• Title/Summary/Keyword: 권리 기술

Search Result 409, Processing Time 0.03 seconds

A Reliable Problem Trading Web Platform Using NFT Blockchain and Deep Learning (NFT 블록체인과 딥러닝을 활용한 신뢰성 있는 문제 거래 웹 플랫폼)

  • Byung-Ook Ryu;Eun-Hye Gwon;Ji-Ho Shin;Dong-Ju Jung;Byung-Jeong Lee
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.318-319
    • /
    • 2023
  • 본 연구에서는 다양한 문제들을 ELECTRA를 통해 문제의 유형을 분류하고, 그것을 기존의 문제들과 유사도 평가를 진행하여 문제의 표절 여부를 확인한다. 유일성이 입증된 문제는 이더리움 기반의 블록체인을 사용하여 NFT 기술을 통해 문제를 NFT로 발행하여 거래한다. 최종적으로 표절하지 않았음이 검증된 문제를 NFT를 통해 거래함으로써 문제의 저작권 및 권리를 웹 플랫폼을 통해 거래할 수 있도록 한다. 본 논문에서는 이러한 문제 거래 웹 플랫폼 설계를 기술하며, 본 플랫폼은 문제를 쉽게 거래할 수 있도록 지원하여 문제 거래 활성화에 기여할 것이다.

A Study on the Automated Compatibility Standard Test System for eBook DRM (전자책 DRM을 위한 자동화된 표준정합성 검사 시스템에 관한 연구)

  • Kim, Tae-Hyun;Kang, Ho-Gap;Ahn, Chang-Ju;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.127-136
    • /
    • 2013
  • The study of the compatibility of EPUB DRM, granted by the Korea Copyright Commission, as a CT R & D project (Project Title: The Development of the standard reference software technology for International Standard EPUB-based eBook DRM) developed standards such as profile standards for encryption digital signature and authentication certificates and standards for technical terms of rights information. In 2012, these four standards have been established as the Korean Industrial Standards under the names of 'Encryption specification for EPUB DRM,' 'the Digital signature specification for EPUB DRM,' 'the Certificate specification for EPUB DRM,' and 'Definitions of Right Terms for EPUB DRM' through the ODPF(Open Digital Standardization Forum) and the TTA(Telecommunications Technology Association). The research project also proposed standards of ebook DRM license protocols in order for the four standards to practically apply to ebook DRM compatibility. It is necessary for technology standards to require a compatibility standard test process for testing whether implementations which were developed on the basis of the standard specification, comply with standards. This study suggests an automated compatible standard test method and a test model under the ebook DRM standard technical specification.

A Study on Social Worker's Perception and Practice of the Right to Self-determination for Person with Developmental Disability: Application of Importance-Performance Analysis(IPA) (발달장애인의 자기결정권에 대한 사회복지사의 인식 및 실천에 관한 연구: 중요도-실행도분석(IPA)의 적용)

  • Lee, Nam-Jeong;Lee, Dong-Young
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.624-635
    • /
    • 2020
  • This study focuses on the right to self-determination, which has a higher possibility of infringement on rights, for people with developmental disabilities, who are more vulnerable to rights protection than other types of disabilities, and seeks to obtain implications of the basis for academic discussion and practical strategies. To this end, data were collected through a structured survey on 302 social workers in Seoul, Gyeonggi, and Gangwon area to identify the importance and execution degree of self-determination components of the developmental disabled, and descriptive analysis, differences. analysis, matrix analysis was applied. As a result of the analysis, the importance and performance degree were evaluated at an absolute level lower than the positive level, and the overall average standard execution degree was found to be applied relatively later, and the difference between the two levels was statistically significant. Meanwhile, goal setting and achievement, self-management and regulation, branch recognition and perception, etc. were identified as under-action elements as disparity between importance and performance. Therefore, in order to improve the balanced positivity of social workers and people with developmental disabilities in consideration of the reciprocity of human rights protection, applied behavior analysis, positive behavior support, and individualized service plan based on the application of a person-centered program and self-determination improvement program are applied. Suggestions were made on detailed strategies such as accounting.

3D Cadastre Data Model in Korea ; based on case studies in Seoul

  • Park, So-Young;Lee, Ji-Yeong;Li, Hyo-Sang
    • Spatial Information Research
    • /
    • v.17 no.4
    • /
    • pp.469-481
    • /
    • 2009
  • Due to the increasing demands on the efficient use of land and the fast growth of construction technologies, human living space is expanded from on the surface to above and under the surface. By recognizing that the current cadastre system based on 2D was not appropriate to reflect the trend, the researchers are interested in a 3D cadastre. This paper proposed the 3D cadastre data model that is appropriate to protect ownership effectively in Korea. The 3D cadastre data model consists of a 3D cadastre feature model and a 3D cadastre geometry model, and the data are produced by a 3D cadastre data structure. A 3D cadastre feature model is based on 3D rights and features derived from case studies. A 3D cadastre geometry model based on ISO19107 Spatial Schema is modified to be good for 3D cadastre in Korea. A 3D cadastre data structure consists of point, line, polygon and solid primitives. This study finally purposes 1) serving and managing land information effectively, 2) creating rights and displaying ranges about infrastructures above and under surface, 3) serving ubiquitous-based geoinformation, 4) adapting ubiquitous-based GIS to urban development, and 5) regulating relationships between rights of land and registration and management systems.

  • PDF

Measurements on Legislation of User-Protection Act in the Era of ICT-Convergence (ICT융합에 따른 방송통신 이용자보호 법제의 합리적 개선방안)

  • Park, Jong-Su
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.103-153
    • /
    • 2013
  • This article aims at the legislation of User-Protection Act in area of ICT. In these days telecommunication and broadcasting are getting more and more convergent. The paradigm of ICT is turning over from the service provider to the end-user. User protection has been in each erea of ICT (C-P-N-D) individually regulated. In the area of telecommunication it is important to protect the interest of user, who stands in contract with the service provider. And in area of broadcasting it is important to protect the interest of viewers, who stands "gratis" with the broadcasters without any contracts. For the more efficient user-protection it is also necessary to make a dedicated organization under KCC(Korean Communications Committee). In this early year the government organization was divided into MSIP(Ministry of Science, ICT and future planing) and KCC. The user-protection act will be very important instrument of ICT regulation in the era of creative economy. It is necessary to establish a new frame act of user protection. It is also necessary to make start to establish a new system of user education in erea of ICT. It is strongly expected the new act will be a turning point of ICT development in Korea.

A Study on Encrypted Matrix Puzzle for Digital Contents Protection (디지털 컨텐츠 보호를 위한 메트릭스 퍼즐 암호화방법에 대한 연구)

  • Min, So-Yeon;Kim, Jung-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.936-944
    • /
    • 2008
  • DRM system is a technology that protects and manages copyright holder's privilege by using a copyright protection technology. This paper contributes to improvement of the secret key transmission and encryption/decryption processing time base on DRM system. In this paper, we will suggest that as follow: First, we will propose the algorithm to transmit the encryption key which use Multidimensional Method more safe than the existing One-path XOR method. Second, we will provide the high quality algorithm of security than the existing system because the Multidimensional which generated from the algorithm does not saved to the server side. Third, we will support the client decryption system which can decrypt the Multidimensional with OPT in decryption with client side. Fourth, we will adopt the more safr method of transmission with the compound of Multidimensional Method and OPT.

Digital Watermarking Method using Discrete Optimization Method (이산최적화 기법을 사용한 디지털 워터마킹)

  • Lee, Chang-Soon
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.44-49
    • /
    • 2014
  • In recent, watermarking technology have been paying attention to methods avoiding illegal use and reproduce of digital contents. Then, in order to protect the right of digital contents, a watermark image is inserted into original images. In different watermarking methods, several technologies using Ant Colony Algorithm have been studied. In this paper, we propose a watermarking method using a discrete optimization method in the ants colony algorithm. This proposed method resembls the process that ants follow the pheromone traps to find out food. And when a watermark image is inserted into original images, the proposed method considers the deployment of obstacles or the balance between cells in the entire digital image. Simulation results show that the proposed method is increased in robustness of watermarked image and is decreased in the perceptibility of watermarking compared to the previous methods.

Analysis method of patent document to Forecast Patent Registration (특허 등록 예측을 위한 특허 문서 분석 방법)

  • Koo, Jung-Min;Park, Sang-Sung;Shin, Young-Geun;Jung, Won-Kyo;Jang, Dong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1458-1467
    • /
    • 2010
  • Recently, imitation and infringement rights of an intellectual property are being recognized as impediments to nation's industrial growth. To prevent the huge loss which comes from theses impediments, many researchers are studying protection and efficient management of an intellectual property in various ways. Especially, the prediction of patent registration is very important part to protect and assert intellectual property rights. In this study, we propose the patent document analysis method by using text mining to predict whether the patent is registered or rejected. In the first instance, the proposed method builds the database by using the word frequencies of the rejected patent documents. And comparing the builded database with another patent documents draws the similarity value between each patent document and the database. In this study, we used k-means which is partitioning clustering algorithm to select criteria value of patent rejection. In result, we found conclusion that some patent which similar to rejected patent have strong possibility of rejection. We used U.S.A patent documents about bluetooth technology, solar battery technology and display technology for experiment data.

Protecting Game Developers Under the Works-for-hire Clause of Copyright Law (게임개발자 창작 권리보호 방안에 관한 소고 -저작권법의 업무상저작물제도를 중심으로)

  • Choi, Ji-Sun
    • Journal of Korea Game Society
    • /
    • v.11 no.4
    • /
    • pp.73-91
    • /
    • 2011
  • This paper investigates the possibilities of protecting game developers under the work-for-hire provision of copyright law. Fundamentally, the work-for-hire clause provides the authorship status to companies, not to game developers. Some argue that the clause is especially appropriate in software industries including game industries because they are new and different from typical types of copyright industries. However, game industries are different from software industries as well as typical types of copyright industries in that they have both cultural (artistic) as well as industrial characteristics. Game developers not being provided with the authorship status may be one of the reasons for the disputes related to turnover and knowledge leakage. This paper mainly suggests three kinds of solutions: first, protecting the moral right even in the work-for-hire provision; second, protecting game developers as coauthorship; and third, providing monetary compensation as it is in employee invention.

A Study on the Right of hot pursuit of UNCLOS (UN해양법 협약상의 추적권에 관한 연구)

  • Seong, Yun-Chang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.11a
    • /
    • pp.15-24
    • /
    • 2006
  • The hot pursuit of a foreign ship may be undertaken when the competent authorities of the coastal State have good reason to believe that the ship has vi-olated the laws and regulations of that State. Such pursuit must be commenced when the foreign ship or one of its boats is within the internal waters, the archi-pelagic waters, the territorial sea or the contiguous zone of the pursuing State, and may only be continued outside the territorial sea or the contiguous zone if the pursuit has not been interrupted. It is not necessary that, at the time when the foreign ship within the territorial sea or the contiguous zone recevies the order to stop, the ship giving the order should likewise be within the territorial sea or the contiguous zone. If the foreign ship is within a contiguous zone, as defined in article 33, the pursuit may only be undertaken if there has been a vio-lation of the rights for the protection of which the zone was established. The right of hot pursuit shall apply mutatis mutandis to violations in the ex-clusive economic zone or on the continental shelf, including safety zones around continental shelf installations, of the laws and regulations of the coastal State applicable in accordance with this Convention to the exclusive economic zone or the continental shelf, including such safety zones.

  • PDF