• Title/Summary/Keyword: Transfer to a third party

Search Result 35, Processing Time 0.027 seconds

The Rules of Law on Warranty Liability in Contracts for the International Sale of Goods - With Special Reference to CISG - (국제물품매매계약에 있어서 하자담보책임에 관한 법리 - CISG를 중심으로 -)

  • Hong, Sung-Kyu
    • Journal of Arbitration Studies
    • /
    • v.24 no.4
    • /
    • pp.147-175
    • /
    • 2014
  • In contracts for the international sale of goods, a seller must deliver appropriate goods and hand over relevant documents according to a contract, which will transfer the ownership of the goods to a buyer. In this case, if there are defects in the contracted goods, the warranty liability will occur. However, in the United Nations Convention on Contracts for the International Sale of Goods (CISG), a term-the conformity of the goods to the contract-is used universally instead of the warranty. According to the CISG, a seller must deliver goods in conformance with the relevant contract in terms of quantity, quality, and specifications, and they must be contained in vessels or in packages according to the specifications in the contract. In addition, a certain set of requirements for conformity will be applied implicitly except when there is a separate agreement between parties. Further, the base period of conformity concerning the defects of goods is the point when the risk is transferred to the buyer. A seller shall be obliged to deliver goods that do not belong to a third party or subject to a claim then, and such obligations shall affect the right or claim of a third party to some extent based on intellectual property rights clauses. If the goods delivered by the seller lack conformity, or incur right infringement or claim of a third party, then it shall be regarded as a default item per the obligation of the seller. Thus, the buyer can exercise diverse means of relief as specified in Chapter 2, Section 3 (Article 45-Article 52) of the CISG. However, such means of relief have been utilized in various ways for individual cases as shown in judicial precedents made until now. Contracting parties shall thus keep in mind that it is best for them to make every contract airtight and they should implement each contract thoroughly and faithfully to cope with any possible occurrence of a commercial dispute.

  • PDF

Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments (이동 컴퓨팅 환경에서의 로컬 신뢰 센터 기반 효율적 이동 노드 인증 기법)

  • 노환주;이기현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4A
    • /
    • pp.528-538
    • /
    • 2000
  • Mobile computing system requires both precise identification and secure authentication scheme on remote mobile entities, which is based on the distributed mobile node. In this paper, existing discrete logarithm based $Schnorr^{[7]}$ like entity authentication schemes are improved by the analysis of performance and security on the hi-directional interactive proofs. And $EIGamal^{[14]}$ like efficient authentication schemes are also proposed. Then, these are enhanced with oblivious transfer based mono directional authentication schemes based on trusted third party for applying to the mobile agent based computing systems. Therefore, proposed schemes provide compatible performance and safety on mobile entity authentication processes.

  • PDF

An Implication of Policies for Farm Succession in Foreign Countries (외국의 농가 경영이양 지원 제도 고찰)

  • Hwang, Jeong Im;Choi, Yoon Ji;Youn, Min Hye
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.4
    • /
    • pp.939-965
    • /
    • 2014
  • Farm succession in the next generation has profound implications for the future structure of the agricultural industry and the procurement of agricultural human resources. Therefore, this study sought to suggest the policy directions for farm succession through investigating the foreign policies and comparing it with Korean policies. The followings were derived from the comparison analysis. First, support is required in establishing master plans for farm succession from operators to successors. Second, it is needed to develop and disseminate effective model for farm succession. Third, an assistance policy for farm households without successors should be initiated. Fourth, the fragmentation of farmland ownership should be counteracted.

광주·전남의 구급대 활동분석 및 발전방안

  • Park, Hui-Jin;O, Yong-Gyo
    • The Korean Journal of Emergency Medical Services
    • /
    • v.1 no.1
    • /
    • pp.71-86
    • /
    • 1997
  • This study is to suggest some developmental policies by analyzing the activities of first aid party in Kwangju and Chonnam regions for two years from Jan. 1, 1991 to the end of December, 1995. First, the residents in Kwangju and Chonnam regions have the sufficient benefits of emergency medical center, but it will be desirable that general hospital should be established and managed in Kohung peninsula which forms the wide island area far away from big cities. Second, the classification of the degree of severe case in the field by rescue members should be strengthened as the means which can reduce the number of patients transferred to the emergency room and the legal method which rescue members can select the medical agency. Third, children less than 10 are most frequent emergent patients and it is due to parent's indifference and children's in sensibility to safety. So the safely education in the course of infant and elementary education should be strengthened and the method which can keep the self safety through the legal system. Fourth, to increase the rate of emergency measure by rescue members, the reasons of fail of emergency treatment are suggested, the treatment results of each rescue member are analyzed every year and it is desirable that the system which can evaluate the personal ability should be introduced. Fifth, the medical accidents occurred in the case of medical act, by rescue members must lake the legal responsibility, but such a problem can he solved with the compensation of insurance system by government. Sixth, to reduce the time required for transfer, traveling service system for the fixed period in beach should be complemented and extended more and service system at ordinary times should be examined at mountains, the area of traffic jams and large special industrial park. Seventh, since service system with one team of two members of 119 rescue party in expressway cannot be mobilized when multiple accidents occur at the same time, it is considered that service system of two teams of four members should be extended. Eighth, first-aid service in expressway is conducted with rescue and emergency treatment by the rescue party at the same time, but the professional rescue lacks and it may result in the injury of patients. Therefore the creation of rescue party in expressway is the urgent problem.

  • PDF

Handoff signaling implementation using H.323 rerouting in IP-based network (IP 기반 망에서 H.323 리라우팅을 이용한 핸드오프 시그널링 구현)

  • Lee, Yeong-Sin;Choi, Gi-Moo
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.821-830
    • /
    • 2001
  • H.323 proposes to use Mobile IP and H.323 ad hoc conference signaling to provide Handoff function to a mobile terminal. But H.323 ad hoc conference signaling has a drawback. It requires an H.323 endpoint to do a complex conference signaling which makes inter-operability between H.323 endpoints difficult and takes the longer signaling time. In this paper, we propose an Handoff signaling using H.323 rerouting(Third party initiated Pause and Rerouting). H.323 rerouting signaling only requires an H.323 endpoint to do H.323 basic signaling in reestablishing media channel, and makes inter-operability more easier and provides the faster Handoff. To do this, our H.323 GK has derived H.245 control channel using tunneling for all H.323 calls including the fast connect calls which enable endpoints communicate each other if they don\`t have H.245 control channel. In order to evaluate the performance of the proposed signaling, we have conducted an experiment that compares a call transfer signaling using H.323 rerouting with ad hoc conference signaling in inter-operability and signaling delay. The results of our experiment shows that the call transfer signaling can inter-operate with four H.323 endpoints among five H.323 endpoints of other vendors and reduces the signaling delay average 1.4 sec.

  • PDF

Effect of Delivery Application Quality on Application Trust, Delivery Rider Trust, and Intention to Use: Focused on Trust Transfer in Online Platform Logistics (배달 애플리케이션 품질이 애플리케이션 신뢰, 라이더 신뢰 그리고 사용의도에 미치는 영향 : 온라인 플랫폼 물류에서의 신뢰 이전을 중심으로)

  • SEO, Won-Tae
    • The Korean Journal of Franchise Management
    • /
    • v.12 no.4
    • /
    • pp.41-54
    • /
    • 2021
  • Purpose: Delivery food orders are on the rise due to the COVID 19 pandemic. Many customers are ordering food through delivery apps rather than visiting restaurants to eat out. Delivery application platforms are growing due to the development of O2O. Most of the people who provide gig worker for delivery applications are rider. Rider provides labor on their own terms and have more work flexibility and autonomy than ordinary workers. Trust can be transferred from a well-known entity to an unknown entity. From the customer's point of view of using the delivery application, trust can be seen through the third-party trust of the delivery application platform-rider-customer. Therefore, this study intends to investigate the effect on delivery application trust and rider trust through the well-known characteristics of delivery applications. Research design, data, and methodology: This study was conducted on Korean consumers over 20 years of age who have ordered food through a delivery application for the past month. After educating 5 investigators about the purpose of this study, 60 copies of the survey were conducted per person. During the investigation period, from September 2 to September 26, 2021, 322 copies were collected over 25 days. Among the collected questionnaires, 37 were excluded from insincere or partially unanswered, and 285 were used for analysis. In addition, the collected data were analyzed using SPSS 25.0 and AMOS 25.0. Result: As a result of the study, convenience, price, and variety of restaurants were found to have a significant positive (+) effect on app trust, but design did not have a significant effect on app trust. Also, it was found that convenience had a significant positive (+) effect on trust in rider, but design, price, and variety of restaurants did not have a significant effect. App trust was found to have a significant positive (+) effect on rider trust and intention to use, and it was found to have a significant positive (+) effect on rider trust and intention to use. Conclusions: First, this study established a structural framework between delivery application characteristics-delivery-app trust-rider trust-intention to use. Second, in this study, it was found that customer trust in well-known delivery applications was transferred to less-known rider trust. Third, the delivery application should increase the convenience of use. Fourth, delivery application should set the delivery fee appropriately. Fifth, delivery application must continuously train the rider.

Secure biometric information delivery scheme of implantable device using code-division multiplexing method (코드 분할 다중화 방식을 이용한 체내삽입장치의 안전한 생체 정보 전달 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.235-241
    • /
    • 2016
  • Among recent issues emerging in the areas related to the society, health has received the most attention. In this paper, for a patient unable to do self-care because of worsened diseases, a biological information transfer method is proposed by which the disease information can be securely managed, by attaching an implantable device into the body. Our method object of the invention is to prevent a third party from illegally intercepting and interfering with the biological information attached to the insertion device in the body. In the proposed technique to improve the safety of the patient between the hospital and physician by assigning each code to the biometric information of the patient in order to prevent a third party tapping and interfering. In addition, our method is assigned a code necessary for encoding in advance to confirm the biological information between the patient and the hospital (doctor) in a manner dividing the bio-information code. In particular, the proposed technique makes a third party unable to illegally tap or interfere in, by previously generating a code used for encoding so that it can be stored in the database of the hospital, which not only decreased hospital care time to 6.9%, but also increased work efficiency rate up to 12.7%.

A Study on Time Conviction Based on PKI for Suitable IMT-2000 Service (IMT-2000 서비스에 적합한 PKI 기반 시점확인 서비스에 관한 연구)

  • 이덕규;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.211-222
    • /
    • 2004
  • By development of wireless mobile communication, many users increased. But, in case of 1st generation or 2nd generation, transfer communication service was not satisfying high speed wireless internet Communication consumer's request such as other multimedia service because serviced based on voice and text basically. Can get through service such as data and transfer multimedia service that is not service of voice putting first in wireless hereafter. Problems by much development of service are happening, because a transmit is exposed, problem point that wireless network is much unlawful stealing use and tapping etc. As is different from this, problem can happen in service side. Can take next time for these example. By user that is not right can happen. Need method to keep away purpose that is enemy of third party in contract between both men as well as problem for document or accounting information which the third user that is enemy of third party is shared. By solution about problems, certification of contents for document and visual point confirmation must it. Applied service or certification of contents service that is rapidly point of time that is using in wire to solve problem that refer in front in this treatise in IMT-2000 to develop hereafter. Way to propose proposed efficient way using individual in IMT-2000 just as it is.

  • PDF

Generic Constructions for Strong Designated Verifier Signature

  • Feng, Deng-Guo;Xu, Jing;Chen, Wei-Dong
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.159-172
    • /
    • 2011
  • A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer such that no one but the designated verifier can verify the signer's signatures. In this paper we present two generic frame works for constructing strong designated verifier signature schemes from any secure ring signature scheme and any deniable one-pass authenticated key exchange protocol, respectively. Compared with similar protocols, the instantiations of our construction achieve improved efficiency.

A Study on Estimation and Management of Loss Due to Catastrophic Accident (화학공장의 중대사고에 따른 예상손실액 산정 및 대책연구)

  • 구남주;엄성인;고재욱
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.4
    • /
    • pp.120-125
    • /
    • 1999
  • This study evaluated the effect of the accidents caused by fire, explosion, and toxic gas release by using SuperChems, quantitative hazardous material release modeling software, which estimates the potential area of damage. According to the loss severity, the appropriate risk management principles can be applied. Risk management is divided into the two methods which are risk control and risk financing. Risk control includes risk avoidance, risk spreading and diversification, and risk reduction. Risk financing includes risk retention and risk transfer. The results of this study can help the related company determine the appropriate reserve fund and the amount to be insured against the third party losses according to the estimated loss severity.

  • PDF