Building an Era
Where All Information
Protects Itself

Cyber Security
Quantum Security
Cryptography
CYBER
SESE
CURITY
QQ
UANTUM SECURITY
C
RYPTORYPTON
GRAPHY
SE
Q
RYPTO
N

SEQRYPTON protects customer data by quantum security, next-generation security, and AI-based infrastructure.

We are creating an era where people and devices can protect information autonomously by integrating privacy-centric security, Post-Quantum Cryptography (PQC), and AI-based trust infrastructure.

Expertise in digital security technologies
AI-based Self-Evolving Trust Orchestration

SEQRYPTON is building an era where all information protects itself automatically.

In an age where information sovereignty is under threat, we pursue 'security without user action.' SEQRYPTON marks the beginning of an autonomous security era — an environment where security operates and evolves on its own.

Invisible/Pervasive Authentication
Privacy-Safe IoT Devices

SEQRYPTON builds a trusted digital environment through privacy-first security and next-gen cryptography.

Security is not technology itself, but a means to realize trust. We operate behind the scenes, providing a technical Root of Trust that customers can rely on.

Emergent & Adaptive Root of Trust
Post-Quantum Cryptography & Crypto Agility

Core Tech 1/4

Privacy-Safe IoT Technology

Security cameras like CCTVs in public spaces such as cafés capture video footage that exposes the faces of unspecified individuals, potentially leaking personal information. Privacy-Safe technology fundamentally blocks customer privacy breaches by removing privacy protection zones before video data is even generated.

Key Features:

  • Removal of sensitive information (faces, bodies, license plates) before video processing
  • Real-time processing on edge devices
  • AI-based de-identification filtering engine
Smart City
Retail Security
Public Institution Monitoring

Core Tech 2/4

AI-Based Autonomous Trust Environment Construction Technology

Customer IoT devices can face numerous security threats. Our AI technology autonomously detects and analyzes various security threats, then builds or rebuilds the device's trust environment autonomously to protect customer information.

Key Features:

  • Machine learning-based threat detection and trust policy
  • Non-disruptive security resilience (Resilient Security)
  • Automatic rule reinforcement based on user behavior
Smart Factory
Industrial IoT
Defense

Core Tech 3/4

Self-Evolving RoT Technology

By integrating comprehensive information from the cyber-physical environment where customers live including IoT device characteristics and surrounding environment data. This technology can autonomously generate Root of Trust (RoT). Through this technology, we build a self-evolving trust environment and protect customer information from external threats.

Key Features:

  • Context-based RoT generation and key renewal
  • Security boundary configuration based on sensor/communication signals
  • Local trust autonomy without central server dependency
Defense
Disaster Response Edge Devices
On Device IoT

Core Tech 4/4

Quantum-Resistant Cryptography and Crypto-Agility Technology

With the emerging development of quantum computers, concerns are growing that existing cryptographic systems may collapse. We protect customer information by responding agilely and autonomously to vulnerable cryptography, based on Post-Quantum Cryptography (PQC) technology that is resistant to quantum computers.

Key Features:

  • Built-in PQC algorithms with real-time application
  • Automatic cryptographic module switching framework
  • NIST PQC cryptographic module side-channel attack prevention design
IoT
Finance
Blockchain

Patents

SEQRYPTON holds numerous patented technologies in privacy protection and quantum-resistant security fields and leads industry standards through continuous technological innovation.

Inventor: Choi Doo-ho
TitleCountryRegistration No
Privacy processor enabling personal privacy protection in camera devices and its operation method
Korea10-2024-0072453
Device with flash memory and method for writing/erasing/updating data in flash memory thereof
US17507727
HARDWARE SECURITY MODULE FOR VERIFYING EXECUTABLE CODE, DEVICE HAVING HARDWARE SECURITY MODULE, AND METHOD OF OPERATING DEVICE
US16940146
CIRCUIT, APPARATUS AND METHOD FOR CALCULATING MULTIPLICATIVE INVERSE
US12212670
Memory-based bit stream generation apparatus and method
Korea2738760
Certificate-based device authentication apparatus and method using PUF
Korea10-2591826-0000
PUF-based mutual authentication apparatus and method
Korea10-2539418-0000
APPARATUS AND METHOD FOR AUTHENTICATING IoT DEVICE BASED ON PUF USING WHITE-BOX CRYPTOGRAPHY
US11329835
Device authentication method and apparatus in IoT open platform
Korea10-2557051-0000
APPARATUS FOR GENERATING SECRET INFORMATION ON BASIS OF RING OSCILLATOR ARCHITECTURE AND METHOD OF SAME
US11115202
Hardware security module for verifying executable code and device having it and its operation method
Korea10-2415005-0000
PUF-based IoT device authentication apparatus and method using white-box cryptography
Korea10-2364652-0000
Security information generation apparatus and method using hardware intrinsic characteristics of flash memory
Korea10-2648397-0000
PUF-based IoT device authentication apparatus and method
Korea10-2364649-0000
Secret information generation apparatus and its operation method
Korea10-2272750-0000
Cryptographic operation multithreading apparatus and method
Korea2466273
USER DEVICE, PHYSICAL-UNCLONABLE-FUNCTION-BASED AUTHENTICATION SERVER, AND OPERATING METHOD THEREOF
US830258
SECRET INFORMATION GENERATION APPARATUS AND METHOD FOR OPERATING THE SAME
US742037
RANSOMWARE DECTECTION APPARTUS AND OPERATING METHOD THEREOF
ChinaZL201810397736.5
RANSOMWARE DECTECTION APPARTUS AND OPERATING METHOD THEREOF
Germany3428826
RANSOMWARE DECTECTION APPARTUS AND OPERATING METHOD THEREOF
UK3428826
Encryption apparatus and method
Korea1807259
FUNCTION MASKING APPARATUS IN SYMMETRIC CRYPTOGRAPHIC ALGORITHM FOR PREVENTING SIDE CHANNEL ATTACKS AND METHOD THEREOF
US9577821
COMMUNICATION DATA PROTECTION METHOD BASED ON SYMMETRIC KEY ENCRYPTION IN RFID SYSTEM, AND APPARATUS FOR ENABLING THE METHOD
US8947211

발명의 명칭

Our Team

Our experts and advisory board consist of authorities in security technology, quantum cryptography, and AI fields, leading our vision toward a trusted digital world.

Doo-ho Choi

Doo-ho Choi | CEO

  • Professor, Department of AI and Cybersecurity, Korea University
  • Former Executive Vice President, Korea Institute of Information Security and Cryptology
  • Ph.D. in Topology, KAIST
  • Commercialized SCARF (Cryptographic Key Vulnerability Verification System) and multiple other solutions
  • 12 international patents, 13 domestic patents
Sang-man Lee

Sang-man Lee | CEO

  • Industry Professor, Department of AI and Cybersecurity, Korea University
  • Former CEO, Sysmate Co., Ltd.
  • Researcher, Electronics and Telecommunications Research Institute (ETRI)
  • M.S. in Mathematical Data Science, Korea University
Ho-seok Lee

Ho-seok Lee | Vice President

  • Former CEO, Loginus Co., Ltd.
  • Former Research Director/Executive Director, Sysmate Co., Ltd.
  • M.S. in Computer Engineering, Hanyang University
  • Developed 40G-based information security systems including IPS/DDoS, DPI
  • 2 international patents, 14 domestic patents
Nam-wook Kim

Nam-wook Kim | CFO

  • Former CFO/Executive Director, Winstechnet Co., Ltd.
  • Former CEO, Pangyo Seven Venture Valley Management Co., Ltd.
  • Management Support Division, Kolon Corporation
  • B.A. in Accounting, Pusan National University
  • KOSDAQ IPO, M&A expertise
Young-jin Kim

Young-jin Kim | Advisor

  • Visiting Professor, Department of AI and Cybersecurity, Korea University
  • Research Professor, Information Security Research Institute, Korea University
  • Former Administrative Officer (Cyber Security), Office of the President
  • Former Director, IT Security Certification Office
  • Former IT Advisory Committee Member, Korea Deposit Insurance Corporation
Soo-hwan Jung

Soo-hwan Jung | Advisor

  • Professor, Soongsil University
  • Chairman, Personal Information Technology Forum
  • Chairman, Future Security Technology Forum
  • Former President, Korea Institute of Information Security and Cryptology
  • Former Program Director for Knowledge Information Security, Ministry of Knowledge Economy

Join Us,
in Building a Trustworthy Future.

We welcome people, technologists, and everyone dreaming of innovation who are creating the digital environment of the future. SEQRYPTON supports security projects of all scales and forms.

Contact Us Now.
Let us discuss how your ideas can be realized as safer and more trusted technology.

  • Email
    business@seqrypton.com
  • Address
    Room 413, Industry-Academic Cooperation Building, Korea University Sejong Campus, 2511 Sejong-ro, Sejong Special Self-Governing City [30019] Republic of Korea

Contact Us

CES

We're Going to CES 2026!

Discover our latest innovations and explore how we're shaping the future.

Jan. 6-9, 2026 | Las Vegas, USA
Booth: South Hall(1F) Design&Sourcing
#36511

SEQRYPTON