• Title/Summary/Keyword: Software Patent

Search Result 41, Processing Time 0.025 seconds

Security Analysis of Broadcast Encryption System Based on 2-Subset Difference Method (2-SD 방식에 기반한 브로드캐스트 암호시스템의 안전성 분석)

  • Lee, Jae Hwan;Park, Jong Hwan
    • Journal of Broadcast Engineering
    • /
    • v.19 no.4
    • /
    • pp.502-509
    • /
    • 2014
  • Broadcast encryption is a cryptographic primitive that allows a sender to securely transmit a message to a set of receivers. The most influential broadcast encryption system was proposed in 2001 by Naor, Naor, Lotspiech, based on binary trees and the Subset Difference (SD) method. In 2006, Jang, Nyang, and Song suggested a new broadcast encryption system that can reduce transmission rate by 50% compared to the SD method, by introducing the so-called '2-SD' method. Their result was later given the registration of a patent in Korea (registration number: 100879083). Unfortunately, however, this paper shows that Jang et. al.'s broadcast encryption system is not secure against collusion attacks that are considered as being the basic security requirement in designing broadcast encryption.

Design and implementation of an XML Repository System supporting Document Version (버전을 지원하는 XML 저장관리 시스템 설계 및 구현)

  • Son, Chung-Beom;Oh, Kyoung-Keun;Yoo, Jae-Soo
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.13-22
    • /
    • 2003
  • Recently, as the Importance of the management on internet documents has highly increased, the research of an XML repository system has been actively made to store, retrieve and manage large XML documents. The version management for XML documents is required in the XML applications such as patent documents, software design and system manual that the modified documents have to be managed. In this paper, we propose a data model based on a fragmentation model that supports document versioning. We also design and implement an XML repository system supporting document versioning. It is shown through Performance evaluation that our system outperforms the existing repository system.

A Study on the Seller's Liability under Article 42(1) of the CISG (CISG 제42조 (1)항의 매도인의 책임에 관한 소고)

  • Heo, Kwang Uk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.60
    • /
    • pp.47-77
    • /
    • 2013
  • The way for seller to procure the goods for selling is to produce the goods at his own factory and to buy the manufactured goods from the other company. In order to produce the goods for selling the seller have to obtain the resource from the domestic company or overseas. In the middle of producing the goods to sell, seller may breach the right of a third party based on intellectual property rights. That is to say, seller may use the machine that has not itself been patented and use a process which has been patented by a third party. Seller may manufacture the goods which themselves are subject to the third party industrial property rights. Nowadays it is stressed the importance of intellectual property rights such as a patent, brand, and design. These factors consist of the core elements of the competitiveness of the goods. Many embedded software have been used in the various sector. So the disputes regarding to the intellectual property rights is gradually increasing in number. Article 42 of CISG defines the seller's delivery obligations and liabilities in respect to third party intellectual property rights and claims. It contains a special rule for this similar kind of defective in title, which tries to provide an proper solution to the complex problems caused by such rights and claims in international transactions. When seller will apply this clause to the business fields, there are several points to which seller should give attention. First, Intellectual property is general terms in intangible property rights, encompassing both copyright and industrial property. Which matter fall within the scope of intellectual property? The scope of intellectual property can be inferred from the relevant international conventions, which are based on broad international consensus. Second, Article 42 of CISG governs the relationship between the seller and the buyer, that is to say, questions of who has to bear the risk of third party intellectual property rights. The existence of such intellectual property rights, the remedies available and the question of acquiring goods free of an encumbrances in good faith are outside the scope of the CISG. The governing law regarding to the abovementioned matters is needed.

  • PDF

Automatic Construction of Alternative Word Candidates to Improve Patent Information Search Quality (특허 정보 검색 품질 향상을 위한 대체어 후보 자동 생성 방법)

  • Baik, Jong-Bum;Kim, Seong-Min;Lee, Soo-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.10
    • /
    • pp.861-873
    • /
    • 2009
  • There are many reasons that fail to get appropriate information in information retrieval. Allomorph is one of the reasons for search failure due to keyword mismatch. This research proposes a method to construct alternative word candidates automatically in order to minimize search failure due to keyword mismatch. Assuming that two words have similar meaning if they have similar co-occurrence words, the proposed method uses the concept of concentration, association word set, cosine similarity between association word sets and a filtering technique using confidence. Performance of the proposed method is evaluated using a manually extracted alternative list. Evaluation results show that the proposed method outperforms the context window overlapping in precision and recall.

Clustering-based Statistical Machine Translation Using Syntactic Structure and Word Similarity (문장구조 유사도와 단어 유사도를 이용한 클러스터링 기반의 통계기계번역)

  • Kim, Han-Kyong;Na, Hwi-Dong;Li, Jin-Ji;Lee, Jong-Hyeok
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.4
    • /
    • pp.297-304
    • /
    • 2010
  • Clustering method which based on sentence type or document genre is a technique used to improve translation quality of SMT(statistical machine translation) by domain-specific translation. But there is no previous research using sentence type and document genre information simultaneously. In this paper, we suggest an integrated clustering method that classifying sentence type by syntactic structure similarity and document genre by word similarity information. We interpolated domain-specific models from clusters with general models to improve translation quality of SMT system. Kernel function and cosine measures are applied to calculate structural similarity and word similarity. With these similarities, we used machine learning algorithms similar to K-means to clustering. In Japanese-English patent translation corpus, we got 2.5% point relative improvements of translation quality at optimal case.

Creative Resolution for Requirement Conflict Using Conflict Resolution Theory of TRIZ (TRIZ의 모순 해결 이론을 이용한 창의적 요구사항 충돌 해결)

  • Jung, Ji-Young;Kim, Jin-Tae;Park, Soo-Yong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.5
    • /
    • pp.411-415
    • /
    • 2010
  • The Conflicts between requirements may cause a failure of functions or even project. Currently, most of researches have focused on identifying requirements and some researchers have tried to resolve requirements conflicts but it was only based on requirement priority. This paper proposes the Creative Requirements Conflict Resolution (CRRC) to resolve requirement conflicts in a creative way using TRIZ methodology. TRIZ, which means the theory of solving inventor's problems, is made based on the analysis of over 2 million patent cases and helpful for developing a creative solution to resolve conflicts. CRRC classifies requirement conflicts into groups and then apply TRIZ theory related to each group. At the result of control experiment, CRRC provides the various kinds of creative solution for requirement conflicts.

The Academic Information Analysis Service using OntoFrame - Recommendation of Reviewers and Analysis of Researchers' Accomplishments - (OntoFrame 기반 학술정보 분석 서비스 - 심사자 추천과 연구성과 분석 -)

  • Kim, Pyung;Lee, Seung-Woo;Kang, In-Su;Jung, Han-Min;Lee, Jung-Yeoun;Sung, Won-Kyung
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.431-441
    • /
    • 2008
  • The academic information analysis service is including automatic recommendation of reviewers and analysis of researchers' accomplishments. The service of recommendation of reviewers should be processed in a transparent, fair and accountable way. When selecting reviewers, the following information must be considered: subject of project, reviewer's maj or, expertness of reviewer, relationship between applicant and reviewer. The analysis service of researchers' accomplishments is providing statistic information of researcher, institution and location based on accomplishments including book, article, patent, report and work of art. In order to support these services, we designed ontology for academic information, converted legacy data to RDF triples, expanded knowledge appropriate to services using OntoFrame. OntoFrame is service framework which includes ontology, reasoning engine, triple store. In our study, we propose the design methodology of ontology and service system for academic information based on OntoFrame. And then we explain the components of service system, processing steps of automatic recommendation of reviewers and analysis of researchers' accomplishments.

Implementation of the knowledge management system to effectively utilize human and intellectual resources of the universities (대학의 인적.지적 자원의 효과적 활용을 위한 지식 관리 시스템 구현)

  • 최재원;박진규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.473-476
    • /
    • 2002
  • In this paper by realizing the knowledge base on the web, for example, the information of the technology and human resources of the universities, which is the mecca of the knowledge management, technology information in various segment, education information, visible anti invisible knowledge information like technical advice, etc, and scholaristic knowledge like basic science technologies, economic theories which are verified by experts of the field, and pragmatic knowledge like technical patent, software, data base, also, hands on experience and knowledge like field technology, customer service, front line management. All those related information provides easy access to anyone who need of. This system is also designed for the utilization of the study, company activities, and professionals of the basic science technology which enables not only professor to exchange the research results but also, general public, companies, students can effectively share and exchange the information.

  • PDF

A Disk-based Archival Storage System Using the EOS Erasure Coding Implementation for the ALICE Experiment at the CERN LHC

  • Ahn, Sang Un;Betev, Latchezar;Bonfillou, Eric;Han, Heejune;Kim, Jeongheon;Lee, Seung Hee;Panzer-Steindel, Bernd;Peters, Andreas-Joachim;Yoon, Heejun
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.56-65
    • /
    • 2022
  • Korea Institute of Science and Technology Information (KISTI) is a Worldwide LHC Computing Grid (WLCG) Tier-1 center mandated to preserve raw data produced from A Large Ion Collider Experiment (ALICE) experiment using the world's largest particle accelerator, the Large Hadron Collider (LHC) at European Organization for Nuclear Research (CERN). Physical medium used widely for long-term data preservation is tape, thanks to its reliability and least price per capacity compared to other media such as optical disk, hard disk, and solid-state disk. However, decreasing numbers of manufacturers for both tape drives and cartridges, and patent disputes among them escalated risk of market. As alternative to tape-based data preservation strategy, we proposed disk-only erasure-coded archival storage system, Custodial Disk Storage (CDS), powered by Exascale Open Storage (EOS), an open-source storage management software developed by CERN. CDS system consists of 18 high density Just-Bunch-Of-Disks (JBOD) enclosures attached to 9 servers through 12 Gbps Serial Attached SCSI (SAS) Host Bus Adapter (HBA) interfaces via multiple paths for redundancy and multiplexing. For data protection, we introduced Reed-Solomon (RS) (16, 4) Erasure Coding (EC) layout, where the number of data and parity blocks are 12 and 4 respectively, which gives the annual data loss probability equivalent to 5×10-14. In this paper, we discuss CDS system design based on JBOD products, performance limitations, and data protection strategy accommodating EOS EC implementation. We present CDS operations for ALICE experiment and long-term power consumption measurement.

Framework for Technology Valuation of Early Stage Technologies (초기단계 기술의 가치평가 방법론 적용 프레임워크)

  • Park, Hyun-Woo;Lee, Jong-Taik
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.2
    • /
    • pp.242-261
    • /
    • 2012
  • Early stages of technology valuation have been often overlooked or under-represented. The early stage technologies are even riskier due to their inadequacy of commercial development and market applicability. More than 95% of patents fail to earn any revenues so that the majority of patents were valueless. Technology transfers from laboratories at universities and research institutes to industrial firms have increased to acquire value from invented technologies. Technology transfer, a process of transferring discoveries and innovations resulted from research to commercial sectors, typically comprises several steps: disclosing the discoveries and innovations, i.e., intellectual property (IP), evaluating the IP's economic prospects, securing a patent, copyright or trademark for the IP, commercializing the technology through licensing, forming a joint venture, or selling. At each of those stages in the research and development of technology, the value of technology would play a very important role of making decision on the movement toward the next step, however, the financial value of technology is not easy to determine due to a great amount of uncertainty in the course of research and development, and commercialization. This paper refers to technology embodied as devices, equipment, software or processes primarily developed at public research institutions such as universities. Sometimes it is also as the result of externally financed projects contracted with industry. Nearly always technology developed at public research entities results in laboratory prototypes. When it is required to define the technology transfer contract terms for the license of the university patrimonial rights to external funding companies or other interested parties, a question arises: what is the monetary value? In this paper, we present a method for technology valuation based on the identification of specific value points related to its development. The final technology value must be within previously defined value limits. This paper consists of the review of issues related to technology transfer and commercialization, the identification of characteristics of technologies in the early stage of technology development, the formulation of framework of methods to value the early stage technologies, and the conclusion and implication of the previous review.

  • PDF