• Title/Summary/Keyword: Illegal Software

Search Result 94, Processing Time 0.026 seconds

A System of Software Asset Management in Company using the Server (서버를 이용한 사내 소프트웨어 자산관리 시스템)

  • Lee, Young Gyo;Park, Jin Kyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.1-12
    • /
    • 2013
  • Illegal software use have been abroad through online (internet) and offline (CD, DVD, USB, etc.). It infringes intellectual property rights and weakens the will to software development. Also, it generates the software errors and virus intrusion in PC. It hinders national software industry and induces the personal and national trade friction. Many group (company, office, organization, institution, etc.) have been realized the prohibition of illegal software use. But, it is too hard to monitor and control illegal software use. In this paper, we propose a method of software management in a group. A software module of client agency is installed in all PC of the group. A main server of the software management controls the all of the PC through the communication. The server blocks the install of illegal software, permits the install / use of honest goods software, monitors the license (term, amount) in all the PC. The system prevents errors of illegal software use, all cuts the virus intrude through the illegal software, improves the performance of PC relatively.

Dynamic License Control in Online Electronic Software Distribution (소프트웨어 온라인 전자 유통에서의 동적 사용권 관리 기술)

  • Ha, Young-Guk;Lim, Shin-Young;Ham, Ho-Sang;Park, Hyo-Joon;Kim, Tai-Yun
    • IE interfaces
    • /
    • v.13 no.1
    • /
    • pp.133-140
    • /
    • 2000
  • As the internet dramatically grows, internet electronic commerce is being increased. But, as products distributed with ESD(Electronic Software Distribution) are in the form of electronic file, it is difficult to prohibit illegal copy of products. Therefore, new technology is needed to distinguish legal products from illegal ones. In this paper, we present the ESD's requirements, characteristics and a new dynamic license management technology to prevent illegal copy.

  • PDF

Moral Judgment and Intention to Make Illegal Copies of Smart Phone Applications (스마트폰 애플리케이션 불법복제에 대한 소비자의 도덕적 판단과 불법복제의도 -전북지역 대학생을 중심으로 한 사례분석)

  • You, So-Ye;Sun, Ying-Hua
    • The Korean Journal of Community Living Science
    • /
    • v.22 no.4
    • /
    • pp.655-668
    • /
    • 2011
  • Although consumer ethical behavior related with illegal copies of digital software has been considered to be an important issue, not many studies have attempted to examine the issue. Firstly, this study attemped to explain the moral judgment and intention to make illegal copies of smart phone applications for college students. Secondly, psychological factors such as moral intensity and perceived risk related to making illegal copies were tested to be significantly different in individual characteristics such as experience of ethical education and past experience of making illegal copies of software, sex, age and household income. Thirdly, the effect of related factors such as psychological factors and individual characteristics was estimated to significantly influence moral judgment and intention to make illegal copies. Two step method(using LIMDEP program) was applied to estimate the model as a structural equation model. According to the results of this study, magnitude of consequences, financial risk and performance risk were found to be significantly different in income groups(less than middle class vs more than middle class). Prosecution risk was found to be significantly different in gender groups(female vs male). In addition, social consensus, financial risk, performance risk and prosecution risk were found to be significantly different in ethical education groups(experience vs no experience). Furthermore, moral judgment for making illegal copies of smart phone applications was found to be significantly influenced by income, ethical education, magnitude of consequences, temporal immediacy and social consensus. And intention to make illegal copies of smart phone applications was found to be significantly influenced by moral judgment, age, financial risk, performance risk and prosecution risk.

Objective Material analysis to the device with IoT Framework System

  • Lee, KyuTae;Ki, Jang Geun
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.289-296
    • /
    • 2020
  • Software copyright are written in text form of documents and stored as files, so it is easy to expose on an illegal copyright. The IOT framework configuration and service environment are also evaluated in software structure and revealed to replication environments. Illegal copyright can be easily created by intelligently modifying the program code in the framework system. This paper deals with similarity comparison to determine the suspicion of illegal copying. In general, original source code should be provided for similarity comparison on both. However, recently, the suspected developer have refused to provide the source code, and comparative evaluation are performed only with executable code. This study dealt with how to analyze the similarity with the execution code and the circuit configuration and interface state of the system without the original source code. In this paper, we propose a method of analyzing the data of the object without source code and verifying the similarity comparison result through evaluation examples.

Software License Management Agent System for Electronic Commerce (전자 상거래를 위한 소프트웨어 사용권 관리 에이전트 시스템)

  • Yoon, Woo-Seong;Yoon, Jung-Mo;Kim, Tai-Yun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.77-86
    • /
    • 2001
  • With the growth of the EC(Electronic Commerce), Buying and selling software through the internet are expanded. Among the ESD(Electronic Software Distribution) methods, Buy-first method and TrY-before-bu1 method can not solve the illegal copy problem. Recently developed EL(Electronic License) model solve the illegal copy problem by separating the software and license. But this method also can not support various ways for payment. In this paper we propose the software license management system that is a newly form like ESD model. This system proposes NL(New License) to support various payment methods and SC(Software Charge) to insure that a seller takes the software price. Agent of the proposed system offers scalability to other systems and illegal copy protection function bv managing NL and SC.

  • PDF

A DRM Framework for Distributing Digital Contents through the Internet

  • Lee, Jun-Seok;Hwang, Seong-Oun;Jeong, Sang-Won;Yoon, Ki-Song;Park, Chang-Soon;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.25 no.6
    • /
    • pp.423-436
    • /
    • 2003
  • This paper describes our design of a contents distribution framework that supports transparent distribution of digital contents on the Internet as well as copyright protection of participants in the contents distribution value chain. Copyright protection must ensure that participants in the distribution channel get the royalties due to them and that purchasers use the contents according to usage rules. It must also prevent illegal draining of digital contents. To design a contents distribution framework satisfying the above requirements, we first present four digital contents distribution models. On the basis of the suggested distribution models, we designed a contract system for distribution of royalties among participants in the contents distribution channel, a license mechanism for enforcement of contents usage to purchasers, and both a packaging mechanism and a secure client system for prevention of illegal draining of digital contents.

  • PDF

Development of monitoring system for detecting illegal dumping using deep learning (딥러닝 영상인식을 이용한 쓰레기 무단투기 단속 시스템 개발)

  • Bae, Chang-hui;Kim, Hyeong-jun;Yeo, Jeong-hun;Jeong, Ji-hun;Yun, Tae-jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.287-288
    • /
    • 2020
  • 우리나라의 무단 투기된 쓰레기양은 2019년 2월 기준 33만 톤이며 이를 단속하기 위해 상용화된 쓰레기 무단투기 단속 시스템은 센서를 이용하여 시스템 주변에 사람이 지나가면 영상을 촬영하기 때문에 쓰레기 무단투기자 뿐 아니라 해당 시스템 주변을 지나는 모든 사람을 촬영하기 때문에 불법 쓰레기를 배출하는지 해당 영상을 사람이 일일이 다시 분석해야한다. 본 논문에서는 쓰레기 투기 행위 이미지를 바탕으로 학습시킨 딥러닝 실시간 객체인식 알고리즘인 YOLO-v4를 활용하여 실시간으로 쓰레기 무단투기를 단속하는 시스템을 제시한다.

  • PDF

System for Anti-Piracy of Software under Windows Operating System (윈도우 운영 체제에서 불법 소프트웨어 방지 시스템)

  • Hwang, Ki-Tae;Kim, Nam-Yun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.423-434
    • /
    • 2004
  • This paper presents the software system that protects illegal installation and use of the commercial software. The server computer in this system stores the compressed versions for all software, while client computers install all software by downloading them from the server. Also the client computers periodically report to the server whether they have illegally installed software. This system introduces authentication and encryption/decryption using the session key under Windows Operating System to prevent interception of the software package from outside world and malicious modification of the transfer message between the server and the client. The proposed system in this Paper has several advantages such as providing real-time control of license and easy maintenance of the software as well as protecting illegal use of the software.

The Secure Chip for Software Illegal Copy Protection (소프트웨어 불법복제방지를 위한 보안칩)

  • 오명신;한승조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.87-98
    • /
    • 2002
  • Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.

Development of Illegal Parking Detection System for Electric Vehicle Charging Station (전기차 충전소 불법주차 탐지 시스템 개발)

  • Im, Hyo-Gyeong;Lee, Sang-Min;Ju, Eun-Su;Park, Seong-Ik;Jeon, Chan-Ho;Jung, Young-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.315-316
    • /
    • 2022
  • 최근 전 세계적인 탄소 중립 정책으로 인해 전기차 보급 속도는 예상보다 훨씬 빠르게 증가하고 있다. 하지만 늘어나는 수요에 비해 전기차 충전기 수는 턱없이 부족하다. 그뿐만 아니라 일반 차들의 전기차 충전소 불법주차로 인해 전기차가 충전하지 못하는 불편함이 발생하고 있다. 본 논문에서는 에지 컴퓨터(edge computer)와 딥러닝 기반 객체 감지 시스템 YOLO(You only look once)를 이용한 전기차 충전소 불법주차 방지 시스템을 개발한다. 먼저, 이 시스템은 카메라를 통해 실시간으로 영상을 받아 YOLO를 이용하여 차량 번호판 인식이 되면 전기차 번호판의 특정 마크를 인식하여 전기차인지 일반 차인지를 판별하여 판별된 값에 따라 주차 차단기가 작동되는 시스템이다. 전기차이면 차단기가 내려가서 충전소를 이용할 수 있게 하고 일반차일 경우 주차 차단기가 내려가지 않고 막아 불법주차를 차단한다. 이와 같은 기술을 활용하여 전기차 충전소 불법주차 방지에 기여하고자 한다.

  • PDF