Patents by Inventor Soon Jwa Hong

Soon Jwa Hong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7937765
    Abstract: Provided are a system and method for checking the security of a personal computer (PC). The system and method automatically check security to protect a PC from computer hacking, viruses, worms, Trojan horses, etc., and inform or cure a vulnerable point. The system and method automatically check and modify all the security check items so that a user who may not have professional computer knowledge can readily cope with a cyber attack, and describe the vulnerable point and the result of the cure to the user with ease. Therefore, the system and method can maintain a PC in its up-to-date state to prevent damage from a cyber attack, and minimize damage from a cyber threat against the main system and service.
    Type: Grant
    Filed: November 8, 2007
    Date of Patent: May 3, 2011
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Kang San Kim, Hyoung Chun Kim, Soon Jwa Hong, Eung Ki Park, Choon Sik Park
  • Publication number: 20090265201
    Abstract: Provided are a method and apparatus for determining a security solution. The method and apparatus generate a security solution analysis model for analyzing effects on investment of security solution combinations consisting of several security solution candidates on the basis of integer programming (IP), standardize various constraints that have significant effects on security solution determination on the basis of IP, and apply the standardized constraints to the security solution analysis model, thereby determining a security solution combination having the smallest residual risk while satisfying the constraints as an optimum security solution combination. According to the method and apparatus, an optimum security solution combination that can minimize a residual risk while satisfying various constraints is rapidly and accurately determined. Thus, it is possible to support effective determination in information security investment.
    Type: Application
    Filed: April 20, 2009
    Publication date: October 22, 2009
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Min Sik KIM, Jung Gil PARK, Soon Jwa HONG, Peter Hoh In, Taek LEE
  • Publication number: 20090260085
    Abstract: Provided are an apparatus, system and method for blocking malicious code. The apparatus includes a first malicious code detector for determining whether or not a received e-mail includes malicious code, on the basis of previously stored malicious code patterns, a second malicious code detector for performing second malicious code detection on a received e-mail determined by the first malicious code detector not to include malicious code, a pattern extractor for extracting a new malicious code pattern from malicious code detected by the second malicious code detector, and a transceiver for transferring the extracted new malicious code pattern to a pattern providing server.
    Type: Application
    Filed: September 11, 2008
    Publication date: October 15, 2009
    Inventors: Min Sik KIM, Jong Moon LEE, Hyun Dong PARK, Soon Jwa HONG
  • Publication number: 20080115220
    Abstract: Provided are a system and method for checking the security of a personal computer (PC). The system and method automatically check security to protect a PC from computer hacking, viruses, worms, Trojan horses, etc., and inform or cure a vulnerable point. The system and method automatically check and modify all the security check items so that a user who may not have professional computer knowledge can readily cope with a cyber attack, and describe the vulnerable point and the result of the cure to the user with ease. Therefore, the system and method can maintain a PC in its up-to-date state to prevent damage from a cyber attack, and minimize damage from a cyber threat against the main system and service.
    Type: Application
    Filed: November 8, 2007
    Publication date: May 15, 2008
    Inventors: Kang San Kim, Hyoung Chun Kim, Soon Jwa Hong, Eung Ki Park, Choon Sik Park
  • Publication number: 20080115016
    Abstract: A system and method for analyzing a file format to perform a software security test are provided. The system includes a file scanner for monitoring a program that loads an unknown file on a memory and parsing function parameters of the loaded file, and a file analyzer for receiving the parsing data from the file scanner and extracting a field location and a data type of the unknown file format.
    Type: Application
    Filed: September 6, 2007
    Publication date: May 15, 2008
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Young Han CHOI, Hyoung Chun Kim, Soon Jwa Hong