Patents by Inventor Yong-Hyuk Moon
Yong-Hyuk Moon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150113272Abstract: Disclosed herein are authentication and management of an application using a mobile trusted module (MTM). According to an exemplary embodiment of the present invention, there is provided an apparatus for authenticating and managing an application, including: a mobile trusted module configured to store a hash value of an authentication data for at least one application and a secret key value of an authentication data which are installed in a mobile device, M authenticate the application using the stored hash value and secret key value of the authentication data, and generate a storage root key (SRK) for the application; and a trusted software stack (TSS) middleware configured to generate a message requesting authentication for the application and generation of the storage root key (SRK) and transmit the generated message to the mobile trusted module and manage result information received from the mobile trusted module in response to the transmitted message.Type: ApplicationFiled: March 24, 2014Publication date: April 23, 2015Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Jin-Hee HAN, Bo-Heung Chung, Dae-Won Kim, Hwa-Shin Moon, Yong-Hyuk Moon, Jeong-Nyeo Kim
-
Patent number: 8769280Abstract: An authentication apparatus for a non-real-time IPTV system decrypts a first encrypted value included in a contents request message received from a device using a preset session key, and then verifies the validity of the contents request message. If the verification results of the contents request message are valid, the authentication apparatus encrypts a variation between timestamps of the authentication apparatus and the device using the session key, and then generates a second encrypted value. After verification information by which the device is capable of verifying the authentication apparatus has been generated using the second encrypted value, the authentication apparatus sends verification information, together with contents corresponding to the contents request message, to the device.Type: GrantFiled: June 28, 2011Date of Patent: July 1, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Dae-Hee Seo, Hyeok-Chan Kwon, Seung-Min Lee, Yong-Hyuk Moon, Jae-Hoon Nah, Taek-Yong Nam, Dong-Il Seo
-
Patent number: 8724805Abstract: A security label generation apparatus for scalable content distribution, includes a scalable content transmitter for receiving service level requirements of a user and network bandwidth information over a network and generating security labels and encrypted scalable units. Further, the security label generation apparatus includes a scalable content receiver for receiving the encrypted scalable units and the security labels from the scalable content transmitter and for decrypting, decoding, playing, modifying, storing or redistributing the encrypted scalable units based on the security labels. Furthermore, the security label generation apparatus includes scalable content storage for searching for scalable content and metadata corresponding to a request of the scalable content transmitter.Type: GrantFiled: December 19, 2011Date of Patent: May 13, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Yong-Hyuk Moon, Dong il Seo, Jae Hoon Nah, Hyeokchan Kwon, Seungmin Lee, Taek Yong Nam, Dae-Hee Seo
-
Publication number: 20140115400Abstract: There is provided a method of fault management of a smart device including comparing a value of a fault detection indicator (hereinafter referred to as ‘FDI’) in a normal state, which detects faults generated in the smart device, with respect to at least one performance indicator, with an FDI value observed in real time and detecting the faults by calculating a relative variation level of the observed values, and creating a diagnosis object (hereinafter referred to as ‘DO’) including a cause and a countermeasure of the detected fault and analyzing the fault.Type: ApplicationFiled: September 16, 2013Publication date: April 24, 2014Applicant: Electronics and Telecommunications Research InstituteInventors: Yong-Hyuk MOON, Jeong-Nyeo KIM, Bo-Heung CHUNG, Jin-Hee HAN, Dae-Won KIM, Hwa-Shin MOON
-
Publication number: 20140033318Abstract: An apparatus manages universal subscriber identity module (USIM) data in a terminal using a mobile trusted module (MTM). The apparatus includes a mobile information storage unit configured to store at least one key and the USIM data in a protection region, an information security unit configured to protect information stored in a USIM and the terminal using at least one of the USIM data and the key stored in the mobile information storage unit, and a USIM data manager configured to restore at least one of the USIM data and the key stored in the mobile information storage unit to the USIM, and store at least one of USIM data and the key provided from the USIM in the mobile information storage unit.Type: ApplicationFiled: May 29, 2013Publication date: January 30, 2014Applicant: Electronics and Telecommuncations Research InstituteInventors: Jin Hee HAN, Bo-Heung CHUNG, Hwa Shin MOON, Yong Hyuk MOON, Dae Won KIM, Jeong Nyeo KIM
-
Publication number: 20140026210Abstract: A method for authenticating a mobile device, the method comprising: detecting an external input to the mobile device; when the external input is detected, displaying a screen lock pattern having at least two or more pattern points, each pattern point having an identifier; determining whether a touch input is conducted on the at least two or more pattern points in an UI (User Interface) locked state of the mobile device; and when the touch input conducted on the at least two or more pattern points is successively made in a preset sequenced combination of identifiers, unlocking the locked state of the mobile device.Type: ApplicationFiled: July 17, 2013Publication date: January 23, 2014Inventors: Bo-Heung CHUNG, Jin Hee HAN, Yong Hyuk MOON, HWA SHIN MOON, Jeong Nyeo KIM
-
Patent number: 8543804Abstract: An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The video streaming server receives a service demand via a network and generates an encrypted streaming data. The adaptive security policy server analyzes a media structure and the service demand, by using a service profile received from the video streaming server, so as to generate a security policy description. The terminal generates and transmits the service demand to the video streaming server or the adaptive security server, obtains the encrypted streaming data from the video streaming server and decrypts the encrypted streaming data for playback, storing and retransmission.Type: GrantFiled: May 6, 2010Date of Patent: September 24, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Yong Hyuk Moon, Hyeok Chan Kwon, Seungmin Lee, Jae Hoon Nah, Taek Yong Nam, Dong Il Seo
-
Publication number: 20120163594Abstract: A security label generation apparatus for scalable content distribution, includes a scalable content transmitter for receiving service level requirements of a user and network bandwidth information over a network and generating security labels and encrypted scalable units. Further, the security label generation apparatus includes a scalable content receiver for receiving the encrypted scalable units and the security labels from the scalable content transmitter and for decrypting, decoding, playing, modifying, storing or redistributing the encrypted scalable units based on the security labels. Furthermore, the security label generation apparatus includes scalable content storage for searching for scalable content and metadata corresponding to a request of the scalable content transmitter.Type: ApplicationFiled: December 19, 2011Publication date: June 28, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Yong-Hyuk MOON, Dong il SEO, Jae Hoon NAH, Hyeokchan KWON, Seungmin LEE, Taek Yong NAM, Dae-Hee SEO
-
Publication number: 20120163595Abstract: An encryption method for providing layered access control for scalable media includes encrypting the scalable media using different encryption keys for respective layers of the scalable media to create a protected content; providing the protected content to a first user terminal; selectively inserting part or all of the encryption keys into a key area of a right object based on the grade of the first user terminal to generate a first right object; and providing the first right object to the first user terminal.Type: ApplicationFiled: December 19, 2011Publication date: June 28, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Hyeok Chan KWON, Taek Yong NAM, Seungmin LEE, Dae-Hee SEO, Yong Hyuk MOON, Jae Hoon NAH, Dong il SEO
-
Publication number: 20120159161Abstract: An authentication apparatus for a non-real-time IPTV system decrypts a first encrypted value included in a contents request message received from a device using a preset session key, and then verifies the validity of the contents request message. If the verification results of the contents request message are valid, the authentication apparatus encrypts a variation between timestamps of the authentication apparatus and the device using the session key, and then generates a second encrypted value. After verification information by which the device is capable of verifying the authentication apparatus has been generated using the second encrypted value, the authentication apparatus sends verification information, together with contents corresponding to the contents request message, to the device.Type: ApplicationFiled: June 28, 2011Publication date: June 21, 2012Applicant: Electronics and Telecommunications Research InstituteInventors: Dae-Hee SEO, Hyeok-Chan KWON, Seung-Min LEE, Yong-Hyuk MOON, Jae-Hoon NAH, Taek-Yong NAM, Dong-Il SEO
-
Publication number: 20120159532Abstract: A content sharing method performed in a content redistribution device based on a non-realtime IPTV service includes transmitting a secret key in password information of a user of the content redistribution device to an IPTV service server and storing a public key corresponding to the secret key; and transmitting an event message for content request to the IPTV service server to request a non-realtime IPTV service. Further, the content sharing method includes receiving contents requested in the event message for content requesting from the IPTV service server; and decoding the received contents and encrypting the decoded contents using the public key. Furthermore, the content sharing method includes transmitting the contents encrypted using the public key to content recipient devices; and generating an event message for content sharing using the public key to transmit the generated event message to the content recipient devices.Type: ApplicationFiled: June 23, 2011Publication date: June 21, 2012Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Dae-Hee SEO, Hyeok Chan KWON, Seungmin LEE, Yong Hyuk MOON, Jae Hoon NAH, Taek Yong NAM, Dong Il SEO
-
Patent number: 8146133Abstract: The invention relates to a P2P traffic management apparatus and method. A P2P flow agent monitors an executed application program to extract a P2P application program, adds application identifiers to packets generated by the application program according to a set policy, and transmits the packets. In this case, a P2P security gateway monitors the inflowing packets from the P2P flow agent to extract packets having the application identifiers, uses the extracted application identifiers to inquire and acquire a related policy, and controls the packets according to the acquired policy.Type: GrantFiled: July 9, 2008Date of Patent: March 27, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Yong-Hyuk Moon, Jaehoon Nah, Jaeho Yoo, Jongsoo Jang, Hyeokchan Kwon, Sunkee Koh, Jabeom Gu
-
Publication number: 20110145560Abstract: An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The video streaming server receives a service demand via a network and generates an encrypted streaming data. The adaptive security policy server analyzes a media structure and the service demand, by using a service profile received from the video streaming server, so as to generate a security policy description. The terminal generates and transmits the service demand to the video streaming server or the adaptive security server, obtains the encrypted streaming data from the video streaming server and decrypts the encrypted streaming data for playback, storing and retransmission.Type: ApplicationFiled: May 6, 2010Publication date: June 16, 2011Applicant: Electronics and Telecommunications Research InstituteInventors: Yong Hyuk MOON, Hyeok Chan KWON, Seungmin LEE, Jae Hoon NAH, Taek Yong NAM, Dong Il SEO
-
Publication number: 20100135488Abstract: An SVC encryption apparatus includes: an encoding/encryption unit for performing SVC (Scalable Video Coding) encoding on input data contents and carrying out encryption for data in accordance with a first encryption condition to generate a corresponding SVC bitstream; and a NAL (Network Adaptation Layer) data analysis unit for analyzing NAL data of the generated SVC bitstream to find out NAL data satisfying a second encryption condition. Further, the SVC encryption apparatus includes a conditional NAL data encryption unit for encrypting the extracted NAL data in accordance with the second encryption condition; and a bitstream transmitting unit for transmitting the SVC bitstream with encrypted NAL data.Type: ApplicationFiled: June 23, 2009Publication date: June 3, 2010Applicant: Electronics and Telecommunications Research InstituteInventors: Seungmin LEE, Yong Hyuk MOON, Ja-Beom GU, Hyeok Chan KWON, Yong-Sung JEON, Taek Yong NAM, Jae Hoon NAH
-
Publication number: 20090150972Abstract: The invention relates to a P2P traffic management apparatus and method. A P2P flow agent monitors an executed application program to extract a P2P application program, adds application identifiers to packets generated by the application program according to a set policy, and transmits the packets. In this case, a P2P security gateway monitors the inflowing packets from the P2P flow agent to extract packets having the application identifiers, uses the extracted application identifiers to inquire and acquire a related policy, and controls the packets according to the acquired policy.Type: ApplicationFiled: July 9, 2008Publication date: June 11, 2009Inventors: Yong-Hyuk MOON, Jaehoon NAH, Jaeho YOO, Jongsoo JANG, Hyeokchan KWON, Sunkee KOH, Jabeom GU