Issued Patents All Time
Showing 1–25 of 31 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12287846 | Code sequence based intelligent key code identification method and recording medium and device for performing the same | Yeong Hun Ban | 2025-04-29 |
| 11934495 | Device for automatically identifying anti-analysis techniques by using signature extraction and method therefor | Min Koo KANG | 2024-03-19 |
| 11928220 | Method for evaluating risk of data leakage in application, recording medium and device for performing the method | Minseong CHOI, Sunjun Lee | 2024-03-12 |
| 11886589 | Process wrapping method for evading anti-analysis of native codes, recording medium and device for performing the method | Yong Gu Shin | 2024-01-30 |
| 11809557 | Mobile malicious code classification method based on feature selection and recording medium and device for performing the same | Eun Byeol Ko | 2023-11-07 |
| 11768938 | Mobile application malicious behavior pattern detection method based on API call graph extraction and recording medium and device for performing the same | Jin-Sung Kim | 2023-09-26 |
| 11403371 | Device and method for bypassing analysis evasion technique, and recording medium for a program for performing the same | Sunjun Lee | 2022-08-02 |
| 11019099 | Method of application malware detection based on dynamic API extraction, and readable medium and apparatus for performing the method | Kichang Kim | 2021-05-25 |
| 10878086 | Dynamic code extraction-based automatic anti analysis evasion and code logic analysis apparatus | Jongsu Lim, Sun Jun LEE, Yong Gu Shin, Kyu Ho KIM | 2020-12-29 |
| 10796005 | Method of application security vulnerability evaluation based on tree boosting, and readable medium and apparatus for performing the method | Kichang Kim | 2020-10-06 |
| 9734307 | User terminal interworking with peripheral device and method for preventing leakage of information using the same | — | 2017-08-15 |
| 9396313 | Apparatus for tamper protection of application code and method thereof | Jin Hyuk Jung | 2016-07-19 |
| 9230123 | Apparatus for tamper protection of application code based on self modification and method thereof | Jin Hyuk Jung | 2016-01-05 |
| 9113324 | Mobile privacy protection system using proxy, proxy device and mobile privacy protection method | Taekyoung Kwon, Eunah Kim, Tae Jin Park | 2015-08-18 |
| 9078126 | Method of sharing a session key between wireless communication terminals using a variable-length authentication code | Gun Il Ma, Hyeong Lee | 2015-07-07 |
| 9038166 | Method and apparatus for authenticating password of user terminal | Gun Il Ma, Hyun Yi Yi, Si Wan Kim | 2015-05-19 |
| 8984299 | Apparatus for code obfuscation and method thereof | Jin Hyuk Jung | 2015-03-17 |
| 8978128 | Method and apparatus for authenticating password of user terminal by using password icon | Gun Il Ma, Hyun Yi Yi, Si Wan Kim | 2015-03-10 |
| 8661532 | Method and apparatus for authenticating password | Tae Jin Kim, Gun Il Ma, Hyun Yi Yi, Si Wan Kim | 2014-02-25 |
| 8645698 | Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network | Eunah Kim, Alexandra Afanaseva, Alexey Fomin, Sergey Bezzateev | 2014-02-04 |
| 8607047 | Mobile system, service system, and service providing method to securely transmit private information for use in service | Eunah Kim, Won Keun Kong | 2013-12-10 |
| 8370624 | Key generation method for self-configuration | Tae-Chul Jung | 2013-02-05 |
| 8327148 | Mobile system, service system, and key authentication method to manage key in local wireless communication | Eunah Kim, Won Keun Kong | 2012-12-04 |
| 8270607 | Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame | Eun-Ah Kim, Tae-Chul Jung, Alexey Fomin, Evgeny Linsky, Mikhail Stepanov +1 more | 2012-09-18 |
| 8255689 | Method and system for performing distributed verification with respect to measurement data in sensor network | Eun-Ah Kim, Alexey Fomin, Alexandria Afanasyeva, Sergey Bezzateev | 2012-08-28 |