• Title/Summary/Keyword: 권리제어정보

Search Result 15, Processing Time 0.023 seconds

A Study on the Interoperable Rights Control Information between Heterogeneous Broadcasting DRM Schemes in Digital Home Domain (디지털 홈 환경에서 상이한 방송콘텐츠 보호기술간 권리제어정보의 호환성에 관한 연구)

  • Kang, Ho-Gab;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.81-93
    • /
    • 2008
  • Various types of protection technologies have been developed for protecting copyrights of digital content and such technologies for protecting the digital broadcasting content as CAS, DRM have been introduced to the broadcasting industry. However, current rapid development of digital home network systems lets customers share digital content among home appliances, leading to the increasing needs for achieving interoperability among content protection technologies. This paper investigates previous research on interoperability among heterogeneous rights control informations by using MPEG-21 REL and then introduces a new approach to guarantee interoperability of rights control information.

  • PDF

홈네트워크를 위한 DRM 기술

  • Lee, Sun-Young
    • Review of KIISC
    • /
    • v.16 no.6
    • /
    • pp.48-55
    • /
    • 2006
  • 홈네트워크는 가전 기기와 유무선 인터넷, 모바일 기기 등을 연결하여 가정 내의 시스템을 제어하거나 데이터를 서로 전송하며 다양한 분야에서 이용될 수 있다. 그 중에서 홈 엔터테인먼트, 디지털 홈 등과 같이 콘텐츠가 가치를 가지는 경우에 있어서는 콘텐츠의 불법적인 복제나 유통을 방지하여 콘텐츠 제공자 또는 콘텐츠 저작자의 권리를 보호하기 위한 DRM기술이 필요하다. 본 논문에서는 DRM 기술을 소개하고, 홈네트워크를 위한 DRM 기술 및 표준화 활동에 대하여 알아본다.

A Study for Implementation of System for protecting Privacy data from IoT Things (IoT 장치의 개인정보 데이터 보호 시스템 구현에 관한 연구)

  • Kim, Seon Uk;Hong, Seong Eun;Bang, Jun Il;Kim, Hwa Jong
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.84-91
    • /
    • 2021
  • In the EU GDPR, when collecting personal information, the right of the information subject(user) to consent or refuse is given the highest priority. Therefore, the information subject must be able to withdraw consent and be forgotten and claim the right at any time. Especially, restricted IoT devices(Constrained Node) implement the function of consent of the data subject regarding the collection and processing of privacy data, and it is very difficult to post the utilization content of the collected information. In this paper, we designed and implemented a management system that allows data subjects to monitor data collected and processed from IoT devices, recognize information leakage problems, connect, and control devices. Taking into account the common information of the standard OCF(Open Connectivity Foundation) of IoT devices and AllJoyn, a device connection framework, 10 meta-data for information protection were defined, and this was named DPD (Data Protection Descriptor). we developed DPM (Data Protection Manager), a software that allows information subjects to manage information based on DPD.

네트 가전기술의 동향

  • 대한전기협회
    • JOURNAL OF ELECTRICAL WORLD
    • /
    • s.314
    • /
    • pp.58-63
    • /
    • 2003
  • 휴대전화, PC, 브로드밴드(ADSL, FTTH) 등 가정 내에서의 IT기기 및 네트워크의 보급이 급속하게 진전되고 있다. TV와 에어콘 등 가전제품의 IT화가 진행되어 가정 내에서 네트워크를 형성함은 물론 외부 네트워크에 상시 접속되는 세계가 실현되어 가고 있다. 네트워크 접속에 대응하는 네트가전이 보급되면 가전기기 간의 연대 및 외부와의 정보통신에 의해 가전제품의 기능과 성능을 최대한으로 발휘할 수 있게 되어 생활환경, 편리성이 크게 향상됨과 아울러 성(省)에너지화에도 큰 효과를 나타낸다. 네트가전은 TV, VTR, DVD등의 AV계(系), 냉장고와 세탁기 등의 기기계, 태양광발전시스템과 전기온수기 등의 설비계로 분류된다. AV계에서는 디지털정보의 다운로드와 기억에 의해 다양한 고품질의 영상음향에 둘러싸인 세계가 탄생하게 된다 기계계의 네트가전에서는 홈서버 경유로 외출 장소에서 기기의 상태를 파악하여 제어하는 것이 가능해진다. 설비계에서는 설비 간의 연대에 따라 에너지절약 운전과 최대전력량의 제어에 의한 코스트절약이 실현된다. 네트가전을 이용한 홈네트워크 실현을 위해서는 고객이 쉽게 다를 수 있으며 만족할 수 있는 기능과 서비스, 성(省)배전$\cdot$저(低)코스트의 네트워크, 기기가 외부에서 간단히 제어될 수 있는 고신뢰성 인터페이스의 실장(實裝)과 표준화, 디지털 컨텐츠의 유통을 촉진하기 위한 컨텐츠 권리보호제도 정비가 필요하게 된다. 미쓰비시전기는 ''언제나, 어디에나, 누구에게도'' 가전제품을 편리하게 사용될 수 있는 유비쿼터스 사회를 실현하기 위하여 AV, 설비$\cdot$기기, 컴퓨터의 모든 분야에 대응한 가전기기, 네트워크 관련기기의 개발을 진행해 나감은 물론 주택을 이용한 실증시험을 실시하여 소비자 메리트의 본질적인 추구를 위해 계속 추진해 나가고 있다.

  • PDF

Rethinking the Right to Culture in the Digital Age The Issues of Copying Culture and Content Curation (디지털 시대 문화 권리의 제고 복제문화와 콘텐츠 큐레이션의 쟁점)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.74
    • /
    • pp.197-224
    • /
    • 2015
  • This paper critically investigates the cultural phenomenon surrounding the news mobile phone app in which 'curation', relying on the news editing and adaption, has become much more significant than making the news directly. This study affirms the fact that a copying culture which is basically a combinative effect of duplication (alias) and imitation(mimesis) enables us enrich the human beings' creative activities. However, we need to warn the regressive aspects of copying culture challenging the journalistic principles. This study exemplifies a case of Pikicast, which has become the most rapid growing news content mobile app in Korea. By doing a case study, this paper suggests that 'social gift' should be given to the online users as a whole. The communal and social gift would be an alternative way to the unpaid crawling of the news resources from the digital commons by the news content curating corporation such as Pikicast.

  • PDF

GDPR Compliant Blockchain Based Access Control(GCBAC) (GDPR 준수 가능한 블록체인 기반 접근제어 시스템)

  • Lim, Joon Ho;Chun, Ji Young;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.981-997
    • /
    • 2020
  • Blockchain technology can provide a high level security based on a decentralized distributed ledger and consensus-based structure. In order to increase the utilization of blockchain technology, it is necessary to find a way to use it in fields that require personal data processing such as health care and e-commerce. To achieve this goal, the blockchain based system should be able to comply with data privacy regulations represented by European Union(EU)'s GDPR(General Data Protection Regulation). However, because of the properties of the blockchain like the immutability and decentralized recorded data, it is difficult to technically implement the requirements of the existing privacy regulations on the blockchain. In this paper, we propose a multi-chain based access control system that can guarantee the rights of the personal data subject required by GDPR by utilizing Chameleon Hash and Attribute Based Encryption (ABE). Finally, we will show through security analysis that our system can handle personal data while maintaining confidentiality and integrity.

A Study on the Improvement of Security Vulnerabilities in Intelligent Transport Systems (지능형교통시스템의 보안취약점 개선방안에 관한 연구)

  • Jo, Pyoung Hyun;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.531-543
    • /
    • 2013
  • The destruction and prejudice of major infrastructure such as energy, broadcast, communication and transportation could result in a threat to individual rights and liberties, as well as social and economic losses. If a traffic signal control facilities have been violated, the lives of the citizens discomfort as well as causing social disruption such as traffic accident. Because the control system is operating as a closed network and you think it is safe, the information protection system has not been built or security patches and anti-virus updates do not work properly. So, cyber attacks by security vulnerabilities are exposed. Therefore, there is a need to identify the characteristics of the system, and develop appropriate countermeasures in order to prevent cyber attacks and prejudices incidents. This paper examines the vulnerabilities of Intelligent Transport Systems and proposes the improvement of security vulnerabilities.

A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution (멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구)

  • Shin, Seung-Soo;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.231-239
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

A Study on Multi-Media Contents Security Using Android Phone (안드로이드 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

A Study on Multi-Media Contents Security using Smart Phone (스마트 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Kim, Dong-Ryool;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.675-682
    • /
    • 2013
  • This paper tries to solve the problems which previous methods have the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.