• Title/Summary/Keyword: illegal copy

Search Result 99, Processing Time 0.028 seconds

Dynamic License Control in Online Electronic Software Distribution (소프트웨어 온라인 전자 유통에서의 동적 사용권 관리 기술)

  • Ha, Young-Guk;Lim, Shin-Young;Ham, Ho-Sang;Park, Hyo-Joon;Kim, Tai-Yun
    • IE interfaces
    • /
    • v.13 no.1
    • /
    • pp.133-140
    • /
    • 2000
  • As the internet dramatically grows, internet electronic commerce is being increased. But, as products distributed with ESD(Electronic Software Distribution) are in the form of electronic file, it is difficult to prohibit illegal copy of products. Therefore, new technology is needed to distinguish legal products from illegal ones. In this paper, we present the ESD's requirements, characteristics and a new dynamic license management technology to prevent illegal copy.

  • PDF

An Anonymous Fingerprinting Scheme with a Robust Asymmetry

  • Park, Jae-Gwi;Park, Ji-Hwan;Kouichi Sakurai
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.620-629
    • /
    • 2003
  • Fingerprinting schemes are techniques applied to protect the copyright on digital goods. These enable the merchants to identify the source of illegal redistribution. Let us assume the following situations connectedly happen: As a beginning, buyer who bought digital goods illegally distributed it, next the merchant who found it revealed identity of the buyer/traitor, then the goods is illegally distributed again. After this, we describe it as“The second illegal redistribution”. In most of anonymous fingerprinting, upon finding a redistributed copy, a merchant extracts the buyer's secret information from the copy and identifies a traitor using it. Thus the merchant can know the traitor's secret information (digital fingerprints) after identification step. The problem of the second illegal distribution is that there is a possibility of the merchant's fraud and the buyer's abuse: that is a dishonest employee of the merchant might just as well have redistributed the copy as by the buyer, or the merchant as such may want to gain money by wrongly claiming that the buyer illegally distributed it once more. The buyer also can illegally redistribute the copy again. Thus if the copy turns up, one cannot really assign responsibility to one of them. In this paper, we suggest solution of this problem using two-level fingerprinting. As a result, our scheme protects the buyer and the merchant under any conditions in sense that (1) the merchant can obtain means to prove to a third party that the buyer redistributed the copy. (2) the buyer cannot worry about being branded with infamy as a traitor again later if he never distribute it.

  • PDF

The Study on Countermeasures Against the Infringement of Rights of the Transmission and Reproduce on the Han Wave Contents in the China Market (중국 시장 내 한류 방송 콘텐츠의 전송권 및 복제권 침해 대응 연구)

  • Lee, Jae-Ho;Kim, Hee-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.6
    • /
    • pp.33-46
    • /
    • 2019
  • The purpose of this study is to analyze how China, which is the largest consumption area of Hallyu broadcasting contents but the most illegal copy market infringe the rights of domestic broadcasters and what of the policy of regulatory authority in this illegal market. To this end, this study investigate the most common types of paths and methods of copyright infringement in the Internet and mobile multi-platform environments, and investigated how broadcasters responded to them with in-depth interviews. As a result of research, the most frequent type of infringement of rights of reproduction were to use links with web and apps and TV pads. In this regard, it was not easy to solve the problem of illegal copy in China in the way that domestic companies responded to individually, and it was very rare that the lawsuit was filed. In the future, the government will need to provide side support for Korean Wave broadcasting contents through steady monitoring as well as market research for eradication of illegal copy.

Secure Knowledge Management for Prevent illegal data leakage by Internal users (내부 사용자에 의한 불법 데이터 유출 방지를 위한 안전한 지식관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Lee, Min-Kyung;Yoon, Mi-Yeon;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.73-84
    • /
    • 2010
  • Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.

Moral Judgment and Intention to Make Illegal Copies of Smart Phone Applications (스마트폰 애플리케이션 불법복제에 대한 소비자의 도덕적 판단과 불법복제의도 -전북지역 대학생을 중심으로 한 사례분석)

  • You, So-Ye;Sun, Ying-Hua
    • The Korean Journal of Community Living Science
    • /
    • v.22 no.4
    • /
    • pp.655-668
    • /
    • 2011
  • Although consumer ethical behavior related with illegal copies of digital software has been considered to be an important issue, not many studies have attempted to examine the issue. Firstly, this study attemped to explain the moral judgment and intention to make illegal copies of smart phone applications for college students. Secondly, psychological factors such as moral intensity and perceived risk related to making illegal copies were tested to be significantly different in individual characteristics such as experience of ethical education and past experience of making illegal copies of software, sex, age and household income. Thirdly, the effect of related factors such as psychological factors and individual characteristics was estimated to significantly influence moral judgment and intention to make illegal copies. Two step method(using LIMDEP program) was applied to estimate the model as a structural equation model. According to the results of this study, magnitude of consequences, financial risk and performance risk were found to be significantly different in income groups(less than middle class vs more than middle class). Prosecution risk was found to be significantly different in gender groups(female vs male). In addition, social consensus, financial risk, performance risk and prosecution risk were found to be significantly different in ethical education groups(experience vs no experience). Furthermore, moral judgment for making illegal copies of smart phone applications was found to be significantly influenced by income, ethical education, magnitude of consequences, temporal immediacy and social consensus. And intention to make illegal copies of smart phone applications was found to be significantly influenced by moral judgment, age, financial risk, performance risk and prosecution risk.

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Rotated Video Detection using Multi Region Binary Patterns (이중 영역 이진 패턴을 이용한 회전된 비디오 검출)

  • Kim, Semin;Lee, Seungho;Ro, Yong Man
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.9
    • /
    • pp.1070-1075
    • /
    • 2014
  • Due to a number of illegal copied videos, many video content markets have been threatened. Since this copied videos have intercepted the profits of the content holders, content developers lose the will to generate new contents. Therefore, video copy detection approaches have been developed to protect the copyrights of video contents. However, many illegal uploader who generate copied videos used video transformations to avoid video copy detection systems. Among of the video transformations, rotation and flipping did not distorted the quality of video contents. Thus, these two video transformations were adopt to generate copied video. In order to detect rotated or flipping copy videos, rotation and flipping robust region binary pattern (RFR) recently was proposed. But, this RFR has a weakness according to rotated angles. Therefore, in order to overcome this problem, multi region binary patterns are proposed in this paper. The proposed method has the similar performance with the original RFR. But, it showed much higher efficiency for memory spaces.

The Secure Chip for Software Illegal Copy Protection (소프트웨어 불법복제방지를 위한 보안칩)

  • 오명신;한승조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.87-98
    • /
    • 2002
  • Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.

Implementation of Play and Copy Control of DMB contents using Watermarking and Encryption on PMP (워터마킹과 암호화를 이용한 DMB 콘텐츠의 재생 및 복사 제어를 PMP에 구현)

  • Jeong, Yong-Jae;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.52-57
    • /
    • 2009
  • Recently, the regular service of a terrestrial digital multimedia broadcasting(T-DMB) made faster distribution of T-DMB receiver. The problem of an illegal distribution is increasing owing to a large distribution of T-DMB receiver. In this paper, we propose a watermarking and encryption method on T-DMB bit-stream for a copy and Play control to prevent an illegal distribution of T-DMB contents. We implement our proposed method on a portable multimedia player (PMP) which has T-DMB receiver. The proposed method insert the encrypted information for control of copy and play after finding padding area of program map table (PMT) and program association table (PAT) from analysis of transport stream (TS) of T-DMB. In implementation result, we can control use of contents according to information of copy and play control. The proposed method can be used to content Protection software for blocking of an illegal distribution of T-DMB contents on a mobile T-DMB receivers.