Units (NTRU) LPRime algorithm, shuffling a sort order of the position index value for the each bit value in the order table based on a random number, determining a generation order for the each bit value according to the sort order of the position index value for the each bit value in the order table, and generating the secret information through the decryption algorithm. The secret information is generated by generating the each bit value according to the determined generation order.Type: ApplicationFiled: February 1, 2021Publication date: April 28, 2022Inventors: Ji Hoon KWON, Joo Hee LEE, Hyo Jin YOON, Ji Hoon CHO, Dong Guk HAN, Bo Yeon SIM, Il Ju KIM, Tae Ho LEE, Jae Seung HAN
-
Publication number: 20220116199Abstract: An apparatus for generating synthetic data according to an embodiment includes a synthetic data generator configured to generate synthetic data corresponding to combined data obtained by combining original data held by each of a plurality of data providing apparatuses, and a synthetic data provider configured to provide the synthetic data to a data using apparatus.Type: ApplicationFiled: October 13, 2021Publication date: April 14, 2022Inventors: Min Jung KIM, Ji Hoon CHO, Hyo Jin YOON, Young Hyun KIM, Kyoo Hyung HAN
-
Publication number: 20210326752Abstract: A method for training an analysis model according to an embodiment includes receiving synthetic data for original data from a client apparatus, determining a hyperparameter value for analysis model training using the synthetic data, receiving a ciphertext for the original data from the client apparatus, and training the analysis model using the determined hyperparameter value and the received cipher text.Type: ApplicationFiled: October 27, 2020Publication date: October 21, 2021Inventors: Eun Kyung KIM, Hyo Jin YOON, Ji Hoon CHO, Min Jung KIM, Young Seon LEE
-
Publication number: 20210328765Abstract: A method for encryption according to an embodiment includes generating a ciphertext for a secret key that is an integer vector by using an integer-based first homomorphic encryption algorithm, generating a key stream that is the integer vector from a nonce and the secret key by using a key stream generator, encoding the key stream by using a message encoding function of the first homomorphic encryption algorithm, encoding a message that is a real vector by using a message encoding function of a real number-based second homomorphic encryption algorithm, generating a ciphertext for the message by using a result of the encoding of the key stream and a result of the encoding of the message, and transmitting the nonce, the ciphertext for the secret key, and the ciphertext for the message to an apparatus for converting a ciphertext.Type: ApplicationFiled: October 27, 2020Publication date: October 21, 2021Inventors: Joo Hee LEE, Duk Jae MOON, Hyo Jin YOON, Ji Hoon CHO, Eun Kyung KIM, Seong Kwang KIM, Joo Young LEE, Jin Cheol HA, Won Seok CHOI
-
Patent number: 11102241Abstract: An apparatus and method for performing an operation which are secure against side-channel attack are provided. According to one embodiment of the present disclosure, the apparatus includes a first outputter configured to output a first output value corresponding to a seed value using a first parameter candidate value set, a second outputter configured to output a second output value using a second parameter candidate value set wherein the second output value corresponds to the seed value and is capable of being generated using the first output value, a third outputter configured to output a third output value using the seed value and the first output value, and a fourth outputter configured to output a fourth output value using the second output value and the third output value, wherein the fourth output value is capable of being generated using the seed value.Type: GrantFiled: October 15, 2018Date of Patent: August 24, 2021Assignee: SAMSUNG SDS CO., LTD.Inventors: Kyu-Young Choi, Duk-Jae Moon, Hyo-Jin Yoon, Ji-Hoon Cho
-
Patent number: 11101994Abstract: A method of provisioning key information and a device using the method are provided. The method of provisioning key information according to one embodiment of the present disclosure includes generating key information for encryption and decryption from seed information using a key information generation algorithm and deleting code that corresponds to the key information generation algorithm from the device based on the generation of the key information.Type: GrantFiled: August 30, 2018Date of Patent: August 24, 2021Assignee: SAMSUNG SDS CO., LTD.Inventors: Hyo-Jin Yoon, Kyu-Young Choi, Duk-Jae Moon, Ji-Hoon Cho
-
Patent number: 11042954Abstract: A system and method for communication between devices are provided. According to the embodiments of the present disclosure, it is possible to easily authenticate a counterpart device using a one-time key HN(T) for a D2D communication between a first device and a second device, without using a separate secure channel (e.g., secure sockets layer (SSL), transport layer security (TLS), or the like) in an environment where it is difficult to synchronize the first device with the second device without intervention of a server.Type: GrantFiled: May 1, 2018Date of Patent: June 22, 2021Assignee: SAMSUNG SDS CO., LTD.Inventors: Hyo-Jin Yoon, Kyu-Young Choi, Duk-Jae Moon, Ki-Young Kim, Jang-Hyuk Ahn, Ji-Hoon Cho
-
Patent number: 11012424Abstract: An authentication system and method are provided. According to the embodiments of the present disclosure, it is possible to provide a secure authentication service capable of maintaining personal privacy by enabling authentication while preventing personal information used for personal authentication, such as biometric information, from being exposed in the authentication process.Type: GrantFiled: October 26, 2018Date of Patent: May 18, 2021Assignee: SAMSUNG SDS CO., LTD.Inventors: Kyu-Young Choi, Ji-Hoon Cho, Hyo-Jin Yoon, Duk-Jae Moon