Patents by Inventor Sang Kyun NOH

Sang Kyun NOH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11969011
    Abstract: A cigarette includes a tobacco rod, a front end plug positioned at a front end of the tobacco rod, a filter rod positioned at a rear end of the tobacco rod, and a wrapper surrounding the tobacco rod, the front end plug, and the filter rod and including at least one perforation formed in an area of the wrapper to allow air to flow to the inside of the wrapper.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: April 30, 2024
    Assignee: KT&G CORPORATION
    Inventors: Jung Seop Hwang, Dong Kyun Ko, Jae Sung Noh, Bong Su Cheong, Sang Won Choi
  • Patent number: 11944118
    Abstract: Provided is an aerosol-generating article including a wrapper which is discolored as the aerosol-generating material is heated, the aerosol-generating article including: a tobacco rod; a front-end plug arranged on a side of the tobacco rod; a filter rod arranged on the other side of the tobacco rod; and the wrapper surrounding the tobacco rod, the front-end plug, and the filter rod, wherein the wrapper includes a thermochromic material which is heated and discolored by an aerosol-generating device when the aerosol-generating article is inserted into the aerosol-generating device.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: April 2, 2024
    Assignee: KT&G CORPORATION
    Inventors: Bong Su Cheong, Dong Kyun Ko, Jae Sung Noh, Sang Won Choi, Jung Seop Hwang
  • Publication number: 20190152066
    Abstract: The present disclosure relates to a spherical movable device and a gesture recognition method thereof. The spherical movable device has a drive body and a sphere loosely coupled with each other so that a contact region of the drive body where the drive body makes contact with the sphere may not make contact with the sphere depending on a movement, or a non-contact region of the drive body where the drive body does not make contact with the sphere may make contact with the sphere depending on a movement. Thus, since gestures of the spherical movable device may be recognized on the basis of abundant and reliable movement status information, various gestures may be recognized with high accuracy.
    Type: Application
    Filed: January 17, 2019
    Publication date: May 23, 2019
    Inventors: Hee Man PARK, Sang Kyun NOH, Yong Ju KIM
  • Patent number: 8955124
    Abstract: Provided are an apparatus, system and method for detecting malicious code inserted into a normal process in disguise. The apparatus includes a malicious code detection module for extracting information on a thread generated by a process running on a computer system to identify code related to the thread, preliminarily determining whether or not the identified code is malicious and extracting the code preliminarily determined to be malicious; and a forcible malicious code termination module for finally determining the code as malicious code based on an analysis result of behavior of the extracted code executed in a virtual environment and forcibly terminating execution of the code.
    Type: Grant
    Filed: January 5, 2011
    Date of Patent: February 10, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yo Sik Kim, Sang Kyun Noh, Yoon Jung Chung, Dong Soo Kim, Won Ho Kim, Yu Jung Han, Young Tae Yun, Ki Wook Sohn, Cheol Won Lee
  • Patent number: 8813226
    Abstract: A defense method and device against intelligent bots using masqueraded virtual machine information are provided. The method includes performing global hooking on a virtual machine detection request transmitted by a process, determining, on the basis of pre-stored malicious process information, whether or not the process transmitting the virtual machine detection request corresponds to a malicious process, and when the process is found to correspond to the malicious process as a result of the determination, determining that the process is generated by the intelligent bot, and returning the masqueraded virtual machine information to the process.
    Type: Grant
    Filed: September 10, 2010
    Date of Patent: August 19, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yoon Jung Chung, Yo Sik Kim, Won Ho Kim, Dong Soo Kim, Sang Kyun Noh, Young Tae Yun, Cheol Won Lee
  • Patent number: 8706866
    Abstract: Provided are a virtual server and method for identifying a zombie, and a sinkhole server and method for integratedly managing zombie information. The virtual server includes an authentication processing module authenticating a host using a CAPTCHA test and providing a cookie to the authenticated host when a web server access request message received from the host does not include a cookie, a cookie value verification module for extracting a cookie value from the web server access request message and verifying the extracted cookie value when the web server access request message includes a cookie, a web page access inducement module for inducing the host to access a web server when the cookie value is verified, and a zombie identification module for blocking access of the host when the cookie value is not verified, and identifying the host as a zombie when the number of blocking operations exceeds a threshold value.
    Type: Grant
    Filed: January 6, 2011
    Date of Patent: April 22, 2014
    Assignee: Eletronics and Telecommunications Research Institute
    Inventors: Sang Kyun Noh, Young Tae Yun, Dong Soo Kim, Yo Sik Kim, Yoon Jung Chung, Won Ho Kim, Yu Jung Han, Cheol Won Lee
  • Publication number: 20110270969
    Abstract: Provided are a virtual server and method for identifying a zombie, and a sinkhole server and method for integratedly managing zombie information. The virtual server includes an authentication processing module authenticating a host using a CAPTCHA test and providing a cookie to the authenticated host when a web server access request message received from the host does not include a cookie, a cookie value verification module for extracting a cookie value from the web server access request message and verifying the extracted cookie value when the web server access request message includes a cookie, a web page access inducement module for inducing the host to access a web server when the cookie value is verified, and a zombie identification module for blocking access of the host when the cookie value is not verified, and identifying the host as a zombie when the number of blocking operations exceeds a threshold value.
    Type: Application
    Filed: January 6, 2011
    Publication date: November 3, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Sang Kyun Noh, Young Tae Yun, Dong Soo Kim, Yo Sik Kim, Yoon Jung Chung, Won Ho Kim, Yu Jung Han, Cheol Won Lee
  • Publication number: 20110271343
    Abstract: Provided are an apparatus, system and method for detecting malicious code inserted into a normal process in disguise. The apparatus includes a malicious code detection module for extracting information on a thread generated by a process running on a computer system to identify code related to the thread, preliminarily determining whether or not the identified code is malicious and extracting the code preliminarily determined to be malicious; and a forcible malicious code termination module for finally determining the code as malicious code based on an analysis result of behavior of the extracted code executed in a virtual environment and forcibly terminating execution of the code.
    Type: Application
    Filed: January 5, 2011
    Publication date: November 3, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yo Sik Kim, Sang Kyun Noh, Yoon Jung Chung, Dong Soo Kim, Won Ho Kim, Yu Jung Han, Young Tae Yun, Ki Wook Sohn, Cheol Won Lee
  • Publication number: 20110271342
    Abstract: A defense method and device against intelligent bots using masqueraded virtual machine information are provided. The method includes performing global hooking on a virtual machine detection request transmitted by a process, determining, on the basis of pre-stored malicious process information, whether or not, the process transmitting the virtual machine detection request corresponds to a malicious process, and when the process is found to correspond to the malicious process as a result of the determination, determining that the process is generated by the intelligent bot, and returning the masqueraded virtual machine information to the process.
    Type: Application
    Filed: September 10, 2010
    Publication date: November 3, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yoon Jung CHUNG, Yo Sik KIM, Won Ho KIM, Dong Soo KIM, Sang Kyun NOH, Young Tae YUN, Cheol Won LEE
  • Publication number: 20100169973
    Abstract: There is provided a system and method for detecting unknown malicious code by analyzing kernel based system actions. More particularly, the system and method provides an advantage of actively countering unknown malicious code or viruses by monitoring kernel based system events in real time, organizing action data based on the collected event data, determining whether the action data corresponds to predetermined malicious actions, backtracking a subject of a malicious action when the action data is determined to correspond to the malicious action, and processing the malicious action.
    Type: Application
    Filed: October 1, 2009
    Publication date: July 1, 2010
    Inventors: Ki Hong Kim, Ga Ram Jung, Hyun Cheol Jeong, Chae Tae Im, Seung Goo Ji, Sang Kyun Noh, Joo Hyung Oh
  • Publication number: 20100162350
    Abstract: The present invention relates to a security system of managing IRC and HTTP botnets and a method therefor. More specifically, the present invention relates to a system and a method that detects a botnet in an Internet service provider network to store information related to the detected botnet in a database and performs security management of IRC and HTTP botnets, including a botnet management security management (BMSM) system, configured to visualize the information related to the detected botnet and establish an against policy related to the detected botnet.
    Type: Application
    Filed: August 20, 2009
    Publication date: June 24, 2010
    Applicant: Korea Information Security Agency
    Inventors: Hyun Cheol JEONG, Chae Tae IM, Seung Goo JI, Sang Kyun NOH, Joo Hyung OH