Patents by Inventor Kyo II Chung

Kyo II Chung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100277279
    Abstract: A Radio Frequency Identification (RFID) privacy protection method and apparatus is provided. The RFID privacy protection method includes: receiving a password of a tag; reading a code value from the tag; performing authentication of a user with respect to the tag using the code value and the password; and deactivating the tag electrically or physically based on a result of the performing.
    Type: Application
    Filed: December 10, 2008
    Publication date: November 4, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Ho Won Kim, Kyo II Chung
  • Patent number: 7797498
    Abstract: A garbage collection apparatus and a method using the same are disclosed. The garbage collection method comprises: making a list of objects that must be deleted from a memory; calculating a predetermined residual time for responding to an external command; deleting the listed objects from the memory during the residual time; and storing a list of remaining objects that have not been deleted from the memory during the residual time. Accordingly, communication failure due to a response delay or timeout is prevented by distributed processing loads of garbage collection.
    Type: Grant
    Filed: August 3, 2004
    Date of Patent: September 14, 2010
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Im Young Jung, Sung Ik Jun, Kyo II Chung
  • Publication number: 20100067690
    Abstract: Provided is a scalar multiplication method unified with a simple power analysis (SPA) resistant left-to-right recording in a crypto system based on an elliptic curve and a pairing. The scalar multiplication method includes: recording an L-digit secret key k? from a radix-r n-digit secret key k by comparing two successive elements with each other from the most significant digit with duplication allowed in order to generate the L-digit secret key k?; and performing scalar multiplication between the secret key k and a point P on an elliptic curve to output a scalar multiplication value Q=kP using the secret key k?.
    Type: Application
    Filed: June 22, 2007
    Publication date: March 18, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Dong-Guk Han, Doo-Ho Choi, Ho-Won Kim, Kyo-II Chung, Sung-Kyoung Kim, Jongin Lim
  • Publication number: 20090122194
    Abstract: Provided are a method and apparatus for reducing picture, which can obtain a reduced picture by previously creating a picture reduction map that stores effective-pixel locations selected according to a picture reduction scale and a picture reduction algorithm, and then matching an input picture with the picture reduction map. The method for reducing picture includes constructing a picture reduction map according to a size of an incoming picture, and generating a sub-picture for reduction of an input picture by using the picture reduction map.
    Type: Application
    Filed: June 20, 2008
    Publication date: May 14, 2009
    Applicant: Electronics & Telecommunications Research Institute
    Inventors: Sung-Uk Jung, Yun-Su Chung, Ki-Young Moon, Kyo-II Chung
  • Publication number: 20080130962
    Abstract: A method and apparatus for extracting a face feature to construct a face search system having a high recognition rate are provided. The method includes calculating an average image of each of a plurality of candidates having one or more face images to which different weights are given according to an order in which the face images are acquired and calculating a total average image of all face images of the plurality of candidates, calculating a between-class scatter matrix based on a difference between each candidate's average image and the total average image and a within-class scatter matrix based on a difference between each candidate's average image and each candidate's predetermined face image of the one or more face images, and generating a base vector that maximizes a criterion defined by a ratio between the between-class scatter matrix and the within-class scatter matrix.
    Type: Application
    Filed: July 26, 2007
    Publication date: June 5, 2008
    Inventors: Yongjin LEE, Ki-Young MOON, Kyo-II CHUNG
  • Publication number: 20080068137
    Abstract: An apparatus and method for unifying multiple radio frequency identifications (RFIDs) are provided. The apparatus includes: a data arithmetic operator collecting RFIDs, storing the collected RFIDs, and repeatedly performing the collection and storage when a time out event occurs; a hash arithmetic operator concatenating the RFIDs, hashing the concatenated RFIDs, and outputting a hashed single value; a random number generator generating a random number used as an encryption factor to public-key-encrypt the single value; an RFID tag processor controlling locking/unlocking of the RFID tags; a public key arithmetic operator public-key-encrypting the single value using a predetermined public key and the random number as encryption factors and outputting a cipher text; and a radio frequency communicator converting the cipher text into a radio signal and sending the radio signal to a radio section. Information transmitted to a radio section is a cipher text obtained by public-key-encrypting the single value.
    Type: Application
    Filed: October 20, 2006
    Publication date: March 20, 2008
    Inventors: You Kang, Ho Kim, Kyo II Chung
  • Publication number: 20080069410
    Abstract: An iris recognition method is provided. In the iris recognition method, binary image data is obtained by receiving eye image data and filtering the received eye image data using a predetermined threshold value. Then, candidate center search regions are searched for finding a pupil center using profile information of rows and columns of the binarized image. a pupil boundary and a center point are detected by performing a mask operation using 8 pupil boundary mask templates for each of concentric circles formed of pointes in the searched candidate center search regions as candidate pupil centers and different radiuses. An iris boundary region is detected by performing a masking operation using 6 iris boundary mask templates corresponding to 6 locations for concentric circles formed of the pupil center as an origin and different radiuses.
    Type: Application
    Filed: February 6, 2007
    Publication date: March 20, 2008
    Inventors: Jong Gook Ko, Youn Hee Gil, Jang Hee Yoo, Kyo II Chung
  • Publication number: 20050144204
    Abstract: An apparatus and method for computing a SHA-1 hash function value are provided. The apparatus includes a first register unit including a plurality of registers that store a first bit string of predetermined lengths for generation of a hash function value; a second register unit storing input data in units of second bit strings with predetermined lengths, and sequentially outputting the second bit strings; a third register unit performing an operation on the first bit string of the plurality of registers and the second bit strings output from the second register unit so as to generate and store a third bit string, and updating first-bit string of the plurality of registers based on the third bit string; and an adding unit combining the first bit string stored in the first register unit, the first bit string of the third bit string stored in the third register unit, and the original initial values stored in the first register unit so as to obtain a hash function value.
    Type: Application
    Filed: August 12, 2004
    Publication date: June 30, 2005
    Inventors: Yun Lee, Sung Jun, Young Park, Sang Lee, Young Kim, Kyo II Chung