• Title/Summary/Keyword: property rights to information

Search Result 187, Processing Time 0.027 seconds

Analysis of Patent Technology Trend of Domestic Brassiere (국내 브래지어 특허기술동향 분석)

  • Jeong, Eunyeong;Kwak, Seongyeong;Park, Soonjee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.44 no.2
    • /
    • pp.321-341
    • /
    • 2020
  • This study analyzed the domestic patent trends of brassiere to provide fundamental data for promising technology. Relevant patents were searched by inputting the key words of "brassiere" and IPC code "A41C" on patent information search service of KIPRIS. A search for bras patents from 1985 to 2019 revealed 533 registered applications out of the total 744 listed. The IPC code with the highest portion (40%) was A41C3/00 (brassiere), followed by A41C3/14 (forming inserts, 21.6%), and A41C3/12 (component parts, 13.3%). To arrange the guidelines of the content of brassiere patents, we carried out a qualitative technology analysis on 744 patents, to extract 850 technology cases applied in patents. From the technological features of each case, main categories were classified into two parts (function and structure) and function was divided into 7 sub-categories that included physiological comfort, physical comfort, utility, healthcare, appearance, and economic value. As for the structure, cup showed the highest portion (37.9%), followed by pad (16.5%), and wings (13.2%). From the aspect of function, appearance showed the highest portion (30.8%), followed by usability (22.2%), physiological comfort (14.6%), physical comfort (14.6%), economic value (10.7%), and health care (7.4%).

Natural Product Extracts for Depression: Analysis of Patent Status in South Korea (우울증에 대한 천연물 추출물 국내 특허 동향 분석)

  • Ga-Young Jung;Celine Jang;Sang-Ho Kim
    • Journal of Oriental Neuropsychiatry
    • /
    • v.34 no.3
    • /
    • pp.247-257
    • /
    • 2023
  • Objectives: To analyze the trend of Korean patents of natural product extracts for depression. This study also aimed to enhance the development and application of natural product extracts for depression in Korean herbal medicine. Methods: We searched the Korea Intellectual Property Rights Information Service and Science ON to collect Korean patent data of natural product extracts for depression. Two authors independently screened and assessed full texts of screened patents for eligibility. Included patents were analyzed both quantitatively and qualitatively. Results: A total of 62 patents from 2002 to December 2021 were included for analysis. The number of patents has constantly increased since 2002. Glycyrrhiza uralensis Fischer, Perilla frutescens Britton var. acuta Kudo, Zizyphus jujuba Miller var. inermis Rehder were frequently used among 62 patents. Alcohol extraction was mostly used, followed by water extraction and ethyl extraction regarding extract methods. Eight patents were herbal medicine used for treating depression in Korean Medicine. Conclusions: Various Korean herbal medicine and minerals were used as natural-products for treating depression. These results provide fundamental data that can be used for inventing new patents using Korean herbal medicine, developing new natural product extracts for depression, and extending the range of application of these products in clinical setting.

A Study on Patent Dispute Countermeasures of Chinese Companies (중국 기업의 특허분쟁 대응 방안에 대한 연구)

  • Park, Eun-Mi;Shim, Yun-Soo;Seo, Joung-Hae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.102-108
    • /
    • 2021
  • In this research, we would like to understand the measures to be taken in the event of a patent dispute by Chinese companies that are growing rapidly and competing with Korean companies in the global market, at a time when the fusion and compounding technology are accelerating. For this reason, the patent dispute countermeasures shown in the previous research were derived through deep interviews with experts, and a questionnaire survey was conducted with patent practitioners of Chinese companies. As a result of the analysis, the importance of cross licensing, patent invalidation proceedings, proceedings through collaboration with other companies, royalty payments, and patent invalidation proceedings in the case of a patent dispute in the Chinese industry is high. Shown. The results of this study provide practical guidelines to help corporate patent practitioners understand the best course of action in the event of a patent dispute, respond in a timely manner, and save time and money. It seems that it can be done.

The Major Technology Distribution Analysis of Domestic Defense Companies in Naval Ships based on Patent Information Data (함정 분야 방산업체 주요 기술 분포 분석)

  • Kim, Jang-Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.625-637
    • /
    • 2020
  • In order to decide the naval ship weapon system acquisition for national policy/market economy activities, the decision makers can determine policy based on current technology level/concentration/utilization. For this, the decision makers apply the major common technology field analysis using patents data. As a method for collecting patent data, we can collect patent data of domestic mobile carriers through the Korea Intellectual Property Rights Information System of Korean Intellectual Property Office. As a result, we collected 14,964 patents/352 International Patent Classification(IPC) types. Based on these data, we performed three analysis processes (SNA, PCA, ARIMA, Text Mining) and got each result from extracting 58 IPC types of SNA and 7 IPC types of PCA. Based on the analysis results, we have confirmed that 7 IPC(B63B, H01M, F03D, B01D, H02K, B23K, H01H) types are the Major Common Technology Distribution of domestic Defense Companies.

An Analysis of the Value and Characteristics of Research Records from an Archives and Records Management Perspective (기록관리 관점에서 본 연구기록물의 가치와 특성 분석)

  • Koo, Chan Mi;Kim, Soon-Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.3
    • /
    • pp.49-70
    • /
    • 2017
  • This study, as the basic research for making research records management policies, aims to define research records and analyze the value and characteristics of research records from an archives and records management perspective. For these purposes, this study defines research records and their types by reviewing related studies. In addition, this study analyzed the following research records values: (1) evidence of research integrity and accountability with regard to research misconduct; (2) information for a succeeding study and an honorable failure; and (3) an asset for intellectual property rights and technology transfer. Finally, this study extracted the following characteristics of the research records: (1) each type of documents, data, and materials; (2) the archival bond between program and records; and (3) the continuity of production and use of the records. The findings from this analysis could be considered in revising related laws and policies.

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

A Comparative Analysis on Parcel Boundaries between the Map and Ground (도상경계와 지상경계에 대한 비교 분석)

  • Jung Young Dong;Choi Han Young;Cho Kyoo Jang
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.3
    • /
    • pp.225-232
    • /
    • 2004
  • The human history has progressed closely related to land. Mankind started land administration as a tool of governance to make land the object of imposing taxation as well as developing the land administration as a concept of securing property rights. People have drawn boundary lines on the ground to form a land parcel according to the usage and/or ownership. Furthermore, the land administration has been developed as a registering system of cadastral records fer the public announcement of fixed boundary instead of changeable ground boundary. Currently the citizens demand the provision of accurate and diverse information on the land which is assessed to has high property value encouraged by the rapid development in the post-industrial society today. However, even though the fact that the Korean cadastral registers produced during the Land Investigation Project are still practically in use causes land-related disputes and promotes public mistrust because of the changed boundaries by parcel mutation, the expansion and contraction of map sheets and the quality deterioration and damage of map paper, but the ultimate resolution is not yet made so far. The distance difference between boundary points are compared and analyzed using TS surveying method in the research as a methodology to resolve the boundary inconsistency, the current problem of cadastral records. Consequently, I'd say that the new surveying method of registering the coordinates of real ground boundary has been regarded as more efficient than considering the matter on the map regardless of urban or rural areas.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

Measuring the Effectiveness of Teaching and Actual Condition of Internet Ethics of the Undergraduate Students (인터넷 윤리의식의 실태 분석 및 교육 효과 측정)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1257-1269
    • /
    • 2010
  • The internet which is fast spread over all areas of our lives provides us with benefits of efficiency, productivity, and amusement; however, its features as an anonymous and non-face-to-face medium have raised a serious social issue of the collapse of internet ethics due to the abuse of it. Thereupon, the importance of internet ethics education has been highlighted to prevent side effects resulted from the internet and cultivate human-centered internet culture. In this paper, we suggests desirable methods for internet ethics education based on the investigation and analysis of the status of university freshmen's internet ethics. This research conducted a survey and analyzed its result after categorizing the status of internet ethics into the invasion of private information, invasion of intellectual property rights, harmful information, internet communication culture, cyber violence, internet addiction, and internet fraud. And based on the result of analyzing their internet ethics, this paper suggests desirable methods for internet ethics education. Next, internet ethics education was conducted by applying the proposed methods for internet ethics education, and its educational effect was evaluated. According to the result of verifying the educational effect measured statistically, it has proved that the suggested internet ethics education is effective to improve undergraduates' internet ethics.

An Empirical Digital Image Watermarking using Frequency Properties of DWT (DWT의 주파수 특성을 이용한 실험적 디지털 영상 워터마킹)

  • Kang, I-Seul;Lee, Yong-Seok;Seob), Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.295-312
    • /
    • 2017
  • Digital video content is the most information-intensive and high-value content. Therefore, it is necessary to protect the intellectual property rights of these contents, and this paper also proposes a watermarking method of digital image for this purpose. The proposed method uses the frequency characteristics of 2-Dimensional Discrete Wavelet Transform (2D-DWT) for digital images and digital watermark on global data without using local or specific data of the image for watermark embedding. The method to insert digital watermark data uses a simple Quantization Index Modulation (QIM) and a multiple watermarking method that inserts the same watermark data in multiple. When extracting a watermark, multiple watermarks are extracted and the final watermark data is determined by a simple statistical method. This method is an empirical method for experimentally determining the parameters in the watermark embedding process. The proposed method performs experiments on various images against various attacks and shows the superiority of the proposed method by comparing the performance with the representative existing methods.