• Title/Summary/Keyword: infringement

Search Result 549, Processing Time 0.022 seconds

A Study on Site Positions for Monitoring Efficiency Improvements of the Aircraft Noise Monitoring Stations (항공기소음 자동측정국 감시효율 향상을 위한 위치설정에 대한 연구)

  • Son, Jung-Gon;Jeong, Woo-Hong;Hwang, Min-Gee;Gwon, Hyun
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.19 no.1
    • /
    • pp.50-55
    • /
    • 2009
  • The monitoring efficiency of the aircraft noise monitoring stations is decided to the reference noise level and the infringement of each monitoring stations. We calcurates the monitoring efficiency of three noise monitoring station among twelve in the vicinity of Gimpo Int'l Airport. As a result, the monitoring efficiency shows that the noise monitoring stations No#3, No#5 and No#6 are 14.3%, 18.5% and 29.3% respectively, Among them No#6 staion looks higher efficiency than another two stations because of underneath the flight trackas.

Analysis for Patent Application Tendency in Components and Modules of Intelligent Robot (지능형 로봇 부품 및 모듈 특허동향 분석)

  • Kim, Seung-Min;Kim, Ji-Kwan;Nahm, Yoon-Eui
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.30 no.4
    • /
    • pp.54-61
    • /
    • 2007
  • This research relates to the patent application tendency about the components and modules of the intelligent robot among the robotics industry in which the market is more and more expanded. The patent about the components and modules of intelligent robot was analyzed from not only Korea but also U.S, Japanese and Europe which is called as the 3 pole of patent. By this research the government which supervises the nation's research policy can obtain the objective information of the industrial tendency, so it can establish the investment policy of national research and development. And the researchers can set up the research direction for evasion from patent infringement trouble by obtaining the patent application information. This also shows whether their research can be competitive or not.

Analysis for Patent Application Tendency in Intelligent Robot Hardware (지능형 로봇 하드웨어 특허동향 분석)

  • Kim, Seung-Min;Nahm, Yoon-Eui;Kim, Ji-Kwan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.30 no.4
    • /
    • pp.46-53
    • /
    • 2007
  • This research relates to the patent application tendency about the hardware platform of the intelligent robot among the robotics industry in which the market is more and more expanded. The patent about the hardware field of intelligent robot was analyzed from not only Korea but also U.S., Japanese and Europe which is called as the 3 pole of patent. By this research the government which supervises the nation's research policy can obtain the objective information of the industrial tendency, so it can establish the investment policy of national research and development. And the researchers can set up the research direction for evasion from patent infringement trouble by obtaining the patent application information. This also shows whether their research can be competitive or not.

Classification of NFT Security Issues and Threats through Case Analysis

  • Mi-Na, Shim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.23-32
    • /
    • 2023
  • Since NFTs can be used like certificates due to the nature of blockchain, their use in various digital asset trading markets is expanding. This is because NFTs are expected to be actively used as a core technology of the metaverse virtual economy as non-transferable NFTs are developed. However, concerns about NFT security threats are also growing. Therefore, the purpose of this study is to investigate and analyze NFT-related infringement cases and to clearly understand the current security status and risks. As a research method, we determined NFT security areas based on previous studies and analyzed infringement cases and threat types for each area. The analysis results were systematically mapped in the form of domain, case, and threat, and the meaning of the comprehensive results was presented. As a result of the research, we want to help researchers clearly understand the current state of NFT security and seek the right research direction.

Implementation of Real-Time Image Blurring System for User Privacy Support (사용자 보호를 위한 실시간 이미지 모자이크 처리 시스템 개발)

  • Minyeong Kim;Suah Jeon;Jihoon Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.39-42
    • /
    • 2023
  • Recently, with the explosive increase of video streaming services, real-time live broadcasting has also increased, which leads to an infringement problem for user privacy. So, to solve such problems, we proposed the real image blurring system using dlib face-recognition library. 68 face landmarks are extracted and convert into 128 vector values. After that the proposed system tries to compare this value with the image in the database, and if it is over 0.45, it is considered as different person and image blurring processing is performed. With the proposed system, it is possible to solve the problem of user privacy infringement, and also to be utilized to detect the specific person. Through experimental results, the proposed system has an accuracy of more than 90% in terms of face recognition.

  • PDF

Problems Judicial Liability of On-Line Service Providers under the Infringement of Copyright in Internet (인터넷 상에서 저작권침해에 따른 온라인서비스 제공자의 책임문제)

  • 박종삼
    • Journal of Arbitration Studies
    • /
    • v.12 no.1
    • /
    • pp.123-169
    • /
    • 2002
  • The Advent of the global information structure and the do-called digital revolution raise countless new issues and questions. There are no limitations regulating the expressions on the cyberspace due to internet's of quality anonymity\ulcorner diversity\ulcorner spontaneity. Therefore, the freedom of speech is expanded in both areas of time and space, which was impossible with the old communicating system. The rapid development of the internet may not have occurred without techniques of linking and framing, which provide users flexible and easy access to other website. These techniques have enabled internet users to navigate the internet efficiently and sort through the products, services and information available on the internet. Although online technology raises many new legal issues, the law available to help us resolve them, at least today, is largely based on the world as it existed before online commerce became a reality. Thus the challenge is to predict how these new legal issues may be resolved using the current law. Especially, the damage from the above side effects on the cyberspace can be much more serious than in the real world because of promptness, wideness and anonymity. Therefore, regulating and controling the freedom of speech on the cyberspace became needed, and there are two kinds of opinion; one is that the laws in the real world should be applied for the cyberspace and the other is that regulating and controling the freedom of speech on the cyberspace should be performed by the users of cyberspace not by laws because the cyberspace is a free space and must not be interfered. In this study, the current judicial regulation of cyberspace, the side effects of cyberspace and the limitations of the freedom of speech are studied to solve the above problems with speech and the liabilities of on-line service providers are discussed around defamation the distribution of obscene pictures and information, and infringement of copyright.

  • PDF

A Review on the Scope of the Right of Integrity : Focusing on the Case about the Popular Music (저작권법상 동일성유지권의 범위에 관한 검토 : 대중음악에 관한 사례를 중심으로)

  • Park, Da Hyo;Kang, Seung Hee;Jang, Soon ho
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.109-124
    • /
    • 2020
  • In 2012, Psy's music video 'Gangnam Style' spread through parodies, and gained explosive popularity. In 2016, there was a case so-called as 'baseball ground cheering song' in which a author(songwriters) claimed an infringement of the 'right of integrity' related to cheering songs used by professional baseball teams. In response, the court denied violating the right of integrity in 2019. These cases have different effects depending on whether or not the 'right of integrity' is claimed. This study attempted an economic analysis in addition to a legal analysis of the right of integrity. Korean copyright law regards even simple changes that go against the author's will as a infringement of the 'right of integrity' even if they do not harm honor or reputation. Such legislation is one of the most strongly protected forms in the world, so it cause many problems. Meanwhile, we analyzed the cost-benefit analysis of Psy's 'Gangnam Style' case and the 'baseball ground cheering song' case. As a result of the analysis, the right to integrity is inefficient in quantitative and qualitative aspects. Therefore, the right of integrity should be reconsidered with the focus on 'popular music'. In particular, considering the development of information communication technology and changes, a revision direction is needed to meet the purpose of the copyright act. Furthermore, in order to solve the legal issues under the Copyright Act, the requirement for infringement of the right of integrity should be relaxed. Then, we proposed the establishment of a proviso clause on the right of integrity.

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

The Analysis of Registration of Design Rights in Korean Apparel Industry - Design Rights Registered in Apparel (Classification B1) - (한국 의류산업의 의장(디자인) 등록 추세와 의장제도에 관한 연구 - 의복류(의장분류 B1)의 의장 등록을 중심으로 -)

  • 김용주
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.1
    • /
    • pp.125-139
    • /
    • 2004
  • The present study was to analyze the trend of registration of design rights in apparel products and tc point out problems of current protection law to design. The research data was total 1,850 design rights in apparel that have been registered to the Korean Patent and Trademark Office from the first design registered in March 1, 1963 through those registered in April 24, 2003. All design rights were analyzed by the year, by the type of product, and by the type of applicant. And also design rights registered under the revised design registration system(without examination) were analyzed by the trait. The results of the study were as follows: (1) Sweater & polo shirts, underpants, and the Korean traditional dress were three major single categories registered in apparel : (2) 54.3% of total design rights in apparel was registered since the legal system of design rights has been revised in March 1, 1998 : (3) Registration by individual applicant were 71.7% of total; (4) About 60% of total design rights were for aesthetic, but in some categories such as vest. brassiere, undershirts, designs for function were more frequently registered than others. And total 68 design rights for the symbol of the organization or uniform, were registered in upper outerwear and pants : (5) As problems of the current legal protection system for designs, the term of “design”(expressed in Korean), double registration of similar designs, malicious intention to register other's trademark as his/her own design. The current legal system for design rights were more used for the product that has relatively long life cycle. And the revised law has been effective in encouraging the registration of design rights. However. the current design law still has some problems to be revised to prevent design rights or trademark infringement.

A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache (웹 브라우저 캐시 재조립을 통한 온라인 스트리밍 서비스 상의 저작권 침해 가능성에 관한 연구)

  • Lim, Yirang;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.559-572
    • /
    • 2020
  • As internet technology advances, users can share content online, and many sharing services exist. According to a recently published digital forensic study, when playing an online streaming service, you can restore the played video by reconstructing the Chrome cache file left on local device such as a PC. This can be seen as evidence that the user watched illegal video content. From a different point of view, copyright infringement occurs when a malicious user restores video stream and share it to another site. In this paper, we selected 23 online streaming services that are widely used both at home and abroad. After streaming videos, we tested whether we can recover original video using cache files stored on the PC or not. As a result, the paper found that in most sites we can restore the original video by reconstructing cache files. Furthermore, this study also discussed methodologies for preventing copyright infringement in online streaming service.