Patent | Date |
---|
Method For Evaluating Risk Of Data Leakage In Application, Recording Medium And Device For Performing The Method App 20220245259 - YI; Jeong Hyun ;   et al. | 2022-08-04 |
Device and method for bypassing analysis evasion technique, and recording medium for a program for performing the same Grant 11,403,371 - Yi , et al. August 2, 2 | 2022-08-02 |
Code Sequence Based Intelligent Key Code Identification Method And Recording Medium And Device For Performing The Same App 20220207296 - YI; Jeong Hyun ;   et al. | 2022-06-30 |
Mobile Malicious Code Classification Method Based On Feature Selection And Recording Medium And Device For Performing The Same App 20220179955 - YI; Jeong Hyun ;   et al. | 2022-06-09 |
Process Wrapping Method For Evading Anti-analysis Of Native Codes, Recording Medium And Device For Performing The Method App 20220164446 - YI; Jeong Hyun ;   et al. | 2022-05-26 |
Mobile Application Malicious Behavior Pattern Detection Method Based On Api Call Graph Extraction And Recording Medium And Device For Performing The Same App 20220164447 - YI; Jeong Hyun ;   et al. | 2022-05-26 |
Obfuscated Identifier Detection Method Based On Natural Language Processing And Recording Medium And Apparatus For Performing The Same App 20220156370 - YI; Jeong Hyun ;   et al. | 2022-05-19 |
Method of application malware detection based on dynamic API extraction, and readable medium and apparatus for performing the method Grant 11,019,099 - Yi , et al. May 25, 2 | 2021-05-25 |
Device For Automatically Identifying Anti-analysis Techniques By Using Signature Extraction And Method Therefor App 20210141875 - YI; Jeong Hyun ;   et al. | 2021-05-13 |
Device And Method For Bypassing Analysis Evasion Technique, And Recording Medium For A Program For Performing The Same App 20210056182 - Yi; Jeong Hyun ;   et al. | 2021-02-25 |
Dynamic code extraction-based automatic anti analysis evasion and code logic analysis apparatus Grant 10,878,086 - Yi , et al. December 29, 2 | 2020-12-29 |
Method Of Application Malware Detection Based On Dynamic Api Extraction, And Readable Medium And Apparatus For Performing The Method App 20200344261 - Yi; Jeong Hyun ;   et al. | 2020-10-29 |
Method Of Application Security Vulnerability Evaluation Based On Tree Boosting, And Readable Medium And Apparatus For Performing The Method App 20200342113 - YI; Jeong Hyun ;   et al. | 2020-10-29 |
Method of application security vulnerability evaluation based on tree boosting, and readable medium and apparatus for performing the method Grant 10,796,005 - Yi , et al. October 6, 2 | 2020-10-06 |
DYNAMIC CODE EXTRACTION-based AUTOMATIC ANTI-ANALYSIS EVASION AND CODE LOGIC ANALYSIS APPARATUS App 20200089873 - YI; Jeong Hyun ;   et al. | 2020-03-19 |
Application Code Hiding Apparatus by Modifying Code in Memory and Method of Hiding Application Code Using the Same App 20180011997 - Yi; Jeong Hyun ;   et al. | 2018-01-11 |
Application Code Hiding Apparatus Using Dummy Code And Method Of Hiding Application Code Using The Same App 20170357787 - Yi; Jeong Hyun ;   et al. | 2017-12-14 |
Application Code Obfuscating Apparatus And Method Of Obfuscating Application Code Using The Same App 20170257219 - Yi; Jeong-Hyun ;   et al. | 2017-09-07 |
User terminal interworking with peripheral device and method for preventing leakage of information using the same Grant 9,734,307 - Yi August 15, 2 | 2017-08-15 |
Mobile Device And Method Of Operating Mobile Device App 20170147798 - Yi; Jeong-Hyun ;   et al. | 2017-05-25 |
Integrity Verification System Using Remote Code Execution And Method Thereof App 20170054693 - Yi; Jeong-Hyun ;   et al. | 2017-02-23 |
User Terminal Interworking with Peripheral Device and Method for Preventing Leakage of Information Using the Same App 20170032110 - Yi; Jeong-Hyun | 2017-02-02 |
Code Obfuscation Device Using Indistinguishable Identifier Conversion And Method Thereof App 20160371473 - Yi; Jeong-Hyun ;   et al. | 2016-12-22 |
User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same App 20160352522 - YI; Jeong-Hyun ;   et al. | 2016-12-01 |
User Terminal For Detecting Forgery Of Application Program Based On Hash Value And Method Of Detecting Forgery Of Application Program Using The Same App 20160330030 - Yi; Jeong-Hyun ;   et al. | 2016-11-10 |
User Terminal And Method For Protecting Core Codes Using Peripheral Device of User Terminal App 20160275271 - Yi; Jeong-Hyun ;   et al. | 2016-09-22 |
User Terminal And Method For Protecting Core Codes Of Applications Using The Same App 20160239669 - Yi; Jeong-Hyun ;   et al. | 2016-08-18 |
Apparatus for tamper protection of application code and method thereof Grant 9,396,313 - Yi , et al. July 19, 2 | 2016-07-19 |
Apparatus For Tamper Protection Of Application Code And Method Thereof App 20160180065 - YI; Jeong Hyun ;   et al. | 2016-06-23 |
Apparatus for tamper protection of application code based on self modification and method thereof Grant 9,230,123 - Yi , et al. January 5, 2 | 2016-01-05 |
Mobile privacy protection system using proxy, proxy device and mobile privacy protection method Grant 9,113,324 - Yi , et al. August 18, 2 | 2015-08-18 |
Method of sharing a session key between wireless communication terminals using a variable-length authentication code Grant 9,078,126 - Yi , et al. July 7, 2 | 2015-07-07 |
Apparatus For Tamper Protection Of Application Code Based On Self Modification And Method Thereof App 20150154407 - Yi; Jeong Hyun ;   et al. | 2015-06-04 |
Method and apparatus for authenticating password of user terminal Grant 9,038,166 - Yi , et al. May 19, 2 | 2015-05-19 |
Apparatus For Code Obfuscation And Method Thereof App 20150095656 - Yi; Jeong Hyun ;   et al. | 2015-04-02 |
Apparatus for code obfuscation and method thereof Grant 8,984,299 - Yi , et al. March 17, 2 | 2015-03-17 |
Method and apparatus for authenticating password of user terminal by using password icon Grant 8,978,128 - Yi , et al. March 10, 2 | 2015-03-10 |
Method And Apparatus For Authenticating Password Of User Terminal By Using Password Icon App 20140201832 - Yi; Jeong Hyun ;   et al. | 2014-07-17 |
Method And Apparatus For Authenticating Password Of User Terminal App 20140201831 - Yi; Jeong Hyun ;   et al. | 2014-07-17 |
Method and apparatus for authenticating password Grant 8,661,532 - Yi , et al. February 25, 2 | 2014-02-25 |
Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network Grant 8,645,698 - Yi , et al. February 4, 2 | 2014-02-04 |
Method Of Sharing A Session Key Between Wireless Communication Terminals Using A Variable-length Authentication Code App 20130332739 - Yi; Jeong Hyun ;   et al. | 2013-12-12 |
Mobile system, service system, and service providing method to securely transmit private information for use in service Grant 8,607,047 - Kim , et al. December 10, 2 | 2013-12-10 |
Method And Apparatus For Authenticating Password App 20130276100 - YI; Jeong Hyun ;   et al. | 2013-10-17 |
Key generation method for self-configuration Grant 8,370,624 - Yi , et al. February 5, 2 | 2013-02-05 |
Mobile system, service system, and key authentication method to manage key in local wireless communication Grant 8,327,148 - Kim , et al. December 4, 2 | 2012-12-04 |
Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame Grant 8,270,607 - Kim , et al. September 18, 2 | 2012-09-18 |
Apparatus for batch verification and method using the same Grant 8,255,691 - Yi , et al. August 28, 2 | 2012-08-28 |
Method and system for performing distributed verification with respect to measurement data in sensor network Grant 8,255,689 - Kim , et al. August 28, 2 | 2012-08-28 |
Key calculation method and key agreement method using the same Grant 8,160,256 - Yi , et al. April 17, 2 | 2012-04-17 |
Tag authentication method using rotation, and tag and reader performing the method Grant 8,031,055 - Kim , et al. October 4, 2 | 2011-10-04 |
Distributed Rivest Shamir Adleman signature method and signature generation node Grant 7,971,064 - Yi , et al. June 28, 2 | 2011-06-28 |
Method for generating, operating, and using a sparse w-NAF key for encryption Grant 7,970,134 - Yi , et al. June 28, 2 | 2011-06-28 |
Public key generation method in elliptic curve cryptography and public key generation system executing the method Grant 7,940,936 - Yi , et al. May 10, 2 | 2011-05-10 |
Mobile System, Service System, And Service Providing Method To Securely Transmit Private Information For Use In Service App 20100153720 - KIM; Eunah ;   et al. | 2010-06-17 |
Mobile System, Service System, And Key Authentication Method To Manage Key In Local Wireless Communication App 20100131763 - KIM; Eunah ;   et al. | 2010-05-27 |
Mobile Privacy Protection System Using Proxy, Proxy Device And Mobile Privacy Protection Method App 20090102655 - YI; Jeong Hyun ;   et al. | 2009-04-23 |
Tag Authentication Method Using Rotation, And Tag And Reader Performing The Method App 20090102606 - Kim; Eunah ;   et al. | 2009-04-23 |
Method And System For Performing Distributed Verification With Respect To Measurement Data In Sensor Network App 20080262798 - KIM; Eun Ah ;   et al. | 2008-10-23 |
Apparatus For Batch Verification And Method Using The Same App 20080226066 - YI; Jeong Hyun ;   et al. | 2008-09-18 |
Key Calculation Method And Key Agreement Method Using The Same App 20080226083 - YI; Jeong Hyun ;   et al. | 2008-09-18 |
Method And Node For Generating Distributed Rivest Shamir Adleman Signature In Ad-hoc Network App 20080181413 - YI; Jeong Hyun ;   et al. | 2008-07-31 |
Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame App 20080159535 - Kim; Eun Ah ;   et al. | 2008-07-03 |
Distributed Rivest Shamir Adleman signature method and signature generation node App 20080155265 - Yi; Jeong Hyun ;   et al. | 2008-06-26 |
Public key generation method in elliptic curve cryptography and public key generation system executing the method App 20080144816 - Yi; Jeong Hyun ;   et al. | 2008-06-19 |
Method for generating, operating, and using a sparse w-NAF key for encryption App 20080130878 - Yi; Jeong-hyun ;   et al. | 2008-06-05 |
Key generation method for self-configuration App 20080072038 - Yi; Jeong-hyun ;   et al. | 2008-03-20 |