Patents by Inventor Sung-Do Chi

Sung-Do Chi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070072250
    Abstract: The present invention provide a system and a method for detection of cancer, by producing a serum proteome standard by an image mining technique, and provide cancer-specific biomarkers. Disclosed is a method of analyzing cancer, comprising the steps of transforming serum proteomes from normal individuals and individuals having cancer into two-dimensional images, and constructing a database consisting of the proteome standard by an image mining technique; inputting a serum proteome from a subject of interest, transforming the serum proteome into a image and comparing the structure of the serum proteome pattern of the subject with the proteome standard and determining whether the serum proteome of the subject is normal or abnormal. The system and method for cancer analysis facilitates detection of cancer by constructing a database from a plurality of serum proteome using an image technique and comparing serum proteome of a subject with a proteome standard.
    Type: Application
    Filed: December 24, 2002
    Publication date: March 29, 2007
    Inventors: Chul-Woo Kim, Young-Mee Park, Jong-Sou Park, Sung-Do Chi, Syng-Yup Ohn, Soo-Chan Hwang
  • Publication number: 20030182582
    Abstract: A network security simulation system. The network security simulation system is capable of analyzing a hacking procedure through a simulation on a network. The network security simulation system is based on a component model base which librarizes each component of a network system as an object. The network system which is an analysis target can be freely designed based on the library. At least one attacker node and at least one target node are set in the designed network system. Hacking commands are transmitted from the attacker node to a target node through various components of the network system to change a state of the target node. The changed target node state is analyzed by a result analysis unit and then provided to a user.
    Type: Application
    Filed: March 18, 2003
    Publication date: September 25, 2003
    Inventors: Jong Sou Park, Sung-Do Chi, Hwan-Kuk Kim, Jang-Se Lee, Jeong-Rye Jeong