Patents by Inventor Sungwon Yi
Sungwon Yi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240034541Abstract: A container for dispensing solid contents is disclosed. The container includes: a housing configured to store a plurality of solid contents having a predetermined shape; a dispensing member having a dispensing opening from which the solid contents are dispensed; and a rotating member provided on the upper side of the dispensing member to allow relative rotation with the dispensing member and configured to move at least some of the plurality of solid contents to the dispensing opening.Type: ApplicationFiled: July 21, 2023Publication date: February 1, 2024Applicant: AMOREPACIFIC CORPORATIONInventors: Hansu KIM, Myeongjin Goh, Minkyung Kwon, Heungsoo Baek, Keunyoung Yang, Sungwon Yi, Seongmin Jeong
-
Publication number: 20230186154Abstract: An exploration method used by an exploration apparatus in multi-agent reinforcement learning to collect training samples during the training process is provided. The exploration method includes calculating the influence of a selected action of each agent on the actions of other agents in a current state, calculating a linear sum of the value of a utility function representing the action value of each agent and the influence on the actions of the other agent calculated for the selected action of each agent, and obtaining a sample to be used for training an action policy of each agent by probabilistically selecting the action in which the linear sum is the maximum, and the random action.Type: ApplicationFiled: August 23, 2022Publication date: June 15, 2023Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Byunghyun YOO, Hyun Woo KIM, Jeon Gue PARK, Hwa Jeon SONG, Jeongmin YANG, Sungwon YI, Euisok CHUNG, Ran HAN
-
Publication number: 20220215204Abstract: Provided is a method for exploration based on curiosity and prioritization of experience data in multi-agent reinforcement learning, the method including the steps of: calculating a similarity between a policy of a first agent and a policy of a second agent and computing a final reward using the similarity; and performing clustering on a replay buffer using a result of calculating the similarity between the policy of the first agent and the policy of the second agent and performing sampling on data in the cluster.Type: ApplicationFiled: January 6, 2022Publication date: July 7, 2022Applicant: Electronics and Telecommunications Research InstituteInventors: Ningombam Devarani Devi, Sungwon YI, Hyun Woo KIM, Hwa Jeon SONG, Byung Hyun YOO
-
Patent number: 10225269Abstract: There are provided a method and an apparatus for detecting attacks and automatically generating attack signatures based on signature merging. A method for detecting attacks and automatically generating attack signatures based on signature merging includes detecting a character string matched to at least one previously stored compressed attack signature in an input packet received from a network, determining whether the character string detected in the primary attack detection is matched to at least one previously stored individual attack signature, and, if the detected character string is matched to the at least one previously stored individual attack signature, determining the input packet as an attack packet, and, if the detected character string is not matched, determining the input packet as a new attack signature.Type: GrantFiled: August 1, 2016Date of Patent: March 5, 2019Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventor: Sungwon Yi
-
Patent number: 10034815Abstract: The present invention includes a flexible main body; a drug layer attached to a bottom surface of the main body and formed of an additive mixed with a drug and formed of anti-inflammatory analgesic drugs; a vibrating module attached on a top surface of the main body and including a vibration motor and a battery; and a plurality of legs installed along the perimeter of the main body and being adhesive. Through this configuration in which the main body is formed of a flexible material, and the plurality of legs are adhesive and are attached along the perimeter of the main body, the vibrating stimulus pad may be easily attached on an unwell body region to which attachment is difficult such as a joint region.Type: GrantFiled: November 13, 2012Date of Patent: July 31, 2018Assignee: AMOREPACIFIC CORPORATIONInventors: Changman Park, Sungwon Yi, Changkeun Lee, Kwanghyun Shin, Taehong Shin, Seunghwan Yi, Taekjin Oh, Byungyoung Kang
-
Patent number: 10003444Abstract: Provided herein is a communication method using MIMO (Multiple-Input Multiple-Output) technology for communicating with a terminal included in each of a plurality of base station cells using a communication apparatus, the method including calculating, by the communication apparatus, the number of terminals included inside a base station cell; generating, by the communication apparatus, pilot signals corresponding to the calculated number of terminals; and allocating, by the communication apparatus, the pilot signals to a terminal that may maximize a network capacity based on the generated pilot signals.Type: GrantFiled: April 1, 2016Date of Patent: June 19, 2018Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Kwi Hoon Kim, Young Boo Kim, Hyun Jae Kim, Jin Tae Oh, Woong Shik You, Sungwon Yi
-
Publication number: 20170142136Abstract: There are provided a method and an apparatus for detecting attacks and automatically generating attack signatures based on signature merging. A method for detecting attacks and automatically generating attack signatures based on signature merging includes detecting a character string matched to at least one previously stored compressed attack signature in an input packet received from a network, determining whether the character string detected in the primary attack detection is matched to at least one previously stored individual attack signature, and, if the detected character string is matched to the at least one previously stored individual attack signature, determining the input packet as an attack packet, and, if the detected character string is not matched, determining the input packet as a new attack signature.Type: ApplicationFiled: August 1, 2016Publication date: May 18, 2017Inventor: Sungwon YI
-
Publication number: 20160295570Abstract: Provided herein is a communication method using MIMO (Multiple-Input Multiple-Output) technology for communicating with a terminal included in each of a plurality of base station cells using a communication apparatus, the method including calculating, by the communication apparatus, the number of terminals included inside a base station cell; generating, by the communication apparatus, pilot signals corresponding to the calculated number of terminals; and allocating, by the communication apparatus, the pilot signals to a terminal that may maximize a network capacity based on the generated pilot signals.Type: ApplicationFiled: April 1, 2016Publication date: October 6, 2016Inventors: Kwi Hoon KIM, Young Boo KIM, Hyun Jae KIM, Jin Tae OH, Woong Shik YOU, Sungwon YI
-
Patent number: 9130981Abstract: A network security state visualization scheme is suitable for collecting security events existing in a network, analyzing the security events, categorizing and contracting the analyzed security events into attack state information, and visualizing the attack state information as a three-dimensional (3D) screen to display the visualized information on a display panel. Unlike the related art where security events are expressed from the viewpoint of IPs, this scheme normalizes collected security event information, analyzes the normalized information, categorizes and contracts the analyzed information into the attack state information, extracts visualization target data, visualizes the visualization target data as the 3D screen, and displays the visualized 3D screen on the display panel.Type: GrantFiled: December 20, 2012Date of Patent: September 8, 2015Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventor: Sungwon Yi
-
Publication number: 20150132709Abstract: Disclosed is a tooth whitening apparatus including: a mouthpiece to which a gel for applying hydrogen peroxide is applied; a lamp unit disposed at an inner tip of a grip case to whiten teeth by using light; a secondary battery disposed on a lower side of a PCB control board inside the grip case; a vibration device disposed at an upper side of the grip case to be operated by an on-off switch; and a USB port charging unit disposed at a rear side of the grip case to charge the secondary battery.Type: ApplicationFiled: May 14, 2013Publication date: May 14, 2015Inventors: Chang Man Park, Sungwon Yi, Junoh Kim, Chan Ki Lee, Chanho Kim, Youngeun Sung, Sangkyun Chae, Yu-jin Kim
-
Publication number: 20140309563Abstract: The present disclosure relates to a vibrating stimulus pad configured to easily attach to an unwell body region to which attachment is difficult such as a joint region. The vibrating stimulus pad of the present disclosure includes: a flexible main body; a drug layer attached to a bottom surface of the main body and formed of an additive mixed with a drug and formed of anti-inflammatory analgesic drugs; a vibrating module attached on a top surface of the main body and including a vibration motor and a battery; and a plurality of legs installed along the perimeter of the main body and being adhesive. Through this configuration in which the main body is formed of a flexible material, and the plurality of legs are adhesive and are attached along the perimeter of the main body, the vibrating stimulus pad may be easily attached on an unwell body region to which attachment is difficult such as a joint region.Type: ApplicationFiled: November 13, 2012Publication date: October 16, 2014Applicant: Amorepacific CorporationInventors: Changman Park, Sungwon Yi, Changkeun Lee, Kwanghyun Shin, Taehong Shin, Seunghwan Yi, Taekjin Oh, Byungyoung Kang
-
Patent number: 8789200Abstract: The present invention relates to an agent apparatus and method for sharing anonymous identifier-based security information among security management domains. A plurality of security information sharing agent apparatuses respectively located in a plurality of security management domains and configured to collect security information and transmit collected security information to outside of the security management domains.Type: GrantFiled: June 11, 2012Date of Patent: July 22, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Gae-Il An, Dae-Hee Seo, Jong-Hyun Kim, Sun-Hee Lim, Sungwon Yi, Ki-Young Kim, Dong-Il Seo
-
Publication number: 20130318609Abstract: An apparatus for quantifying network threat situations includes a traffic analyzing unit to analyze packet patterns of traffics occurring on a target network being monitored to extract one or more suspicious domains. An IP monitoring unit gives security levels among a plurality of security levels to the suspicious domains according to the number of access IPs accessing the suspicious domains. An activity index computing unit computes activity indices for the suspicious domains from activity indices according to the access times to the suspicious domains of the access IPs. An attack amount anticipation unit analogizes an expected amount of attacks for each suspicious domain according to an expected amount of attacks for each zombie computer, the security level and the activity index of the suspicious domain.Type: ApplicationFiled: May 24, 2013Publication date: November 28, 2013Applicant: Electronics and Telecommunications Research InstituteInventors: Ki Young KIM, Sungwon YI, Sun Hee LIM, Jonghyun KIM, Dae-Hee SEO, BYUNG-GIL LEE
-
Publication number: 20130139268Abstract: The present invention relates to an agent apparatus and method for sharing anonymous identifier-based security information among security management domains. A plurality of security information sharing agent apparatuses respectively located in a plurality of security management domains and configured to collect security information and transmit collected security information to outside of the security management domains.Type: ApplicationFiled: June 11, 2012Publication date: May 30, 2013Applicant: Electronics and Telecommunications Research InstituteInventors: Gae-Il AN, Dae-Hee SEO, Jong-Hyun KIM, Sun-Hee LIM, Sungwon YI, Ki-Young KIM, Dong-Il SEO
-
Publication number: 20120167163Abstract: An apparatus for quantitatively evaluating security policy includes: a security policy analyzing unit for analyzing a security policy of a network; an evaluation criterion defining unit for defining an evaluation criterion for categorizing security features and evaluating each of the security features; an evaluation result calculating unit for calculating an evaluation result of each of security components based on the evaluation criterion; an indicator calculating unit for grouping the security components according to a security function and calculating an indicator by considering a security function of each group; and a quantitative evaluating unit for evaluating a security policy of the each group by using the indicator.Type: ApplicationFiled: December 13, 2011Publication date: June 28, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Sun Hee Lim, Gaeil An, Sungwon Yi, Ki Young Kim, Jonghyun Kim, Dong il Seo
-
Publication number: 20120137361Abstract: A network security control system includes: a network event generator for generating network events; a security event processing apparatus for collecting the network events from the network event generator via a network and processing the collected network events as a target data for visualization; and a visualization processing apparatus for visualizing the target data to display a security status as a third-dimensional (3D) visualization information on an organization basis.Type: ApplicationFiled: August 4, 2011Publication date: May 31, 2012Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Sungwon YI, Ki Young Kim, Gaeil An, Jonghyun Kim
-
Publication number: 20120110633Abstract: Provided are a security information sharing apparatus capable of sharing security information among network domains and a method thereof.Type: ApplicationFiled: July 14, 2011Publication date: May 3, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Gaeil An, Sungwon Yi, Ki Young Kim, Jonghyun Kim
-
Patent number: 7617231Abstract: A data hashing method, a data processing method, and a data processing system using a similarity-based hashing (SBH) algorithm in which the same hash value is calculated for the same data and the more similar data, the smaller difference in the generated hash values. The data hashing method includes receiving computerized data, and generating a hash value of the computerized data using the SBH algorithm in which two data are the same if calculated hash values are the same and two data are similar if the difference of calculated hash values is small, wherein a search, comparison, and classification of data may be quickly processed within a time complexity of O(1) or O(n) since the similarity/closeness of data content are quantified by component values for each of the respective corresponding generated hash values.Type: GrantFiled: December 6, 2006Date of Patent: November 10, 2009Assignee: Electronics and Telecommunications Research InstituteInventors: Hwa Shin Moon, Sungwon Yi, Jintae Oh, Jong Soo Jang, Changhoon Kim
-
Publication number: 20080028468Abstract: A method and apparatus for automatically generating a signature used in a security system are provided. The apparatus and method include a configuration for combining a plurality of substrings extracted from a packet and generating a substring set; a configuration for examining the attacking characteristic of a packet having a substring set and confirming whether or not the substring can be used as a signature for detecting an attacking packet; and a configuration for optimization so as to increase the distinction and storing efficiency of a signature.Type: ApplicationFiled: July 9, 2007Publication date: January 31, 2008Inventors: Sungwon YI, Hwa Shin MOON, Jintae OH, Jong Soo JANG
-
Publication number: 20070130188Abstract: Provided are a data hashing method, a data processing method, and a data processing system using a similarity-based hashing (SBH) algorithm in which the same hash value is calculated for the same data and the more similar data, the smaller difference in the generated hash values. The data hashing method includes receiving computerized data, and generating a hash value of the computerized data using the SBH algorithm in which two data are the same if calculated hash values are the same and two data are similar if the difference of calculated hash values is small. Therefore, a search, comparison, and classification of data can be quickly processed within a time complexity of O(1) or O(n) since the similarity/closeness of data content are quantified by that of the corresponding hash values.Type: ApplicationFiled: December 6, 2006Publication date: June 7, 2007Inventors: Hwa Moon, Sungwon Yi, Jintae Oh, Jong Jang, Changhoon Kim