• Title/Summary/Keyword: Agents Security

Search Result 212, Processing Time 0.024 seconds

A Study on the Improvement of Patent Agent's Role in Patent Infringement Litigation (특허침해소송에서 변리사의 역할 개선 방안에 대한 연구)

  • Cho, Myunggeun;Lee, Hwansoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.35-44
    • /
    • 2018
  • Unlike other lawsuits, patent infringement litigation is a very difficult case to grasp without expert knowledge of the patented technology. The Patent Agent Act seems to recognize the legal representation of patent agent in Article 8, but the Constitutional Court and the Court have refused to recognize patent agent's legal representation right in the patent infringement suit. In this regard, constant controversy is taking place among patent agents and lawyers. This study examines the measures to enhance the effectiveness and professionalism of patent litigation in patent infringement litigation. This study analyzes the role of patent attorneys in patent infringement lawsuits in major countries and derive rational alternatives. As a result, it is inappropriate to restrict the attorneys' automatic acquisition of patent attorneys' qualifications or revise the patent attorneys' law in relation to the patent attorney's right of proxy. In the case of litigation parties, it is a desirable alternative to introduce a revised patent attorney system for the fundamental problem solving and to allow the litigants to reasonably choose the litigation agent.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

A Study on Problems with the ROK's Bioterrorism Response System and Ways to Improve it (생물테러 대응체제의 문제점과 개선방안 연구)

  • Jung, Yook-Sang
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.113-144
    • /
    • 2010
  • Bioterrorism is becoming more attractive to terrorist groups owing to the dramatic increase in the utility and lethality of biological weapons in line with today's cutting-edge biological science and technology. The Republic of Korea is facing both internal and external terrorist threats, as well as the possible biological warfare by North Korea. Therefore, it is essential to establish an effective bioterrorism response system in the ROK. In order to come up with the adequate response system for the ROK, an in-depth study has been conducted on the current bioterrorism response system of the U.S. whose preparedness is considered relatively adamant. As a result, the following facts have been found: (1)the legislation with regard to bioterrorism has been established or amended according to the current situation in the U.S., (2)the counter terrorism activities have been integrated with the Department of the Homeland Security as the central agency in order to maximize the national CT capacity, (3)Specific procedures and instructions to cope with bioterrorism have been made into manuals so as to enhance the working-level response capabilities. Next, the analysis on the ROK's bioterrorism response system has been performed in various categories, including the legislation system, task role distribution, cooperative relations, and resource application. It turned out that the ROK's legislation basis is relatively weak and it lacks the apparatus to integrate the bioterrorism response activities on the national level. The shortage of the adequate response facilities and resources, as well as the poor management of manpower have also emerged as problems that hinder the effective CT implementations. Through an analytical and comparative study of the U.S. and the ROK systems, this paper presents several ways to ameliorate improve the current system in the ROK as follows: (1)establish the anti-terrorism law, which would be the basic legal basis for the bioterrorism-related matters; and make revisions to the disaster-related legislation, relevant to bioterrorism response activities, (2)establish an integrated body that has a powerful authority to coordinate the relevant CT agencies; and converge the decentralized functions to maximize the overall response capacity, (3)install the laboratories with a high biosafety level and secure enough of the strategic medical stock-pile, (4)enhance the ability of the inexperienced response personnel by providing with a manual that has detailed instructions.

  • PDF

Entry Types and Locational Determinants of North Korean Workers in Cross-border Regions between North Korea and China (중국 대북 접경지역의 북한 노동력 진입 유형과 요인)

  • Lee, Sung-Cheol;Lee, Yong-Hee;Kim, Boo-Heon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.22 no.4
    • /
    • pp.438-457
    • /
    • 2019
  • The main purpose of this paper is to identify the entry types and locational determinants of North Korean workers in cross-border regions between North Korea and China. More specifically, the paper has attempted to divide the entry type of them in the regions into two; 1) entry via transactions between Chinese traders with North Korea and North Korea trade companies, and 2) entry via transactions between Korean-Chinese middlemen and North Korean trade companies. Also, it has analyzed main factors of their locational determinants in the spatial contexts of the regions. There have been changes in two perspectives in terms of the entry paths and types of them in accordance with the transformation of characteristics of United Nations sanction against North Korea from 'call-upon' to 'decide' after UN Security Council Resolution 2094 in 2013. Firstly, main agents who have dealing with North Korean trade companies which have right to dispatch North Korean workers have been changed from Chinese traders into Korean-Chinese brokers who are specialized in the introduction of North Korean workers with one-stop service from visa administrative to labor managements. Secondly, there has been a transfer of North Korean workers in the regions from formal to informal workers who has been admitted into China with a short stay or a tourist visa, and then remained illegally to be employed in China. Therefore, as demands on service which is able to guarantee the security of North Korean informal workers and their managements have increased, Korean-Chinese brokers have been stimulated in the regions after the operation of real international sanctions against overseas North Korean workers. In addition, the main factors of their locational determinants in cross-border regions between North Korea and China are could be analyzed in three perspectives; 1) an increase in real wages in accordance with the reform of the Chinese social insurance system after 2011, 2) the structural vulnerability of labor markets in the regions, 3) the utilization of stable and manageable workers.

Implementation and Validation of the Web DDoS Shelter System(WDSS) (웹 DDoS 대피소 시스템(WDSS) 구현 및 성능검증)

  • Park, Jae-Hyung;Kim, Kang-Hyoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.135-140
    • /
    • 2015
  • The WDSS improves defensive capacity against web application layer DDoS attack by using web cache server and L7 switch which are added on the DDoS shelter system. When web DDoS attack occurs, security agents divert traffic from backbone network to sub-network of the WDSS and then DDoS protection device and L7 switch block abnormal packets. In the meantime, web cache server responds only to requests of normal clients and maintains stable web service. In this way, the WDSS can counteract the web DDoS attack which generates small traffic and depletes server-client session resource. Furthermore, the WDSS does not require IP tunneling because it is not necessary to retransfer the normal requests to original web server. In this paper, we validate operation of the WDSS and verify defensive capability against web application layer DDoS attacks. In order to do this, we built the WDSS on backbone network of an ISP. And we performed web DDoS tests by using a testing system that consists of zombie PCs. The tests were performed by three types and various amounts of web DDoS attacks. Test results suggest that the WDSS can detect small traffic of the web DDoS attacks which do not have repeat flow whereas the formal DDoS shelter system cannot.

Integration Process of Federation Object Model for Interoperation of Federations (페더레이션 연동을 위한 객체 모델 통합 프로세스)

  • Kwon, Se Jung;Yu, Minwook;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • High Level Architecture(HLA) is a specification for interoperation among heterogeneous simulators which are executed in a distributed environment. HLA originally allows many federates to join in a federation using a single RTI(Run-Time Infrastructure). As the target systems become more complex, the need for the interoperation of federations, performed in a RTI-RTI interoperation environment, has been growing. It can be performed by the confederation interface with the agents, which subrogate the API calls and callbacks of each federation. The existing studies have assumed that the object models of each federation are based on same HLA standard and their object descriptions are equal. Because the existing federations are usually not under this assumption, this paper proposes the integration process of object models for the federation interoperation environment. To integrate the object models for the interoperation of federations, this process resolves the differences of HLA standards, provides conversion process between objects with different descriptions and excludes the security objects. We expect that this process enhances the reusability and effectiveness of interoperation of federations in various domains.

The Role of Cyber in Kim Jong Un's Byungjin Line: North Korea's Political Culture, Hackers, and Maritime Tactics (김정은의 병진노선에서 사이버의 역할: 북한의 정치문화, 해커, 해양전술)

  • Young, Benjamin R.
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.45-72
    • /
    • 2021
  • North Korea's cyber capabilities represent a relatively new threat to global financial institutions and foreign governments, particularly the U.S and South Korean governments. Based primarily on publicly available sources, such as journalistic accounts and scholarly publications, this qualitative paper analyzes the ways in which North Korean leader Kim Jong Un has bolstered his country's asymmetric power and advanced his line of byungjin (dual development in the economy and military). Particularly by merging the cyber and maritime domains, North Korean operatives generate more revenue for the regime and helps keep the heavily sanctioned leadership in power. Despite the increased international attention to North Korean hackers, few analysts have examined the important role of cyber in the DPRK's internal political culture, specifically in advancing Kim Jong Un's byungjin line. Cyber fits into the DPRK's longstanding tradition of irregular warfare and guerilla-based armed struggle. Cyber also further advances Kim's personal reputation in the DPRK as an economic innovator and military strategist. This paper pays particular attention to the role of the DPRK's cyber operations in both ideological and maritime contexts. Recently, North Korean hackers have targeted South Korean shipbuilding industries and developed a blockchain scam, known as Marine Chain. North Korean cyber agents have increasingly paid attention to the nexus of cyber and maritime domains in their activities.

  • PDF

The Ways of Improving Technical Standards to Increase Effectiveness of Wetting Agent (침윤소화약제의 효과성 증대를 위한 기술기준 개선방안)

  • Jang, Kwan Su;Kim, Jung Min;Cho, Young Jae
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.581-588
    • /
    • 2022
  • Purpose: This study is about offering ways of improving existing technical standards in order to propose how to deal with coal deep-seated fire and to increase effectiveness of wetting agent. Method: This study conducts infiltration experiment using eight tons of coal, three types of wetting agents and fire water. And this study analyzes domestic and international technical standards, overseas experimental cases. Result: It is found that two findings are identified; one is fire water cannot infiltrate into the coal due to high level of surface tension, and the other is three types of wetting agent can infiltrate into the coal to the depth of 5~25cm. Also, domestic wetting agent technical standards include measuring surface tension only and testing wood on extinguishing capacity test. On the other hand, this study found that deep-seated fire experiment using cotton, B-class fire test using heptane are used from abroad. Besides it is analyze that capillary rise test, sink test, contact angle measurement are conducted to increase effectiveness of wetting agent at the U.S. Bureau of Mines. Conclusion: Based on standards and cases of U.S. NFPA and Bureau of Mines, this study suggests that domestic technical standards should include adding a new test standard which measures infiltration directly.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Target Word Selection Disambiguation using Untagged Text Data in English-Korean Machine Translation (영한 기계 번역에서 미가공 텍스트 데이터를 이용한 대역어 선택 중의성 해소)

  • Kim Yu-Seop;Chang Jeong-Ho
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.749-758
    • /
    • 2004
  • In this paper, we propose a new method utilizing only raw corpus without additional human effort for disambiguation of target word selection in English-Korean machine translation. We use two data-driven techniques; one is the Latent Semantic Analysis(LSA) and the other the Probabilistic Latent Semantic Analysis(PLSA). These two techniques can represent complex semantic structures in given contexts like text passages. We construct linguistic semantic knowledge by using the two techniques and use the knowledge for target word selection in English-Korean machine translation. For target word selection, we utilize a grammatical relationship stored in a dictionary. We use k- nearest neighbor learning algorithm for the resolution of data sparseness Problem in target word selection and estimate the distance between instances based on these models. In experiments, we use TREC data of AP news for construction of latent semantic space and Wail Street Journal corpus for evaluation of target word selection. Through the Latent Semantic Analysis methods, the accuracy of target word selection has improved over 10% and PLSA has showed better accuracy than LSA method. finally we have showed the relatedness between the accuracy and two important factors ; one is dimensionality of latent space and k value of k-NT learning by using correlation calculation.