Patents by Inventor Jong Soo Jang
Jong Soo Jang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100031052Abstract: There are provided a low power SHA-1 hash algorithm apparatus having a low power structure and optimized to a trusted platform module (TPM) applied to a mobile trusted computing environment and a low power keyed-hash message authentication code (HMAC) encryption apparatus using the low power SHA-1 hash algorithm apparatus, the HMAC encryption apparatus including: a key padder padding key data for HMAC algorithm; an XOR operator XOR operating the padded key data and a padding constant; a data connector connecting a text to be encrypted, to data obtained by the XOR operating; a data padder padding the connected data; an SHA-1 hash algorithm part performing an SHA-1 hash algorithm on the padded data; a data selector selecting and applying one of a result of the SHA-1 hash algorithm and the text to be encrypted, to the data connector; and a controller controlling operations of the key padder, data connector, and data padder, a sequence of performing a hash algorithm of the SHA-1 hash algorithm part, and storing aType: ApplicationFiled: April 15, 2008Publication date: February 4, 2010Applicant: Electronics & Telecommunications Research InstituteInventors: Moo Seop Kim, Young Sae Kim, Young Soo Park, Ji Man Park, Sung Ik Jun, Jong Soo Jang
-
Publication number: 20090316887Abstract: A database encryption and query method keeping an order within a bucket partially, which encrypts and stores numeric data in a database, includes calculating a relative value of a plaintext within a bucket to which the plaintext is allocated; generating a first key value by producing a random number within the bucket; generating a second key value for defining a function having a bucket range of the bucket as an input; and changing the relative value based on the first and the second key value with keeping an order of the relative value partially to store the changed relative value. The first key value may be a value of separating order informations on the relative value. Further, the second key value may be a resultant value obtained by applying a mod 2 operation to the bucket size of the bucket.Type: ApplicationFiled: June 11, 2008Publication date: December 24, 2009Inventors: Donghyuk LEE, Seungmin LEE, Taek Yong NAM, Yong-Sung JEON, Sang-Woo LEE, Jong Soo JANG
-
Patent number: 7617231Abstract: A data hashing method, a data processing method, and a data processing system using a similarity-based hashing (SBH) algorithm in which the same hash value is calculated for the same data and the more similar data, the smaller difference in the generated hash values. The data hashing method includes receiving computerized data, and generating a hash value of the computerized data using the SBH algorithm in which two data are the same if calculated hash values are the same and two data are similar if the difference of calculated hash values is small, wherein a search, comparison, and classification of data may be quickly processed within a time complexity of O(1) or O(n) since the similarity/closeness of data content are quantified by component values for each of the respective corresponding generated hash values.Type: GrantFiled: December 6, 2006Date of Patent: November 10, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Hwa Shin Moon, Sungwon Yi, Jintae Oh, Jong Soo Jang, Changhoon Kim
-
Patent number: 7613669Abstract: A method and apparatus for storing pattern matching data and a pattern matching method using the method and apparatus are provided. The method of storing original data for pattern matching in a pattern matching apparatus includes: dividing the original data into segments of a predetermined size; performing a hash operation on each of the divided segments; determining whether or not the hash operation value of each segment causes a hash collision with a hash operation value stored in a first external memory disposed outside the pattern matching apparatus; and controlling the hash operation value of each segment determined not to cause a hash collision to be stored in the first external memory. According to the method and apparatus, the original data desired to be used for pattern matching can be stored at a faster speed in a pattern matching data storing apparatus.Type: GrantFiled: June 14, 2006Date of Patent: November 3, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Seung Won Shin, Jin Tae Oh, Jong Soo Jang, Sung Won Sohn
-
Patent number: 7596810Abstract: Provided is an apparatus for detecting a network attack situation. The apparatus includes an alarm receiver receiving a plurality of alarms raised in a network to which the alarm receiver is connected, converting the alarms into predetermined alarm data, and outputting the alarm data; an alarm processor analyzing an attack situation in the network based on attributes of the alarm data and a number of times that the alarm data is generated; a memory storing basic data needed to analyze the state of the network and providing the basic data to the alarm processor; and an interface transmitting the result of the analysis by the alarm processor to an external device, receiving a predetermined critical value from the external device, which is a basis for determining the occurrence of the attack situation, and outputting the critical value to the alarm processor such that the alarm processor can store the critical value in the memory.Type: GrantFiled: March 17, 2005Date of Patent: September 29, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Jin Oh Kim, Seon Gyoung Sohn, Hyochan Bang, Soo Hyung Lee, Dongyoung Kim, Beom Hwan Chang, Geon Lyang Kim, Hyun Joo Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
-
Patent number: 7583952Abstract: An access pointer for interconnecting a power line communication (PLC) network of a home network and a wireless network and a method therefor are provided. When data is received from the PLC network through media access control of a data link layer, data on upper layers above a network layer in the received data is converted into a format suitable to a wireless network layer. The converted data is transmitted to the wireless network through the media access control of the data link layer. Accordingly, the PLC network and the wireless network are easily interconnected.Type: GrantFiled: November 23, 2005Date of Patent: September 1, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Hyung Kyu Lee, Jong Wook Han, Jong Soo Jang, Sung Won Sohn
-
Patent number: 7571309Abstract: Provided are a method and apparatus for providing a security mechanism guaranteeing transparency at a transport layer. The method includes: receiving a data packet from an application program, and searching key information corresponding to the data packet in key information database; determining whether to request a key exchange module of an application layer for a new key negotiation according to a result obtained by searching key information; and performing encrypting/decrypting based on key information when the key exchange module stores key negotiation information obtained by the new key negotiation in a kernel. The apparatus encrypts/decrypts the data packet at the transport layer of the kernel, thereby providing the application program with security transparency, effectively controlling and making it easily expansible.Type: GrantFiled: April 12, 2005Date of Patent: August 4, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Geon Woo Kim, Sun Hee Lim, Sang Su Lee, Ki Hyun Kim, Jeong Nyeo Kim, Jong Soo Jang
-
Patent number: 7571477Abstract: In a real-time network attack pattern detection system and method, a common pattern is detected in real time from packets, which are suspected to be a network attack such as Worm, to effectively block the attack. The system includes: a suspicious packet detector for classifying a suspicious attack packet from all input packets; a first data delaying unit for receiving the input packet from the suspicious packet detector to output an one-clock delayed data; a second data delaying unit for receiving an output signal from the first data delaying unit to output an one-clock delayed data; a hash key generator for receiving an output data of the suspicious packet detector, an output data of the first data delaying unit and an output data of the second data delaying unit to generate a hash key; a hash table for storing a lookup result obtained by the hash key generated from the hash key generator; and an existence & hit checker for checking the lookup result of the hash table.Type: GrantFiled: March 24, 2005Date of Patent: August 4, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Jintae Oh, Seung Won Shin, Ki Young Kim, Jong Soo Jang, Sung Won Sohn
-
Patent number: 7565693Abstract: The present invention relates to a network intrusion detection and prevention system. The system includes: a signature based detecting device; an anomaly behavior based detecting device; and a new signature creating and verifying device disposed between the signature based detecting device and the anomaly behavior based detecting device, wherein if the anomaly behavior based detecting device detects network-attack-suspicious packets, the new signature creating and verifying device collects and searches the detected suspicious packets for common information, and then creates a new signature on the basis of the searched common information and at the same time, verifies whether or not the created new signature is applicable to the signature based detecting device, and then registers the created new signature to the signature based detecting device if it is determined that the created new signature is applicable.Type: GrantFiled: December 29, 2004Date of Patent: July 21, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Seung Won Shin, Jintae Oh, Ki Young Kim, Jong Soo Jang, Sung Won Sohn
-
Publication number: 20090161864Abstract: A block cipher ARIA substitution apparatus, the apparatus includes a first Sbox operation unit for performing operations of a substitution box S1 and a substitution box S1?1; a second Sbox operation unit for performing operations of a substitution box S2 and a substitution box S2?1; and a control unit for determining modes of the first Sbox operation unit and the second Sbox operation unit.Type: ApplicationFiled: July 21, 2008Publication date: June 25, 2009Inventors: Sang-Woo Lee, Yong-Sung Jeon, Seungmin Lee, Donghyuk Lee, Taek Yong Nam, Jong Soo Jang
-
Publication number: 20090158427Abstract: Enclosed are a signature string storage memory optimizing method, a signature string pattern matching method, and a signature matching engine. Signature is tokenized in units of substrings and the tokenized substrings are stored in an internal memory block and an external memory block to optimize a memory storage pattern. Therefore, matching of introduction data to signature patterns is effectively performed.Type: ApplicationFiled: December 10, 2008Publication date: June 18, 2009Inventors: Byoung Koo Kim, Jin Tae Oh, Jong Soo Jang, Sung Won Sohn
-
Publication number: 20090158431Abstract: There is provided a method of detecting a polymorphic shell code. The decoding routine of the polymorphic shell code is detected from received data. In order for the decoding routine to access the address of an encoded code, the address of a currently executed code is stored in a stack, the value is moved in a register table, and it is determined whether the value is actually used for operating a memory. Emulation is finally performed and the degree of correctness of detection is improved. Therefore, time spent on detecting the polymorphic shell code and an overhead are reduced and the correctness of detection is increased.Type: ApplicationFiled: December 12, 2008Publication date: June 18, 2009Applicant: Electronics and Telecommunications Research InstituteInventors: Dae Won KIM, Ik Kyun KIM, Yang Seo CHOI, Seung Yong YOON, Byoung Koo KIM, Jin Tae OH, Jong Soo JANG
-
Patent number: 7539147Abstract: Provided is an apparatus for detecting and visualizing anomalies in network traffic which includes a traffic information storing portion storing information on network traffic, a traffic state display portion presenting a status of the network traffic generated for a predetermined threshold time based on the information on network traffic on an orthogonal coordinates system in a form of a graph connecting at least one point data as a coordinate value, and a traffic anomalies determination portion determining an existence of anomalies in the network traffic based on a shape of the graph.Type: GrantFiled: March 11, 2005Date of Patent: May 26, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Beom Hwan Chang, Soo Hyung Lee, Jin Oh Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
-
Publication number: 20090133125Abstract: The present invention relates to an apparatus and method for detecting malware. The malware detection apparatus and method of the present invention determines whether a file is malware or not by analyzing the header of an executable file. Since the malware detection apparatus and method can quickly detect presence of malware, it can shorten detection time considerably. The malware detection apparatus and method can also detect even unknown malware as well as known malware to thereby estimate and determine presence of malware. Therefore, it is possible to cope with malware in advance, protect a system with a program, and increase security level remarkably.Type: ApplicationFiled: September 12, 2008Publication date: May 21, 2009Inventors: Yang Seo Choi, Ik Kyun Kim, Byoung Koo Kim, Seung Yong Yoon, Dae Won Kim, Jin Tae Oh, Jong Soo Jang
-
Publication number: 20090094699Abstract: Provided is an apparatus for detecting a network attack situation. The apparatus includes an alarm receiver receiving a plurality of alarms raised in a network to which the alarm receiver is connected, converting the alarms into predetermined alarm data, and outputting the alarm data; an alarm processor analyzing an attack situation in the network based on attributes of the alarm data and a number of times that the alarm data is generated; a memory storing basic data needed to analyze the state of the network and providing the basic data to the alarm processor; and an interface transmitting the result of the analysis by the alarm processor to an external device, receiving a predetermined critical value from the external device, which is a basis for determining the occurrence of the attack situation, and outputting the critical value to the alarm processor such that the alarm processor can store the critical value in the memory.Type: ApplicationFiled: November 21, 2008Publication date: April 9, 2009Applicant: Electronics and Telecommunications Research InstituteInventors: Jin Oh KIM, Seon Gyoung Sohn, Hyochan Bang, Soo Hyung Lee, Dongyoung Kim, Beom Hwan Chang, Geon Lyang Kim, Hyun Joo Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
-
Publication number: 20080291912Abstract: The present invention relates to a file detecting system and a method thereof. The file detecting system uses a signature of a file header and collects a network packet including a file to be detected among packets transmitted/received through a network. Subsequently, after the network protocol header is eliminated from the collected network packet, the file is reassembled and recovered. The recovered file is verified, and the verified file is transmitted to various file analysis systems.Type: ApplicationFiled: March 7, 2008Publication date: November 27, 2008Applicant: Electronics and Telecommunications Research InstituteInventors: Yang-Seo CHOI, Ik-Kyun Kim, Dae-Won Kim, Jin-Tae Oh, Jong-Soo Jang
-
Patent number: 7433357Abstract: An apparatus and method for performing packet header lookup based on sequential lookup is provided. A header analyzer separates a header from a packet received via a network and outputs a lookup sequence. A unit lookup unit looks up matching the header combination rules with each field to be analyzed and input from the header analyzer based on the lookup sequence input from the header analyzer and outputs a match signal and a match address. A rule combination memory stores identification information for the header combination rules. A sequence combination memory stores lookup sequence information and sequence combination information. A rule combination unit generates match results based on the match signal input from the unit lookup unit and data read from the rule combination memory and the sequence combination memory.Type: GrantFiled: November 19, 2004Date of Patent: October 7, 2008Assignee: Electronics and Telecommunications Research InstituteInventors: Jintae Oh, Seung Won Shin, Ki Young Kim, Jong Soo Jang, Sung Won Sohn
-
Patent number: 7417951Abstract: Provided are an apparatus and method for limiting bandwidths of burst aggregate flows according to the present invention. The apparatus comprises: a bandwidth measuring unit measuring a bandwidth of at least one input aggregate flow; a grade determining unit determining abnormal grades according to abnormal levels of the input aggregate flows; a bandwidth limit determining unit determining a bandwidth volume and aggregate flow to be limited; a bandwidth limiting unit inputting a result determined by the bandwidth limit determining unit, limiting or releasing a bandwidth of a aggregate flow selected among the input aggregate flows and outputting the selected aggregate flow; and a status information storage unit storing status information including a usage bandwidth, an abnormal grade, and a limited bandwidth volume of the input aggregate flow.Type: GrantFiled: September 3, 2004Date of Patent: August 26, 2008Assignee: Electronics and Telecommunications Research InstituteInventors: Gaeil An, Ki Young Kim, Jong Soo Jang
-
Patent number: 7401145Abstract: Disclosed is an in-line mode network intrusion detecting and preventing system coupled between a protection network and an external network, for detecting intrusion states between the networks and preventing the intrusion. The system comprises a first network processor unit for monitoring the packets communicated between the networks to collect various statistical data, and performing a packet filtering process according to a packet preventing rule and a packet sensing process according to a sensing rule; and a second network processor unit for checking payloads of the packets with reference to attack signatures to detect the attack states to one of the networks.Type: GrantFiled: February 5, 2004Date of Patent: July 15, 2008Assignee: Electronics and Telecommunications Research InstituteInventors: Koo-Hong Kang, Ik-Kyun Kim, Byoung-Koo Kim, Jong-Kook Lee, Ki-Young Kim, Jong-Soo Jang
-
Publication number: 20080137663Abstract: An identifier verification method for determining whether an identifier of a second peer node is reliable, at first peer node, in a distributed peer to peer network without a server, the network having a plurality of peer nodes connected to an Internet, the identifier verification method including: obtaining the identifier of the second peer node; requesting identifier verification for checking whether the identifier of the second peer node is forged, by using a cryptographic method via a third peer node randomly selected, when receiving a request for the identifier verification from a user; and verifying reliability of the identifier of the second peer node depending on a result of the identifier verification request.Type: ApplicationFiled: August 25, 2007Publication date: June 12, 2008Applicant: Electronics and Telecommunications Research InstituteInventors: Ja Beom Gu, Jae Hoon Nah, Hyeok Chan Kwon, Jong Soo Jang