• Title/Summary/Keyword: IP Protection

Search Result 139, Processing Time 0.024 seconds

A Study on the Protection of Intellectual Property Rights of Contents upon Internet (인터넷상에서 콘텐츠의 지적재산권 보호에 관한 연구)

  • 장병윤
    • Journal of Arbitration Studies
    • /
    • v.12 no.2
    • /
    • pp.373-418
    • /
    • 2003
  • This is to study intellectual property(IP) protection of contents which is related with transactions upon internet network. Issues of electronic transaction and infringement cases were studied and analyzed for intellectual property protection. Upon those study, utilization and activation of contents, dispute settlement and method of IP protection were suggested. To achieve this study purpose, it consists of 5 chapters. In chapter 1 introduction, it's mentioned purpose, scope, and method of this study. In chapter 2, outline of contents and e-Commerce, and subject of IP protection upon internet were studied. In chapter 3, issues and dispute factors of IP were discussed and infringement cases were analyzed. It found out that infringements would be variety and complex due to technology rapidly changes. In chapter 4, IP protection plan and responsibility of webmaster were studied and emphasized to protect IP upon Internet. Also, protection against infringement and method of dispute resolution were studied and suggested the method. In this study, the protection plan was suggested because IP protection of contents in internet would be many cases upon internet technology. It found out that technology was important for business expansion of contents, e-Commerce and IP protection, and to enact a law related with IP. In chapter 5 conclusion, this study was summarized and further research was suggested. This study results are 1. IP related laws had better enact or revise to meet internet technology changes for IP protection timely, 2. local laws are to change and develop to harmony with international norm and trends, 3. consolidation of IP related laws for unification of IP statement should be incurred to avoid unnecessary energy of legislation and not to create dispute matters. That's also for customer satisfaction. In conclusion, not to incur ADR and for IP protection of contents, IP related laws would be promptly made or revised, according to technology change trends and for international harmony, That's for internet related industry development and customer satisfaction.

  • PDF

A Study on the Determinants of IP Protection of Innovation Results in Korean Manufacturing Sector (한국 제조업의 기술혁신성과 보호전략 결정요인에 대한 연구: 지적재산권 보호를 중심으로)

  • Park, Gyu-Ho
    • Journal of Technology Innovation
    • /
    • v.14 no.3
    • /
    • pp.1-21
    • /
    • 2006
  • The explosion in creation and utilization of IP including Patent since 1980s has been regarded as typical trend affecting the environment for technological innovation. Korea also has shown massive creation of IP. These stimulate the focused interest on the effectiveness of IP for protecting the innovation output. We try to analyze the determinants of this effectiveness in Korean manufacturing sector in terms of the charactenstics of firm's innovation strategy. It is shown that, for protection for product innovation, as being larger, and as having made innovation, the IP protection is regarded as effective, and firms making cooperative R&D have a higher possibility of using IP protection. And larger firms give a higher recognition to effectiveness of IP protection irrespective of the types of innovation such as product innovation and process innovation.

  • PDF

QoS Differentiated and Highly Reliable MPLS based IP-VPN Service Module (품질차별화가 가능한 고신뢰도의 MPLS 기반 IP-VPN 서비스 모듈)

  • 윤호선;양선희;이유경
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.727-735
    • /
    • 2002
  • In this paper, we design and implement a MPLS based IP-VPN service module as an application for ACE2000 MPLS system. ACE2000 MPLS VPN service module has been developed using the BGP4 extension protocol. The IP-VPN service module supports differentiated QoS using the MPLS traffic engineering. In addition, it offers a path protection mechanism and the restart mechanism of MPLS system and forwarding engine for supporting a highly reliable service.

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Design of Low-Area 1-kb PMOS Antifuse-Type OTP IP (저면적 1-kb PMOS Antifuse-Type OTP IP 설계)

  • Lee, Cheon-Hyo;Jang, Ji-Hye;Kang, Min-Cheol;Lee, Byung-June;Ha, Pan-Bong;Kim, Young-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1858-1864
    • /
    • 2009
  • In this paper, we design a non-volatile memory IP, 1-kb one-time programmable (OTP) memory, used for power management ICs. Since a conventional OTP cell uses an isolated NMOS transistor as an antifuse, there is an advantage of it big cell size with the BCD process. We use, therefore, a PMOS transistor as an antifuse in lieu of the isolated NMOS transistor and minimize the cell size by optimizing the size of a OTP cell transistor. And we add an ESD protection circuit to the OTP core circuit to prevent an arbitrary cell from being programmed by a high voltage between the terminals of the PMOS antifuse when the ESD test is done. Furthermore, we propose a method of turning on a PMOS pull-up transistor of high impedance to eliminate a gate coupling noise in reading a non-programmed cell. The layout size of the designed 1-kb PMOS-type antifuse OTP IP with Dongbu's $0.18{\mu}m$ BCD is $129.93{\times}452.26{\mu}m^2$.

Security Threats and Security Requirements Analysis of VoIP and Protection Profile Development (VoIP 보안 위협과 보안요구사항 분석 및 보호프로파일 개발)

  • Hong, Won-Soon;Choi, Yong-Joon;Sung, Yune Gie;Sim, Won-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1463-1465
    • /
    • 2009
  • 인터넷망을 이용하여 음성 및 영상통화를 제공하는 VoIP(인터넷전화)서비스가 확대되고, VoIP 서비스가 인터넷망을 이용함에 따라 기존의 인터넷망에서 제기된 보안위협이 증가하고 사이버 공격에 노출되고 있다. 이에 따라 본 고에서는 국제 표준인 공통평가기준(ISO 15408)에서 규정된 방법에 따라 VoIP 서비스를 제공하는 IP Phone 및 IP PBX시스템이 노출되는 사이버 상의 보안위협사항을 도출하고, 보안목적과 VoIP 및 IP PBX 시스템 보안위협에 대응할 수 있는 보안요구사항을 정의하였다.

Protective Effect of Physostigmine and Neostigmine against Acute Toxicity of Parathion in Rats

  • Jun, Jung-Won;Kim, Young-Chul
    • Archives of Pharmacal Research
    • /
    • v.14 no.4
    • /
    • pp.330-335
    • /
    • 1991
  • The effects of physostigmine and neostigmine on the parathin induced toxicity were examined in adult female rats. Physostigmine $(100\;{\mu}g/kg,\;ip)$ or neostigmine $(200\;{\mu}g/kg,\;ip)$ inhibited acetylcholinesterase (AChE) and cholinesterase (ChE) activities in blood, brain and lung when the enzyme activity was measured 30 min after the treatment. At the doses of two carbamates equipotent on brain AChE, neostigmine showed greater inhibition on peripheral AChE/ChE. The enzyme activity returned to normal in 120 min following the carbamates except in the lung of rats treated with neostigmine. Carbamates administered 30 min prior to parathion (2 mg/kg) antagonized the inhibition of AChE/ChE by parathion when the enzyme activity was measured 2 hr following parathion. Neostigmine showed greater protective effect on peripheral AChE/ChE. The effect of either carbamate on AChE/ChE was not significant 2 hr beyond the parathion treatment. Carbamates decreased the mortality of rats challenged with a lethal dose of parathion (4 mg/kg, ip) either when treated alone or in combination with atropine (10 mg/kg, ip). Lethal action of paraoxon (1.5 mg/ks ip), the active metabolite of parathion was also decreased by the carbamate treatment indicating that the protection was not mediated by competitive inhibition of metabolic conversion of parathion to paraoxon. The results suggest that carbamylation of the active sites may not be the sole underlying mechanism of protection provided by the carbamates.

  • PDF

A Study of IP Spoofing Attack and Defense Through Proxy Server (Proxy Server를 통한 IP Spoofing 공격과 방어 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.281-284
    • /
    • 2010
  • The characteristics of International Hacking is that because even if with tracing techniques, nobody can find Real IP address of the attacker so it is true that Great difficulty in the investigation. so that an attacker goes through the Proxy Server Many times and they use techniques of IP Spoofing to hide their IP address. In this paper, study How attackers use IP Spoofing Technique and the application of Proxy Server. In addition, to Propose IP Spoofing attacks through the Proxy Server attack and defend methods also IP traceback methods so this study materials will contribute to the development of International Hacking and Security Protection Technology.

  • PDF

A Study on Spam Protection Technolgy for Secure VoIP Service in Broadband convergence Network Environment (BcN 환경에서 안전한 VoIP 서비스를 위한 스팸대응 기술 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.670-676
    • /
    • 2008
  • There is a difficult plane letting a security threat to occur in Internet networks as VoIP service uses technology-based the Internet is inherent, and you protect without adjustment of the existing security solution or changes with real-time service characteristics. It is a voice to single networks The occurrence security threat that it is possible is inherent in IP networks that effort and cost to protect a data network only are complicated relatively as provide service integrated data. This paper about various response way fields to be able to prevent analysis regarding definition regarding VoIP spam and VoIP spam technology and VoIP spam.

An Efficient Secrete Key Protection Technique of Scan-designed AES Core (스캔 설계된 AES 코아의 효과적인 비밀 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Jeong, Hye-Ran;Kim, Hwa-Young;Park, Sung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.2
    • /
    • pp.77-86
    • /
    • 2010
  • This paper presents an efficient secure scan design technique which is based on a fake key and IEEE 1149.1 instruction to protect secret key from scan-based side channel attack for an Advanced Encryption Standard (AES) core embedded on an System-on-a-Chip (SoC). Our proposed secure scan design technique can be applied to crypto IP core which is optimized for applications without the IP core modification. The IEEE 1149.1 standard is kept, and low area, low power consumption, very robust secret-key protection and high fault coverage can be achieved compared to the existing methods.