Patents by Inventor Seung Hun Jin

Seung Hun Jin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190206121
    Abstract: A method of operating a graphic processor performing sampling-based rendering involves intermediate rendering by shading-processing some fragments of a first frame by using a first sample candidate map having a first pattern. Further intermediate rendering may also be performed by shading-processing some fragments of a second frame by using a first sample candidate map having a second pattern. Other fragments of the second frame may be additionally sampled, where these other fragments may be determined based on comparing a shading processing result of the first frame and a shading processing result of the second frame. Final rendering may be performed by shading-processing the additionally sampled fragments.
    Type: Application
    Filed: July 30, 2018
    Publication date: July 4, 2019
    Inventor: SEUNG-HUN JIN
  • Publication number: 20190197663
    Abstract: Provided are a graphics processor that performs warping, a rendering system including the graphics process, and a method of operating the graphics processor. The graphics processor may include an internal command generator and a graphics computing device. The internal command generator may be configured to receive timing information and generate, based on the timing information, a warping command for periodically performing warping. The graphic computing device may be configured to, in response to the warping command, periodically perform the warping, without a context switch by a host, by using sensing information provided from an external source and frame data that have already been rendered.
    Type: Application
    Filed: July 6, 2018
    Publication date: June 27, 2019
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventor: Seung-hun JIN
  • Publication number: 20190191332
    Abstract: Methods for performing a random access procedure by a terminal and a base station in a wireless communication system, a terminal, and a base station are provided. The method for performing a random access procedure by a terminal in a wireless communication system includes selecting a physical random access channel (PRACH) resource from one or more PRACH resources; transmitting, to a base station, a random access preamble based on the selected PRACH resource; identifying a random access radio network temporary identifier (RA-RNTI) based on information associated with the selected PRACH resource, wherein the information includes identity information for an uplink used for the random access preamble transmission; and monitoring a control channel for a random access response (RAR) based on the RA-RNTI.
    Type: Application
    Filed: February 14, 2019
    Publication date: June 20, 2019
    Inventors: Sang Bum KIM, Soeng Hun Kim, Dong Gun Kim, Jae Hyuk Jang, Alexander Sayenko, Seung Ri Jin
  • Publication number: 20190149421
    Abstract: A method of UE includes receiving a radio resource control (RRC) message for configuring bandwidth parts (BWPs) of a serving cell, receiving a physical downlink control channel (PDCCH) indicating activation of a first BWP, performing a BWP switching to the first BWP indicated by the PDCCH, and starting a first downlink BWP timer associated with the first BWP. A UE includes a transceiver, and at least one controller coupled with the transceiver, the at least one controller configured to receive an RRC message for configuring BWPs of a serving cell, receive a PDCCH indicating activation of a first BWP, perform a BWP switching to the first BWP indicated by the PDCCH, and start a first downlink BWP timer associated with the first BWP.
    Type: Application
    Filed: November 16, 2018
    Publication date: May 16, 2019
    Inventors: Seung Ri JIN, Soeng Hun KIM, Dong Gun KIM, Jae Hyuk JANG, Alexander SAYENKO
  • Publication number: 20190141773
    Abstract: A method, performed by a user equipment (UE), of transmitting and receiving signals in a wireless communication system, according to an embodiment, includes receiving a logical channel release request from a next-generation node B (gNB), determining a logical channel to release, an operation mode of the logical channel to release, and whether a packet data convergence protocol (PDCP) layer apparatus connected to the logical channel is re-established, based on the logical channel release request, and performing PDCP data recovery based on the determination result.
    Type: Application
    Filed: November 9, 2018
    Publication date: May 9, 2019
    Inventors: Dong gun KIM, Sang Bum KIM, Soeng Hun KIM, Alexander SAYENKO, Jae Hyuk JANG, Seung Ri JIN
  • Publication number: 20190141571
    Abstract: Provided is a method for performing uplink data compression (UDC) by a user equipment (UE). The method includes receiving configuration information on UDC; generating a first UDC packet by compressing uplink data, based on the configuration information on UDC; transmitting the first UDC packet; receiving, from the base station, packet data convergence protocol (PDCP) layer control information including checksum error information about whether a checksum error has occurred in the first UDC packet; and resetting a UDC buffer used in compressing the uplink data, based on the PDCP layer control information.
    Type: Application
    Filed: November 9, 2018
    Publication date: May 9, 2019
    Inventors: Sang Bum KIM, Soeng Hun KIM, Dong Gun KIM, Jae Hyuk JANG, Alexander SAYENKO, Seung Ri JIN
  • Patent number: 10263969
    Abstract: Disclosed herein are an apparatus and method for authenticated key exchange using a password and an identity-based signature, by which robustness is provided in order to prevent a server impersonation attack when a password is exposed, and by which a client may be provided with convenient authentication using an ID and a password.
    Type: Grant
    Filed: December 8, 2016
    Date of Patent: April 16, 2019
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jung-Yeon Hwang, Seok-Hyun Kim, Soo-Hyung Kim, Seung-Hyun Kim, Jong-Hyouk Noh, Sang-Rae Cho, Young-Seob Cho, Jin-Man Cho, Seung-Hun Jin
  • Publication number: 20190080113
    Abstract: Disclosed herein is an apparatus for recommending privacy control, which includes a relevant information collection unit for collecting relevant information to be used to recommend privacy control in response to a request for personal information of a user from an application; a privacy control recommendation unit for selecting privacy control to be recommended, corresponding to the request for the personal information, from a privacy control pattern of the user using the relevant information; an interface unit for providing an interface that provides information about the request and the recommended privacy control to the user and receives a selection of privacy control from the user; and a privacy control processing unit for processing the personal information of the user depending on the selected privacy control and providing the processed personal information to the application.
    Type: Application
    Filed: August 7, 2018
    Publication date: March 14, 2019
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seung-Hyun KIM, Seok-Hyun KIM, Soo-Hyung KIM, Young-Sam KIM, Jong-Hyouk NOH, Sang-Rae CHO, Young-Seob CHO, Jin-Man CHO, Seung-Hun JIN, Se-Young HUH, Jung-Yeon HWANG
  • Publication number: 20190075102
    Abstract: Disclosed herein are a terminal apparatus, a server apparatus, and a method for FIDO universal authentication using a blockchain. The method includes sending, by the terminal apparatus, a FIDO service request for any one of FIDO registration, FIDO authentication, and FIDO deregistration for an application service provided by the server apparatus to the server apparatus; verifying, by the blockchain, a FIDO service response message, which is created as a result of local authentication of a user in the terminal apparatus in response to the FIDO service request; and processing, by the server apparatus, the FIDO service request based on whether the FIDO service response message is successfully verified by the blockchain.
    Type: Application
    Filed: August 30, 2018
    Publication date: March 7, 2019
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seok-Hyun KIM, Sang-Rae CHO, Young-Seob CHO, Se-Young HUH, Soo-Hyung KIM, Seung-Hyun KIM, Young-Sam KIM, Jong-Hyouk NOH, Jin-Man CHO, Seung-Hun JIN, Jung-Yeon HWANG
  • Publication number: 20190065776
    Abstract: In the present invention, by providing an apparatus for securing data comprising a memory for storing information for data processing, a processor configured to partition original data into a plurality of partial data and generate a plurality of divided data by randomly determining positions of each of the plurality of partial data within the original data, and a communication interface configured to transmit each of the plurality of divided data to each of a plurality of servers, respectively, if an attacker obtains a portion of the divided data, it prevents the entire original data from being restored, and the legitimate user can restore the original data accurately even if some divided data is corrupted, and provides an efficient data polymorphic dividing technique that can minimize the amount of calculation required to secure data.
    Type: Application
    Filed: August 27, 2018
    Publication date: February 28, 2019
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su JHO, Taek-Young YOUN, Dae Sung MOON, Ik Kyun KIM, Seung Hun JIN
  • Publication number: 20190052663
    Abstract: Disclosed herein is an apparatus for enhancing network security, which includes an information collection unit for collecting information about states of hosts that form a network and information about connectivity in the network; an attack surface analysis unit for analyzing attack surfaces by creating an attack graph using the information about the states and the information about connectivity; a security-enhancing strategy establishment unit for establishing a security-enhancing strategy based on the attack graph; and a security-enhancing strategy implementation unit for delivering a measure based on the security-enhancing strategy to a corresponding host, thereby taking a security-enhancing measure.
    Type: Application
    Filed: May 21, 2018
    Publication date: February 14, 2019
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jooyoung LEE, Dae-Sung MOON, Kyung-Min PARK, Samuel WOO, Ho HWANG, Ik-Kyun KIM, Seung-Hun JIN
  • Publication number: 20190044730
    Abstract: Disclosed herein are an apparatus and method for generating and operating a dynamic Controller Area Network (CAN) Identifier (ID). The apparatus includes a priority ID generation unit for generating a priority ID that is a base ID, a dynamic ID generation unit for generating a dynamic ID that is dynamically changed, and a communication unit for transmitting/receiving a data frame in which a dynamic CAN ID including the priority ID and the dynamic ID is combined with data.
    Type: Application
    Filed: May 31, 2018
    Publication date: February 7, 2019
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Samuel WOO, Dae-Sung MOON, Kyung-Min PARK, Jooyoung LEE, IK-KYUN KIM, Seung-Hun JIN, Ho HWANG
  • Publication number: 20190012459
    Abstract: A ransomware detection apparatus and an operation method thereof are provided. The ransomware detection apparatus may include a frequency converter receiving an OP code currently being executed in a CPU and converting a value of the OP code into a frequency domain to generate a first OP code frequency waveform, a memory storing a second OP code frequency waveform, which is a value obtained by converting the OP code corresponding to a ransomware encryption algorithm into a frequency domain, and a ransomware determiner comparing the first OP code frequency waveform with the second OP code frequency waveform to determine whether ransomware operates.
    Type: Application
    Filed: April 26, 2018
    Publication date: January 10, 2019
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho CHOI, Ik Kyun KIM, Jonghyun KIM, Taesung KIM, Seung Hun JIN
  • Publication number: 20180375859
    Abstract: A method and an apparatus for authenticating user using biometric information. The apparatus authenticates the user by performing: generating a first feature vector from first biometric information of the user obtained by the biometric sensor and multiplying the first feature vector by a plurality of pseudo-random number (PRN) matrices, respectively; generating a query template based on an index of an element having a maximum value among elements of a result vector of the multiplication between the first feature vector and the plurality of PRN matrices; and performing authentication for the user by comparing the query template with a pre-stored reference template of a subscribed user.
    Type: Application
    Filed: June 25, 2018
    Publication date: December 27, 2018
    Inventors: Seyoung HUH, Andrew Beng Jin Teoh, Jung Yeon HWANG, Seok Hyun KIM, Soo Hyung KIM, Seung-Hyun KIM, Youngsam KIM, Jong-Hyouk NOH, Sangrae CHO, Young Seob CHO, Jin-Man CHO, Seung Hun JIN
  • Publication number: 20180198794
    Abstract: A transaction information managing system including a plurality of servers and at least one third-party server, wherein the plurality of servers are configured to create, when transactions using the budget of the public organization occurs, a block based on transaction information of the transactions, add the block to the block chain, and share the block chain and the at least one third-party server is configured to perform a mathematical operation to enhance the reliability of the block chain, and a method for managing the transaction information are provided.
    Type: Application
    Filed: January 10, 2018
    Publication date: July 12, 2018
    Inventors: Seyoung HUH, Seok Hyun KIM, Soo Hyung KIM, Seung-Hyun KIM, Youngsam KIM, Jong-Hyouk NOH, Sangrae CHO, Young Seob CHO, Jin-Man CHO, Jung Yeon HWANG, Seung Hun JIN
  • Publication number: 20180164586
    Abstract: Disclosed are methods and devices for processing a motion-based image by determining a rendering time point that reflects a recent user motion. The methods include obtaining commands or data used in graphics rendering from a memory; determining a rendering time point of a first frame between continuous vertical synchronization signals based on an expected rendering time of the first frame; and rendering the motion-based image based on the commands or the data, and motion-related data corresponding to the rendering time point of the first frame.
    Type: Application
    Filed: December 5, 2017
    Publication date: June 14, 2018
    Applicant: Samsung Electronics Co., Ltd.
    Inventor: Seung-hun Jin
  • Publication number: 20180144169
    Abstract: A method and an apparatus for fingerprint recognition are disclosed. The apparatus for the fingerprint recognition may extract a plurality of fingerprint feature points from a fingerprint image and may predetermine a group among the plurality of fingerprint feature points. The apparatus for the fingerprint recognition may also calculate a ridge number between the first fingerprint feature points included in the group and may use the ridge number to generate a ridge count sequence.
    Type: Application
    Filed: October 31, 2017
    Publication date: May 24, 2018
    Inventors: Jung Yeon HWANG, Seok Hyun KIM, Soo Hyung KIM, Seung-Hyun KIM, Youngsam KIM, Hyung-Kyun KIM, Jong-Hyouk NOH, Sangrae CHO, Young Seob CHO, Jin-Man CHO, Seung Hun JIN, Seyoung HUH
  • Publication number: 20180131725
    Abstract: Disclosed is a method and apparatus for mobile terminal management supporting security policy. An exemplary embodiment of the present invention provides a terminal management method for installing a mobile device management (MDM) function in which a server supports a security policy for a binary mobile application, including: adding, by the server, an MDM interlocking code for each class-method unit of an original application of the binary mobile application; modifying, by the server, the original application into a modification application; and generating and transmitting, by the server, an MDM policy including at least one MDM function to be applied to the modification application to a mobile terminal.
    Type: Application
    Filed: July 6, 2017
    Publication date: May 10, 2018
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Seung-Hyun KIM, Seok Hyun KIM, Soo Hyung KIM, Youngsam KIM, Jong-Hyouk NOH, Sangrae CHO, Young Seob CHO, Jin-Man CHO, Seyoung HUH, Jung Yeon HWANG, Seung Hun JIN
  • Publication number: 20180121660
    Abstract: Disclosed herein are an apparatus and method for dynamic binary analysis on a hardware board. The method for dynamic binary analysis on a hardware board is performed using an apparatus for dynamic binary analysis on the hardware board, and includes generating information required for dynamic binary analysis based on information collected while interfacing with an embedded device, disassembling, by a software processing unit, the information required for dynamic binary analysis by receiving the information from a hardware processing unit while interfacing with the hardware processing unit, selecting a core platform of the embedded device based on results of the disassembly, and analyzing security vulnerabilities in the embedded device by performing dynamic binary analysis of the core platform.
    Type: Application
    Filed: October 31, 2017
    Publication date: May 3, 2018
    Inventors: Byeong-Cheol CHOI, Jong-Seop PARK, Jung-Chan NA, Seung-Hun JIN
  • Publication number: 20180123797
    Abstract: A face recognition based key generation apparatus controls a key generation model that is formed of a CNN and an RNN to be learned to generate a desired key having a consistent value by using sample facial images of a key owner and a PIN of the key owner as inputs, and the key generation model receives a facial image of the key owner and the PIN of the key owner, as inputs at a desired key generation time, and generates a key.
    Type: Application
    Filed: June 21, 2017
    Publication date: May 3, 2018
    Inventors: Jong-Hyouk NOH, Seok Hyun KIM, Soo Hyung KIM, Seung-Hyun KIM, Youngsam KIM, Sangrae CHO, Young Seob CHO, Jin-Man CHO, Seyoung HUH, Jung Yeon HWANG, Seung Hun JIN