-
公开(公告)号:US11456878B2
公开(公告)日:2022-09-27
申请号:US17155447
申请日:2021-01-22
Applicant: Penta Security Systems Inc. , Autocrypt Co., Ltd.
Inventor: Myung Woo Chung , Hyun Min Choi , Sang Gyoo Sim , Eui Seok Kim , Duk Soo Kim , Seok Woo Lee
Abstract: A pseudonym certificate management method, performed by a pseudonym certificate management apparatus interworking with an external server, may comprise: receiving, from the external server, a pseudonym certificate in a state locked based on a root value identifiable only by the external server; periodically receiving an unlocking key for the pseudonym certificate from the external server; activating the pseudonym certificate with the unlocking key; and when the activated pseudonym certificate is abnormal, deactivating the pseudonym certificate.
-
公开(公告)号:US11529960B2
公开(公告)日:2022-12-20
申请号:US16690070
申请日:2019-11-20
Applicant: Penta Security Systems Inc. , AUTOCRYPT CO., LTD.
Inventor: Seok Woo Lee , Duk Soo Kim , Eui Seok Kim , Sang Gyoo Sim , Seung Young Park
IPC: B60W40/09 , G06N3/08 , H04L12/40 , B60R16/023 , G06V20/59
Abstract: Provided is a method for detecting a driver's abnormalities based on a CAN (Controller Area Network) bus network communicating with an ECU (Electronic Control Unit) of a vehicle. The method may include: acquiring a CAN bus signal related to an operation of the vehicle from the CAN bus network; extracting a detection vector from the CAN bus signal using an auto encoder; and detecting a driver's abnormality based on the detection vector.
-
公开(公告)号:US11438248B2
公开(公告)日:2022-09-06
申请号:US16989617
申请日:2020-08-10
Applicant: Penta Security Systems Inc. , Autocrypt Co., Ltd.
Inventor: Seung Young Park , Sang Gyoo Sim , Duk Soo Kim , Seok Woo Lee , Myung Jin Kim , Eui Seok Kim
Abstract: An operation method of a communication node in a communication network may comprise receiving CAN signals from a plurality of CAN communication nodes; generating forward input data by performing forward preprocessing on the received CAN signals based on forward sampling times; generating forward mask data for the forward input data and forward time interval data according to the forward sampling times; generating backward input data by performing backward preprocessing on the CAN signals based on backward sampling times; generating backward mask data for the backward input data and backward time interval data according to the backward sampling times; and detecting an abnormal signal among the CAN signals by inputting the forward input data, forward mask data, forward time interval data, backward input data, backward mask data, and backward time interval data into a gated recurrent unit-decay (GRU-D) neural network.
-
公开(公告)号:US11869354B2
公开(公告)日:2024-01-09
申请号:US17482329
申请日:2021-09-22
Applicant: Autocrypt Co., Ltd. , Penta Security Systems Inc.
Inventor: Seung Young Park , Duk Soo Kim , Seok Woo Lee , Eui Seok Kim , Sang Gyoo Sim
CPC classification number: G08G1/097 , G06N3/04 , G06N3/08 , G08G1/0116 , G08G1/0125
Abstract: A method of detecting an anomaly of a road side unit, which is performed by an anomaly detecting apparatus interworking with one or more road side units, may comprise: receiving traffic data from each of the one or more road side units; performing grouping on the one or more road side units based on the traffic data; generating input data of an artificial neural network based on a result of the performing of the grouping; generating output data of the artificial neural network based on the input data; and detecting an anomaly of each of the one or more road side units based on the output data.
-
公开(公告)号:US11922059B2
公开(公告)日:2024-03-05
申请号:US17104531
申请日:2020-11-25
Applicant: Penta Security Systems Inc.
Inventor: Myung Woo Chung , Chel Park , Sang Gyoo Sim , Eui Seok Kim , Duk Soo Kim , Seok Woo Lee
CPC classification number: G06F3/0659 , G06F3/0611 , G06F3/0653 , G06F3/067 , H04L63/105 , H04L63/20
Abstract: A method of distributedly storing data in a system comprising a plurality of edge nodes communicatively coupled to an end device and a central cloud. The method includes: receiving, by a first edge node, data transmitted by the end device; assigning, by the first edge node, a data tag to received data according to attributes of the received data and duplicating the received data to generate a tagged data copy; and transmitting, by the first edge node, the tagged data copy to at least one second edge node determined by a data distribution policy determined by the central cloud directly or through the central cloud, so that the at least one second edge node store the tagged data copy in a storage.
-
公开(公告)号:US11381489B1
公开(公告)日:2022-07-05
申请号:US17537098
申请日:2021-11-29
Applicant: Penta Security Systems Inc.
Inventor: Jin Hyeok Oh , Myung Woo Chung , Sang Gyoo Sim , Duk Soo Kim , Seok Woo Lee
IPC: G06F15/173 , H04L43/10 , H04L67/10
Abstract: A data tracking method, which is performed by a data tracking apparatus in an edge cloud environment including at least one edge node communicating with an end device and a central cloud, includes receiving data from the end device by a first edge node, creating, by the first edge node, a tracing history and distributing the data to a plurality of edge nodes so as to allow the plurality of edge nodes to create tracing histories, transmitting the created tracing histories to the central cloud by the first edge node and the plurality of edge nodes, and verifying, by the central cloud, linkability of the tracing histories transmitted to the central cloud, storing the tracing histories, analyzing the tracing histories, and providing a data tracking function.
-
公开(公告)号:US10382835B2
公开(公告)日:2019-08-13
申请号:US15976754
申请日:2018-05-10
Applicant: Penta Security Systems Inc.
Inventor: Sang Gyoo Sim , Eui Seok Kim , Duk Soo Kim , Seok Woo Lee , Wan Yeon Lee
Abstract: Provided are an apparatus and method for verifying the integrity of a video file. The method includes receiving a video file and model information of a video recording device which is claimed to have recorded a verification-target video, extracting a header structure and a header value of the video file, extracting characteristic information according to the received model information of the video recording device from a characteristic database, and determining whether the extracted characteristic information according to the model information of the video recording device corresponds to the header structure and the header value of the video file.
-
公开(公告)号:US20190036952A1
公开(公告)日:2019-01-31
申请号:US15832050
申请日:2017-12-05
Applicant: Penta Security Systems INC.
Inventor: Sang Gyoo SIM , Seok Woo Lee , Seung Young Park , Duk Soo Kim
CPC classification number: H04L63/1425 , G06F17/18 , G06K9/6218 , G06N3/0454 , G06N3/08 , G06N3/088 , G06N20/00 , H04L63/1441
Abstract: Disclosed is a method for detecting anomaly traffic using an autoencoder based on an inception-residual network-v2 which is one type of machine learning methods, the method including generating a plurality of encoders on the basis of traffic data for learning; generating a plurality of pieces of image data on the basis of traffic data for each session, which is a detection target; and determining whether the traffic data for each session is abnormal using at least one among the traffic data for learning, the plurality of encoders, and the plurality of pieces of image data.
-
公开(公告)号:US09817969B2
公开(公告)日:2017-11-14
申请号:US14514516
申请日:2014-10-15
Applicant: PENTA SECURITY SYSTEMS INC.
Inventor: Seok Woo Lee , Sang Gyoo Sim , Duk Soo Kim
CPC classification number: G06F21/554 , H04L63/1416 , H04L63/1425 , H04L63/1433
Abstract: There are provided a device for detecting a cyber attack and a method thereof. The device for detecting a cyber attack includes an event receiving unit configured to receive an event generated in at least one user terminal according to a behavior of a user who accesses a web server and uses web services provided from a web page, a model generating unit configured to generate an event model by extracting an event pattern corresponding to a behavior of the user based on the received event, and an attack detecting unit configured to detect whether access of the web server by a specific user terminal is an attack by comparing the event model with an event received from the specific user terminal. Therefore, various forms of cyber attacks are rapidly and accurately detected, and it is possible to provide a security service having high availability and reliability.
-
公开(公告)号:US11336668B2
公开(公告)日:2022-05-17
申请号:US16277478
申请日:2019-02-15
Applicant: Penta Security Systems Inc.
Inventor: Seung Young Park , Sang Gyoo Sim , Duk Soo Kim , Seok Woo Lee , Myung Jin Kim
IPC: G06F16/955 , G06F16/958 , H04L29/06
Abstract: Disclosed is a method of detecting whether a groupware user's behavior is an abnormal behavior. The method includes acquiring a uniform resource identifier (URI) from the user's behavior, generating a URI sequence from the URI on the basis of a predetermined time interval, preprocessing the URI sequence to generate a primitive URI sequence, calculating a log probability value from the primitive URI sequence, and detecting whether the user's behavior is an abnormal behavior on the basis of the log probability value and a predetermined threshold value.
-
-
-
-
-
-
-
-
-