Daejeon, South Korea

Seung Yong Yoon

USPTO Granted Patents = 8 

Average Co-Inventor Count = 2.4

ph-index = 4

Forward Citations = 47(Granted Patents)


Company Filing History:


Years Active: 2008-2021

Loading Chart...
8 patents (USPTO):Explore Patents

Title: Seung Yong Yoon: Innovator in Device Security Verification

Introduction

Seung Yong Yoon is a prominent inventor based in Daejeon, South Korea. He has made significant contributions to the field of device security, holding a total of 8 patents. His work focuses on enhancing the integrity and confidentiality of computing devices through innovative methods and systems.

Latest Patents

Yoon's latest patents include a "Method and apparatus for device security verification utilizing a virtual trusted computing base." This invention provides a mechanism for verifying the validity of a decryption key through a secure memory loader that operates on the device's processor after booting. If the key is validated, it decrypts the encrypted firmware stored in the device's memory, ensuring the confidentiality of the firmware. Additionally, he has developed a "Device, system and method for performing integrity verification based on distributed delegator." This system allows for the integrity verification of multiple individual devices over a network, utilizing a verification delegator to ensure the reliability of the verification process.

Career Highlights

Seung Yong Yoon is affiliated with the Electronics and Telecommunications Research Institute, where he continues to advance research in device security. His innovative approaches have positioned him as a key figure in the development of secure computing technologies.

Collaborations

Yoon has collaborated with notable colleagues, including Jong Soo Jang and Jin Tae Oh, contributing to various projects that enhance device security and integrity verification.

Conclusion

Seung Yong Yoon's contributions to device security verification reflect his commitment to innovation in technology. His patents and collaborative efforts continue to shape the future of secure computing.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…