Patent application number | Description | Published |
20110040410 | APPARATUS AND METHOD CONTROLLING LEGGED MOBILE ROBOT - Disclosed is an apparatus and method adjusting motion of each joint of a robot to compensate for friction force of each joint such that the sole of the foot of the robot clings to the ground. The motion of each joint is adjusted as if gravity acts on each joint of the robot in a direction opposite to gravity and the robot is held in an erect state. Therefore, the robot can stand while keeping its balance without falling. | 02-17-2011 |
20110172823 | ROBOT AND CONTROL METHOD THEREOF - A robot and a control method thereof may adjust a yaw moment generated from a foot contacting a ground to achieve stable walking of the robot. The robot, which may have an upper body and a lower body, may include a main controller starting walking of the robot through only motions of joints of the lower body and adjusting a motion of the upper body such that a yaw moment generated from a foot the lower body during walking of the robot is less than the maximum static frictional force of a ground to perform stable walking of the robot, and sub controllers driving actuators of the joints according to a control signal of the main controller. | 07-14-2011 |
20110178639 | HUMANOID ROBOT AND WALKING CONTROL METHOD THEREOF - A humanoid robot that achieves stable walking based on servo control of a joint torque and a walking control method thereof. The humanoid robot calculates a joint position trajectory compensation value and a joint torque compensation value using a measurement value of a sensor, compensates for a joint position trajectory and a joint torque using the calculated compensation value, and drives a motor mounted to each joint according to the compensated joint torque. | 07-21-2011 |
20120083922 | WALKING ROBOT AND CONTROL METHOD THEREOF - A walking robot and a control method in which conversion between walking servo control methods is stably carried out. The walking robot includes a sensor unit to measure angles and torques of joints, and a control unit to calculate voltages applied in a Finite State Machine (FSM) control mode and a Zero Moment Point (ZMP) control mode according to the angles and torques of the joints to drive respective joint motors, to store last target joint angles in the FSM control mode during conversion from the FSM control mode to the ZMP control mode, and to perform a motion based on the FSM control mode by substituting the last target joint angles in the FSM control mode for target joint angles in the FSM control mode during conversion from the ZMP control mode to the FSM control mode, thereby performing stable conversion between walking servo control modes without joint sagging. | 04-05-2012 |
20120165983 | WALKING ROBOT AND CONTROL METHOD THEREOF - A walking robot and a control method thereof. The control method includes performing transition of a second leg to a toe-off state, when ground reaction force applied to a first leg exceeds a first set value under the condition that the first leg is in a swing state and the second leg is in a support state, performing transition of the second leg to the swing state and transition of the first leg to the support state, when ground reaction force applied to the second leg is below a second set value under the condition that the second leg is in the toe-off state, and achieving walking of the walking robot by repeating the transitions among the swing state, the support state and the toe-off state. Thereby, the control method allows the robot to more stably and naturally walk. | 06-28-2012 |
20120165987 | WALKING ROBOT AND CONTROL METHOD THEREOF - A walking robot and a control method thereof. The control method of the walking robot which walks using two legs includes applying first virtual gravity torque including a vector component in the anti-gravity direction to respective joints of a support leg from among the two legs during walking, and applying second virtual gravity torque including a vector component in the gravity direction to respective joints of a swing leg from among the two legs during walking. Thereby, the walking robot implements a natural walking motion having a low energy consumption rate. | 06-28-2012 |
20120310412 | ROBOT AND CONTROL METHOD THEREOF - A bipedal robot having a pair of legs with 6 degrees of freedom and a control method thereof which calculate a capture point by combining the position and velocity of the center of gravity (COG) and control the capture point during walking to stably control walking of the robot. A Finite State Machine (FSM) is configured to execute a motion similar to walking of a human, and thus the robot naturally walks without constraint that the knees be bent all the time, thereby being capable of walking with a large stride and effectively using energy required while walking. | 12-06-2012 |
20120316682 | BALANCE CONTROL APPARATUS OF ROBOT AND CONTROL METHOD THEREOF - A balance control apparatus of a robot and a control method thereof. The balance control method of the robot, which has a plurality of legs and an upper body, includes detecting pose angles of the upper body and angles of the plurality of joint units, acquiring a current capture point and a current hip height based on the pose angles and the angles of the plurality of joint units, calculating a capture point error by comparing the current capture point with a target capture point, calculating a hip height error by comparing the current hip height with a target hip height, calculating compensation forces based on the capture point error and the hip height error, calculating torques respectively applied to the plurality of joint units based on the compensation forces, and outputting the torques to the plurality of joint units to control balance of the robot. | 12-13-2012 |
20120316683 | BALANCE CONTROL APPARATUS OF ROBOT AND CONTROL METHOD THEREOF - A balance control apparatus of a robot and a control method thereof. The balance control method of the robot, which has a plurality of legs and an upper body, includes detecting pose angles of the upper body and angles of the plurality of joint units, acquiring a current capture point and a current hip height based on the pose angles and the angles of the plurality of joint units, calculating a capture point error by comparing the current capture point with a target capture point, calculating a hip height error by comparing the current hip height with a target hip height, calculating compensation forces based on the capture point error and the hip height error, calculating a target torque based on the calculated compensation forces, and outputting the calculated target torque to the plurality of joint units to control balance of the robot. | 12-13-2012 |
20130162015 | SUPPORT MODULE AND ROBOT HAVING THE SAME - A support module includes a first rigid body, a space formation body connected to the first rigid body and forming an enclosed space, and a plurality of hard particles located within the enclosed space. When at least a predetermined pressure is applied to the support module such that a volume of the enclosed space is decreased to a predetermined value, the plurality of hard particles and space formation body form a second rigid body. Such a support module may improve the stability of a walking robot, the grip of a gripping structure, or the stability of a load-bearing structure. | 06-27-2013 |
Patent application number | Description | Published |
20100101267 | Refrigerator door opening device and refrigerator having the same - A refrigerator including a door opening device mounted in a grip part defined in any one of an upper surface and lower surface of a door and a side surface of the door opposite to a hinge shaft of the door. The door opening device is covered with a shield provided at a front surface of the door. | 04-29-2010 |
20110241512 | Refrigerator door opening device and refrigerator having the same - A refrigerator including a body, a door movably coupled to the body, a gasket installed at a rear surface of the door to establish a gasket seal between the door and the body when the door is in a closed position, a first mount provided at a first location of the door located adjacent to a left edge portion of the door, a second mount provided at a second location of the door located adjacent to a right edge portion of the door, and a door opening device to cause the gasket seal to break between the door and the body, the door opening device including a pivoting member mounted to the door, first and second operating portions and a first push unit mounted to a first mount to press against the body when being pressed by the first operating portion of the pivoting member. | 10-06-2011 |
20130001656 | VERTICALLY PINCHED JUNCTION FIELD EFFECT TRANSISTOR - A vertical junction field-effect transistor in a CMOS base-technology. The vertical junction field-effect transistor includes a semiconductor substrate having a source region and a drain region, a main-channel region formed between the source region and the drain region, a well region formed on the main-channel region between the source region and the drain region, vertical pinch-off regions formed at both source and drain ends or only on the source-end of the well region on the main-channel region in the source region and the drain region respectively, a source contact on the vertical pinch-off region in the source region, a drain contact on the vertical pinch-off region in the drain region, a gate contact on the well region between the source contact and the drain contact and shallow trench isolations formed on the well region. | 01-03-2013 |
Patent application number | Description | Published |
20140016733 | PASSIVE SAFETY INJECTION SYSTEM USING SAFETY INJECTION TANK - A passive safety injection system includes a containment, a reactor installed in the containment, safety injection tanks installed in the containment, a safety injection line between the reactor or a reactor coolant system and each of the safety injection tanks to guide water, which is stored in the safety injection tank, into the reactor when a water level in the reactor is reduced due to a loss of coolant accident, and a pressure balance line between the reactor or the reactor coolant system and the safety injection tank to guide high-temperature steam from the reactor into the safety injection tank upon the loss of coolant accident. The safety injection line has an orifice and a check valve thereon, and the pressure balance line has an orifice and isolation valves thereon. The water in the safety injection tank stably flows into the reactor for many hours. | 01-16-2014 |
20140219409 | MULTI STAGE SAFETY INJECTION DEVICE AND PASSIVE SAFETY INJECTION SYSTEM HAVING THE SAME - The present disclosure may disclose a multi stage safety injection device, including a safety injection tank formed to contain coolant to be injected into a reactor vessel by a gravitational head of water when an accident occurs in which the pressure or water level of the reactor vessel is decreased, a pressure balance line connected to the reactor vessel and safety injection tank to form a pressure balance between the reactor vessel and the safety injection tank, and a set of safety injection lines connected to the safety injection tank and the reactor vessel to inject coolant to the reactor vessel in a pressure balance state between the reactor vessel and the safety injection tank, and connected to the safety injection tank with different heights to reduce a flow rate of coolant injected into the reactor vessel step by step according to the water level reduction of the safety injection tank in order to inject coolant to the reactor vessel at multi stages. | 08-07-2014 |
20150221403 | FACILITY FOR REDUCING RADIOACTIVE MATERIAL AND NUCLEAR POWER PLANT HAVING THE SAME - The present invention provides a facility for reducing radioactive material comprising: a cooling water storage unit installed inside a containment and formed to store cooling water; a boundary unit forming a boundary of radioactive material inside the containment and surrounding a reactor coolant system installed inside the containment to prevent a radioactive material from releasing from the reactor coolant system or a pipe connected with the reactor coolant system to the containment; a connecting pipe connected with an inner space of the boundary unit and the cooling water storage unit to guide a flow of a fluid caused by a pressure difference between the boundary unit and the cooling water storage unit from the boundary unit to the cooling water storage unit; and a sparging unit disposed to be submerged in the cooling water stored in the cooling water storage unit and connected with the connecting pipe to sparge the fluid that has passed through the connecting pipe and the radioactive material contained in the fluid to the cooling water storage unit. | 08-06-2015 |
Patent application number | Description | Published |
20100162350 | SECURITY SYSTEM OF MANAGING IRC AND HTTP BOTNETS, AND METHOD THEREFOR - The present invention relates to a security system of managing IRC and HTTP botnets and a method therefor. More specifically, the present invention relates to a system and a method that detects a botnet in an Internet service provider network to store information related to the detected botnet in a database and performs security management of IRC and HTTP botnets, including a botnet management security management (BMSM) system, configured to visualize the information related to the detected botnet and establish an against policy related to the detected botnet. Accordingly, the present invention provides a security system of managing IRC and HTTP botnets that can efficiently performs the security management of IRC and HTTP botnets by using the BMSM system | 06-24-2010 |
20100169973 | System and Method For Detecting Unknown Malicious Code By Analyzing Kernel Based System Actions - There is provided a system and method for detecting unknown malicious code by analyzing kernel based system actions. More particularly, the system and method provides an advantage of actively countering unknown malicious code or viruses by monitoring kernel based system events in real time, organizing action data based on the collected event data, determining whether the action data corresponds to predetermined malicious actions, backtracking a subject of a malicious action when the action data is determined to correspond to the malicious action, and processing the malicious action. | 07-01-2010 |
20110153811 | SYSTEM AND METHOD FOR MODELING ACTIVITY PATTERNS OF NETWORK TRAFFIC TO DETECT BOTNETS - The invention relates to a system and method that can detect botnets by classifying the communication activities for each client according to destination or based on similarity between the groups of collected traffic. According to certain aspects of the invention, the communication activities for each client can be classified to model network activity by differentiating the protocols of the collected network traffic based on destination and patterning the subgroups for the respective protocols. Those servers that are estimated to be C&C servers can be classified into download and upload, spam servers and command control servers, within a botnet group detected by modeling network activity, i.e. analyzing network-based activity patterns. Also, botnet groups can be detected by way of a group information management function, for generating an activity pattern-based group matrix based on group data, and a mutual similarity analysis, performed on groups suspected to be botnets from the group information. | 06-23-2011 |
20110154489 | SYSTEM FOR ANALYZING MALICIOUS BOTNET ACTIVITY IN REAL TIME - A system for analyzing malicious botnet activity in real time is disclosed. This system may include: a control server configured to generate botnet activity information relating to a type of malicious botnet activity, and transmit the botnet activity information to the outside, after receiving bot occurrence information from the outside; | 06-23-2011 |
20110154492 | MALICIOUS TRAFFIC ISOLATION SYSTEM AND METHOD USING BOTNET INFORMATION - The present invention relates to a malicious traffic isolation system and method using botnet information, and more particularly, to a malicious traffic isolation system and method using botnet information, in which traffics for a set of clients having the same destination are routed to the isolation system based on a destination IP/Port, and botnet traffics are isolated using botnet information based on similarity among groups of the routed and flowed in traffics. The present invention may provide a malicious traffic isolation method using botnet information, which can accommodate traffics received from a PC or a C&C server infected with a bot into a quarantine area, isolate traffics generated by normal users from traffics transmitted from malicious bots, and block the malicious traffics. In addition, the present invention may provide a malicious traffic isolation method using botnet information, which can provide a function of mitigating DDoS attacks of a botnet. | 06-23-2011 |
20120079594 | MALWARE AUTO-ANALYSIS SYSTEM AND METHOD USING KERNEL CALLBACK MECHANISM - In a malware auto-analysis method using a kernel callback mechanism, a function, present in a kernel driver within a PsSetCreateProcessNotifyRoutine function, is registered by a process monitor driver as a callback function when a computer boot. A function present in a registry monitor driver is registered by the registry monitor driver as a callback function in a CmRegisterCallback function when the driver is loaded. A kernel driver is registered by a file monitor driver as a mini-filter driver in a Filter Manager present in a Windows system. At least one of a process event, a registry event, or an Input/Output (I/O) event is received by a behavior event collector from the process monitor driver, the registry monitor driver, or the file monitor driver, respectively. | 03-29-2012 |
20120167220 | SEED INFORMATION COLLECTING DEVICE AND METHOD FOR DETECTING MALICIOUS CODE LANDING/HOPPING/DISTRIBUTION SITES - Provided is seed information collecting device for detecting malicious code landing/hopping/distribution sites. The device comprises: a seed information collecting module collecting social issue keywords from a seed information collecting channel and collecting address information of potential malicious code landing/hopping/distribution sites using the collected social issue keywords; a web source code collecting module collecting web source code of the potential malicious code landing/hopping/distribution sites using the address information of the potential malicious code landing/hopping/distribution sites collected by the seed information collecting module; and a policy management module managing collection policies of the seed information collecting module and the web source code collecting module. | 06-28-2012 |
20120311709 | AUTOMATIC MANAGEMENT SYSTEM FOR GROUP AND MUTANT INFORMATION OF MALICIOUS CODES - An automatic management system includes a malicious code group-mutant storage module that receives a malicious codes analysis result from a malicious code collection-analysis system and extracts group information and mutant information of the malicious codes based on the malicious code analysis result, a malicious code group-mutant DB that stores the extracted group information and mutant information, a malicious code group-mutant management module that provides interface to allow a user to detect the group information and mutant information stored in the malicious code group-mutant DB, and a visualizing module that outputs the detection result to the user, wherein the malicious code group-mutant management module that groups malicious codes having action associations using the group information and mutant information stored in the malicious code group-mutant DB, outputs the group information through the visualizing module and outputs the mutant information based on CFG similarity and string similarity through the visualizing module. | 12-06-2012 |
20130148510 | SYSTEM AND METHOD FOR PREVENTING INTRUSION OF ABNORMAL GTP PACKET - Provided are a system and method for preventing the intrusion of an abnormal GPRS tunneling protocol (GTP) packet. The system includes: a system management unit including a monitoring unit which monitors a state of the system and a mode changing unit which changes an operation mode of the system based on the state of the system; a packet capture unit including a packet management unit which stores information about a GTP packet based on the operation mode of the system and a detection result checking unit which determines whether to drop the GTP packet; and a packet detection unit including a packet parsing unit which parses the information about the GTP packet and a packet analysis unit which analyzes the parsed information about the GTP packet, wherein the operation mode of the system is an intrusion prevention system (IPS) mode or a bypass mode. | 06-13-2013 |
20140075538 | IP SPOOFING DETECTION APPARATUS - An IP spoofing detection apparatus is provided. The IP spoofing detection apparatus comprising, a tunnel information extracting unit which extracts a first TEID and a user equipment IP address from a payload of a first GTP packet, and an abnormal packet detecting unit which extracts a second TEID from a header of a second GTP packet, and extracts a source IP address from a payload of the second GTP packet, wherein the abnormal packet detecting unit detects the second GTP packet as an IP spoofing packet if the first TEID and the second TEID are equal to each other, and the user equipment IP address and the source IP address are different from each other. | 03-13-2014 |
20150180893 | BEHAVIOR DETECTION SYSTEM FOR DETECTING ABNORMAL BEHAVIOR - Disclosed is a behavior detection system for detecting an abnormal behavior, can perform dynamic control based on situation information and a profile of each user to cope with an element threatening security of an internal infrastructure of an enterprise, such as information leakage, in BYOD and smart work environment. The system calculates probabilities of behaviors occurring for respective connection behavior elements, calculates standard deviations of the probabilities based on weighting factors and determines whether or not the calculated behavior occurrence probabilities and behavior standard deviation correspond to a normal behavior, existence of an abnormal connection behavior in a BYOD and smart work environment is detected and an abnormal user is detected by examining whether or not an average traffic volume, an average use time and traffic volume with respect to a use time exceeds respective standard values. | 06-25-2015 |