Patents by Inventor Nam-su Jho

Nam-su Jho has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150270958
    Abstract: Disclosed herein are a method that generates an index for an efficient range search in an encrypted DB, and a decryption apparatus and method that are capable of searching for desired data and decrypting search results using the index generation method. The presented index generation method includes preparing a private key and a one-way function, calculating a tag for an input plaintext interval using the private key and the one-way function, and dividing the plaintext interval into a plurality of partial intervals, encrypting information of a partial interval including plaintext using the tag, and then generating an encrypted index.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 24, 2015
    Inventors: Nam-Su JHO, Ku-Young CHANG, Taek-Young YOUN, Sung-Kyong UN
  • Patent number: 9087277
    Abstract: A dynamic multi-dimensional code generation and recognition apparatus in which time information and visual recognition information are combined, and a method thereof are provided. According to the present invention, a dynamic multi-dimensional code or a time-variant code including visual recognition information which is associated with source information and changed over time is provided. Accordingly, users may easily ascertain existence of the multi-dimensional code and intended contents of the source information.
    Type: Grant
    Filed: June 26, 2012
    Date of Patent: July 21, 2015
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jung-Yeon Hwang, Dowon Hong, Ku-Young Chang, Jeong-Woon Choi, Nam-Su Jho, Taek-Young Youn, Hyun-Sook Cho
  • Publication number: 20150180659
    Abstract: The present invention relates to a compressed encryption and decryption apparatus comprising: an interface receiving a public key, a secret key and a compression ratio; a memory storing instructions for encryption and decryption of plaintexts; and a processor encrypting and decrypting plaintexts according to the instruction, wherein the instruction comprises instructions performing; generating an extended public key and an extended secret key by revising the public key and the secret key according to the compression ratio; outputting the extended public key; receiving compressed ciphertext; and decrypting the compressed ciphertext using modulo operation for multiplication of the extended secret key and the compressed ciphertext.
    Type: Application
    Filed: June 23, 2014
    Publication date: June 25, 2015
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Taek-Young YOUN, Nam-Su JHO, Ku-Young CHANG
  • Patent number: 8966273
    Abstract: A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature mechanisms providing the existing known controllable linkability but can make a revocation method simple by outputting a short signature and providing excellent operation efficiency at the time of signature generation, signature verification, and revocation on smart terminals, and can be widely applied to various anonymity-based application environments, making by making operation efficiency excellent at the time of signature generation and verification and outputting very short signature lengths.
    Type: Grant
    Filed: September 6, 2012
    Date of Patent: February 24, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jung Yeon Hwang, Dowon Hong, Ku-Young Chang, Jeong Woon Choi, Nam Su Jho, Taek Young Youn
  • Patent number: 8873749
    Abstract: A multi-user searchable encryption system includes a key generation center to issue a private secret key to a user and trace information regarding a user who has generated an index, and a user terminal device to generate an index for searching for a database using the private secret key. The multi-user searchable encryption system includes a database (DB) server that verifies the index generated by the user terminal device and searches for corresponding data to the verified index.
    Type: Grant
    Filed: December 5, 2012
    Date of Patent: October 28, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Ku Young Chang, Do Won Hong
  • Publication number: 20140270159
    Abstract: The present invention relates to a technique which provides a function of compressed encryption large pieces of plaintext information in a single ciphertext in order to improve a space efficiency of the encryption data which occupies most of a storage space to design an efficient SHE technique which is a base of the FHE technique design. More specifically, the present invention relates to a technique which is designed to improve a structure in which only one bit is encrypted/decrypted in the technique of the prior art to encrypt/decrypt multiple bit information to improve the space efficiency for storing a ciphertext.
    Type: Application
    Filed: February 6, 2014
    Publication date: September 18, 2014
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Taek Young YOUN, Nam Su JHO, Jung Yeon HWANG, Ku Young CHANG
  • Publication number: 20140245019
    Abstract: Disclosed herein are an apparatus for generating the privacy-protecting document authentication information and a method of performing privacy-protecting document authentication. The apparatus for generating the privacy-protecting document authentication information includes an electronic signature information generation unit, a multi-dimensional code generation unit, and a multi-dimensional code output unit. The electronic signature information generation unit generates electronic signature information for the content of an input document. The multi-dimensional code generation unit generates a multi-dimensional code corresponding to the generated electronic signature information. The multi-dimensional code output unit outputs the generated multi-dimensional code onto the document.
    Type: Application
    Filed: December 27, 2013
    Publication date: August 28, 2014
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jung-Yeon HWANG, Ku-Young CHANG, Nam-Su JHO, Taek-Young YOUN, Hyun-Sook CHO
  • Patent number: 8817978
    Abstract: An order-preserving encryption apparatus includes an initializer for setting a total space of a ciphertext with respect to a total space of a plaintext by considering security of the ciphertext, and setting a secret key for encryption and a pseudo-random number generator for generation of a pivot. Further, the order-preserving encryption apparatus includes a pivot generator for applying the secret key to the established pseudo-random number generator to generate a pivot for the plaintext to be encrypted. Further, the order-preserving encryption apparatus includes a ciphertext generator for generating information about size of a bit constituting the ciphertext by comparing the generated pivot and the plaintext; and a plaintext adjusting unit for adjusting a magnitude of the total plaintext space and a magnitude of the plaintext according to the ciphertext.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: August 26, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Do Won Hong
  • Patent number: 8812867
    Abstract: Disclosed is a method for searchable symmetric encryption. The method for performing searchable encryption and searching for encrypted data includes: setting all necessary variables and preparing a secret key necessary for encryption; encrypting a data using the secret key and a given data and generating an index to be used for later search, to store the encrypted data and the index; generating a trapdoor to be used to search the encrypted data by using the secret key and a keyword to be used for the searching; and searching a desired data using the generated trapdoor and the stored index.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: August 19, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Do-Won Hong, Hyun-Sook Cho
  • Patent number: 8745696
    Abstract: There are provided an apparatus and a method for privacy protection in association rule mining among data mining technologies. An apparatus for privacy protection in association rule mining according to an embodiment of the present invention comprises: a fake transaction inserter that generates fake transactions of a predetermined number each having a predetermined length and inserts the fake transactions between a plurality of transactions comprised in an original data set to generate a first virtual data set; and a distortion transaction generator that generates a second virtual data set by converting data of the transaction of the first virtual data set with a predetermined probability.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: June 3, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Abedelaziz Mohaisen, Do-Won Hong
  • Patent number: 8639927
    Abstract: A method of user-authenticated quantum key distribution according to the present invention shares a position having the same basis without making public basis information using previously shared secret keys and authenticates a quantum channel by confirming whether there is the same measured outcome at that position, in order to secure unconditional security of BB84 quantum key distribution (QKD) protocols vulnerable to man-in-the-middle attack.
    Type: Grant
    Filed: November 23, 2010
    Date of Patent: January 28, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jeong-Woon Choi, Ku-Young Chang, Nam-Su Jho, Do-Won Hong
  • Publication number: 20130091360
    Abstract: A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature mechanisms providing the existing known controllable linkability but can make a revocation method simple by outputting a short signature and providing excellent operation efficiency at the time of signature generation, signature verification, and revocation on smart terminals, and can be widely applied to various anonymity-based application environments, making by making operation efficiency excellent at the time of signature generation and verification and outputting very short signature lengths.
    Type: Application
    Filed: September 6, 2012
    Publication date: April 11, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jung Yeon HWANG, Dowon HONG, Ku-Young CHANG, Jeong Woon CHOI, Nam Su JHO, Taek Young YOUN
  • Publication number: 20130055393
    Abstract: A mobility technology for strengthening safety for an invasion of privacy caused by leakage of contact information is provided. A privacy protection system may include an acquisition attempt detecting unit to detect an external communication terminal that attempts to acquire contact information included in the profile, and an access controller to provide the detected external communication terminal with a right to use the contact information, and to determine whether the contact information is to be provided.
    Type: Application
    Filed: August 24, 2012
    Publication date: February 28, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Taek Young Youn, Do Won Hong, Ku Young Chang, Nam Su Jho, Jeong Woon Choi, Jung Yeon Hwang
  • Publication number: 20130020393
    Abstract: A dynamic multi-dimensional code generation and recognition apparatus in which time information and visual recognition information are combined, and a method thereof are provided. According to the present invention, a dynamic multi-dimensional code or a time-variant code including visual recognition information which is associated with source information and changed over time is provided. Accordingly, users may easily ascertain existence of the multi-dimensional code and intended contents of the source information.
    Type: Application
    Filed: June 26, 2012
    Publication date: January 24, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jung-Yeon HWANG, Dowon Hong, Ku-Young Chang, Jeong-Woon Choi, Nam-Su Jho, Taek-Young Youn, Hyun-Sook Cho
  • Publication number: 20120163586
    Abstract: An order-preserving encryption apparatus includes an initializer for setting a total space of a ciphertext with respect to a total space of a plaintext by considering security of the ciphertext, and setting a secret key for encryption and a pseudo-random number generator for generation of a pivot. Further, the order-preserving encryption apparatus includes a pivot generator for applying the secret key to the established pseudo-random number generator to generate a pivot for the plaintext to be encrypted. Further, the order-preserving encryption apparatus includes a ciphertext generator for generating information about size of a bit constituting the ciphertext by comparing the generated pivot and the plaintext; and a plaintext adjusting unit for adjusting a magnitude of the total plaintext space and a magnitude of the plaintext according to the ciphertext.
    Type: Application
    Filed: December 21, 2011
    Publication date: June 28, 2012
    Applicant: Electonics and Telecommunications Research Institute
    Inventors: Nam-Su JHO, Do Won Hong
  • Publication number: 20120158734
    Abstract: A data management apparatus includes an index generation unit configured to subdivide an entire interval of data into bucket intervals, allocate indices for the respective bucket intervals, transform the bucket intervals having the allocated indices into bucket intervals of specific lengths, and generate bucket-based indices for pieces of data included in the bucket intervals of the specific lengths. The data management apparatus further includes a data management unit configured to transmit the encrypted data and the bucket-based indices to a server-side data management apparatus in order to store the encrypted data, transmit a user query to the server-side data management apparatus in order to search for a desired encrypted data, and decrypt encrypted data corresponding to the user query from the server-side data management apparatus. The user query includes the index of first bucket interval and the index of second bucket interval neighboring to the first bucket interval.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 21, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Ku Young CHANG, Nam-Su JHO, Taek Young YOUN, Do Won HONG
  • Publication number: 20110145594
    Abstract: Disclosed is a method for searchable symmetric encryption. The method for performing searchable encryption and searching for encrypted data includes: setting all necessary variables and preparing a secret key necessary for encryption; encrypting a data using the secret key and a given data and generating an index to be used for later search, to store the encrypted data and the index; generating a trapdoor to be used to search the encrypted data by using the secret key and a keyword to be used for the searching; and searching a desired data using the generated trapdoor and the stored index.
    Type: Application
    Filed: December 7, 2010
    Publication date: June 16, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su JHO, Do-Won HONG, Hyun-Sook CHO
  • Publication number: 20110145929
    Abstract: There are provided an apparatus and a method for privacy protection in association rule mining among data mining technologies. An apparatus for privacy protection in association rule mining according to an embodiment of the present invention comprises: a fake transaction inserter that generates fake transactions of a predetermined number each having a predetermined length and inserts the fake transactions between a plurality of transactions comprised in an original data set to generate a first virtual data set; and a distortion transaction generator that generates a second virtual data set by converting data of the transaction of the first virtual data set with a predetermined probability.
    Type: Application
    Filed: December 15, 2010
    Publication date: June 16, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Nam-Su JHO, Abedelaziz Mohaisen, Do-Won Hong
  • Patent number: RE45191
    Abstract: A user key management method for a broadcast encryption includes assigning node path identifiers (IDs) to nodes arranged in sequence; assigning random seed value keys to the nodes according to the node path IDs; generating key values by repeatedly applying a hash function to the assigned random seed value keys; and assigning the generated key values to the nodes in sequence. Accordingly, it is possible to reduce the transmission overhead that is most important matter in the broadcast encryption to less than the number of the revoked users. Further, there is an advantage that the transmission overhead of the exemplary embodiments of the present invention is remarkably reduced compared with the Subset Difference method.
    Type: Grant
    Filed: April 18, 2013
    Date of Patent: October 14, 2014
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Weon-il Jin, Dae-youb Kim, Hwan-joon Kim, Sung-joon Park, Jung-hee Cheon, Myung-hwan Kim, Nam-su Jho, Eun-sun Yoo
  • Patent number: RE45213
    Abstract: A user key management method for a broadcast encryption includes assigning node path identifiers (IDs) to nodes arranged in sequence; assigning random seed value keys to the nodes according to the node path IDs; generating key values by repeatedly applying a hash function to the assigned random seed value keys; and assigning the generated key values to the nodes in sequence. Accordingly, it is possible to reduce the transmission overhead that is most important matter in the broadcast encryption to less than the number of the revoked users. Further, there is an advantage that the transmission overhead of the exemplary embodiments of the present invention is remarkably reduced compared with the Subset Difference method.
    Type: Grant
    Filed: April 22, 2013
    Date of Patent: October 28, 2014
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Weon-il Jin, Dae-youb Kim, Hwan-joon Kim, Sung-joon Park, Jung-hee Cheon, Myung-hwan Kim, Nam-su Jho, Eun-sun Yoo