• Title/Summary/Keyword: IP금융

Search Result 26, Processing Time 0.026 seconds

A Study on Required Competency for Each Field of Intellectual Property in the 4th Industrial Revolution Era (4차 산업혁명 시대의 지식재산 분야별 필요 역량 분석)

  • Park, Ki-Moon;Lee, Kyu-Nyo;Lee, Byung-Wook
    • 대한공업교육학회지
    • /
    • v.45 no.2
    • /
    • pp.108-130
    • /
    • 2020
  • In order to cope with the rapid changes in science and technology and various societies and complex economies with the advent of the 4th Industrial Revolution, intellectual property education is essential above all. In this study, therefore, intellectual property and the required competences were derived and verified for each field. As for the research method, Delphi technique was used twice for literature review and experts, and the conclusions of the research are as follows. First, the field of intellectual property required in the era of the 4th Industrial Revolution was classified, through literature review and Delphi technique, in eleven sections such as IP-R & D consulting, IP information search analysis, IP entitlement, IP strategic planning, IP transaction, IP finance, IP value evaluation, IP management, global IP management, IP commercialization, and IP disputes, of which validity was verified. Second, It was analyzed that the validity of required competencies derived from each field of intellectual property was reliable. Third, it is generally appropriate to nurture manpower in each field of intellectual property in universities or graduate schools. In addition, it is judged that regular job training of industries such as enterprises and public institutions is necessary regardless of the field.

A Study of N-IDS Detection regarding a DoS Attack and Packet Analysis (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dae-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.175-182
    • /
    • 2008
  • 2008년에 있었던 우리나라 금융기관과 정부기관에 대한 DoS 공격에 대한 연구이다. 실험실 환경에서 실제 DoS 공격 툴을 이용하여 공격을 실시한다. DoS 공격을 탐지하기 위하여 네트워크 상에서 Snort를 이용한 N-IDS를 설치하고, 패킷을 탐지하기 위한 Winpcap과 패킷의 저장 및 분석하기 위한 MySQL, HSC, .NET Framework 등을 설치한다. e-Watch 등의 패킷 분석 도구를 통해 해커의 DoS 공격에 대한 패킷량과 TCP, UDP 등의 정보, Port, MAC과 IP 정보 등을 분석한다. 본 논문 연구를 통하여 유비쿼터스 정보화 사회의 역기능인 사이버 DoS, DDoS 공격에 대한 자료를 분석하여 공격자에 대한 포렌식자료 및 역추적 분석 자료를 생성하여 안전한 인터넷 정보 시스템을 확보하는데 의의가 있다.

  • PDF

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Relative Location based Risk Calculation to Prevent Identity Theft in Electronic Payment Systems (전자지불거래에서 상대위치와 연동한 도용 위험성 산출방법)

  • Suh, Hyo-Joong;Hwang, Hoyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.455-461
    • /
    • 2020
  • Electronic payment system using Internet banking is a very important application for users of e-commerce environment. With rapidly growing use of fintech applications, the risk and damage caused by malicious hacking or identity theft are getting significant. To prevent the damage, fraud detection system (FDS) calculates the risk of the electronic payment transactions using user profiles including types of goods, device status, user location, and so on. In this paper, we propose a new risk calculation method using relative location of users such as SSID of wireless LAN AP and MAC address. Those relative location information are more difficult to imitate or copy compared with conventional physical location information like nation, GPS coordinates, or IP address. The new method using relative location and cumulative user characteristics will enable stronger risk calculation function to FDS and thus give enhanced security to electronic payment systems.

A Study on N-IDS Detection and Packet Analysis regarding a DoS attack (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.217-224
    • /
    • 2008
  • EThis paper is study regarding banking institution and DoS attack regarding government organization which occurred in 2008. We used a tool aggressive actual DoS You install the N-IDS which used Snort in networks in order to detect a DoS attack. Storages of Winpcap and a packet to detect a packet and MySQL, HSC, to analyze. We install NET Framework etc. E-Watch etc. analyzes Packet regarding a DoS attack of a hacker and TCP, UDP etc. information, Port, MAC and IP information etc. through packet analysis tools. There is a meaning you analyze data regarding the cyber DoS, DDoS attack that is dysfunction of Ubiquitous Information Society, and it generates forensics data regarding an invader and back-tracking analysis data, and to ensure safe Internet information system through this paper study.

  • PDF

A Study on the Appropriateness of Intellectual Property Valuation: The Patent Valuation of Korea Technology Finance Corporation (지식재산평가의 적정성에 대한 연구: 기술보증기금의 특허가치평가를 중심으로)

  • Park, Youngsu;Choi, Sungho
    • Knowledge Management Research
    • /
    • v.21 no.4
    • /
    • pp.195-210
    • /
    • 2020
  • Recently, the value of intellectual property rights including patents has been estimated for various purposes. In particular, the evaluation of loans, guarantees and collateral through patent valuation is increasing with the revitalization of technology financing. Although various studies have been conducted on patent valuation, little research has been done on the adequacy of patent valuation. In this study, using the DCF model, which is the most commonly used method of technology valuation, we examine the appropriateness of the patent valuation by comparing and analyzing the estimated value and actual value of the patent. An empirical result shows that the difference between estimated value and the actual value is statistically significant, and there is a significant difference between the estimated value and the actual value depending on the classification of evaluation work. In addition, while there is no difference between professors, patent attorneys, and researchers in the analysis of value differences according to technical evaluators, there is a significant difference between patent attorneys and other evaluators. Finally, we find a significant value difference between estimated value and actual value of technology subject to evaluation by industry.

Converged Virtual Call Center Architecture based on VOIP for efficient call flow (효율적인 Call Flow 를 위한 VOIP 기반 Converged Virtual Call Center Architecture)

  • Kang, Jung-Sik;Baik, Doo-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.1189-1192
    • /
    • 2003
  • 초기 콜 센터는 단순히 고객에게 걸려오는 전화를 응대하는 서비스 수준으로 시작되었지만, 현재는 고객과 마주하는 최 접점으로 서비스 뿐만 아니라 마켓팅, 세일즈를 행하는 기업의 경쟁력을 유지하는데 있어 필수적인 요소로 자리잡아 가고 있다. 특히 개인고객을 많이 접하는 금융기관에서는 콜 센터를 대형화, 지방 분산화 및 백업체제 구축을 위한 Multi 센터를 구축하여 콜만 처리하는 센터로서가 아니라 다양한 채널[전화,email,fax,chating]를 통해 접속되는 고객요구 사항들을 통합된 인프라에서 One Stop 으로 처리하고자 한다. 하지만 회선 교환망을 이용하는 PBX기반 Voice 회선과 IP 환경의 DATA 를 처리하는 이원화된 구조로 Multi 콜 센터를 구축 할 경우, 타 센터의 상담원에게로 콜을 설정시 시간이 많이 소요되어 센터간 Call Load Balancing 및 상담원 Skill Based Routing 을 수행함이 어렵다는 단점이 있다. 본 논문에서는 이러한 단점을 개선할 수 있는 방안으로 Voice 와 Data 를 IP 기반 단일 망으로 구성하고 WAN상에서 음성을 전달할 때 적정한 MOS(Mean opinion score)를 측정 후 객관적으로 필요한 Bandwidth 를 검증하고 Muti 콜 센터에서 효과적인 콜 load Balancing 및 Routing을 할 수 있는 VOIP기반 Convereed Virtual Call Center Architecture 설계 한다.

  • PDF

A Study of Real Time Security Cooperation System Regarding Hacker's Attack (해커의 공격에 대한 실시간 보안공조시스템 연구)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.285-288
    • /
    • 2010
  • Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.

  • PDF

스피어 피싱 대응을 위한 엔드포인트 에이전트 시스템 모델에 관한 연구

  • Kim, Chang-Hong;Kim, Sang-Pil;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.712-714
    • /
    • 2015
  • 기존의 정보보호시스템들은 이미 확보된 시그니처 또는 이전에 분석된 정보를 기반으로 악성코드에 대응하고 있기 때문에, 시그니처가 알려지지 않은 악성코드 또는 변형된 악성코드의 경우, 탐지 및 식별에 한계를 지니고 있다. 본 연구는 이와 같은 문제를 해결하기 위해, 무결성을 검증하는 화이트리스트 기반의 응용프로그램 실행제어, 매체제어, 레지스트리 보호, 중요 파일 변경 방지, 프로세스 접근 역접속 IP/포트 통제 등의 기술을 복합적으로 적용하여, 악성코드의 침입뿐만 아니라 운영체제 및 응용프로그램 취약점을 기반으로 한 익스플로잇 공격으로부터 단말 PC를 더욱 확실하게 보호할 수 있도록 한 엔드포인트 응용프로그램 실행 통제 방안을 제시하였다. 본 연구의 결과는 프로토타입 형태로 개발하여 실 환경에서 통합테스트를 하여 공공기관, 금융기관, 통신사 등 실제 환경에 적합한 기술 및 기능임을 확인하였다. 본 연구를 통해, 실행 전 응용프로그램 무결성 검증과 실행 후 응용프로그램 실행 흐름 통제를 복합적으로 사용하여 알려진 악성코드 시그니처 정보에 의존한 기존 정보 보호 시스템과는 달리 알려지지 않은 악성코드까지 원천적으로 차단할 수 있을 것으로 기대된다.

  • PDF