• Title/Summary/Keyword: property rights to information

Search Result 187, Processing Time 0.032 seconds

Privacy Protection Scheme of Healthcare Patients using Hierarchical Multiple Property (계층적 다중 속성을 이용한 헬스케어 환자의 프라이버시 보호 기법)

  • Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.275-281
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

Private Key Recovery on Bitcoin with Duplicated Signatures

  • Ko, Ju-Seong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1280-1300
    • /
    • 2020
  • In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it provides transparency and prevents the tampering of transaction information. However, new security threats can occur because blockchain technology shares all the transaction information. Furthermore, studies have reported that the private keys of users who use the same signature value two or more times can be recovered. Because private keys of blockchain identify users, private key leaks can result in attackers stealing the ownership rights to users' property. Therefore, as more financial services use blockchain technology, actions to counteract the threat of private key recovery must be continually investigated. Private key recovery studies are presented here. Based on these studies, duplicated signatures generated by blockchain users are defined. Additionally, scenarios that generate and use duplicated signatures are applied in an actual bitcoin environment to demonstrate that actual bitcoin users' private keys can be recovered.

Effects of ICT Device Ownership on Consumers' Digital Piracy Behavior

  • Sim, Hyeonbo;Kim, Minki;Moon, Junghoon
    • The Journal of Information Systems
    • /
    • v.23 no.4
    • /
    • pp.169-196
    • /
    • 2014
  • This study investigates how information and communication technology (ICT) can damage intellectual property rights (IPR) in the movie industry. Utilizing a survey questionnaire to gather information about the extensive use of ICT devices, including tablet PCs and smartphones, we demonstrate how digital piracy behavior is associated with various socio-demographic characteristics. Econometrically, since a large number of people do not engage in piracy activities, we adopt a zero-inflated negative binomial model. We find that people with tablet PCs are more likely to engage in the piracy of movies from peer-to-peer (P2P) sites. In particular, when we categorize ICT devices based on whether they are portable and allow downloads, we find that people with devices equipped with both functions are most likely to engage in movie piracy.

Analysis method of patent document to Forecast Patent Registration (특허 등록 예측을 위한 특허 문서 분석 방법)

  • Koo, Jung-Min;Park, Sang-Sung;Shin, Young-Geun;Jung, Won-Kyo;Jang, Dong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1458-1467
    • /
    • 2010
  • Recently, imitation and infringement rights of an intellectual property are being recognized as impediments to nation's industrial growth. To prevent the huge loss which comes from theses impediments, many researchers are studying protection and efficient management of an intellectual property in various ways. Especially, the prediction of patent registration is very important part to protect and assert intellectual property rights. In this study, we propose the patent document analysis method by using text mining to predict whether the patent is registered or rejected. In the first instance, the proposed method builds the database by using the word frequencies of the rejected patent documents. And comparing the builded database with another patent documents draws the similarity value between each patent document and the database. In this study, we used k-means which is partitioning clustering algorithm to select criteria value of patent rejection. In result, we found conclusion that some patent which similar to rejected patent have strong possibility of rejection. We used U.S.A patent documents about bluetooth technology, solar battery technology and display technology for experiment data.

Analysis of Applications of Industrial Rights in Eyewear Industry (안경산업에 있어서의 산업재산권 출원 현황 분석)

  • Jang, Jun-Young;Kim, Dae-Nyoun;Choi, Byung-Jin
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.13 no.4
    • /
    • pp.19-24
    • /
    • 2008
  • Purpose: The purpose of this research is to induce domestic eyewear industry to invest in research and development of eyewear manufacturing technology and eyewear design. Methods: Analysis of Industrial Rights using data issued by Korea Intellectual Property Office and search results by 'Kipris' (Korea Intellectual Property Rights Information Service). Results: A number of Industrial Rights Application related to eyewear of eyewear industry has rapidly increased since 1980's. The ratio of Patent and Design Right applications related to eyewear by foreigner has continually decreased, 55%, 32.9% in 1980's, 40%, 22% in 1990's and 27%, 13.9% in 2000's. This shows domestic eyewear industry has developed technology and design on eyewear more and more. But numbers of Design Right applications in 1990's were about 60 in a year and those in 2000's were about 70 in a year. This may explain a few eyewear company have applied for Design Right. Conclusions: It is evident that domestic eyewear industry make an more effort and investment to develop eyewear manufacturing technology and design, but not enough. Actually, we don't know exactly how they develop and how much they invest. Now we need to research problems what they have and environments what they face.

  • PDF

A Study on Similar Trademark Search Model Using Convolutional Neural Networks (합성곱 신경망(Convolutional Neural Network)을 활용한 지능형 유사상표 검색 모형 개발)

  • Yoon, Jae-Woong;Lee, Suk-Jun;Song, Chil-Yong;Kim, Yeon-Sik;Jung, Mi-Young;Jeong, Sang-Il
    • Management & Information Systems Review
    • /
    • v.38 no.3
    • /
    • pp.55-80
    • /
    • 2019
  • Recently, many companies improving their management performance by building a powerful brand value which is recognized for trademark rights. However, as growing up the size of online commerce market, the infringement of trademark rights is increasing. According to various studies and reports, cases of foreign and domestic companies infringing on their trademark rights are increased. As the manpower and the cost required for the protection of trademark are enormous, small and medium enterprises(SMEs) could not conduct preliminary investigations to protect their trademark rights. Besides, due to the trademark image search service does not exist, many domestic companies have a problem that investigating huge amounts of trademarks manually when conducting preliminary investigations to protect their rights of trademark. Therefore, we develop an intelligent similar trademark search model to reduce the manpower and cost for preliminary investigation. To measure the performance of the model which is developed in this study, test data selected by intellectual property experts was used, and the performance of ResNet V1 101 was the highest. The significance of this study is as follows. The experimental results empirically demonstrate that the image classification algorithm shows high performance not only object recognition but also image retrieval. Since the model that developed in this study was learned through actual trademark image data, it is expected that it can be applied in the real industrial environment.

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Disputes Patterns and Resolution Approaches in the Global Trading of Digital Goods (디지털상품의 국제거래 유형과 분쟁 해결방안)

  • Shim, Sang-Ryul;Jeong, Yoon-Say
    • Journal of Arbitration Studies
    • /
    • v.17 no.3
    • /
    • pp.145-167
    • /
    • 2007
  • Digital goods are defined as intangible and non-physical goods, composed of a combination of digital signals, electronically represented as 0 and 1. They are also called as digital products, electronic transmissions, information goods, digital contents, computer information, etc. Digital goods are now traded both domestically and internationally as well as on-line and off-line. Korean government revised the Basic Law on Foreign Trade to include digital goods and services as the scope of foreign trade in 2001. Trade volume of digital goods are increasing in Korea. The supply chains of digital goods from producing the components to selling globally to consumers are different from conventional physical goods. Mostly, digital goods are traded on the license basis rather than ownership contract. End User License Agreements(EULAs), such as shrink-wrap, click- wrap, or browser-wrap licenses are very popular in online transactions. Unlike conventional physical goods. the breach of license contract is closely linked with the infringement of intellectual property rights. Digitalized intellectual property is easy to copy and transmit in the cyber space. In cases of legal disputes from the breach of license contract, commercial arbitration or on-line alternative dispute resolutions(ADRs) are regarded as better approach to solve them rather than court sues. For promoting more secure and reliable international trade of digital goods. arbitration clauses should be included in most of license contracts.

  • PDF

Design and Implementation of Tool Server and License Server REL/RDD processing based on MPEG-21 Framework (MPEG-21 프레임워크 기반의 REL/RDD 처리를 위한 라이센스 서버와 툴 서버의 설계 및 구현)

  • Hong, Hyun-Woo;Ryu, Kwang-Hee;Kim, Kwang-Yong;Kim, Jae-Gon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.623-626
    • /
    • 2005
  • The technique of developing Digital Contents have still not be a standard, and it is cause some problems in the Digital Contents's creating, circulation and consumption, So solve the problem, MPEG suggest MPEG-21 framework. In the standard, The IPMP take charge of the Digital Contents's protection and management, and also it is the same as the rights expression language REL and the dictionary defining the word of REL. But. the study of the IPMP is later than the study of REL and RDD, such as the other study of the MPEG-21 standard. So, there is few system based REL and RDD. In this paper, in order to management and protect contents right. So facing the latest standard, we designed and implementation the Tool Server and the License Server based on REL/RDD.

  • PDF

A Study on Legal Protection, Inspection and Delivery of the Copies of Health & Medical Data (보건의료정보의 법적 보호와 열람.교부)

  • Jeong, Yong-Yeub
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.359-395
    • /
    • 2012
  • In a broad term, health and medical data means all patient information that has been generated or circulated in government health and medical policies, such as medical research and public health, and all sorts of health and medical fields as well as patients' personal data, referred as medical data (filled out as medical record forms) by medical institutions. The kinds of health and medical data in medical records are prescribed by Articles on required medical data and the terms of recordkeeping in the Enforcement Decree of the Medical Service Act. As EMR, OCS, LIS, telemedicine and u-health emerges, sharing and protecting digital health and medical data is at issue in these days. At medical institutions, health and medical data, such as medical records, is classified as "sensitive information" and thus is protected strictly. However, due to the circulative property of information, health and medical data can be public as well as being private. The legal grounds of health and medical data as such are based on the right to informational self-determination, which is one of the fundamental rights derived from the Constitution. In there, patients' rights to refuse the collection of information, to control recordkeeping (to demand access, correction or deletion) and to control using and sharing of information are rooted. In any processing of health and medical data, such as generating, recording, storing, using or disposing, privacy can be violated in many ways, including the leakage, forgery, falsification or abuse of information. That is why laws, such as the Medical Service Act and the Personal Data Protection Law, and the Guideline for Protection of Personal Data at Medical Institutions (by the Ministry of Health and Welfare) provide for technical, physical, administrative and legal safeguards on those who handle personal data (health and medical information-processing personnel and medical institutions). The Personal Data Protection Law provides for the collection, use and sharing of personal data, and the regulation thereon, the disposal of information, the means of receiving consent, and the regulation of processing of personal data. On the contrary, health and medical data can be inspected or delivered of the copies, based on the principle of restriction on fundamental rights prescribed by the Constitution. For instance, Article 21(Access to Record) of the Medical Service Act, and the Personal Data Protection Law prescribe self-disclosure, the release of information by family members or by laws, the exchange of medical data due to patient transfer, the secondary use of medical data, such as medical research, and the release of information and the release of information required by the Personal Data Protection Law.

  • PDF