Patents by Inventor Nam-su Jho

Nam-su Jho has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11791997
    Abstract: A method and an apparatus for generating a secret key for encrypted communication using a synchronized neural network, which includes: generating initial codewords based on a bit string of weight values of the synchronized neural network and transmitting a first partial codeword of the initial codewords to a device of another party; receiving a second partial codeword generated by the device of the other party and combining final codewords based on the second partial codeword received from the device of the party and the bit string of the weight values; performing an error correction on the combined final codewords and transmitting first restoration success information according to the error correction to the device of the other party; and receiving second restoration success information from the device of the other party and generating the secret key based on the restoration success information of the device of the other party, are provided.
    Type: Grant
    Filed: April 23, 2021
    Date of Patent: October 17, 2023
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Juyoung Kim, Taek-Young Youn, Ku Young Chang
  • Publication number: 20230259641
    Abstract: Disclosed are an encryption database device, method, and system. The encryption database device includes a memory configured to store and read information, and a processor configured to control the storing and reading of the memory, wherein the processor is configured to allocate blocks to the memory and store at least one ciphertext for plaintext for each of the blocks, generate mapping information associating order information of the plaintext with block information obtained by encrypting a start position of the block in which the ciphertext is stored, access the block associated with the order information corresponding to a search range of the plaintext requested by a client using the mapping information, and respond with information related to the ciphertext of the accessed block to the client.
    Type: Application
    Filed: January 6, 2023
    Publication date: August 17, 2023
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Seung Kwang LEE, Nam Su JHO
  • Publication number: 20230239142
    Abstract: Disclosed herein is a method for encoding order information. The method may include generating multiple binary trees, preparing multiple different secret keys, determining a binary tree corresponding to any one secret key selected from among the multiple secret keys, and encoding the order information of the determined binary tree.
    Type: Application
    Filed: January 17, 2023
    Publication date: July 27, 2023
    Inventors: Seung-Kwang LEE, Do-Young CHUNG, Nam-Su JHO
  • Publication number: 20220294620
    Abstract: Disclosed herein are a key generation apparatus and method based on machine learning. The key generation method includes generating, by first and second key generation apparatuses, first and second commit values, and uploading the first commit value and the second commit value to an external repository, training, by the first and second key generation apparatuses, a neural network so as to match weight values with each other, sharing, by the first and second key generation apparatuses, the first and second commit values with each other, comparing shared first and second commit values with uploaded commit values, and then verifying the commit values, and when verification of the commit values has succeeded, generating, by the first and second key generation apparatuses, hash values using the matched weight value, verifying whether the hash values are identical to each other, and generating a session secret key based on a result of verification.
    Type: Application
    Filed: November 4, 2021
    Publication date: September 15, 2022
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Nam-Su JHO, Ju-Young KIM, Ku-Young CHANG
  • Patent number: 11403284
    Abstract: A method of providing a search index based on a Bloom filter in a distributed data sharing environment based a block chain includes generating, by a data generating device, Bloom filters used as the search index on the basis of a hash value calculated by applying a hash function to a keyword set for searching for data which is to be shared, generating, by a block providing server, a new block on the basis of the Bloom filters and the data received from the data generating device and performing proof of work (PoW) on the new block, for adding the new block to the block chain, and distributing, by a block distributing server, block chain data including the new block added to the block chain.
    Type: Grant
    Filed: March 6, 2020
    Date of Patent: August 2, 2022
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Nam Su Jho, Ju Young Kim, Taek Young Youn, Ku Young Chang
  • Publication number: 20210336779
    Abstract: A method and an apparatus for generating a secret key for encrypted communication using a synchronized neural network, which includes: generating initial codewords based on a bit string of weight values of the synchronized neural network and transmitting a first partial codeword of the initial codewords to a device of another party; receiving a second partial codeword generated by the device of the other party and combining final codewords based on the second partial codeword received from the device of the party and the bit string of the weight values; performing an error correction on the combined final codewords and transmitting first restoration success information according to the error correction to the device of the other party; and receiving second restoration success information from the device of the other party and generating the secret key based on the restoration success information of the device of the other party, are provided.
    Type: Application
    Filed: April 23, 2021
    Publication date: October 28, 2021
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su JHO, Juyoung KIM, Taek-Young YOUN, Ku Young CHANG
  • Publication number: 20210056234
    Abstract: Disclosed herein is a method of operating a data management apparatus. The method may include segmenting, by a client device, data into multiple data blocks, generating, by the client device, tags corresponding to the multiple data blocks, generating, by the client device, a representative value by accumulating the tags, generating, by the client device, a client signature value by signing the representative value and a counter value corresponding to the last updated data block, among the multiple data blocks, and transmitting, by the client device, the data and the client signature value to a server.
    Type: Application
    Filed: August 7, 2020
    Publication date: February 25, 2021
    Inventors: Taek-Young YOUN, Nam-Su JHO, Dae-Sung MOON, Ik-Kyun KIM, Seung-Hun JIN
  • Patent number: 10902144
    Abstract: In the present invention, by providing an apparatus for securing data comprising a memory for storing information for data processing, a processor configured to partition original data into a plurality of partial data and generate a plurality of divided data by randomly determining positions of each of the plurality of partial data within the original data, and a communication interface configured to transmit each of the plurality of divided data to each of a plurality of servers, respectively, if an attacker obtains a portion of the divided data, it prevents the entire original data from being restored, and the legitimate user can restore the original data accurately even if some divided data is corrupted, and provides an efficient data polymorphic dividing technique that can minimize the amount of calculation required to secure data.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: January 26, 2021
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Taek-Young Youn, Dae Sung Moon, Ik Kyun Kim, Seung Hun Jin
  • Publication number: 20200310652
    Abstract: A method for secure distributed data management for dynamic data includes segmenting original data into multiple pieces, generating state information pertaining to row-based data configured with data blocks, and generating additional information for recovering the state information and the row-based data. The data blocks, corresponding to the segmented data, are stored in data servers, and each of the data servers stores data blocks selected at an interval corresponding to the number of data servers in order to store the segmented data.
    Type: Application
    Filed: February 19, 2020
    Publication date: October 1, 2020
    Inventors: Taek-Young YOUN, Nam-Su JHO, Dae-Sung MOON, Ik-Kyun KIM, Seung-Hun JIN
  • Publication number: 20200285634
    Abstract: A method of providing a search index based on a Bloom filter in a distributed data sharing environment based a block chain includes generating, by a data generating device, Bloom filters used as the search index on the basis of a hash value calculated by applying a hash function to a keyword set for searching for data which is to be shared, generating, by a block providing server, a new block on the basis of the Bloom filters and the data received from the data generating device and performing proof of work (PoW) on the new block, for adding the new block to the block chain, and distributing, by a block distributing server, block chain data including the new block added to the block chain.
    Type: Application
    Filed: March 6, 2020
    Publication date: September 10, 2020
    Inventors: Nam Su JHO, Ju Young KIM, Taek Young YOUN, Ku Young CHANG
  • Patent number: 10515225
    Abstract: The present invention relates to a method and device for verifying data ownership. The user may verify whether the server actually owns the data to be uploaded by him, and the server may simultaneously verify whether the user actually owns the data.
    Type: Grant
    Filed: June 10, 2016
    Date of Patent: December 24, 2019
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Taek-Young Youn, Keonwoo Kim, Ku Young Chang, Nam-Su Jho
  • Patent number: 10270588
    Abstract: Provided are a method and a system for an additive homomorphic encryption scheme with operation error detection functionality. A plaintext is obtained by decrypting a ciphertext encrypted based on a homomorphic encryption technique and subjected to an operation and lower setting bits corresponding to additional secret information included in a final private-key are extracted as plaintext information from the acquired plaintext. An operation error check is performed on the remaining bits other than the lower setting bits in the acquired plaintext.
    Type: Grant
    Filed: May 5, 2016
    Date of Patent: April 23, 2019
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Taek-Young Youn, Nam-Su Jho, Ku Young Chang
  • Publication number: 20190065776
    Abstract: In the present invention, by providing an apparatus for securing data comprising a memory for storing information for data processing, a processor configured to partition original data into a plurality of partial data and generate a plurality of divided data by randomly determining positions of each of the plurality of partial data within the original data, and a communication interface configured to transmit each of the plurality of divided data to each of a plurality of servers, respectively, if an attacker obtains a portion of the divided data, it prevents the entire original data from being restored, and the legitimate user can restore the original data accurately even if some divided data is corrupted, and provides an efficient data polymorphic dividing technique that can minimize the amount of calculation required to secure data.
    Type: Application
    Filed: August 27, 2018
    Publication date: February 28, 2019
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su JHO, Taek-Young YOUN, Dae Sung MOON, Ik Kyun KIM, Seung Hun JIN
  • Patent number: 10025811
    Abstract: In a client, an encryption key is created using plain text data, a first tag is created using the encryption key, and the plain text data are encrypted under the encryption key to create encrypted data. The first tag is transmitted to the server to confirm whether the encrypted data is duplicated and after transmitting the first tag, the encrypted data is transmitted to the server in accordance with the request of the encrypted data from the server.
    Type: Grant
    Filed: February 23, 2016
    Date of Patent: July 17, 2018
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Keonwoo Kim, Taek-Young Youn, Ku Young Chang, Nam-Su Jho
  • Publication number: 20180123800
    Abstract: A method for storing an encrypted file by a server is provided. The server receives a first encrypted file identifier from a client. The server generates a random number and transmits the random number to the client, when the first encrypted file identifier is present in a first database. The server generates a first verification value using the random number. In addition, the server confirms whether or not the client possesses a first encrypted file corresponding to the first encrypted file identifier among encrypted files stored in a second database by comparing the first verification value and a second verification value based on the random number with each other, when receiving the second verification value from the client.
    Type: Application
    Filed: May 3, 2017
    Publication date: May 3, 2018
    Inventors: Keonwoo KIM, Taek-Young YOUN, Ku Young CHANG, Nam-Su JHO
  • Publication number: 20170193245
    Abstract: The present invention relates to a method and device for verifying data ownership. The user may verify whether the server actually owns the data to be uploaded by him, and the server may simultaneously verify whether the user actually owns the data.
    Type: Application
    Filed: June 10, 2016
    Publication date: July 6, 2017
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Taek-Young YOUN, Keonwoo KIM, Ku Young CHANG, Nam-Su JHO
  • Publication number: 20170193032
    Abstract: In a client, an encryption key is created using plain text data, a first tag is created using the encryption key, and the plain text data are encrypted under the encryption key to create encrypted data. The first tag is transmitted to the server to confirm whether the encrypted data is duplicated and after transmitting the first tag, the encrypted data is transmitted to the server in accordance with the request of the encrypted data from the server.
    Type: Application
    Filed: February 23, 2016
    Publication date: July 6, 2017
    Inventors: Keonwoo KIM, Taek-Young YOUN, Ku Young CHANG, Nam-Su JHO
  • Publication number: 20160330017
    Abstract: Provided are a method and a system for an additive homomorphic encryption scheme with operation error detection functionality. A plaintext is obtained by decrypting a ciphertext encrypted based on a homomorphic encryption technique and subjected to an operation and lower setting bits corresponding to additional secret information included in a final private-key are extracted as plaintext information from the acquired plaintext. An operation error check is performed on the remaining bits other than the lower setting bits in the acquired plaintext.
    Type: Application
    Filed: May 5, 2016
    Publication date: November 10, 2016
    Inventors: Taek-Young YOUN, Nam-Su JHO, Ku Young CHANG
  • Patent number: 9374220
    Abstract: The present invention relates to a technique which provides a function of compressed encryption large pieces of plaintext information in a single ciphertext in order to improve a space efficiency of the encryption data which occupies most of a storage space to design an efficient SHE technique which is a base of the FHE technique design. More specifically, the present invention relates to a technique which is designed to improve a structure in which only one bit is encrypted/decrypted in the technique of the prior art to encrypt/decrypt multiple bit information to improve the space efficiency for storing a ciphertext.
    Type: Grant
    Filed: February 6, 2014
    Date of Patent: June 21, 2016
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Taek Young Youn, Nam Su Jho, Jung Yeon Hwang, Ku Young Chang
  • Patent number: 9331851
    Abstract: The present invention relates to a compressed encryption and decryption apparatus comprising: an interface receiving a public key, a secret key and a compression ratio; a memory storing instructions for encryption and decryption of plaintexts; and a processor encrypting and decrypting plaintexts according to the instruction, wherein the instruction comprises instructions performing; generating an extended public key and an extended secret key by revising the public key and the secret key according to the compression ratio; outputting the extended public key; receiving compressed ciphertext; and decrypting the compressed ciphertext using modulo operation for multiplication of the extended secret key and the compressed ciphertext.
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: May 3, 2016
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Taek-Young Youn, Nam-Su Jho, Ku-Young Chang