• Title/Summary/Keyword: Intellectual Property Management Code

Search Result 10, Processing Time 0.022 seconds

Digital License Searching for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스의 검색)

  • Cha, Byung-Rae
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.21-31
    • /
    • 2007
  • The intellectual property system was very important to the past industrial society. It is so important to the 21C information age. It is a leading role to developing these information society. Not only the digital content control but the technology of software source code for the intellectual property is so much mean to international competition. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code. And we make a study of the indexing and searching to search digital license.

Study of the Treatment for Student Co-invention in the Intellectual Property Management Code at Universities (대학의 지식재산권 관리규정 상 학생의 공동발명 처리에 관한 연구)

  • Na, Dong-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6669-6675
    • /
    • 2014
  • An invention produced through research by a professor at a university is an employee invention, and the industrial academy cooperation foundation of the university has the right to obtain a patent. The professor, in return, obtains the right to receive reasonable compensation for that invention. Research was carried out mostly by the cooperation and participation of students rather than the solitary performance of the professor. The contributory portion of the student to an invention can be treated as an employee invention, but occasionally it is considered a free invention. Therefore, the unilateral succession to the right to obtain a patent to the industrial academy cooperation foundation highlights the potential disputes between the university and students in the future. Therefore, in this study, the intellectual properties management codes of 80 universities were reviewed and analyzed for any possible problems and the appropriate directions to the codes' amendments are suggested.

Discrimination and Comparison of Digital License for Copyright Management of Software Source Code and CRYPTEX Model (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스의 비교와 분류 그리고 크립텍스 모델)

  • Cha, Byung-Rae;Jung, Young-Kee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.246-258
    • /
    • 2008
  • The software industry is so important to the 21C information society Not only the digital content control but the technology of software source code for the intellectual property is so much mean to international competition. On occurring disputation property of software source code, we have to prove the fact, there is a problem to discriminate the original software source code. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express node pattern and architecture pattern of software source code by tree structure form instead of complex software source code. And we make a simulation of discrimination possibility of digital license and propose CRYPTEX model.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

The Design of Active Storage Virtualization System for Information Protection (정보보호를 위한 능동적 스토리지 가상화 시스템 설계)

  • Cho, Kyoung-Ok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2040-2048
    • /
    • 2010
  • In contemporary society, though convenience and efficiency of work using information system is growing high, adverse effect problems of malignant code, system hacking, information leak by insiders due to the development of the network are raising their head daily. Because of this, enormous work forces and expenses for the recovery and management of system is needed. The existing system can be divided into two aspects: security solution which surveils and treats virus and malignant codes, and network management solution which observes the system of computer, and practices maintenance and repair such as management, recovery, backup. This treatise applied Active Write Filter mechanism and the technology based on NFS and complemented the maintenance problems of user data of the existing system and designed the system which enables solving problems of intellectual property right such as information protection and illegal work.

A Study on Video Copy Detection Methods Using Representative Color Sequence for Protecting Copyrights (저작권 보호를 위한 대표 색상 시퀀스를 이용한 동영상 복사 검출 방법)

  • Choi, Min-Seok;Choi, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.185-191
    • /
    • 2012
  • This study deals with the technical approach related to the protection of digital video contents copyright, which has currently become a major issue in the digital contents market. With the production and distribution of digital video contents rapidly increasing, various policies and technical approaches are being made in relation to the protection of intellectual property rights. The technical approach from a DRM (Digital Rights Management) perspective was made from various angles, but its limitations have also been exposed in terms of convenience and quality. In this study, rather than the existing encoding certification and watermark technologies, it introduces technical approaches from a content-based copy detection method, while suggesting a copy detection method using the representative color sequence. In particular, this study takes into consideration the distribution environment of the domestic video market and deals with the technical approach in a direction that can control the illegal distribution of high quality videos.

Sustainability Criteria Identified in the Global Sourcing Practices of Global Fashion Retailers (글로벌 패션 기업의 해외 소싱 프로세스에서 나타난 지속 가능성 기준)

  • Lee, Ji Yeon
    • Fashion & Textile Research Journal
    • /
    • v.24 no.2
    • /
    • pp.206-216
    • /
    • 2022
  • This study sought to examine the sustainability criteria found in the global sourcing practices of global fashion retailers. Sustainable supply chain management, with a particular focus on the sustainability criteria of global sourcing, was analyzed. This qualitative study was based on a focus group interview and corporate social responsibility (CSR) annual reports. Eight master categories, 18 middle categories, and 37 bottom categories were extracted. The key categories and their middle categories were as follows: (1) Social compliance (working conditions, employment, safety); (2) Environment concerns (environmental pollution management, eco-friendly production, supply chain environment); (3) Energy efficiency (energy saving program, store environment); (4) Consumer protection (restricted substances management, consumer product safety improvement); (5) Management system (code of conduct, triangle audit system); (6) Community social activities (local community service, voluntary activities, charitable activities); (7) External stakeholder engagement (media & non-governmental organization management, maintenance of relationship with local authority); (8) Brand protection (respect for companies' intellectual property). The findings of this study offer academically significant insights into the sustainability criteria that can be encountered by companies under diverse global sourcing scenarios, revealing that global sourcing by fashion retailers is not merely a means of reducing costs, but a way of generating new jobs and making a social contribution to developing countries. The study's findings also have practical significance, offering guidelines for general CSR activities in the global sourcing process.

A R&D strategies for development using structured association map (구조화된 연관맵을 이용한 연구개발 전략 수립)

  • Song, Wonho;Lee, Junseok;Park, Sangsung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.3
    • /
    • pp.190-195
    • /
    • 2016
  • A technology is continuously developed in a rapidly changing global market. A company requires an appropriate R&D strategy for adapting to this environment. That is, the technologies owned by the company needs to be thoroughly analyzed to improve its competitiveness. Alternatively, technology classification using IPC codes is carried out recently in an objective and quantitative way. International Patent Classification, IPC is an internationally specified classification system, so it is helpful to conduct an objective and quantitative patent analysis of technology. In this study, all of the patents owned by company C are investigated and a matrix representing IPC codes of each patent is created. Then, a structured association map of the patents is made through association rules mining based on Confidence. The association map can be used to inspect the current situation of a company about patents. It also allows highly associated technologies to be clustered. Using the association map, this study analyzes the technologies of company C and how it changes with time. The strategy for future technologies is established based on the result.

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

A Study on Automatic Classification Model of Documents Based on Korean Standard Industrial Classification (한국표준산업분류를 기준으로 한 문서의 자동 분류 모델에 관한 연구)

  • Lee, Jae-Seong;Jun, Seung-Pyo;Yoo, Hyoung Sun
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.221-241
    • /
    • 2018
  • As we enter the knowledge society, the importance of information as a new form of capital is being emphasized. The importance of information classification is also increasing for efficient management of digital information produced exponentially. In this study, we tried to automatically classify and provide tailored information that can help companies decide to make technology commercialization. Therefore, we propose a method to classify information based on Korea Standard Industry Classification (KSIC), which indicates the business characteristics of enterprises. The classification of information or documents has been largely based on machine learning, but there is not enough training data categorized on the basis of KSIC. Therefore, this study applied the method of calculating similarity between documents. Specifically, a method and a model for presenting the most appropriate KSIC code are proposed by collecting explanatory texts of each code of KSIC and calculating the similarity with the classification object document using the vector space model. The IPC data were collected and classified by KSIC. And then verified the methodology by comparing it with the KSIC-IPC concordance table provided by the Korean Intellectual Property Office. As a result of the verification, the highest agreement was obtained when the LT method, which is a kind of TF-IDF calculation formula, was applied. At this time, the degree of match of the first rank matching KSIC was 53% and the cumulative match of the fifth ranking was 76%. Through this, it can be confirmed that KSIC classification of technology, industry, and market information that SMEs need more quantitatively and objectively is possible. In addition, it is considered that the methods and results provided in this study can be used as a basic data to help the qualitative judgment of experts in creating a linkage table between heterogeneous classification systems.