Patents by Inventor Yong Je Choi

Yong Je Choi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240352023
    Abstract: The present disclosure provides a compound of Chemical Formula (1) or a pharmaceutically acceptable salt thereof, and a pharmaceutical composition comprising the same: wherein X, Z, R1 and R2 are as defined in the specification. The compound of Chemical Formula (1) or pharmaceutically acceptable salt thereof acts as a positive allosteric modulator of metabotropic glutamate receptor subtype 5 (mGluR5), thereby being useful in the prevention or treatment of disorder mediated by glutamate dysfunction and mGluR5.
    Type: Application
    Filed: June 5, 2024
    Publication date: October 24, 2024
    Inventors: Chun Eung PARK, Young Koo JANG, Yong Je SHIN, Ji Yeon KIM, Seung Mo HAM, Yong Gil KIM, Hye Kyung MIN, Soo Bong CHA, Hyo Jun JUNG, Ju Young LEE, Seung Nam HAN, Jin Yong CHUNG, Eun Ju CHOI, Chan Mi JOUNG, Jong Sil PARK, Ji Won LEE, Nahm Ryune CHO, Eun Ju RYU, Cheol Young MAENG
  • Patent number: 12037338
    Abstract: The present disclosure provides a compound of Chemical Formula (1) or a pharmaceutically acceptable salt thereof, and a pharmaceutical composition comprising the same: wherein X, Z, R1 and R2 are as defined in the specification. The compound of Chemical Formula (1) or pharmaceutically acceptable salt thereof acts as a positive allosteric modulator of metabotropic glutamate receptor subtype 5 (mGluR5), thereby being useful in the prevention or treatment of disorder mediated by glutamate dysfunction and mGluR5.
    Type: Grant
    Filed: June 1, 2021
    Date of Patent: July 16, 2024
    Assignee: SK BIOPHARMACEUTICALS CO., LTD.
    Inventors: Chun Eung Park, Young Koo Jang, Yong Je Shin, Ji Yeon Kim, Seung Mo Ham, Yong Gil Kim, Hye Kyung Min, Soo Bong Cha, Hyo Jun Jung, Ju Young Lee, Seung Nam Han, Jin Yong Chung, Eun Ju Choi, Chan Mi Joung, Jong Sil Park, Ji Won Lee, Nahm Ryune Cho, Eun Ju Ryu, Cheol Young Maeng
  • Publication number: 20230142407
    Abstract: Disclosed herein are an apparatus for analyzing non-informative firmware and a method using the apparatus. The method includes detecting a target instruction for firmware analysis in a memory map in non-informative firmware, generating an analysis list based on memory map information corresponding to the target instruction, and generating a visualized analysis result corresponding to the firmware by grouping the entries of the analysis list by preset reference bytes.
    Type: Application
    Filed: October 25, 2022
    Publication date: May 11, 2023
    Inventors: Dae-Won Kim, Sang-Su Lee, Yong-Je Choi, Byeong-Cheol Choi, Dong-Wook Kang, Yang-Seo Choi
  • Publication number: 20230004680
    Abstract: Disclosed herein are an apparatus and method for verifying the integrity of a hardware board. The apparatus includes one or more processors and execution memory for storing at least one program that is executed by the processors, wherein the program is configured to compare images of components arranged on a verification target board and a source board in a first image, obtained by photographing the verification target board, and in a second image prestored for the source board, as to whether images of the components are identical to each other, and compare first firmware extracted from the verification target board with second firmware of the source board, as to whether first firmware is identical to second firmware and verify integrity of the verification target board based on whether the images are identical to each other and on whether the pieces of firmware are identical to each other.
    Type: Application
    Filed: May 6, 2022
    Publication date: January 5, 2023
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yong-Je CHOI, Dae-Won KIM, Sang-Su LEE, Byeong-Cheol CHOI, Dong-Wook KANG, Ik-Kyun KIM, Yang-Seo CHOI
  • Publication number: 20230004499
    Abstract: Disclosed herein are an apparatus and method for extracting memory map information from firmware. The apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program retrieves memory-related data from firmware, sets a data structure by analyzing binary code based on the memory-related data, and retrieves a memory map structure from the firmware using the data structure.
    Type: Application
    Filed: May 5, 2022
    Publication date: January 5, 2023
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yong-Je CHOI, Dae-Won KIM, Sang-Su LEE, Byeong-Cheol CHOI, Dong-Wook KANG, Yang-Seo CHOI
  • Publication number: 20220269777
    Abstract: Disclosed herein are an apparatus and method for detecting violation of control flow integrity. The apparatus includes memory for storing a program and a processor for executing the program, wherein the processor multiple branch identifier registers to which identifiers of branch targets are written, a set branch identifier instruction configured to command an identifier of a branch target to be written to a branch identifier register at a predetermined sequence number, among the multiple branch identifier registers, and a check branch identifier instruction configured to command a signal indicating detection of a control flow hijacking attack to be issued based on whether a value written to the branch identifier register at the predetermined sequence number is identical to a value of an identifier of a branch target at the predetermined sequence number, wherein the program detects whether a control flow is hijacked based on the multiple branch identifier registers.
    Type: Application
    Filed: November 3, 2021
    Publication date: August 25, 2022
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Dong-Wook KANG, Dae-Won KIM, Ik-Kyun KIM, Sang-Su LEE, Jin-Yong LEE, Byeong-Cheol CHOI, Yong-Je CHOI
  • Patent number: 9423425
    Abstract: A side channel analysis apparatus based on a profile includes a waveform collection unit configured to collect leaked information from a target device of a side channel analysis; and a preprocessing unit configured to preprocess a waveform data correspond to the leaked information collected from the waveform collection unit before analyzing same. Further, the side channel analysis apparatus includes an analysis unit configured to analyze the waveform data preprocessed in the preprocessing unit; and a profile configuration unit configured to make each process of the waveform collection unit, the preprocessing unit, and the analysis unit into a process and configure a profile for managing each process by connection of each process.
    Type: Grant
    Filed: January 4, 2013
    Date of Patent: August 23, 2016
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Ju Han Kim, Kyunghee Oh, Doo Ho Choi, Taesung Kim, Yong-Je Choi, Seung Kwang Lee
  • Publication number: 20150349948
    Abstract: Disclosed are a side channel analysis system that may facilitate to perform side channel analysis on a device whose dedicated side channel analysis board does not exist such as a smartphone, and a side channel analysis method using the same.
    Type: Application
    Filed: April 9, 2015
    Publication date: December 3, 2015
    Inventors: Ju Han KIM, Doo Ho CHOI, Yong Je CHOI
  • Publication number: 20150324302
    Abstract: A white box encryption device is provided. The device included in a second device among a first device and the second device performing wired or wireless communication, and performing an encryption/decryption operation using a white box encryption table consisting of a look-up table set, includes, a non-volatile memory configured to store an incomplete look-up table set in which at least one look-up table or a portion of entire look-up table is removed, a volatile memory configured to store the incomplete look-up table set received from the non-volatile memory and the at least one look-up table received from the first device at a time of the encryption/decryption operation, and construct a complete look-up table set, and an encryption/decryption operation unit configured to perform the encryption/decryption operation using the complete look-up table set.
    Type: Application
    Filed: May 12, 2015
    Publication date: November 12, 2015
    Inventors: Seung Kwang LEE, Doo Ho CHOI, Tae Sung KIM, Kyung Hee OH, Yong Je CHOI, Ju Han KIM, You Sung KANG
  • Publication number: 20150210175
    Abstract: An electric vehicle and a device and method for charging the electric vehicle are disclosed. The device for charging an electric vehicle includes a charger cable communication unit, a charger security unit, and a control unit. The charger cable communication unit receives encrypted electric vehicle charging information from an electric vehicle. The charger security unit decrypts the encrypted electric vehicle charging information. The control unit determines whether the decrypted electric vehicle charging information is identical with charger charging information. The charger security unit encrypts the charger charging information if the control unit of the device for charging an electric vehicle determines that the decrypted electric vehicle charging information is not identical with the charger charging information. The charger cable communication unit sends the encrypted charger charging information to the electric vehicle.
    Type: Application
    Filed: January 21, 2015
    Publication date: July 30, 2015
    Applicants: Electronics and Telecommunications Research Institute, LG CNS Co., Ltd.
    Inventors: You-Sung KANG, Yong-Je CHOI, Doo-Ho CHOI, Hyun-Sook CHO, Eun-Kyung JUN, Doo-Il PARK, Byeong-Gyu HYEON, Joon-Ho SHIN, Dong-Young SHIN
  • Patent number: 9083489
    Abstract: In accordance with an embodiment, the logical exclusive operation on the random number RAND and the OPc value are performed several times, the logical operation and encryption processing using a random number RAND and logical operation and encryption processing using a random number S are done in any order, which brings an increase of an attack complexity as to whether to calculate the correlation coefficient from the power consumption waveform at any point when analyzing the correlation power, whereby it is possible to defend the CPA attack effectively.
    Type: Grant
    Filed: July 16, 2013
    Date of Patent: July 14, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Seung Kwang Lee, Doo Ho Choi, Taesung Kim, Yong-Je Choi, Kyunghee Oh, Ju Han Kim
  • Patent number: 8947211
    Abstract: A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection method using a Radio Frequency Identification (RFID) reader, the method including: receiving, from a tag, tag information including security parameter information and an encrypted Unique Item Identifier (UII); extracting the UII based on the security parameter information; transmitting, to the tag, a request message including a challenge value for replay prevention; and performing a tag authentication by receiving, from the tag, a response message including a handle and the challenge value.
    Type: Grant
    Filed: June 17, 2008
    Date of Patent: February 3, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho Choi, Yong-Je Choi, Ho Won Kim, Kyo Il Chung
  • Publication number: 20140286486
    Abstract: In accordance with an embodiment, the logical exclusive operation on the random number RAND and the OPc value are performed several times, the logical operation and encryption processing using a random number RAND and logical operation and encryption processing using a random number S are done in any order, which brings an increase of an attack complexity as to whether to calculate the correlation coefficient from the power consumption waveform at any point when analyzing the correlation power, whereby it is possible to defend the CPA attack effectively.
    Type: Application
    Filed: July 16, 2013
    Publication date: September 25, 2014
    Inventors: Seung Kwang LEE, Doo Ho CHOI, Taesung KIM, Yong-Je CHOI, Kyunghee OH, Ju Han KIM
  • Patent number: 8774406
    Abstract: A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: July 8, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yong-Je Choi, Doo Ho Choi, Taesung Kim, Kyunghee Oh, You Sung Kang, Ju Han Kim, Jeong Nyeo Kim, Hyun sook Cho
  • Publication number: 20140098951
    Abstract: There are provided a method for elliptic curve cryptography with countermeasures against simple power analysis and fault injection analysis, and a system thereof. According to an aspect, there is provided a method for elliptic curve cryptography, in which an elliptic curve point operation is performed to generate an elliptic curve code, including: receiving a first point and a second point on the elliptic curve, wherein the first point is P0=(x0, y0) and the second point is P1=(x1, y1); and performing doubling if the first point is the same as the second point, and performing addition if the first point is different from the second point, to thereby obtain a third point, wherein the third point is P2=P0+P1=(x2, y2). Accordingly, it is possible to provide countermeasures against a side channel analysis attack.
    Type: Application
    Filed: February 19, 2013
    Publication date: April 10, 2014
    Applicant: ELECTRONICS & TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yong Je CHOI, Doo Ho CHOI, Hyun Sook CHO
  • Patent number: 8681985
    Abstract: A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input; and performing an operation on one masking S-box by referring to the generated masking S-box table. Further, the masking operation method for the symmetric key encryption system includes performing an operation on a remaining masking S-box for a remaining S-box, which was input, by referring to the masking S-box table.
    Type: Grant
    Filed: August 31, 2010
    Date of Patent: March 25, 2014
    Assignee: Electronics & Telecommunications Research Institute
    Inventors: Doo Ho Choi, Yong-Je Choi
  • Patent number: 8615078
    Abstract: An apparatus for processing an F-function in a SEED encryption system includes: an arithmetic operation masking conversion unit for converting a logical operation mask value obtained by performing a logical operation of a SEED F-function input value and a random mask value into an arithmetic operation mask value; and a masking G-function unit for taking the arithmetic operation mask value from the arithmetic operation masking conversion unit as an input and producing an arithmetic operation output.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: December 24, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho Choi, You Sung Kang, Ju Han Kim, Kyunghee Oh, Taesung Kim, Yong-Je Choi
  • Patent number: 8607333
    Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.
    Type: Grant
    Filed: July 20, 2009
    Date of Patent: December 10, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun Lee, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung
  • Patent number: 8488781
    Abstract: Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a masked inversion table; and operating a masked S-box using the affine transform table and the masked inversion table.
    Type: Grant
    Filed: May 17, 2012
    Date of Patent: July 16, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho Choi, Yong-Je Choi, You Sung Kang, Ju Han Kim, Tae sung Kim, Kyung hee Oh
  • Patent number: 8341758
    Abstract: Provided are a secure device and method for preventing a side channel attack. The secure device includes a secure module converting plaintext data received from the outside into ciphertext data to thereby store the converted ciphertext data, or converting stored ciphertext data into plaintext data to thereby output the converted plaintext data, and a side channel attack sensing module sensing a side channel attack upon the secure module, and, according to the sensing result, allowing the secure module to stop operating, inducing malfunctions of the secure module, delaying operations of the secure module, or making the secure module a device having the secure module disabled. The secure device can safely protect an internal security algorithm and data from the side channel attack.
    Type: Grant
    Filed: December 9, 2010
    Date of Patent: December 25, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Ju Han Kim, You Sung Kang, Doo Ho Choi, Yong-Je Choi