• Title/Summary/Keyword: Proprietary Information

Search Result 122, Processing Time 0.026 seconds

Design of a protocol suite and a session idetifier adaptiation mechanism between GGSN and FA (GGSN과 FA간 프로토콜 구조 및 세션 구별자 적용 기법 설계)

  • Kim, Hyeon-Gon;Kim, Yeong-Jin;Im, Seon-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8S
    • /
    • pp.2774-2782
    • /
    • 2000
  • Release 99 UMTS/GPRS는 Mobile IP 서비스를 제공하기 위한 방안으로서 단계별로 3가지 망 구조를 제안하고 있다. 1단계 망 구조에서 GGSN(Gateway GPRS Support Node)과 FA(Foreign Agent)간 인터페이스는 구현사항으로 기술하고 있으며, GGSN과 FA를 동일 플랫폼에서 구현하는 경우와 별도 플랫폼에서 구현하는 경우를 둘 다 고려하고 있다. 그러나 후자의 경우에 필요한 인터페이스는 표준화 대상에서 제외하고 있다. 따라서 GGSN과 FA를 별도의 플랫폼에서 구현하기 위해서 proprietary한 인터페이스 새로이 정의되어야 한다. 이를 위해 본 논문에서는 GGSN과 FA간 새로운 Gi+ 인터페이스를 정의하고, 이를 실현하기 위해 기본적으로 필요한 데이터 트래픽 프로토콜 구조와 신호 프로토콜 구조를 제안하였다. 그리고 GPRS의 GTP(GPRS Tunneling Protocol)ID를 세션 구별자로 사용하고, Gi+ 세션을 관리하기 위해 GGSN에 단말의 상태 관리 모델을 적용하는 SIAM(Session Identifier Adaptation Mechanism)을 설계 하였다. SIAM의 장점은 GGSN과FA 사이에 Mobile IP 신호 전송은 UDP를, 그리고 데이터 트래픽 전송은 IP-in-IP를 사용할 수 있게 함으로서 Gi+ 인터페이스 구현의 용이성을 제공한다.

  • PDF

Design and Implementation of Distributed Mutual Exclusion Lock Counter Algorithm (분산 상호 배제 카운트 알고리즘을 이용한 클라이언트 사용자 구분 시스템 개발)

  • Jang, Seung-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1227-1235
    • /
    • 2000
  • In this paper, we propose new concepts that the distributed counter value with the distributed EC system identify each user who users the distributed system. The web user should register his/her own user ID in the cyber shopping mall system. Instead of registration, this paper proposes the proprietary mechanism that is distributing counter. The counter assigns the distinguished number to each client. The distributed lock algorithm is used for mutual assignment of the counter to each client. The proposed algorithm is the best solution in the distributed environment system such as cyber shopping mall. If a user should register his/her own ID in every EC system, he/she may not try to use these uncomfortable systems. The mutual counter is used to identify each client. All of these features are designed and implemented on Windows NT web server. Also these features were experiments with 5 clients for 300 times. According to the experiments, clients have their own mutual counter value. The proposed algorithm will be more efficient in internet application environment. Moreover, it will improve the number of internet users.

  • PDF

Comparative Analysis on the Intellectual Property Right Policies of Standardization Organizations

  • Lee, Sang-mu;Park, Ki-shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.7A
    • /
    • pp.1284-1289
    • /
    • 2001
  • The characteristics of the intellectual property right(IPR) conflict with standardization. This is because standardization aims to achieve the common use of technology while IPRs aim to protect the proprietary right on technology. The license to use IPR should be granted so that standards can be used without an infringement. IPR policies have common characteristics in most parts of their contents and also different application methodologies. The ultimate object of IPR policy is to receive license grant. In this paper, significant typical IPR policies of main standardization organizations are comparatively analyzed. The overall objective of the IPR policy is to make strategic environment for license grant. IPR disclosure becomes the best practice to acquire license grant. With this practice, the action to licensing refusal becomes one of the main strategic factors of IPR policies.

  • PDF

Voice-based Device Control Using oneM2M IoT Platforms

  • Jeong, Isu;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.151-157
    • /
    • 2019
  • In this paper, we present a prototype system for controlling IoT home appliances via voice-based commands. A voice command has been widely deployed as one of unobtrusive user interfaces for applications in a variety of IoT domains. However, interoperability between diverse IoT systems is limited by several dominant companies providing voice assistants like Amazon Alexa or Google Now due to their proprietary systems. A global IoT standard, oneM2M has been proposed to mitigate the lack of interoperability between IoT systems. In this paper, we deployed oneM2M-based platforms for a voice record device like a wrist band and LED control device like a home appliance. We developed all the components for recording voices and controlling IoT devices, and demonstrate the feasibility of our proposed method based on oneM2M platforms and Google STT (Speech-to-Text) API for controlling home appliances by showing a user scenario for turning the LED device on and off via voice commands.

Virtualization based high efficiency naval combat management system design and performance analysis

  • Kwon, Sang-Min;Jung, Seung-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.9-15
    • /
    • 2018
  • The Ministry of National Defense announced 'Defense Reform 2.0' that aims to strengthen the country's security for decrease of regional uncertainties, growing requirements for advanced technologies, and a need for more efficiency in the Republic of Korea(RoK) Armed Forces this year. It said RoK Armed Forces have to change efficiently in preparation for rapid decline in military service resources as demographic cliff turning into reality, and the rapid evolution of the "battlefield environment" caused by developments in military science and technologies. RoK Navy combat Management System(CMS) made by domestic proprietary technology since 2000s and development centered on Agency for Defense Development require design changes for added requirements. So in this paper, I propose method of design a low cost and high efficiency navy CMS architecture based on high performance server and virtualization technology. And I create a test environment for analysis performance and compare the performance of proposed navy CMS and existing navy CMS.

Trends in Digital Security Policies and Trade Rules in Major Overseas Countries (디지털 보안에 대한 해외 주요국의 통상 규범 동향)

  • J.E. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.1-11
    • /
    • 2023
  • Trade rules in service and digital sectors mainly focus on reducing regulatory uncertainties by improving transparency and minimizing unnecessary requirements. Recognizing the importance of digital trade rules and trade in information and communication technology (ICT) sectors, governments worldwide have rapidly adopted and expanded rules on free flow of data, personal data protection, electronic authentication, and cybersecurity. On the other hand, advances in technology have led governments to face multiple threats related to cybersecurity, intellectual property (including that related to source code and algorithms), and unauthorized access to proprietary information of their suppliers. This study presents digital trade rules related to digital security emphasizing cybersecurity, source code, and ICT products that use cryptography in different trade agreements. Additionally, it introduces various approaches that major countries are taking to both address digital security issues and seek balance between security enhancement and trade liberalization.

A Study on Methods of Documentary Research on Educational Facilities - Focused on the Utilization of the ERIC - (교육시설(敎育施設)에 관한 문헌연구(文獻硏究) 방법(方法) - 미국 ERIC 자료 활용방법을 중심으로 -)

  • Park, Jae-Youn
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.1 no.1
    • /
    • pp.33-40
    • /
    • 1994
  • This study was taken to increase efficiency in reviewing documents of school facilities from the network of ERIV(Educational Resources and Information Center, USA). Outline of the ERIC network, and the structure, role, function of the ERIC thesaurus are introduced. A thesaurus have developed for information retrieval purpose provides the filing labels which permit information to be stored by one person and retrieved by another. As an information system grows, its thesaurus is systematically built and refined to the point where it represents, in a very special sense, the vocabulary of subject field. The Thesaurus of ERIC Descriptors represents such a vocabulary for the field education. An understanding of its origins, its function and its limitations, is just as important to the teacher, the student of education or the educational researcher as it is for the indexer or custodian of the information pool it represents. If the Thesaurus is understood and used in an appropriate way, it can give all educators not only insight into the ERIC system but also an increased awareness of the language of their field. A great many terms are necessary to describe the many aspects of education, and the task of relating them in even an approximately consistent way is an enormous one. The undertaking should be managed by people who not only know what they are talking about but who also should be able to predict what people in their field are lilely to be talking about in the near future. It should also enlist people who are willing to pay term to another within the system. To engage a large number of these two kinds of people over a long period of time is very likely to cost a great deal of money. There is very little proprietary value in producing such a list of terms, for it can very easily be copied, adapted, updated, etc. Thus, because of its high cost and low proprietary value, it becomes a task likely to be funded only by a government. A government has many ways of spending its money. However, after the decision has been made to spend money to produce an authority list, one must decide how this authority is to be delegated. The history of the development of the ERIC Thesaurus is the history of how this authority was delegated. Scientific research has thrived on efforts to define terms as precisely as possible. It is difficult to say with certainty, however, that solutions to social problems have thrived on a simple diet of scientific research. Contemporary crises demand new and imaginative ways of conceiving problems and talking about them. If this Thesaurus or any other scheme for normalizing or controlling language inhibits in the slightest measure the creative use of language, it is against it use. Only if the principles and details of the Thesaurus are misunderstood can it be used as a constraint on language in a negative sense. Students of education of every kind should see the The-saurus as an opportunity to become increasingly self-conscious about their language and thus about their assumptions and their approaches to educational problems.

  • PDF

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

Legal Relation of Parties on Transactions in UCITA (UCITA상의 전자정보거래 당사자 간의 법률관계)

  • Oh, Byoung-Cheol
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.29
    • /
    • pp.197-223
    • /
    • 2006
  • Uniform Computer Information Transactions Act (UCITA) is the first legislative attempt in the world that deals with transaction of digital information. This however gave rise to endless controversies and as of February 10, 2003, its life as the uniform law has expired. There are four kinds of relationships that UCITA regulates for the entities involved in information trading namely, 1) Relationship between licenser and licensee 2) The triangle relationship between dealers, end-user and publisher 3) Relationship between information right transferor and transferee 4) Relationship between financier, licenser and licensee. Amongst these, the most significant one is the triangle relationship amongst the publisher, commonly known as the licenser in the mass market, end-user and dealer. At the essence of the relationship is that the dealers is liable to refund the payment for the information regarding the end user if he/she does not agree with the publisher on the license of the common market. Looking at the relationship between license transferor and transferee, the transfer of license may be prohibited but the special contract must be conspicuously carried out. The relationship financier, licenser and licensee is unique to the United States and is rather unfamiliar to us. UCITA has been criticized for preferentially protecting the benefits of licensers especially when it comes to the specific regulations for the relationship. Therefore, it is not advisable to blindly accept UCITA regulations. However, UCITA does have components that we can utilize in formulating our own digital information trade regulations, save its proprietary nature as an American law and its preferential treatment for licensers.

  • PDF

R&D Intensity and Regulation Fair Disclosure

  • Park, Jin-Ha;Shim, Hoshik
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.1
    • /
    • pp.281-288
    • /
    • 2019
  • This study examines the relationship between R&D intensity and disclosure. R&D activities are essential in bringing innovation to companies. However, R&D activities are naturally uncertain and increase information asymmetry. Thus, firms with high R&D activities are more likely to have the incentive to communicate the potential of R&D investment to the market through voluntary disclosure and, concurrently, resolve information asymmetry. Meanwhile, incentives to less voluntary disclosure exist because of the proprietary cost and the risk of competitiveness loss. Furthermore, the uncertainties inherent in R&D activities caused the possible decrease in the information accuracy. For the two opposing views, this study investigates the relationship between R&D intensity and disclosure frequency using the Regulation Fair Disclosure data in Korea. Moreover, the relationship between R&D intensity and usefulness of the information disclosed is also examined. Using firm sample listed in the 2011-2016 Korea Stock Market, results show that firms with high R&D intensity make disclosures more frequent. Subsequently, the analysis using forecast sample shows that management forecast error is higher in firms with high R&D intensity. This research contributes to the existing literature by presenting evidence that R&D intensity is a significant factor affecting manager's disclosure behavior and information usefulness.