• Title/Summary/Keyword: IP Protection

Search Result 139, Processing Time 0.029 seconds

A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System (네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.939-946
    • /
    • 2023
  • In the hyper-connected network, which network equipment is diverse and network structure is complex, the attack surface has also increased. In this environment, MTD(Moving Target Defense) technology is being researched as a method to fundamentally defend against cyber attacks by actively changing the attack surface. network-based MTD technologies are being widely studied. However, in order for network address mutation technology to be applied within the existing fixed IP-based system, research is needed to determine what impact it will have. In this paper, we studied the impact of applying network address mutation technology to the existing network protection system. As a result of the study, factors to be considered when firewall, NAC, IPS, and network address mutation technologies are operated together were derived, and elements that must be managed in network address mutation technology for interoperability with the network analysis system were suggested.

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

Knowledge-based company's technology innovation strategy and case analysis in semiconductor IP industry (반도체 IP 산업에서 지식기반 기업의 기술혁신 전략에 대한 사례연구)

  • Kim, Min-Sik
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.3
    • /
    • pp.500-532
    • /
    • 2012
  • This study analyzed the technology innovation strategies of knowledge-based companies in the semiconductor IP industry. The theoretical approaches of this study are to i) the creation, protection and utilization of knowledge and innovation, ii) value creation from innovation, iii) modularity, timing of market entry, and the emergence and competition of standard (dominant design). Based on the theoretical analysis, I presented exploratory research hypotheses. Ultimately, this study examined the proposed hypotheses by conducting case studies on the technology innovation strategy of two leading knowledge-based companies in the semiconductor IP industry: ARM and INTEL. First, knowledge-based companies entering in the early stage of the technology cycle select the vertically-integrated technology strategy because of lower access to complementary knowledge assets, and maintain the vertically-integrated technology strategy despite the environmental change-driven differentiation of industry's value chain. Second, knowledge-based companies entering in the later stage of the technology cycle prefer the contract-based technology strategy because of its increased accessibility to complementary knowledge assets, and choose a different path of innovation strategies depending on whether their asset has the feature of discontinuity or not.

  • PDF

Ethernet Ring Protection Using Filtering Database Flip Scheme For Minimum Capacity Requirement

  • Rhee, June-Koo Kevin;Im, Jin-Sung;Ryoo, Jeong-Dong
    • ETRI Journal
    • /
    • v.30 no.6
    • /
    • pp.874-876
    • /
    • 2008
  • Ethernet ring protection is a new technology introduced in ITU-T Recommendation G.8032, which utilizes the generic Ethernet MAC functions. We introduce an alternative enhanced protection switching scheme to suppress penalty in the switching transient, in which the Ethernet MAC filtering database (FDB) is actively and directly modified by information disseminated from the nodes adjacent to failure. The modified FDB at all nodes are guaranteed to be consistent to form a complete new ring network topology immediately. This scheme can reduce the capacity requirement of the G.8032 by several times. This proposed scheme can be also applied in IP protection rings.

  • PDF

Implementation of network-based video surveillance system (영상을 이용한 네트워크 기반 감시 시스템 구현)

  • Lee, Ji-Hoon;Kim, Sun-Hyeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.510-512
    • /
    • 2015
  • Recently, people fear is growing because of the various crimes that may occur when you go out. The growing is interest in security systems for the protection of an individual's property. In this paper, to establish a single central server based on the home network when intruders access to city, such as image processing values obtained through the IP camera and distance values disciplined use an ultrasonic sensor the user for an attacker city that will connect to the server the surveillance system provides the information that is received and implemented.

  • PDF

An Image Transmission with Interleaved Puncturing Serially Concatenated Convolutional Codes for Wireless Communication (무선 채널 환경에서 IP-SCCC에 의한 정지 영상의 전송)

  • 이연문;조경식;정차근
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.08a
    • /
    • pp.321-324
    • /
    • 2000
  • 채널만을 고려한 부호화 방법보다 소스의 특성을 이용해 채널 부호화를 수행하는 것이 더 효율적이라는 사실은 일반적으로 잘 알려져 있다. 따라서 소스의 특성을 이용한 채널 부호화 방법은 중요한 연구과제이며 이에 대한 많은 연구가 진행되었다. 이러한 연구 결과로써 IP-SCCC(Interleaved puncturing serially concatenated convolutional codes)는 터보코드와 마찬가지로 반복복호가 가능하고 가변 부호율의 채널부호화를 수행할 수 있는 특징을 갖는다. 본 논문에서는 영상에 대한 웨이블렛 변환의 다른 스케일간의 자기 유사성을 이용한 SPIHT(set partitioning in hierarchical tree) 알고리즘으로 부호화된 정지영상에 대해 IP-SCCC를 사용한 UEP(unequal error protection) 채널부호화 방법을 제시한다. 또한 레일리 페이딩과 부가 백색 가우시안 잡음이 동시에 존재하는 채널을 모델링해서 실험을 수행하고 제안 방법의 성능을 검증한다.

  • PDF

Unequal Error Protection Channel Coding for Wireless Communications (이동 통신에서 영상전송을 위한 UEP 채널 부호화 방법)

  • 이연문;조경식;정차근
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.12a
    • /
    • pp.25-28
    • /
    • 2000
  • 시변 특성을 갖는 무선 채널 환경에서 UEP(Unequal Error Protection) 채널 부호화 방법은 효율적인 정보 전송을 가능케 한다. 본 논문에서는 IP-SCCC (Interleaved Puncturing Serially Concatenated Convolutional Codes)로 CSI(Channel State Information)와 SSI(Source Significance Information)를 이용한 두가지 UEP 채널 부호화 방법을 제안한다. 또한 AWGN(Additive White Gaussian Noise)과 Rayleigh 페이딩이 존재하는 채널을 가정하고 모의 실험을 통해 알고리즘의 우수성을 검증한다.

  • PDF

A Study on Infringement Cases of Software Copyright and the Dispute Settlement (소프트웨어 저작권 침해사례와 분쟁해결에 관한 연구)

  • 장병윤
    • Journal of Arbitration Studies
    • /
    • v.13 no.2
    • /
    • pp.547-584
    • /
    • 2004
  • Information technology(IT) is changing rapidly based on growth of internet and computer businesses. Therefore, computer programs and softwares are distributed to computer users promptly for their productivity increase and efficient work. So, in the distribution, the softwares will be copied or released through network or other methods which are not authorized by the program owners. In that case, copyright dispute is incurred and various issues are come out due to infringement of the software copyright. Thus, the purpose of this study is to research infringement cases of the software copyright and how to settle the dispute which is related with software programs. To achieve the purpose of this study, this research consisted of 5 chapters. At chapter 1 introduction, it mentioned necessity of this study, purpose and how to research this study, and at chapter 2 dispute factors indicated and summarized for technical resolution. At chapter 3, infringement cases of software copyright analyzed and studied upon intellectual property(IP) related laws. And methods of dispute settlement discussed and suggested to chapter 4 for copyright and intellectual property protection. Also, it emphasized importance of arbitration to resolve the issues timely and avoid time and economical consumption. Of course, arbitration law has to be matched with the trend of technology development for effective settlement. At chapter 5 conclusion, it summarized this research and suggested further research for empirical test of economic value of the software copyright upon the aspect of business, law, and engineering. In this study, the results are 1) IP related laws have to be enacted or revised to meet technical changes for the protection of software copyright on time. The enactment or the revision of law takes a long time, therefore, to deal the dispute effectively, 2) arbitration law has to be utilized efficiently in order to resolve issues and settle the dispute promptly. It is suggested the dispute settlement through arbitration to save time and economic matters for legislation, and to harmony with the technology trends. 3) Recognition of software copyright is to be improved by users and enterprises for development of software related industries and intellectual property protection. In conclusion, the protection of software copyright is important than any other things in the field of IT because of the development of industry and intellectual property related laws. The development is for areas of business, law and engineering, so research and practices are to be combined with the areas so that it could resolve the dispute settlement and IP protection effectively.

  • PDF

A Novel Cost-Effective Firewall Token for Hacking Protection on TCP/IP Based Network (TCP/IP를 이용하는 전산망의 해킹방지를 위한 경제적인 방화벽 토큰 설계 방안)

  • 고재영
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.1
    • /
    • pp.159-169
    • /
    • 1999
  • Recently a firewall is being employed to protect hacking by controlling the traffics. The security services in the firewall include authentication, access control, confidentiality, integrity, and audit trail. A token is adapted for authentication to the firewall. A token has a small battery within which has restricted power capacity, This paper proposes a novel cost-effective firewall token for hacking protecting on transmission control protocol/internet protocol (TCP/IP) based network. This paper proposes a fast exponentiation method with a sparse prime that take a major operation for a public-key crypto-system and a major power consumption in the token. The proposed method uses much less amount of modular operations in exponentiation that is reduced of battery's capacity or CPU's price in the token.

  • PDF

IMPLEMENTATION OF STRUCTURAL DIAGRAM FOR INTELLECTUAL PROPERTY MANAGEMENT AND PROTECTION(IPMP)

  • Park, Jung-Hee;Lee, Ki-Dong;Lee, Sang-Jae
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.435-448
    • /
    • 2004
  • While Internet promises ubiquitous access, it also creates a fundamental challenge to the traditional ownership toward digital assets traded in e-commerce market. Sharing digital information freely through shared networks leads to many untapped business opportunities, but uncontrolled digital asset transaction undermines many electronic business models. Thus, in this Internet age, proper protection and safe delivery of Intellectual Property (IP) and its representation as digital assets would be a crucial ingredient of building trust in upcoming e-business environment. In this paper, we give a general structural diagram of Intellectual Property Management and Protection (IPMP) and implement an IPMP prototype based on the RSA encryption algorithm and XrML (eXtensible rights Markup Language) WORK tags to show how proper protection and safe delivery of the intellectual property is achieved. This study concludes that IPMP mechanism may contribute significantly to the volume and quality of e-commerce market.

  • PDF