• Title/Summary/Keyword: third party application

Search Result 107, Processing Time 0.022 seconds

A Study on Prior Use Defence in Chinese Trademark Law (중국 상표법상 선사용 항변에 관한 연구)

  • Song, Soo-Ryun;Lim, Sung-Chul
    • Korea Trade Review
    • /
    • v.41 no.3
    • /
    • pp.157-176
    • /
    • 2016
  • This study is to investigate Trademark Prior Use Defence of prior use party under Trademark Law of the People's Republic of China. Chinese Trademark Law was amended for the third time and this Law shall enter into force on 1 May 2014. This third amendment introduced Prior Use Defence Right of Trademark for the first time. Article 59(3) gives the right to the prior use party for the continuous use of such trademark under the condition that first, an identical or similar trademark has been used in connection with the same goods or similar goods by others before the registrant's application, second, such trademark should have a certain influence in certain market, and third, such aforesaid trademark should be used within the original scope continuously. Then the exclusive right holder of said registered trademark shall have no right to prohibit others from continuous use of such trademark. Korean companies should be aware that it is almost impossible to search prior use trademark before a dispute arises, since the prior use trademark has never been registered. The best way to control the prior use trademark is to superintend aforesaid trademark for the use within the original scope.

  • PDF

Digital Identity Trend for Digital Trust Society (디지털 신뢰 사회 실현을 위한 디지털 아이덴티티 동향)

  • Kwon, D.S.;Lee, H.;Park, J.D.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.3
    • /
    • pp.114-124
    • /
    • 2019
  • The Internet was designed for machines, not humans, and hence, nobody owns a digital identity. Instead, a digital identity is rented from a website and an application. This lack of unique and secure digital identities has resulted in confusion in the online/cyber world. Digital identities pose one of the oldest and most difficult problems with regard to the Internet. There is still no way to use digital credentials to prove, own, and control an online identity, namely a self-sovereign identity, in the same manner we do in the offline world, particularly without a trusted third party. This article discusses the current open standards for digital identities, proposes solutions pertaining to digital identities in the future, and introduces the concept of a blockchain-based self-sovereign digital identity without the need of trusted third parties.

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.

FIDO Universal Authentication System Based on Blockchain (블록체인 기반의 FIDO 범용 인증 시스템)

  • Kim, S.H.;Huh, S.Y.;Cho, Y.S.;Cho, S.R.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.34-44
    • /
    • 2018
  • In this paper, we describe a FIDO universal authentication system based on a Blockchain that can share the user's FIDO authentication information between the application services of multiple domains without the use of a server. In addition we provide a method to query the FIDO authentication information of the user recorded in the Blockchain using only the user's service ID. Therefore, even if the user executes the FIDO registration process only once, the user can use the FIDO authentication service of another application service without repeating an additional FIDO registration procedure, and the service provider can securely share and utilize the FIDO authentication information of the user without the use of a trusted third party, thereby lowering the deployment and maintenance costs of the FIDO server.

A B2B e-Marketplace Solution with Application Service Provider Functionality (ASP 방식의 B2B e-마켓플레이스 솔루션)

  • Baek Seung-Che;Kim Jung-In;Choe Jeong-Sang
    • Proceedings of the Society of Korea Industrial and System Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.151-161
    • /
    • 2002
  • This paper presents the business model and system functionalities of a B2B e-marketplace solution that not only can overcome some problems of the public e- marketplace, but also can be applicable to both public and private types of e-marketplaces. This solution is different from the most of the public e-marketplace solutions that their main sources of revenue are transaction commissions or transaction fees through the third-party intermediation. Instead, this solution provides an ASP (Application Service Provider) functionality for direct, dis-intermediated purchasing and sales-related transactions between suppliers and buyers. With this functionality, suppliers and buyers electronically commerce with each other without the disclosure of their transactions as well as transaction commissions.

  • PDF

The current situations and future directions of electronic marine insurance policy in Japan's trade financial EDI (일본의 무역금융EDI에 있어 국제해상보험증권의 전자화 현황과 향후과제)

  • Han, Sang-Hyun
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.169-186
    • /
    • 2007
  • The purpose of this study analyzes laying stress on Japan example that background of electronic issue of international meritime insurance policy is what, and is marched in some degree present. and this study presented what hereafter subject of electronic insurance plice is. The this paper is to study the current situations of trade financial EDI in Japan and problems in application of marine insurance contracts. The subject of electronic marine policy issue is as following in trade financing EDI. (1) application of electronic document in claim demand. (2) standardization of various documents and insurance plice data. (3) insurance compensation document that become Jeonjahwa in insurance accident settlement. (4) maritime Insurance policy agreement's establishment. (5) when is monopolized to third party, realization of electronic maritime insurance policy offer.

  • PDF

A Study on the Current Status and Policy Direction of Open Banking (오픈뱅킹(Open Banking)의 현황과 정책방향에 관한 연구)

  • Park, Jeongkuk;Kim, Injai
    • Journal of Service Research and Studies
    • /
    • v.10 no.1
    • /
    • pp.17-31
    • /
    • 2020
  • Open banking, the global trend of the financial industry, is the driving force behind various innovations in the financial market in the future. The right policy direction and detailed tasks are important for triggering the differentiation and reunion of the financial industry. The purpose of this study is to investigate and analyze the background of open banking, domestic and international trends, and Korea's open banking policy. The policy directions and tasks for successful settlement and activation of open banking system are carefully suggested. Open banking is a policy to allow third party provider(TPP) access to bank accounts and open payment functions under the explicit consent of the customer. The opening of the open banking era is expected to begin competition and cooperation between banks and fintech companies in earnest, thus enhancing the competitiveness of the financial industry and contributing to the utility of financial consumers. To this end, policymakers should make every effort to advance open-ended financial settlement infrastructure, open banking legal grounds, and minimize side effects such as customer data leakage and poor financial system stability. Banks and fintech companies will need to focus on scattered customer financial information on a single platform and develop it into a convergence and discrimination of true financial services.

Component Quality Certification System for Evaluation and Certification of COTS Components (COTS 컴포넌트의 평가 및 인증을 위한 컴포넌트 품질 인증 시스템)

  • 김수동;박지환;김남희
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1135-1148
    • /
    • 2003
  • A commercial-off-the-shelf (COTS) component is an implementation of common functionality among family members, where an in-house component implements an organization-specific functionality. Typically, a COTS component has a producer and aset of potential consumers. Consumers evaluate COTS components thoroughly before they purchase, because these components are developed by third party producers and most consumers have ‘not-invented-here’ syndrome. Hence, evaluating the quality of COTS components becomes an important prerequisite to a successful component-based application development. In this paper, we identify the characteristics of COTS components, and derive a practical quality model for components, C-QM, which consists of quality factors, criteria and metrics and a qualify certification system, C-QCS. The top design goal of C-QM is set to provide a practically applicable comprehensive quality model which can be effectively applied in assessing the various quality aspects of COTS components.

A Study on the Several Important Clauses in ICC Model Distributorship Contract (국제판매점계약(國際販賣店契約)의 주요조항(主要條項) (ICC Model Distributorship Contract(Pub.518)을 중심(中心)으로))

  • Oh, Won-Suk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.26
    • /
    • pp.35-86
    • /
    • 2005
  • International distributorship contract(IDC), as well as international agency contract is a type of contract which is most frequently used in international trade. But one of the main difficulties faced by parties of IDC is the lack of uniform rules for this type of contract. This means that both parties should be careful about each clause of the contract when they draw up it. The ICC prepared model form which incorporates the prevailing practice in international trade, and which aims at protecting and balancing the legitimate interests of both parties. This author examined the several important clauses in this model contract. The purpose of this examination is to help the contracting parties for better understanding and applying them in their actual contracting practice, which based on this model contract. When the supplier and the distributor execute their contract or use ICC Model Contract, they should be careful about the following points: First, some terminologies(like, "territory", "product", "competing products" and "exclusivity") should be clearly defined in their contract. Second, regarding the supplier's functions including "supplying products" and the distributor's responsibility including "undertaking not to compete", and "attaining guaranteed minimum targets", both parties should make clear about each party's right and obligation as well as one party's remedies available when other party makes breach of its obligation. Third, both parties should examine the relationship between the "exclusivity" or "sole" and competition law which is regarded as a mandatory rule in the territory. Forth, when both parties lay down "termination clause" in the contract, they should make clear about the indemnity in case of termination. Fifth, as there is not uniform law for the distributorship contract, it is inevitable to choose any local law as an applicable law in case of litigation. So both parties should keep in mind to insert arbitration clause to avoid the application of the local law. Besides, both parties should consider their individual and specific circumstances and try to reflect them in their contract by Annex I to XI attached to the end of model contract.

  • PDF

A Implementation of Messenger using Hybrid Cryptosystem (하이브리드 암호 시스템을 이용한 메신저 구현)

  • Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3942-3949
    • /
    • 2010
  • Since existing Nate-on Messenger application stores users' personal information in the database of its server, it is extremely venerable to internal threats, not to mention the communication data being transmitted without any safety measures. To solve such problematic areas of the existing application, we have developed a safer messenger application. The messenger application proposed in this paper discloses only the least required personal information of its users and the rest of the personal information is safely encrypted in the database using private passwords. This protective measure prevents the administrator or a third party from misusing the information since he/she will not be able access the information. In addition, users will be able to freely and safely communicate using this new messenger since transmitted data will also be encrypted.