• Title/Summary/Keyword: 정보복제

Search Result 783, Processing Time 0.034 seconds

Serious Game : A Study on Aware of Protection for Rights of Software and Digital Contents (기능성 게임 : 소프트웨어 및 디지털콘텐츠 저작권 보호 인식에 관한 고찰)

  • Yoon, Sun-Jung;Park, Hee-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1950-1956
    • /
    • 2010
  • There are scattered various kinds of software and digital contents around modern peoples. Most of peoples do not realize the importance of the problem related with rights protections of software and digital contents that most of peoples are acting illegal use or illegal copy of software or digital contents without any sense of guilt. In this paper, we carry out a survey targeting IT department majors and non-IT department majors about their aware of rights of software and digital contents and then we suggest a problem from the results of a survey and study a solution for advancing problem of aware of rights. The most effective solution of aware improvement of rights is continuous and repetitive education concerning rights. Also, Reasonable prices that should makes for paying cost of copyrights by users.

Data Sharing Technique between Heterogeneous based on Cloud Service (클라우드 서비스 기반 이기종간의 데이터 공유 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.391-398
    • /
    • 2018
  • There are many problems caused by data sharing between general heterogeneous digital devices due to various interfaces. To solve this problem, this paper proposes heterogeneous data sharing with cloud service and mobile through D2D communication that supports communication between different devices. The proposed technique is used to reduce the load on the server to perform data synchronization. Also, in order to minimize data latency caused by data replication between different devices, a technique to enhance the speed of data writing with copying only the modified parts in the chunk list is adopted and cloud service model integrated with mobile environment is realized in order to minimize the network bandwidth consumed for synchronization for data sharing. Therefore, it is possible to share data in different spaces efficiently with maintaining data integrity and minimizing latency in data.

An Analysis on the Results of the Operation for Library Remuneration System (도서관보상금제도의 운영성과에 대한 분석)

  • Joung, Kyoung Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.4
    • /
    • pp.265-288
    • /
    • 2015
  • This study analyzed the contracts for library remuneration, amount of the remuneration, average amount of the remuneration in relation to kinds of libraries, distribution of the remuneration, and types and publication year of the works to be collected remuneration based on the data during 2004~2014 from the KORRA. As results, current library remuneration system has limitations for libraries to digitize and transmit to the public their collections, Also, there are some limitations to the protection for copyright holders because the amount of the remuneration collected from libraries has declined and non distribution remuneration has been so high. This study suggested that the library remuneration system needs to be revised considering the scope of library materials to be digitized and predicted frequency of use. Also, the better practical solution to protect copyright holders is not a raise of the library remuneration but the efficient use of the non distribution remuneration.

A Design and Implementation of Interoperable DRM System Based on DMP (DMP 기반의 상호운용 가능한 DRM 시스템 설계 및 구현)

  • Cho, Tae-Beom;Lee, Sang-Jo;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.860-867
    • /
    • 2007
  • Digital Contents are increasing the modification of the contents by individual user and the modified or copied contents are simply distributed though the ultrahigh speed internet and the negative pervasive effect on the contents market is increasing. The solutions for copyright protection from illegally distributing contents are developing by various standardization groups and contents manufacturers and its commercia use is partly practiced. The MPEG was developing the IPMP technique to apply existed MPEG standards as a way of digital contents protection. However, as these IPMP techniques did not provide a satisfactory function for contents protection, the DMP standard was suggested as an alternative plan. In this paper, the system is designed and materialized to apply the TooIPack concept of DMP which ensure the interoperability of DRM system. With this paper, it is expected that the practical use and the possibility of the DMP standard in the DRM market would be verified and DMP standard may presents as a reference model for more systematic standardization operations.

PKI-based Distribution System of the User's Permission about Broadcast Program (PKI를 통한 방송프로그램 사용자 권한 유통시스템)

  • Im, Dae-Myung;Park, Ki-Chul;Lee, Joo-Young;Nam, Je-ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.649-652
    • /
    • 2009
  • Now Broadcasting system of TV has been developed from analogue to digital we call that IPTV(Internet Protocol Television) or DCATV(Digital Cable Television). But, The characteristics of digital broadcasting is the high-quality contents of easily and almost no damage piracy, and Copyright loss is increasing by Internet, P2P(Peer to Peer) and personal path. Nevertheless user's permissions that recorded and reuse of broadcasting can't restraint, And Training Materials etc. use of fair program needs to be separated from illegality. In this paper using a digital certificate permit the use of stored program to authorized user and user of fair purpose, And illegal distribution of restriction design and implement a distribution system.

  • PDF

Integrated Data Structure for Quantum Key Management in Quantum Cryptographic Network (양자암호 통신망에서 양자키 관리를 위한 통합 데이터 구조)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.3-7
    • /
    • 2021
  • In quantum cryptographic communication based on quantum mechanics, each piece of information is loaded onto individual photons and transmitted. Therefore, it is impossible to eavesdrop on only a part, and even if an intruder illegally intercepts a photon and retransmits it to the recipient, it is impossible to send the same information to the photon by the principle of quantum duplication impossible. With the explosive increase of various network-based services, the security of the service is required to be guaranteed, and the establishment of a quantum cryptographic communication network and related services are being promoted in various forms. However, apart from the development of Quantum Key Distribution (QKD) technology, a lot of research is needed on how to provide network-level services using this. In this paper, based on the quantum encryption device, we propose an integrated data structure for transferring quantum keys between various quantum encryption communication network devices and realizing an encrypted transmission environment.

A Study an Effective Copyright Protection Method for Webtoons (효과적인 웹툰 저작권 보호 방법에 관한 연구)

  • Yoon, Hee-Don;Cho, Seong-Hwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.106-112
    • /
    • 2019
  • The Korea Copyright Commission has pursued copyright technology R&D projects to prevent illegal copying of comics and Webtoons. We developed a feature-based scanned comic filtering technology in order to apply technical measures to specific types of online service providers. We also developed technologies in order to monitor and identify illegally distributed comics on webhard sites and to monitor and identify illegally distributed webtoons. Even though all comic books posted on webhard sites are illegal, it is no trouble to download and access popular comics by accessing websites in foreign countries. Even under these circumstances, the comic and webtoon copyright protection technologies developed over the past six years have been used at all. In this paper, we examine what the problems are and find solutions to propose a copyright protection method for webtoons.

Hacking attack and vulnerabilities in vehicle and smart key RF communication (차량과 스마트키 RF통신에 대한 해킹 공격 및 취약점에 대한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1052-1057
    • /
    • 2020
  • With the development of new ICT technology, smart keys for vehicles are terminals with ICT technology. Therefore, when the vehicle and the smart key communicate with RF, a cyber hacking attack is possible. Cyber-attacks on smart keys can pose a threat to vehicle theft and vehicle control. Therefore, it is necessary to study hacking attacks and vulnerabilities of smart keys for autonomous vehicles. In this paper, we analyze the cyber attack case of RF communication for vehicles and smart keys. In addition, a real RF cyber attack on the smart key is performed, and the vulnerability of radio wave replication in the same frequency band is found. In this paper, we analyze the vulnerability of RF communication between vehicles and smart keys, and propose a countermeasure against cyber security. In the future, plans to strengthen cyber attacks and security through the popularization of autonomous vehicles will become basic data to protect human and vehicle safety.

Web Server Hacking and Security Risk using DNS Spoofing and Pharming combined Attack (DNS 스푸핑을 이용한 포털 해킹과 파밍의 위험성)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1451-1461
    • /
    • 2019
  • DNS spoofing is an attack in which an attacker intervenes in the communication between client and DNS server to deceive DNS server by responding to a fake IP address rather than actual IP address. It is possible to implement a pharming site that hacks user ID and password by duplicating web server's index page and simple web programming. In this paper we have studied web spoofing attack that combines DNS spoofing and pharming site implementation which leads to farming site. We have studied DNS spoofing attack method, procedure and farming site implementation method for portal server of this university. In the case of Kyungsung Portal, bypassing attack and hacking were possible even though the web server was SSL encrypted and secure authentication. Many web servers do not have security measures, and even web servers secured by SSL can be disabled. So it is necessary that these serious risks are to be informed and countermeasures are to be researched.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.