• Title/Summary/Keyword: 지적재산권정보

Search Result 255, Processing Time 0.046 seconds

The Design of Active Storage Virtualization System for Information Protection (정보보호를 위한 능동적 스토리지 가상화 시스템 설계)

  • Cho, Kyoung-Ok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2040-2048
    • /
    • 2010
  • In contemporary society, though convenience and efficiency of work using information system is growing high, adverse effect problems of malignant code, system hacking, information leak by insiders due to the development of the network are raising their head daily. Because of this, enormous work forces and expenses for the recovery and management of system is needed. The existing system can be divided into two aspects: security solution which surveils and treats virus and malignant codes, and network management solution which observes the system of computer, and practices maintenance and repair such as management, recovery, backup. This treatise applied Active Write Filter mechanism and the technology based on NFS and complemented the maintenance problems of user data of the existing system and designed the system which enables solving problems of intellectual property right such as information protection and illegal work.

Semantic Web Ontology and Inference for Research Community (국가과학기술 R&D 기반정보 온톨로지와 추론 모델링)

  • Kang In-Su;Jung Han-Min;Lee Seung-Woo;Kim Pyung;Sung Wonk-Yung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.13-15
    • /
    • 2006
  • 과학기술 연구분야에서 인력, 기관 등의 연구 주체와 논문, 과제, 지적재산권 등의 성과에 대한 온톨로지는, 시맨틱 웹 환경에서 이질적 과학기술 연구정보의 의미적 통합과 자동화된 유통, 그리고 암묵적 지식의 추론을 가능케 할 것이다. 이 논문에서는 현재 한국과학기술정보연구원에서 개발 중인 국가과학기술 R&D 기반정보 은톨로지를 소개하고, 그의 응용으로써 은톨로지에 내재된 암묵적 지식들을 규칙을 사용하여 추론하는 과정의 기술에 중점을 둔다. 상기 은톨로지는 인스턴스의 유일성 확보를 위해 URI(Uniform Resource identifier)서버에 기반하여 온톨로지 인스턴스에 고유한 URI를 할당하는 데 중점을 두고 설계되었으며, 논문의 특정순위저자를 모델링한 저작자정보 클래스를 은톨로지 스키마 상에 명시적으로 표현한다는 특징이 있다.

  • PDF

Standardization Trend and Strategy of Mobile RFID Security Technology (모바일 RFID 보안기술 표준화 동향 및 표준화 추진 전략)

  • Gang, Yu-Seong;Choe, Du-Ho;Kim, Ho-Won
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.2 s.110
    • /
    • pp.142-152
    • /
    • 2008
  • 모바일 RFID 환경이란 휴대전화가 RFID 리더를 가지고 있어서 사용자가 자신의 휴대전화를 통해 RFID 태그가 부착된 제품의 정보를 손쉽게 얻을 수 있는 환경을 의미한다. 모바일 환경에서 사용되는 RFID 기술은 고정형 RFID 리더를 사용하는 환경과는 다른 사용자 요구사항 및 보안 요구사항이 존재한다. 모바일 RFID 기술에 특화된 국제 표준화 논의가 2007년 상반기부터 본격적으로 논의되고 있다. 따라서 모바일 RFID 보안기술은 모바일 RFID 전체 프레임워크와 호환성을 유지하면서 모바일 환경의 요구사항을 만족하는 방향으로 표준화가 진행되어야 한다. 본 고에서는 모바일 RFID 기술의 표준화 동향을 살펴보고, 모바일 환경을 고려한 모바일 RFID 보안 프레임워크 및 인증, 키 관리, 데이터 보호, 프라이버시 보호 등의 모바일 RFID 보안 서비스를 설명한다. 그리고 이러한 보안 서비스를 제공하기 위해 필요한 표준화 대상을 제안하고, 표준화 대상에 대한 기술 개발과 지적재산권 확보 및 이를 연계한 국제표준화 추진 전략을 설명하며 결론을 맺는다.

Analysis of the Change of ETSI IPR Policies (ETSI IPR 정책의 변화 분석)

  • Lee, S.M.;Kim, Y.T.;Kang, B.M
    • Electronics and Telecommunications Trends
    • /
    • v.14 no.3 s.57
    • /
    • pp.86-94
    • /
    • 1999
  • 유럽의 전기통신 표준화기구(ETSI)는 유럽연합(EU) 차원의 지역 표준화를 추진함에 있어서 갈등요인이 될 수 있는 지적재산권 문제를 원활하게 해결하기 위한 노력의 일환으로 1993년 3월 ETSI IPR 정책을 채택하였다. 그러나 동 정책을 재검토하게 되었으며, 그 결과로 IPR 정책 운영상의 주요 문제가 되었던 IPR 협약서 내용을 폐지하고 1994년 11월의 ETSI 21차 총회에서 본 IPR 정책을 새로이 수립하여 그 후 3년이 지난 1997년 11월에 이를 정식 ETSI IPR 정책으로 채택하였다. 이에 본 고에서는 ETSI에서 추구하고 있는 정보통신 표준화와 관련한 IPR 정책의 주요 변화사항을 분석하였으며, 아울러 최근에 개정된 주요 IPR 정책의 내용을 고찰함으로써 국내의 관련 정책 수립시 도움이 되도록 하였다.

A Research on Applying Copyright Laws and Response Strategies for Academic Libraries (저작권법의 적용과 대학도서관의 대응 전략에 관한 고찰)

  • Kwack, Dong-Chul
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.4
    • /
    • pp.235-254
    • /
    • 2013
  • The purpose of this study is to seek sustainable development plans in which academic libraries comply with copyright laws without withdrawing their information services by focusing on the changes of the relevant regulations since 2000 when copyright laws were revised. The study deals with the followings in detail. First, the issues with library information services is examined, owing to the enactment, revision, and execution of copyright laws. Second, the histories of enacting and amending copyright laws related to libraries are considered. Third, various opinions and response measures as to applying the copyright laws to libraries are analyzed. Forth, based on the previous analysis, the study suggests response strategies that academic libraries accept for copyright laws and keep improving library information services.

Technological Assesment on Public R&D Activities (정보통신 공공 R&D 기술성 평가)

  • 여인갑
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.433-439
    • /
    • 2002
  • In this paper, we implemented technology assessment on the public R'||'&'||'amp;D activities in If field in order to select the promising technologies, so called 'star technology,' making for national industry development. Technology assessment frame in this study included qualitative factors. If technologies are classified five sector - network, wireless/broadcasting, SW/application, computer/terminal equipment,somiconductorjcomponent. Expert opinion interviews on each field are carried out. Assessment factors consist of technology usefulness and technology competitiveness. In the final analysis, 23 technology items selected as a promising technologies and the results can be used public R'||'&'||'amp;D planning and IT industry policy

  • PDF

Strategies for Import and Development of Foreign Scholarly Journals in Korea (II) (해외 학술지의 수입국가형 개발전략 (II))

  • Yoon, Hee-Yoon
    • Journal of Information Management
    • /
    • v.37 no.3
    • /
    • pp.25-59
    • /
    • 2006
  • The primary purpose of this paper is to suggest the import and development models of foreign scholarly journals in Korea. In the context of the emerging knowledged-based economy or knowledge society, innovations and capacity of the national information system to collect, disseminate, and preserve the most important STM journals are becoming increasingly fundamental determinants of national prosperity and survival. It is essential that the scholarly or scientific communication system must provide the cost-effectiveness access to scholarly journals in support of research and development in Korea.

Strategies for Import and Development of Foreign Scholarly Journals in Korea (I) (해외 학술지의 수입국가형 개발전략 (I))

  • Yoon, Hee-Yoon
    • Journal of Information Management
    • /
    • v.37 no.2
    • /
    • pp.51-74
    • /
    • 2006
  • The primary purpose of this paper is to suggest the import and development models of foreign scholarly journals in Korea. In the context of the emerging knowledged-based economy or knowledge society, innovations and capacity of the national information system to collect, disseminate, and preserve the most important STM journals are becoming increasingly fundamental determinants of national prosperity and survival. It is essential that the scholarly or scientific communication system must provide the cost-effectiveness access to scholarly journals in support of research and development in Korea.

What Concerns Does ChatGPT Raise for Us?: An Analysis Centered on CTM (Correlated Topic Modeling) of YouTube Video News Comments (ChatGPT는 우리에게 어떤 우려를 초래하는가?: 유튜브 영상 뉴스 댓글의 CTM(Correlated Topic Modeling) 분석을 중심으로)

  • Song, Minho;Lee, Soobum
    • Informatization Policy
    • /
    • v.31 no.1
    • /
    • pp.3-31
    • /
    • 2024
  • This study aimed to examine public concerns in South Korea considering the country's unique context, triggered by the advent of generative artificial intelligence such as ChatGPT. To achieve this, comments from 102 YouTube video news related to ethical issues were collected using a Python scraper, and morphological analysis and preprocessing were carried out using Textom on 15,735 comments. These comments were then analyzed using a Correlated Topic Model (CTM). The analysis identified six primary topics within the comments: "Legal and Ethical Considerations"; "Intellectual Property and Technology"; "Technological Advancement and the Future of Humanity"; "Potential of AI in Information Processing"; "Emotional Intelligence and Ethical Regulations in AI"; and "Human Imitation."Structuring these topics based on a correlation coefficient value of over 10% revealed 3 main categories: "Legal and Ethical Considerations"; "Issues Related to Data Generation by ChatGPT (Intellectual Property and Technology, Potential of AI in Information Processing, and Human Imitation)"; and "Fear for the Future of Humanity (Technological Advancement and the Future of Humanity, Emotional Intelligence, and Ethical Regulations in AI)."The study confirmed the coexistence of various concerns along with the growing interest in generative AI like ChatGPT, including worries specific to the historical and social context of South Korea. These findings suggest the need for national-level efforts to ensure data fairness.

Design of robust Watermarking Algorithm against the Geometric Transformation for Medical Image Security (의료 영상보안을 위한 기하학적 변형에 견고한 워터마킹 알고리즘 설계)

  • Lee, Yun-Bae;Oh, Guan-Tack
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2586-2594
    • /
    • 2009
  • A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of finding any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure of an image and inserting and extracting based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST(Rotation Scale, Translation) transformation and other processing. It also helps to maintain the watermark in images that are compressed and stored for a period of time. This algorithm also proved that is has robustness against not only JPEG compression attack, but also RST attack and filtering attack.