• Title/Summary/Keyword: IP Protection

Search Result 139, Processing Time 0.029 seconds

An Enhanced Dynamic Multilayer Routing for Networks with Protection Requirements

  • Urra, Anna;Calle, Eusebi;Marzo, Jose L.;Vila, Pere
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.377-382
    • /
    • 2007
  • This paper presents a new enhanced dynamic and multilayer protection(DMP) routing scheme that considers cooperation between packet and wavelength switching domain in order to minimize the resource consumption. The paper describes the architecture of the multilayer network scenario and compares the proposed algorithm with other routing mechanisms applying protection at the IP/multi-protocol label switching(MPLS) layer or at the optical layer. Simulation results show that DMP reduces the number of optical-electrical-optical(o-e-o) operations and makes an efficient use of the network resources compared to non-multilayer proposals.

An IP Traceback "M"echanism with "E"nhanced "I"ntegrity for IPv6-based NGN Environment (IPv6 기반 NGN 환경에서 무결성을 제공하는 역추적 기법)

  • Jang, Jae-Hoon;Yeo, Don-Gu;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.31-41
    • /
    • 2010
  • It is difficult to identify attacker's real location when the attacker spoofs IP address in current IPv4-based Internet environment. If the attacks such as DDoS happen in the Internet, we can hardly expect the protection scheme to respond to these attacks in active or real-time manner. Many traceback techniques have been proposed to protect against these attacks, but most traceback schemes were designed to work with the IPv4-based Internet and found to be lack of verification of whether the traceback related information is forged or not. Few traceback schemes for IPv6-based network environment have been suggested, but it has these disadvantages that needs more study. In this paper, we propose the reliable IP traceback scheme supporting integrity of traceback-related information in IPv6 network environment, simulate it, and compare our proposed scheme with exsisting traceback mechanisms in terms of overhead and functionality.

An Information Ethics Approach to the Justification of Intellectual Property Rights (지적 재산권의 정당화에 관한 정보윤리학적 접근)

  • 임상수
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.12 no.2
    • /
    • pp.31-47
    • /
    • 2001
  • From the viewpoint of Information Ethics. I tried to examine the moral justification of Intellectual Property Rights in the age of the digital information society. Lockian traditional argument of property rights which is based on the value of labor and Hegelian theory of personalization, both are not enough to justify the new Intellectual Property Rights. The notions of Intellectual Property Rights are to be changed. One change is from the absolute dominion over material property to the limited dominion over intellectual property. The change from property rights to process control rights is the other. To protect these intellectual property rights, there are three possible protection devices that we might take - legal protection, technical protection and moral protection. I argued that both legal and technical protection have some limitations, so the final way to protect the IP rights is to attempt to establish the moral protection as a fundamental solution.

  • PDF

The Research on the International Treaties and Domestic Situations to Protect the Intellectual Property of Korean Medicine and Our Countermeasures (한의약지식재산보호를 위한 국제협약 및 국내현황 조사와 그 대응방안에 대한 소고)

  • Lee, Ju-Ho;Kim, Namil;Kim, Dong-Ryul;Kim, Min-Seon;Kim, Youn-Hee;Cha, Wung-Seok;Ahn, Sang-Woo
    • The Journal of Korean Medical History
    • /
    • v.29 no.2
    • /
    • pp.83-105
    • /
    • 2016
  • Traditional medical knowledge and its biological resources, including Korean Medicine, has regarded as an important object of intellectual property rights. International organizations have been discussed and implemented various treaties on how to exercise and protect the property rights of traditional medicines. In Korea, the governmental policies and the academic societies have endeavored to establish the protection method and academic foundations of Korean Medicine's intellectual properties. This study will examine the current situation of discussions in major international organizations and Korean governmental policies related to the protection of traditional medical intellectual properties. Furthermore, this paper will contemplate the possible arguments and countermeasures to protect the traditional knowledge of Korean Medicine. We hope that this study will contribute to find the reasonable and effective ways of protection of Korean Medicine's intellectual property rights.

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

Intellectual Property Disputes in the Era of the Metaverse: Complexities of Cross-Border Justice and Arbitration Consideration

  • Kye Hwan Ryu;Choong Mok Kwak
    • Journal of Arbitration Studies
    • /
    • v.33 no.3
    • /
    • pp.147-175
    • /
    • 2023
  • The emergence of the metaverse, a complex three-dimensional virtual environment, has led to significant changes in the intellectual property (IP) landscape. This paper examines the challenges and legal intricacies of IP within the virtual realm, focusing on the unprecedented nature of these disputes and on the inadequacies of traditional jurisdiction methods. Drawing from international frameworks, including the International Law Association's Guidelines and WIPO's guides, the study critically explores arbitration as an alternate approach to metaverse IP disputes, analyzing its complexities and applicability. The paper further delves into challenges arising from diverse protection laws that pertain to the global nature of the metaverse, including the nuances of various digital assets like NFTs. By assessing jurisdictional difficulties, the paper addresses the adoption of decentralized justice platforms, and examines the role of Alternative Dispute Resolution (ADR) methods, this paper presents a comprehensive view of the evolving virtual legal field. It suggests that while innovative methods are emerging, traditional arbitration will likely remain the preferred choice for complex disputes, offering a balance of speed, cost-effectiveness, and legal robustness within the virtual world.

The IP development for the real-time process of SoC image protection system (SoC 영상 보안 시스템의 실시간 처리를 위한 IP 개발)

  • Jung, Kwang-Sung;Moon, Cheol-Hong
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.605-606
    • /
    • 2008
  • The distance detection system receives stereo video input through 2 CCD cameras. Using a decoder, the image is changed to the YCbCr4:2:2 format and only the Y signal is saved in the 4*256*8bit shift register of the Dual-Port SRAM. As a result of the matching procedure, the Depth value, which is the distance information, is saved in SRAM, and the Depth Map is made and output to the TFT-LCD screen.

  • PDF

A Configuration of LINUX router VPN using FreeS/WAN IPSEC (FreeS/WAN IPSEC을 이용한 LINUX 라우터 VPN 구성)

  • 김한철;이계상
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.499-502
    • /
    • 2001
  • FreeS/WAN[l] 은 LINUX 상에서 네트워크 보안 프로토콜표준인 IPSEC을 구현한 공개 S/W이다. 현재 LINUX Project로 수행되고 있으며 1.91 version 까지 나와 있다. 라우터와 라우터간에 IPSEC을 사용하여 통신함으로써 access control, connectionless integrity, data origin authentication, protection against replays, confidentiality의 서비스를 보장받을 수 있고, 또한 이러한 서비스들은 IP 계층에서 제공되기 때문에 IP 계층뿐만 아니라 그 이상의 계층에 대한 보호를 제공한다. [2] 본 논문에서는 LINUX router에 FreeS/WAN IPSEC을 설치하여 Security Gateway를 구성하고, 이 Security Gateway를 통해 전형적인 가상사설망을 구성할 수 있음을 보였다. 양단의 Security Gateway에 설치되어진 FreeS/WAN으로 VPN connection을 설정하고, 인증방법으로 RSA authentication key를 setup 하였다. IPSEC을 통하여 암호화되어진 데이터로 양단의 Gateway 구간에서 보안통신이 이루어짐을 알아본다.

  • PDF

The core information protection mechanism in the BcN(Broadband Convergence Network) (BcN(Broadband Convergence Network) 환경에서의 중요정보에 대한 도청방지 메카니즘)

  • Oh, Sek-Hoan;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.14-26
    • /
    • 2008
  • IP over Ethernet technology widely used as Internet access uses the ARP(Address Resolution Protocol) that translates an ip address to the corresponding MAC address. recently, there are ARP security attacks that intentionally modify the IP address and its corresponding MAC address, utilizing various tools like "snoopspy". Since ARP attacks can redirect packets to different MAC address other than destination, attackers can eavesdrop packets, change their contents, or hijack the connection. Because the ARP attack is performed at data link layer, it can not be protected by security mechanisms such as Secure Shell(SSH) or Secure Sockets Layer(SSL). Thus, in this paper, we classify the ARP attack into downstream ARP spoofing attack and upstream ARP redirection attack, and propose a new security mechanism using DHCP information for acquisition of IP address. We propose a "DHCP snoop mechanism" or "DHCP sniffing/inspection mechanism" for ARP spoofing attack, and a "static binding mechanism" for ARP redirection attack. The proposed security mechanisms for ARP attacks can be widely used to reinforce the security of the next generation internet access networks including BcN.

Lactation Performance of German Fawn Goat in Relation to Feeding Level and Dietary Protein Protection

  • Chowdhury, S.A.;Rexroth, H.;Kijora, C.;Peters, K.J.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.15 no.2
    • /
    • pp.222-237
    • /
    • 2002
  • Effects of high and low levels of feeding with or without protected protein on the performance of lactating goats were studied. Twenty four German Fawn goats either from 1st ($43.37{\pm}3.937$ kg and 2 year old) or 3rd $62.64{\pm}6.783$ kg and 4-5 year old) parity were used for the trial. Feeding levels were 7.2 (I) and 5.2 (II) MJ ME/litre of milk of 3.5% fat in addition to that of the maintenance allowance. At each feeding level, diet had either unprotected (U) or formaldehyde protected (P) soya-meal. Thus, four diets were IU, IP, IIU and IIP, having six animals in each. The diets were composed of hay and pellet (10:4:1 of beet pulp : barley : soya-meal). Effect of feeding level, protein protection, parity, health status and kid number on intake, milk yield, milk composition, growth rate of goats were recorded across the 21 weeks of study. High feeding level resulted increase (p<0.001) in estimated metabolizable energy (ME) and metabolizable protein (MP) availability. Dietary inclusion of protected soya-meal increased (p<0.001) the estimated MP but not the ME availability. Animals in 1st parity ate more (p<0.001) DM (111 vs. 102 g/kg $W^{0.75}$/d) than those in 3rd parity. Animals with twin kids (110 g/kg $W^{0.75}$/d) had higher (p<0.001) DM intake than those with single kid (102 g/kg $W^{0.75}$/d). Fat (4%) corrected milk (FCM) yield was not effected by high (1,924 g/d) or low (1,927 g/d) feeding level but increased (p<0.001) with protected (2,166 g/d) compared with unprotected (1,703 g/d) soya-meal. FCM yield for four dietary combinations were 1,806, 2,078, 1,600 and 2,254 g/d for diets IU, IP, IIU and IIP, respectively. For unit increase (g) in estimated MP availability relative to ME (MJ) intake, FCM yield increased ($1,418{\pm}275.6$) g daily ($r^2$=0.58; p<0.001). Milk fat (3.14 vs. 3.54%; p<0.001) and protein (2.94 vs. 3.04% p<0.05) contents were lower at high than the low feeding level. Protected protein increased (p<0.001) the fat, lactose and net energy (NE) content of milk. Milk urea concentration of 175, 183, 192 and 204 mg/l for diets IU, IP, IIU and IIP, respectively indicated lower RDP content of these diets. The RDP contents were 6.97, 6.70, 7.30 and 6.83 g/MJ of ME for diets IU, IP, IIU and IIP, respectively. Live weight change over the experimental period were 41, 6, 17 and 19 g/d. Absence of any positive response of high feeding was probably due to inefficient rumen fermentation resulting from inadequate RDP supply. Protected protein improved production performance apparently by increasing MP:ME ratio in the absorbed nutrient.