Patents by Inventor Sok Joon Lee

Sok Joon Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8499158
    Abstract: There is provided an anonymous service method of providing local linkability. The anonymous service method providing local linkability according to exemplary embodiments of the invention, an anonymous authentication operation based on a short group signature is performed, for which the concept of a local linkability is introduced to secure linkability within the same service domain. Namely, in the interior of a service provider, a virtual index having a fixed value is calculated for each service user, and in this case, although a plurality of service providers collude with each other, they cannot calculate a virtual index having the same value, whereby the linkability can be secured within the same service domain but not within the interiors of different service domains.
    Type: Grant
    Filed: December 17, 2010
    Date of Patent: July 30, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sok Joon Lee, Jung Yeon Hwang, Yun Kyung Lee, Sin Hyo Kim, Sang Woo Lee, Hye Ran Moon, Young Ho Kim, Byung Ho Chung, Hyun Sook Cho
  • Patent number: 8234698
    Abstract: An anonymous authentication-based private information management (PIM) system and method are provided. The PIM method includes receiving an anonymous certificate not including user information from an anonymous certification authority; generating an anonymous document including the anonymous certificate and some of the user information; and providing the anonymous document to a web service provider so as to be authenticated and thus provided with a web service by the web service provider. Thus, only a minimum of user information may be provided to the web service provider. In addition, it is possible to strengthen a user's right to self-determination and control over the exposure and use of his or her personal information by allowing a user to manage his or her own personal information or entrusting the PIM server to manage user information. Moreover, it is possible to protect the privacy of a user by preventing the exposure of user information.
    Type: Grant
    Filed: May 14, 2009
    Date of Patent: July 31, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yun Kyung Lee, Seung Wan Han, Sok Joon Lee, Byung Ho Chung, Jeong Nyeo Kim
  • Publication number: 20120159166
    Abstract: Disclosed herein is a method of verifying key validity and a server for performing the method. The method is configured such that a service provision server verifies key validity in an anonymous service for providing local linkability. The service provision server receives a revocation list. A local revocation list is generated using the received revocation list and a secret key. A virtual index of a service user required to verify key validity is calculated. Whether a key of the service user is valid is verified, based on whether the virtual index is included in the local revocation list.
    Type: Application
    Filed: December 15, 2011
    Publication date: June 21, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Sok-Joon LEE, Jung-Yeon Hwang, Gun-Tae Bae, Byung-Ho Chung, Sin-Hyo Kim, Hye-Ran Mun, Sang-Woo Lee, Yun-Kyung Lee, Hyun-Sook Cho
  • Publication number: 20120099726
    Abstract: The present invention relates to a content protection apparatus and method using binding of additional information to an encryption key. The content protection apparatus includes an encryption unit for creating an encryption key required to encrypt data requested by a user terminal and then generating encrypted data in which the data is encrypted. An additional information management unit manages additional information including authority information about the encrypted data. A White-Box Cryptography (WBC) processing unit generates a WBC table required to bind the encryption key corresponding to the encrypted data to the additional information. A bound data generation unit generates bound data in which the encrypted key is bound to the additional information, using a cipher included in the WBC table.
    Type: Application
    Filed: September 22, 2011
    Publication date: April 26, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Sin-Hyo KIM, Yun-Kyung LEE, Byung-Ho CHUNG, Hye-Ran MUN, Sang-Woo LEE, Sok-Joon LEE, Jung-Yeon HWANG, Gun-Tae BAE, Hyun-Sook CHO
  • Publication number: 20110154045
    Abstract: There is provided an anonymous service method of providing local linkability. The anonymous service method providing local linkability according to exemplary embodiments of the invention, an anonymous authentication operation based on a short group signature is performed, for which the concept of a local linkability is introduced to secure linkability within the same service domain. Namely, in the interior of a service provider, a virtual index having a fixed value is calculated for each service user, and in this case, although a plurality of service providers collude with each other, they cannot calculate a virtual index having the same value, whereby the linkability can be secured within the same service domain but not within the interiors of different service domains.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 23, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Sok Joon Lee, Jung Yeon Hwang, Yun Kyung Lee, Sin Hyo Kim, Sang Woo Lee, Hye Ran Moon, Young Ho Kim, Byung Ho Chung, Hyun Sook Cho
  • Publication number: 20100161970
    Abstract: A user terminal and a method of managing user information are provided. The method includes issuing a request for issuance of a certificate for a user to a certification authority; generating a document including at least part of user information using a certificate issued by the certification authority; and issuing a subscription request to a desired web service provider by providing the document including the at least part of the user information to the desired web service provider. Therefore, it is possible to strengthen the user's right to self-determination and control over the exposure and use of his or her personal information. In addition, it is possible to improve the reliability of user information provided to each website by the user.
    Type: Application
    Filed: October 20, 2009
    Publication date: June 24, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yun Kyung LEE, Byung Ho CHUNG, Jeong Nyeo KIM, Seung Wan HAN, Sok Joon LEE
  • Publication number: 20100146603
    Abstract: An anonymous authentication-based private information management (PIM) system and method are provided. The PIM method includes receiving an anonymous certificate not including user information from an anonymous certification authority; generating an anonymous document including the anonymous certificate and some of the user information; and providing the anonymous document to a web service provider so as to be authenticated and thus provided with a web service by the web service provider. Thus, only a minimum of user information may be provided to the web service provider. In addition, it is possible to strengthen a user's right to self-determination and control over the exposure and use of his or her personal information by allowing a user to manage his or her own personal information or entrusting the PIM server to manage user information. Moreover, it is possible to protect the privacy of a user by preventing the exposure of user information.
    Type: Application
    Filed: May 14, 2009
    Publication date: June 10, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yun Kyung LEE, Seung Wan HAN, Sok Joon LEE, Byung Ho CHUNG, Jeong Nyeo KIM
  • Publication number: 20100138929
    Abstract: Conditionally traceable anonymous service system is provided. The system respectively separates subject conforming real name, subject conforming anonymity, subject requesting verification for an anonymity certification means, so that privacy of a user is hardly violated, the present invention can acquire real name information for the user only when a trace for a user is surely requested.
    Type: Application
    Filed: November 19, 2009
    Publication date: June 3, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seung Wan HAN, Sok Joon LEE, Yun Kyung LEE, Sin Hyo KIM, Jeong Nyeo KIM
  • Publication number: 20100122080
    Abstract: The present invention can't independently know real name information of a user unless a server of an authority treating real name certificate and a server of an authority treating pseudonym certificate collaborate mutually, so that privacy of a user isn't infringed. The present invention can acquire real name information of a user with collaboration of real name certification sever and pseudonym certification sever only if you need real name information for a user.
    Type: Application
    Filed: November 9, 2009
    Publication date: May 13, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Sok Joon LEE, Seung Wan HAN, Yun Kyung LEE, Byung Ho CHUNG, Jeong Nyeo KIM
  • Patent number: 7640585
    Abstract: An intrusion detection system and method of a wireless network providing wireless communication to one or more wireless terminal, and an intrusion detection sensor capable of detecting attacks against wireless network are provided. The intrusion detection system of a wireless network includes: an access point providing wireless communication to a wireless terminal; and an intrusion detection sensor examining packets transmitted and received between the access point and a wireless terminal according to a predetermined detection rule. The access point transmits confirmation information on whether or not an event packet, including critical information on whether or not a wireless line connection between the access point and the wireless terminal is established, is transmitted, to the intrusion detection sensor, and the intrusion detection sensor examines an event packet by using the confirmation information.
    Type: Grant
    Filed: November 29, 2005
    Date of Patent: December 29, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sok Joon Lee, Kyung Hee Oh, Sin Hyo Kim, Young Hwan Ham, Byung Ho Chung, Kyo Il Chung
  • Patent number: 7533257
    Abstract: A server certificate verification method in a terminal during. Extensible Authentication Protocol authentication for Internet access is provided, the method including (a) receiving a server certificate from a wireless LAN authentication server, and transmitting a server certificate verification request message of the server certificate to a wireless LAN authentication server via a wireless LAN access server; (b) transmitting by the wireless LAN authentication server an On-line Certificate Status Protocol request message to an On-line Certificate Status Protocol server to verify the server certificate; (c) receiving a result of the server certificate verification performed by the OCSP server using an Extensible Authentication Protocol packet from the wireless LAN authentication server; and (d) determining whether the result of the server certificate verification is valid.
    Type: Grant
    Filed: August 24, 2004
    Date of Patent: May 12, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sok Joon Lee, Byung Ho Chung, Kyo Il Chung
  • Publication number: 20030115464
    Abstract: A protocol designing method that securely performs a password-based authentication and key exchange protocol using a zero-knowledge interactive proof is disclosed. According to this method, various kinds of system parameters required for authentication are first set. Then, a user selects a certain random number in conformity with the set parameters, and sends to a server a message including a user ID, a test number A applying a one-way function, and a first question number generation value X known only to the server and the user. The server, using the message sent from the user, sends to the user a message including an authentication Auth of whether the server possesses a public key, and a second question number generation value Y known only to the server and the user. The user authenticates the server by verifying the authentication Auth, and computes a resultant value c of a secret coin tossing known only to the server and the user and a session key SK.
    Type: Application
    Filed: February 7, 2002
    Publication date: June 19, 2003
    Inventors: Dae Hun Nyang, Sok Joon Lee, Byung Ho Chung