• Title/Summary/Keyword: Content provider

Search Result 186, Processing Time 0.026 seconds

Reliable Billing Schemes for Service Types in Mobile Communication Environments (이동통신 환경에서 신뢰할 수 있는 서비스별 과금 방법)

  • 김순석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1714-1725
    • /
    • 2003
  • In this paper we propose reliable billing schemes between users and contents providers where a user is provided value­added service for a paid contents using mobile terminals. Our schemes support various types of services such as short messages, bell sounds, images or music data transmissions, and games in mobile communication environments. Using hash chain method, we also reduced the computational overhead of mobile terminals and the volume of data transmitted between the user and the content provider. Content providers can save memory space because they don't need to store each user's usage evidence but still can charge.

Music License in the Metaverse

  • Kyungsuk Kim
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.44-54
    • /
    • 2023
  • This paper provides a comprehensive analysis of the implications of the metaverse on the music industry, focusing on copyright issues and potential solutions. It delves into the concept and characteristics of metaverse platforms, describing them as environments that immerse users in a variety of virtual experiences. A significant portion of the paper is dedicated to exploring music use and copyright infringement in the metaverse. It examines how users incorporate existing music into their content, often leading to legal challenges due to copyright infringement. The paper discusses the role of online service providers (OSPs) in this context and the legal implications of their actions. The paper also addresses the 'safe harbor' provisions for OSPs and examines the balance between protecting rights holders and limiting OSP liability. It highlights the challenges and limitations of copyright enforcement in the metaverse, especially given the unique nature of content on platforms such as Roblox. Finally, the article proposes solutions to simplify music licensing in the metaverse, suggesting a shift from property rules to liability rules and the establishment of Collective Management Organizations (CMOs) to streamline the licensing process and better protect copyright holders' interests.

Game Theoretic Cache Allocation Scheme in Wireless Networks (게임이론 기반 무선 통신에서의 캐시 할당 기법)

  • Le, Tra Huong Thi;Kim, Do Hyeon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.854-859
    • /
    • 2017
  • Caching popular videos in the storage of base stations is an efficient method to reduce the transmission latency. This paper proposes an incentive proactive cache mechanism in the wireless network to motivate the content providers (CPs) to participate in the caching procedure. The system consists of one/many Infrastructure Provider (InP) and many CPs. The InP aims to define the price it charges the CPs to maximize its revenue while the CPs compete to determine the number of files they cache at the InP's base stations (BSs). We conceive this system within the framework of Stackelberg game where InP is considered as the leader and CPs are the followers. By using backward induction, we show closed form of the amount of cache space that each CP renting on each base station and then solve the optimization problem to calculate the price that InP leases each CP. This is different from the existing works in that we consider the non-uniform pricing scheme. The numerical results show that InP's profit in the proposed scheme is higher than in the uniform pricing.

A Survey of Consumer Importance-Satisfaction on Prepackaged Meals (Dosirak) Sold by Food Service Providers (외식업체 도시락 이용에 대한 중요도-만족도 조사)

  • Cha, Seoung-Yoon;Park, Young Il;Jeong, Hee Sun
    • The Korean Journal of Food And Nutrition
    • /
    • v.27 no.1
    • /
    • pp.136-146
    • /
    • 2014
  • A study was performed on the consumption of prepackaged meals (Dosirak) sold by food service providers through Importance-Satisfaction Analysis (ISA) to determine the factors that consumers seek in quality Dosirak. According to the analysis, food service providers need to concentrate on food freshness and temperature while maintaining food taste. As for food packaging, consumers were found to prefer microwaveable plastic containers the most (29.3%). Nonetheless, they found that packaging needed improvements in securing food content during transportation and in food labeling, especially for expiration dates. The study also investigated which factors, including menu selection and advertising, affected the sales of food service provider Dosirak the most. The most important factor was determined to be price. Regarding menu selection, the quality of food seasoning and ingredients, daily specials and the variety of combination sets were found to be important. Availability of delivery (3.83/5.00), advance ordering (3.82/5.00) and discounts (3.75/5.00) were important factors in advertising. The conclusions of the study point to a consumer base that recognizes the ease and benefits of Dosirak but desires high quality food items at low cost. To expand the consumer base, food service providers must continually develop new menu items that satisfy consumer tastes and trends, maintain sanitary conditions and improve food labelling.

ITU-T International Standard based Trust-enabled Service Provisioning Technology (ITU-T 국제표준 중심의 신뢰 서비스 프로비저닝 기술)

  • Hoan-Suk Choi;Jun-Kyun Choi;Woo-Seop Rhee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.6
    • /
    • pp.420-433
    • /
    • 2023
  • With the development of ICT technologies, various systems and services based on data have been introduced. Also, raising the importance of technologies that provide trust to a data, infrastructure, and services. for ICT services. However, in the existing ICT service environment, there is no way to objectively judge and manage the trust of various components (content, infrastructure, process, service provider, etc) that constitute a specific service, and there is a limitation that we can only rely on the service provider's own quality standards. This paper provides requirements, functional archtecture, and procedures for providing reliable ICT services from the perspective of ITU-T international standards. Trust-enabled service provisioning adds additional functions for providing trust to existing ICT service entities (service resources, stakeholders, and users), collecting, analyzing, and providing trust related information. Therefore, a users can consider the trust of various service components based on analyzed trust information based on their trust requirements.

Study on Librarian Service Providers' Awareness and Perceptions of Library Services for the Disabled

  • Noh, Young-Hee;Ahn, In-Ja;Park, Mi-Young
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.1 no.2
    • /
    • pp.29-42
    • /
    • 2011
  • The purpose of this study is to improve library promotional marketing for the disabled by identifying requirements of public library disability services. This study aimed to investigate librarian service providers' awareness of library programs for the disabled in order to prepare a systematic plan for promoting such library services. Research methods used are a literature analysis and survey. First, the ratio of respondents with experience promoting activities and services for the disabled was less than 50%. Second, regarding methods for promoting library disability services, the respondents used library homepages, press releases, library user guides, library newsletters, and library pamphlets in that order. Third, when asked what kind of PR media the library disability service providers had experience with and how often they use it, library boards and banners were the most common response. Fourth, suggested improvements to the current design and content of PR materials included: clearer word choice (or greater understandability), more detailed descriptions, simpler layouts, and more interesting or eye-catching content in that order. Fifth, the library disability services which are in the most need of public relations were guide information for library disability services, Library and Information Service (DOI services and search services), using alternative materials and the library collection, and aiding the information search. Overall, when evaluating the promotion of disability services in Korea, the library's public relations for disabled services needs to improve because currently neither librarians nor the disabled community they are targeting has frequent or quality experience with it. Thus, the policy department for the library disability services must develop a variety of promotional strategies adjusted for each type of the disability and distribute PR materials to service providers individually, making sure to utilize effective PR methods.

Silent Mobile Content Delivery and Control Scheme using Multimedia Message Service (MMS를 이용한 암묵적 모바일 컨텐츠 전송 및 제어 기법)

  • Kim, Kyu-Won;Kim, Moon-Jeong;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.527-534
    • /
    • 2009
  • Almost every mobile phone supports MMS to send and receive multimedia messages among users. MMS is suitable for different types of mobile phones and effectively operates in wireless environments. So the mobile content delivery method using MMS can be efficient. However, there would be some problems if a mobile service provider tries to deliver mobile content to subscribers by using the existing MMS. In this paper, we propose an improved data transmission and control scheme for MMS. Our scheme assists mobile service providers to deliver mobile contents easily by modifying the MMS system software. By using our scheme, mobile service providers are able to manage mobile contents stored in mobile devices. Therefore, they can provide various services such as mobile daily news service, automatic software upgrade service, mobile advertising service, etc. We verify the possibility of the proposed scheme through simulation.

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme (해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.

Web Data Collection and Utilization using Content Syndication (콘텐츠 신디케이션을 이용한 웹 데이터 수집 및 활용)

  • Hwang, Sanghyun;Kim, Heewan
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.83-92
    • /
    • 2015
  • Many data on the web are present, put out by processing in the content in order to provide services by collecting the necessary data is not easy. One of the reasons is because there is no way to provide a standardized data. Therefore, it can be seen as a part or all of the contents of the site, the content distribution to be available for other services is very important. A syndication format that allows you to use a representative of some or all of the site's content for other services such as RSS and there are Atom, OPML-based XML. Throughout the links provided in this syndication format is called feed address. With a feed address to collect data faster than the conventional HTML parsing and data provider is the advantage of being able to easily provide the data to the outside. In this study, we feed the data obtained by collecting by implementing the web address based on the data acquisition system to propose a method for processing and utilizing the data as a background.

Detecting Collaborative Privacy Information Leaks on Android Applications (안드로이드 애플리케이션의 협력적인 개인 정보 유출 탐지)

  • Jeon, Cheol;Cho, Yoo-Kun;Hong, Ji-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.92-94
    • /
    • 2012
  • 안드로이드 운영체제는 애플리케이션들이 서로의 코드와 데이터를 공유할 수 있도록 애플리케이션 컴포넌트간의 통신을 지원한다. 또한 보안을 위해 컴포넌트간의 통신을 엄격하게 제어하기 위한 퍼미션을 제공한다. 하지만 개발자의 보안의식 부재에 따른 퍼미션의 잘못된 사용은 애플리케이션 컴포넌트를 노출시켜 검증되지 않은 애플리케이션이 코드와 데이터에 접근할 수 있게 만드는 문제를 야기할 수 있다. 특히, 노출된 컨텐트 프로바이더(content provider)는 악성 애플리케이션이 기존 탐지 툴을 회피하여 개인정보를 임시로 보관하는 저장소로 악용될 수 있다. 따라서 하나의 애플리케이션만을 분석하는 기존 탐지 툴로는 이와 같이 협력적으로 동작하는 악성 애플리케이션을 탐지 할 수 없다. 본 논문에서는 노출된 컨텐트 프로바이더를 이용한 협력적 개인정보 유출 공격 시나리오를 제시하고 이를 탐지하기 위한 기법을 제안한다. 제안한 기법을 토대로 만든 탐지 툴 사용해 총 189개의 안드로이드 애플리케이션을 분석하였고 그 결과로 컨텐트 프로바이더를 노출시킨 32개의 애플리케이션과 개인정보를 유출할 가능성이 있는 애플리케이션 4개를 탐지하였다.