Patents by Inventor Kwang Jo Kim
Kwang Jo Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8516252Abstract: A method and apparatus for authenticating a sensor node in a sensor network. The method for authenticating a sensor node by a first sink node in a sensor network includes receiving an authentication request using an authentication ticket from the sensor node, identifying a second sink node which has issued the authentication ticket, decoding the authentication ticket using a group key, which is previously stored in correspondence to the second sink node to confirm the validity of the authentication ticket, when the second sink node is included in a neighboring node list, normally processing authentication for the sensor node, generating an authentication ticket using a group key of the first sink node, and transmitting the generated authentication ticket to the sensor node.Type: GrantFiled: June 25, 2010Date of Patent: August 20, 2013Assignee: Samsung Electronics Co., LtdInventors: Tae-Shik Shon, Yong-Suk Park, Soon-Seob Han, Kwang-Jo Kim, Kyu-Suk Han, Jang-Seong Kim
-
Patent number: 8412939Abstract: Disclosed a system and method for mutual authentication between a node and a sink in a sensor network. At least one sink periodically creates a neighboring sink list including information on at least one adjacent sink, and the sink requests node authentication to a base station when receiving an authentication request from the node and transmits its own neighboring sink list to the node when the node authentication has been completed. When the node moves and requests authentication to another sink, the another sink stores a neighboring sink list received from the node, determines if a node-authenticable sink exists in its own neighboring sink list according to the authentication request, and requests re-authentication of the node to the node-authenticable sink when the node-authenticable sink exists, so that re-authentication between the node and the sink is easily performed.Type: GrantFiled: June 23, 2010Date of Patent: April 2, 2013Assignees: Samsung Electronics Co., Ltd, Korea Advanced Institute of Science and Technology (KAIST)Inventors: Tae-Shik Shon, Yong-Suk Park, Soon-Seob Han, Kwang-Jo Kim, Kyu-Suk Han, Jang-Seong Kim
-
Patent number: 8243928Abstract: An authentication method is provided in which a first portable device generates and transmits a first random number and a first timestamp to a first USIM in the first portable device; the first USIM calculates a first sign for the first portable device; the first portable device requests authentication for authenticated communication from a second portable device through transmission of the first random number, the first timestamp, and the first sign to the second portable device; the second portable device generates a second random number and a second timestamp and transmits the information to a second USIM in the second portable device; the second USIM generates a second sign for the second portable device and a second personal key which the second portable device transmits to the first portable device; the first portable device then transmits the information to the first USIM which generates a first personal key for authenticated communication.Type: GrantFiled: August 7, 2008Date of Patent: August 14, 2012Assignees: Samsung Electronics Co., Ltd., Information and Communications University Research and Cooperation GroupInventors: Young-Jun Park, Min-Young Ahn, Kug Shin, Kwang-Jo Kim, Kyu-Suk Han
-
Publication number: 20110126015Abstract: A system is provided for authentication between a mobile device (MD) and a sink using a mobile communication network. If a sink authentication request for the sink is received from the MD, a base station (BS) sends a sink authentication response including sink authentication information for the sink, to the MD. The MD forwards the sink authentication request for the sink to the BS, and if a sink authentication response is received from the BS, authenticates the sink using the received sink authentication information. The sink performs authentication with the MD.Type: ApplicationFiled: November 24, 2010Publication date: May 26, 2011Applicants: Samsung Electronics Co., Ltd., Korea Advanced Institute of Science and Technology (KAIST)Inventors: Tae-Shik SHON, Yong-Suk Park, Kyu-Suk Han, Kwang-Jo Kim, Jang-Seong Kim
-
Publication number: 20100332831Abstract: A method and apparatus for authenticating a sensor node in a sensor network. The method for authenticating a sensor node by a first sink node in a sensor network includes receiving an authentication request using an authentication ticket from the sensor node, identifying a second sink node which has issued the authentication ticket, decoding the authentication ticket using a group key, which is previously stored in correspondence to the second sink node to confirm the validity of the authentication ticket, when the second sink node is included in a neighboring node list, normally processing authentication for the sensor node, generating an authentication ticket using a group key of the first sink node, and transmitting the generated authentication ticket to the sensor node.Type: ApplicationFiled: June 25, 2010Publication date: December 30, 2010Applicant: Samsung Electronics Co., Ltd.Inventors: Tae-Shik SHON, Yong-Suk Park, Soon-Seob Han, Kwang-Jo Kim, Kyu-Suk Han, Jang-Seong Kim
-
Publication number: 20100332830Abstract: Disclosed a system and method for mutual authentication between a node and a sink in a sensor network. At least one sink periodically creates a neighboring sink list including information on at least one adjacent sink, and the sink requests node authentication to a base station when receiving an authentication request from the node and transmits its own neighboring sink list to the node when the node authentication has been completed. When the node moves and requests authentication to another sink, the another sink stores a neighboring sink list received from the node, determines if a node-authenticable sink exists in its own neighboring sink list according to the authentication request, and requests re-authentication of the node to the node-authenticable sink when the node-authenticable sink exists, so that re-authentication between the node and the sink is easily performed.Type: ApplicationFiled: June 23, 2010Publication date: December 30, 2010Applicants: Samsung Electronics Co., Ltd., Korea Advanced Institure of Science and Technology (KAIST)Inventors: Tae-Shik Shon, Yong-Suk Park, Soon-Seob Han, Kwang-Jo Kim, Kyu-Suk Han, Jang-Seong Kim
-
Publication number: 20090041250Abstract: An authentication method is provided in which a first portable device generates and transmits a first random number and a first timestamp to a first USIM in the first portable device; the first USIM calculates a first sign for the first portable device; the first portable device requests authentication for authenticated communication from a second portable device through transmission of the first random number, the first timestamp, and the first sign to the second portable device; the second portable device generates a second random number and a second timestamp and transmits the information to a second USIM in the second portable device; the second USIM generates a second sign for the second portable device and a second personal key which the second portable device transmits to the first portable device; the first portable device then transmits the information to the first USIM which generates a first personal key for authenticated communication.Type: ApplicationFiled: August 7, 2008Publication date: February 12, 2009Applicants: SAMSUNG ELECTRONICS CO., LTD., INFORMATION AND COMMUNICATIONS UNIVERSITY RESEARCH AND COOPERATION GROUPInventors: Young-Jun Park, Min-Young Ahn, Kug Shin, Kwang-Jo Kim, Kyu-Suk Han
-
Patent number: 5796837Abstract: The apparatus for generating a secure substitution-box immune to differential and linear cryptanalysises comprises a preprocessor for exchanging a location by the unit of bit while passing the input of 64 bits data to be protected; a parity checker for obtaining 56 bits key information by passing the input of the 64 bits key by byte unit; a key expander for repetitive operation for generating 48 bits information upon receiving the key information; a first to sixteenth operating portion for performing the 16 times of operation for one data from the preprocessor while mixing the data with an expanding key information from the key expander; and a postprocessor for generating an output signal of 64 bits data upon receiving an operated result from the first to sixteenth operating portion.Type: GrantFiled: December 26, 1996Date of Patent: August 18, 1998Assignee: Electronics and Telecommunications Research InstituteInventors: Kwang Jo Kim, Sang Jin Lee, Sang Joon Park, Seung Cheol Goh, Dai Ki Lee