Patents by Inventor Jintae Oh
Jintae Oh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230188359Abstract: Disclosed herein are an apparatus and method for distributed consensus in an environment in which a fraction of Byzantine nodes is dynamically changed. The distributed consensus apparatus in a dynamic Byzantine fraction environment includes one or more processor and executable memory for storing at least one program executed by the one or more processors. The at least one program is configured to calculate a stochastic variable for the probability that a preset fraction of Byzantine nodes is changed using the probability that at least one of consensus candidate nodes corresponding to a preset consensus quorum is changed to a Byzantine node and to perform distributed consensus using the stochastic variable in the dynamic Byzantine fraction environment.Type: ApplicationFiled: November 7, 2022Publication date: June 15, 2023Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Changhyun LEE, Jintae OH
-
Publication number: 20220222655Abstract: A block consensus method of a computing device is provided. The computing device receives a delegate request message including transaction hashes from each of a plurality of nodes, generates a prepared block including transaction hashes based on the delegate request message, and transmits a prepare message including the prepared block to the nodes. The computing device receives a commit message including a proof of consensus on a validity of the prepared block from the nodes, and transmits a reply message including a final block decided based on the commit message.Type: ApplicationFiled: December 30, 2021Publication date: July 14, 2022Inventors: Heesang JIN, Jintae OH, Ki Young KIM, Young-Chang KIM
-
Publication number: 20220027970Abstract: An agreement method of a block in a blockchain network by a chair node includes: receiving, from a plurality of congress nodes in a congress, information on an exceptional situation which occurred during agreement processes of a block; transmitting an empty block agreement start message including information on the exceptional situation and verification data for the exceptional situation to the plurality of congress nodes; generating a candidate empty block which does not include a transaction when receiving a delegate request message from at least two congress nodes among the plurality of congress nodes and transmitting the candidate empty block to committee nodes; and generating a final empty block when the candidate empty block is verified by the committee nodes and transmitting the final empty block to all nodes in the blockchain network is provided.Type: ApplicationFiled: November 27, 2020Publication date: January 27, 2022Inventors: Young-Chang KIM, Ki Young KIM, Jintae OH
-
Patent number: 8543807Abstract: A method and apparatus for protecting an application layer in a computer network system. The method includes creating a session between a client and a data provider in response to a session connection request from the client, and determining the client as an application layer attacking client when the client generates a session termination request before the data provider transmits to the client a response packet to a data request from the client under the created session.Type: GrantFiled: December 21, 2009Date of Patent: September 24, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Jintae Oh, YouRi Lee, Yang-Seo Choi, Jong Soo Jang
-
Publication number: 20120167222Abstract: An apparatus for diagnosing malicious files includes a information transferring unit configured to receive information regarding a malicious file distributed in a management network and an execution file generated by assembling packets collected from the management network; an anti-virus engine configured to determine whether or not the execution file is malicious to generate information regarding a new malicious file; and a management unit configured to transfer the information regarding the malicious file and the information regarding the new malicious file to a terminal device on the management network through the information transferring unit.Type: ApplicationFiled: December 22, 2011Publication date: June 28, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Ik Kyun KIM, Yang-Seo CHOI, Byoung-Koo KIM, Seung Yong YOON, Youngjun HEO, Dae Won KIM, Il AHN CHEONG, Jintae OH, Jong Soo JANG
-
Publication number: 20110016523Abstract: An apparatus for detecting a distributed denial of service (DDoS) attack includes: a monitoring unit for monitoring multiple GET requests and responses transmitted and received depending on a session establishment between a client and a server; and an attack detection unit for analyzing the monitored multiple GET requests and responses between the client and the server to detect a traffic of the DDoS attack against the server.Type: ApplicationFiled: December 8, 2009Publication date: January 20, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Jintae Oh, YouRi Lee, Yang-Seo Choi, Jong Soo Jang
-
Publication number: 20110016526Abstract: A method and apparatus for protecting an application layer in a computer network system. The method includes creating a session between a client and a data provider in response to a session connection request from the client, and determining the client as an application layer attacking client when the client generates a session termination request before the data provider transmits to the client a response packet to a data request from the client under the created session.Type: ApplicationFiled: December 21, 2009Publication date: January 20, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Jintae OH, YouRi LEE, Yang-Seo CHOI, Jong Soo JANG
-
Patent number: 7617231Abstract: A data hashing method, a data processing method, and a data processing system using a similarity-based hashing (SBH) algorithm in which the same hash value is calculated for the same data and the more similar data, the smaller difference in the generated hash values. The data hashing method includes receiving computerized data, and generating a hash value of the computerized data using the SBH algorithm in which two data are the same if calculated hash values are the same and two data are similar if the difference of calculated hash values is small, wherein a search, comparison, and classification of data may be quickly processed within a time complexity of O(1) or O(n) since the similarity/closeness of data content are quantified by component values for each of the respective corresponding generated hash values.Type: GrantFiled: December 6, 2006Date of Patent: November 10, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Hwa Shin Moon, Sungwon Yi, Jintae Oh, Jong Soo Jang, Changhoon Kim
-
Patent number: 7571477Abstract: In a real-time network attack pattern detection system and method, a common pattern is detected in real time from packets, which are suspected to be a network attack such as Worm, to effectively block the attack. The system includes: a suspicious packet detector for classifying a suspicious attack packet from all input packets; a first data delaying unit for receiving the input packet from the suspicious packet detector to output an one-clock delayed data; a second data delaying unit for receiving an output signal from the first data delaying unit to output an one-clock delayed data; a hash key generator for receiving an output data of the suspicious packet detector, an output data of the first data delaying unit and an output data of the second data delaying unit to generate a hash key; a hash table for storing a lookup result obtained by the hash key generated from the hash key generator; and an existence & hit checker for checking the lookup result of the hash table.Type: GrantFiled: March 24, 2005Date of Patent: August 4, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Jintae Oh, Seung Won Shin, Ki Young Kim, Jong Soo Jang, Sung Won Sohn
-
Patent number: 7565693Abstract: The present invention relates to a network intrusion detection and prevention system. The system includes: a signature based detecting device; an anomaly behavior based detecting device; and a new signature creating and verifying device disposed between the signature based detecting device and the anomaly behavior based detecting device, wherein if the anomaly behavior based detecting device detects network-attack-suspicious packets, the new signature creating and verifying device collects and searches the detected suspicious packets for common information, and then creates a new signature on the basis of the searched common information and at the same time, verifies whether or not the created new signature is applicable to the signature based detecting device, and then registers the created new signature to the signature based detecting device if it is determined that the created new signature is applicable.Type: GrantFiled: December 29, 2004Date of Patent: July 21, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Seung Won Shin, Jintae Oh, Ki Young Kim, Jong Soo Jang, Sung Won Sohn
-
Patent number: 7464089Abstract: A trap matrix searches the entire contents of a data stream for a pattern that matches the pattern for a search term. In those circumstances where there is a match between patterns of the data stream and the search term, the method and system can proceed to an exact match operation. In particular, a pointer matrix and a corresponding active control matrix are generated according to a set of terms in a rule table. Data is sequenced the trap matrix according to the hierarchy of its trap elements. The trap elements perform a pattern match check between the sequenced data stream and any search term in the set of terms in the rule table. Results from a positive pattern match are preferably communicated from the matching trap element to an exact match lookup.Type: GrantFiled: August 19, 2005Date of Patent: December 9, 2008Assignee: Connect Technologies CorporationInventors: Jintae Oh, Ilsup Kim, Hojae Lee
-
Patent number: 7433357Abstract: An apparatus and method for performing packet header lookup based on sequential lookup is provided. A header analyzer separates a header from a packet received via a network and outputs a lookup sequence. A unit lookup unit looks up matching the header combination rules with each field to be analyzed and input from the header analyzer based on the lookup sequence input from the header analyzer and outputs a match signal and a match address. A rule combination memory stores identification information for the header combination rules. A sequence combination memory stores lookup sequence information and sequence combination information. A rule combination unit generates match results based on the match signal input from the unit lookup unit and data read from the rule combination memory and the sequence combination memory.Type: GrantFiled: November 19, 2004Date of Patent: October 7, 2008Assignee: Electronics and Telecommunications Research InstituteInventors: Jintae Oh, Seung Won Shin, Ki Young Kim, Jong Soo Jang, Sung Won Sohn
-
Publication number: 20080134283Abstract: Provided is a security method and apparatus for supporting IPv4 and IPv6. The security apparatus includes a packet classifier classifying an IPv4 packet and an IPv6 packet based on version information in header information of an input IP packet, a key generator generating header information corresponding to each of the classified IPv4 and IPv6 packets and generating a discrimination key corresponding to each of the classified IPv4 and IPv6 packets based on the generated header information, and a lookup engine comprising a first bank in which a security policy for IPv4 packets is established and a second bank in which a security policy for IPv6 packets is established, by which the first bank and the second bank are searched using the discrimination key corresponding to each packet.Type: ApplicationFiled: September 4, 2007Publication date: June 5, 2008Inventors: Sang Gil Park, Jintae Oh, Taek Yong Nam
-
Publication number: 20080080715Abstract: Provided are an apparatus and a method for data encryption using a secure memory, and more particularly, to an apparatus and a method for high-speed, large-volume data encryption using a security function included in the secure memory in response to an encryption/decryption request of a user application program. Conventional data encryption methods perform data encryption using software or hardware including a peripheral component interconnect (PCI) bus. However, the conventional data encryption methods do not satisfy speed-sensitive applications. To improve this problem, the present invention provides an apparatus and a method for high-speed, large-volume data encryption using a security function of a memory.Type: ApplicationFiled: September 28, 2007Publication date: April 3, 2008Inventors: Ho Lee, Jintae Oh, Taek Nam, Seungmin Lee, Jong Jang
-
Publication number: 20080028468Abstract: A method and apparatus for automatically generating a signature used in a security system are provided. The apparatus and method include a configuration for combining a plurality of substrings extracted from a packet and generating a substring set; a configuration for examining the attacking characteristic of a packet having a substring set and confirming whether or not the substring can be used as a signature for detecting an attacking packet; and a configuration for optimization so as to increase the distinction and storing efficiency of a signature.Type: ApplicationFiled: July 9, 2007Publication date: January 31, 2008Inventors: Sungwon YI, Hwa Shin MOON, Jintae OH, Jong Soo JANG
-
Publication number: 20070130188Abstract: Provided are a data hashing method, a data processing method, and a data processing system using a similarity-based hashing (SBH) algorithm in which the same hash value is calculated for the same data and the more similar data, the smaller difference in the generated hash values. The data hashing method includes receiving computerized data, and generating a hash value of the computerized data using the SBH algorithm in which two data are the same if calculated hash values are the same and two data are similar if the difference of calculated hash values is small. Therefore, a search, comparison, and classification of data can be quickly processed within a time complexity of O(1) or O(n) since the similarity/closeness of data content are quantified by that of the corresponding hash values.Type: ApplicationFiled: December 6, 2006Publication date: June 7, 2007Inventors: Hwa Moon, Sungwon Yi, Jintae Oh, Jong Jang, Changhoon Kim
-
Publication number: 20060123480Abstract: The present invention relates to a real-time network attack pattern detection system and a method thereof in which a common pattern is detected in real time from packets, which are suspected to be a network attack such as Worm, to effectively block the attack.Type: ApplicationFiled: March 24, 2005Publication date: June 8, 2006Inventors: Jintae Oh, Seung Shin, Ki Kim, Jong Jang, Sung Sohn
-
Publication number: 20060085855Abstract: The present invention relates to a network intrusion detection and prevention system. The system includes: a signature based detecting device; an anomaly behavior based detecting device; and a new signature creating and verifying device disposed between the signature based detecting device and the anomaly behavior based detecting device, wherein if the anomaly behavior based detecting device detects network-attack-suspicious packets, the new signature creating and verifying device collects and searches the detected suspicious packets for common information, and then creates a new signature on the basis of the searched common information and at the same time, verifies whether or not the created new signature is applicable to the signature based detecting device, and then registers the created new signature to the signature based detecting device if it is determined that the created new signature is applicable.Type: ApplicationFiled: December 29, 2004Publication date: April 20, 2006Inventors: Seung Shin, Jintae Oh, Ki Kim, Jong Jang, Sung Sohn
-
Publication number: 20060050968Abstract: A trap matrix searches the entire contents of a data stream for a pattern that matches the pattern for a search term. In those circumstances where there is a match between patterns of the data stream and the search term, the method and system can proceed to an exact match operation. In particular, a pointer matrix and a corresponding active control matrix are generated according to a set of terms in a rule table. Data is sequenced the trap matrix according to the hierarchy of its trap elements. The trap elements perform a pattern match check between the sequenced data stream and any search term in the set of terms in the rule table. Results from a positive pattern match are preferably communicated from the matching trap element to an exact match lookup.Type: ApplicationFiled: August 19, 2005Publication date: March 9, 2006Inventors: Jintae Oh, Ilsup Kim, Hojae Lee
-
Patent number: 6959297Abstract: A trap matrix searches the entire contents of a data stream for a pattern that matches the pattern for a search term. In those circumstances where there is a match between patterns of the data stream and the search term, the method and system can proceed to an exact match operation. In particular, a pointer matrix and a corresponding active control matrix are generated according to a set of terms in a rule table. Data is sequenced through the trap matrix according to the hierarchy of its trap elements. The trap elements perform a pattern match check between the sequenced data stream and any search term in the set of terms in the rule table. Results from a positive pattern match are preferably communicated from the matching trap element to an exact match lookup.Type: GrantFiled: April 25, 2002Date of Patent: October 25, 2005Assignee: Winnow Technology, LLCInventors: Jintae Oh, Ilsup Kim, Hojae Lee