• Title/Summary/Keyword: 지적재산권정보

Search Result 255, Processing Time 0.025 seconds

A Comparative Analysis of EAP Authentication/Key-Establishment Protocols (EAP 인증/키설정 프로토콜 비교분석)

  • Park DongGook;Cho Kyung-Ryong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1323-1332
    • /
    • 2005
  • EAP (Extensible authentication protocol) is a sort of general framework for authentication rather than a specific authentication protocol. An important consequence of this is that EAP can accommodate a variety of authentication/key-establishment protocols for different internet access networks possibly integrated to a common IP core network This paper tries a comparative analysis of several specific authentication/key establishment protocols for EAP, and suggest a strategic viewpoint toward the question: which one to un. In addition, we tried to make things clear about an intellectual property right issue with regard to some password-based protocols.

Program Plagiarism Detection through Memory Access Log Analysis (메모리 액세스 로그 분석을 통한 프로그램 표절 검출)

  • Park, Sung-Yun;Han, Sang-Yong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.833-838
    • /
    • 2006
  • Program Plagiarism is an infringement of software copyright. In detecting program plagiarism, many different source program comparison methods has been studied. But, it is not easy to detect plagiarized program that made a few cosmetic changes in program structures and variable names In this paper, we propose a new ground-breaking technique in detecting plagiarism by Memory Access Log Analysis.

A Study on Work Sectors of the Private Investigator Service (민간조사제도의 업무영역 연구)

  • Park, Ok-Cheol;Kim, Rag-Ki
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.3
    • /
    • pp.229-239
    • /
    • 2011
  • The private investigator service in Korea is to protect our legal market from personal right, creation of job, legal opening via OECD and FTA as well as the prevention of negative private investigation such as service center and private investigator operated without any control. Therefore, this study compares the civil research systems of advanced countries, reviews the legal process to introduce private investigator service as well as considers the previous studies to suggest the work sectors of private investigator service appropriate to Korea. As a result, it distinguished the private investigation work into corporate, finance, insurance, medical service, Cyber, traffic accidents, intellectual property right, lost and forensic science.

Multisignature Suitable for Digital Contents Copyright Protect ion on CDN (디지털 콘텐츠 저작권 보호를 위한 CDN에서 다중서명)

  • Shin, Seung-Soo;Kim, Duck-Sool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.77-85
    • /
    • 2005
  • Digital copyright protection is important in the protective side of effort to have leaned to in property right and it which are intelligent of an author and is very important for development of digital contents industry. It is the misgovernment that a reproduction is easy as for the digital contents. and the original and a copy have the same characteristic, and it is so, and is experiencing what is hard for protection of copyright and large quantity illegal copy and illegal distribution prevention. CDN needs a copyright protective plan about the digital contents that digital contents providers were written jointly. The paper used a non-repudiation multi-technique for copyright protection about the digital contents which were written jointly. The Non-repudiation multi-technique proved efficiency about this.

  • PDF

A Consideration for Intellectual Property Rights under Digital Environments (전자상거래에서의 지적재산권에 관한 문제점과 개선방안)

  • Kwon, Sang-Ro
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.249-265
    • /
    • 2004
  • In the current digital age, most of the countries in the world recognize the electronic business to be a very prospective area in the future and plan to activate for the preoccupation of the business. As a result, this led a rapid increase of the electronic business volume. Electronic business takes place in the cyber space, using internet. However, the intellectual property rights have a high degree of possibility of being infringed as the digitalized intellectual property is easy to receive, copy and transmit in the cyber space. The language structure on the web, represented by HTML, makes easier to copy the intellectual property. And, as the internet has no national boundary, the infringement of the intellectual property rights is easier regardless of country, which could lead to the commercial disputes between the concerned countries. There are in fact many legal disputes nowadays on the infringement of the intellectual property rights in such field as computer programming, infringement of the copyright, business model patent and infringement of the trademark right on the registered name of the domain. It is, therefore, time now to prepare a new theory or legal system to protect the intellectual property rights on copyright, patent and trademark right so as to comply with the digital environment together with such a splendid growth of "electronic business." USA and Germany are nowadays making a significant movement on the legislation of the electronic business, and this study will focus on the legislative contents, judicial precedents and interpretation of law in the above countries.

  • PDF

Forensic Computing Model for Contents Protection on d-Commerce (디지털 상거래에서 컨텐츠 보호를 위한 법 적용 컴퓨팅 모델)

  • Hwang, Chul;Hwang, Dae-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.433-436
    • /
    • 2001
  • 지적 재산권 보호 중에서 디지털 상거래에서 가장 절실한 저작물 보호는 근래에 활발히 연구되고 있으며 법 과학 분야는 지문감식, 치아감정 DNA 등 많은 분야가 있다. 그러나 법과학 분야중 법적용 컴퓨팅(Forensic Computing)에 관한 응용은 아직 부족한 상태이다. 그중에도 디지털 저작물에 대하여 증거를 보전 하고자 많은 연구가 진행 되고 있지만 디지털 저작물에 관하여 네트워크를 통한 능동적 저작물 보호는 미약하다. 현재의 데이터 추출(Extraction), 발굴(Exploitation), 복구, 암호 해독, 패스워스 풀기(Defeat), 미러 이미징등의 방법 가지고 해결 못하는 경우와 인터넷 상에서 온라인으로 이루어지는 불법 복제에서 결정적 기여(smoking gun)를 찾아내려고 하는 것이 본 논문에서 해결 하고자 하는 부분이다. 오프라인일 경우도 가능하며 분석된 결과는 변호사/대리인, 법인, 보험회사, 법집행관등에게 온라인으로 제공한다. 진행 과정은 서버에서 파견시킨, 미션을 부여받은 에이전트가 저작물 불법 복제 상황을 트래킹 한 후, 네트워크를 통하여 정해진 시간별로 서버에 전달하면, 법 조항과 매핑시켜서 분석한 다음 서버의 지식베이스에 저장되어 사용자의 요구에 응하는 능동형 디지털 저작물 보호 관리 시스템이다.

  • PDF

A Research for VLSI Layout Migration EDA System (VLSI 레이아웃 이식 시스템에 관한 연구)

  • Kwak, Sung-Hun;Lee, Ki-Joong;Kim, Yong-Bae;Lee, Yun-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.1089-1094
    • /
    • 2000
  • 소형 고성능 가전기기를 실현하기 위한 다기능 고집적의 실리콘화에 대응하기 위하여 반도체 업계는 SoC(System On a Chip) 설계, 반도체 지적 재산권인 IP(Intellectual Property)에 관한 연구를 두개의 핵심 연구 항목으로 설정하여 진행되어 왔다. 반도체 레이아웃 이식 자동화 시스템은 설계 재활용(Design Reuse), IP의 실용화와 확산을 위한 핵심 연구 과제 중의 하나로써, Time-To-Market 과 Time-To-Money 를 동시에 가능토록 하는 근간의 기술이 된다. 본 연구는 정확하고 고속의 IP내의 반도체 소자 인식 알고리즘, 그래프를 이용한 제한 조건의 구현과 해석, 향상된 컴팩션(Compaction) 알고리즘의 연구로 말미암아 기존의 연구 결과 대비 평균 20배의 속도 향상과 평균 41%의 메모리만을 사용함으로써 경쟁 기술 대비 월등한 우위를 보이고 있다. 이로써, 대형의 반도체 설계 도면의 처리를 가능하도록 하였으며, 반도체 IP의 응용성(flexibility)을 부여 함으로써, IP의 재활용의 기초 연구와 SoC 설계 확산에 지렛대 역할을 하는 연구가 되리라고 예측한다.

  • PDF

The knowledge and human resources distribution system for university-industry cooperation (대학에서 창출하는 지적/인적자원에 대한 기업연계 플랫폼: 인문사회계열을 중심으로)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.133-149
    • /
    • 2014
  • One of the main purposes of universities is to create new intellectual resources that will increase social values. These intellectual resources include academic research papers, lecture notes, patents, and creative ideas produced by both professors and students. However, intellectual resources in universities are often not distributed to the actual users or companies; and moreover, they are not even systematically being managed inside of the universities. Therefore, it is almost impossible for companies to access the knowledge created by university students and professors to utilize them. Thus, the current level of knowledge sharing between universities and industries are very low. This causes a great extravagant with high-quality intellectual and human resources, and it leads to quite an amount of social loss in the modern society. In the 21st century, the creative ideas are the key growth powers for many industries. Many of the globally leading companies such as Fedex, Dell, and Facebook have established their business models based on the innovative ideas created by university students in undergraduate courses. This indicates that the unconventional ideas from young generations can create new growth power for companies and immensely increase social values. Therefore, this paper suggests of a new platform for intellectual properties distribution with university-industry cooperation. The suggested platform distributes intellectual resources of universities to industries. This platform has following characteristics. First, it distributes not only the intellectual resources, but also the human resources associated with the knowledge. Second, it diversifies the types of compensation for utilizing the intellectual properties, which are beneficial for both the university students and companies. For example, it extends the conventional monetary rewards to non-monetary rewards such as influencing on the participating internship programs or job interviews. Third, it suggests of a new knowledge map based on the relationships between key words, so that the various types of intellectual properties can be searched efficiently. In order to design the system platform, we surveyed 120 potential users to obtain the system requirements. First, 50 university students and 30 professors in humanities and social sciences departments were surveyed. We sent queries on what types of intellectual resources they produce per year, how many intellectual resources they produce, if they are willing to distribute their intellectual properties to the industries, and what types of compensations they expect in returns. Secondly, 40 entrepreneurs were surveyed, who are potential consumers of the intellectual properties of universities. We sent queries on what types of intellectual resources they want, what types of compensations they are willing to provide in returns, and what are the main factors they considered to be important when searching for the intellectual properties. The implications of this survey are as follows. First, entrepreneurs are willing to utilize intellectual properties created by both professors and students. They are more interested in creative ideas in universities rather than the academic papers or educational class materials. Second, non-monetary rewards, such as participating internship program or job interview, can be the appropriate types of compensations to replace monetary rewards. The results of the survey showed that majority of the university students were willing to provide their intellectual properties without any monetary rewards to earn the industrial networks with companies. Also, the entrepreneurs were willing to provide non-monetary compensation and hoped to have networks with university students for recruiting. Thus, the non-monetary rewards are mutually beneficial for both sides. Thirdly, classifying intellectual resources of universities based on the academic areas are inappropriate for efficient searching. Also, the various types of intellectual resources cannot be categorized into one standard. This paper suggests of a new platform for the distribution of intellectual materials and human resources, with university-industry cooperation based on these survey results. The suggested platform contains the four major components such as knowledge schema, knowledge map, system interface, and GUI (Graphic User Interface), and it presents the overall system architecture.

A Study on a Method to Use Industrial and Technical Information in Process of R&D Project Planning (연구개발(R&D)과제 기획에서의 산업·기술정보 활용방안)

  • Kim, Yong;Han, Hee-Jung;Lee, Kyun-Hyung;Lee, Yoon-Seok;An, Seung-Kwon
    • Journal of Information Management
    • /
    • v.43 no.4
    • /
    • pp.69-96
    • /
    • 2012
  • Based on analysis of trend and development of industrial and technical information such as patents and scientific data, using industrial and technical information in the process of planning can be a important factor to reduce budget and opportunity cost. This study aims to investigate needs to collect and analyze industrial and technical information in planning of R&D project. To do it, this study examines definitions, needs and types of industrial and technical information for planning of R&D project. And then this study investigates the importance of use of industrial and technical information in the process of planning of R&D and performs case study in domestic and foreign countries. Lastly, this study investigates a method to analyze industrial and technical information for R&D planning and proposes the role of a library for R&D planning.

Using Staganography method for Protection of Caption Information in the Motion Picture (스테가노그래피 기법을 이용한 동영상 자막정보의 저작권 보호)

  • Ham, Jun-Sick;Ryou, Hwang-Bin;Hong, Seong-Sik
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.835-842
    • /
    • 2003
  • The technical advancement in and the widespread expansion of use of the internet has recently led to an increase in high bandwidth multimedia data usage. This is largely due to an unfettered access to the internet. The intrinsic merit of the internet, however, brings about a side effect:multimedia date can easily be duplicated recklessly. This invokes the problem of intellectual property right violation. Focusing on this matter, multi-faceted studies are being conducted now. This paper aims to provide, by applying steganography and encryption methods into the SMIL files which supply subtitle data, the intellectual property protection of both motion picture and its subtitle data, as well as the integrity of the contents in question. In order to achieve the above goal, the authors show a particular method how to safely embed subtitle data into the given frames, after they separate subtitle data to encrypt them. By doing this, the authors suggests, the intellectual property right to the subtitle data as well as their integrity can be protected and achieved respectively. Besides, an integrity service for motion picture can be made.