• Title/Summary/Keyword: Contents Protection

Search Result 1,062, Processing Time 0.026 seconds

A Study on the Protection of Intellectual Property Rights of Contents upon Internet (인터넷상에서 콘텐츠의 지적재산권 보호에 관한 연구)

  • 장병윤
    • Journal of Arbitration Studies
    • /
    • v.12 no.2
    • /
    • pp.373-418
    • /
    • 2003
  • This is to study intellectual property(IP) protection of contents which is related with transactions upon internet network. Issues of electronic transaction and infringement cases were studied and analyzed for intellectual property protection. Upon those study, utilization and activation of contents, dispute settlement and method of IP protection were suggested. To achieve this study purpose, it consists of 5 chapters. In chapter 1 introduction, it's mentioned purpose, scope, and method of this study. In chapter 2, outline of contents and e-Commerce, and subject of IP protection upon internet were studied. In chapter 3, issues and dispute factors of IP were discussed and infringement cases were analyzed. It found out that infringements would be variety and complex due to technology rapidly changes. In chapter 4, IP protection plan and responsibility of webmaster were studied and emphasized to protect IP upon Internet. Also, protection against infringement and method of dispute resolution were studied and suggested the method. In this study, the protection plan was suggested because IP protection of contents in internet would be many cases upon internet technology. It found out that technology was important for business expansion of contents, e-Commerce and IP protection, and to enact a law related with IP. In chapter 5 conclusion, this study was summarized and further research was suggested. This study results are 1. IP related laws had better enact or revise to meet internet technology changes for IP protection timely, 2. local laws are to change and develop to harmony with international norm and trends, 3. consolidation of IP related laws for unification of IP statement should be incurred to avoid unnecessary energy of legislation and not to create dispute matters. That's also for customer satisfaction. In conclusion, not to incur ADR and for IP protection of contents, IP related laws would be promptly made or revised, according to technology change trends and for international harmony, That's for internet related industry development and customer satisfaction.

  • PDF

A Study on Protection Technology Criteria for Preventing Contents Abuse on On-line (온라인상의 콘텐츠 오남용 방지를 위한 보호기술 기준에 대한 연구)

  • Hong, Sung-Hyuk;Yoon, Eun-Jun;Han, Jae-Hong;Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.432-437
    • /
    • 2009
  • Due to fast development of communications, knowledge and information have been become digitalized and distributed actively. However, the misuse and abuse of digital properties and security problems frequently take place. In this paper, we analyze the cases of the misuse and abuse of contents and the contents protection technology. We propose important items for protection technology to prevent contents from misuse and abuse based on results of the analyses. These important items are expected to be used as important factors for establishing protection technology standards.

  • PDF

A Layered Protection Scheme for Scalable Video Coding (스케일러블 비디오 부호화에 대한 계층적 보호 기법)

  • Hendry, Hendry;Kim, Mun-Churl;Hahm, Sang-Jin;Lee, Keun-Sik;Park, Keung-Soo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.307-312
    • /
    • 2006
  • Protection to the multimedia contents is inevitable to ensure that only authorized users be able to access the protected contents for consumption. Since protection mechanisms need to be designed efficiently by exploiting the type of the contents, we propose a protection scheme for the video bitstream encoded by Scalable Video Coding (SVC) technique. Our scheme exploits the property of SVC in which a video is encoded into spatial, temporal, and quality scalability layers. By applying our proposed protection scheme to the appropriate scalability layers we can effectively control the SVC contents completely or partially. Each layer can be flexibly protected with different encryption keys or even with different encryption algorithms. The algorithms that are used to protect each layer are described by the standardized protection description tool, which is the MPEG-21 Intellectual Property Management and Protection (IPMP) Components. In this paper, we present the design of the proposed layered SVC protection scheme, its implementation and experimental results. The experiment result shows that the proposed layered SVC protection scheme is very effective and can easily be applied.

  • PDF

A Study on Legal Protection of Digital Contents in Library (도서관에서의 디지털콘텐츠 법적 보호에 관한 연구)

  • Hong, Jae-Hyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.17 no.2
    • /
    • pp.83-114
    • /
    • 2006
  • The research investigated definition, scope and feature of digital contents in order to discuss legal protection of digital contents. The protection law and current trend of protection of digital contents in United States of America, EU and Japan were examined. As the law which protects digital contents in Korea. the contents and characteristics, etc. of copyright act of Korea and online digital contents industry development act were examined and analyzed. And then relationship of digital contents and copyright, namely, the relationship of database and copyright, relationship of digital contents by translation. arrangement, alteration, dramatization, cinematization, etc. of an original work and copyright; relationship of other digital contents and copyright; relationship of file sharing of digital contents and copyright, were examined and copyright issues were discussed in library. And also the research suggested concretely necessary countermeasure of copyright which the library must take. Finally, this paper suggested the improvement direction for legal protection of digital contents we must aim ultimately.

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

The Implementation of Digital Contents Copy Protection Manager In Digital Broadcasting Using RMP (RMP를 이용한 PVR에서의 지상파방송 디지털컨텐츠 보호 Manager 모듈 구현)

  • Jung, Jong-Jin;Lim, Tae-Bum;Kim, Yun-Sang;Lee, Seok-Pil
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.258-260
    • /
    • 2005
  • With the start of terrestrial digital broadcast, we can view HD digital contents in TV. Also we can record, play, redistribute digital contents over the various way. Therefore the protection of Digital Contents Right became the important issue. In this paper, we implement a manager that prevents indiscriminate digital contents redistribution of the terrestrial digital broadcast contents. For protection of Digital contents Right, we use BF(Broadcast Flag) that we can control viewing or copy digital contents with.

  • PDF

Design on Protection and Authentication System of IPTV Contents using OTP (OTP를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.129-137
    • /
    • 2009
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents protection and authentication system tends to draw more attentions. So we need a system that can protect contents and allow only authenticated person to use right service by controling user authority and using content encryption. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But the weak point of this system are in high costs, complexity and using HW. For resolving these problems, in this paper, we proposed IPTV contents protection and authentication system using OTP. When we transmit the content encrypted by OTP key using contents delivery technology, we operate XOR with contents using another settop-box's OTP key which was transmitted from distribution server. And contents are reconstructed and transmitted to the settop-box, In the end, downloaded content are encrypted by OTP key and are superior in content protection when contents redistribution. Since OTP use double-authentication elements in encryption process, this method is excellent in content protection. And it is very effective in cost aspect because it could be implemented by SW program. Another benefit is that we can shorten the development time period. In this paper, we propose and find its possibility as a new content protection and authentication method suitable for IPTV services.

The Implementation of Digital Broadcasting Content Copy Protection Manager in PVR (Personal Video Recording)

  • Lim Tae-Bum;Kim Yun-Sang;Lee Seok-Pil;Jung Jong-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.99-102
    • /
    • 2006
  • This paper describes a article how to protect from illegal indiscriminate copy of digital broadcasting content using DRM and CCI. With the start of terrestrial / satellite digital broadcast and the preparation of Digital Cable broadcast, we can view HD digital contents through the various channel. Also we can record, play, redistribute digital contents in PVR. The protection of Digital Contents Right became of the important issue to protect CopyRight. In this paper, we implement a manager that prevents indiscriminate digital contents redistribution of the digital broadcast contents. For protection of Digital contents Right, we use BF(Broadcast Flag) and CCI (Copy Control Information) which we can control viewing or copy digital contents with.

  • PDF

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.