• Title/Summary/Keyword: Infringement Case

Search Result 114, Processing Time 0.028 seconds

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

A Study on the Improvement of the Intelligent Robots Act

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.217-224
    • /
    • 2019
  • The intelligent robot industry is a complex which encompasses all fields of science and technology, and its marketability and industrial impact are remarkable. Major countries in the world have been strengthening their policies to foster the intelligent robot industry, but discussions on liability issues and legal actions that are accompanied by the related big or small accidents are still insufficient. In this study, therefore, the patent law by artificial intelligence robots and the legislation for relevant legal actions at the criminal law level are presented. Patent law legislation by artificial intelligence robots should comply with the followings. First, the electronic human being other than humans ought to be given legal personality, which is the subject of patent infringement. Even if artificial intelligence has legal personality, legal responsibility will be varied depending on the judgment of whether the accident has occurred due to the malfunction of the artificial intelligence itself or due to the human intervention with malicious intention. Second, artificial intelligence as a subject of actors and responsibility should be distinguished strictly; in other words, the injunction is the responsibility of the intelligent robot itself, but the financial repayment is the responsibility of the owner. In the criminal law legislation, regulations for legal punishment of intelligent robot manufacturing companies and manufacturers should be prepared promptly in case of legal violation, by amending the scope of application of Article 47 (Penal Provisions) of the Intelligent Robots Development and Distribution Promotion Act. In this way, joint penal provisions, which can clearly distinguish the responsibilities of the related parties, should be established to contribute to the development of the fourth industrial revolution.

A Study on UICC(Universal IC Card)-based Authentication Mechanism using OTP (OTP를 활용한 UICC(Universal IC Card) 기반의 인증 메커니즘에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.21-31
    • /
    • 2008
  • Ubiquitous environment is constructed by development of an IT technology, offer environment of many service changed to mobile environment. Also, existed service offered at fixed position like home or company, but according to development of mobile device. user require service as moving. Wibro can offer as user moving using mobile device. As requirement should be included authentication, in case of authentication between UICC and AAA authentication server is offered in Wibro, service is available. However, when UICC requires initial authentication to AAA authentication server, identification information of UICC expose as plaintext, so privacy infringement of mobile device occurs. Therefore, identification information of terminal generate randomly using OTP(One-Time Password) that generated in mobile terminal, and we proposed mechanism of privacy protection. Also, we proposed mechanism that offer secure service to user as offer authentication from OTP framework, and offer OTP combination authentication detailedly.

The Clinical Trial of Terminal Cancer Patients and The Nature of Self-Determination of The Subject (말기 암 환자에 대한 임상시험과 피험자의 자기결정권의 본질)

  • Song, Young-Min
    • The Korean Society of Law and Medicine
    • /
    • v.15 no.1
    • /
    • pp.211-237
    • /
    • 2014
  • Because of unpredictability and high possibility of abnormal results by clinical trials compared to general medical behaviors, a procedure for ensuring with sufficient explanations by investigators must be secured. Therefore, in a sequence of clinical trials, what kinds of scope, stage, and method of explanations provided by investigators, including doctors or researchers, to trial subjects are closely related to the compensation for damages by violation of liability for explanation. In case of application of clinical trials to patients who have critical illness such as cancer, issues of "Quality of Life" regarding trial subjects, cancer patients, should be discussed. Especially, in case of clinical trials for terminal cancer patients, the right of subjects' self-determination, which is a fundamental principle in medical behaviors, should be discussed. The right of self-determination includes participation in clinical trials for the possibility of life-sustaining even a little bit, or no participation in clinical trials in order to have a time for completing the rest of his life. Like this, if the extent and scope of explanations related to the issues of "Quality of Life" are raised as main issues, the evaluation of "Quality of Life", should be a prerequisite. In many occasions, realistically, despite bad results such as deaths or serious adverse drug reactions after clinical trials, it may not be easy for compensating to trial subjects or their survivors, who requested civil compensation for damage. Futhermore, in abnormal results after concealment of clinical trials or performance of clinical trials without permission, and in the case of trial subjects' failures of proving proximate cause between the clinical trials and abnormal results, problematic results such as no protection to the trial subjects could be occurred. In performing clinical trials, investigators should provide sufficient explanations for trial subjects and secure voluntary informed consents from the trial subjects. Therefore, clinical trials without trial subjects' permissions and the informed consent process violate trial subjects' rights of self-determination, and the investigators shall be liable for compensation for damages. Then, issues might be addressed are what are essential contents of patients' "rights of self-determination" infringed by clinical trials without subjects' permissions. Two perspectives about patients' rights of self-determination might be considered. One perspective regards physical distress of patients (subjects) from therapies without sufficient explanations as the crux of the matter. The other perspective regards infringement of human dignity caused by being subjects without permission as the crux of the matter irrespective of risks' big and small influences. This research follows perspective of the latter. Forming constant fiduciary relation between investigators (doctors) and subjects (patients) pursuant medical contracts, and in accordance with this fiduciary relation, subjects, who are patients, have expectations of explanations and treatments by the best ways. If doctors and patients set this forth as a premise, doctors should assume civil liability when doctors infringe patients' expectations.

  • PDF

Physician's Duty to Inform Treatment Risk: Function, Requirements and Sanctions (의사의 위험설명의무 - 법적 기능, 요건 및 위반에 대한 제재 -)

  • Lee, Dongjin
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.1
    • /
    • pp.3-32
    • /
    • 2020
  • Under the Korean case law, physicians are obliged to disclose or inform the risk associated with a specific treatment to their patients before they perform the treatment. If they fail to do this, they are liable to compensate pain and sufferings. If the patient can establish that he or she would not have consented at all to the treatment had he or she been informed, the physicians are liable to compensate all the loss incurred by the treatment. In this article, the author examines the legitimacy of this case law from the perspective of legal doctrine as well as its practical affect on the medical practice and the furtherance of self-determination of the patient. The fundamental findings are as follows: The case law that has physicians who failed to inform treatment risk compensate pain and sufferings for the infringement of the right of self-determination seems to be a disguised and reduced compensation of all the loss based on the possible malpractice, which cannot be justified in view of the general principles of tort liability. It is necessary to adhere to the requirements of causation and imputation between the failure to inform treatment risk and the specific patient's consent to the treatment. If this causation and imputation is established, all the loss should be compensated. Otherwise, there shall be no liability. The so-called hypothetical consent defence shall be regarded as a part of causation between the failure to inform and the consent. The suggested approach can preserve the essence of physician-patient relationship and fit for the very logic of informed consent better.

A Study on Package Design of Intellectual Property Protection Programs -a focus on trademark and registration of design- (패키지디자인의 법적보호에 관한 연구 -의장 및 상표등록을 중심으로-)

  • Yang, Cho-San
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.27-36
    • /
    • 2004
  • The protection of intellectual property right in international conventions are worldwide or regional areas already exists a century. Therefore, our country is positive affiliated with international conventions. After that time, such as a violation of international convention and an example of imitations are continually that we prognosticate the international trade market activities was difficult not only became an issue of country credit risk. At this point, the major purpose of this study make an analysis of both paralleled with the case study follow an example and the comprehension with concerned about recognition of intellectual property right. In additionally, it stands a plan of package design protections under the WTO systems. This study have carried out a theoretical and practical analysis of intellectual property right and statistical analysis through the inside and outside of the country packaging design study and a case study of troubles with intellectual property. Besides, it is accomplish the purpose of the study that established exploratory study survey about inside and outside of the country packaging design infringement case study and relative package design industry employees with consumptions real research. I hoped that this study will be a foundation on which packaging, design industry protections to intellectual property right.

  • PDF

Analysis of the Danmu Phenomenon on the Chinese Video Platform Bilibili - Focused on Henry Jenkins' Concept of Participatory Culture (중국 동영상 플랫폼 Bilibili의 탄막 현상 분석- 헨리 젠킨스의 참여문화 개념을 중심으로)

  • HUANG SHIYI;Kwon Hochang
    • Trans-
    • /
    • v.15
    • /
    • pp.81-104
    • /
    • 2023
  • This paper analyzes the danmu phenomenon with the concept of participatory culture proposed by Henry Jenkins. Unlike other comments, Danmu is a function that allows users to post anonymously while watching a video, and comments posted at that time are immediately displayed on the screen and can be viewed by other viewers. The service was first launched by Niconico. In this paper, the danmu phenomenon in the Chinese video platform Bilibili is analyzed by focusing on three aspects. First, in terms of creative sharing under collective intelligence, we explore how users create their own creations and share them with other users through danmu. Second, in the collaboration model under public participation, the method and meaning of collective cooperation through users' interaction is dealt with. Third, in terms of financial support of commercial capital, the influence of danmu videos to create commercial profits is analyzed as a case. In addition, the negative aspects and challenges of participatory culture in Bilibili are analyzed. Negative aspects such as participation gap, copyright infringement, excessive use of danmu and problems of anonymity were reviewed, and major challenges to realize the potential of danmu as a participatory culture were suggested. This paper comprehensively analyzes danmu using research methods such as literature review and case studies, and through this, tries to derive insights on how participatory culture and danmu interact and evolve in modern society. Danmu, as a participatory medium, is an important tool that promotes individual and collective creation and interaction, and is pioneering a new boundary between the media industry and its users.

An analysis on the possession and infringement of copyright on the contents-related contest exhibit (콘텐츠 관련 공모전의 저작권 소유와 저작권 침해 분석)

  • Park, Keong-Cheol;Jung, Sun-Mee
    • Cartoon and Animation Studies
    • /
    • s.29
    • /
    • pp.243-266
    • /
    • 2012
  • As contest exhibits have been activated, a variety of organizations are holding contest with various purposes. Analysis on the guidelines prepared by various sponsoring bodies ranging from public organizations to privately owned businesses shows that sponsoring bodies tend to possess copyrights of entries. Parts of guidelines of contest exhibit are the contract. While sponsoring body shows its opinion on copyright through guidelines, individual participant tends to consider it simply as a form to submit for contest exhibit rather than a contract. Now is the time to bring out a question in respect of the copyright on the contest exhibit. The important fact is that copyright on corporate contents is important, but copyright on individual contents is equally important and it must be protected and respected. This study aims to bring out a question on copyright by analyzing possession and infringement of copyright that stands forth in the guidelines of contest exhibit. Provisions on copyright of contest exhibit play a role as a contract. Provisions on copyright of contest exhibit shall be the ones which can be understood and accepted by both sponsoring body and winner who are the A and B of a contract. For this, change in perception of sponsoring bodies ranging from public organizations to privately owned businesses with prominent position is strongly required. For the foregoing, First, Indication of Copyright: Clear and concrete terms must be used. Second, Scope of Interpretation: Concrete and detailed indication must be made for preventing indication that allows comprehensive interpretation. Third, Cost for Author's Property Right: In case sponsoring body needs to possess or use the author's property right of prize-winning work, proper rights on use considering prize money corresponding to possession or use of author's property right must be indicated. Fourth, Term of Use: The term for using author's property right must be indicated. Fifth, Scope of Rights: The scope of author's property right that sponsoring body requires must be limited and indicated. Sixth, Mutual Respect: Items related to copyright must be indicated on the basis of the concept of bilateral contract founded on mutual consideration and respect, not on the concept of unilateral contract.

Design of an RFID Communication Protocol Using Synchronized Chaotic Systems (동기화된 혼돈시스템을 이용한 RFID 통신 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.451-457
    • /
    • 2016
  • To improve security in the data communication field, many studies on the application of chaotic signals to encryption have been conducted in recent years. In this study, a new security protocol where the initial value sensitivity and noise similarity of chaotic signals have been applied to an RFID communication channel was designed. In the case of chaotic systems, if the initial values become identical, the same signals are generated at the same time after that point even though the two systems have been calculated independently. Therefore, an unpredictable security channel can be produced based on such characteristics. However, a security channel can be produced only when an initial value is shared in advance, and thus there is a potential problem of infringement during the transmission of the initial value. To resolve this problem, a method in which a certain proportion of new chaotic signals are applied to two chaotic systems for communication and are then synchronized after some time was proposed. This new method can conceal the initial value, and thus can resolve the problem of the existing communication method using chaotic signals. The designed method was verified with the encryption and decryption of images. It is expected that a more secure RFID system could be established by applying the communication protocol proposed in this study to insecure RFID communication channels.

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment (스마트 홈 환경에서 디바이스 상호 인증 및 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.661-667
    • /
    • 2018
  • Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.