Dissertations / Theses on the topic 'Protection des IP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 44 dissertations / theses for your research on the topic 'Protection des IP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Marolia, Pratik M. "Watermarking FPGA bitstream for IP protection." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.
Full textCommittee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
Lubasi, Mampi Nakutoma. "Real-time bandwidth encapsulation for IP/MPLS Protection Switching." Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.
Full textBoni, Giacomo <1996>. "Legal Regulation and IP Rights Protection of Online games in China." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.
Full textBuffet, Julien. "Techniques de protection contre les erreurs pour le streaming audio sur IP." Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.
Full textHallbäck, Erik. "Digital Rights Management on an IP-based set-top box." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.
Full textDigital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.
This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.
Simpson, Eric. "Runtime Intellectual Property Protection on Programmable Platforms." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.
Full textMaster of Science
Colombier, Brice. "Methods for protecting intellectual property of IP cores designers." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.
Full textDesigning integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
Fan, Dian. "Scalable Video Transport over IP Networks." Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.
Full textMüller, Karen E. "MPLS-based recovery." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.
Full textENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. This thesis presents an overview of various recovery techniques and addresses the problem of how to find an in some sense optimal set of pre-established traffic engineered recovery paths, given a network with link capacities and traffic demands. We present and motivate our choice of a nonlinear objective function and optimization method for finding traffic engineered working and recovery paths. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. We present and evaluate two simple methods for computing a set of pre-established traffic engineered recovery paths by using the flow deviation method.
AFRIKAANSE OPSOMMING: MPLS-gebaseerde herstel is daarop gemik om verkeer wat deur 'n fout in 'n Multiprotokol Etiketwisseling (Multiprotocol Label Switching) (MPLS) netwerk geaffekteer is, vinnig en volledig te herstel. Twee MPLS-gebaseerde herstelmodelle is voorgestel: Internetprotokol-herroetering (lP rerouting) wat herstelpaaie op aanvraag tot stand bring, en beskermingsoorskakeling (protection switching) wat met voorafbeplande herstelpaaie werk. IP-herroetering is robuust en voordelig aangesien geen netwerkbronne vooraf gereserveer word nie, maar dit is inherent stadiger as beskermingsoorskakeling wat veronderstel is om 'n hoë graad van betroubaarheid aan belangrike dienste te bied waar die herstel van foute in die 100 ms tydskaal plaasvind. Hierdie tesis verskaf 'n oorsig oor verskeie hersteltegnieke en ondersoek die probleem hoe om 'n optimale versameling van voorafbeplande herstelpaaie te vind, gegee 'n netwerk met skakelkapasiteite (link capacities) en verwagte netwerkverkeer. Ons stel voor en motiveer ons keuse van 'n nie-lineêre objekfunksie en optimeringsmetode om verkeersontwerpde (traffic engineered) aktiewe en herstelpaaie te vind. 'n Variant van die vloeideviasie (flow deviation)-metode word gebruik om 'n optimale versameling van etiketwisseling (label switched) paaie te vind en om 'n optimale hoeveelheid kapasiteit aan die paaie toe te ken. Ons stel voor en evalueer twee eenvoudige metodes om 'n versameling van optimale voorafbeplande herstelpaaie te bereken deur die vloeideviasie-metode toe te pas.
Ekrt, Ondřej. "Trademark and Design Protection of Applied Art." Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.
Full textKan, Daniel Dao-Jun 1979. "Design of survivable IP-over-WDM networks : providing protection and restoration at the electronic layer." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/87353.
Full textIncludes bibliographical references (leaves 107-109).
by Daniel Dao-Jun Kan.
S.M.
Martirosyan, Nelli. "Protecting IP at the Border : A Study of Customs Enforcement Mechanism for Protection of Intellectual Property Rights in the Eurasian Economic Union." Thesis, Uppsala universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-412925.
Full textJohansson, Elena. "Protection of Intellectual Property in the Russian Federation : Institutions and Organizations." Thesis, Södertörns högskola, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-33803.
Full textSZABAS, CLAUDIO ALEJANDRO. "FOUNTAIN CODES AND OTHER CHANNEL CODING SCHEMES FOR PROTECTION OF TRANSPORT STREAMS OVER IP NETWORKS WITH PACKET ERASURE." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2011. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=17792@1.
Full textCOORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
Há, nos dias atuais, uma crescente demanda pelo transporte de video sobre IP, i.e., para distribuição de conteúdo pela Internet, por serviços de IPTV em definição padrão e em alta definição e, mesmo para uso interno nas redes de emissoras tradicionais de televisão, que transportam contribuições de elevada qualidade para seus programas. Em tais aplicações, o conteúdo dos programas é transportado usando MPEG-2 ou MPEG-4, sob a forma de MPEG-2 Transport Streams, encapsulados com protocolos tais como RTP, UDP e IP. As redes IP, que são modelizadas como Redes com Apagamento de Pacotes (PEC) não foram, no entanto, concebidas para o transporte de mídias em tempo real, esbarra portanto em problemas comuns como perdas de pacotes e jitter, gerando perturbações que se refletem na recepção do conteúdo. Os métodos tradicionais para superar estas dificuldades, como por exemplo, os que se baseiam em retransmissões usando protocolos ARQ (Automatic Repeat on Request), não são uma solução eficiente para proteger a transmissão de multimídia em tempo real. A proteção de multimídia transmitida em tempo real via IP recorre, neste caso, aos códigos para canal. Há códigos para canal recomendados em RFC s e Padrões, usados amplamente pelos fabricantes de equipamento. Os modernos Códigos Fontanais, possuem características atraentes para o transporte de conteúdos multimídia em tempo real. Neste trabalho, simulações são realizadas, onde o conteúdo encapsulado em Transport Stream, é protegido com Códigos Fontanais antes do encapsulamento para o envio através da rede. A título de comparação, o experimento é realizado também usando outros códigos para canal recomendados. Para realizar a comparação são usadas medições padronizadas do Transport Stream, medições objetivas como artefatos de blocagem e finalmente uma análise subjetiva do conteúdo recebido é usada. O trabalho conclui com a proposta de um Codificador de canal adaptável para Transport Stream.
There is a growing demand for the transport of video over IP today, i.e., for content distribution over the Internet, IPTV services in Standard and High Definition, or even inside traditional broadcasters networks, transporting broadcast quality contributions to the main program. In such applications, the source encoded MPEG-2 or -4 content is transported in the form of MPEG-2 Transport Streams, encapsulated over network protocols. However, IP networks, which can be modeled as Packet Erasure Networks (PEC), were not originally designed for the transport of real time media. There are problems, such as packet drops and jitter, which generate severe impairments in the content that is decoded at the reception. Traditional methods for overcoming these problems, as for example retransmissions performed by Automatic Repeat Request (ARQ) protocols, are not suitable for real-time multimedia protection. Channel coding is the solution of choice for protecting real-time multimedia over IP. There are channel coding schemes specified in open recommendations and Standards, widely adopted by equipment vendors today. Fountain Codes present very attractive characteristics for the transport of real-time multimedia. In the present work, simulations with a Fountain code, protecting Transport Stream contents prior to network encapsulation, are presented. The experiment if repeated with other channel coding techniques commonly employed today. In order to analyze the decoded contents and obtain comparative results, standardized Transport Stream measurements, objective Blocking Artifacts measurements and subjective analysis of the decoded samples are employed. This work is concluded with the proposal of a Transport Stream Adaptive channel encoder, that is explained in Appendix-B.
Criqui-Barthalais, Géraldine. "La protection des libertés individuelles sur le réseau internet." Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020076/document.
Full textThis study considers the internet as a new territory where rights guaranteed to each individual in physical space can be promoted; not only free speech and privacy, but also the Habeas Corpus prerogative writ, which protects against unlawful imprisonment, and the right to freedom of movement. Thus, processing by analogy, the dissertation intends to promote two specific digital rights: the freedom to connect to the internet and the freedom to surf on the web. The freedom to connect should be part of a public service which promotes this access through public policies. Moreover, barring someone from using the internet can only be decided by a judge. The freedom to surf should protect the web users against unreasonable restrictions. Thus, measures blocking illegal websites should not come through self-regulation but through a legal framework which defines how administrative authorities are entitled to decide such restrictions. The protection of these two rights entails further obligations. Individuals must access the internet anonymously and they must be aware of how the government monitors their actions on the web. This study tries to outline the content of measures aiming to frame network addressing mechanisms. Identity checks based on the IP address should be subject to a strict legal regime. The study concludes that individuals have to be protected from surveillance when data reveal their choices among websites while they are connected. Internet access providers, but also search engines and browsers, must delete this data. Only special measures taken by a public entity or someone entitled to control the web users may lead to this kind of data retention
LEME, CLAUDIA BARUCKE MARCONDES PAES. "PROTECTION AND RESTORATION, TOGETHER WITH NODE ADDRESSING AND TMN MANAGEMENT FOR IP OVER DWDM OPTICAL NETWORKS BY USING PHYSICAL LAYER." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2000. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7495@1.
Full textEsta dissertação tem como objetivo explorar as possibilidades de introdução de inteligência na camada física de uma Rede Óptica de Telecomunicações, visando a sua aplicação futura. A utilização de subportadoras de RF - introduzidas no domínio óptico através de moduladores Mach-Zehnder -, associada a tecnologias de múltiplo acesso óptico, permite a construção de mecanismos de proteção, restauração, endereçamento, qualidade de serviço e gerenciamento TMN, na camada física. A vantagem da solução proposta reside no aumento de velocidade de operação da rede, bem como na redução do custo e da complexidade de seu gerenciamento, uma vez que nesta configuração os pacotes de informação são abertos somente ao atingirem seu nó destino. Os resultados obtidos sugerem que esta configuração pode ser utilizada para a operação e o gerenciamento de toda uma rede óptica de altíssima velocidade.
The objective of this work is to explore the possibilities of built-in intelligence embedded in the physical layer of an Optical Telecommunications Network, aiming at its future applications. The use of RF subcarriers - introduce above the optical payload through Mach-Zehnder modulators -, associated with multiple acess technologies, allows for protection, restoration, addressing, Quality of Service and TMN management network complexity and cost, while increasing its operational speed, since this approach allows data packages to be opened only when they reach their destination node. The results obtained suggest that this arrangement could be used for networking and management of ultra-high-speed optical systems.
Lücking, Thomas [Verfasser], and Marcus [Gutachter] Wagner. "Acquisition Behavior in High-Technology Industries – The Role of Product Diversification, Technological Change, and IP Protection / Thomas Lücking. Gutachter: Marcus Wagner." Würzburg : Universität Würzburg, 2013. http://d-nb.info/110282254X/34.
Full textKalysch, Anatoli [Verfasser], Felix [Akademischer Betreuer] Freiling, Felix [Gutachter] Freiling, and André Ricardo Abed [Gutachter] Grégio. "Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms / Anatoli Kalysch ; Gutachter: Felix Freiling, André Ricardo Abed Grégio ; Betreuer: Felix Freiling." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2020. http://d-nb.info/1214888453/34.
Full textKarlsson, Hanna. "Trademark Protection for the Chinese Market - A study on Swedish retail companies established in China." Thesis, Umeå universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-171035.
Full textBlaise, Agathe. "Novel anomaly detection and classification algorithms for IP and mobile networks." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS257.
Full textLast years have witnessed an increase in the diversity and frequency of network attacks, that appear more sophisticated than ever and devised to be undetectable. At the same time, customized techniques have been designed to detect them and to take rapid countermeasures. The recent surge in statistical and machine learning techniques largely contributed to provide novel and sophisticated techniques to allow the detection of such attacks. These techniques have multiple applications to enable automation in various fields. Within the networking area, they can serve traffic routing, traffic classification, and network security, to name a few. This thesis presents novel anomaly detection and classification techniques in IP and mobile networks. At IP level, it presents our solution Split-and-Merge which detects botnets slowly spreading on the Internet exploiting emerging vulnerabilities. This technique monitors the long-term evolutions of the usages of application ports. Then, our thesis tackles the detection of botnet’s infected hosts, this time at the host-level, using classification techniques, in our solution BotFP. Finally, it presents our ASTECH (for Anomaly SpatioTEmporal Convex Hull) methodology for group anomaly detection in mobile networks based on mobile app usages
Díaz, Rizo Alán Rodrigo. "Security and Trust for Wireless Integrated Circuits." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS005.
Full textThe origin of the hardware security threats is the massively globalized and outsourcing-based Integrated Circuit (IC) supply chain that we see today. The prohibitively cost of owning a first-rate semiconductor foundry forces IC design houses to go fabless and outsource their IC fabrication, assembly, and testing. Outsourcing these tasks intensifies the risk of IC piracy attacks and Hardware Trojan (HT) insertion, and both threats translate into know-how and financial losses for the IC owner. Moreover, complex Systems-on-Chip (SoCs) are built by integrating third-party Intellectual Property (IP) cores from multiple IP providers. However, SoC integrators and IP providers have an imbalanced trust relationship. While IP providers are vulnerable to IP overuse, IP cloning, and IC overproduction, SoC integrators fear integrating HT-infected IPs into their systems. We propose a locking-based design-for-security methodology. In addition, we develop an RF transceiver-specific locking methodology that consists in two spatially separated mechanisms. inserting a locking mechanism into the circuit that unlocks with a single secret key in the form of a digital word. To assess the security of wireless ICs, we propose an HT attack that leaks sensitive information from the transmitter within a legitimate transmission
Hauser, Christian. "Protecting virtual identities in mobile IP-based communication /." Stuttgart : Inst. für Kommunikationsnetze und Rechnersysteme, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016534457&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textBen, Hadj Mohamed Asma. "Réseau de capteurs sans fil comportementaux pour l'aide au maintien à domicile par la surveillance en habitat intelligent." Thesis, Toulouse 2, 2015. http://www.theses.fr/2015TOU20077/document.
Full textIn recent years, wireless sensor networks have seen their fields of application expand to affect several areas, including monitoring. In parallel, the field medical projects to assist people did not fail to be interested in this emerging technology thanks to the attractions it represents. It is in this context that our thesis is subscribed. We are interested in the use of a non-intrusive video sensors network to monitor elderly people continuously in their natural environment. The objective is the proposal of a video sensor system combining local and intelligent analysis, a wireless communication system for monitoring people in their habitat or specialized environment. We want above all, to be able to identify and detect the monitored person's behavior as well as his actions and his movements to act on his environment via a wireless communication system and home automation. Then we aim to detect a fall and communicate an alert through the network. This proposal represents an advantageous solution for several reasons. Economically, monitor an elderly person while keeping it in his normal environment would reduce the charges of assistance to people by treating them with specialized staff at the hospital or a nursing home. A significant contribution is the one related to the psychological and social aspects of the elderly, to whom this discreet and invisible monitoring ensures both the feeling of security, respect for privacy and autonomy
Benešová, Jana. "Systém ochrany práv duševního vlastnictví v Číně: problémy a ekonomické dopady." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-193619.
Full textPolido, Fabrício Bertini Pasquot. "Contribuições ao estudo do direito internacional da propriedade intelectual na era Pós-Organização Mundial do Comércio: fronteiras da proteção, composição do equilíbrio e expansão do domínio público." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/2/2135/tde-29082011-115009/.
Full textAfter 15 years from its adoption by the Member States of World Trade Organization, the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) still remains as one of the main pillars of the modern institutions of international intellectual property system and deserves a continuous assessment analysis of its overall impacts on developing countries, their innovation systems and developmental concerns. In this sense, expansionist trends and higher levels of protection of intellectual property rights (IPRs) in multilateral, regional and bilateral levels - are nevertheless confronted with the actual needs of developing countries in exploring existing and pending flexibilities within the international intellectual property legal regime. This appears to be true particularly after the post-transitional phase of TRIPS Agreement, where implementation of the multilateral obligations related to substantive protection and enforcement procedures gave rise to considerable contentious issues emerging from demands for access to global public goods, knowledge goods. This Doctoral Thesis offers a contribution to the current debate on International Intellectual Property Law in Post-WTO Era and proposes an analysis and reappraisal of its elements, principles and objectives. The work aims at focusing the imperative task of redefining the intrinsic balance of intellectual property and maintenance and expansion of the public domain as values of an international ordre public. In this context, we analyze the systemic objectives of a prospective international intellectual property regime, which were in part consolidated by the proponents of Doha Declaration on TRIPS and Public Health of 2001 and WIPO Development Agenda. In the first part (Status Quo: Past and Present of Intellectual Property in International Order) we analyze the main development of the current international intellectual property regime, its foundations in Post WTO/TRIPS, and convergent intellectual property related competences in international legal order. The second part (Present revisited towards the future of intellectual property rights) approaches the implications of expansionist trends and strengthening of standards of IP protection. In this case, our work focuses on two particular cases: the substantive harmonization and global protection systems and enforcement of intellectual property rights. The third part (Future of Intellectual Property Rights in International Legal System) further analyses core objectives and principles of International Intellectual Property Law in Post-WTO (balance, transparency, international cooperation and transfer of technology) and proposals for the maintenance and expansion of public domain, flexibilities and options for the access to the knowledge goods.
Kvasnička, Karel. "Mobilní zdroje elektrické energie." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413211.
Full textWei, shongyang, and 魏崇晏. "IP-in-IP tunnelling mechanism for multihop protection in IP network based on shortest path criteria." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/29127908817766282676.
Full text國立中正大學
通訊工程研究所
100
The IP network is the core foundation of the Internet routing protocol for transmission of IP packets will affect the efficiency in the use of the entire network and communications quality. A good IP network will have several characteristics:simplicity, packet-switched, connectionless, memoryless, best-effort. Therefore, Internet protocol has several advantages: flexible, robust, lower cost, provide the advantages of generalized service can be executed on any platform. Solve mechanism in IP network, network equipment damage can be divided into two types: network restoration and network protection. Network restoration is to quickly re-calculate a new path, but to re-calculate the new path will have many problems, one of which is the convergence is too slow. When the failure to the equipment and re-convergence often requires hundreds of milliseconds or even tens of seconds of time, the immediate need to deal with service users is not acceptable. In time to re-calculate a new path, the first packet-oriented prior computed backup path, not only can greatly shortest the inconvenience caused by service interruptions, but also can reduce the packet loss, improve service quality. We proposed IP-in-IP tunnel is to belong to network. When the detection of a node to pass the packet to the next node is failure, whether it is the node adjacent to the link between the failure or the node itself is failure, the first packet is encapsulated and then directed to the intended target node, this node may nearby, there may be very far away. Wait until the destination node receives the packet is encapsulated, and began to decapsulation, according to their own routing information packets will be passed to the destination, complete the entire network protection procedures.
Wu, Chun-Rong, and 吳俊融. "Watermarking HDL Codes for Soft IP Protection." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/32s4zq.
Full text崑山科技大學
電子工程研究所
96
Reuse-based Intellectual property (IP) design is one of the most promising techniques to take the SoC design quickly into market. However, soft IPs has higher protection requirements than hard IPs and most existing IP protection techniques are not applicable to soft IPs. In this paper, we proposed two practical schemes for HDL code protection by hiding author’s signature which is also called as watermark and similar to the idea for hard IP and multimedia data protection. We proposed how to embed watermark into HDL source codes by LUT (ROM) units and distributed SRAM. For combinational logic system, the LUT (ROM) components are very suitable for hiding watermarking. For sequential logic system, we use RAM-based FSM technique to embed the personal watermarking messages. We have modified some opencore design module with our watermarking technique, and have proved that without changing the original algorithm in the reused device and increasing additional HDL modules, the proposed watermarking technique is suitable for HDL-based reused IP.
Chen, Shi-Wei, and 陳仕偉. "An information hiding technique for Soft-IP protection." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/53816265570816373368.
Full text國立交通大學
資訊工程系所
93
As the progress of EDA tools and manufacturing technologies, we get shorter and shorter time-to-market. In order to catch up with the decreasing time-to-market, reuse pre-defined and pre-verified components is inevitable. This creates a new market of selling reusable pre-defined components ( i.e. Intellectual Property ). But the IP must be protected by some techniques from malicious duplication. In this thesis, we propose a new method to protect Soft-IP by hiding information in FSMs. We re-encode the state coding in the way that the difference of two states of selected edge in a specific path is equal to the information we want to hide. Through analysis, we found our method has the property of hard to be observed, hard to be removed, and hard to be faked. Using scan-chain, we can detect whether a specific FSM hides our information or not. We hide eight 8-bit information data in a UART receiver using our method. The result shows that the UART receiver works correctly and we can hide the eight 8-bit information in it without adding new states.
Hu, Hung-ta, and 胡宏達. "The Protection of IP Rights for the Drugs during Registration Process." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/96996452618593371370.
Full text東吳大學
法律學系
97
This essay attempts to discuss the protection of IP rights for the drugs during registration process, and analyze the main issues concerning the objections of "Data Exclusivity", "the copyright of drug product package insert" and "Patent Linkage". Taking references to the comparative study of the related laws of U.S. and TRIPS, the author would conclude the opinions as following statement: 1. The legal property of drug registration data would be belong to “the Information Commissioner” 2. The TRIPs §39.3 use “trade secret” to protect the data submitted to the Government. It's different with the law of US. Taking references to the laws of U.S., the “Data Exclusivity” would be given the right of market exclusivity; the other company has not got a right of reference or usage on these investigations. The government would disclosure information of drug safety and effectiveness to protect the public health. However, Taiwan's "Data Exclusivity" undisclosed information of drug safety and effectiveness. The author advice that drug registration data would be belong to “the Information Commissioner, "Data Exclusivity" should adopt the U.S. model legislation. In addition, the Government would restrict to disclosure the trade secret of drug registration data by “the Freedom of Government Information Law”, and refer to the law of European, American and Japan to disclosure information of drug safety and effectiveness. 3. The author thought that the package insert of original drug is a creativity work in scientific scope, and it would not become “the official document” even after the Government's review and amendment, so the package insert of original drug has the copyright. However, the expression of the generic drug's package insert was limited by legal and fact description, and the package insert of generic drug was requested to the same content as the package insert of the original drug. The generic applicants who based on trusting laws and regulations would have no illegal intentionally. Therefore the package insert of generic drugs do not infringe the package insert copyright of original drug products. The author advice the principle of “ the same as” package insert to be amended into the Pharmaceutical Affairs Act, and allow the generic drugs to put their clinical trial data on the package insert of generic drugs. At the same time, the package insert of generic drug refer or use the content of original drug's package insert, they should label the provenance of original drug's package insert. 4. Whether the “Patent Linkage” would limit the right of the generic drug’s registration because that it violate the private right of original drug, and allow the patent holder to claim its private rights in procedure of Public law. The author thought that the “Patent Linkage” is considered from the equality of the drug registration process, the prevention of unfair competition and humanity; it allows the patent holder to claim its private rights in the registration procedure, and excuse generic applicants from carrying on the clinical trial data. Under preventing the unfair competition in drug market, “Patent Linkage” still has the rationality and the validity.
Sue, Huang-Wen, and 蘇皇文. "A Study of Cross Layers Protection Scheme in IP over WDM Networks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/02124946900787793740.
Full text國立中央大學
通訊工程研究所
93
Abstract Due to the explosive growth of user traffic driven by the Internet technology, network survivability has become one of the important issues of internet.deployment. In this thesis, we investigate various kinds of protection approaches in IP/MPLS-over-WDM networks. In GMPLS (Generalized Multi-Protocol Label Switching), an LSP (Label Switch Path) can be protected at either the sequential-routing approach or the integrated-routing approach. In sequential-routing approach, an LSP (LSR) can be protected at either the IP/MPLS layer protection or the optical layer. In IP/MPLS layer protection, an LSP is protected by providing a link-disjoint backup LSP between its end nodes. In optical layer protection, an LSP is protected by the backup lightpath between its end nodes. In integrated-routing approach, an LSP is protected by presenting a multilayer protection scheme for multiclass traffic in IP/MPLS over WDM networks. In order to optimize the network resources and to reduce the number of optical –electrical –optical (o-e-o) conversions, we present an integrated routing algorithm : hop-based and bandwidth-based routing algorithm (HB-IRA). In addition to considering SRLG (Shared Risk Link Group) concept, we indicate that using the load balance and o-e-o parameter can improve network utilization and decrease path cost.. The connection blocking probability and number optical-electrical-optical conversions are used as performance metrics for simulations. Simulation results show that our approach surpass to that of other lightpath protection schemes. Keyword : WDM, Integrated-routing, SRLG, LSP
Chang, Chi-Chien, and 張綺倩. "Non-Weighted Load Balanced Fast Local Protection Schemes for IP Survivable Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/15489552026876297817.
Full text國立中正大學
通訊工程學系
98
Long packet delay and service interruption are unacceptable for applications with high QoS requirement in IP networks. When a failure occurs, the total recovery time for current link state routing protocols (such as OSPF) may take up to tens of seconds to re-converge. To mitigate the impact of failures, many IP fast local recovery schemes have been proposed. However, some of them did not consider load balancing. Since the rerouted traffic must follow shortest path routing governed by link weight, it would result in congestion or overload on some heavy loaded links. In this thesis, we propose a non-weighted load balanced fast local protection scheme for IP survivable networks. Unlike conventional shortest path based routing, we relax shortest path constraints in computing working and backup routes to achieve load balancing purposes. We formulate this problem as a mixed integer linear programming (MILP) problem to minimize the traffic load on the most congested link. In the constraint set, we guarantee 100% survivability under the considered failure events. It is worth mentioning that the proposed scheme can be used to handle various kinds of scenarios including single link, single node or even shared risk link group (SRLG) failure. Since this problem is not tractable by its NP-hard property, it could not be solved by commercial optimization software directly. We propose three algorithms to decrease numbers of variables and further decompose it into several sub-problems. Each sub-problem is solved optimally and the original problem is approximated by combining the solutions of those sub-problems. We perform experiments on benchmark networks and compare the proposed scheme to well-known schemes on survivability, path lengths and link load distribution for normal and rerouted states. Through numerical results and comparisons, we delineate that the proposed approach achieves a sub-optimal solution, which is profoundly to its high survivability and load balancing at the expense of slightly longer average path hop count.
Huang, Yan-Han, and 黃彥涵. "A SAT-Based FSM Watermarking Scheme for IP Protection of Sequential Circuit Design." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/20728943387835797611.
Full text元智大學
資訊工程學系
104
System on Chip (SoC) is an integrated circuit which integrates computer components or other electronic systems into a single chip for combining multiple functions. With the advance of SoC technology, circuit design becomes more and more complicated, and therefore the use of ready-made Intellectual Property (IP) as the basic circuit units for a whole system design becomes a general development trend. For IP providers, how to protect their IPs from unauthorized use or plagiarized is an important issue. In addition to protecting IPs with laws or copyrights, embedding designers’ information into IPs by adding digital watermarks could be an effective way. Watermarking is a technique which embeds secret information (e.g., strings describing the information of designers) into an IP without changing the functionality. The IP providers then can use the secret information to prove their ownership for achieving IP protection. This work explores the watermarking approach of embedding a string into a sequential circuit by using the unspecified transitions and states. We transform the watermarking problem into Boolean satisfiability (SAT) problems and provide a SAT-based watermarking approach. The proposed approach is composed of two stages. Given a sequential circuit and a watermark (i.e., a string), the first stage finds the minimum number of newly added states needed for embedding the string. The second stage then finds the minimum number of required newly added transitions for embedding the string to decrease the hardware overhead. Experimental results show that, for two sets of watermarks with different features, the proposed complete method can further reduce hardware overhead for embedding the watermarks, compared to the results obtained by using the first stage. For the first set of watermarks, the results show that up to 47% of hardware cost can be reduced and for the second set of watermarks, up to 22% of hardware cost can be reduced.
Yu-Cheng, Fan. "Design and Implementation of Digital Watermarking for SOC IP Identification, Multimedia Protection and Authentication." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200522465300.
Full textFan, Yu-Cheng, and 范育成. "Design and Implementation of Digital Watermarking for SOC IP Identification, Multimedia Protection and Authentication." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/60881005838219294714.
Full text國立臺灣大學
電機工程學研究所
93
In this dissertation, the algorithm and architecture design and implementation of digital watermarking coding system are presented. The research focuses on three watermarking system: SoC IP watermarking for IP identification and digital right management framework, wavelet-based visible watermarking and fragile watermarking. Advances in semiconductor processing technology have led to rapid increases in integrated circuit (IC) design complexity. Intellectual property (IP)-based design methodologies have become a major concern in IC industries. Design reuse leads to the development of intellectual property identification techniques. A novel testing-based watermarking scheme for intellectual property (IP) identification is proposed. The principles are established for development of new watermarking IP identification procedures that depend on current IP-based design flow. Then, the digital right management framework for IP release is developed according IP identification technology. IP vendor or designer can protect and manage IPs adopting this method. The proposed scheme provides IP identification and digital right management complete solution. Visible watermarking schemes are important intellectual property right protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Efficient hardware architecture of wavelet-based adaptive visible watermarking is presented that adopts approximate technique, numerical reduction and resource sharing technique to reduce hardware complexity. Luminance characteristics are calculated to estimating the effect of background luminance. Local spatial characteristics are analyzed to characterize the activity level of pixels. The watermark image is embedding by modifying the coefficients of the host image according to scaling factor. According to experimental results, our method reduces the hardware complexity and holds high image quality. The experimental results have proven the proposed architecture is indeed hardware-effective. A fragile watermark is useful in image authentication applications. A novel wavelet-based fragile watermarking scheme is designed according to the wavelet coefficients of the host image. This fragile watermark records the characteristics of the original image and is extracted without original image. After the fragile watermark is extracted, the approximate host image can be reconstructed. Then a modified image can be detected according to the fragile watermark and the reconstructed image. Afterward, an artificial neural network is used to analyze the tampering of the host image, locate where the tampering has occurred, and identify what kind of alteration has occurred. The fragile watermark provides sufficient authentication evidence. This method is novel and efficient. In this dissertation, a testing-based IP watermarking, wavelet-based visible watermarking and fragile watermarking are designed and implemented. Solving remaining open problems related to digital watermarking and DRM developments are future research direction of the author.
XIAO, BO-XIAN, and 蕭博先. "A Monitoring Cycle-based Fast Link Failure Protection Scheme for Fibbing Controlled IP Networks." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/83fvyc.
Full text國立中正大學
通訊工程研究所
107
Fibbing is a new network technology which enables flexible routing in IP networks. In a Fibbing network, the network controller cleverly broadcasts OSPF Link State Advertisements (LSAs) into the network to generate some fake nodes. Those fake nodes change the topology viewed by the routers so as to steer traffic in the network. As a result, the shortest path routing constraint in IP networks is relaxed. Although Fibbing networks own the capability of flexible routing, how to achieve fast failure recovery is not well addressed. Conventionally an IP network running OSPF takes a long time to converge after a failure occurs. To speed up failover, IETF has proposed Loop-Free Alternative (LFA) IP fast reroute (IPFRR). However, we discover that LFA is not compatible with Fibbing. Directly applying LFA would result in traffic loops in a Fibbing network. In this work, we propose a novel monitoring cycle-based approach for fast failure recovery. By examining the liveness of the monitoring cycles, the system controller can promptly identify the failure link followed by performing traffic reroute. Due to the routing constraint, any monitoring cycle in an IP network has to be a simple cycle. We prove that any Fibbing network with connectivity degree larger than or equal to 2-vertex and 3-edge (2V-3E) connectivity is eligible for deploying monitoring cycles to detect any single link failure. An algorithm for placing those monitoring cycles is proposed in this work. To evaluate the performance of the proposed approach, we have carried out a physical testbed network. The experimental results show that the proposed system can recover from any single link failure within 50 msec. The simulation uses GNS3 to simulate a larger topology to test whether the system can detect the fault link in a larger topology.
Chen, Yueh-Chun, and 陳岳駿. "A Study on IP Protection of Computer Program and Business Method - Focusing on Patent Law." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/14148908603171229753.
Full text國立高雄第一科技大學
科技法律研究所
98
The subject to be explored in this thesis is inspired by the experiences of information technology. This study began by seeking ways to provide truly effective and adequate legal protection for works of computer software developers after going through an exhausting, painstaking process, particularly in modern days when the importance of intellectual property has been widely recognized, and the awareness of legal protection of various intellectual property rights is rising. In regard to computer program and business method inventions, the Copyright Law, Trade Secrets Law, Patent Law and other intellectual property-related laws are the fields that have stimulated most discussions when it comes to intellectual property protection. However, from the angle of software workers, it is natural to pursue the most extensive and effective protection in laws for the results of their efforts. Aiming to determine which legal protection is adequate for such intellectual property, this study first analyzed the provisions of the Copyright Law, Trade Secrets Law and Patent Law, as well as the characteristics of the aforementioned laws when being applied to computer programs and business methods. With a primary focus on the nature of the Patent Law and relevant regulations for an in-depth investigation, this study discussed how to adequately and appropriately provide a certain level of legal protection for inventions related to computer programs and business methods, while maintaining the objective and meaning of the Patent Law and fulfilling the purposes of technological enhancement and industrial advancement without downgrading patent rights into a mere tool for certain opportunists, in order to achieve the optimal balance between legal effects and industrial demand. Using the In re Bilski case, which has drawn most attention among the current patent cases pertaining to computer program and business method inventions, as the major example, this study elaborated on the reasoning behind the conclusion made by the United States Court of Appeals for the Federal Circuit and the final judgment of the Supreme Court of the United States announced recently. This study also combined the opinions of several scholars and experts in an attempt to provide suggestions regarding modification of the protection that Patent Law offer to computer program and business method inventions, and in the hope of establishing an integral system and standard for this subject in the future.
"Defending against low-rate TCP attack: dynamic detection and protection." 2005. http://library.cuhk.edu.hk/record=b5892579.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2005.
Includes bibliographical references (leaves 89-96).
Abstracts in English and Chinese.
Abstract --- p.i
Chinese Abstract --- p.iii
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Background Study and Related Work --- p.5
Chapter 2.1 --- Victim Exhaustion DoS/DDoS Attacks --- p.6
Chapter 2.1.1 --- Direct DoS/DDoS Attacks --- p.7
Chapter 2.1.2 --- Reflector DoS/DDoS Attacks --- p.8
Chapter 2.1.3 --- Spoofed Packet Filtering --- p.9
Chapter 2.1.4 --- IP Traceback --- p.13
Chapter 2.1.5 --- Location Hiding --- p.20
Chapter 2.2 --- QoS Based DoS Attacks --- p.22
Chapter 2.2.1 --- Introduction to the QoS Based DoS Attacks --- p.22
Chapter 2.2.2 --- Countermeasures to the QoS Based DoS Attacks --- p.22
Chapter 2.3 --- Worm based DoS Attacks --- p.24
Chapter 2.3.1 --- Introduction to the Worm based DoS Attacks --- p.24
Chapter 2.3.2 --- Countermeasures to the Worm Based DoS Attacks --- p.24
Chapter 2.4 --- Low-rate TCP Attack and RoQ Attacks --- p.26
Chapter 2.4.1 --- General Introduction of Low-rate Attack --- p.26
Chapter 2.4.2 --- Introduction of RoQ Attack --- p.27
Chapter 3 --- Formal Description of Low-rate TCP Attacks --- p.28
Chapter 3.1 --- Mathematical Model of Low-rate TCP Attacks --- p.28
Chapter 3 2 --- Other forms of Low-rate TCP Attacks --- p.31
Chapter 4 --- Distributed Detection Mechanism --- p.34
Chapter 4.1 --- General Consideration of Distributed Detection . --- p.34
Chapter 4.2 --- Design of Low-rate Attack Detection Algorithm . --- p.36
Chapter 4.3 --- Statistical Sampling of Incoming Traffic --- p.37
Chapter 4.4 --- Noise Filtering --- p.38
Chapter 4.5 --- Feature Extraction --- p.39
Chapter 4.6 --- Pattern Matching via the Dynamic Time Warping (DTW) Method --- p.41
Chapter 4.7 --- Robustness and Accuracy of DTW --- p.45
Chapter 4.7.1 --- DTW values for low-rate attack: --- p.46
Chapter 4.7.2 --- DTW values for legitimate traffic (Gaussian): --- p.47
Chapter 4.7.3 --- DTW values for legitimate traffic (Self-similar): --- p.48
Chapter 5 --- Low-Rate Attack Defense Mechanism --- p.52
Chapter 5.1 --- Design of Defense Mechanism --- p.52
Chapter 5.2 --- Analysis of Deficit Round Robin Algorithm --- p.54
Chapter 6 --- Fluid Model of TCP Flows --- p.56
Chapter 6.1 --- Fluid Math. Model of TCP under DRR --- p.56
Chapter 6.1.1 --- Model of TCP on a Droptail Router --- p.56
Chapter 6.1.2 --- Model of TCP on a DRR Router --- p.60
Chapter 6.2 --- Simulation of TCP Fluid Model --- p.62
Chapter 6.2.1 --- Simulation of Attack with Single TCP Flow --- p.62
Chapter 6.2.2 --- Simulation of Attack with Multiple TCP flows --- p.64
Chapter 7 --- Experiments --- p.69
Chapter 7.1 --- Experiment 1 (Single TCP flow vs. single source attack) --- p.69
Chapter 7.2 --- Experiment 2 (Multiple TCP flows vs. single source attack) --- p.72
Chapter 7.3 --- Experiment 3 (Multiple TCP flows vs. synchro- nized distributed low-rate attack) --- p.74
Chapter 7.4 --- Experiment 4 (Network model of low-rate attack vs. Multiple TCP flows) --- p.77
Chapter 8 --- Conclusion --- p.83
Chapter A --- Lemmas and Theorem Derivation --- p.85
Bibliography --- p.89
Lücking, Thomas. "Acquisition Behavior in High-Technology Industries – The Role of Product Diversification, Technological Change, and IP Protection." Doctoral thesis, 2013. https://nbn-resolving.org/urn:nbn:de:bvb:20-opus-85065.
Full textDie zahlreichen Unternehmensakquisitionen in Hochtechnologiebranchen sind einem intensiven Wettbewerb geschuldet, der durch immer kürzere Produktlebenszyklen, komplexere Produktdesigns und extreme Netzwerkeffekte geprägt ist. Die vorliegende Forschungsarbeit hat zum Ziel, die genauen Umstände, die zu technologiegetriebenen Akquisitionen führen, in Form von relevanten erklärenden Einflussfaktoren theoretisch herzuleiten und empirisch zu untersuchen
Sung, Houng-Shiang, and 宋宏祥. "The Application of IP-Camera on Water Protection Using Gore-Tex Film and The Moisture Coagulation Problem Solution Analysis." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/29730514936603298627.
Full text國立交通大學
工學院精密與自動化工程學程
100
This study describes the future application and development of IP camera and compares IP camera with conventional surveillance camera CCTV to explain characteristic differences between the two. In the study, IP camera was applied for analyzing the foggy phenomenon produced by breathable Gore-Tex film. The goal is to examine the appropriateness of currently available methods for preventing fogginess as well as to offer more effective strategies for resolving this phenomenon. Considering the manufacturing method of Gore-Tex breathable film and characteristics of ePTFE, a main ingredient of Gore-Tex breathable film, the breathable film of model number GAW324 was selected and applied in this study. This type of film is specifically used on microphone’s sound receiving holes to achieve the water resistant requirement. The airflow rate can be as much as 5 , while the water resistant level of the film can be as high as IP67. That is why this type of film is often used on products that need to be not only water resistant but also air permeable. Yet according to the diameter of the microfiber of ePTFE and characteristics of GAW324 film, GAW324’s water vapors permeability can be greater than 100 . In other words, the microfiber diameter of the film is still larger than either gas-phase or vapor-phase water molecules, and thus it cannot block environmental moisture from crossing the film. As a result, this study adopted the strategy of water vapor blocking (Test 1 and Test 2) for verification and explanation. In Test 3 and Test 4, experiments were conducted to collect temperature data at the occurrence of foggy phenomenon on IP camera when the water blocking strategy was not applied. By deriving the ideal gas equations as well as referring to the empirical equation of relative humidity from the hand book of American Society of Heating, Refrigeration, and Air-Conditioning Engineers (ASHRAE), relative humidity of the temperature of each channel point measured in Test 3 and Test 4 was computed. The authors also discussed the relationship between temperature distribution and relative humidity distribution inside the IP camera when fogginess happens. The ultimate objective is to resolve the foggy phenomenon observed on products using breathable film through analyzing the phenomenon and discussing the experimental results.
Hunko, M. A., and V. M. Tkachov. "Development of a module for sorting the ip-addresses of user nodes in cloud firewall protection of web resourсes." Thesis, 2019. http://openarchive.nure.ua/handle/document/13993.
Full textZulhasnine, Mohammad. "Availability-Aware Spare Capacity Allocation with Partially Protected Rings." Thesis, 2008. http://hdl.handle.net/10012/3584.
Full textMalik, Shweta. "Development of a Layout-Level Hardware Obfuscation Tool to Counter Reverse Engineering." 2015. https://scholarworks.umass.edu/masters_theses_2/238.
Full textAjigini, Olusegun Ademolu. "A framework to manage sensitive information during its migration between software platforms." Thesis, 2016. http://hdl.handle.net/10500/21118.
Full textInformation Science
D. Litt. et Phil. (Information Systems)