Patents by Inventor You-Sung Kang

You-Sung Kang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240144894
    Abstract: Disclosed herein is a method for transmitting information using a monitor brightness change. The method may include generating a transmission data frame structure for transmitting digital information, encoding the bit of the digital information, and converting the encoded bit of the digital information into a wireless signal that is a brightness change signal of blue (B) color, among red, green, and blue (RGB) for configuring colors on a monitor.
    Type: Application
    Filed: June 19, 2023
    Publication date: May 2, 2024
    Inventors: Yong-Sung JEON, Sang-Woo LEE, Ha-Young SEONG, You-Sung KANG, Ik-Kyun KIM
  • Publication number: 20230341942
    Abstract: The present disclosure relates to a tactile emotion recognition method and device, and is directed to assigning an impedance value to each object in a virtual space; inducing virtual force using displacement between the object and a user's body in the virtual space; inducing a signal, which causes a signal of a sensory nerve to be fired, with a value corresponding to the virtual force; stimulating a location where the sensory nerve is located temporarily or over time; and generating feedback in the virtual space based on a stimulation result.
    Type: Application
    Filed: April 20, 2023
    Publication date: October 26, 2023
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Sung Q LEE, Kang Ho PARK, You Sung KANG
  • Publication number: 20230156463
    Abstract: Provided is a module and method for transmitting information using a wireless hidden signal, which is capable of transmitting important information data requiring extreme security using a wireless hidden signal, and allowing the important information to be detected and distinguished by only promised transmitting/receiving parties so that the possibility of the wireless hidden signal being discovered can be minimized and security can be enhanced. The module for transferring information using a wireless hidden signal includes: a hidden formatting unit configured to generate a transmission data frame structure based on data that needs to be wirelessly transmitted; a hidden encoding unit configured to encode the generated transmission data frame structure to generate and output a hidden encoded bit stream; and a hidden modulation unit configured to convert the output hidden encoded bit stream into a wireless signal in a wireless transmission format.
    Type: Application
    Filed: October 18, 2022
    Publication date: May 18, 2023
    Inventors: Yong Sung JEON, Ha Young SEONG, Sang Woo LEE, You Sung KANG, Ik Kyun KIM, Mi Kyung OH, Sang Jae LEE
  • Publication number: 20230077314
    Abstract: Disclosed herein is a method for detecting a covert channel in wireless communication. The method includes setting a wireless communication specification, detecting a covert timing channel, and detecting a covert storage channel.
    Type: Application
    Filed: June 16, 2022
    Publication date: March 9, 2023
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Sang-Woo LEE, Yong-Sung JEON, Ha-Young SEONG, You-Sung KANG, Ik-Kyun KIM
  • Patent number: 11336444
    Abstract: Disclosed herein are a hardware security module, a device having the hardware security module, and a method for operating the device. The method for verifying integrity of executable code in a device includes dividing, by a Micro-Control Unit (MCU), executable code into multiple blocks, generating, by the MCU, hash values corresponding to the blocks resulting from the division, storing, by a Hardware Security Module (HSM), the generated hash values, calculating, by the MCU, at least one hash value, among hash values of the multiple blocks when the executable code boots, and comparing, by the HSM, the calculated hash value with a hash value corresponding to the calculated hash value, among the hash values stored in the HSM.
    Type: Grant
    Filed: July 27, 2020
    Date of Patent: May 17, 2022
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yong-Sung Jeon, You-Sung Kang, Byoung-Koo Kim, Sang-Jae Lee, Seung-Kwang Lee, Doo-Ho Choi
  • Patent number: 11329835
    Abstract: Disclosed herein are an apparatus and method for authenticating an IoT device. The method, performed by the IoT device authentication apparatus, includes transmitting, by the IoT device authentication apparatus, a random number to the IoT device and encrypting, by the IoT device authentication apparatus, the random number using a previously registered first white-box cryptography value through a white-box cryptography method; generating, by the IoT device, a first device response value from a previously registered first device challenge value using a Physical Unclonable Function (PUF) and encrypting, by the IoT device, the random number, received from the IoT device authentication apparatus, using the first device response value; and performing, by the IoT device authentication apparatus, authentication of the IoT device by checking whether the random number encrypted using the white-box cryptography method matches the random number encrypted using the PUF, which is received from the IoT device.
    Type: Grant
    Filed: April 22, 2020
    Date of Patent: May 10, 2022
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Byoung-Koo Kim, Seung-Yong Yoon, You-Sung Kang, Doo-Ho Choi, Ik-Kyun Kim, Tae-Sung Kim, Mi-Kyung Oh, Sang-Jae Lee
  • Publication number: 20210392004
    Abstract: Disclosed herein are an apparatus and method for device authentication. The method for device authentication based on a certificate using a PUF, performed by an apparatus for device authentication based on a certificate using a PUF, includes acquiring previously stored first Challenge-Response-Pair (CRP) information corresponding to identification information received from a device that requests authentication and generating a certificate including a public key generated using the first CRP information; transmitting a message in which the certificate encrypted using the first response value of the first CRP information as a server secret key and the first challenge value of the first CRP information are included to the device; and authenticating the device by verifying an encrypted signature message received from the device through a secure channel.
    Type: Application
    Filed: March 22, 2021
    Publication date: December 16, 2021
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Byoung-Koo KIM, Seung-Yong YOON, You-Sung KANG, Doo-Ho CHOI, Ik-Kyun KIM, Tae-Sung KIM, Mi-Kyung OH, Sang-Jae LEE
  • Patent number: 11115202
    Abstract: Disclosed is a method of generating secret information on the basis of a ring oscillator. According to an embodiment of the present disclosure, there is provided an apparatus for generating secret information on the basis of a ring oscillator, the apparatus including: multiple PUF information generation units each including at least one ring oscillator cell and generating physically unclonable function (PUF) information generated by the at least one ring oscillator cell; a phase checking unit cross-checking phases for the multiple pieces of the PUF information that are output from the multiple PUF information generation units, respectively; and a secret key generation unit outputting secret key information based on a result of comparing the multiple phases received from the phase checking unit.
    Type: Grant
    Filed: October 16, 2019
    Date of Patent: September 7, 2021
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sang Jae Lee, Mi Kyung Oh, You Sung Kang, Ik Kyun Kim, Doo Ho Choi
  • Publication number: 20210152326
    Abstract: Disclosed herein are a white-box encryption method for preventing a fault injection attack and an apparatus for the same. The white-box encryption method is configured to acquire a first intermediate value by inputting plaintext to a first part, among all of rounds of a white-box-based encryption algorithm, before table redundancy operations are performed, to input the first intermediate value to a second part for performing the table redundancy operations through at least two lookup tables to which different encodings based on a secret key are applied, among all of the rounds, to acquire a second intermediate value by inputting the output values of the at least two lookup tables to at least one XOR lookup table, and to output ciphertext for the plaintext based on a third part for decoding the second intermediate value.
    Type: Application
    Filed: April 30, 2020
    Publication date: May 20, 2021
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Seung-Kwang LEE, You-Sung KANG, Do-Young CHUNG
  • Publication number: 20210058249
    Abstract: Disclosed herein are a hardware security module, a device having the hardware security module, and a method for operating the device. The method for verifying integrity of executable code in a device includes dividing, by a Micro-Control Unit (MCU), executable code into multiple blocks, generating, by the MCU, hash values corresponding to the blocks resulting from the division, storing, by a Hardware Security Module (HSM), the generated hash values, calculating, by the MCU, at least one hash value, among hash values of the multiple blocks when the executable code boots, and comparing, by the HSM, the calculated hash value with a hash value corresponding to the calculated hash value, among the hash values stored in the HSM.
    Type: Application
    Filed: July 27, 2020
    Publication date: February 25, 2021
    Inventors: Yong-Sung JEON, You-Sung KANG, Byoung-Koo KIM, Sang-Jae LEE, Seung-Kwang LEE, Doo-Ho CHOI
  • Publication number: 20210036873
    Abstract: Disclosed herein are an apparatus and method for authenticating an IoT device. The method, performed by the IoT device authentication apparatus, includes transmitting, by the IoT device authentication apparatus, a random number to the IoT device and encrypting, by the IoT device authentication apparatus, the random number using a previously registered first white-box cryptography value through a white-box cryptography method; generating, by the IoT device, a first device response value from a previously registered first device challenge value using a Physical Unclonable Function (PUF) and encrypting, by the IoT device, the random number, received from the IoT device authentication apparatus, using the first device response value; and performing, by the IoT device authentication apparatus, authentication of the IoT device by checking whether the random number encrypted using the white-box cryptography method matches the random number encrypted using the PUF, which is received from the IoT device.
    Type: Application
    Filed: April 22, 2020
    Publication date: February 4, 2021
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Byoung-Koo KIM, Seung-Yong YOON, You-Sung KANG, Doo-Ho CHOI, Ik-Kyun KIM, Tae-Sung KIM, Mi-Kyung OH, Sang-Jae LEE
  • Publication number: 20200412556
    Abstract: Disclosed herein is a method of operating an authentication server based on a Physical Unclonable Function (PUF), which includes transmitting a Challenge-Response Pair (CRP) update request message to a user device when a CRP update event occurs, receiving a CRP update response message from the user device in response to the CRP update request message, generating a secret key corresponding to the CRP update request message, decrypting the CRP update response message with the secret key, and updating a CRP corresponding to the secret key in a database using the decrypted CRP update response message.
    Type: Application
    Filed: March 25, 2020
    Publication date: December 31, 2020
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Seung-Yong YOON, Byoung-Koo KIM, You-Sung KANG, Doo-Ho CHOI, Ik-Kyun KIM, Tae-Sung KIM, Mi-Kyung OH, Sang-Jae LEE
  • Publication number: 20200233980
    Abstract: A secret information generation apparatus and a method for operating the secret information generation apparatus. The secret information generation apparatus includes a resistor-capacitor circuit, and a microcontroller unit including a first pin connected to an input terminal of the resistor-capacitor circuit and a second pin connected to an output terminal of the resistor-capacitor circuit, wherein the microcontroller unit is configured to transmit a digital value corresponding to a challenge to the resistor-capacitor circuit through the first pin, receive an output value of the resistor-capacitor circuit corresponding to the digital value through the second pin, convert the received value into a digital value using an analog-to-digital converter, extract one or more valid bits from the converted digital value, and then generate a response.
    Type: Application
    Filed: January 14, 2020
    Publication date: July 23, 2020
    Inventors: Sang-Jae LEE, You-Sung KANG, Keon-Woo KIM, Byoung-Koo KIM, Ik-Kyun KIM, Ju-Han KIM, Tae-Sung KIM, Mi-Kyung OH, Seung-Yong YOON, Seung-Kwang LEE, Yong-Sung JEON, Doo-Ho CHOI
  • Publication number: 20200167504
    Abstract: Disclosed herein are an apparatus and method for generating secret information. The apparatus includes a data communication unit for receiving a request to output a content value and outputting the content value; and a microcontroller unit for generating a Physically Unclonable Function (PUF) response based on the content value, calculating the characteristic value of the PUF response, and generating secret information using the PUF response, the error of which is corrected using the characteristic value.
    Type: Application
    Filed: August 27, 2019
    Publication date: May 28, 2020
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Mi-Kyung OH, Sang-Jae LEE, You-Sung KANG, Ik-Kyun KIM, Ju-Han KIM, Doo-Ho CHOI
  • Publication number: 20200162249
    Abstract: Disclosed is a method of generating secret information on the basis of a ring oscillator. According to an embodiment of the present disclosure, there is provided an apparatus for generating secret information on the basis of a ring oscillator, the apparatus including: multiple PUF information generation units each including at least one ring oscillator cell and generating physically unclonable function (PUF) information generated by the at least one ring oscillator cell; a phase checking unit cross-checking phases for the multiple pieces of the PUF information that are output from the multiple PUF information generation units, respectively; and a secret key generation unit outputting secret key information based on a result of comparing the multiple phases received from the phase checking unit.
    Type: Application
    Filed: October 16, 2019
    Publication date: May 21, 2020
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Sang Jae LEE, Mi Kyung OH, You Sung KANG, Ik Kyun KIM, Doo Ho CHOI
  • Publication number: 20170244677
    Abstract: Provided are an operation method and a secure terminal for performing the method. The operation method may include receiving, from a user terminal, a plain text on which an external encoding operation is to be performed, performing the external encoding operation on the plain text, and transmitting the external encoding operated plain text to the user terminal, and the operation method may include receiving, from a user terminal, a cryptogram in which a white-box cryptography operation is performed on an external encoding operated plain text; performing an external decoding operation on the cryptogram; and transmitting the external decoding operated cryptogram to the user terminal.
    Type: Application
    Filed: July 19, 2016
    Publication date: August 24, 2017
    Inventors: Seung Kwang LEE, You Sung KANG, Ju Han KIM, Tae Sung KIM, Doo Ho CHOI, Geon Woo KIM, Soo Hyung KIM, Hyun Sook CHO, Seung Hun JIN
  • Publication number: 20150324302
    Abstract: A white box encryption device is provided. The device included in a second device among a first device and the second device performing wired or wireless communication, and performing an encryption/decryption operation using a white box encryption table consisting of a look-up table set, includes, a non-volatile memory configured to store an incomplete look-up table set in which at least one look-up table or a portion of entire look-up table is removed, a volatile memory configured to store the incomplete look-up table set received from the non-volatile memory and the at least one look-up table received from the first device at a time of the encryption/decryption operation, and construct a complete look-up table set, and an encryption/decryption operation unit configured to perform the encryption/decryption operation using the complete look-up table set.
    Type: Application
    Filed: May 12, 2015
    Publication date: November 12, 2015
    Inventors: Seung Kwang LEE, Doo Ho CHOI, Tae Sung KIM, Kyung Hee OH, Yong Je CHOI, Ju Han KIM, You Sung KANG
  • Publication number: 20150210175
    Abstract: An electric vehicle and a device and method for charging the electric vehicle are disclosed. The device for charging an electric vehicle includes a charger cable communication unit, a charger security unit, and a control unit. The charger cable communication unit receives encrypted electric vehicle charging information from an electric vehicle. The charger security unit decrypts the encrypted electric vehicle charging information. The control unit determines whether the decrypted electric vehicle charging information is identical with charger charging information. The charger security unit encrypts the charger charging information if the control unit of the device for charging an electric vehicle determines that the decrypted electric vehicle charging information is not identical with the charger charging information. The charger cable communication unit sends the encrypted charger charging information to the electric vehicle.
    Type: Application
    Filed: January 21, 2015
    Publication date: July 30, 2015
    Applicants: Electronics and Telecommunications Research Institute, LG CNS Co., Ltd.
    Inventors: You-Sung KANG, Yong-Je CHOI, Doo-Ho CHOI, Hyun-Sook CHO, Eun-Kyung JUN, Doo-Il PARK, Byeong-Gyu HYEON, Joon-Ho SHIN, Dong-Young SHIN
  • Patent number: 9054881
    Abstract: A Radio Frequency Identification (RFID) tag and an interrogator that support a normal mode and a secure mode, and operating methods thereof are provided. The RFID tag may notify the interrogator of whether a current operating mode of the RFID tag is the normal mode or the secure mode, may perform different inventory processes based on the current operating mode, and may perform an authentication of the interrogator. Here, the RFID tag and the interrogator may also perform a mutual authentication.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: June 9, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sang Yeoun Lee, Kang Bok Lee, Heyung Sub Lee, Dong Beom Shin, Hyun Seok Kim, You Sung Kang, Joo Sang Park, Cheol Sig Pyo, Jong Suk Chae
  • Patent number: 8774406
    Abstract: A masking addition operation apparatus for prevention of a side channel attack, includes a random value generation unit generating a first random value for a first input, second random value for a second input, and a summation random value. The masking addition operation apparatus includes an operation part performing an operation on the first and second random values, a previous carry input, and first and second masked random values generated based on the first and second random values. The masking addition operation apparatus includes a carry generator generating a carry input using a result of the operation part; and a summation bit generator generating a summation bit using the summation random value, the first and second random values, the previous carry input and the first and second masked random values.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: July 8, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yong-Je Choi, Doo Ho Choi, Taesung Kim, Kyunghee Oh, You Sung Kang, Ju Han Kim, Jeong Nyeo Kim, Hyun sook Cho