• Title/Summary/Keyword: IP Protection

Search Result 139, Processing Time 0.026 seconds

Hot Issue-IP Protection 기술적보호와 법률적보호에 관하여

  • Park, Jong-Tae
    • IT SoC Magazine
    • /
    • s.7
    • /
    • pp.34-38
    • /
    • 2005
  • 저작권법상의 저작물이란“문학∙학술 또는 예술의 범위에 속하는 창작물”을 말하며, 저작물성의 판단에 있어서 가장 중요한 점은 창작성이 있는지 여부인데, 우리나라의 학설 및 판례에 따르면 저작권법상의 창작성이란 단지 남의 것을 베끼지 않은 것으로서 창작자 자신의 개성이 들어나면 족한 것으로 보고 있으므로, 창작성이 인정되는 IP의 경우에는 저작권법상의 어문저작물 또는 설계도 등에 해당하는 저작물로 볼 여지가 있다.

  • PDF

Signaling and Control Procedures Using Generalized MPLS Protocol for IP over an Optical Network

  • Um, Tai-Won;Choi, Jun-Kyun;Kim, Young-Ae;Lee, Hyeong-Ho;Jung, Hae-Won;Jong, Sang-Gug
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.69-81
    • /
    • 2002
  • This paper reviews the existing research activities on signaling and control procedures for IP over optical networks. We focus on the IP-centric signaling and control architecture based on the generalized multi-protocol label switching (GMPLS) protocol and analyze various scenarios and technical issues for deploying the IP over an optical network. We analyze the signaling and operations and administration and maintenance requirements for integrating an IP network and an optical network in order to cope with the high bandwidth and poor resource granularity of the optical network, including the optical cross-connect system. On the basis of network architecture and a reference configuration model, we investigate the GMPLS-based control architecture and interconnection model appropriate for controlling IP bandwidth and optical lambda resources. The signaling and control procedure based on GMPLS on optical user-network interface and network-network interface are comparatively investigated to provide the optical lightpath. We also study protection and restoration procedures to protect link failure when it applies to generalized MPLS signaling.

  • PDF

Unequal Error Protection using IP-SCCC and DCT-based Embedded Coder for Image Transmission (IP-SCCC와 EZ-DCT를 이용한 영상전송의 UEP 채널 부호화 방법)

  • 이연문;조경식;정차근
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.173-176
    • /
    • 2000
  • The fact that the channel coding methode with property of the source coder is better than using the channel characteristics is well known. In this paper We propose the UEP channel coding scheme using IP-SCCC and DCT-based embedded coder for image transmission. Moreover, to evaluate the effectiveness of the proposed scheme some simulation results are presented, in which the channel models of additive white Gaussian noise and Rayleigh fading are assumed.

  • PDF

Protection of MPEG-2 Multicast Streaming in an IP Set-Top Box Environment

  • Hwang, Seong-Oun;Kim, Jeong-Hyon;Nam, Do-Won;Yoon, Ki-Song
    • ETRI Journal
    • /
    • v.27 no.5
    • /
    • pp.595-607
    • /
    • 2005
  • The widespread use of the Internet has led to the problem of intellectual property and copyright infringement. Digital rights management (DRM) technologies have been developed to protect digital content items. Digital content can be classified into static content (for example, text or media files) and dynamic content (for example, VOD or multicast streams). This paper deals with the protection of a multicast stream on set-top boxes connected to an IP network. In this paper, we examine the following design and architectural issues to be considered when applying DRM functions to multicast streaming service environments: transparent streaming service and large-scale user environments. To address the transparency issue, we introduce a 'selective encryption scheme'. To address the second issue, a 'key packet insertion scheme' and 'hierarchical key management scheme' are introduced. Based on the above design and architecture, we developed a prototype of a multicasting DRM system. The analysis of our implementation shows that it supports transparent and scalable DRM multicasting service in a large-scale user environment.

  • PDF

Legal Systems and Practice of Intellectual Property Protection in Japan and China: A Comparative Analysis

  • Cai, Wanli
    • Asian Journal of Innovation and Policy
    • /
    • v.7 no.1
    • /
    • pp.190-206
    • /
    • 2018
  • This article focuses on the legal systems and practice of intellectual property protection in Japan and China, including the relating civil litigation and administrative litigation procedures. The challenge of balancing the relationship between an invalidation trial and an invalid defense during the process of civil patent infringement litigation is a common issue to be solved in both Japan and China. In addition, it is quite usual that the IP products are being imported and exported across the borders due to the expansion of international trade. Accordingly, one of the most symbolic and difficult issues is how to balance the development of international trade and IP protection in each country. In other words, there is a practical issue regarding whether a parallel import of patented products is acceptable to a country or not. The key to determining this issue depends on the judgment of international exhaustion.

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

Development of the Measurement Method of Extremely Low Level Activity with Imaging Plate (Imaging Plate를 이용한 극저준위 방사능 측정에 관한 연구)

  • Kwak, Ji-Yeon;Lee, K.B.;Lee, Jong-Man;Park, Tae-Soon;Oh, Pil-Jae;Lee, Min-Kie;Seo, Ji-Suk;Hwang, Han-Yull
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.4
    • /
    • pp.231-236
    • /
    • 2004
  • An imaging plate(IP) detector, a two-dimensional digital radiation detector that can acquire image of radioactivity distribution in a sample, has been applied in many fields; for industrial radiography, medical diagnosis, X-ray diffraction test, etc. In this study, the possibility of IP detector to be used lot measuring radioactivity of sample is explored using its high sensitivity, higher spatial resolution, wider dynamic range and screen uniformity for several kinds radiations. First, the IP detector is applied to measure the surface uniformity for area source. Surface uniformity is measured rapidly and nondestructively by measuring the radioactivity distribution of common standard area source$(^{241}Am)$. Next, the IP is employed to study the possibility of measuring an extremely low-level activity of environmental sample. For this study the screen uniformity, shield effect of background radiation, linear dynamic range and fading effect of the IP detector is investigated. The potato, banana, radish and carrot samples are chosen to measure ultra low-level activity of $^{40}K$ isotope. The efficiency calibration of IP detector is carried out using the standard source.

Factors Affecting Technological Innovation in Manufacturing Companies in Korea-The Role of Intellectual Property Management (IP관리가 기술혁신활동에 미치는 요인분석)

  • Kim, Eung-Do;Bae, Khee-Su
    • Korean Management Science Review
    • /
    • v.31 no.4
    • /
    • pp.29-42
    • /
    • 2014
  • As society proceeds rapidly toward a knowledge-oriented stage, knowledge as an intangible asset has gained increasing importance. Companies increase their competitiveness and generate extra value through continuous investments in the management of intellectual property (IP). Thus, the prime concerns of companies have been protection of their technological innovation output through filing for IP rights, and maximization of their interests through utilization of intangible assets. Despite the importance of technological innovation in the management of a company, few studies have analyzed the key factors in the management of IP and activities for technological innovation. This study aims to derive policy implications for managing IP and effective capacity building for technological innovation. For this purpose, the author has employed empirical tests to identify the major factors influencing the direction of technological innovations in a company.

Public-Key Based Registration/Session-Key Distribution Protocol in AAA for Mobile IP (Mobile IP AAA에서의 등록과 세션키 분배 프로토콜)

  • 황재훈;송홍엽
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3C
    • /
    • pp.220-225
    • /
    • 2002
  • Mobile IP aims to support mobility within the Internet. This paper concerned with the security aspect of Mobile IP. We show that current registration protocol has a possible replay attack despite the use of authenticated registration message and replay protection. We propose a public-key based registration protocol that also distributes a session-key distribution protocol in AAA. Proposed protocol provides authentication of mobile node and session-key distribution simultaneously. It also provides non-repudiation of service request.

Information Protection against The Hacker's Attack of Ubiquitous Home Networks (해커의 유비쿼터스 홈 네트워크 공격에 대한 정보보호 기술)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.145-154
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at this paper, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS. DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding against the Hacker's attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF