• 제목/요약/키워드: IP Protection

검색결과 139건 처리시간 0.03초

유비쿼터스 패션 비즈니스를 위한 3차원 Avatar의 지적재산권 분석 (Intellectual Property Rights Analysis of 3D Avatars for Ubiquitous Fashion Business)

  • 박하진;장수현;박창규
    • 패션비즈니스
    • /
    • 제13권4호
    • /
    • pp.37-50
    • /
    • 2009
  • Recently, as individual 3D avatars are rapidly generalized in internet sites, its commercial applications for fashion business are being tried in ubiquitous fashion shopping era. In this research, we have investigated and analyzed patent problems of 3D avatar including personal body data to activate the fashion business using 3D avatars. Here, considering the patents for 3D face and body generation methods are already published, this research is focused on whole 3D body avatar obtained from individual body information. Firstly, definition of 3D avatar and its application cases have been investigated and then it has been researched whether or not legal protections by patent law, copyright law, computer program protection law, design protection law and fair competition laws are feasible in view of the subjects to be protected in each law and requirements for such protections. It was revealed that patent law may provide legal protections for 3D avatar and domestic and foreign patents related to 3D avatar have been researched.

A Secure Healthcare System Using Holochain in a Distributed Environment

  • Jong-Sub Lee;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.261-269
    • /
    • 2023
  • We propose to design a Holochain-based security and privacy protection system for resource-constrained IoT healthcare systems. Through analysis and performance evaluation, the proposed system confirmed that these characteristics operate effectively in the IoT healthcare environment. The system proposed in this paper consists of four main layers aimed at secure collection, transmission, storage, and processing of important medical data in IoT healthcare environments. The first PERCEPTION layer consists of various IoT devices, such as wearable devices, sensors, and other medical devices. These devices collect patient health data and pass it on to the network layer. The second network connectivity layer assigns an IP address to the collected data and ensures that the data is transmitted reliably over the network. Transmission takes place via standardized protocols, which ensures data reliability and availability. The third distributed cloud layer is a distributed data storage based on Holochain that stores important medical information collected from resource-limited IoT devices. This layer manages data integrity and access control, and allows users to share data securely. Finally, the fourth application layer provides useful information and services to end users, patients and healthcare professionals. The structuring and presentation of data and interaction between applications are managed at this layer. This structure aims to provide security, privacy, and resource efficiency suitable for IoT healthcare systems, in contrast to traditional centralized or blockchain-based systems. We design and propose a Holochain-based security and privacy protection system through a better IoT healthcare system.

Phoma sp.에 의한 대추나무 점무늬병 방제용 살균제 선발 (Selection of fungicides to control leaf spot of jujube (Zizyphus jujuba) trees caused by Phoma sp.)

  • 이봉훈;임태헌;차병진
    • 농약과학회지
    • /
    • 제4권3호
    • /
    • pp.40-46
    • /
    • 2000
  • Phoma sp.에 의한 대추나무 점무늬병 방제용 살균제를 선발하기 위하여 모두 26종의 살균제를 대상으로 $250{\mu}g\;a.i./m{\ell}$ 의 농도에서 균사생장을 조사한 결과 benomyl 등 8종의 살균제가 균사생장 억제효과를 보였다. 이들 8종의 살균제에 대하여 균사 최소생장억제농도 (MIC)와 포자발아억제력을 조사하였는데, myclobutanil 등 3종은 포자발아억제력은 우수하였으나 포장에서 사용시의 권장농도보다도 높은 MIC 값을 보여 이들을 제외한 5종 (benomyl, iminoctadine-triacetate (IT), iprodione과 propineb 합제 (IP), thiophanate-methyl과 triflumizole 합제 (TT), carbendazim과 kasugamycin 합제 (CK)에 대하여 온실에서 예방효과와 치료효과를 검정하였다. Benomyl, CK, TT 등의 MIC는 $10-50{\mu}g\;a.i./m{\ell}$ 사이에 있음이 확인되었으며, IP와 IT의 MIC는 $50-250{\mu}g\;a.i./m{\ell}$이었다. 또한 포자발아 억제시험 결과 IT는 $0.4{\mu}ga\;.i./m{\ell}$의 농도에서 99%, 그리고 CK와 TT는 $10{\mu}g\;a.i./m{\ell}$에서 90% 이상의 포자발아를 억제하였으나, benomyl과 IP는 $10{\mu}g\;a.i./m{\ell}$에서 각각 22.8%와 9.2%라는 낮은 억제율을 보였다. 예방효과시험에서 CK와 TT는 모두 권장 농도 (1,000 ppm)에서 70% 내외, 배량 농도 (2,000 ppm)에서 90% 내외의 방제 효과를 보였고, benomyl은 2,000 ppm, IP는 4,000 ppm, IT는 8,000 ppm에서 70% 내외의 병 방제 효과를 보였다. 치료효과시험에서는 각 살균제를 1,000 ppm으로 처리하였을 때 benomyl이 90% 이상의 방제가를, 그리고 CK와 TT가 70-80%의 방제가를 보였다. 반면에 IP는 2,000 ppm에서도 방제가가 6.7%로 매우 낮았으며, IT는 전혀 방제효과가 없었다. 더구나 IT 는 예방 효과 시험과 치료 효과 시험 모두에서 약해를 보였다. 따라서 대추나무 점무의병의 방제약제로는 benomyl이 가장 적합한 것으로 밝혀졌으며, 저항성 균의 출현 등을 저지하기 위해서 병이 발생하기 전에는 CK나 TT를 사용하고, 병이 발생한 이후에는 benomyl을 사용하는 것이 바람직할 것으로 생각한다.

  • PDF

콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법 (A Content-Name Encoding Scheme for CCN)

  • 김대엽
    • 한국멀티미디어학회논문지
    • /
    • 제17권6호
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

보안침해사고 대응을 위한 증거수집 시스템 설계 및 구현 (Design and Implementation of Evidence Collection System Responding to a Security Incident)

  • 임의열;김영모;최용락
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.1067-1070
    • /
    • 2005
  • 최근 지식정보 기술의 발달했으나 이의 역기능으로 해킹, 바이러스와 같은 보안침해사고가 증가하게 되었으며, 보안침해사고로부터 자신의 정보 자산과 정보기기를 보호하기 위해 컴퓨터 포렌식스가 등장하게 되었다. 그러나 디지털 증거의 잠재성, 취약성, 디지털성, 방대성 때문에 증거수집에 어려움이 있다. 본 논문에서는 포렌식스 절차별 사용도구를 분석하고, 이의 문제점인 정보, 무결성 부족등을 바탕으로 컴퓨터 포렌식스 증거수집 시스템을 제안 하였다.

  • PDF

Antioxidant Activity of Green Tea Extract in Soybean and Rice Bran Oils

  • Kim, Chang-Soon;Park, Jae-Hee
    • Preventive Nutrition and Food Science
    • /
    • 제7권2호
    • /
    • pp.151-156
    • /
    • 2002
  • Antioxidant activity or green tea extracts (GTE) was evaluated in soybean oil (SBO), rice bran oil (RBO) and winterized rice bran oil (WRBO) stored at 63$^{\circ}C$ for 36 days. Lipid oxidation of the oils was determined using the active oxygen method (AOM), peroxide value (POV), change in unsaturated free fatty acid concentrations and by sensory evaluation. SBO had a higher concentration of the polyunsaturated fatty acids, linoleic and linolenic acid than RBO and WRBO. WRBO and RBO were more stable against lipid oxidation than SBO. Addition of GTE (200 ppm) to the stored oils, increased the induction period (IP) in AOM, reduced the increase in POV, and lessened the change in unsaturated fatty acids. Furthermore, GTE prevented the development of rancid flavors resulting from storage, all of which demonstrate the protective antioxidative activity of GTE. However, oil color became darker in the GTE treated oils. The antioxidant protection of GTE was most effective in RBO.

AES 암호 방식에서의 암호 키 길이 변화에 따른 넌어드레스 장비의 성능 측정 및 비교 (Performance comparison by key length of AES encryption using Non-Addressable Data Protection Devices)

  • 이원준;최훈
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2017년도 추계학술발표대회
    • /
    • pp.182-185
    • /
    • 2017
  • 넌어드레스(Non-Addressable) 장비는 IP 주소를 포함한 기타 어느 계정을 갖지 않는 통신 보안 장비로서, 해킹을 포함한 허가되지 않은 공격들로부터 원천적으로 단말을 보안할 수 있다. 본 논문에서는 넌어드레스 장비에서 AES 방식으로 데이터를 암/복호화 시 성능을 향상시키기 위한 방법을 제시한다. AES-128, 192, 256에서의 암/복호화 시간, CPU 사용량, 메모리 사용량, 실제 데이터의 전송속도를 비교하여 최선의 설정 방법을 도출한다.

Design On Secure Messenger Mechanism Using Elliptic Curve Cryptography and IPSec

  • Choi Gwang-Mi;Park Su-Young;Kim Hyeong-Gyun
    • Journal of information and communication convergence engineering
    • /
    • 제2권3호
    • /
    • pp.182-186
    • /
    • 2004
  • When most of existing instant messengers log on server, they transmit to sever in encoding password to RC5. but RC5 don't be secured because it has been known many of password cracking tools. Also, messengers don't have any protection on the transmitted information with communicating two hosts since loging on, endangering the privacy of the user. As a counter measure, messengers need to provide security service including message encryption. In this paper, we designed a key exchange method of password representing fast, effective and high security degree, using ECC(Elliptic Curve Cryptography) that being known the very stronger than another public key cryptography with same key size. To effectively improve data transmission and its security using IPSec protocol between users, tunnel mode is introduced. Tunnel mode transmits Host-to-Host data through virtual pipelines on the Internet.

비용효과적인 이동성 관리 지원을 위한 새로운 인터네트워킹 아키텍쳐의 성능분석 (Performance Analysis of A Novel Inter-Networking Architecture for Cost-Effective Mobility Management Support)

  • 송명석;정종필
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 춘계학술발표대회
    • /
    • pp.399-402
    • /
    • 2013
  • PMIPv6(Proxy Mobile IPv6)는 네트워크 주도형 IP 기반 이동성 관리 프로토콜로서 액세스 시스템의 종류나 단말의 능력에 의존하지 않고, 단말 이동성 제어가 가능하다. 이러한 PMIPv6에 SIP 이동성을 접목하면 더 효율적인 경로를 사용해 터미널 이동성 및 세션 이동성을 확립할 수 있다. 이러한 이동성 관리를 위해 현재 PMIPv6-SIP에 대한 활발한 연구가 진행되고 있지만, 효과적인 성능평가 및 수학적 모델링이 표준화되지 못하고 있다. 이에 새로운 PMIPv6-SIP 아키텍쳐를 제안하고 핸드오버 시에 발생되는 지연과 패킷손실을 Pure-SIP과 비교하여 수학적인 모델링을 통한 효과적인 성능평가를 제안한다.

Development of an Intellectual Property Core for Floating Point Calculation for Safety Critical MMIS

  • Mwilongo, Nelson Josephat;Jung, Jae Cheon
    • 시스템엔지니어링학술지
    • /
    • 제17권2호
    • /
    • pp.37-48
    • /
    • 2021
  • Improving the plant protection system against unforeseen changes/transients during operation is essential to maintain plant safety. Under this condition, it requires rapid and accurate signal processing. The use of an Intellectual Property (IP) core for floating point calculations for Safety Critical MMIS can make numerical computations easier and more precise, improving system accuracy. It can represent and manipulate rational numbers as well as a much broader range of values with dynamic range in nuclear power plant. Systems engineering approach (SE) is used through the development process, it helps to reduce complexity and avoid omissions and invalid assumptions as delivers a better understanding of the stakeholders needs. For the implementation on the FPGA target board, the 32-bit floating-point arithmetic with IEEE-754 standards has designed using Simulink model in Matlab for all operations of addition, subtraction, multiplication and division and VHDL code generated.