Patents by Inventor Sang Yeoun Lee

Sang Yeoun Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8607333
    Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.
    Type: Grant
    Filed: July 20, 2009
    Date of Patent: December 10, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun Lee, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung
  • Patent number: 8587409
    Abstract: Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode.
    Type: Grant
    Filed: March 7, 2011
    Date of Patent: November 19, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun Lee, Heyung Sub Lee, You Sung Kang, Kang Bok Lee, Su Na Choi, Hyun Seok Kim, Dong Beom Shin, Doo Ho Choi
  • Patent number: 8405487
    Abstract: A method of storing sensor data in a sensor tag is provided. The method comprises receiving new sensor data output from a sensor, comparing the received new sensor data with immediately previous sensor data to determine whether the comparison result satisfies a predetermined criterion, and storing the new sensor data in a tag memory when it is determined that the criterion is satisfied. Accordingly, efficient use of the tag memory is possible.
    Type: Grant
    Filed: December 2, 2009
    Date of Patent: March 26, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Kang-bok Lee, Sang-yeoun Lee, Heyung-sub Lee, Jong-suk Chae
  • Patent number: 8314703
    Abstract: Provided is a method and apparatus for managing a product distribution. The product distribution management method may include: reading a security key of a product from a security tag attached to the product; transferring the read security key to a security server; receiving, from the security server, first authentication information that is encrypted using the security key; receiving, from the security tag, second authentication information that is encrypted using the security key; and determining whether the security tag is duplicated, based on the first authentication information and the second authentication information.
    Type: Grant
    Filed: July 16, 2009
    Date of Patent: November 20, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Kang Bok Lee, Heyung Sub Lee, Sang Yeoun Lee, Jae Heum Lee, Dong-Beom Shin, Hyunseok Kim, Jae-young Jung, Cheol Sig Pyo, Jong-Suk Chae
  • Publication number: 20120161933
    Abstract: In a radio frequency identification (RFID) security reader, by integrating an encryption module that encrypts transmission data and a decryption module that decrypts reception data from an RFID security tag to restore the reception data to original data to a modem, an input/output time period of a processor module that processes a communication protocol in an RFID security system is minimized.
    Type: Application
    Filed: August 15, 2011
    Publication date: June 28, 2012
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Dong-Beom Shin, Heyung Sub Lee, Sang Yeoun Lee, Hyunseok Kim, Su Na Choi, Kang Bok Lee, Joo Sang Park
  • Publication number: 20110279235
    Abstract: A Radio Frequency Identification (RFID) tag and an interrogator that support a normal mode and a secure mode, and operating methods thereof are provided. The RFID tag may notify the interrogator of whether a current operating mode of the RFID tag is the normal mode or the secure mode, may perform different inventory processes based on the current operating mode, and may perform an authentication of the interrogator. Here, the RFID tag and the interrogator may also perform a mutual authentication.
    Type: Application
    Filed: May 16, 2011
    Publication date: November 17, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun LEE, Kang Bok Lee, Heyung Sub Lee, Dong Beom Shin, Hyun Seok Kim, You Sung Kang, Joo Sang Park, Cheol Sig Pyo, Jong Suk Chae
  • Publication number: 20110215908
    Abstract: Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode.
    Type: Application
    Filed: March 7, 2011
    Publication date: September 8, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun LEE, Heyung Sub LEE, You Sung KANG, Kang Bok LEE, Su Na CHOI, Hyun Seok KIM, Dong Beom SHIN, Doo Ho CHOI
  • Publication number: 20110140853
    Abstract: The present invention relates to an RFID reader and a signal receiving method thereof. The RFID reader according to one embodiment of the present invention down-converts transmission leakage signals introduced into a reader receiver and then suppresses them through a band stop filter in a low frequency band and up-converts them, thereby making it possible to effectively suppress the transmission leakage signals.
    Type: Application
    Filed: June 21, 2010
    Publication date: June 16, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jae Young JUNG, Dong Beom Shin, Sang Yeoun Lee, Gil Young Choi, Heyung Sub Lee, Jong Suk Chae
  • Publication number: 20110102151
    Abstract: Provided are an RFID reader and a method for controlling a gain thereof. The RFID reader includes an amplifier and an AGC circuit. The amplifier controls the gain of an RX signal, received from an RFID tag, in response to an AGC signal. The AGC circuit measures a signal level in an ante-preamble period of the RX signal and generates an AGC signal to control the gain of the RX signal, on the basis of the measured signal level.
    Type: Application
    Filed: July 9, 2010
    Publication date: May 5, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Dong-Beom Shin, Jae-young Jung, Sang Yeoun Lee, Gil Young Choi, Heyung Sub Lee, Jong-Suk Chae
  • Publication number: 20110037568
    Abstract: Disclosed are an RFID reader, an RFID tag, and a controlling method thereof. The RFID tag may include a state information generator to generate state information of the RFID tag, a receiver to receive an activation command including reference state information of the RFID tag, and a controller to activate the RFID tag based on the state information and the reference state information. The RFID tag may be selectively activated according to an inner state of the RFID tag.
    Type: Application
    Filed: April 22, 2009
    Publication date: February 17, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Hyunseok Kim, Heyung Sub Lee, Sang Yeoun Lee, Dong-Beom Shin, Su Na Choi, Nak Seon Seong, Cheol Sig Pyo, Jong-Suk Chae, Preishuber-Pfluegl Di Josef, Janek Di Alex, Tschische Di David
  • Publication number: 20100146273
    Abstract: Provided are a method for passive radio frequency identification (RFID) security according to a security mode. An RFID tag transmits its own current security mode to a reader and the reader drives a security protocol depending on the current security mode of the RFID tag. Also, the reader grasps the ability of the tag and then the reader drive a protocol suitable for the ability through the security mode.
    Type: Application
    Filed: September 25, 2009
    Publication date: June 10, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: You Sung KANG, Doo Ho CHOI, Yong-Je CHOI, Kyo Il CHUNG, Hyunsook CHO, Heyung Sub LEE, Sang Yeoun LEE, Kang Bok LEE, Dong-Beom SHIN, Jae-young JUNG, Cheol Sig PYO
  • Publication number: 20100141404
    Abstract: A method of storing sensor data in a sensor tag is provided. The method comprises receiving new sensor data output from a sensor, comparing the received new sensor data with immediately previous sensor data to determine whether the comparison result satisfies a predetermined criterion, and storing the new sensor data in a tag memory when it is determined that the criterion is satisfied. Accordingly, efficient use of the tag memory is possible.
    Type: Application
    Filed: December 2, 2009
    Publication date: June 10, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Kang-bok LEE, Sang-yeoun LEE, Heyung-sub LEE, Jong-suk CHAE
  • Patent number: 7706259
    Abstract: A method for implementing a redundant structure of an ATCA system via a base interface of a network system based on an ATCA standard, and the ATCA system for use in the same are disclosed. Each of routing protocol shelves and LI shelves includes two ports connected to two IPC paths provided from the base interface, such that a representative IP address is assigned to a single port to be used, performs IPC communication using the representative IP address. If a port error or link-down state occurs, the representative IP address is assigned to the other port, resulting in the implementation of stable IPC communication. If the port error or link-down state occurs in an active-mode ShMC shelf, an IPC path passing through a standby-mode ShMC shelf is provided.
    Type: Grant
    Filed: December 7, 2006
    Date of Patent: April 27, 2010
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yong Tae Kim, Sang Yeoun Lee, Kwang Suk Song, Bong Tae Kim
  • Patent number: 7688715
    Abstract: An apparatus for providing duplicated shelf managers in an ATCA system is provided. The apparatus for providing duplicated shelf managers includes a hub/switch in a control backplane to allow a manager to access the duplicated shelf managers all the time from an external network while maintaining the switch configuration defined of the ATCA specification. The hub/switch connects Ethernet ports of the duplicated two shelf managers and Ethernet ports of the two switches at the same time, and connects the two shelf managers and the two switches to the Internet.
    Type: Grant
    Filed: November 9, 2006
    Date of Patent: March 30, 2010
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun Lee, Yong Tae Kim, Kwang Suk Song, Bong Tae Kim
  • Publication number: 20100014673
    Abstract: Disclosed are an RFID authentication apparatus having an authentication function and a method thereof. An RFID authentication method includes determining, by an authentication reader, an AES key using authentication information received from an authentication tag, generating an output key, encrypting a predetermined length of confirmation data by using the output key, transmitting the encrypted confirmation data to the authentication tag, receiving encrypted confirm response data corresponding to the confirmation data from the authentication tag to decrypt the encrypted confirm response data, and comparing the predetermined length of the confirmation data with the decrypted confirm response data to verify authenticity of the authentication tag.
    Type: Application
    Filed: July 20, 2009
    Publication date: January 21, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun LEE, Heyung Sub Lee, Su Na Choi, You Sung Kang, Hyunseok Kim, Kang Bok Lee, Seung II Myong, Hoe-Sung Yang, Cheol Sig Pyo, Jong-Suk Chae
  • Publication number: 20100017617
    Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.
    Type: Application
    Filed: July 20, 2009
    Publication date: January 21, 2010
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Sang Yeoun LEE, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung
  • Publication number: 20100013638
    Abstract: Provided is a method and apparatus for managing a product distribution. The product distribution management method may include: reading a security key of a product from a security tag attached to the product; transferring the read security key to a security server; receiving, from the security server, first authentication information that is encrypted using the security key; receiving, from the security tag, second authentication information that is encrypted using the security key; and determining whether the security tag is duplicated, based on the first authentication information and the second authentication information.
    Type: Application
    Filed: July 16, 2009
    Publication date: January 21, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Kang Bok Lee, Heyung Sub Lee, Sang Yeoun Lee, Jae Heum Lee, Dong-Beom Shin, Hyunseok Kim, Jae-young Jung, Cheol Sig Pyo, Jong-Suk Chae
  • Publication number: 20090058604
    Abstract: Disclosed are a Radio Frequency Identification (RFID) tag and a method for controlling the same which may receive/transmit data from/to an RFID reader even at a relatively long distance. The RFID tag includes a modulation unit for modulating data requested from an RFID reader to generate a first transmission signal including the modulated data, a transmission amplification unit for amplifying the generated first transmission signal to output a second transmission signal, and a transmission antenna unit for transmitting the outputted second transmission signal to the RFID reader.
    Type: Application
    Filed: July 2, 2008
    Publication date: March 5, 2009
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jae-young JUNG, Won Kyu CHOI, Hae Won SON, Hoe-Sung YANG, Sang Yeoun LEE, Nak Seon SEONG, Heyung Sub LEE, Cheol Sig PYO
  • Publication number: 20080131124
    Abstract: A method and apparatus for duplex protection switching by using a single splitter in a passive optical network (PON) are provided. The apparatus for duplex protection switching in a PON, in which a single optical line termination (OLT) and many optical network terminations (ONTs) are connected together in a multiple-access manner, includes: a 2:2 splitter connected to two PON line terminations (LTs) in the OLT; and two N:1 splitters which are connected to the 2:2 splitter, and each of which is connected to two PON LTs in the ONT. According to the method and apparatus, an economical effect can be provided in which two links, an operational link and a protection link, in the PON can provide a partial duplex function at a lower cost. Also, a protection switching time can be reduced by simplifying a restoration process so that when an error is detected, an operational state is returned by protection switching.
    Type: Application
    Filed: November 30, 2007
    Publication date: June 5, 2008
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Hong Soon NAM, Dong Beom SHIN, Sang Yeoun LEE, Kwang Soo CHO, Hyun Jeong YUN, Heyung Sub LEE, Yool KWON, Bong Tae KIM
  • Publication number: 20070104091
    Abstract: An apparatus for providing duplicated shelf managers in an ATCA system is provided. The apparatus for providing duplicated shelf managers includes a hub/switch in a control backplane to allow a manager to access the duplicated shelf managers all the time from an external network while maintaining the switch configuration defined of the ATCA specification. The hub/switch connects Ethernet ports of the duplicated two shelf managers and Ethernet ports of the two switches at the same time, and connects the two shelf managers and the two switches to the Internet.
    Type: Application
    Filed: November 9, 2006
    Publication date: May 10, 2007
    Inventors: Sang Yeoun Lee, Yong Tae Kim, Kwang Suk Song, Bong Tae Kim