Patents by Inventor Yong Je Choi
Yong Je Choi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
IMIDAZOPYRIMIDINE AND IMIDAZOTRIAZINE DERIVATIVE, AND PHARMACEUTICAL COMPOSITION COMPRISING THE SAME
Publication number: 20240352023Abstract: The present disclosure provides a compound of Chemical Formula (1) or a pharmaceutically acceptable salt thereof, and a pharmaceutical composition comprising the same: wherein X, Z, R1 and R2 are as defined in the specification. The compound of Chemical Formula (1) or pharmaceutically acceptable salt thereof acts as a positive allosteric modulator of metabotropic glutamate receptor subtype 5 (mGluR5), thereby being useful in the prevention or treatment of disorder mediated by glutamate dysfunction and mGluR5.Type: ApplicationFiled: June 5, 2024Publication date: October 24, 2024Inventors: Chun Eung PARK, Young Koo JANG, Yong Je SHIN, Ji Yeon KIM, Seung Mo HAM, Yong Gil KIM, Hye Kyung MIN, Soo Bong CHA, Hyo Jun JUNG, Ju Young LEE, Seung Nam HAN, Jin Yong CHUNG, Eun Ju CHOI, Chan Mi JOUNG, Jong Sil PARK, Ji Won LEE, Nahm Ryune CHO, Eun Ju RYU, Cheol Young MAENG -
Imidazopyrimidine and imidazotriazine derivative, and pharmaceutical composition comprising the same
Patent number: 12037338Abstract: The present disclosure provides a compound of Chemical Formula (1) or a pharmaceutically acceptable salt thereof, and a pharmaceutical composition comprising the same: wherein X, Z, R1 and R2 are as defined in the specification. The compound of Chemical Formula (1) or pharmaceutically acceptable salt thereof acts as a positive allosteric modulator of metabotropic glutamate receptor subtype 5 (mGluR5), thereby being useful in the prevention or treatment of disorder mediated by glutamate dysfunction and mGluR5.Type: GrantFiled: June 1, 2021Date of Patent: July 16, 2024Assignee: SK BIOPHARMACEUTICALS CO., LTD.Inventors: Chun Eung Park, Young Koo Jang, Yong Je Shin, Ji Yeon Kim, Seung Mo Ham, Yong Gil Kim, Hye Kyung Min, Soo Bong Cha, Hyo Jun Jung, Ju Young Lee, Seung Nam Han, Jin Yong Chung, Eun Ju Choi, Chan Mi Joung, Jong Sil Park, Ji Won Lee, Nahm Ryune Cho, Eun Ju Ryu, Cheol Young Maeng -
Publication number: 20230142407Abstract: Disclosed herein are an apparatus for analyzing non-informative firmware and a method using the apparatus. The method includes detecting a target instruction for firmware analysis in a memory map in non-informative firmware, generating an analysis list based on memory map information corresponding to the target instruction, and generating a visualized analysis result corresponding to the firmware by grouping the entries of the analysis list by preset reference bytes.Type: ApplicationFiled: October 25, 2022Publication date: May 11, 2023Inventors: Dae-Won Kim, Sang-Su Lee, Yong-Je Choi, Byeong-Cheol Choi, Dong-Wook Kang, Yang-Seo Choi
-
Publication number: 20230004680Abstract: Disclosed herein are an apparatus and method for verifying the integrity of a hardware board. The apparatus includes one or more processors and execution memory for storing at least one program that is executed by the processors, wherein the program is configured to compare images of components arranged on a verification target board and a source board in a first image, obtained by photographing the verification target board, and in a second image prestored for the source board, as to whether images of the components are identical to each other, and compare first firmware extracted from the verification target board with second firmware of the source board, as to whether first firmware is identical to second firmware and verify integrity of the verification target board based on whether the images are identical to each other and on whether the pieces of firmware are identical to each other.Type: ApplicationFiled: May 6, 2022Publication date: January 5, 2023Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Yong-Je CHOI, Dae-Won KIM, Sang-Su LEE, Byeong-Cheol CHOI, Dong-Wook KANG, Ik-Kyun KIM, Yang-Seo CHOI
-
Publication number: 20230004499Abstract: Disclosed herein are an apparatus and method for extracting memory map information from firmware. The apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program retrieves memory-related data from firmware, sets a data structure by analyzing binary code based on the memory-related data, and retrieves a memory map structure from the firmware using the data structure.Type: ApplicationFiled: May 5, 2022Publication date: January 5, 2023Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Yong-Je CHOI, Dae-Won KIM, Sang-Su LEE, Byeong-Cheol CHOI, Dong-Wook KANG, Yang-Seo CHOI
-
Publication number: 20220269777Abstract: Disclosed herein are an apparatus and method for detecting violation of control flow integrity. The apparatus includes memory for storing a program and a processor for executing the program, wherein the processor multiple branch identifier registers to which identifiers of branch targets are written, a set branch identifier instruction configured to command an identifier of a branch target to be written to a branch identifier register at a predetermined sequence number, among the multiple branch identifier registers, and a check branch identifier instruction configured to command a signal indicating detection of a control flow hijacking attack to be issued based on whether a value written to the branch identifier register at the predetermined sequence number is identical to a value of an identifier of a branch target at the predetermined sequence number, wherein the program detects whether a control flow is hijacked based on the multiple branch identifier registers.Type: ApplicationFiled: November 3, 2021Publication date: August 25, 2022Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Dong-Wook KANG, Dae-Won KIM, Ik-Kyun KIM, Sang-Su LEE, Jin-Yong LEE, Byeong-Cheol CHOI, Yong-Je CHOI
-
Patent number: 9423425Abstract: A side channel analysis apparatus based on a profile includes a waveform collection unit configured to collect leaked information from a target device of a side channel analysis; and a preprocessing unit configured to preprocess a waveform data correspond to the leaked information collected from the waveform collection unit before analyzing same. Further, the side channel analysis apparatus includes an analysis unit configured to analyze the waveform data preprocessed in the preprocessing unit; and a profile configuration unit configured to make each process of the waveform collection unit, the preprocessing unit, and the analysis unit into a process and configure a profile for managing each process by connection of each process.Type: GrantFiled: January 4, 2013Date of Patent: August 23, 2016Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Ju Han Kim, Kyunghee Oh, Doo Ho Choi, Taesung Kim, Yong-Je Choi, Seung Kwang Lee
-
Publication number: 20150349948Abstract: Disclosed are a side channel analysis system that may facilitate to perform side channel analysis on a device whose dedicated side channel analysis board does not exist such as a smartphone, and a side channel analysis method using the same.Type: ApplicationFiled: April 9, 2015Publication date: December 3, 2015Inventors: Ju Han KIM, Doo Ho CHOI, Yong Je CHOI
-
Publication number: 20150324302Abstract: A white box encryption device is provided. The device included in a second device among a first device and the second device performing wired or wireless communication, and performing an encryption/decryption operation using a white box encryption table consisting of a look-up table set, includes, a non-volatile memory configured to store an incomplete look-up table set in which at least one look-up table or a portion of entire look-up table is removed, a volatile memory configured to store the incomplete look-up table set received from the non-volatile memory and the at least one look-up table received from the first device at a time of the encryption/decryption operation, and construct a complete look-up table set, and an encryption/decryption operation unit configured to perform the encryption/decryption operation using the complete look-up table set.Type: ApplicationFiled: May 12, 2015Publication date: November 12, 2015Inventors: Seung Kwang LEE, Doo Ho CHOI, Tae Sung KIM, Kyung Hee OH, Yong Je CHOI, Ju Han KIM, You Sung KANG
-
Publication number: 20150210175Abstract: An electric vehicle and a device and method for charging the electric vehicle are disclosed. The device for charging an electric vehicle includes a charger cable communication unit, a charger security unit, and a control unit. The charger cable communication unit receives encrypted electric vehicle charging information from an electric vehicle. The charger security unit decrypts the encrypted electric vehicle charging information. The control unit determines whether the decrypted electric vehicle charging information is identical with charger charging information. The charger security unit encrypts the charger charging information if the control unit of the device for charging an electric vehicle determines that the decrypted electric vehicle charging information is not identical with the charger charging information. The charger cable communication unit sends the encrypted charger charging information to the electric vehicle.Type: ApplicationFiled: January 21, 2015Publication date: July 30, 2015Applicants: Electronics and Telecommunications Research Institute, LG CNS Co., Ltd.Inventors: You-Sung KANG, Yong-Je CHOI, Doo-Ho CHOI, Hyun-Sook CHO, Eun-Kyung JUN, Doo-Il PARK, Byeong-Gyu HYEON, Joon-Ho SHIN, Dong-Young SHIN
-
Patent number: 9083489Abstract: In accordance with an embodiment, the logical exclusive operation on the random number RAND and the OPc value are performed several times, the logical operation and encryption processing using a random number RAND and logical operation and encryption processing using a random number S are done in any order, which brings an increase of an attack complexity as to whether to calculate the correlation coefficient from the power consumption waveform at any point when analyzing the correlation power, whereby it is possible to defend the CPA attack effectively.Type: GrantFiled: July 16, 2013Date of Patent: July 14, 2015Assignee: Electronics and Telecommunications Research InstituteInventors: Seung Kwang Lee, Doo Ho Choi, Taesung Kim, Yong-Je Choi, Kyunghee Oh, Ju Han Kim
-
Patent number: 8947211Abstract: A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection method using a Radio Frequency Identification (RFID) reader, the method including: receiving, from a tag, tag information including security parameter information and an encrypted Unique Item Identifier (UII); extracting the UII based on the security parameter information; transmitting, to the tag, a request message including a challenge value for replay prevention; and performing a tag authentication by receiving, from the tag, a response message including a handle and the challenge value.Type: GrantFiled: June 17, 2008Date of Patent: February 3, 2015Assignee: Electronics and Telecommunications Research InstituteInventors: Doo Ho Choi, Yong-Je Choi, Ho Won Kim, Kyo Il Chung
-
Publication number: 20140286486Abstract: In accordance with an embodiment, the logical exclusive operation on the random number RAND and the OPc value are performed several times, the logical operation and encryption processing using a random number RAND and logical operation and encryption processing using a random number S are done in any order, which brings an increase of an attack complexity as to whether to calculate the correlation coefficient from the power consumption waveform at any point when analyzing the correlation power, whereby it is possible to defend the CPA attack effectively.Type: ApplicationFiled: July 16, 2013Publication date: September 25, 2014Inventors: Seung Kwang LEE, Doo Ho CHOI, Taesung KIM, Yong-Je CHOI, Kyunghee OH, Ju Han KIM
-
Patent number: 8774406Abstract: A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values.Type: GrantFiled: December 21, 2011Date of Patent: July 8, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Yong-Je Choi, Doo Ho Choi, Taesung Kim, Kyunghee Oh, You Sung Kang, Ju Han Kim, Jeong Nyeo Kim, Hyun sook Cho
-
Publication number: 20140098951Abstract: There are provided a method for elliptic curve cryptography with countermeasures against simple power analysis and fault injection analysis, and a system thereof. According to an aspect, there is provided a method for elliptic curve cryptography, in which an elliptic curve point operation is performed to generate an elliptic curve code, including: receiving a first point and a second point on the elliptic curve, wherein the first point is P0=(x0, y0) and the second point is P1=(x1, y1); and performing doubling if the first point is the same as the second point, and performing addition if the first point is different from the second point, to thereby obtain a third point, wherein the third point is P2=P0+P1=(x2, y2). Accordingly, it is possible to provide countermeasures against a side channel analysis attack.Type: ApplicationFiled: February 19, 2013Publication date: April 10, 2014Applicant: ELECTRONICS & TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Yong Je CHOI, Doo Ho CHOI, Hyun Sook CHO
-
Patent number: 8681985Abstract: A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input; and performing an operation on one masking S-box by referring to the generated masking S-box table. Further, the masking operation method for the symmetric key encryption system includes performing an operation on a remaining masking S-box for a remaining S-box, which was input, by referring to the masking S-box table.Type: GrantFiled: August 31, 2010Date of Patent: March 25, 2014Assignee: Electronics & Telecommunications Research InstituteInventors: Doo Ho Choi, Yong-Je Choi
-
Patent number: 8615078Abstract: An apparatus for processing an F-function in a SEED encryption system includes: an arithmetic operation masking conversion unit for converting a logical operation mask value obtained by performing a logical operation of a SEED F-function input value and a random mask value into an arithmetic operation mask value; and a masking G-function unit for taking the arithmetic operation mask value from the arithmetic operation masking conversion unit as an input and producing an arithmetic operation output.Type: GrantFiled: May 21, 2010Date of Patent: December 24, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Doo Ho Choi, You Sung Kang, Ju Han Kim, Kyunghee Oh, Taesung Kim, Yong-Je Choi
-
Radio frequency identification (RFID) security apparatus having security function and method thereof
Patent number: 8607333Abstract: Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.Type: GrantFiled: July 20, 2009Date of Patent: December 10, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Sang Yeoun Lee, Heyung Sub Lee, You Sung Kang, Doo Ho Choi, Yong-Je Choi, Hyunseok Kim, Cheol Sig Pyo, Jong-Suk Chae, Dong-Beom Shin, Jae-young Jung -
Patent number: 8488781Abstract: Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a masked inversion table; and operating a masked S-box using the affine transform table and the masked inversion table.Type: GrantFiled: May 17, 2012Date of Patent: July 16, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Doo Ho Choi, Yong-Je Choi, You Sung Kang, Ju Han Kim, Tae sung Kim, Kyung hee Oh
-
Patent number: 8341758Abstract: Provided are a secure device and method for preventing a side channel attack. The secure device includes a secure module converting plaintext data received from the outside into ciphertext data to thereby store the converted ciphertext data, or converting stored ciphertext data into plaintext data to thereby output the converted plaintext data, and a side channel attack sensing module sensing a side channel attack upon the secure module, and, according to the sensing result, allowing the secure module to stop operating, inducing malfunctions of the secure module, delaying operations of the secure module, or making the secure module a device having the secure module disabled. The secure device can safely protect an internal security algorithm and data from the side channel attack.Type: GrantFiled: December 9, 2010Date of Patent: December 25, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Ju Han Kim, You Sung Kang, Doo Ho Choi, Yong-Je Choi