• Title/Summary/Keyword: File Protection

Search Result 123, Processing Time 0.022 seconds

A Study on the Matter of Double Contract for Trademark License in China (중국의 상표사용허가계약의 중첩체결에 관한 연구)

  • SONG, Soo-Ryun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.73
    • /
    • pp.1-20
    • /
    • 2017
  • There are many safeguards and measures available regulating the protection of a trademark and its registered holder, however, the protection of a licensee in a trademark license agreement is also important for protection of a intellectual property. Therefore, there are several measures in place for the protection of licensees' interests in Chinese trademark law. Article 43(3) of the Chinese Trademark Law rules a licensor who licenses others to use his registered trademark shall submit the trademark licensing to the trademark office for file, and the trademark office shall announce the trademark licensing to public. Without filing, the trademark licensing shall not be used against a bona fide third party. It means a licensee can not use an unrecorded license with the relevant trademark authority against third parties - essentially, this means that a licensee should insist on having their trademark license agreements recorded against the relevant trademark authority, so that a licensee's interests are protected as against the assignees, licensees and other types of third parties. Otherwise a third party in good faith can use the registered trademark legally against a licensee even though a trademark license agreement between a licensor and licensee is still valid.

  • PDF

An Efficient Phantom Protection Method for Concurrency Control in Multi-dimensional Index Structures (다차원 색인구조에서 동시성제어를 위한 효율적인 유령 방지 기법)

  • Yun Jong-Hyun;Song Seok-Il;Yoo Jae-Soo;Lee Seok-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.157-167
    • /
    • 2005
  • In this paper, we propose a new phantom protection method for multi-dimensional index structures. The proposed method uses a hybrid approach of predicate locking and granular locking mechanisms. The proposed mechanism is independent of the types of multi-dimensional index structures, i.e., it can be applied to all types of index structures such as tree-based, file-based and hash-based index structures. Also, it achieves low development cost and high concurrency with low lock overhead. It is shown through various experiments that the proposed method outperforms existing phantom protection methods for multi-dimensional index structures.

  • PDF

A study of analysis and improvement of security vulnerability in Bluetooth for data transfer (블루투스 환경에서 데이터 전송 시 보안 취약점 분석 및 개선 방안 관련 연구)

  • Baek, Jong-Kyung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2801-2806
    • /
    • 2011
  • During data transmissions via Bluetooth networks, data to be encrypted, or plain text between the application layer and the device layer, can be hacked similar to a key-logger by the major function hooking technique of Windows Kernel Driver. In this paper, we introduce an improved protection module which provides data encryption transmission by modifying the data transmission driver of the Bluetooth device layer, and also suggest a self-protecting scheme which prevents data exposure by various hacking tools. We implement the protection module to verify the confidentiality guarantee. Our protection module which provides data encryption with minimal latency can be expected the widespread utilization in Bluetooth data transmission.

Phantom Protection Method for Multi-dimensional Index Structures

  • Lee, Seok-Jae;Song, Seok-Il;Yoo, Jae-Soo
    • International Journal of Contents
    • /
    • v.3 no.2
    • /
    • pp.6-17
    • /
    • 2007
  • Emerging modem database applications require multi-dimensional index structures to provide high performance for data retrieval. In order for a multi-dimensional index structure to be integrated into a commercial database system, efficient techniques that provide transactional access to data through this index structure are necessary. The techniques must support all degrees of isolation offered by the database system. Especially degree 3 isolation, called "no phantom read," protects search ranges from concurrent insertions and the rollbacks of deletions. In this paper, we propose a new phantom protection method for multi-dimensional index structures that uses a multi-level grid technique. The proposed mechanism is independent of the type of the multi-dimensional index structure, i.e., it can be applied to all types of index structures such as tree-based, file-based, and hash-based index structures. In addition, it has a low development cost and achieves high concurrency with a low lock overhead. It is shown through various experiments that the proposed method outperforms existing phantom protection methods for multi-dimensional index structures.

최근 미국의 농약관리법(I) - EPA 주성분별 재등록 자격 공지 - 제품특성자료 및 표기사항 충족되면 재등록

  • 이해근
    • Agrochemical news magazine
    • /
    • v.20 no.1 s.148
    • /
    • pp.60-63
    • /
    • 1999
  • 미국에서 농약을 판매하기 위해서는 먼저 해당농약을 등록하여야 하는데 등록업무는 연방 살충$\cdot$살균$\cdot$살서제법(FIFRA : Federal Insecticide, Fungicide and Rodenticide Act)에 의거, USDA(미농무성)에서 관장했으나 1970년 12월 이후부터 신설된 EPA(환경보호청)가 맡고 있다. 여기에 소개하는 내용은 Farm Chemicals Handbook 최근호(''98)의 부록(regulatory file)에 수록된 미국농약관리법중이 주요 내용이며 우리나라의 농약안전관리와 신농약개발 업무에 직$\cdot$간접으로 관계되는 모든 분들에게 참고가 되었으면 하는 바람으로 호에 걸쳐 소개한다.

  • PDF

Indexing Method for Log Records of File System in Continuous Data Protection (연속적인 데이터 보호를 위한 파일시스템 변경 로그 레코드 색인 방법)

  • Kim, Jinsu;Song, Seokil
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2018.05a
    • /
    • pp.537-538
    • /
    • 2018
  • 이 논문에서는 CDP (Continuous Data Protection)에서 연속적인 데이터 보존 및 복원을 위한 파일시스템 변경 로그 레코드 색인 방법을 제안한다. 제안하는 파일시스템 변경 로그 레코드 색인 방법은 CDP에서 특정 시점의 파일들에 대한 복원 속도를 향상시키는 것이 목적이다. 제안하는 방법은 각 파일들을 논리적인 청크 (chunk) 단위로 나누고 각 청크에 대해서 일정 시간대별로 비트를 할당하여 파일의 변경을 추적하는 비트맵 (bitmap) 기반의 색인이다. 제안하는 비트맵 기반의 색인 방법은 멀티 레벨로 구성하여 비트맵 연산의 횟수를 줄일 수 있도록 한다. 이 논문에서는 제안하는 비트맵 기반의 색인 방법의 효율성을 입증하기 위해서 시뮬레이션을 수행한다.

  • PDF

Design and Implementation of Secure Distribution System for Broadcasting Contents (방송 콘텐츠를 위한 안전한 유통 시스템 설계 및 구현)

  • Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.19-27
    • /
    • 2007
  • Broadcasting contents protection system for HDTV has many difficult to apply file encryption technology that using the existing DRM systems. Therefore, this system has to be processed as accommodative about broadcasting contents format such as TS and PS and so on. Also, this system must support efficient encryption technology and random access mode. In addition, this system must have suitable key distribution mechanism in broadcasting environment. In this paper, we propose and implement encryption/key distribution scheme applicable to encoder/decoder without changing the existing MPEG system.

Study on Memory Data Encryption of Windows Hibernation File (윈도우 최대 절전 모드 파일의 메모리 데이터 암호화 기법 연구)

  • Lee, Kyoungho;Lee, Wooho;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1013-1022
    • /
    • 2017
  • Windows hibernation is a function that stores data of physical memory on a non-volatile media and then restores the memory data from the non-volatile media to the physical memory when the system is powered on. Since the hibernation file has memory data in a static state, when the attacker collects it, key information in the system's physical memory may be leaked. Because Windows does not support protection for hibernation files only, we need to protect the memory that is written to the hibernate file. In this paper, we propose a method to encrypt the physical memory data in the hibernation file to protect the memory data of the processes recorded in the hibernation file. Hibernating procedure is analyzed to encrypt the memory data at the hibernating and the encryption process for hibernation memory is implemented to operate transparently for each process. Experimental results show that the hibernation process memory encryption tool showed about 2.7 times overhead due to the crypt cost. This overhead is necessary to prevent the attacker from exposing the plaintext memory data of the process.

Development of Three Dimensional Animal's Habitat Map by GIS (GIS에 의한 3차원 동물서식도 제작)

  • Park, Joon-Kyu;Kim, Min-Gyu
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.4
    • /
    • pp.54-62
    • /
    • 2011
  • At present, about 1.6 million bio-species have been discovered in the world. Approximately 30 thousand indigenes have been recorded in Korea and about fifteen thousand species of biology inhabit in Korea national park. Korea national park where has been lived 133 species at 60 percent of endangered species is a very important wildlife protection area. The construction of database about substantive distribution and habitat of wildlife is urgently needed to protect and manage endangered species. In this study, main habitats about animals were registered using GIS program in Jirisan National Park and 3 dimensional habitat map was produced. Also, new plan was suggested to preserve and manage animals in national parks by producing 3 dimensional habitat map. The habitat map was produced using coordinate file of animals, polygon file about boundary of national park, and ASTER GDEM. New conceptional animal habitat map will be used by means of the valuable information when the plans for preservation/management and habitat protection about animals are designed.

VMProtect Operation Principle Analysis and Automatic Deobfuscation Implementation (VMProtect 동작원리 분석 및 자동 역난독화 구현)

  • Bang, Cheol-ho;Suk, Jae Hyuk;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.605-616
    • /
    • 2020
  • Obfuscation technology delays the analysis of a program by modifying internal logic such as data structure and control flow while maintaining the program's functionality. However, the application of such obfuscation technology to malicious code frequently occurs to reduce the detection rate of malware in antivirus software. The obfuscation technology applied to protect software intellectual property is applied to the malicious code in reverse, which not only lowers the detection rate of the malicious code but also makes it difficult to analyze and thus makes it difficult to identify the functionality of the malicious code. The study of reverse obfuscation techniques that can be closely restored should also continue. This paper analyzes the characteristics of obfuscated code with the option of Pack the Output File and Import Protection among detailed obfuscation technologies provided by VMProtect 3.4.0, a popular tool among commercial obfuscation tools. We present a de-obfuscation algorithm.