아이폰 탈옥(jailbreaking)과 기술적 보호조치iPhone Jailbreaking and Technological Protection Measure
- Other Titles
- iPhone Jailbreaking and Technological Protection Measure
- Authors
- 이진태; 임종인
- Issue Date
- 2010
- Publisher
- 단국대학교 법학연구소
- Keywords
- 탈옥(Jailbreaking); 아이폰(iPhone); 접근통제(Access Control); 이용통제(Use Control); 기술적보호조치(Technological Protection Measure)
- Citation
- 법학논총, v.34, no.2, pp.709 - 728
- Indexed
- KCI
OTHER
- Journal Title
- 법학논총
- Volume
- 34
- Number
- 2
- Start Page
- 709
- End Page
- 728
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/118044
- DOI
- 10.17252/dlr.2010.34.2.026
- ISSN
- 1738-3242
- Abstract
- Korea’s user environment of smart phone has changed rapidly due to the introduction of the iPhone. These changes on user environment of smart phone also brought up some copyright issues. Especially the iPhone jailbreaking issue was at the center of heated controversy for quite a long time.
There are two types of Technological Protection Measures(TPM) applied to iPhone. One is “Separation of Partition” and the other is “Chain of Trust”model. A “Separation of Partition” modifies the partition setting of the UNIX.
So it is difficult to say that this kind of model is TPM that protects the work(computer program). As a result it is difficult to say that the “Separation of Partition” is a TPM. However the “Chain of Trust” model prevents installation of a modified firmware so it is actually protecting a firmware which is a copyrighted work. Therefore a “Chain of Trust” model is an access control. The Korean Copyright Act does not protect the act of circumventing an access control accordingly circumventing “Chain of Trust” model is not an circumvention of technological protection measures.
Korea is planning to amend it’s Copyright Act due to the effectuation of the KORUS FTA in the near future. In the KORUS FTA implementation legislation access control will be recognized as an effective TPM. But at the same time, if we adopt rulemaking system modeled on American one, circumventing these kind of models is likely to be an exception of circumventing an effective TPM.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.