Patents by Inventor Sang Yeoun Lee
Sang Yeoun Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Radio frequency identification (RFID) security apparatus having security function and method thereof
Patent number: 8607333Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.Type: GrantFiled: July 20, 2009Date of Patent: December 10, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Sang Yeoun Lee, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung -
Patent number: 8587409Abstract: Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode.Type: GrantFiled: March 7, 2011Date of Patent: November 19, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Sang Yeoun Lee, Heyung Sub Lee, You Sung Kang, Kang Bok Lee, Su Na Choi, Hyun Seok Kim, Dong Beom Shin, Doo Ho Choi
-
Patent number: 8405487Abstract: A method of storing sensor data in a sensor tag is provided. The method comprises receiving new sensor data output from a sensor, comparing the received new sensor data with immediately previous sensor data to determine whether the comparison result satisfies a predetermined criterion, and storing the new sensor data in a tag memory when it is determined that the criterion is satisfied. Accordingly, efficient use of the tag memory is possible.Type: GrantFiled: December 2, 2009Date of Patent: March 26, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Kang-bok Lee, Sang-yeoun Lee, Heyung-sub Lee, Jong-suk Chae
-
Patent number: 8314703Abstract: Provided is a method and apparatus for managing a product distribution. The product distribution management method may include: reading a security key of a product from a security tag attached to the product; transferring the read security key to a security server; receiving, from the security server, first authentication information that is encrypted using the security key; receiving, from the security tag, second authentication information that is encrypted using the security key; and determining whether the security tag is duplicated, based on the first authentication information and the second authentication information.Type: GrantFiled: July 16, 2009Date of Patent: November 20, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Kang Bok Lee, Heyung Sub Lee, Sang Yeoun Lee, Jae Heum Lee, Dong-Beom Shin, Hyunseok Kim, Jae-young Jung, Cheol Sig Pyo, Jong-Suk Chae
-
Publication number: 20120161933Abstract: In a radio frequency identification (RFID) security reader, by integrating an encryption module that encrypts transmission data and a decryption module that decrypts reception data from an RFID security tag to restore the reception data to original data to a modem, an input/output time period of a processor module that processes a communication protocol in an RFID security system is minimized.Type: ApplicationFiled: August 15, 2011Publication date: June 28, 2012Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Dong-Beom Shin, Heyung Sub Lee, Sang Yeoun Lee, Hyunseok Kim, Su Na Choi, Kang Bok Lee, Joo Sang Park
-
Publication number: 20110279235Abstract: A Radio Frequency Identification (RFID) tag and an interrogator that support a normal mode and a secure mode, and operating methods thereof are provided. The RFID tag may notify the interrogator of whether a current operating mode of the RFID tag is the normal mode or the secure mode, may perform different inventory processes based on the current operating mode, and may perform an authentication of the interrogator. Here, the RFID tag and the interrogator may also perform a mutual authentication.Type: ApplicationFiled: May 16, 2011Publication date: November 17, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Sang Yeoun LEE, Kang Bok Lee, Heyung Sub Lee, Dong Beom Shin, Hyun Seok Kim, You Sung Kang, Joo Sang Park, Cheol Sig Pyo, Jong Suk Chae
-
Publication number: 20110215908Abstract: Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode.Type: ApplicationFiled: March 7, 2011Publication date: September 8, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Sang Yeoun LEE, Heyung Sub LEE, You Sung KANG, Kang Bok LEE, Su Na CHOI, Hyun Seok KIM, Dong Beom SHIN, Doo Ho CHOI
-
Publication number: 20110140853Abstract: The present invention relates to an RFID reader and a signal receiving method thereof. The RFID reader according to one embodiment of the present invention down-converts transmission leakage signals introduced into a reader receiver and then suppresses them through a band stop filter in a low frequency band and up-converts them, thereby making it possible to effectively suppress the transmission leakage signals.Type: ApplicationFiled: June 21, 2010Publication date: June 16, 2011Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Jae Young JUNG, Dong Beom Shin, Sang Yeoun Lee, Gil Young Choi, Heyung Sub Lee, Jong Suk Chae
-
Publication number: 20110102151Abstract: Provided are an RFID reader and a method for controlling a gain thereof. The RFID reader includes an amplifier and an AGC circuit. The amplifier controls the gain of an RX signal, received from an RFID tag, in response to an AGC signal. The AGC circuit measures a signal level in an ante-preamble period of the RX signal and generates an AGC signal to control the gain of the RX signal, on the basis of the measured signal level.Type: ApplicationFiled: July 9, 2010Publication date: May 5, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Dong-Beom Shin, Jae-young Jung, Sang Yeoun Lee, Gil Young Choi, Heyung Sub Lee, Jong-Suk Chae
-
Publication number: 20110037568Abstract: Disclosed are an RFID reader, an RFID tag, and a controlling method thereof. The RFID tag may include a state information generator to generate state information of the RFID tag, a receiver to receive an activation command including reference state information of the RFID tag, and a controller to activate the RFID tag based on the state information and the reference state information. The RFID tag may be selectively activated according to an inner state of the RFID tag.Type: ApplicationFiled: April 22, 2009Publication date: February 17, 2011Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Hyunseok Kim, Heyung Sub Lee, Sang Yeoun Lee, Dong-Beom Shin, Su Na Choi, Nak Seon Seong, Cheol Sig Pyo, Jong-Suk Chae, Preishuber-Pfluegl Di Josef, Janek Di Alex, Tschische Di David
-
Publication number: 20100146273Abstract: Provided are a method for passive radio frequency identification (RFID) security according to a security mode. An RFID tag transmits its own current security mode to a reader and the reader drives a security protocol depending on the current security mode of the RFID tag. Also, the reader grasps the ability of the tag and then the reader drive a protocol suitable for the ability through the security mode.Type: ApplicationFiled: September 25, 2009Publication date: June 10, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: You Sung KANG, Doo Ho CHOI, Yong-Je CHOI, Kyo Il CHUNG, Hyunsook CHO, Heyung Sub LEE, Sang Yeoun LEE, Kang Bok LEE, Dong-Beom SHIN, Jae-young JUNG, Cheol Sig PYO
-
Publication number: 20100141404Abstract: A method of storing sensor data in a sensor tag is provided. The method comprises receiving new sensor data output from a sensor, comparing the received new sensor data with immediately previous sensor data to determine whether the comparison result satisfies a predetermined criterion, and storing the new sensor data in a tag memory when it is determined that the criterion is satisfied. Accordingly, efficient use of the tag memory is possible.Type: ApplicationFiled: December 2, 2009Publication date: June 10, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Kang-bok LEE, Sang-yeoun LEE, Heyung-sub LEE, Jong-suk CHAE
-
Patent number: 7706259Abstract: A method for implementing a redundant structure of an ATCA system via a base interface of a network system based on an ATCA standard, and the ATCA system for use in the same are disclosed. Each of routing protocol shelves and LI shelves includes two ports connected to two IPC paths provided from the base interface, such that a representative IP address is assigned to a single port to be used, performs IPC communication using the representative IP address. If a port error or link-down state occurs, the representative IP address is assigned to the other port, resulting in the implementation of stable IPC communication. If the port error or link-down state occurs in an active-mode ShMC shelf, an IPC path passing through a standby-mode ShMC shelf is provided.Type: GrantFiled: December 7, 2006Date of Patent: April 27, 2010Assignee: Electronics and Telecommunications Research InstituteInventors: Yong Tae Kim, Sang Yeoun Lee, Kwang Suk Song, Bong Tae Kim
-
Patent number: 7688715Abstract: An apparatus for providing duplicated shelf managers in an ATCA system is provided. The apparatus for providing duplicated shelf managers includes a hub/switch in a control backplane to allow a manager to access the duplicated shelf managers all the time from an external network while maintaining the switch configuration defined of the ATCA specification. The hub/switch connects Ethernet ports of the duplicated two shelf managers and Ethernet ports of the two switches at the same time, and connects the two shelf managers and the two switches to the Internet.Type: GrantFiled: November 9, 2006Date of Patent: March 30, 2010Assignee: Electronics and Telecommunications Research InstituteInventors: Sang Yeoun Lee, Yong Tae Kim, Kwang Suk Song, Bong Tae Kim
-
Publication number: 20100014673Abstract: Disclosed are an RFID authentication apparatus having an authentication function and a method thereof. An RFID authentication method includes determining, by an authentication reader, an AES key using authentication information received from an authentication tag, generating an output key, encrypting a predetermined length of confirmation data by using the output key, transmitting the encrypted confirmation data to the authentication tag, receiving encrypted confirm response data corresponding to the confirmation data from the authentication tag to decrypt the encrypted confirm response data, and comparing the predetermined length of the confirmation data with the decrypted confirm response data to verify authenticity of the authentication tag.Type: ApplicationFiled: July 20, 2009Publication date: January 21, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Sang Yeoun LEE, Heyung Sub Lee, Su Na Choi, You Sung Kang, Hyunseok Kim, Kang Bok Lee, Seung II Myong, Hoe-Sung Yang, Cheol Sig Pyo, Jong-Suk Chae
-
RADIO FREQUENCY IDENTIFICATION (RFID) SECURITY APPARATUS HAVING SECURITY FUNCTION AND METHOD THEREOF
Publication number: 20100017617Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.Type: ApplicationFiled: July 20, 2009Publication date: January 21, 2010Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Sang Yeoun LEE, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung -
Publication number: 20100013638Abstract: Provided is a method and apparatus for managing a product distribution. The product distribution management method may include: reading a security key of a product from a security tag attached to the product; transferring the read security key to a security server; receiving, from the security server, first authentication information that is encrypted using the security key; receiving, from the security tag, second authentication information that is encrypted using the security key; and determining whether the security tag is duplicated, based on the first authentication information and the second authentication information.Type: ApplicationFiled: July 16, 2009Publication date: January 21, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Kang Bok Lee, Heyung Sub Lee, Sang Yeoun Lee, Jae Heum Lee, Dong-Beom Shin, Hyunseok Kim, Jae-young Jung, Cheol Sig Pyo, Jong-Suk Chae
-
Publication number: 20090058604Abstract: Disclosed are a Radio Frequency Identification (RFID) tag and a method for controlling the same which may receive/transmit data from/to an RFID reader even at a relatively long distance. The RFID tag includes a modulation unit for modulating data requested from an RFID reader to generate a first transmission signal including the modulated data, a transmission amplification unit for amplifying the generated first transmission signal to output a second transmission signal, and a transmission antenna unit for transmitting the outputted second transmission signal to the RFID reader.Type: ApplicationFiled: July 2, 2008Publication date: March 5, 2009Applicant: Electronics and Telecommunications Research InstituteInventors: Jae-young JUNG, Won Kyu CHOI, Hae Won SON, Hoe-Sung YANG, Sang Yeoun LEE, Nak Seon SEONG, Heyung Sub LEE, Cheol Sig PYO
-
Publication number: 20080131124Abstract: A method and apparatus for duplex protection switching by using a single splitter in a passive optical network (PON) are provided. The apparatus for duplex protection switching in a PON, in which a single optical line termination (OLT) and many optical network terminations (ONTs) are connected together in a multiple-access manner, includes: a 2:2 splitter connected to two PON line terminations (LTs) in the OLT; and two N:1 splitters which are connected to the 2:2 splitter, and each of which is connected to two PON LTs in the ONT. According to the method and apparatus, an economical effect can be provided in which two links, an operational link and a protection link, in the PON can provide a partial duplex function at a lower cost. Also, a protection switching time can be reduced by simplifying a restoration process so that when an error is detected, an operational state is returned by protection switching.Type: ApplicationFiled: November 30, 2007Publication date: June 5, 2008Applicant: Electronics and Telecommunications Research InstituteInventors: Hong Soon NAM, Dong Beom SHIN, Sang Yeoun LEE, Kwang Soo CHO, Hyun Jeong YUN, Heyung Sub LEE, Yool KWON, Bong Tae KIM
-
Publication number: 20070104091Abstract: An apparatus for providing duplicated shelf managers in an ATCA system is provided. The apparatus for providing duplicated shelf managers includes a hub/switch in a control backplane to allow a manager to access the duplicated shelf managers all the time from an external network while maintaining the switch configuration defined of the ATCA specification. The hub/switch connects Ethernet ports of the duplicated two shelf managers and Ethernet ports of the two switches at the same time, and connects the two shelf managers and the two switches to the Internet.Type: ApplicationFiled: November 9, 2006Publication date: May 10, 2007Inventors: Sang Yeoun Lee, Yong Tae Kim, Kwang Suk Song, Bong Tae Kim