• Title/Summary/Keyword: 상대방 보호

Search Result 64, Processing Time 0.031 seconds

Review of the Revised 2019 Trade Secret Protection Act and Industrial Technology Protection Act : Focusing on Civil and Criminal Remedies (2019년 개정 영업비밀보호법 및 산업기술보호법에 대한 검토: 민·형사적 구제를 중심으로)

  • Cho, Yongsun
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.333-352
    • /
    • 2019
  • In January and August 2019, there were amendments to the Unfair Competition and Trade Secrets Protection Act (UCPA) and the Industrial Technology Protection Act(ITPA). These amendments will contribute to technology protection. But these amendments need to be supplemented further. In the area of civil remedies, despite the introduction of treble damages in the case of the UCPA and ITPA, the provisions related to the submission of supporting data have not been maintained. Therefore, it is necessary to recognize the claim of the other party as true if it is maintained at the level of the revised Patent Act and the scope of submission of supporting data. And the enforcement of the case of compulsory submission for the calculation of damages, and the order of filing documents are not followed. ITPA, on the other hand, has introduced the compensation for damages, but there is no provision for estimating the amount of damages. Therefore, it is necessary to estimate the amount of lost profits, profits, and royalties. In the area of criminal remedies, both the UCPA and ITPA have raised the penalty, but the sentencing regulations are not maintained. In addition, although the recent outflow of technology has expanded beyond organizational deviations to organizational outflows, amendments need to be made in relation to the serious consequence for the punishment of related juristic persons, such as companies involved in it. It should be noted that Japan and the United States have corporate regulations and regulations. In addition, in relation to the confiscation system, Act on Regulation and Punishment of criminal proceeds concealment require that domestic defenses be confiscated by defense industry technology, while trade secrets and industrial technologies are confiscated only by "foreign" outflows, and an amendment is necessary.

XSS Attack and Countermeasure: Survey (XSS 공격과 대응방안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.327-332
    • /
    • 2013
  • XSS is an attacker on the other party of the browser that is allowed to run the script. It is seized session of the users, or web site modulation, malicious content insertion, and phishing attack which is available. XSS attacks are stored XSS and reflected XSS. In that, two branch attacks. The form of XSS attacks are cookie sniffing, script encryption, bypass, the malignant cord diffusion, Key Logger, Mouse Sniffer, and addition of lie information addition. XSS attacks are target of attack by script language. Therefore, the countermeasure of XSS is presented and proposed to improve web security.

A Study on Keylogger Information Sniffing by Using Hooking Techniques (Hooking기술을 이용한 Keylogger 정보 Sniffing연구)

  • Park, In-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.119-122
    • /
    • 2012
  • Keylogger by using Hooking techniques will lead and the keyboard when inputting, private data it uses Sniffing techniques and it meat the fact that it is seized. This program the classified document where the password or the counterpart of specific program draw up or even E-mail contents or great disaster original contents confirmation it is possible it is a technique which is simple but at the slightest slip fatal one is in the use person. It considered the security book about hereupon and it studied and it made it was made to advance and with subject of character dissertation.

  • PDF

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.

Problems and Improvements of Matrimonial Property Contract (부부재산계약의 문제점과 개선방안)

  • Park, Jong-Ryeol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.111-114
    • /
    • 2015
  • 민법상 인정하고 있는 부부재산제도는 부부별산제의 원칙 아래 부부재산계약을 따로 두고 있는 형태이다. 부부재산계약은 혼인신고를 하기 전 두 당사자가 재산관계에 대해 합의한 사항을 등기하면 제3자에 대해서도 효력이 있도록 하는 제도로, 부부별산제의 예외가 된다. 부부별산제(민법제830조)는 부부의 일방이 결혼 전부터 갖고 있던 재산과, 결혼 생활 도중 자신의 명의로 취득한 재산을 그 개인의 것으로 보고, 소유가 불분명한 경우만 공유로 추정하고 있다. 따라서 재산의 관리, 사용, 수익은 소유자가 하게 된다. 결국 부부의 공동으로 형성된 재산이라도 소유자가 모든 권리를 행사할 수 밖에 없어 명의를 갖지 못한 부부일방은 재산적인 침해를 받을 수 있는 등 형식적 평등에 불과하고 실질적인 부부의 경제적 평등을 보장받지 못하고 있는 실정이므로 양성평등과 가족법적 이념에도 어긋나는 제도라 볼 수 있다. 그리고 부부별산제가 제3자와 관계에 있어서 법적안정성을 확보할 수 있다는 장점은 있으나, 법적분쟁 시 일방배우자의 소유재산이더라도 상대방 배우자의 숨어있는 가사노동 지분에 대한 보호규정 등이 없어 문제가 제기되고 있다. 따라서 본 연구에서는 부부재산제도의 문제점을 파악해보고 이를 근거로 합리적인 개선방안을 제시하고자 한다.

  • PDF

Proposal for a Peer Decentralized Identity System Using Short-Range Wireless Communications (단거리 무선 통신을 이용한 개인 간 분산 신원증명 시스템 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.959-972
    • /
    • 2021
  • Decentralized Identity is based on the concept of self-sovereign identity, in which holders manage and provide their own credentials. However, a procedure is required to obtain credentials from issuers, and there is a risk of mess personal information leaking due to negligence of the issuers. In this paper, we propose a peer decentralized identity system based on Peer DID technology that allows only participants to verify their identity in 1:1 or 1:N small groups by matching the holder with the issuer. It is directly connected to a mobile device using short-range wireless communications such as bluetooth, and the holders create and provide their own credentials in person to the other party, thus fully realizing the self-sovereignty identity. The proposed system can simplify the identification process, improve security and privacy, and reduce costs. Furthermore, an extended architecture is possible to connect the proposed system and the distributed ledger to identify users in other domains. In the future, based on various technologies, it is also necessary to expand research on identity systems that can be utilized for human-to-thing and things-to-things authentication.

Peer to Peer Anonymous Protocol Based Random Walk (랜덤 워크 기반의 P2P 익명 프로토콜)

  • Cho, Jun-Ha;Rhee, Hyun-Sook;Park, Hyun-A;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.65-76
    • /
    • 2007
  • The P2P file sharing system sends the results to users by searching the files in the shared folders. In the process of it, the problem is that the transferred information includes the pathname and file information and it can be revealed who searches which files. In related to this problem, anonymous file sharing P2P protocol has been an active research area where a number of works have been produced. However, the previous studies still have a few of weakness. Therefore, We propose two anonymous P2P file sharing protocols based on the decentralized and unstructured Random Walk. The first scheme uses the dynamic onion routing where the requester can receive the wanted file without knowing other peers' IDs. The second scheme uses the IP multicast method which lowers the computational overhead. Both of them are more suited for the dynamic P2P system.

P2P Based Telemedicine System Using Thermographic Camera (열화상 카메라를 포함한 P2P 방식의 원격진료 시스템)

  • Kim, Kyoung Min;Ryu, Jae Hyun;Hong, Sung Jun;Kim, Hongjun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.547-554
    • /
    • 2022
  • Recently, the field of telemedicine is growing rapidly due to the COVID-19 pandemic. However, the cost of telemedicine services is relatively high, since cloud computing, video conferencing, and cyber security should be considered. Therefore, in this paper, we design and implement a cost-effective P2P-based telemedicine system. It is implemented using the widely used the open source computing platform, Raspberry Pi, and P2P network that frees users from security problems such as the privacy leakage by the central server and DDoS attacks resulting from the server/client architecture and enables trustworthy identifying connection system using SSL protocol. Also it enables users to check the other party's status including body temperature in real time by installing a thermal imaging camera using Raspberry Pi. This allows several medical diagnoses that requires visual aids. The proposed telemedicine system will popularize telemedicine service and meet the ever-increasing demand for telemedicine.

MLP-A(Multi Link Protection for Airborne Network Verifying) algorithms and implementation in multiple air mobile/verification links (다중 공중 이동/검증 링크에서의 MLP-A 알고리즘 및 구현)

  • Youn, Jong-Taek;Jeong, Hyung-jin;Kim, Yongi;Jeon, Joon-Seok;Park, Juman;Joo, Taehwan;Go, Minsun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.422-429
    • /
    • 2022
  • In this paper, the intermediate frequency transmission signal level between the network system-based baseband and RF unit consisting of multi-channel airborne relay devices and a lot of mission devices, which are currently undergoing technology development tasks, is kept constant at the reference signal level. Considering the other party's receiving input range, despite changes in the short-range long-range wireless communication environment, it presents a multi-link protection and MLP-A algorithm that allows signals to be transmitted stably and reliably through signal detection automatic gain control, and experiments and analysis considering short-distance and long-distance wireless environments were performed by designing, manufacturing, and implementing RF units to which MLP-A algorithms were applied, and applying distance calculation equations to the configuration of multiple air movements and verification networks. Through this, it was confirmed that a stable and reliable RF communication system can be operated.

Legal Study and Legislative Suggestions about Donation by Minors on Live Streaming Platforms - Focusing on protection of the counterparty - (인터넷 개인방송 플랫폼상 미성년자 후원행위에 대한 법적 고찰 및 입법론적 개선방안 - 미성년자의 상대방 보호 필요성을 중심으로 -)

  • Kil, Gi-Beom;Kim, Chang-Hyeon;Lee, Min-Jae;Yoo, Ha-Yeon
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.1
    • /
    • pp.292-309
    • /
    • 2022
  • Recently, with the development of interactive communication system, demands for video live streaming service has increased. Live streamers generate revenues from donations, but existing laws are inadequate to handle these donations. Problems arise when minors donate because they have the right of revocation. In the case of donations that request benefits in return, legal characteristics and results are different from unilateral donations. If minors exercise their right of revocation, live streamers must pay back without getting proper compensation for their services. In this paper, we detect the characteristics of bilateral contract in live streaming donation, indicate the harms that live streamers can get, examine precedents and donation processes focusing on cases when minors can not exercise the right of revocation due to deception, and propose revisions that can protect the streamers without invading minors' rights. Through academically identifying ambiguous legal situations and presenting dispute prevention procedures, this paper can bring positive impacts on the online industry.