• Title/Summary/Keyword: Software Copyright

Search Result 103, Processing Time 0.024 seconds

Analysis Method for Revision and Addition of the Specification to Appraisal (감정 대상 규격서의 수정 및 추가에 대한 분석 방법)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.37-44
    • /
    • 2020
  • As the information society develops, various cases of copyright infringement have occurred. In many disputes between companies, software similarity appraisal is dominated. This thesis is a study on the method of calculating the similarity of the standards subject to appraisal. In other words, it is a study to calculate the amount of revision and addition of the specification to be assessed. The analysis method compares the table of contents of both specifications and finds the same or similar part. The similarity weight is determined according to the degree of similarity. Weights identify and assign the degree of similarity between the expert's expertise and the specification. If it is completely newly added, the similarity weight is 1, if it is partially modified, the similarity weight is 0.4, and if it is almost the same as before, it is calculated by giving a weight of 0.05. Through this paper, it was found that the result of calculating the similarity to the specification is 21.2 pages.

A Study on the enforceability of Shrink-wrap License under the Contract Law of USA (미국(美國) 계약법(契約法)하에서 소위 "쉬링크랩라이센스" 계약(契約)에 관한 일고찰(一考察))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.20
    • /
    • pp.129-150
    • /
    • 2003
  • Software license agreements, to be useful in the mass market, could not be individually negotiated, and had to be standardized and concise. The software license agreement needs to be presented to the licensee-users in a fashion that would allow for mass distribution of software, also for it to enforceable, that would draw the users' attention to the terms and conditions under which the publisher allowed the use of the software. These needs have been accomplished, with or without fail, through so called the "shrink-wrap licenses" Shrink-wrap licenses purpose to transfer computer softwares to their users by defining the terms and conditions of use of the software without implicating the "first sale doctrine" of the Copyright Act. These shrink-wrap licenses have become essential to the software industry. However, in USA, the law applicable to these licenses has been unclear and unsettled. Courts have struggled to develop a coherent framework governing their enforceability. Meanwhile, the National Conference of Commissioners on Uniform State Laws ("NCCUSL") in USA promulgated the Uniform Computer Information Transaction Act ("UCITA") governing contracts for computer information transaction on July 29, 1999. One clear objective of UCITA was to settle the law governing the enforceability of shrink-wrap licenses. In these respects, this paper first introduces the various forms that shrink-wrap licenses take(at Part II. Section 1.), and explains the main advantages of them(at Part II. Section 2.) Here it shows how shrink-wrap licenses value themselves for both software publishers and users, including that shrink-wrap licenses are a valuable contracting tool because they provide vital information and rights to software users and because they permit the contracting flexibility that is essential for today's software products. Next, this paper describes the current legal framework applicable to shrink-wrap licenses in USA(at Part III). Here it shows that in USA the development of case law governing shrink-wrap licenses occurred in two distinct stages. At first stage, judicial hostility toward shrink-wrap licenses marked such that they were not enforced pursuant to Article 2 of the Uniform Commercial Code. At second stage, courts began to recognize the pervasiveness of shrink-wrap licenses, their indispensability to the rapidly expanding information technology industry, and the urgent need to enforce such licenses in order to maintain low prices for consumers of computer hardware or software, resulting in the recognition of shrink-wrap licenses. Finally, in view of the importance of UCITA, this paper examines how it will affect the enforceability of shrink-wrap licenses(at Part IV). The drafters of UCITA, as well as the scholars and practitioners who have criticized it, agree that it validates shrink-wrap licenses, provided certain procedural protections are afforded to purchasers. These procedural protections include the licensee end-user must (i) manifest his assent to the shrink-wrap license, (ii) have an opportunity to review the shrink-wrap license, (iii) have a right to return the product without costs.

  • PDF

Robust Audio Copyright Protection Technology to the Time Axis Attack (시간축 공격에 강인한 오디오 저작권보호 기술)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.201-212
    • /
    • 2009
  • Even though the spread spectrum method is known as most robust algorithm to general attacks, it has a drawback to the time axis attack. In this paper, I proposed a robust audio copyright protection algorithm which is robust to the time axis attack and has advantages of the spread spectrum method. Time axis attack includes the audio length variation attack with same pitch and the audio frequency variation attack. In order to detect the embedded watermark by the spread spectrum method, the detection algorithm should know the exact rate of the time axis attack. Even if there is a method to know the rate, it needs heavy computational resource and it is not possible to implement. In this paper, solving this problem, the audio signal is transformed into time-invariant domain, and the spread spectrum watermark is embedded into the audio in the domain. Therefore the proposed algorithm has the advantages of the spread spectrum method and it is also robust to the time axis attack. The time-invariant domain process is that the audio is arranged by log scale time axis, and then, the Fourier transform is taken to the audio in the log scale time axis. As a result, the algorithm can get the time-invariant watermark signal.

  • PDF

An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags (HTML 태그 순서를 이용한 불법 사이트 탐지 자동화 기술)

  • Lee, Kiryong;Lee, Heejo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1173-1178
    • /
    • 2016
  • Since the introduction of BitTorrent protocol in 2001, everything can be downloaded through file sharing, including music, movies and software. As a result, the copyright holder suffers from illegal sharing of copyright content. In order to solve this problem, countries have enacted illegal share related law; and internet service providers block pirate sites. However, illegal sites such as pirate bay easily reopen the site by changing the domain name. Thus, we propose a technique to easily detect pirate sites that are reopened. This automated technique collects the domain names using the google search engine, and measures similarity using Longest Common Subsequence (LCS) algorithm by comparing the tag structure of the source web page and reopened web page. For evaluation, we colledted 2,383 domains from google search. Experimental results indicated detection of a total of 44 pirate sites for collected domains when applying LCS algorithm. In addition, this technique detected 23 pirate sites for 805 domains when applied to foreign pirate sites. This experiment facilitated easy detection of the reopened pirate sites using an automated detection system.

A Watermarking for Text Document Images using Edge Direction Histograms (에지 방향 히스토그램을 이용한 텍스트 문서 영상의 워터마킹)

  • 김영원;오일석
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.2
    • /
    • pp.203-212
    • /
    • 2004
  • The watermarking is a method to achieve the copyright protection of multimedia contents. Among several media, the left documents show very peculiar properties: block/line/word patterning, clear separation between foreground and background areas. So algorithms specific to the text documents are required that meet those properties. This paper proposes a novel watermarking algorithm for the grayscale text document images. The algorithm inserts the watermark signals through the edge direction histograms. A concept of sub-image consistency is developed that the sub-images have similar shapes in terms of edge direction histograms. Using Korean, Chinese, and English document images, the concept is evaluated and proven to be valid over a wide range of document images. To insert watermark signals, the edge direction histogram is modified slightly. The experiments were performed on various document images and the algorithm was evaluated in terms of imperceptibility and robustness.

The Study or Solution For The Protection of S/W and SI Copyright (SI 저작권 중 S/W 보안을 위한 제도 및 기술적 방안에 관한 연구)

  • Kang, Jang-Mook;Yoo, Eui-Sang
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.363-368
    • /
    • 2002
  • 현재 정보(S/W, 컨테츠 등)의 이동은 지리적 한계와 거래비용(Transaction Cost)의 문제를 고려하지 않는다. 이는 정보 중심의 사회로 가는 견인차 역할을 하고 있는 통신 기술의 발전으로 가능하였다. 동시에 통신기술(Internet)의 발달은 S/W의 불법복제 등으로 인한 창작의욕 및 SI 산업 발전에 부정적인 영향을 주는 요인으로도 작용하고 있다. 이에 지속적인 SI 산업 발전을 위한 S/W의 효율적인 보호를 위해서는 기존의 제도적 연구(법률)와 기술적 연구(암호, 은닉기술, 등)를 종합적으로 고찰하여야 한다. 본 연구를 통하여 기존의 국내외 SI 관련 저작권과 S/W 보호를 위한 기술 그리고 법률적 해결방안을 종합적으로 함께 고찰하여 보다 효과적인 S/W 보안을 위한 정책적 시사점을 제시하고자 한다.

  • PDF

Computer Ethics in Computer Education (컴퓨터 윤리에 관한 연구)

  • Joo, Young-Ju;Lee, Kwang-Hi
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.2
    • /
    • pp.84-100
    • /
    • 1997
  • All technology has both intended and unintended effects, we have said, and information technology is no exception. Information technology offers a number of challenges: those of computer education, computer literacy, the ethical and societal impacts of computing and communication systems. Current computer education focuses primarily on the history, parts and usage of a computer, and programming, it does not fully include the moral standards or ethics that help guide behavior and conduct for citizens of Information society. The purpose of this study is to review of the theoretical issues and societal impacts of computers, communication systems and computer ethics; then, to nalyse current curriculum and content of school computer education in Korea: finally, to develop a possible course in computer ethics containing a goal statement and aspects of computer literacy. Contents in computer ethics covers issues of nettiquette, privacy, health, copyright-related software and network piracy, computer crime and viruses. Six suggestions are made for the computer ethics of Information Age in the conclusion.

  • PDF

Copyright Dispute Resolution with Musical Track Store (음원 트랙스토어 기반 2차 저작권 해결안)

  • Yi, Seung-taek;Kim, Inbum;Park, Sang-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.123-124
    • /
    • 2016
  • 음악은 원천적으로 합주가 매우 용이한 특성이 존재하므로 다수의 사람이 하나의 음악을 만들 수 있다. 따라서 자신이 기본 음악을 만든 뒤 음악 전문가가 제작한 사운드 트랙을 추가하면 음악적 품질이 쉽게 높아질 수 있다. 본 논문에서는 이러한 사운드 트랙을 쉽게 거래할 수 있는 효과적인 트랙스토어의 도입과 이에 따른 2차 저작권 침해 및 분쟁을 해결할 수 있는 방안을 제시한다. 이를 통해 전문가 수준과 버금가는 개인의 음악 제작, 유통, 소비를 활성화할 수 있고, 또한 이와 연관된 산업 및 문화의 확대 및 발전에 기여할 수 있다.

  • PDF

Design of P-ESD(Protection-ESD) System for Copyright Trusty Management (저작권 위탁 관리를 위한 P-ESD(Protection-ESD) 시스템 설계)

  • Park, Bok-Nyong;Kim, Jeong-Beom;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.875-878
    • /
    • 2002
  • 전자 상거래의 발전과 더불어 디지털화된 모든 컨텐츠는 인터넷을 통해 배포되어 이용되고 있다. 소프트웨어도 예외는 아니어서 기존에 오프라인을 통해 유통되던 소프트웨어들이 ESD(Electronic software Distribution)를 통해 온라인으로 유통되고 있다. 그러나 기존의 ESD 모델들은 소프트웨어의 불법복제문제를 해결하지 못하고 저작권보호에 미흡하다는 단점이 있다. 이에 본 논문에서는 ESD에 DRM기술을 사용하여 소프트웨어의 불법사용방지와 다양한 사용권한 제어가 가능한 P-ESD(Protection-ESD) 메커니즘을 제안한다. 제안한 모델은 불법사용을 방지하여 소프트웨어 저작권을 보호하고 다양한 지불방법을 제공한다.

  • PDF

Security of Image Information using Steganography and QR Code in IoT (IoT에서 스테가노그라피와 QR 코드를 이용한 영상 정보의 보안)

  • Im, Yong-Soon;Kang, Eun-Young;Park, Jae-Pyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.31-37
    • /
    • 2015
  • The security of the image information is very important in many areas of the IoT(Internet of Things), and study a number of ways to display the security (copyright, etc.). In this paper, information of image that is used by the IoT is converted to a DCT(Discrete Cosine Transform) and QC(Quantization Coefficient). And watermark (message) is to create a new encoded message(WMQR) through a QR Code. QC and WMQR applies LSB steganography techniques, can get the security (copyright, etc.) of image information. LSB steganographic techniques may be inserted according to a message (Watermark) to determine the location (Secret Key). The encoded image is sent to the recipient via the Internet. The reverse process can be obtained image and a QR code, a watermark (Message). A method for extracting a watermark from the security of the image information is coded using only the image and Secret Key, through the DCT and quantization process, so obtained by separating the watermark (Message) for the image. In this paper, we were able to improve the security of the method of image information, the image quality of the image by the simulations (PSNR), in turn, benefits were also normalized correlation (NC) and security.