Patents by Inventor Tae In Jung

Tae In Jung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090100077
    Abstract: A network risk analysis method using an information hierarchy structure is divided into 7 steps and results derived from each of the process steps are stored in a database to get a hierarchy structure for the respective steps. By using the information hierarchy structure, a network manager can easily comprehend the relationship between the derived results from each step to make a risk analysis in an efficient manner.
    Type: Application
    Filed: November 16, 2007
    Publication date: April 16, 2009
    Inventors: Tae-In Jung, Won-Tae Sim, Woo-Han Kim
  • Publication number: 20080095187
    Abstract: Disclosed is a method for estimating an available bandwidth of a network link by transmitting small-sized probing packets using a time stamp function of an Internet control message protocol (ICMP) and using time information of the probing packet returned. According to the invention, even when the separate program or function is not activated in the router, it is possible to easily estimate and monitor the available bandwidth of the exterior network link connected to the network being managed. Accordingly, it is possible to operate the network more stably and to detect the abnormal sign of the network at early stage, thereby quickly coping with it. In addition, it is possible to prevent the excessive traffic or load from being caused in the network.
    Type: Application
    Filed: October 26, 2006
    Publication date: April 24, 2008
    Inventors: Tae In JUNG, Myeong-Seok Cha, Hyung-Jong Kim, Won Tae Sim, Woo-Han Kim
  • Publication number: 20080092237
    Abstract: An integrative analysis system and method of network vulnerability utilizing multiple heterogeneous vulnerability scanners to enhance the accuracy of the network vulnerability analysis are provided. The method comprises a scanning policy setting-up step of setting-up a common scanning policy able to be adapted to the multiple heterogeneous vulnerability scanners and specifying the policy for the respective vulnerability scanners, a vulnerability scanning and result collecting step of performing for the multiple heterogeneous vulnerability scanners to scan, to collect a result thereof, and to store the same in a database and a scanning result integrative analysis step of performing a relevance analysis and an integrative analysis on the scanning results collected, thereby obtaining a complementary vulnerability scanning utilizing multiple heterogeneous vulnerability scanners, enhancing the accuracy and the comprehension of the scanning results, and obtaining a comprehensive vulnerability analysis on a network.
    Type: Application
    Filed: October 26, 2006
    Publication date: April 17, 2008
    Inventors: Jun YOON, Kyoung Hee Ko, Tae In Jung, Won Tae Sim, Woo Han Kim