• Title/Summary/Keyword: 대체불가능한 토큰

Search Result 15, Processing Time 0.018 seconds

A study on decentralization and intellectual property rights(IP) construction strategies in NFT art: Focusing on the Chinese case (NFT 예술의 탈중앙화와 지식재산권 구축 전략에 관한 연구 : 중국 사례를 중심으로 )

  • LIN LI;Rui Zhan
    • Trans-
    • /
    • v.16
    • /
    • pp.33-68
    • /
    • 2024
  • In a rapidly growing digital economic environment, NFT has emerged as a hot topic in the art field. However, in China, NFT art is developing slowly due to constraints related to China's political economy and socio-cultural situation. Due to strict management and control, the circulation of cryptocurrency is limited, and the level of public awareness and acceptance of NFT art and market maturity are still low. Despite these limitations, this paper predicts that Chinese art creators and market participants can build an online personal art IP model that suits the characteristics of the Chinese market and explores the current status and possibilities.

Real Estate Asset NFT Tokenization and FT Asset Portfolio Management (부동산 유동화 NFT와 FT 분할 거래 시스템 설계 및 구현)

  • Young-Gun Kim;Seong-Whan Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.419-430
    • /
    • 2023
  • Currently, NFTs have no dominant application except for the proof of ownership for digital content, and it also have small liquidity problem, which makes their price difficult to predict. Real estate usually has very high barriers to investment due to its high pricing. Real estate can be converted into NFTs and also divided into small value fungible tokens (FTs), and it can increase the the volume of the investor community due to more liquidity and better accessibility. In this document, we implement and design a system that allows ordinary users can invest on high priced real estate utilizing Black Litterman (BL) model-based Portfolio investment interface. To this end, we target a set of real estates pegged as collateral and issue NFT for the collateral using blockchain. We use oracle to get the current real estate information and to monitor varying real estate prices. After tokenizing real estate into NFTs, we divide the NFTs into easily accessible price FTs, thereby, we can lower prices and provide large liquidity with price volatility limited. In addition, we also implemented BL based asset portfolio interface for effective portfolio composition for investing in multiple of real estates with small investments. Using BL model, investors can fix the asset portfolio. We implemented the whole system using Solidity smart contracts on Flask web framework with public data portals as oracle interfaces.

The Future and Prospects of NFT Art : On the basis of Actor-Network Theory (NFT 아트의 미래와 전망 : 행위자네트워크 이론을 중심으로)

  • Cheon, Mi Lim;Kim, Hong Kyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.397-405
    • /
    • 2022
  • NFT art is a new art formed based on NFT technology. This is attracting great attention in the existing art world and art market. Therefore, it is required to analyze whether NFT art can establish itself as a new area of art. Therefore, the formation and development process of NFT art is analyzed from the perspective of Actor-Network Theory of Science and Technology and Studies, and the case of NFT artist 'beeple' is a representative example. It also discusses the artistic value of NFT art and its relationship with traditional art networks based on the aesthetics of science and technology researcher Graham Harman. In particular, it analyzes the future and genre sustainability of NFT art through the case of NFT project "Cryptopunks" and "PUNKISM" advocating a new art genre. By analyzing NFT art with ANT, I would like to raise a technical, aesthetic, and philosophical questions and propose a positive prospect as a new art genre.

Analysis of the Current Status of NFT Art and Methodology on Utilizing Domestic Artworks (NFT예술 현황 분석과 국내 미술작품 활용방안 연구)

  • Lee, Ahn
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.215-222
    • /
    • 2022
  • This study summarizes the basic concepts of NFT art and analyzes trends in the domestic and international NFT market to provide a better understanding of the art form to suggest various ways to utilize the art in near future when social interests in technologies such as metaverse, block chain, and NFTs are continuously increasing. In addition, by examining the rapid development and process of blockchain technology in overseas markets, and confirming cases of information transfer to various metaverses such as cryptocurrency and NFT technology, the aim is to present a foothold for the future direction of national arts in general. To this end, in order to analyze consumers' perceptions and preferences, and to draw conclusions about current NFT arts at home and abroad, a survey was conducted on NFT awareness among participants of an art fair in Gwangjin-gu, Seoul. It is hoped that this study will become a cornerstone of research on NFT works and NFT art industry, which is becoming a global issue.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.