Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

아이폰 탈옥(jailbreaking)과 기술적 보호조치iPhone Jailbreaking and Technological Protection Measure

Other Titles
iPhone Jailbreaking and Technological Protection Measure
Authors
이진태임종인
Issue Date
2010
Publisher
단국대학교 법학연구소
Keywords
탈옥(Jailbreaking); 아이폰(iPhone); 접근통제(Access Control); 이용통제(Use Control); 기술적보호조치(Technological Protection Measure)
Citation
법학논총, v.34, no.2, pp.709 - 728
Indexed
KCI
OTHER
Journal Title
법학논총
Volume
34
Number
2
Start Page
709
End Page
728
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/118044
DOI
10.17252/dlr.2010.34.2.026
ISSN
1738-3242
Abstract
Korea’s user environment of smart phone has changed rapidly due to the introduction of the iPhone. These changes on user environment of smart phone also brought up some copyright issues. Especially the iPhone jailbreaking issue was at the center of heated controversy for quite a long time. There are two types of Technological Protection Measures(TPM) applied to iPhone. One is “Separation of Partition” and the other is “Chain of Trust”model. A “Separation of Partition” modifies the partition setting of the UNIX. So it is difficult to say that this kind of model is TPM that protects the work(computer program). As a result it is difficult to say that the “Separation of Partition” is a TPM. However the “Chain of Trust” model prevents installation of a modified firmware so it is actually protecting a firmware which is a copyrighted work. Therefore a “Chain of Trust” model is an access control. The Korean Copyright Act does not protect the act of circumventing an access control accordingly circumventing “Chain of Trust” model is not an circumvention of technological protection measures. Korea is planning to amend it’s Copyright Act due to the effectuation of the KORUS FTA in the near future. In the KORUS FTA implementation legislation access control will be recognized as an effective TPM. But at the same time, if we adopt rulemaking system modeled on American one, circumventing these kind of models is likely to be an exception of circumventing an effective TPM.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE