• Title/Summary/Keyword: IP Policy

Search Result 205, Processing Time 0.027 seconds

Implementation of IPv6 IKE System on VxWorks (VxWorks 기반의 IPv6 IKE 시스템 구현)

  • Kang, Seong-Min;Lee, Jae-Hwang;Kim, Sun-Woo;Kim, Young-Keun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.126-128
    • /
    • 2004
  • This paper proposes design and implementation for IKE system that is available to IP security communication on IPv6 network. IPsec is a standard for security on network or processing layer of network communication. IPsec consists of step to negotiate security policy and step to negotiate and provide security key material for peer-to-peer security. We use the ISAKMP for negotiating security policy. And we use the IKE for negotiating and providing the key material. The system is based on VxWorks and is tested with Racoon that is a IKE daemon on FreeBSD. In this paper, we propose an implementation method for mobile host providing network communication with IP security.

  • PDF

Legal Systems and Practice of Intellectual Property Protection in Japan and China: A Comparative Analysis

  • Cai, Wanli
    • Asian Journal of Innovation and Policy
    • /
    • v.7 no.1
    • /
    • pp.190-206
    • /
    • 2018
  • This article focuses on the legal systems and practice of intellectual property protection in Japan and China, including the relating civil litigation and administrative litigation procedures. The challenge of balancing the relationship between an invalidation trial and an invalid defense during the process of civil patent infringement litigation is a common issue to be solved in both Japan and China. In addition, it is quite usual that the IP products are being imported and exported across the borders due to the expansion of international trade. Accordingly, one of the most symbolic and difficult issues is how to balance the development of international trade and IP protection in each country. In other words, there is a practical issue regarding whether a parallel import of patented products is acceptable to a country or not. The key to determining this issue depends on the judgment of international exhaustion.

Typology of R&D Service Firms and Customized Policy Suggestions in Korea

  • Choi, Jisun;Min, Jungwon;Jang, Pyoung Yol;Ha, Tae Jeong;Lee, Sang Hyeok;Seo, Jeonghwa
    • STI Policy Review
    • /
    • v.2 no.1
    • /
    • pp.35-53
    • /
    • 2011
  • This paper originates from the questions concerning why Korea has had difficulties in boosting R&D service industries regardless of government efforts over a decade. We first review the intrinsic nature of the R&D services and set up four criteria such as establishment type, diversification of business models, coverage of client firms, and role of R&D service firms as innovation drivers and IP strategies, that will be used in interviewing and analyzing R&D service firms. Second, we carry out in-depth interviews of eighteen R&D service firms to understand business behaviors and relevant characteristics. Finally, we identify five groups of R&D service firms and conclude that differentiated polices have to be implemented according to the groups for promoting the industry effectively.

Analysis of Delay Characteristics in Advanced Intelligent Network-Intelligent Peripheral (AIN IP) (차세대 지능망 지능형 정보제공 시스템의 지연 특성 분석)

  • 이일우;최고봉
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1124-1133
    • /
    • 2000
  • Advanced Intelligent Network Intelligent Peripheral (AIN IP) is one of the AIN elements which consist of Service Control Point (SCP), Service Switching Point (SSP), and IP for AIN services, such as play announcement, digit collect, voice recognition/synthesis, voice prompt and receipt. This paper, featuring ISUP/INAP protocols, describes the procedures for call setup/release bearer channels between SSP/SCP and IP, todeliver specialized resources through the bearer channels, and it describes the structure and procedure for AIN services such as Automatic Collect Call (ACC), Universal Personal Telecommunication (UPT), and teleVOTing(VOT). In this environments, the delay characteristics of If system is investigated as the performance analysis, Policy establishment.

  • PDF

A Case Study of Intellectual Property Rights Using Animation Characters (애니메이션 캐릭터를 활용한 Intellectual Property 사례 연구)

  • JIANG, QIANQIAN;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.361-366
    • /
    • 2022
  • Recently, with the development of convergent media, the digital animation industry has developed a variety of content centered on the role of Intellectal Property. The excellent IP role image has created huge economic benefits in business. This paper selects three representative Intellectual Property animation cases from Japan, the United States and China. Analyzed of the reuse of IP animation character images and combined with the era technology and the style of culture and art, the traditional cultural IP roles are reconstituted into modern character design two aspects. Through the research of this paper, can understand the expansion possibility of IP animation according to the use of character image. It is expected that when making digital animation, can recognize the importance of intellectual property and use it as a reference for role development.

Policy-based End-to-End QoS Provision for 3G Networks Using DiffServ-aware MPLS (3G 네트워크상에서 정책기반 End-to-End QoS 지원을 위한 DiffServ-aware MPLS)

  • Choi Sung-Gu;Jun Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.349-354
    • /
    • 2006
  • In 3G networks interworking with external IP-based networks, provision of end-to-end QoS to packet-based services is a critical issue. In this paper, we propose DiffServ-aware Multiple Protocol Label Switching(MPLS) as a new policy enforcement means. With the adoption of the proposed DiffServ-aware MPLS, it is feasible to provide differentiated QoS provision with the help of DiffServ as well as to improve network utilization by using multiple paths based on MPLS. We verify the effectiveness of our proposed policy enforcement means through a simulation in which realtime traffic and non-realtime traffic are served together.

A Cache Policy Based on Producer Popularity-Distance in CCN (CCN에서 생성자 인기도 및 거리 기반의 캐시정책)

  • Min, Ji-Hwan;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.791-800
    • /
    • 2022
  • CCN, which has emerged to overcome the limitations of existing network structures, enables efficient networking by changing the IP Address-based network method to the Content-based network method. At this time, the contents are stored on each node(router) rather than on the top server, and considering the limitation of storage capacity, it is very important to determine which contents to store and release through the cache policy, and there are several cache policies that have been studied so far. In this paper, two of the existing cache policies, producer popularity-based and distance-based, were mixed. In addition, the mixing ratio was set differently to experiment, and we proved which experiement was the most efficient one.

"Creating a Synergy between Standards and Intellectual Property Drives Innovation and Spurs Market Growth" (표준과 지적재산의 시너지효과 창출: 혁신 장려와 마켓 성장의 원동력)

  • Chuck Adams, W. Charlton
    • Patent21
    • /
    • s.93
    • /
    • pp.30-37
    • /
    • 2011
  • Intellectual property (IF) is essential to standards development although countervailing interests among stakeholders can sometimes undermine trust and inhibit progress. A consequence of slow or non-existent standards development is the loss of potential markets that can emerge only with an internationally recognized standard. Standards developing organizations (SDOs) can enable new markets by ensuring fairness and trust in their venues. The IEEE Standards Association (IEEE-SA) is an SDO that has defined specific steps to facilitate this outcome by means of its internationally recognized patent policy. This paper will describe the underlying principles that guided the creation of IEEE-SA' s policy; highlight five of the major elements of the policy; and suggest a process for integrating IF into standards so that IF stakeholders, in conjunction with standards developers, might agree to meet certain expectations in order for the standards-making process is to be successful and encourage market development.

  • PDF

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

Performance Analysis of Policy-based QoS Algorithm in the IMS (IMS에서 정책기반 QoS 알고리즘의 성능 분석)

  • Han, Seok-Jun;Shon, Hyung-Doh;Kang, Seung-Chan
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.133-141
    • /
    • 2015
  • The IMS is an architectural control framework for delivering IP multimedia services such as voice, video, audio and data, the IMS supports not only the mobile communication system but also the existing wired and wireless network based on IP. The network that is integrated by the IMS needs policy-based network management protocol for managing the limited network resources to provide efficient multimedia service. The IMS use additional device called PDF for efficient resource management, but the PDF only uses diameter which is one of the network management protocol such as SNMP and COPS. Many devices use various protocol to manage the limited network resources. There is an algorithm using a variety of protocols such as Diameter, COPS and SNMP to handle the resources management efficiently. We also analyze the performance using the proposed algorithm in the implemented IMS environment.