• Title/Summary/Keyword: Recognition of Copyright

Search Result 30, Processing Time 0.025 seconds

Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines (다수의 가상머신을 이용한 토르 트래픽 수집 시스템 설계 및 구현)

  • Choi, Hyun-Jae;Kim, Hyun-Soo;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • We intend to collect and analyze traffic efficiently in order to detect copyright infringement that illegally share contents on Tor network. We have designed and implemented a Tor traffic collection system using multiple virtual machines. We use a number of virtual machines and Mini PCs as clients to connect to Tor network, and automate both the collection and refinement processes in the traffic collection server through script-based test client software. Through this system, only the necessary field data on Tor network can be stored in the database, and only 95% or more of recognition of Tor traffic is achieved.

A Study on the Activation Plan for Legal Deposit in National Assembly Library of South Korea: Focusing on Thesis and Dissertation (국회도서관 납본 활성화 방안에 관한 연구 - 디지털 학위논문을 중심으로 -)

  • Lee, Seungmin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.73-93
    • /
    • 2019
  • This study empirically analyzed the recognition and current status of university libraries related to the legal deposit of thesis and dissertation and investigated the ways to activate legal deposit to National Assembly Library. As a result, most universities conduct legal deposit of thesis and dissertation. However, most librarians face difficulties resulted from the duplication of deposits to many institutions. In the case that the deposits are not made, the main reasons are the university library's policies, duplication and inefficiency of the deposit procedures, and the limitation of obtaining copyright agreements. In order to address these limitations and to maximize the social and informational values of thesis and dissertation, this research proposed approaches to legal deposit of thesis and dissertation, including strengthening digital deposit system through the establishment of independent legal deposit law, preparing the effective ways of preservation. constructing an integrated deposit system, and developing professional collection of thesis and dissertation which can consolidate National Assembly Library.

Study on the Convenient Interface to the University Web-based Library System (Web을 기반으로 한 대학교 도서관 시스템에 있어서 용이한 인터페이스에 관한 연구)

  • 이현정;정재욱
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.93-100
    • /
    • 2002
  • The University's web library is a form of library that enables to deal with information about searching loaning, returning of books or data housed in it through web. With the advent of the network and multimedia following the entrance to an information-oriented society, we are experiencing a big change in how to communicate and acquire information. Massive multimedia information transmitted by image and moving picture through the network, made it possible to overstep the limit of the physical gap between information suppliers and users. Despite this important role, it is accompanied by problems such as copyright, scarcity of recognition, paralysis of infra, technical matters and reliability which demand development. In this thesis, according to the State University Evaluation Standards, search node and user interface by system used in 20 different universities possessing web-based library sites were compared are analysed. On the basis of this, an experimental user interface for web-based University libraries was produced, and various questionnaires and data leer this produced interface were collected, classified and analyzed. With the application of the results for the work above to the general search system interface of the web-based library, we proposed a new user interface that contains the following functions, such as location and loan condition of books, search frequency and steps for purchasing books inside the web library.

  • PDF

A Reference Frame Selection Method Using RGB Vector and Object Feature Information of Immersive 360° Media (실감형 360도 미디어의 RGB 벡터 및 객체 특징정보를 이용한 대표 프레임 선정 방법)

  • Park, Byeongchan;Yoo, Injae;Lee, Jaechung;Jang, Seyoung;Kim, Seok-Yoon;Kim, Youngmo
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1050-1057
    • /
    • 2020
  • Immersive 360-degree media has a problem of slowing down the video recognition speed when the video is processed by the conventional method using a variety of rendering methods, and the video size becomes larger with higher quality and extra-large volume than the existing video. In addition, in most cases, only one scene is captured by fixing the camera in a specific place due to the characteristics of the immersive 360-degree media, it is not necessary to extract feature information from all scenes. In this paper, we propose a reference frame selection method for immersive 360-degree media and describe its application process to copyright protection technology. In the proposed method, three pre-processing processes such as frame extraction of immersive 360 media, frame downsizing, and spherical form rendering are performed. In the rendering process, the video is divided into 16 frames and captured. In the central part where there is much object information, an object is extracted using an RGB vector per pixel and deep learning, and a reference frame is selected using object feature information.

A Study on Protection of Iris and fingerprint Data Based on Digital Watermarking in Mid-Frequency Band (중간 주파수 영역에서의 디지털 워터마킹 기법에 의한 홍채 및 지문 데이터 보호 연구)

  • Jeong, Dae-Sik;Park, Kang-Ryoung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1227-1238
    • /
    • 2005
  • Recently, with the advance of network and internet technologies, it is appeared the Problem that the digital contents such as image, voice and video are illegally pirated and distributed. To protect the copyright of the digital contents, the digital watermarking technology of inserting the provider's information into the contents has been widely used. In this paper, we propose the method of applying the digital watermarking into biometric information such as fingerprint and iris in order to prevent the problem caused by steal and misuse. For that, we propose the method of inserting watermark in frequency domain, compare the recognition performance before and aster watermark inserting. Also, we experiment the robustness of proposed method against blurring attack, which is conventionally taken on biometrics data. Experimental results show that our proposed method can be used for protecting iris and fingerprint data, efficiently.

  • PDF

The Server based Realtime Biometric Signature Scheme (서버 기반 실시간 바이오메트릭 서명 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.173-179
    • /
    • 2013
  • In a biometric authentication scheme, a user's biometric data that is unique to the user is used to prove the user's identity to the third party. Since the user should have to participate in every authentication sessions, it's not possible to delegate other users to authenticate instead of himself/herself. In a biometric signature scheme, contrary to authentication scheme, a user's biometric data is used to prove that "this message is signed by the signer who claims to be" to the third party. However, once the biometric key is created, it can be accessed by the signer. Thus, it's possible to lend the biometric key to other users. In this study, the server based biometric realtime signature scheme is proposed. The proposed scheme can be applied to sign the vote in electronic voting or to authenticate the copyright owner in DRM enabled mobile commerce where the proxy signatures are not allowed.

A Study on the enforceability of Shrink-wrap License under the Contract Law of USA (미국(美國) 계약법(契約法)하에서 소위 "쉬링크랩라이센스" 계약(契約)에 관한 일고찰(一考察))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.20
    • /
    • pp.129-150
    • /
    • 2003
  • Software license agreements, to be useful in the mass market, could not be individually negotiated, and had to be standardized and concise. The software license agreement needs to be presented to the licensee-users in a fashion that would allow for mass distribution of software, also for it to enforceable, that would draw the users' attention to the terms and conditions under which the publisher allowed the use of the software. These needs have been accomplished, with or without fail, through so called the "shrink-wrap licenses" Shrink-wrap licenses purpose to transfer computer softwares to their users by defining the terms and conditions of use of the software without implicating the "first sale doctrine" of the Copyright Act. These shrink-wrap licenses have become essential to the software industry. However, in USA, the law applicable to these licenses has been unclear and unsettled. Courts have struggled to develop a coherent framework governing their enforceability. Meanwhile, the National Conference of Commissioners on Uniform State Laws ("NCCUSL") in USA promulgated the Uniform Computer Information Transaction Act ("UCITA") governing contracts for computer information transaction on July 29, 1999. One clear objective of UCITA was to settle the law governing the enforceability of shrink-wrap licenses. In these respects, this paper first introduces the various forms that shrink-wrap licenses take(at Part II. Section 1.), and explains the main advantages of them(at Part II. Section 2.) Here it shows how shrink-wrap licenses value themselves for both software publishers and users, including that shrink-wrap licenses are a valuable contracting tool because they provide vital information and rights to software users and because they permit the contracting flexibility that is essential for today's software products. Next, this paper describes the current legal framework applicable to shrink-wrap licenses in USA(at Part III). Here it shows that in USA the development of case law governing shrink-wrap licenses occurred in two distinct stages. At first stage, judicial hostility toward shrink-wrap licenses marked such that they were not enforced pursuant to Article 2 of the Uniform Commercial Code. At second stage, courts began to recognize the pervasiveness of shrink-wrap licenses, their indispensability to the rapidly expanding information technology industry, and the urgent need to enforce such licenses in order to maintain low prices for consumers of computer hardware or software, resulting in the recognition of shrink-wrap licenses. Finally, in view of the importance of UCITA, this paper examines how it will affect the enforceability of shrink-wrap licenses(at Part IV). The drafters of UCITA, as well as the scholars and practitioners who have criticized it, agree that it validates shrink-wrap licenses, provided certain procedural protections are afforded to purchasers. These procedural protections include the licensee end-user must (i) manifest his assent to the shrink-wrap license, (ii) have an opportunity to review the shrink-wrap license, (iii) have a right to return the product without costs.

  • PDF

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.

A Study on Arbitration Qualification of Intellectual Property Right Dispute - Focus on Korea and China - (지적재산권분쟁의 중재적격에 관한 연구 -한국과 중국을 중심으로-)

  • Choi, Song-Za
    • Journal of Arbitration Studies
    • /
    • v.21 no.2
    • /
    • pp.27-46
    • /
    • 2011
  • In the intellectual based society of the 21th century, intellectual property of nation and enterprise management has been the key element of nation's competitiveness and development. Therefore in countries like Korea, China, and many other countries, intellectual property of advancement strategy are being constructed and intellectual properties are protected at national level. Top priority task of protecting the intellectual property is to efficiently resolute intellectual property right disputes. Considering the nature of intellectual property right and arbitrage system, arbitration to solve intellectual property disputes is realistically the best method. However, not all cases of them are qualified. In order to relieve the intellectual property disputes through arbitration, qualification must be obtained. During the process, generally and globally, intellectual property right dispute is evaluated by three parts, intellectual property right contract dispute, intellectual property right violation dispute, and intellectual property right validity dispute. Based on UN's "Convention on the Recognition and Enforcement of Foreign Arbitral Awards Agreement" in 1958, June 10th, in New York, both arbitrage organization and judgment can be approved in both Korea and China countries. However, as of today, there is a big gap of arbitration qualification between two countries, which can be troublesome if intellectual property right disputes arise. For instance, in Korea, intellectual property right contract disputes and intellectual property right violation disputes are both generally accepted as arbitration qualification. However for intellectual property right validity dispute, arbitration qualification is only accepted for non-registered intellectual property as in copyright entity. It does not apply to other registered intellectual property right as in patents. In China, arbitration qualification is accepted for intellectual property right contract dispute, and also accepted for intellectual property right violation dispute to copyrights but restricted to others. As for intellectual property right validity dispute, arbitration qualification is completely denied. Therefore, when there is an intellectual property right dispute between Korea and China, the biggest problem is whether China will accept arbitrage judgments made in Korea. Theoretically, arbitrage judgement made in Korea should be also accepted in China's court. However, considering the criticism of China's passive nature of arbitration qualification for its own local intellectual property right disputes, it's very unlikely they'll actively accept arbitrary judgment made in foreign countries. Korea and China must have a more open minded approach for intellectual property disputes and arbitration qualification. Base on WTO's Intellectual Property Right Agreement, it's being defined as private right. Therefore, sovereign principle should be the basic principle of solving intellectual property right disputes. Currently, arbitration qualification is expanding internationally. So both Korea and China must also follow the trend expand the arbitration qualification with a more open minded and forward looking approach, for the good of intellectual property disputes.

  • PDF

The Hague Convention on Jurisdiction and Enforcement, of Judgments

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.16 no.1
    • /
    • pp.343-373
    • /
    • 2006
  • 지적재산권의 속지주의 원칙에 따라 전통적으로 지적재산권의 침해에 있어서 결과의 발생이 없는 행위지를 침해지로 인정하지 않았다. 어문과 예술작품을 보호하기 위해 1886년 체결된 베른협약(Berne Convention for the Protection of Literary and Artistic Works) 제5조 제1항은 저작자가 베른협약에 따라 보호되는 저작물에 관하여 본국 이외의 동맹국에서 각 법률이 현재 또는 장래에 자국민에게 부여하는 권리 및 이 협약이 특별히 부여하는 권리를 향유한다고 규정하여 내국민대우원칙을 천명하고 있다. 또한 베른협약 제5조 제2항은 저작권의 보호와 향유는 저작물의 본국에서 보호가 존재하는 여부와 관계가 없이, 보호의 범위와 저작자의 권리를 보호하기 위하여 주어지는 구제의 방법은 오로지 보호가 주장되는 국가의 법률의 지배를 받는다라고 규정하여 저작권 침해가 발행한 국가의 법률의 적용을 명시하고 있다. 인터넷과 무선통신 기술의 발달은 저작물을 디지탈 형식으로 실시간에 전세계에 배포하는 것을 가능하게 하였다. 특히 저작물의 인터넷상에서의 배포는 다국적 저작권 침해행위를 야기하여, 저작권자가 다수의 국가에서 저작권 침해소송을 제기하여 판결을 집행하는 것이 필요하게 되었다. 헤이그국제사법회의(Hague Conference on Private International Law)에서 1992년부터 논의되어 온 민사 및 상사사건의 국제재판관할과 외국판결에 관한 협약(Convention on Jurisdiction and Foreign Judgment in Civil and Commercial Matters)에서 채택된1999년의 예비초안(preliminary draft) 및 2001년 외교회의에서 수정된 잠정초안(Interim text) (이하 헤이그 협약 )은 저작권자가 저작권침해행위가 발생한 각 국가에서 저작권 침해행위를 금지하는 소송을 제기할 필요없이, 동 협약의 한 가맹국가의 법원의 저작권침해금지판결을 다른 가맹국가에서도 집행할 수 있는 가능성을 제시해 주는데 의미가 있다. 헤이그 협약 제10조는 불법행위(torts)에 관한 일반적인 재판관할에 관한 규정을 두고 있으며, 저작권침해에 관한 분쟁은 동 조항의 적용을 받는다. 제10조에 의해 당사자는 가해행위지 국가의 법원 또는 결과발생지 국가의 법원에서 소송을 제기할 수 있다. 결과발생지의 경우 제10조 1항 (b)는 피고가 자신의 행위가 본국의 법규에 비추어 동일한 성격의 손해를 초래할 수 있다라고 합리적으로 예견할 수 없었던 경우에 본 조항의 적용을 배제하고 있다. 인터넷을 통한 저작권침해의 경우, 피고가 자신의 국가의 법규하에서 합법적으로 저작물을 웹사이트에 게시하였으나, 그 행위가 다운로딩이 행해진 국가에서 불법인 경우, 피고는 저작권침해를 예견할 수 없었으므로 이에 문제가 제기된다. iCrave TV사건에서, 피고인 캐나다회사가 미국 및 캐나다에서 방송되는 텔레비젼 방송 프로그램을 자신의 웹사이트에 게시하여 이용자들로 하여금 컴퓨터를 통하여 방송을 재시청 할 수 있도록 하였는데 이는 캐나다에서 합법인 반면에 미국에서는 저작권 침해에 해당한다. 피고는 방송 프로그램을 인터넷상에서 재방송하는 것은 캐나다법상 합법이므로 저작권침해를 예견할 수 없었다고 주장하면서, 해당 사이트에 오직 캐나다 거주자만의 접속을 허용하고 미국 거주자의 접속을 제한하는 일련의 Click-Wrap 계약과 스크린 장치를 제공하였다고 주장하였다. 본 사건 피고의 주장을 받아들인다고 가정할 때, 제10조 1항(b)에 의해 원고는 결과발생지인 미국법원의 재판관할을 강제할 수 없을 것이다. 지적재산권을 둘러싼 분쟁에 관한 재판관할과 국제법상의 판결의 승인 및 집행의 통일성을 기하기 위하여 2001년 1월 세계지적재산권기구(World Intellectual Property Organization)가 제안한 WIPO 협약초안(Draft Convention on Jurisdiction and Recognition of Judgments in Intellectual Property Matters)은 헤이그 협약이 재판관할과 판결의 승인 및 집행에 대한 일반적인 접근을 하고 있는 점에 반하여 지적재산권자의 보호라는 측면을 고려하여 지적재산권침해소송에 국제재판관할권을 규정하고 있다. WIPO 협약초안 제6조는 저작권자가 저작권 침해를 막기 위한 합리적인 조치를 취한 국가에서 저작권 침해소송을 피할 수 있다고 규정하고 있다. 따라서 본 조항에 의할 경우, iCrave TV사건의 피고는 미국에서의 저작권 침해소송을 회피할 수 있을 것이다. 이상과 같이 헤이그 협약이 외국판결의 승인 및 집행을 가능하게 하고 있음에도 불구하고, 외국법원의 판결이 다수의 가맹국가에서 집행되지 못하는 가장 큰 장애는 대다수의 국가들이 외국법원의 판결이 공서양속(Public Policy)에 반하는 경우 판결을 승인하지 않는 예외규정을 두고 있기 때문이다. 미국의 경우, Uniform Recognition Act와 Restatement(Third) of Foreign Relations에 따른 공서양속의 예외규정(Public Policy exception)은 외국법원의 판결의 승인을 부인하는 근거가 된다. Yahoo! 사건에서 Yahoo! Inc.의 옥션 사이트를 통해 독일 나치 소장물의 판매가 이루어졌는데, 프랑스 형법상 이는 범죄행위에 해당하므로, 프랑스 법원은Yahoo! Inc.에게 프랑스 이용자가 당해 옥션 사이트에 접속할 수 없도록 모든 가능한 조치를 취할 것을 명하였다. 이에 미국 법원은 프랑스 법원의 판결은 Yahoo! Inc.의 미국헌법 제1 수정(First Amendment)의 언론의 자유(freedom of speech)에 반하므로 판결의 집행을 거부하였는데 이는 공서양속의 예외규정을 보여주는 예이다. 헤이그 협약 제28조와 WIPO 협약초안 제25조 또한 공서양속의 예외규정을 두고 있다. 본 논문은 인터넷과 통신기술의 발달로 야기되는 다국적 저작권 침해사건에서 한 국가의 법원의 저작권 침해금지판결이 다수의 국가에서 승인 및 집행될 수 있는 능성을 헤이그 협약과 WIPO 협약초안 및 미국판결을 중심으로 살펴보았다. 국제적으로 통일된 저작권법이 존재하지 않고 외국 판결의 승인을 부인하는 예외조항과 외국판결의 집행에 관한 각국의 이해관계와 준거법의 해석이 다른 현시점에서 지적재산권의 속지주의를 뛰어넘어 외국법원의 판결을 국제적으로 집행하는 것은 다소 어려움이 있어 보이나 국제적인 집행가능성의 열쇠를 제시하는 헤이그 협약과 장래의 국제조약에 그 기대를 걸어볼 수 있겠다.

  • PDF