loadpatents
name:-0.054696083068848
name:-0.031213045120239
name:-0.0091209411621094
YI; Jeong Hyun Patent Filings

YI; Jeong Hyun

Patent Applications and Registrations

Patent applications and USPTO patent grants for YI; Jeong Hyun.The latest application filed is for "method for evaluating risk of data leakage in application, recording medium and device for performing the method".

Company Profile
7.32.48
  • YI; Jeong Hyun - Seoul KR
  • Yi; Jeong Hyun - Seongnam-si KR
  • Yi; Jeong Hyun - Gyeonggi-do KR
  • YI; Jeong Hyun - Seongnam Gyeonggi-do
  • Yi; Jeong Hyun - Daejeon KR
  • Yi; Jeong Hyun - Seongnam-shi KR
  • Yi; Jeong Hyun - Daejeon-si KR
  • Yi; Jeong-hyun - Yongin-si N/A KR
  • YI; Jeong Hyun - Daeleon KR
  • Yi; Jeong Hyun - Jung-gu KR
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Method For Evaluating Risk Of Data Leakage In Application, Recording Medium And Device For Performing The Method
App 20220245259 - YI; Jeong Hyun ;   et al.
2022-08-04
Device and method for bypassing analysis evasion technique, and recording medium for a program for performing the same
Grant 11,403,371 - Yi , et al. August 2, 2
2022-08-02
Code Sequence Based Intelligent Key Code Identification Method And Recording Medium And Device For Performing The Same
App 20220207296 - YI; Jeong Hyun ;   et al.
2022-06-30
Mobile Malicious Code Classification Method Based On Feature Selection And Recording Medium And Device For Performing The Same
App 20220179955 - YI; Jeong Hyun ;   et al.
2022-06-09
Process Wrapping Method For Evading Anti-analysis Of Native Codes, Recording Medium And Device For Performing The Method
App 20220164446 - YI; Jeong Hyun ;   et al.
2022-05-26
Mobile Application Malicious Behavior Pattern Detection Method Based On Api Call Graph Extraction And Recording Medium And Device For Performing The Same
App 20220164447 - YI; Jeong Hyun ;   et al.
2022-05-26
Obfuscated Identifier Detection Method Based On Natural Language Processing And Recording Medium And Apparatus For Performing The Same
App 20220156370 - YI; Jeong Hyun ;   et al.
2022-05-19
Method of application malware detection based on dynamic API extraction, and readable medium and apparatus for performing the method
Grant 11,019,099 - Yi , et al. May 25, 2
2021-05-25
Device For Automatically Identifying Anti-analysis Techniques By Using Signature Extraction And Method Therefor
App 20210141875 - YI; Jeong Hyun ;   et al.
2021-05-13
Device And Method For Bypassing Analysis Evasion Technique, And Recording Medium For A Program For Performing The Same
App 20210056182 - Yi; Jeong Hyun ;   et al.
2021-02-25
Dynamic code extraction-based automatic anti analysis evasion and code logic analysis apparatus
Grant 10,878,086 - Yi , et al. December 29, 2
2020-12-29
Method Of Application Malware Detection Based On Dynamic Api Extraction, And Readable Medium And Apparatus For Performing The Method
App 20200344261 - Yi; Jeong Hyun ;   et al.
2020-10-29
Method Of Application Security Vulnerability Evaluation Based On Tree Boosting, And Readable Medium And Apparatus For Performing The Method
App 20200342113 - YI; Jeong Hyun ;   et al.
2020-10-29
Method of application security vulnerability evaluation based on tree boosting, and readable medium and apparatus for performing the method
Grant 10,796,005 - Yi , et al. October 6, 2
2020-10-06
DYNAMIC CODE EXTRACTION-based AUTOMATIC ANTI-ANALYSIS EVASION AND CODE LOGIC ANALYSIS APPARATUS
App 20200089873 - YI; Jeong Hyun ;   et al.
2020-03-19
Application Code Hiding Apparatus by Modifying Code in Memory and Method of Hiding Application Code Using the Same
App 20180011997 - Yi; Jeong Hyun ;   et al.
2018-01-11
Application Code Hiding Apparatus Using Dummy Code And Method Of Hiding Application Code Using The Same
App 20170357787 - Yi; Jeong Hyun ;   et al.
2017-12-14
Application Code Obfuscating Apparatus And Method Of Obfuscating Application Code Using The Same
App 20170257219 - Yi; Jeong-Hyun ;   et al.
2017-09-07
User terminal interworking with peripheral device and method for preventing leakage of information using the same
Grant 9,734,307 - Yi August 15, 2
2017-08-15
Mobile Device And Method Of Operating Mobile Device
App 20170147798 - Yi; Jeong-Hyun ;   et al.
2017-05-25
Integrity Verification System Using Remote Code Execution And Method Thereof
App 20170054693 - Yi; Jeong-Hyun ;   et al.
2017-02-23
User Terminal Interworking with Peripheral Device and Method for Preventing Leakage of Information Using the Same
App 20170032110 - Yi; Jeong-Hyun
2017-02-02
Code Obfuscation Device Using Indistinguishable Identifier Conversion And Method Thereof
App 20160371473 - Yi; Jeong-Hyun ;   et al.
2016-12-22
User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same
App 20160352522 - YI; Jeong-Hyun ;   et al.
2016-12-01
User Terminal For Detecting Forgery Of Application Program Based On Hash Value And Method Of Detecting Forgery Of Application Program Using The Same
App 20160330030 - Yi; Jeong-Hyun ;   et al.
2016-11-10
User Terminal And Method For Protecting Core Codes Using Peripheral Device of User Terminal
App 20160275271 - Yi; Jeong-Hyun ;   et al.
2016-09-22
User Terminal And Method For Protecting Core Codes Of Applications Using The Same
App 20160239669 - Yi; Jeong-Hyun ;   et al.
2016-08-18
Apparatus for tamper protection of application code and method thereof
Grant 9,396,313 - Yi , et al. July 19, 2
2016-07-19
Apparatus For Tamper Protection Of Application Code And Method Thereof
App 20160180065 - YI; Jeong Hyun ;   et al.
2016-06-23
Apparatus for tamper protection of application code based on self modification and method thereof
Grant 9,230,123 - Yi , et al. January 5, 2
2016-01-05
Mobile privacy protection system using proxy, proxy device and mobile privacy protection method
Grant 9,113,324 - Yi , et al. August 18, 2
2015-08-18
Method of sharing a session key between wireless communication terminals using a variable-length authentication code
Grant 9,078,126 - Yi , et al. July 7, 2
2015-07-07
Apparatus For Tamper Protection Of Application Code Based On Self Modification And Method Thereof
App 20150154407 - Yi; Jeong Hyun ;   et al.
2015-06-04
Method and apparatus for authenticating password of user terminal
Grant 9,038,166 - Yi , et al. May 19, 2
2015-05-19
Apparatus For Code Obfuscation And Method Thereof
App 20150095656 - Yi; Jeong Hyun ;   et al.
2015-04-02
Apparatus for code obfuscation and method thereof
Grant 8,984,299 - Yi , et al. March 17, 2
2015-03-17
Method and apparatus for authenticating password of user terminal by using password icon
Grant 8,978,128 - Yi , et al. March 10, 2
2015-03-10
Method And Apparatus For Authenticating Password Of User Terminal By Using Password Icon
App 20140201832 - Yi; Jeong Hyun ;   et al.
2014-07-17
Method And Apparatus For Authenticating Password Of User Terminal
App 20140201831 - Yi; Jeong Hyun ;   et al.
2014-07-17
Method and apparatus for authenticating password
Grant 8,661,532 - Yi , et al. February 25, 2
2014-02-25
Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network
Grant 8,645,698 - Yi , et al. February 4, 2
2014-02-04
Method Of Sharing A Session Key Between Wireless Communication Terminals Using A Variable-length Authentication Code
App 20130332739 - Yi; Jeong Hyun ;   et al.
2013-12-12
Mobile system, service system, and service providing method to securely transmit private information for use in service
Grant 8,607,047 - Kim , et al. December 10, 2
2013-12-10
Method And Apparatus For Authenticating Password
App 20130276100 - YI; Jeong Hyun ;   et al.
2013-10-17
Key generation method for self-configuration
Grant 8,370,624 - Yi , et al. February 5, 2
2013-02-05
Mobile system, service system, and key authentication method to manage key in local wireless communication
Grant 8,327,148 - Kim , et al. December 4, 2
2012-12-04
Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame
Grant 8,270,607 - Kim , et al. September 18, 2
2012-09-18
Apparatus for batch verification and method using the same
Grant 8,255,691 - Yi , et al. August 28, 2
2012-08-28
Method and system for performing distributed verification with respect to measurement data in sensor network
Grant 8,255,689 - Kim , et al. August 28, 2
2012-08-28
Key calculation method and key agreement method using the same
Grant 8,160,256 - Yi , et al. April 17, 2
2012-04-17
Tag authentication method using rotation, and tag and reader performing the method
Grant 8,031,055 - Kim , et al. October 4, 2
2011-10-04
Distributed Rivest Shamir Adleman signature method and signature generation node
Grant 7,971,064 - Yi , et al. June 28, 2
2011-06-28
Method for generating, operating, and using a sparse w-NAF key for encryption
Grant 7,970,134 - Yi , et al. June 28, 2
2011-06-28
Public key generation method in elliptic curve cryptography and public key generation system executing the method
Grant 7,940,936 - Yi , et al. May 10, 2
2011-05-10
Mobile System, Service System, And Service Providing Method To Securely Transmit Private Information For Use In Service
App 20100153720 - KIM; Eunah ;   et al.
2010-06-17
Mobile System, Service System, And Key Authentication Method To Manage Key In Local Wireless Communication
App 20100131763 - KIM; Eunah ;   et al.
2010-05-27
Mobile Privacy Protection System Using Proxy, Proxy Device And Mobile Privacy Protection Method
App 20090102655 - YI; Jeong Hyun ;   et al.
2009-04-23
Tag Authentication Method Using Rotation, And Tag And Reader Performing The Method
App 20090102606 - Kim; Eunah ;   et al.
2009-04-23
Method And System For Performing Distributed Verification With Respect To Measurement Data In Sensor Network
App 20080262798 - KIM; Eun Ah ;   et al.
2008-10-23
Apparatus For Batch Verification And Method Using The Same
App 20080226066 - YI; Jeong Hyun ;   et al.
2008-09-18
Key Calculation Method And Key Agreement Method Using The Same
App 20080226083 - YI; Jeong Hyun ;   et al.
2008-09-18
Method And Node For Generating Distributed Rivest Shamir Adleman Signature In Ad-hoc Network
App 20080181413 - YI; Jeong Hyun ;   et al.
2008-07-31
Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame
App 20080159535 - Kim; Eun Ah ;   et al.
2008-07-03
Distributed Rivest Shamir Adleman signature method and signature generation node
App 20080155265 - Yi; Jeong Hyun ;   et al.
2008-06-26
Public key generation method in elliptic curve cryptography and public key generation system executing the method
App 20080144816 - Yi; Jeong Hyun ;   et al.
2008-06-19
Method for generating, operating, and using a sparse w-NAF key for encryption
App 20080130878 - Yi; Jeong-hyun ;   et al.
2008-06-05
Key generation method for self-configuration
App 20080072038 - Yi; Jeong-hyun ;   et al.
2008-03-20

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed