Patents by Inventor Tae Ghyoon Kim

Tae Ghyoon Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10862925
    Abstract: An apparatus and a method for providing real-time cybersecurity training. The apparatus for providing real-time cybersecurity training includes a trainee interface unit for communicating with an access device of a trainee who participates in real-time cybersecurity training for a control system, a virtual environment provision unit for providing a virtual environment that includes at least one of a virtual network environment and a virtual system environment corresponding to the real-time cybersecurity training, and a target facility representation unit for displaying the state of a target facility, which is a physical facility that needs to be protected, and the state of a control device of the control system depending on the real-time cybersecurity training.
    Type: Grant
    Filed: August 24, 2018
    Date of Patent: December 8, 2020
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Kyeong-Ho Kim, Joonsoo Kim, Tae Ghyoon Kim, Moonsu Jang
  • Patent number: 10621886
    Abstract: An apparatus and method for providing cyber-crisis response training based on augmented reality. The method for providing cyber-crisis response training based on augmented reality, performed by the apparatus for providing cyber-crisis response training based on augmented reality, includes setting a type of cyber-crisis response training, providing one or more trainee terminals with a cyber-crisis response training environment corresponding to the set type of cyber-crisis response training, receiving a response to the cyber-crisis response training environment from the trainee terminal, generating facility situation information based on state information of a target facility for which the cyber-crisis response training is being conducted and on training situation information corresponding to the cyber-crisis response training environment and the response, and outputting the facility situation information using an augmented-reality image corresponding to the target facility.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: April 14, 2020
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Kyoung-Ho Kim, In-Sung Park, In-Sook Jang, Jin-Seok Yang, Tae-Ghyoon Kim, In-Jung Kim
  • Publication number: 20190319985
    Abstract: An apparatus and a method for providing real-time cybersecurity training. The apparatus for providing real-time cybersecurity training includes a trainee interface unit for communicating with an access device of a trainee who participates in real-time cybersecurity training for a control system, a virtual environment provision unit for providing a virtual environment that includes at least one of a virtual network environment and a virtual system environment corresponding to the real-time cybersecurity training, and a target facility representation unit for displaying the state of a target facility, which is a physical facility that needs to be protected, and the state of a control device of the control system depending on the real-time cybersecurity training.
    Type: Application
    Filed: August 24, 2018
    Publication date: October 17, 2019
    Inventors: Kyeong-Ho KIM, Joonsoo KIM, Tae Ghyoon KIM, Moonsu JANG
  • Publication number: 20190019432
    Abstract: An apparatus and method for providing cyber-crisis response training based on augmented reality. The method for providing cyber-crisis response training based on augmented reality, performed by the apparatus for providing cyber-crisis response training based on augmented reality, includes setting a type of cyber-crisis response training, providing one or more trainee terminals with a cyber-crisis response training environment corresponding to the set type of cyber-crisis response training, receiving a response to the cyber-crisis response training environment from the trainee terminal, generating facility situation information based on state information of a target facility for which the cyber-crisis response training is being conducted and on training situation information corresponding to the cyber-crisis response training environment and the response, and outputting the facility situation information using an augmented-reality image corresponding to the target facility.
    Type: Application
    Filed: October 24, 2017
    Publication date: January 17, 2019
    Inventors: Kyoung-Ho KIM, In-Sung PARK, In-Sook JANG, Jin-Seok YANG, Tae-Ghyoon KIM, In-Jung KIM
  • Patent number: 9032516
    Abstract: Provided are a system and method for detecting a malicious script. The system includes a script decomposition module for decomposing a web page into scripts, a static analysis module for statically analyzing the decomposed scripts in the form of a document file, a dynamic analysis module for dynamically executing and analyzing the decomposed scripts, and a comparison module for comparing an analysis result of the static analysis module and an analysis result of the dynamic analysis module to determine whether the decomposed scripts are malicious scripts. The system and method can recognize a hidden dangerous hypertext markup language (HTML) tag irrespective of an obfuscation technique for hiding a malicious script in a web page and thus can cope with an unknown obfuscation technique.
    Type: Grant
    Filed: November 11, 2010
    Date of Patent: May 12, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Tae Ghyoon Kim, Young Han Choi, Seok Jin Choi, Cheol Won Lee
  • Patent number: 8171521
    Abstract: A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: May 1, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Young Han Choi, Hyoung Chun Kim, Tae Ghyoon Kim, Do Hoon Lee, Eungki Park
  • Patent number: 8145586
    Abstract: A method and apparatus for digital forensics are provided. The apparatus for digital forensics includes a page file extractor for extracting a page file stored in a target storage medium, a stored-page feature extractor for extracting features of pages stored in the extracted page file, a page classifier for comparing the extracted features of the pages with at least one predetermined classification criterion and classifying the pages according to the comparison results, and a digital forensics unit for performing digital forensics according to the classified pages. According to the method and apparatus, it is possible to perform digital forensics using only information of a page file.
    Type: Grant
    Filed: October 16, 2008
    Date of Patent: March 27, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Young Han Choi, Tae Ghyoon Kim, Hyung Geun Oh, Do Hoon Lee
  • Publication number: 20110239294
    Abstract: Provided are a system and method for detecting a malicious script. The system includes a script decomposition module for decomposing a web page into scripts, a static analysis module for statically analyzing the decomposed scripts in the form of a document file, a dynamic analysis module for dynamically executing and analyzing the decomposed scripts, and a comparison module for comparing an analysis result of the static analysis module and an analysis result of the dynamic analysis module to determine whether the decomposed scripts are malicious scripts. The system and method can recognize a hidden dangerous hypertext markup language (HTML) tag irrespective of an obfuscation technique for hiding a malicious script in a web page and thus can cope with an unknown obfuscation technique.
    Type: Application
    Filed: November 11, 2010
    Publication date: September 29, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Tae Ghyoon KIM, Young Han CHOI, Seok Jin CHOI, Cheol Won LEE
  • Patent number: 7975273
    Abstract: Provided are a fuzzing system and method of a distributed computing environment (DCE) remote procedure call (RPC) object. The fuzzing system includes a file manager, a random data generator, a RPC packet, and a packet injector. The file manager obtains necessary information by parsing and analyzing an idl file for a target object for fuzzing and a file having information about a Named Pipe file. The random data generator generates a random value using a system clock as a factor. The RPC packet creator embodies protocols used for RPC communication by functions and generating a RPC packet for RPC communication. The packet injector inserts the necessary information and the random value into the generated RPC packet and transmits the generated RPC packet to the target object for fuzzing.
    Type: Grant
    Filed: December 24, 2007
    Date of Patent: July 5, 2011
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jin Seok Yang, Tae Ghyoon Kim, Hyoung Chun Kim, Soonjwa Hong, Do Hoon Lee
  • Publication number: 20090299935
    Abstract: A method and apparatus for digital forensics are provided. The apparatus for digital forensics includes a page file extractor for extracting a page file stored in a target storage medium, a stored-page feature extractor for extracting features of pages stored in the extracted page file, a page classifier for comparing the extracted features of the pages with at least one predetermined classification criterion and classifying the pages according to the comparison results, and a digital forensics unit for performing digital forensics according to the classified pages. According to the method and apparatus, it is possible to perform digital forensics using only information of a page file.
    Type: Application
    Filed: October 16, 2008
    Publication date: December 3, 2009
    Inventors: Young Han CHOI, Tae Ghyoon KIM, Hyung Geun OH, Do Hoon LEE
  • Publication number: 20080313701
    Abstract: A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    Type: Application
    Filed: February 29, 2008
    Publication date: December 18, 2008
    Inventors: Young Han CHOI, Hyoung Chun KIM, Tae Ghyoon KIM, Do Hoon LEE, Eungki PARK
  • Publication number: 20080263572
    Abstract: Provided are a fuzzing system and method of a distributed computing environment (DCE) remote procedure call (RPC) object. The fuzzing system includes a file manager, a random data generator, a RPC packet, and a packet injector. The file manager obtains necessary information by parsing and analyzing an idl file for a target object for fuzzing and a file having information about a Named Pipe file. The random data generator generates a random value using a system clock as a factor. The RPC packet creator embodies protocols used for RPC communication by functions and generating a RPC packet for RPC communication. The packet injector inserts the necessary information and the random value into the generated RPC packet and transmits the generated RPC packet to the target object for fuzzing.
    Type: Application
    Filed: December 24, 2007
    Publication date: October 23, 2008
    Inventors: Jin Seok YANG, Tae Ghyoon KIM, Hyoung Chun KIM, Soonjwa HONG, Do Hoon LEE