• Title/Summary/Keyword: Copyright Management System

Search Result 116, Processing Time 0.022 seconds

A Study on the coverage of e-commerce insurance (전자상거래 보험의 담보범위에 관한 고찰)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.27
    • /
    • pp.129-161
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

A Study on the Market Status and Issues of e-Commerce Insurance (전자상거래 보험의 시장현황 및 쟁점에 관한 고찰)

  • Shin, Gun-Hoon
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.27-51
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

Study on the Standardization of Game UCI Identification Metadata (게임 UCI 식별 메타데이터 표준화 연구)

  • Yoon, Seon Jeong
    • Journal of Korea Game Society
    • /
    • v.14 no.5
    • /
    • pp.53-60
    • /
    • 2014
  • I designed the game UCI identification metadata to enable the game industry to provide copyright protection of game content, the efficiency of the management and distribution. This was mapped with existing UCI metadata which is composed of 9 elements that are applied to international standards for interoperability. I redefined 3 elements and added 3 more elements for reflecting the characteristics of the game. So it is composed of 12 elements in total. The result is verified by the general user survey and expert interviews. And I will develope the game UCI identification metadata management system with the results of study to be utilized by game agencies.

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.

A Study on the Necessity for the Music Composition in TV Documentaries - Focusing on In-depth Interviews with Music Directors at KBS.

  • Kim, Hyung-Jin
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.74-85
    • /
    • 2020
  • In this study, we investigated the necessity and limitations of music composition required in TV documentary by conducting in-depth interviews with 20 music directors currently working at Korean Broadcasting System (KBS). Our research has shown that composition of music is necessary. However, in reality, it is difficult to use the composed music due to problems such as time and cost of composing and trust in the music composer; so music libraries, film music, or other music are used instead of the composed music in many situations. However, at the time when companies like its rival Netflix are aware of the importance of sound, the impact of Netflix could lead to a decline in the quality of terrestrial TV, which could lead to a weakening of competitiveness. Recently, in the case of sound programs, the sales of secondary works are active due to "internet uploading using YouTube" or "exporting programs", but the sales have been hindered by restrictions on the use of copyrighted works. The music source of library is said to be the one whose copyright problem has been resolved. In this study, we show that the composed music is an ultimate alternative to TV documentaries, since the library music is sometimes suspended due to the situations of management companies.

A Study on Construction Plan for Character Archives (캐릭터 아카이브 구축 방안 연구)

  • Pyeon, Hyunchang;Rieh, Hae-young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.2
    • /
    • pp.149-168
    • /
    • 2018
  • In modern society, the economic and cultural influence of characters is increasing day by day. However, there is no comprehensive records management system for characters in Korea. The purpose of this study is to identify the necessity of comprehensive character records management system and requirements for records producers and users, and suggest a construction plan for archives that reflects this idea. Related cases in domestic and overseas were identified and analyzed, survey was conducted of character designers and users participating in the '2017 Character Licensing Fair' in order to understand their needs on character archives, and it was followed by interviews of two character designers. From the implications of the related cases and the analysis results of the questionnaire survey and the interviews, plans for records collection, management, and services were suggested for constructing character archives. Specifically, preparation of collection policy, insertion of watermark to prevent pirating, online sales of characters, and one-stop service that can provide licensing for copyright protection and record utilization were suggested.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

Portability Testing Method for Digital Right Management Software (디지털 저작권 관리 S/W의 이식성 시험 방법)

  • Yang, Hae-Sool;Kang, Bae-Keun;Lee, Ha-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.103-113
    • /
    • 2009
  • The Digital Right Management from illegal copy protects the various digital contents, the use self-admiration which is lawful does to make the contents use, payment leads about use and is a system which protects a copyright voluntary right and a profit the contents free reproduction permits, illegality use the fact that closes thoroughly is goal. Portability rating will lead and as the technique will be able to induce the quality increase of Digital Right Management S/W the strategic engineering development which accommodates an international standard there is a possibility which an objectivity and an application degree will raise. In order to evaluate Portability of Digital Right Management S/W from the research which sees proposed the tentative metric. Also, measured a quality and the result according to the standard which is appropriate accomplished presented clearly presented a research about the method which decides and an evaluation instance and a evaluation method.

A Design and Implementation of Interoperable DRM System Based on DMP (DMP 기반의 상호운용 가능한 DRM 시스템 설계 및 구현)

  • Cho, Tae-Beom;Lee, Sang-Jo;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.860-867
    • /
    • 2007
  • Digital Contents are increasing the modification of the contents by individual user and the modified or copied contents are simply distributed though the ultrahigh speed internet and the negative pervasive effect on the contents market is increasing. The solutions for copyright protection from illegally distributing contents are developing by various standardization groups and contents manufacturers and its commercia use is partly practiced. The MPEG was developing the IPMP technique to apply existed MPEG standards as a way of digital contents protection. However, as these IPMP techniques did not provide a satisfactory function for contents protection, the DMP standard was suggested as an alternative plan. In this paper, the system is designed and materialized to apply the TooIPack concept of DMP which ensure the interoperability of DRM system. With this paper, it is expected that the practical use and the possibility of the DMP standard in the DRM market would be verified and DMP standard may presents as a reference model for more systematic standardization operations.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.