Patents by Inventor Tae Ghyoon Kim
Tae Ghyoon Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10862925Abstract: An apparatus and a method for providing real-time cybersecurity training. The apparatus for providing real-time cybersecurity training includes a trainee interface unit for communicating with an access device of a trainee who participates in real-time cybersecurity training for a control system, a virtual environment provision unit for providing a virtual environment that includes at least one of a virtual network environment and a virtual system environment corresponding to the real-time cybersecurity training, and a target facility representation unit for displaying the state of a target facility, which is a physical facility that needs to be protected, and the state of a control device of the control system depending on the real-time cybersecurity training.Type: GrantFiled: August 24, 2018Date of Patent: December 8, 2020Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Kyeong-Ho Kim, Joonsoo Kim, Tae Ghyoon Kim, Moonsu Jang
-
Patent number: 10621886Abstract: An apparatus and method for providing cyber-crisis response training based on augmented reality. The method for providing cyber-crisis response training based on augmented reality, performed by the apparatus for providing cyber-crisis response training based on augmented reality, includes setting a type of cyber-crisis response training, providing one or more trainee terminals with a cyber-crisis response training environment corresponding to the set type of cyber-crisis response training, receiving a response to the cyber-crisis response training environment from the trainee terminal, generating facility situation information based on state information of a target facility for which the cyber-crisis response training is being conducted and on training situation information corresponding to the cyber-crisis response training environment and the response, and outputting the facility situation information using an augmented-reality image corresponding to the target facility.Type: GrantFiled: October 24, 2017Date of Patent: April 14, 2020Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Kyoung-Ho Kim, In-Sung Park, In-Sook Jang, Jin-Seok Yang, Tae-Ghyoon Kim, In-Jung Kim
-
Publication number: 20190319985Abstract: An apparatus and a method for providing real-time cybersecurity training. The apparatus for providing real-time cybersecurity training includes a trainee interface unit for communicating with an access device of a trainee who participates in real-time cybersecurity training for a control system, a virtual environment provision unit for providing a virtual environment that includes at least one of a virtual network environment and a virtual system environment corresponding to the real-time cybersecurity training, and a target facility representation unit for displaying the state of a target facility, which is a physical facility that needs to be protected, and the state of a control device of the control system depending on the real-time cybersecurity training.Type: ApplicationFiled: August 24, 2018Publication date: October 17, 2019Inventors: Kyeong-Ho KIM, Joonsoo KIM, Tae Ghyoon KIM, Moonsu JANG
-
Publication number: 20190019432Abstract: An apparatus and method for providing cyber-crisis response training based on augmented reality. The method for providing cyber-crisis response training based on augmented reality, performed by the apparatus for providing cyber-crisis response training based on augmented reality, includes setting a type of cyber-crisis response training, providing one or more trainee terminals with a cyber-crisis response training environment corresponding to the set type of cyber-crisis response training, receiving a response to the cyber-crisis response training environment from the trainee terminal, generating facility situation information based on state information of a target facility for which the cyber-crisis response training is being conducted and on training situation information corresponding to the cyber-crisis response training environment and the response, and outputting the facility situation information using an augmented-reality image corresponding to the target facility.Type: ApplicationFiled: October 24, 2017Publication date: January 17, 2019Inventors: Kyoung-Ho KIM, In-Sung PARK, In-Sook JANG, Jin-Seok YANG, Tae-Ghyoon KIM, In-Jung KIM
-
Patent number: 9032516Abstract: Provided are a system and method for detecting a malicious script. The system includes a script decomposition module for decomposing a web page into scripts, a static analysis module for statically analyzing the decomposed scripts in the form of a document file, a dynamic analysis module for dynamically executing and analyzing the decomposed scripts, and a comparison module for comparing an analysis result of the static analysis module and an analysis result of the dynamic analysis module to determine whether the decomposed scripts are malicious scripts. The system and method can recognize a hidden dangerous hypertext markup language (HTML) tag irrespective of an obfuscation technique for hiding a malicious script in a web page and thus can cope with an unknown obfuscation technique.Type: GrantFiled: November 11, 2010Date of Patent: May 12, 2015Assignee: Electronics and Telecommunications Research InstituteInventors: Tae Ghyoon Kim, Young Han Choi, Seok Jin Choi, Cheol Won Lee
-
Patent number: 8171521Abstract: A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.Type: GrantFiled: February 29, 2008Date of Patent: May 1, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Young Han Choi, Hyoung Chun Kim, Tae Ghyoon Kim, Do Hoon Lee, Eungki Park
-
Patent number: 8145586Abstract: A method and apparatus for digital forensics are provided. The apparatus for digital forensics includes a page file extractor for extracting a page file stored in a target storage medium, a stored-page feature extractor for extracting features of pages stored in the extracted page file, a page classifier for comparing the extracted features of the pages with at least one predetermined classification criterion and classifying the pages according to the comparison results, and a digital forensics unit for performing digital forensics according to the classified pages. According to the method and apparatus, it is possible to perform digital forensics using only information of a page file.Type: GrantFiled: October 16, 2008Date of Patent: March 27, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Young Han Choi, Tae Ghyoon Kim, Hyung Geun Oh, Do Hoon Lee
-
Publication number: 20110239294Abstract: Provided are a system and method for detecting a malicious script. The system includes a script decomposition module for decomposing a web page into scripts, a static analysis module for statically analyzing the decomposed scripts in the form of a document file, a dynamic analysis module for dynamically executing and analyzing the decomposed scripts, and a comparison module for comparing an analysis result of the static analysis module and an analysis result of the dynamic analysis module to determine whether the decomposed scripts are malicious scripts. The system and method can recognize a hidden dangerous hypertext markup language (HTML) tag irrespective of an obfuscation technique for hiding a malicious script in a web page and thus can cope with an unknown obfuscation technique.Type: ApplicationFiled: November 11, 2010Publication date: September 29, 2011Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Tae Ghyoon KIM, Young Han CHOI, Seok Jin CHOI, Cheol Won LEE
-
Patent number: 7975273Abstract: Provided are a fuzzing system and method of a distributed computing environment (DCE) remote procedure call (RPC) object. The fuzzing system includes a file manager, a random data generator, a RPC packet, and a packet injector. The file manager obtains necessary information by parsing and analyzing an idl file for a target object for fuzzing and a file having information about a Named Pipe file. The random data generator generates a random value using a system clock as a factor. The RPC packet creator embodies protocols used for RPC communication by functions and generating a RPC packet for RPC communication. The packet injector inserts the necessary information and the random value into the generated RPC packet and transmits the generated RPC packet to the target object for fuzzing.Type: GrantFiled: December 24, 2007Date of Patent: July 5, 2011Assignee: Electronics and Telecommunications Research InstituteInventors: Jin Seok Yang, Tae Ghyoon Kim, Hyoung Chun Kim, Soonjwa Hong, Do Hoon Lee
-
Publication number: 20090299935Abstract: A method and apparatus for digital forensics are provided. The apparatus for digital forensics includes a page file extractor for extracting a page file stored in a target storage medium, a stored-page feature extractor for extracting features of pages stored in the extracted page file, a page classifier for comparing the extracted features of the pages with at least one predetermined classification criterion and classifying the pages according to the comparison results, and a digital forensics unit for performing digital forensics according to the classified pages. According to the method and apparatus, it is possible to perform digital forensics using only information of a page file.Type: ApplicationFiled: October 16, 2008Publication date: December 3, 2009Inventors: Young Han CHOI, Tae Ghyoon KIM, Hyung Geun OH, Do Hoon LEE
-
Publication number: 20080313701Abstract: A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.Type: ApplicationFiled: February 29, 2008Publication date: December 18, 2008Inventors: Young Han CHOI, Hyoung Chun KIM, Tae Ghyoon KIM, Do Hoon LEE, Eungki PARK
-
Publication number: 20080263572Abstract: Provided are a fuzzing system and method of a distributed computing environment (DCE) remote procedure call (RPC) object. The fuzzing system includes a file manager, a random data generator, a RPC packet, and a packet injector. The file manager obtains necessary information by parsing and analyzing an idl file for a target object for fuzzing and a file having information about a Named Pipe file. The random data generator generates a random value using a system clock as a factor. The RPC packet creator embodies protocols used for RPC communication by functions and generating a RPC packet for RPC communication. The packet injector inserts the necessary information and the random value into the generated RPC packet and transmits the generated RPC packet to the target object for fuzzing.Type: ApplicationFiled: December 24, 2007Publication date: October 23, 2008Inventors: Jin Seok YANG, Tae Ghyoon KIM, Hyoung Chun KIM, Soonjwa HONG, Do Hoon LEE