Patents by Inventor Jong-Gook Ko

Jong-Gook Ko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130108105
    Abstract: Disclosed are a method and an apparatus for masking a privacy region based on a monitored video image. The method for masking a privacy region based on a monitored video image, includes: extracting a target object from the video input from an video collector to detect a privacy masking region from the extracted target object; and graphic-processing only the detected privacy masking region of the target object to hide the privacy masking region without transforming an original of the input video, thereby easily hiding the privacy region without transforming original video captured when monitoring an video image of a monitoring target region not to expose the privacy region.
    Type: Application
    Filed: August 2, 2012
    Publication date: May 2, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jang Hee YOO, Han Sung LEE, Jong Gook KO
  • Publication number: 20120121191
    Abstract: The present invention provides an image separation apparatus and method. The image separation apparatus includes an image reception unit for receiving an input image. A background model generation unit generates a background model corresponding to the input image. A foreground/background separation unit performs a task of determining using the background model whether reference pixels among all pixels of the input image belong to a foreground or a background, and performs a task of estimating, based on results of the foreground/background determination task, whether remaining pixels other than the reference pixels belong to the foreground or the background.
    Type: Application
    Filed: November 16, 2011
    Publication date: May 17, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seok-Bin KANG, Jun-Sup LEE, Jong-Gook KO, Su-Woong LEE, Jun-Suk LEE
  • Publication number: 20120107790
    Abstract: A method of authoring experiential learning content includes displaying an authoring window to author the experiential learning content when a request is made to author the experiential learning content; and creating a virtual world by loading and arranging 3D objects and a 2D objects, in the authoring window, which corresponds to a scenario of the experiential learning content. Further, the method includes defining an Action-zone that determines a position where a user is merged in the virtual world; and defining a state by dividing the scenario into a plurality of steps as time goes by based on the scenario to play the experiential learning content from a specific time point, respectively. Furthermore, the method includes defining a processing routine of an event occurred in the state; and authoring the experiential learning content according to the defined Action-zone, the defined state, and the defined processing routine.
    Type: Application
    Filed: October 31, 2011
    Publication date: May 3, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Su Woong LEE, Jong-Gook KO, Junsuk LEE, Seokbin KANG, Jaemo SUNG, Gil haeng LEE
  • Patent number: 7869626
    Abstract: An iris recognition method is provided. In the iris recognition method, binary image data is obtained by receiving eye image data and filtering the received eye image data using a predetermined threshold value. Then, candidate center search regions are searched for finding a pupil center using profile information of rows and columns of the binarized image. a pupil boundary and a center point are detected by performing a mask operation using 8 pupil boundary mask templates for each of concentric circles formed of pointes in the searched candidate center search regions as candidate pupil centers and different radiuses. An iris boundary region is detected by performing a masking operation using 6 iris boundary mask templates corresponding to 6 locations for concentric circles formed of the pupil center as an origin and different radiuses.
    Type: Grant
    Filed: February 6, 2007
    Date of Patent: January 11, 2011
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jong Gook Ko, Youn Hee Gil, Jang Hee Yoo, Kyo Il Chung
  • Publication number: 20100159430
    Abstract: An educational system using virtual reality includes an image computer for extracting an image of a student from an entire image acquired by capturing the student; a remote lecturer computer for extracting an image of a lecturer at a remote place from an entire image acquired by capturing the remote lecturer. Further, the educational system using the virtual reality includes a classroom lecturer computer for executing learning content in which a virtual space is implemented, and performing real-time communication with the remote lecturer computer; and a virtual reality computer for combining the image of the student and the image of the remote lecturer with the virtual space of the learning content.
    Type: Application
    Filed: December 10, 2009
    Publication date: June 24, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Su Woong LEE, Jong-Gook Ko, Junsup Lee, Hyung-Keun Jee, Junsuk Lee
  • Publication number: 20100128937
    Abstract: A multi-image acquisition apparatus for use in a biometrics system includes a light splitting filter for reflecting or transmitting multi-image lights representing an image of a target subject provided along an identical light path into different bands; a first image sensor for imaging an iris area by capturing a fraction of the multi-image light which has been transmitted through the light splitting filter; and a second image sensor for imaging a facial area by capturing a fraction of the multi-image light which has been reflected from the light splitting filter. The apparatus further includes a control module for controlling the first image sensor and the second image sensor and providing the images obtained by the first sensor and second sensor for image recognition.
    Type: Application
    Filed: November 23, 2009
    Publication date: May 27, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jang-Hee YOO, Jong-Gook KO, Ki Young MOON
  • Patent number: 7715594
    Abstract: A method of iris recognition using a cumulative-sum-based change point analysis and an apparatus using the same are disclosed. The method includes: transforming an iris image to a polar coordinated image having n×m pixel size and dividing the polar coordinated image into at least one cell; grouping the divided iris images into at least one of first groups having a predetermined number of cells, and at least one of second groups each having more cells than the first group has; performing a cumulative-sum-based change point analysis using a predetermined characteristic pattern value of each cell as a representative value; and generating a pattern vector by assigning a predetermined value to a cell having the change point and assigning a different value to other cells.
    Type: Grant
    Filed: April 18, 2006
    Date of Patent: May 11, 2010
    Assignee: Electronics and Telecommunications Research Intitute
    Inventors: Jong Gook Ko, Youn Hee Gil, Jang Hee Yoo, Kyo Il Chung
  • Publication number: 20080069410
    Abstract: An iris recognition method is provided. In the iris recognition method, binary image data is obtained by receiving eye image data and filtering the received eye image data using a predetermined threshold value. Then, candidate center search regions are searched for finding a pupil center using profile information of rows and columns of the binarized image. a pupil boundary and a center point are detected by performing a mask operation using 8 pupil boundary mask templates for each of concentric circles formed of pointes in the searched candidate center search regions as candidate pupil centers and different radiuses. An iris boundary region is detected by performing a masking operation using 6 iris boundary mask templates corresponding to 6 locations for concentric circles formed of the pupil center as an origin and different radiuses.
    Type: Application
    Filed: February 6, 2007
    Publication date: March 20, 2008
    Inventors: Jong Gook Ko, Youn Hee Gil, Jang Hee Yoo, Kyo II Chung
  • Patent number: 7290279
    Abstract: Disclosed is an access control method using a token having security attributes in a computer system when a user gains access to a specific file. The computer system adopts a token having encryption, modification, execution, and provision attributes to determine access permission or access denial between a user and a file in such a way that a file access request is controlled. The access control method enciphers a file and stores the enciphered file in a storage unit, so that it can maintain security of the file even though the storage unit is stolen. The access control method enables a system manager to read only enciphered contents of the file when the system manager performs a data backup operation, thereby eliminating limitations in commonly operating a system simultaneously with maintaining file security.
    Type: Grant
    Filed: October 25, 2002
    Date of Patent: October 30, 2007
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sung Kyong Eun, Jeong Nyeo Kim, Jong Gook Ko, So Young Doo, Joon Suk Yu, Jae Deok Lim
  • Patent number: 7134017
    Abstract: Disclosed herein is a method of providing a trusted path between a client and a system using an access control processing technique. The method of providing a trusted path between a client and a system includes the step of determining whether access to resources of the system will be permitted or refused on the basis of access control rules and databased attributes set by a security administrator. Thereafter, the client is notified of permission for or refusal of the access in accordance with the result of the determination.
    Type: Grant
    Filed: July 2, 2002
    Date of Patent: November 7, 2006
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: So-Young Doo, Sung Kyong Un, Jong-Gook Ko, Jeong Nyeo Kim, Kyo Il Chung
  • Publication number: 20030200436
    Abstract: Disclosed is an access control method using a token having security attributes in a computer system when a user gains access to a specific file. The computer system adopts a token having encryption, modification, execution, and provision attributes to determine access permission or access denial between a user and a file in such a way that a file access request is controlled. The access control method enciphers a file and stores the enciphered file in a storage unit, so that it can maintain security of the file even though the storage unit is stolen. The access control method enables a system manager to read only enciphered contents of the file when the system manager performs a data backup operation, thereby eliminating limitations in commonly operating a system simultaneously with maintaining file security.
    Type: Application
    Filed: October 25, 2002
    Publication date: October 23, 2003
    Inventors: Sung Kyong Eun, Jeong Nyeo Kim, Jong Gook Ko, So Young Doo, Joon Suk Yu, Jae Deok Lim
  • Publication number: 20030126434
    Abstract: A file security system uses a security class set by an access control module. The file security system includes a disk, a kernel memory and an encryption file system. The disk includes a key file in which an encryption key corresponding to the security class is stored and a file encoded by the encryption key. The encryption key stored in the disk is loaded into the kernel memory when the file security system starts operating. The encryption file system extracts an encryption key corresponding to a security class of a file that a user intends to read or store; decodes or encodes the file by using the extracted encryption key; and then provides the decoded file to the user or stores the encoded file in the disk.
    Type: Application
    Filed: September 3, 2002
    Publication date: July 3, 2003
    Inventors: Jae Deok Lim, Joon Suk Yu, Sung Kyong Un, Jong-Gook Ko, So-Young Doo, Jeong Nyeo Kim
  • Publication number: 20030097572
    Abstract: Disclosed herein is a method of providing a trusted path between a client and a system using an access control processing technique. The method of providing a trusted path between a client and a system includes the step of determining whether access to resources of the system will be permitted or refused on the basis of access control rules and databased attributes set by a security administrator. Thereafter, the client is notified of permission for or refusal of the access in accordance with the result of the determination.
    Type: Application
    Filed: July 2, 2002
    Publication date: May 22, 2003
    Inventors: So-Young Doo, Sung Kyong Un, Jong-Gook Ko, Jeong Nyeo Kim, Kyo Il Chung