Patents by Inventor Yong-Hyuk Moon

Yong-Hyuk Moon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150113272
    Abstract: Disclosed herein are authentication and management of an application using a mobile trusted module (MTM). According to an exemplary embodiment of the present invention, there is provided an apparatus for authenticating and managing an application, including: a mobile trusted module configured to store a hash value of an authentication data for at least one application and a secret key value of an authentication data which are installed in a mobile device, M authenticate the application using the stored hash value and secret key value of the authentication data, and generate a storage root key (SRK) for the application; and a trusted software stack (TSS) middleware configured to generate a message requesting authentication for the application and generation of the storage root key (SRK) and transmit the generated message to the mobile trusted module and manage result information received from the mobile trusted module in response to the transmitted message.
    Type: Application
    Filed: March 24, 2014
    Publication date: April 23, 2015
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jin-Hee HAN, Bo-Heung Chung, Dae-Won Kim, Hwa-Shin Moon, Yong-Hyuk Moon, Jeong-Nyeo Kim
  • Patent number: 8769280
    Abstract: An authentication apparatus for a non-real-time IPTV system decrypts a first encrypted value included in a contents request message received from a device using a preset session key, and then verifies the validity of the contents request message. If the verification results of the contents request message are valid, the authentication apparatus encrypts a variation between timestamps of the authentication apparatus and the device using the session key, and then generates a second encrypted value. After verification information by which the device is capable of verifying the authentication apparatus has been generated using the second encrypted value, the authentication apparatus sends verification information, together with contents corresponding to the contents request message, to the device.
    Type: Grant
    Filed: June 28, 2011
    Date of Patent: July 1, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Dae-Hee Seo, Hyeok-Chan Kwon, Seung-Min Lee, Yong-Hyuk Moon, Jae-Hoon Nah, Taek-Yong Nam, Dong-Il Seo
  • Patent number: 8724805
    Abstract: A security label generation apparatus for scalable content distribution, includes a scalable content transmitter for receiving service level requirements of a user and network bandwidth information over a network and generating security labels and encrypted scalable units. Further, the security label generation apparatus includes a scalable content receiver for receiving the encrypted scalable units and the security labels from the scalable content transmitter and for decrypting, decoding, playing, modifying, storing or redistributing the encrypted scalable units based on the security labels. Furthermore, the security label generation apparatus includes scalable content storage for searching for scalable content and metadata corresponding to a request of the scalable content transmitter.
    Type: Grant
    Filed: December 19, 2011
    Date of Patent: May 13, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yong-Hyuk Moon, Dong il Seo, Jae Hoon Nah, Hyeokchan Kwon, Seungmin Lee, Taek Yong Nam, Dae-Hee Seo
  • Publication number: 20140115400
    Abstract: There is provided a method of fault management of a smart device including comparing a value of a fault detection indicator (hereinafter referred to as ‘FDI’) in a normal state, which detects faults generated in the smart device, with respect to at least one performance indicator, with an FDI value observed in real time and detecting the faults by calculating a relative variation level of the observed values, and creating a diagnosis object (hereinafter referred to as ‘DO’) including a cause and a countermeasure of the detected fault and analyzing the fault.
    Type: Application
    Filed: September 16, 2013
    Publication date: April 24, 2014
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yong-Hyuk MOON, Jeong-Nyeo KIM, Bo-Heung CHUNG, Jin-Hee HAN, Dae-Won KIM, Hwa-Shin MOON
  • Publication number: 20140033318
    Abstract: An apparatus manages universal subscriber identity module (USIM) data in a terminal using a mobile trusted module (MTM). The apparatus includes a mobile information storage unit configured to store at least one key and the USIM data in a protection region, an information security unit configured to protect information stored in a USIM and the terminal using at least one of the USIM data and the key stored in the mobile information storage unit, and a USIM data manager configured to restore at least one of the USIM data and the key stored in the mobile information storage unit to the USIM, and store at least one of USIM data and the key provided from the USIM in the mobile information storage unit.
    Type: Application
    Filed: May 29, 2013
    Publication date: January 30, 2014
    Applicant: Electronics and Telecommuncations Research Institute
    Inventors: Jin Hee HAN, Bo-Heung CHUNG, Hwa Shin MOON, Yong Hyuk MOON, Dae Won KIM, Jeong Nyeo KIM
  • Publication number: 20140026210
    Abstract: A method for authenticating a mobile device, the method comprising: detecting an external input to the mobile device; when the external input is detected, displaying a screen lock pattern having at least two or more pattern points, each pattern point having an identifier; determining whether a touch input is conducted on the at least two or more pattern points in an UI (User Interface) locked state of the mobile device; and when the touch input conducted on the at least two or more pattern points is successively made in a preset sequenced combination of identifiers, unlocking the locked state of the mobile device.
    Type: Application
    Filed: July 17, 2013
    Publication date: January 23, 2014
    Inventors: Bo-Heung CHUNG, Jin Hee HAN, Yong Hyuk MOON, HWA SHIN MOON, Jeong Nyeo KIM
  • Patent number: 8543804
    Abstract: An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The video streaming server receives a service demand via a network and generates an encrypted streaming data. The adaptive security policy server analyzes a media structure and the service demand, by using a service profile received from the video streaming server, so as to generate a security policy description. The terminal generates and transmits the service demand to the video streaming server or the adaptive security server, obtains the encrypted streaming data from the video streaming server and decrypts the encrypted streaming data for playback, storing and retransmission.
    Type: Grant
    Filed: May 6, 2010
    Date of Patent: September 24, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yong Hyuk Moon, Hyeok Chan Kwon, Seungmin Lee, Jae Hoon Nah, Taek Yong Nam, Dong Il Seo
  • Publication number: 20120163594
    Abstract: A security label generation apparatus for scalable content distribution, includes a scalable content transmitter for receiving service level requirements of a user and network bandwidth information over a network and generating security labels and encrypted scalable units. Further, the security label generation apparatus includes a scalable content receiver for receiving the encrypted scalable units and the security labels from the scalable content transmitter and for decrypting, decoding, playing, modifying, storing or redistributing the encrypted scalable units based on the security labels. Furthermore, the security label generation apparatus includes scalable content storage for searching for scalable content and metadata corresponding to a request of the scalable content transmitter.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 28, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yong-Hyuk MOON, Dong il SEO, Jae Hoon NAH, Hyeokchan KWON, Seungmin LEE, Taek Yong NAM, Dae-Hee SEO
  • Publication number: 20120163595
    Abstract: An encryption method for providing layered access control for scalable media includes encrypting the scalable media using different encryption keys for respective layers of the scalable media to create a protected content; providing the protected content to a first user terminal; selectively inserting part or all of the encryption keys into a key area of a right object based on the grade of the first user terminal to generate a first right object; and providing the first right object to the first user terminal.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 28, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Hyeok Chan KWON, Taek Yong NAM, Seungmin LEE, Dae-Hee SEO, Yong Hyuk MOON, Jae Hoon NAH, Dong il SEO
  • Publication number: 20120159161
    Abstract: An authentication apparatus for a non-real-time IPTV system decrypts a first encrypted value included in a contents request message received from a device using a preset session key, and then verifies the validity of the contents request message. If the verification results of the contents request message are valid, the authentication apparatus encrypts a variation between timestamps of the authentication apparatus and the device using the session key, and then generates a second encrypted value. After verification information by which the device is capable of verifying the authentication apparatus has been generated using the second encrypted value, the authentication apparatus sends verification information, together with contents corresponding to the contents request message, to the device.
    Type: Application
    Filed: June 28, 2011
    Publication date: June 21, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Dae-Hee SEO, Hyeok-Chan KWON, Seung-Min LEE, Yong-Hyuk MOON, Jae-Hoon NAH, Taek-Yong NAM, Dong-Il SEO
  • Publication number: 20120159532
    Abstract: A content sharing method performed in a content redistribution device based on a non-realtime IPTV service includes transmitting a secret key in password information of a user of the content redistribution device to an IPTV service server and storing a public key corresponding to the secret key; and transmitting an event message for content request to the IPTV service server to request a non-realtime IPTV service. Further, the content sharing method includes receiving contents requested in the event message for content requesting from the IPTV service server; and decoding the received contents and encrypting the decoded contents using the public key. Furthermore, the content sharing method includes transmitting the contents encrypted using the public key to content recipient devices; and generating an event message for content sharing using the public key to transmit the generated event message to the content recipient devices.
    Type: Application
    Filed: June 23, 2011
    Publication date: June 21, 2012
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Dae-Hee SEO, Hyeok Chan KWON, Seungmin LEE, Yong Hyuk MOON, Jae Hoon NAH, Taek Yong NAM, Dong Il SEO
  • Patent number: 8146133
    Abstract: The invention relates to a P2P traffic management apparatus and method. A P2P flow agent monitors an executed application program to extract a P2P application program, adds application identifiers to packets generated by the application program according to a set policy, and transmits the packets. In this case, a P2P security gateway monitors the inflowing packets from the P2P flow agent to extract packets having the application identifiers, uses the extracted application identifiers to inquire and acquire a related policy, and controls the packets according to the acquired policy.
    Type: Grant
    Filed: July 9, 2008
    Date of Patent: March 27, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yong-Hyuk Moon, Jaehoon Nah, Jaeho Yoo, Jongsoo Jang, Hyeokchan Kwon, Sunkee Koh, Jabeom Gu
  • Publication number: 20110145560
    Abstract: An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The video streaming server receives a service demand via a network and generates an encrypted streaming data. The adaptive security policy server analyzes a media structure and the service demand, by using a service profile received from the video streaming server, so as to generate a security policy description. The terminal generates and transmits the service demand to the video streaming server or the adaptive security server, obtains the encrypted streaming data from the video streaming server and decrypts the encrypted streaming data for playback, storing and retransmission.
    Type: Application
    Filed: May 6, 2010
    Publication date: June 16, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yong Hyuk MOON, Hyeok Chan KWON, Seungmin LEE, Jae Hoon NAH, Taek Yong NAM, Dong Il SEO
  • Publication number: 20100135488
    Abstract: An SVC encryption apparatus includes: an encoding/encryption unit for performing SVC (Scalable Video Coding) encoding on input data contents and carrying out encryption for data in accordance with a first encryption condition to generate a corresponding SVC bitstream; and a NAL (Network Adaptation Layer) data analysis unit for analyzing NAL data of the generated SVC bitstream to find out NAL data satisfying a second encryption condition. Further, the SVC encryption apparatus includes a conditional NAL data encryption unit for encrypting the extracted NAL data in accordance with the second encryption condition; and a bitstream transmitting unit for transmitting the SVC bitstream with encrypted NAL data.
    Type: Application
    Filed: June 23, 2009
    Publication date: June 3, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seungmin LEE, Yong Hyuk MOON, Ja-Beom GU, Hyeok Chan KWON, Yong-Sung JEON, Taek Yong NAM, Jae Hoon NAH
  • Publication number: 20090150972
    Abstract: The invention relates to a P2P traffic management apparatus and method. A P2P flow agent monitors an executed application program to extract a P2P application program, adds application identifiers to packets generated by the application program according to a set policy, and transmits the packets. In this case, a P2P security gateway monitors the inflowing packets from the P2P flow agent to extract packets having the application identifiers, uses the extracted application identifiers to inquire and acquire a related policy, and controls the packets according to the acquired policy.
    Type: Application
    Filed: July 9, 2008
    Publication date: June 11, 2009
    Inventors: Yong-Hyuk MOON, Jaehoon NAH, Jaeho YOO, Jongsoo JANG, Hyeokchan KWON, Sunkee KOH, Jabeom GU