• Title/Summary/Keyword: 저작권 침해행위

Search Result 29, Processing Time 0.028 seconds

A Study on the Linkage and integration of UCI (Universal Content Identifier) between ICN (Integrated Copyright Number) (디지털콘텐츠 식별체계 UCI (Universal Content Identifier)와 통합저작권 관리번호 ICN (Integrated Copyright Number)간의 연계와 통합에 관한 연구)

  • Kim, Yoon-Ho;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.27-33
    • /
    • 2014
  • As UCI (Universal Content Identifier) identification system becomes a national standard for content distribution, many digital contents are distributed through UCI identification system. However, problems associated with copyright infringement and copyright contracts occur due to lack of copyright information. ICN (Integrated Copyright Number), a code system developed for copyright management, includes copyright-related information for the purposes of usage settlement and accounting, illegal usage monitoring, and content filtering. ICN, however, has no information about distribution and content properties. Therefore, the linkage and integration between UCI and ICN can be a basis for the transparent and effective distribution of digital contents. In this paper, we propose a model for linking and integrating UCI and ICN, developing the efficiency in the value chain of each identified system by analyzing political factors and key technical elements between the two identification systems.

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.

Damage and Defense of Online game private servers. (온라인 게임의 사설서버 피해와 방어)

  • Bae, Jung-Il;Oh, Sang-Seok;Min, Sung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1456-1459
    • /
    • 2012
  • 사설서버는 개발사의 동의 없이 게임 서버를 제작 및 운영 하여 게임에 대한 저작권 침해와 서비스의 권리 없이 영리나 비영리 목적으로 단체 또는 개인이 온라인 게임을 즐길 수 있도록 서비스 하는 행위 또는 서버 자체를 뜻한다. 본 논문에서는 이러한 사설서버에 대한 기술적인 대응 방법인 사설서버 방어코드에 대해서 제안 한다. 본 연구는 사설서버로 인한 게임 개발사의 피해와 사설서버에 대한 방어 방법, 그리고 실제 온라인 게임에 사설서버 방어 기술을 도입한 후 사설서버 방어의 효과에 대해서 조사를 한다.

Damage and Defense of Online game private servers. (온라인 게임의 사설서버 피해와 방어)

  • Bae, Jung-Il;Oh, Sang-Seok;Min, Sung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.917-920
    • /
    • 2013
  • 사설서버는 개발사의 동의 없이 게임 서버를 제작 및 운영 하여 게임에 대한 저작권 침해와 서비스의 권리 없이 영리나 비영리 목적으로 단체 또는 개인이 온라인 게임을 즐길 수 있도록 서비스 하는 행위 또는 서버 자체를 뜻한다. 본 논문에서는 이러한 사설서버에 대한 기술적인 대응 방법인 사설서버 방어코드에 대해서 제안 한다. 본 연구는 사설서버로 인한 게임 개발사의 피해와 사설서버에 대한 방어 방법, 그리고 실제 온라인 게임에 사설서버 방어 기술을 도입한 후 사설서버 방어의 효과에 대해서 조사를 한다.

Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines (다수의 가상머신을 이용한 토르 트래픽 수집 시스템 설계 및 구현)

  • Choi, Hyun-Jae;Kim, Hyun-Soo;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • We intend to collect and analyze traffic efficiently in order to detect copyright infringement that illegally share contents on Tor network. We have designed and implemented a Tor traffic collection system using multiple virtual machines. We use a number of virtual machines and Mini PCs as clients to connect to Tor network, and automate both the collection and refinement processes in the traffic collection server through script-based test client software. Through this system, only the necessary field data on Tor network can be stored in the database, and only 95% or more of recognition of Tor traffic is achieved.

Instagram Users Behavior Analysis in a Digital Forensic Perspective (디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석)

  • Seo, Seunghee;Kim, Yeog;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.407-416
    • /
    • 2018
  • Instagram is a Social Network Service(SNS) that has recently become popular among people of all ages and it makes people to construct social relations and share hobbies, daily routines, and useful information. However, since the uploaded information can be accessed by arbitrary users and it is easily shared with others, frauds, stalking, misrepresentation, impersonation, an infringement of copyright and malware distribution are reported. For this reason, it is necessary to analyze Instagram from a view of digital forensics but the research involved is very insufficient. So in this paper, We performed reverse engineering and dynamic analysis of Instagram from a view of digital forensics in the Android environment. As a result, we checked three database files that contain user behavior analysis data such as chat content, chat targets, posted photos, and cookie information. And we found the path to save 4 files and the xml file to save various data. Also we propose ways to use the above results in digital forensics.

Metaverse Artifact Analysis through the Roblox Platform Forensics (메타버스 플랫폼 Roblox 포렌식을 통한 아티팩트 분석)

  • Yiseul Choi;Jeongeun Cho;Eunbeen Lee;Hakkyong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.37-47
    • /
    • 2023
  • The growth of the metaverse has been accelerated by the increased demand for non-face-to-face interactions due to COVID-19 and advancements in technologies such as blockchain and NFTs. However, with the emergence of various metaverse platforms and the corresponding rise in users, criminal cases such as ransomware attacks, copyright infringements, and sexual offenses have occurred within the metaverse. Consequently, the need for artifacts that can be utilized as digital evidence within metaverse systems has increased. However, there is a lack of information about artifacts that can be used as digital evidence. Furthermore, metaverse security evaluation and forensic analysis are also insufficient, and the absence of attack scenarios and related guidelines makes forensics challenging. To address these issues, this paper presents artifacts that can be used for user behavior analysis and timeline analysis through dynamic analysis of Roblox, a representative metaverse gaming solution. Based on analyzing interrelationship between identified artifacts through memory forensics and log file analysis, this paper suggests the potential usability of artifacts in metaverse crime scenarios. Moreover, it proposes improvements by analyzing the current legal and regulatory aspects to address institutional deficiencies.

Contactless Data Society and Reterritorialization of the Archive (비접촉 데이터 사회와 아카이브 재영토화)

  • Jo, Min-ji
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.5-32
    • /
    • 2024
  • The Korean government ranked 3rd among 193 UN member countries in the UN's 2022 e-Government Development Index. Korea, which has consistently been evaluated as a top country, can clearly be said to be a leading country in the world of e-government. The lubricant of e-government is data. Data itself is neither information nor a record, but it is a source of information and records and a resource of knowledge. Since administrative actions through electronic systems have become widespread, the production and technology of data-based records have naturally expanded and evolved. Technology may seem value-neutral, but in fact, technology itself reflects a specific worldview. The digital order of new technologies, armed with hyper-connectivity and super-intelligence, not only has a profound influence on traditional power structures, but also has an a similar influence on existing information and knowledge transmission media. Moreover, new technologies and media, including data-based generative artificial intelligence, are by far the hot topic. It can be seen that the all-round growth and spread of digital technology has led to the augmentation of human capabilities and the outsourcing of thinking. This also involves a variety of problems, ranging from deep fakes and other fake images, auto profiling, AI lies hallucination that creates them as if they were real, and copyright infringement of machine learning data. Moreover, radical connectivity capabilities enable the instantaneous sharing of vast amounts of data and rely on the technological unconscious to generate actions without awareness. Another irony of the digital world and online network, which is based on immaterial distribution and logical existence, is that access and contact can only be made through physical tools. Digital information is a logical object, but digital resources cannot be read or utilized without some type of device to relay it. In that respect, machines in today's technological society have gone beyond the level of simple assistance, and there are points at which it is difficult to say that the entry of machines into human society is a natural change pattern due to advanced technological development. This is because perspectives on machines will change over time. Important is the social and cultural implications of changes in the way records are produced as a result of communication and actions through machines. Even in the archive field, what problems will a data-based archive society face due to technological changes toward a hyper-intelligence and hyper-connected society, and who will prove the continuous activity of records and data and what will be the main drivers of media change? It is time to research whether this will happen. This study began with the need to recognize that archives are not only records that are the result of actions, but also data as strategic assets. Through this, author considered how to expand traditional boundaries and achieves reterritorialization in a data-driven society.

A Comparative Study on Parallel Import between Korea and China- Focused on Intellectual Property Rights (한국과 중국의 병행수입제도에 관한 비교연구- 지적재산권을 중심으로)

  • Huang, Yi-Qing;Cho, Hyun-Sook
    • International Commerce and Information Review
    • /
    • v.16 no.4
    • /
    • pp.79-102
    • /
    • 2014
  • A parallel importation is a non-counterfeit product imported from another country without the permission of the intellectual property owner. It is caused by price differences between countries. Therefore parallel importation are implication in issues of international trade and intellectual property rights(hereafter referred as IPR). This paper provides parallel importation issues of Korea and China under the IPR laws such as patent, trademarks, copyright and analyzes difference between two countries. In China, patent law regulates exhaustion rights which is based theory of a parallel import for the first time unlike trademark law and copyright law. On the other hands, Korea rules parallel importing under Korean customs regulations. In conclusion, two countries have no provisions that advocate a parallel import under IPR laws. This paper suggests some improvements to overcome the limitation of current regulation system and avoid trade friction between two countries. First of all, two countries should clearly make a rule about parallel import in IPR law such as definition of parallel importation, genuine goods, permission conditions, importing proses, penalty and remedy etc. Secondly, two countries should prohibit an abuse of a exclusive import agent's rights and manage a parallel importer not to cause consumer's complain about goods to expansion parallel imports. Finally, two countries should cooperate not to cause disputes about this issue with a communication channel.

  • PDF