Patents by Inventor Ji-Hoon Cho

Ji-Hoon Cho has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12388624
    Abstract: An apparatus for sharing data according to one embodiment includes a first combined data generator configured to generate first combined data by combining target data to be shared and a random bit string, a data encryptor configured to generate a ciphertext for the first combined data, a key encryptor configured to generate one or more ciphertexts for a decryption key of the ciphertext for the first combined data using one or more public keys, a second combined data generator configured to generate second combined data by combining the ciphertext for the first combined data, the one or more ciphertexts for the decryption key, and the random bit string, and a data discloser configured to disclose the second combined data to one or more entities to share the target data to be shared.
    Type: Grant
    Filed: October 26, 2019
    Date of Patent: August 12, 2025
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Kyu-Young Choi, Hyo-Jin Yoon, Min-Kang Song, Seo-Yeon Park, Ji-Hoon Cho
  • Publication number: 20250229518
    Abstract: The present disclosure relates to a press bonding apparatus for an electrode foil of an all-solid-state secondary battery including an asymmetric rolling press element that may precisely adjust the supply speed and rolling speed while preventing damage to metal foils, thereby improving the uniformity and coating flatness of the electrode foil.
    Type: Application
    Filed: June 21, 2024
    Publication date: July 17, 2025
    Inventors: Ji Hoon CHO, Jong Ho Seok, Min Chul Kim
  • Publication number: 20250023916
    Abstract: There is provided a communication device. The communication device may comprise one or more processors; a communication interface; and a memory that stores a computer program executed by the one or more processors, wherein the computer program includes instructions for operations of: forming a general security channel according to a first transport layer security (TLS) protocol that does not support a post-quantum cryptography algorithm with another communication device; forming a communication channel of an application layer (L7) with another communication device through the general security channel; forming a quantum security channel by performing a handshake procedure according to a second TLS protocol that supports the post-quantum cryptography algorithm with another communication device through the communication channel; and communicating with another communication device through the quantum security channel.
    Type: Application
    Filed: May 30, 2024
    Publication date: January 16, 2025
    Applicant: Samsung SDS Co., Ltd.
    Inventors: Chang Hoon LEE, Hun Hee Yu, Eun Kyung Kim, Hyo Jin Yoon, Ji Hoon Cho
  • Publication number: 20240405981
    Abstract: The present disclosure according to at least one embodiment provides a method of processing operations of a polynomial-based security algorithm, the method being performed by a computing system. The method comprises identifying a plurality of operations using secret information in the polynomial-based security algorithm, generating a random index to be applied to the identified operations, and performing the operations using the random index.
    Type: Application
    Filed: May 9, 2024
    Publication date: December 5, 2024
    Applicants: SAMSUNG SDS CO., LTD., KOOKMIN UNIVERSITY INDUSTRY ACADEMY COOPERATION FOUNDATION
    Inventors: Sang Yub LEE, Jong Hyeok LEE, Jae Seung HAN, Jae Won HUH, Keon Hee CHOI, Dong Guk HAN, Ji Hoon KWON, Hyo Jin YOON, Ji Hoon CHO
  • Publication number: 20240333484
    Abstract: Provided are a method for analyzing quantum vulnerability and a system therefor. The method according to some embodiments may include configuring quantum-vulnerable algorithm detection rule based on a type of encryption algorithm, configuring an analysis level for analyzing a quantum vulnerability of target software, from among a plurality of predefined analysis levels, analyzing the target software based on the configured quantum-vulnerable algorithm detection rule, using an analysis technique corresponding to the configured analysis level, and assessing the quantum vulnerability of the target software based on a result of the analyzing.
    Type: Application
    Filed: October 24, 2023
    Publication date: October 3, 2024
    Applicant: SAMSUNG SDS CO., LTD.
    Inventors: Eun Kyung KIM, Chang Hoon LEE, Hyo Jin YOON, Ji Hoon CHO
  • Patent number: 12008443
    Abstract: A method for training an analysis model according to an embodiment includes receiving synthetic data for original data from a client apparatus, determining a hyperparameter value for analysis model training using the synthetic data, receiving a ciphertext for the original data from the client apparatus, and training the analysis model using the determined hyperparameter value and the received cipher text.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: June 11, 2024
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Eun Kyung Kim, Hyo Jin Yoon, Ji Hoon Cho, Min Jung Kim, Young Seon Lee
  • Patent number: 11979488
    Abstract: A method for generating a key stream according to an embodiment includes generating r round keys that are each N-dimensional integer vectors including elements of an integer set defined based on a prime number t, based on a random bit string, an encryption counter, and a secret key that is an N-dimensional integer vector consisting of elements of the integer set , generating a first round output vector x1 by performing a modular addition operation on an initial vector and a first round key RK1 of the r round keys with the prime number t as a modulus, and generating a key stream that is an N-dimensional integer vector consisting of elements of the integer set from the first round output vector x1 by using a second to r-th round keys of the r round keys, and one or more first round functions and a second round function.
    Type: Grant
    Filed: October 29, 2021
    Date of Patent: May 7, 2024
    Assignees: Samsung SDS Co., Ltd., Korea Advanced Institute of Science and Technology
    Inventors: Joo Hee Lee, Duk Jae Moon, Hyo Jin Yoon, Ji Hoon Cho, Seong Kwang Kim, Joo Young Lee, Jin Cheol Ha
  • Patent number: 11853419
    Abstract: A method for preventing side-channel attack according to an embodiment includes generating an order table which includes a position index value for each bit value of a bit string that is secret information to be generated through a decryption algorithm of an Nth Degree Truncated Polynomial Ring Units (NTRU) LPRime algorithm, shuffling a sort order of the position index value for the each bit value in the order table based on a random number, determining a generation order for the each bit value according to the sort order of the position index value for the each bit value in the order table, and generating the secret information through the decryption algorithm. The secret information is generated by generating the each bit value according to the determined generation order.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: December 26, 2023
    Assignees: SAMSUNG SDS CO., LTD., Kookmin University Industry Academy Cooperation Foundation
    Inventors: Ji Hoon Kwon, Joo Hee Lee, Hyo Jin Yoon, Ji Hoon Cho, Dong Guk Han, Bo Yeon Sim, Il Ju Kim, Tae Ho Lee, Jae Seung Han
  • Patent number: 11706032
    Abstract: A method for user authentication according to one embodiment of the present disclosure includes acquiring authentication information including biometric information of a user, generating a random string and a helper string from the biometric information, generating a secret value that corresponds to the authentication information, generating a private key and a public key using the secret value and the random string, and transmitting the public key to an authentication server.
    Type: Grant
    Filed: October 26, 2019
    Date of Patent: July 18, 2023
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Kyu-Young Choi, Hee-Jin Park, Ji-Hoon Cho
  • Patent number: 11558171
    Abstract: A method for encryption according to an embodiment includes generating a ciphertext for a secret key that is an integer vector by using an integer-based first homomorphic encryption algorithm, generating a key stream that is the integer vector from a nonce and the secret key by using a key stream generator, encoding the key stream by using a message encoding function of the first homomorphic encryption algorithm, encoding a message that is a real vector by using a message encoding function of a real number-based second homomorphic encryption algorithm, generating a ciphertext for the message by using a result of the encoding of the key stream and a result of the encoding of the message, and transmitting the nonce, the ciphertext for the secret key, and the ciphertext for the message to an apparatus for converting a ciphertext.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: January 17, 2023
    Assignees: SAMSUNG SDS CO., LTD., Korea Advanced Institute of Science and Technology
    Inventors: Joo Hee Lee, Duk Jae Moon, Hyo Jin Yoon, Ji Hoon Cho, Eun Kyung Kim, Seong Kwang Kim, Joo Young Lee, Jin Cheol Ha, Won Seok Choi
  • Patent number: 11509460
    Abstract: A method for performing a matrix multiplication operation being secure against side-channel attacks according to one embodiment, which is performed by a computing device comprising one or more processors and a memory storing one or more programs to be executed by the one or more processors, includes shuffling an order of execution of multiplication operations between elements of a first matrix and elements of a second matrix for a matrix multiplication operation between the first matrix and the second matrix; and performing the matrix multiplication operation based on the shuffled order of execution.
    Type: Grant
    Filed: October 26, 2019
    Date of Patent: November 22, 2022
    Assignees: SAMSUNG SDS CO.. LTD., Kookmin University Industry Academnv Cooperation Foundation
    Inventors: Kyu-Young Choi, Duk-Jae Moon, Ji-Hoon Cho, Dong Guk Han, Bo Yeon Sim, Jae Geun Moon, Ae Sun Park
  • Publication number: 20220368518
    Abstract: A method for generating a key stream according to an embodiment includes generating r round keys that are each N-dimensional integer vectors including elements of an integer set defined based on a prime number t, based on a random bit string, an encryption counter, and a secret key that is an N-dimensional integer vector consisting of elements of the integer set , generating a first round output vector x1 by performing a modular addition operation on an initial vector and a first round key RK1 of the r round keys with the prime number t as a modulus, and generating a key stream that is an N-dimensional integer vector consisting of elements of the integer set from the first round output vector x1 by using a second to r-th round keys of the r round keys, and one or more first round functions and a second round function.
    Type: Application
    Filed: October 29, 2021
    Publication date: November 17, 2022
    Inventors: Joo Hee Lee, Duk Jae Moon, Hyo Jin Yoon, Ji Hoon Cho, Seong Kwang Kim, Joo Young Lee, Jin Cheol Ha
  • Publication number: 20220129547
    Abstract: A method for preventing side-channel attack according to an embodiment includes generating an order table which includes a position index value for each bit value of a bit string that is secret information to be generated through a decryption algorithm of an Nth Degree Truncated Polynomial Ring Units (NTRU) LPRime algorithm, shuffling a sort order of the position index value for the each bit value in the order table based on a random number, determining a generation order for the each bit value according to the sort order of the position index value for the each bit value in the order table, and generating the secret information through the decryption algorithm. The secret information is generated by generating the each bit value according to the determined generation order.
    Type: Application
    Filed: February 1, 2021
    Publication date: April 28, 2022
    Inventors: Ji Hoon KWON, Joo Hee LEE, Hyo Jin YOON, Ji Hoon CHO, Dong Guk HAN, Bo Yeon SIM, Il Ju KIM, Tae Ho LEE, Jae Seung HAN
  • Publication number: 20220116199
    Abstract: An apparatus for generating synthetic data according to an embodiment includes a synthetic data generator configured to generate synthetic data corresponding to combined data obtained by combining original data held by each of a plurality of data providing apparatuses, and a synthetic data provider configured to provide the synthetic data to a data using apparatus.
    Type: Application
    Filed: October 13, 2021
    Publication date: April 14, 2022
    Inventors: Min Jung KIM, Ji Hoon CHO, Hyo Jin YOON, Young Hyun KIM, Kyoo Hyung HAN
  • Publication number: 20210326752
    Abstract: A method for training an analysis model according to an embodiment includes receiving synthetic data for original data from a client apparatus, determining a hyperparameter value for analysis model training using the synthetic data, receiving a ciphertext for the original data from the client apparatus, and training the analysis model using the determined hyperparameter value and the received cipher text.
    Type: Application
    Filed: October 27, 2020
    Publication date: October 21, 2021
    Inventors: Eun Kyung KIM, Hyo Jin YOON, Ji Hoon CHO, Min Jung KIM, Young Seon LEE
  • Publication number: 20210328765
    Abstract: A method for encryption according to an embodiment includes generating a ciphertext for a secret key that is an integer vector by using an integer-based first homomorphic encryption algorithm, generating a key stream that is the integer vector from a nonce and the secret key by using a key stream generator, encoding the key stream by using a message encoding function of the first homomorphic encryption algorithm, encoding a message that is a real vector by using a message encoding function of a real number-based second homomorphic encryption algorithm, generating a ciphertext for the message by using a result of the encoding of the key stream and a result of the encoding of the message, and transmitting the nonce, the ciphertext for the secret key, and the ciphertext for the message to an apparatus for converting a ciphertext.
    Type: Application
    Filed: October 27, 2020
    Publication date: October 21, 2021
    Inventors: Joo Hee LEE, Duk Jae MOON, Hyo Jin YOON, Ji Hoon CHO, Eun Kyung KIM, Seong Kwang KIM, Joo Young LEE, Jin Cheol HA, Won Seok CHOI
  • Patent number: 11102241
    Abstract: An apparatus and method for performing an operation which are secure against side-channel attack are provided. According to one embodiment of the present disclosure, the apparatus includes a first outputter configured to output a first output value corresponding to a seed value using a first parameter candidate value set, a second outputter configured to output a second output value using a second parameter candidate value set wherein the second output value corresponds to the seed value and is capable of being generated using the first output value, a third outputter configured to output a third output value using the seed value and the first output value, and a fourth outputter configured to output a fourth output value using the second output value and the third output value, wherein the fourth output value is capable of being generated using the seed value.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: August 24, 2021
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Kyu-Young Choi, Duk-Jae Moon, Hyo-Jin Yoon, Ji-Hoon Cho
  • Patent number: 11101994
    Abstract: A method of provisioning key information and a device using the method are provided. The method of provisioning key information according to one embodiment of the present disclosure includes generating key information for encryption and decryption from seed information using a key information generation algorithm and deleting code that corresponds to the key information generation algorithm from the device based on the generation of the key information.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: August 24, 2021
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Hyo-Jin Yoon, Kyu-Young Choi, Duk-Jae Moon, Ji-Hoon Cho
  • Patent number: 11042954
    Abstract: A system and method for communication between devices are provided. According to the embodiments of the present disclosure, it is possible to easily authenticate a counterpart device using a one-time key HN(T) for a D2D communication between a first device and a second device, without using a separate secure channel (e.g., secure sockets layer (SSL), transport layer security (TLS), or the like) in an environment where it is difficult to synchronize the first device with the second device without intervention of a server.
    Type: Grant
    Filed: May 1, 2018
    Date of Patent: June 22, 2021
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Hyo-Jin Yoon, Kyu-Young Choi, Duk-Jae Moon, Ki-Young Kim, Jang-Hyuk Ahn, Ji-Hoon Cho
  • Patent number: 11012424
    Abstract: An authentication system and method are provided. According to the embodiments of the present disclosure, it is possible to provide a secure authentication service capable of maintaining personal privacy by enabling authentication while preventing personal information used for personal authentication, such as biometric information, from being exposed in the authentication process.
    Type: Grant
    Filed: October 26, 2018
    Date of Patent: May 18, 2021
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Kyu-Young Choi, Ji-Hoon Cho, Hyo-Jin Yoon, Duk-Jae Moon