Patents by Inventor Jong Soo Jang

Jong Soo Jang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100031052
    Abstract: There are provided a low power SHA-1 hash algorithm apparatus having a low power structure and optimized to a trusted platform module (TPM) applied to a mobile trusted computing environment and a low power keyed-hash message authentication code (HMAC) encryption apparatus using the low power SHA-1 hash algorithm apparatus, the HMAC encryption apparatus including: a key padder padding key data for HMAC algorithm; an XOR operator XOR operating the padded key data and a padding constant; a data connector connecting a text to be encrypted, to data obtained by the XOR operating; a data padder padding the connected data; an SHA-1 hash algorithm part performing an SHA-1 hash algorithm on the padded data; a data selector selecting and applying one of a result of the SHA-1 hash algorithm and the text to be encrypted, to the data connector; and a controller controlling operations of the key padder, data connector, and data padder, a sequence of performing a hash algorithm of the SHA-1 hash algorithm part, and storing a
    Type: Application
    Filed: April 15, 2008
    Publication date: February 4, 2010
    Applicant: Electronics & Telecommunications Research Institute
    Inventors: Moo Seop Kim, Young Sae Kim, Young Soo Park, Ji Man Park, Sung Ik Jun, Jong Soo Jang
  • Publication number: 20090316887
    Abstract: A database encryption and query method keeping an order within a bucket partially, which encrypts and stores numeric data in a database, includes calculating a relative value of a plaintext within a bucket to which the plaintext is allocated; generating a first key value by producing a random number within the bucket; generating a second key value for defining a function having a bucket range of the bucket as an input; and changing the relative value based on the first and the second key value with keeping an order of the relative value partially to store the changed relative value. The first key value may be a value of separating order informations on the relative value. Further, the second key value may be a resultant value obtained by applying a mod 2 operation to the bucket size of the bucket.
    Type: Application
    Filed: June 11, 2008
    Publication date: December 24, 2009
    Inventors: Donghyuk LEE, Seungmin LEE, Taek Yong NAM, Yong-Sung JEON, Sang-Woo LEE, Jong Soo JANG
  • Patent number: 7617231
    Abstract: A data hashing method, a data processing method, and a data processing system using a similarity-based hashing (SBH) algorithm in which the same hash value is calculated for the same data and the more similar data, the smaller difference in the generated hash values. The data hashing method includes receiving computerized data, and generating a hash value of the computerized data using the SBH algorithm in which two data are the same if calculated hash values are the same and two data are similar if the difference of calculated hash values is small, wherein a search, comparison, and classification of data may be quickly processed within a time complexity of O(1) or O(n) since the similarity/closeness of data content are quantified by component values for each of the respective corresponding generated hash values.
    Type: Grant
    Filed: December 6, 2006
    Date of Patent: November 10, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Hwa Shin Moon, Sungwon Yi, Jintae Oh, Jong Soo Jang, Changhoon Kim
  • Patent number: 7613669
    Abstract: A method and apparatus for storing pattern matching data and a pattern matching method using the method and apparatus are provided. The method of storing original data for pattern matching in a pattern matching apparatus includes: dividing the original data into segments of a predetermined size; performing a hash operation on each of the divided segments; determining whether or not the hash operation value of each segment causes a hash collision with a hash operation value stored in a first external memory disposed outside the pattern matching apparatus; and controlling the hash operation value of each segment determined not to cause a hash collision to be stored in the first external memory. According to the method and apparatus, the original data desired to be used for pattern matching can be stored at a faster speed in a pattern matching data storing apparatus.
    Type: Grant
    Filed: June 14, 2006
    Date of Patent: November 3, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Seung Won Shin, Jin Tae Oh, Jong Soo Jang, Sung Won Sohn
  • Patent number: 7596810
    Abstract: Provided is an apparatus for detecting a network attack situation. The apparatus includes an alarm receiver receiving a plurality of alarms raised in a network to which the alarm receiver is connected, converting the alarms into predetermined alarm data, and outputting the alarm data; an alarm processor analyzing an attack situation in the network based on attributes of the alarm data and a number of times that the alarm data is generated; a memory storing basic data needed to analyze the state of the network and providing the basic data to the alarm processor; and an interface transmitting the result of the analysis by the alarm processor to an external device, receiving a predetermined critical value from the external device, which is a basis for determining the occurrence of the attack situation, and outputting the critical value to the alarm processor such that the alarm processor can store the critical value in the memory.
    Type: Grant
    Filed: March 17, 2005
    Date of Patent: September 29, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jin Oh Kim, Seon Gyoung Sohn, Hyochan Bang, Soo Hyung Lee, Dongyoung Kim, Beom Hwan Chang, Geon Lyang Kim, Hyun Joo Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Patent number: 7583952
    Abstract: An access pointer for interconnecting a power line communication (PLC) network of a home network and a wireless network and a method therefor are provided. When data is received from the PLC network through media access control of a data link layer, data on upper layers above a network layer in the received data is converted into a format suitable to a wireless network layer. The converted data is transmitted to the wireless network through the media access control of the data link layer. Accordingly, the PLC network and the wireless network are easily interconnected.
    Type: Grant
    Filed: November 23, 2005
    Date of Patent: September 1, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Hyung Kyu Lee, Jong Wook Han, Jong Soo Jang, Sung Won Sohn
  • Patent number: 7571309
    Abstract: Provided are a method and apparatus for providing a security mechanism guaranteeing transparency at a transport layer. The method includes: receiving a data packet from an application program, and searching key information corresponding to the data packet in key information database; determining whether to request a key exchange module of an application layer for a new key negotiation according to a result obtained by searching key information; and performing encrypting/decrypting based on key information when the key exchange module stores key negotiation information obtained by the new key negotiation in a kernel. The apparatus encrypts/decrypts the data packet at the transport layer of the kernel, thereby providing the application program with security transparency, effectively controlling and making it easily expansible.
    Type: Grant
    Filed: April 12, 2005
    Date of Patent: August 4, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Geon Woo Kim, Sun Hee Lim, Sang Su Lee, Ki Hyun Kim, Jeong Nyeo Kim, Jong Soo Jang
  • Patent number: 7571477
    Abstract: In a real-time network attack pattern detection system and method, a common pattern is detected in real time from packets, which are suspected to be a network attack such as Worm, to effectively block the attack. The system includes: a suspicious packet detector for classifying a suspicious attack packet from all input packets; a first data delaying unit for receiving the input packet from the suspicious packet detector to output an one-clock delayed data; a second data delaying unit for receiving an output signal from the first data delaying unit to output an one-clock delayed data; a hash key generator for receiving an output data of the suspicious packet detector, an output data of the first data delaying unit and an output data of the second data delaying unit to generate a hash key; a hash table for storing a lookup result obtained by the hash key generated from the hash key generator; and an existence & hit checker for checking the lookup result of the hash table.
    Type: Grant
    Filed: March 24, 2005
    Date of Patent: August 4, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jintae Oh, Seung Won Shin, Ki Young Kim, Jong Soo Jang, Sung Won Sohn
  • Patent number: 7565693
    Abstract: The present invention relates to a network intrusion detection and prevention system. The system includes: a signature based detecting device; an anomaly behavior based detecting device; and a new signature creating and verifying device disposed between the signature based detecting device and the anomaly behavior based detecting device, wherein if the anomaly behavior based detecting device detects network-attack-suspicious packets, the new signature creating and verifying device collects and searches the detected suspicious packets for common information, and then creates a new signature on the basis of the searched common information and at the same time, verifies whether or not the created new signature is applicable to the signature based detecting device, and then registers the created new signature to the signature based detecting device if it is determined that the created new signature is applicable.
    Type: Grant
    Filed: December 29, 2004
    Date of Patent: July 21, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Seung Won Shin, Jintae Oh, Ki Young Kim, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20090161864
    Abstract: A block cipher ARIA substitution apparatus, the apparatus includes a first Sbox operation unit for performing operations of a substitution box S1 and a substitution box S1?1; a second Sbox operation unit for performing operations of a substitution box S2 and a substitution box S2?1; and a control unit for determining modes of the first Sbox operation unit and the second Sbox operation unit.
    Type: Application
    Filed: July 21, 2008
    Publication date: June 25, 2009
    Inventors: Sang-Woo Lee, Yong-Sung Jeon, Seungmin Lee, Donghyuk Lee, Taek Yong Nam, Jong Soo Jang
  • Publication number: 20090158427
    Abstract: Enclosed are a signature string storage memory optimizing method, a signature string pattern matching method, and a signature matching engine. Signature is tokenized in units of substrings and the tokenized substrings are stored in an internal memory block and an external memory block to optimize a memory storage pattern. Therefore, matching of introduction data to signature patterns is effectively performed.
    Type: Application
    Filed: December 10, 2008
    Publication date: June 18, 2009
    Inventors: Byoung Koo Kim, Jin Tae Oh, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20090158431
    Abstract: There is provided a method of detecting a polymorphic shell code. The decoding routine of the polymorphic shell code is detected from received data. In order for the decoding routine to access the address of an encoded code, the address of a currently executed code is stored in a stack, the value is moved in a register table, and it is determined whether the value is actually used for operating a memory. Emulation is finally performed and the degree of correctness of detection is improved. Therefore, time spent on detecting the polymorphic shell code and an overhead are reduced and the correctness of detection is increased.
    Type: Application
    Filed: December 12, 2008
    Publication date: June 18, 2009
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Dae Won KIM, Ik Kyun KIM, Yang Seo CHOI, Seung Yong YOON, Byoung Koo KIM, Jin Tae OH, Jong Soo JANG
  • Patent number: 7539147
    Abstract: Provided is an apparatus for detecting and visualizing anomalies in network traffic which includes a traffic information storing portion storing information on network traffic, a traffic state display portion presenting a status of the network traffic generated for a predetermined threshold time based on the information on network traffic on an orthogonal coordinates system in a form of a graph connecting at least one point data as a coordinate value, and a traffic anomalies determination portion determining an existence of anomalies in the network traffic based on a shape of the graph.
    Type: Grant
    Filed: March 11, 2005
    Date of Patent: May 26, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Beom Hwan Chang, Soo Hyung Lee, Jin Oh Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20090133125
    Abstract: The present invention relates to an apparatus and method for detecting malware. The malware detection apparatus and method of the present invention determines whether a file is malware or not by analyzing the header of an executable file. Since the malware detection apparatus and method can quickly detect presence of malware, it can shorten detection time considerably. The malware detection apparatus and method can also detect even unknown malware as well as known malware to thereby estimate and determine presence of malware. Therefore, it is possible to cope with malware in advance, protect a system with a program, and increase security level remarkably.
    Type: Application
    Filed: September 12, 2008
    Publication date: May 21, 2009
    Inventors: Yang Seo Choi, Ik Kyun Kim, Byoung Koo Kim, Seung Yong Yoon, Dae Won Kim, Jin Tae Oh, Jong Soo Jang
  • Publication number: 20090094699
    Abstract: Provided is an apparatus for detecting a network attack situation. The apparatus includes an alarm receiver receiving a plurality of alarms raised in a network to which the alarm receiver is connected, converting the alarms into predetermined alarm data, and outputting the alarm data; an alarm processor analyzing an attack situation in the network based on attributes of the alarm data and a number of times that the alarm data is generated; a memory storing basic data needed to analyze the state of the network and providing the basic data to the alarm processor; and an interface transmitting the result of the analysis by the alarm processor to an external device, receiving a predetermined critical value from the external device, which is a basis for determining the occurrence of the attack situation, and outputting the critical value to the alarm processor such that the alarm processor can store the critical value in the memory.
    Type: Application
    Filed: November 21, 2008
    Publication date: April 9, 2009
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jin Oh KIM, Seon Gyoung Sohn, Hyochan Bang, Soo Hyung Lee, Dongyoung Kim, Beom Hwan Chang, Geon Lyang Kim, Hyun Joo Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20080291912
    Abstract: The present invention relates to a file detecting system and a method thereof. The file detecting system uses a signature of a file header and collects a network packet including a file to be detected among packets transmitted/received through a network. Subsequently, after the network protocol header is eliminated from the collected network packet, the file is reassembled and recovered. The recovered file is verified, and the verified file is transmitted to various file analysis systems.
    Type: Application
    Filed: March 7, 2008
    Publication date: November 27, 2008
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yang-Seo CHOI, Ik-Kyun Kim, Dae-Won Kim, Jin-Tae Oh, Jong-Soo Jang
  • Patent number: 7433357
    Abstract: An apparatus and method for performing packet header lookup based on sequential lookup is provided. A header analyzer separates a header from a packet received via a network and outputs a lookup sequence. A unit lookup unit looks up matching the header combination rules with each field to be analyzed and input from the header analyzer based on the lookup sequence input from the header analyzer and outputs a match signal and a match address. A rule combination memory stores identification information for the header combination rules. A sequence combination memory stores lookup sequence information and sequence combination information. A rule combination unit generates match results based on the match signal input from the unit lookup unit and data read from the rule combination memory and the sequence combination memory.
    Type: Grant
    Filed: November 19, 2004
    Date of Patent: October 7, 2008
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jintae Oh, Seung Won Shin, Ki Young Kim, Jong Soo Jang, Sung Won Sohn
  • Patent number: 7417951
    Abstract: Provided are an apparatus and method for limiting bandwidths of burst aggregate flows according to the present invention. The apparatus comprises: a bandwidth measuring unit measuring a bandwidth of at least one input aggregate flow; a grade determining unit determining abnormal grades according to abnormal levels of the input aggregate flows; a bandwidth limit determining unit determining a bandwidth volume and aggregate flow to be limited; a bandwidth limiting unit inputting a result determined by the bandwidth limit determining unit, limiting or releasing a bandwidth of a aggregate flow selected among the input aggregate flows and outputting the selected aggregate flow; and a status information storage unit storing status information including a usage bandwidth, an abnormal grade, and a limited bandwidth volume of the input aggregate flow.
    Type: Grant
    Filed: September 3, 2004
    Date of Patent: August 26, 2008
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Gaeil An, Ki Young Kim, Jong Soo Jang
  • Patent number: 7401145
    Abstract: Disclosed is an in-line mode network intrusion detecting and preventing system coupled between a protection network and an external network, for detecting intrusion states between the networks and preventing the intrusion. The system comprises a first network processor unit for monitoring the packets communicated between the networks to collect various statistical data, and performing a packet filtering process according to a packet preventing rule and a packet sensing process according to a sensing rule; and a second network processor unit for checking payloads of the packets with reference to attack signatures to detect the attack states to one of the networks.
    Type: Grant
    Filed: February 5, 2004
    Date of Patent: July 15, 2008
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Koo-Hong Kang, Ik-Kyun Kim, Byoung-Koo Kim, Jong-Kook Lee, Ki-Young Kim, Jong-Soo Jang
  • Publication number: 20080137663
    Abstract: An identifier verification method for determining whether an identifier of a second peer node is reliable, at first peer node, in a distributed peer to peer network without a server, the network having a plurality of peer nodes connected to an Internet, the identifier verification method including: obtaining the identifier of the second peer node; requesting identifier verification for checking whether the identifier of the second peer node is forged, by using a cryptographic method via a third peer node randomly selected, when receiving a request for the identifier verification from a user; and verifying reliability of the identifier of the second peer node depending on a result of the identifier verification request.
    Type: Application
    Filed: August 25, 2007
    Publication date: June 12, 2008
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Ja Beom Gu, Jae Hoon Nah, Hyeok Chan Kwon, Jong Soo Jang