• Title/Summary/Keyword: intellectual property protection programs

Search Result 8, Processing Time 0.023 seconds

Website and Digital Content between Material Property and Intellectual Ownership Rights within the Legal Regulation of Internet

  • Azab, Rania S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.424-435
    • /
    • 2022
  • When the owners of the intellectual property rights of digital content have lost control over it in the digital environment, there emerged fears that the intellectual property laws, especially copyright law, would not be effective as in the material (Offline ) world. The reason is that the digital environment helps to reproduce copies in high quality and at almost no cost, while copyright law protection has been limited to programs embedded in CDs. According to copyright laws, the owner of the program did not have the right to prevent buyers of the initial physical copy of the program from copying and reselling it to more than one individual without the permission of the original owner. As a result, business owners have invented the idea of licensing digital content and programs instead of selling them. They set out terms that serve their commercial interests regardless of their abuse to intellectual property laws or even the rules of the traditional contract to sell a material property. The abuse has resulted from the way those terms are concluded and the heavy rules that are unfair to consumer rights. Therefore, business owners insisted on dealing with the website and its programs and digital content as material property. Here raises the question of whether the website and its digital content are subject to the protection of copyright law or the rules of the traditional contract or licensing contracts. As the answer to this question affects the protection of consumer rights, is it possible to find a balance between it and the protection of the owners of digital programs' rights.That is what we will discuss in this paper.

A Study on Package Design of Intellectual Property Protection Programs -a focus on trademark and registration of design- (패키지디자인의 법적보호에 관한 연구 -의장 및 상표등록을 중심으로-)

  • Yang, Cho-San
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.27-36
    • /
    • 2004
  • The protection of intellectual property right in international conventions are worldwide or regional areas already exists a century. Therefore, our country is positive affiliated with international conventions. After that time, such as a violation of international convention and an example of imitations are continually that we prognosticate the international trade market activities was difficult not only became an issue of country credit risk. At this point, the major purpose of this study make an analysis of both paralleled with the case study follow an example and the comprehension with concerned about recognition of intellectual property right. In additionally, it stands a plan of package design protections under the WTO systems. This study have carried out a theoretical and practical analysis of intellectual property right and statistical analysis through the inside and outside of the country packaging design study and a case study of troubles with intellectual property. Besides, it is accomplish the purpose of the study that established exploratory study survey about inside and outside of the country packaging design infringement case study and relative package design industry employees with consumptions real research. I hoped that this study will be a foundation on which packaging, design industry protections to intellectual property right.

  • PDF

A Study on Infringement Cases of Software Copyright and the Dispute Settlement (소프트웨어 저작권 침해사례와 분쟁해결에 관한 연구)

  • 장병윤
    • Journal of Arbitration Studies
    • /
    • v.13 no.2
    • /
    • pp.547-584
    • /
    • 2004
  • Information technology(IT) is changing rapidly based on growth of internet and computer businesses. Therefore, computer programs and softwares are distributed to computer users promptly for their productivity increase and efficient work. So, in the distribution, the softwares will be copied or released through network or other methods which are not authorized by the program owners. In that case, copyright dispute is incurred and various issues are come out due to infringement of the software copyright. Thus, the purpose of this study is to research infringement cases of the software copyright and how to settle the dispute which is related with software programs. To achieve the purpose of this study, this research consisted of 5 chapters. At chapter 1 introduction, it mentioned necessity of this study, purpose and how to research this study, and at chapter 2 dispute factors indicated and summarized for technical resolution. At chapter 3, infringement cases of software copyright analyzed and studied upon intellectual property(IP) related laws. And methods of dispute settlement discussed and suggested to chapter 4 for copyright and intellectual property protection. Also, it emphasized importance of arbitration to resolve the issues timely and avoid time and economical consumption. Of course, arbitration law has to be matched with the trend of technology development for effective settlement. At chapter 5 conclusion, it summarized this research and suggested further research for empirical test of economic value of the software copyright upon the aspect of business, law, and engineering. In this study, the results are 1) IP related laws have to be enacted or revised to meet technical changes for the protection of software copyright on time. The enactment or the revision of law takes a long time, therefore, to deal the dispute effectively, 2) arbitration law has to be utilized efficiently in order to resolve issues and settle the dispute promptly. It is suggested the dispute settlement through arbitration to save time and economic matters for legislation, and to harmony with the technology trends. 3) Recognition of software copyright is to be improved by users and enterprises for development of software related industries and intellectual property protection. In conclusion, the protection of software copyright is important than any other things in the field of IT because of the development of industry and intellectual property related laws. The development is for areas of business, law and engineering, so research and practices are to be combined with the areas so that it could resolve the dispute settlement and IP protection effectively.

  • PDF

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

A Design and Implementation of the Source Code Plagiarism Detection System

  • Ahn, Byung-Ryul;Choi, Bae-Young;Kim, Moon-Hyun
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.319-323
    • /
    • 2005
  • As the software industry develops at a rate speed, anyone can copy or plagiarize without difficulty contents that are becoming digitalized. To make it worse, the development of various contents that be illegally copied and plagiarized are resulting in the increasing infringement on and the plagiarism of the intellectual property. This dissertation tries to put forth the method and the theory to effectively detect any plagiarism of the source code of programs realized in various languages. This dissertation analyzes the advantage and disadvantage of the plagiarism test software, and especially, presents a method to detect possible plagiarism by using the Pattern Matching to overcome its disadvantage. And it also intends to introduce more developed automatic detection system by overcoming the problems with the method of Pattern Matching.

  • PDF

Design and Implementation of a Protection and Distribution System for Digital Broadcasting Contents (디지털 방송 콘텐츠 보호 유통 시스템 설계 및 구현)

  • Lee Hyejoo;Choi BumSeok;Hong Jinwoo;Seo Jongwon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.731-738
    • /
    • 2004
  • With the increase of digital content usages, the protection for digital content and intellectual property becomes more important. The DRM(digital rights management) technologies are applicable to protect not only any kind of digital contents but also intellectual property. Besides such techniques are required for recorded digital broadcasting contents due to introduction of digital broadcasting techniques and storage devices such as personal video recorder. The conventional protection scheme for broadcasting content is the CAS(conditional access system) by which the access of viewer is controlled on the specific channels or programs. The CAS prohibits the viewer from delivering the digital broadcasting content to other person, so it results in restriction of superdistribution on the digital broadcasting content. In this paper, for broadcast targeting unspecfic many people, we will design the service model of the protection and distribution of digital broadcasting content using encryption and license by employing the concept of DRM. The results of implementation are also shown to verify some functions of each component. An implemented system of this paper has some advantages that the recording of broadcast content is allowed on set-top-box and superdistribution is available by consumer. Hence it provides content providers and consumers with trustworthy environment for content protection and distribution.

Implementation of an Obfuscator for Visual C++ Source Code (비주얼 C++소스 코드를 위한 obfuscator 구현)

  • Chang, Hye-Young;Cho, Seong-Je
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.59-69
    • /
    • 2008
  • Automatic obfuscation is known to be the most viable method for preventing reverse engineering intentional1y making code more difficult to understand for security purposes. In this paper, we study and implement an obfuscation method for protecting MS Visual C++ programs against attack on the intellectual property in software like reverse engineering attack. That is, the paper describes the implementation of a code obfuscator, a tool which converts a Visual C++ source program into an equivalent one that is much harder to understand. We have used ANTLR parser generator for handling Visual C++ sources, and implemented some obfuscating transformations such as 'Remove comments', 'Scramble identifiers', 'Split variables', 'Fold array', 'Insert class', 'Extend loop condition', 'Add redundant operands', and 'Insert dead code'. We have also evaluated the performance and effectiveness of the obfuscator in terms of potency, resilience, and cost. When the obfuscated source code has been compared with the original source code, it has enough effectiveness for software protection though it incurs some run-time overheads.

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.