• Title/Summary/Keyword: 소유권증명

Search Result 40, Processing Time 0.024 seconds

Reliability of Distribution System Divided into Community Energy Systems (구역전기사업자로 분리된 배전계통의 신뢰도 평가)

  • Bae, In-Su;Kim, Jin-O
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.1
    • /
    • pp.85-90
    • /
    • 2010
  • This paper presents a technique to evaluate the reliability of customers in Community Energy System(CES). Operators of the CES are responsible for a reliable energy supply to their customers. Due to the strategy of the priority on their customers, the restoration process of DGs should be reordered when system outage happens. The previous study has proposed the technique in the distribution system in which one operator owns all DGs. Case studies in Bus 2 of Roy Billinton Test System(RBTS) verify that the accuracy of the proposed technique is comparable to that of previous technique, and the distribution system divided into several CESs changes the reliability index of customers in the CESs.

Digital License Searching for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스의 검색)

  • Cha, Byung-Rae
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.21-31
    • /
    • 2007
  • The intellectual property system was very important to the past industrial society. It is so important to the 21C information age. It is a leading role to developing these information society. Not only the digital content control but the technology of software source code for the intellectual property is so much mean to international competition. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code. And we make a study of the indexing and searching to search digital license.

Discrimination and Comparison of Digital License for Copyright Management of Software Source Code and CRYPTEX Model (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스의 비교와 분류 그리고 크립텍스 모델)

  • Cha, Byung-Rae;Jung, Young-Kee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.246-258
    • /
    • 2008
  • The software industry is so important to the 21C information society Not only the digital content control but the technology of software source code for the intellectual property is so much mean to international competition. On occurring disputation property of software source code, we have to prove the fact, there is a problem to discriminate the original software source code. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express node pattern and architecture pattern of software source code by tree structure form instead of complex software source code. And we make a simulation of discrimination possibility of digital license and propose CRYPTEX model.

Multiple Digital Watermarking Framework for Joint-Creatorship Verification in VR Environment (VR 환경에서 공동 소유권 증명을 위한 다중 워터마킹 프레임워크)

  • Cho, Mi-Sung;Sohn, Yu-Seung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.2
    • /
    • pp.95-100
    • /
    • 2007
  • Virtual Reality(VR) data in VR environments like Manufacturing industries are often created jointly by many creators. It is then necessary to provide protection of the joint-creatorship and the creatorship of each participating creator. This paper proposes Multiple Digital Watermarking Framework(MDWF) to solve the problem of joint-creatorship. The proposed framework, MDWF, makes use of 3D private watermarking technology and a novel key sharing protocol for joint-creatorship verification. MDWF embeds 3D private multiple watermarks for the creatorship of each participating creators in a non-overlapping manner during the creation process. After key agreement of all private keys, MDWF embeds an additional 3D private watermark for the joint-creatorship. Therefore MDWF successfully handles the creatorship dispute among creators. That is, each participation creator can prove his/her partial creatorship as well as joint-creatorship by MDWF. In addition, MDWF can solve the collusion problems because shared secret key(SSK) can be made by every users.

A Daily Operation Scheduling of Total Cogeneration System Connected with Auxiliary Devices of Different Posession Right (소유권이 서로 다른 각종 보조설비가 연계된 종합 열병합발전 시스템의 일간운전계획 수립)

  • 이종범;류승헌
    • Journal of Energy Engineering
    • /
    • v.7 no.1
    • /
    • pp.81-88
    • /
    • 1998
  • This paper describes the method decide to optimal sizing and operation scheduling of total cogeneration system which is interconnected with cogeneration unit of utility and auxiliary thermal devices of heating company. Optimal sizing and operation scheduling is established in order to minimize the fuel cost under national viewpoint. Simulations are carried out to show the reliability of method suggested by seasons and kinds. The simulated results can be effectively used as the guideline of operation scheduling between the utility and the heating company.

  • PDF

Analysis of the combined technique with proofs of ownership and verification of integrity in cloud (클라우드에서 소유권 증명과 무결성 검증이 결합된 기법에 대한 분석)

  • Kim, Dong-ee;Park, Hyo-min;Shin, Sang Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.226-227
    • /
    • 2016
  • 클라우드 컴퓨팅 환경에서 사용자 관점에서는 아웃소싱한 데이터의 기밀성 및 무결성을, 클라우드 제공자 입장에서는 저장 공간 및 대역폭 효율을 모두 제공하는 것이 필요하다. 본 논문에서는 이를 동시에 만족시키기 위해 아웃소싱된 데이터의 중복 제거 기법과 클라우드 스토리지에 저장된 데이터 파일의 무결성 검증 기법이 결합된 기법에 대해 분석한다.

Block-based Audio Authentication Algorithm using Reversible Watermarking (가역 워터마킹을 이용한 블록 단위 오디오 인증 알고리즘)

  • Yeo, Dong-Gyu;Jo, Hyun-Wu;Lee, Hae-Yeoun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.380-383
    • /
    • 2011
  • 데이터 은닉 기술은 디지털 콘텐츠에 기밀 정보를 비가시적으로 삽입하는 기술로서, 소유권 증명, 저작권 보호, 방송 모니터링, 콘텐츠 인증 등의 다양한 목적으로 활용되고 있다. 본 논문에서는 오디오 콘텐츠의 무결성을 인증하고 위조 영역을 탐지하기 위한 가역 워터마킹 기반의 블록 단위의 오디오 콘텐츠 인증 기법을 제안한다. 제안한 기법은 오디오를 작은 크기의 블록으로 나누고 각 블록 단위로 워터마크를 삽입하여 무결성 인증을 수행한다. 또한 차이값 히스토그램 기반 가역 워터마킹 알고리즘을 적용함으로써 높은 품질을 유지하면서도 완전한 원본으로의 복원을 가능케 하였다.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

Real Estate Transaction System in Private Blockchain Environment (프라이빗 블록체인 환경에서의 부동산 거래 시스템)

  • Kim, Seugh-Ho;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.11-16
    • /
    • 2022
  • Efforts to incorporate blockchain into various fields are continuing as cryptocurrency transactions become more active. Blockchain has the characteristic that once recorded facts cannot be modified or deleted. Due to these characteristics, the use in the field of recording and proving certain facts, such as voting or proof of ownership, is attracting attention. In this paper, users who want to participate in the transaction process using private blockchain, one of the types of blockchain, are divided into real estate brokers, building owners, and purchasers (lessors), and roles are assigned to each user. In addition, we would like to propose a system to increase reliability through the participation of institutions. Through this, we intend to not only present a real estate transaction system that prevents damage from real estate fraud related to false sales and fraudulent contracts, but also enhances reliability and contributes to finding ways to utilize blockchain in the future.

Authenticated Route Optimization (ATRO) Protocol for Network Mobility Support (네트워크 이동성 지원을 위한 인증된 경로 최적화(ATRO) 프로토콜)

  • Koo, Jung-Sook;Kim, Jin-Geun;Bak, Jong-Hyeok;Koo, Jung-Doo;Lee, Gi-Sung
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.05a
    • /
    • pp.203-207
    • /
    • 2007
  • NEMO 기본 지원 (NEMO-BS, NEMO Basic Support) 프로토콜에서 MNN(Mobile Network Node)가 CN(Correspondent Node) 과 통신을 하기 위해서는 항상 MR(Mobile Router)과 HA(Home Agent) 사이의 양방향 터널을 이용해야 한다. 그러나 NEMO-BS 방식은 노드 간 데이터 전송 지연과 부분 구간에 대한 공격 가능성이 존재한다. 따라서 본 논문에서는 NEMO를 위한 인증된 경로 최적화(ATRO) 프로토콜을 제안한다. MR은 홈 링크로부터 멀어졌다고 판단되면 MNN으로부터 위임 권한을 얻기 위해 권한 위임 프로토콜을 수행한다. 그런 후에 MR과 CN은 공개키 암호 방식을 이용하여 자신의 의탁주소(CoA, Care-of Address)를 MNN의 홈 주소(HoA, Home-of Address)와 매핑하기 위한 등록 과정을 수행한다. 이때 각 노드의 주소 소유권 증명을 위해 암호학적으로 생성한 주소(CGA, Cryptographically Generated Address)를 이용한다. 성능분석에서는 구간별 안전성과 종단간 패킷 전송 지연 시간을 통해 프로토콜을 분석한다.

  • PDF