¸ñ·Ï

Home

åǥÁö

À§Á¶, ºÒ¹ý º¹Á¦°¡ ¾ç»êÇÏ´Â À§±â¸¦ ÇØ°áÇ϶ó

À§Á¶¿Í ºÒ¹ý º¹Á¦ÀÇ ºÎÀÛ¿ëÀº ¼¼°è °æÁ¦¿¡ ¿¬°£ 4Á¶ 7,000¾ï ´Þ·¯ÀÇ ¼Õ½ÇÀ» ÀÏÀ¸Å°°í, 2022³â±îÁö ÇÕ¹ýÀûÀÎ 540¸¸ °³ÀÇ ÀÏÀÚ¸®¸¦ À§Çè¿¡ ºüÆ®¸± °ÍÀ¸·Î ÃßÁ¤µÇ°í ÀÖ´Ù. ÀÌ·¯ÇÑ À§Á¶¿Í ºÒ¹ý ..






Addressing the Counterfeit Goods Crisis
 
A new report titled The Economic Impacts of Counterfeiting and Piracy, estimates that by 2022, the global economic value of counterfeiting and piracy could reach US$2.8 trillion.  The report from Frontier Economics also provides estimates of the wider social and economic impact this activity will have in terms of displaced economic activity and investment, as well as tax losses and criminal enforcement implications.  It concludes that those additional costs could reach an estimated $1.9 trillion by 2022.


Taken together, the negative impacts of counterfeiting and piracy are projected to drain up to $4.7 trillion a year from the global economy and put 5.4 million legitimate jobs at risk by 2022.


¡°This new study shows that the magnitude of counterfeiting and piracy is huge, and growing,¡± said Amar Breckenridge, senior associate at Frontier Economics. ¡°Our objective is to as accurately as possible characterize the magnitude and growth of this illegal underground economy and its impacts on governments and consumers. The results show once again that in an interconnected economy, consumers and governments suffer alongside legitimate businesses from the trade in counterfeit and pirated goods.¡±


Frontier¡¯s analysis builds on a 2016 report published by the Organization for Economic Cooperation and Development (or OECD) and the European Union Intellectual Property Office.  That report focused on the value of the international trade in counterfeit and pirated products. That study indicated an increase of more than 80% over the level found in the OECD¡¯s ground-breaking 2008 report on the subject.


The scope of the new 2017 study was far larger.  Frontier attempted to estimate the direct and indirect impact of all production and trade in counterfeit goods worldwide.  Assuming nothing changes, the four broad categories and their yearly estimated economic impact in 2022, are as follows:


1. Internationally traded counterfeit and pirated goods.
Up to $991 billion


2. Domestically produced and consumed counterfeit and pirated goods.
Up to $959 billion


3. Digital piracy of movies, music, and software.
Up to $856 billion


4. Wider economic and social costs
Up to $1.88 trillion consisting the following:


- Displacement of legitimate economic activity
Up to $1.25 trillion


- Reduction in foreign direct investment
Up to $231 billion


- Government fiscal losses (e. g., taxes)
Up to $271 billion


- Cost of crime
Up to $125 billion


That represents a grand total of up to $4.7 trillion a year due to a global criminal enterprise.
 
That amounts to nearly $700 for each of the 7 billion people on this planet.


Practically speaking, counterfeiting and piracy distorts the economy in many ways.


First, it denies those who innovate their just rewards.  Over the long haul, this leads to less innovation.  That may not be so critical in the case of fashion accessories or entertainment, but in fields like software and pharmaceuticals it can make the difference between developing or not developing the next big solution.  


Second, it endangers public safety when counterfeit goods lack the quality controls built into the production of genuine goods.  In the case of aircraft parts, automobile parts or pharmaceuticals this can be a matter of life or death.


Third, government is deprived of the tax revenue it¡¯s due.  As with so many aspects of the underground economy, the counterfeit goods create a short-fall that must be made up by other tax payers.


Fourth, the clandestine nature of counterfeiting and smuggling ensure that highly unsavory criminal elements are inevitably involved.  Bribery, coercion and violence are a necessary part of trafficking counterfeit goods, especially in OECD countries.  And law enforcement resources needed to impede counterfeiting is another significant expense that must be borne by society. And


Finally, with over 50 % of counterfeit goods in the U. S. being produced in China, this further exacerbates already tense trade relations between the two countries.  In all likelihood, most of 5.4 million jobs displaced by counterfeiting are in the U. S. or EU.


Today, regulators and law enforcement across the OECD and elsewhere are working with scientists and engineers to develop solutions to the problems of counterfeiting and piracy.  Only time will tell whether we¡¯re able to eliminate this threat to our economy and safety.


Given this trend, we offer the following forecasts for your consideration.


First, by 2018, wider adoption of new technologies will make it easier to detect counterfeit manufactured a goods.


A team of researchers has developed a new system that uses machine-learning algorithms to distinguish between genuine and counterfeit versions of the same product.  The underlying principle of this system stems from the idea that microscopic characteristics in a genuine product exhibit inherent similarities that can be used to distinguish these products from their corresponding counterfeit versions. The system is being commercialized by a startup called Entrupy Inc.  While other counterfeit-detection methods exist, these have been not been widely adopted because they are invasive and run the risk of damaging the products under examination.  The Entrupy method provides a non-intrusive solution to easily distinguish authentic versions of the product produced by the original manufacturer and fake versions of the product produced by counterfeiters.  It does so by deploying a dataset of three million images across various objects and materials such as fabrics, leather, pills, electronics, toys and shoes.  The classification accuracy is more than 98 percent.  (A demo of the Entrupy technology may be viewed at https://www.youtube.com/watch?v=DsdsY8-gljg.)


Second, by 2025, unclonable security tags will be printed on virtually every high-value, name-brand physical product to enable identification of counterfeits.


It turns out that 2D materials like graphene possess random defects at the molecular level.  By incorporating the 2D material into a security tag, the manufacturer creates an unclonable identifier that can be read with a smartphone camera.  The tag containing the graphene is designed to luminesce when exposed to the smartphone¡¯s flash. The unique pattern seen by the camera cannot be counterfeited and this enables a buyer, merchant or law enforcement officer to instantly determine whether the product is genuine. Best of all, this tag is so thin that it can even be printed onto individual pharmaceutical tablets and capsules, with no harmful effects.  don¡¯t yet know whether pharmaceutical firms will adopt that idea. But in other areas the transition to things that cannot be faked could be swift. A British company called Quantum Base, holds the rights.  It recently struck a deal with OpSec, one of the world¡¯s largest makers of holograms. The firm will start incorporating the atomic scale tags into their holograms next year. The first application will involve auto parts, such as airbags.
 
Third, digital piracy will be reduced as companies move increasingly toward Software As A Service, or SAAS.


While major companies in OECD countries have long enforced policies against software piracy, it¡¯s still a major problem worldwide, especially among consumers.  However, the shift to subscription software like Microsoft Office 365 and Adobe Creative Cloud is making it harder for consumers to pirate software.  Obviously, this is a problem that won¡¯t go away in the foreseeable future, but the Trends editors expect it to become a smaller and smaller issue going forward.  And,
Fourth, while piracy of digital entertainment will remain an enormous problem technology will help reduce the bleeding.


One approach is embedding a ¡°digital watermark¡± into a price of music or video that notifies the playing system or application if the work is licensed or not.  This can be linked to the playing system in such a way that the playing system will only play content when the watermark identifies them as genuine.  An extension of this is to identify who the licensed user is and check if the playing device is licensed to that user or that document region. The challenge is to get this feature integrated into the dominant technologies like Android and iOS.


References


1. New Scientist, 2 October 2017, By Joshua Howgego The real deal? The lowdown on counterfeits you meet day to day

https://www.newscientist.com/article/2149110-the-real-deal-the-lowdown-on-counterfeits-you-meet-day-to-day/?cmpid=ILC|NSNS|2017-GLOBAL-inlinelink&utm_medium=ILC&utm_source=NSNS&utm_campaign=inlinelink 


2. New Scientist, 27 September 2017, By Ida Emilie Steinmark  Fighting fakery: How to make products immune to counterfeiting

https://www.newscientist.com/article/mg23531452-300-fighting-fakery-how-to-make-products-immune-to-counterfeiting/?cmpid=ILC|NSNS|2017-GLOBAL-inlinelink&utm_medium=ILC&utm_source=NSNS&utm_campaign=inlinelink


3. The Economic Impacts of Counterfeiting and Piracy ? Report prepared for BASCAP and INTA, 2016, Frontier Economics.

https://cdn.iccwbo.org/content/uploads/sites/3/2017/02/ICC-BASCAP-Frontier-report-2016.pdf


4. Document security watermarks to prevent digital piracy , 2017, Locklizard.com.

https://www.locklizard.com/document-security-blog/document-security-watermark/






À§Á¶¿Í ºÒ¹ý º¹Á¦ÀÇ ºÎÀÛ¿ëÀº ¼¼°è °æÁ¦¿¡ ¿¬°£ 4Á¶ 7,000¾ï ´Þ·¯ÀÇ ¼Õ½ÇÀ» ÀÏÀ¸Å°°í, 2022³â±îÁö ÇÕ¹ýÀûÀÎ 540¸¸ °³ÀÇ ÀÏÀÚ¸®¸¦ À§Çè¿¡ ºüÆ®¸± °ÍÀ¸·Î ÃßÁ¤µÇ°í ÀÖ´Ù. ÀÌ·¯ÇÑ À§Á¶¿Í ºÒ¹ý º¹Á¦´Â °æÁ¦ÀûÀ¸·Î ¾î¶² Àǹ̸¦ Áö´Ï°í ÀÖÀ»±î? ±â¼ú °æÁ¦ÀÇ ½Ã´ë, ±× ÇØ°áÃ¥Àº?


¡®À§Á¶¿Í ºÒ¹ý º¹Á¦ÀÇ °æÁ¦Àû ¿µÇ⡯À̶ó´Â ÇÑ º¸°í¼­´Â 2022³â±îÁö À§Á¶¿Í ºÒ¹ý º¹Á¦ÀÇ Àü ¼¼°è °æÁ¦Àû °¡Ä¡°¡ 2Á¶ 8,000¾ï ´Þ·¯¿¡ À̸¦ °ÍÀ¸·Î Ãß»êÇÏ°í ÀÖ´Ù. ¿µ±¹ ÄÁ¼³Æà ¾÷ü ÇÁ·±Æ¼¾î ÀÌÄÚ³ë¹Í½ºFrontier Economics°¡ ³»³õÀº ÀÌ º¸°í¼­¿¡¼­ À§Á¶¿Í ºÒ¹ý º¹Á¦ È°µ¿ÀÌ °æÁ¦Àû ¼Õ½Ç»Ó¸¸ ¾Æ´Ï¶ó ÅõÀÚ, ¼¼±Ý ¼Õ½Ç, ¹üÁËÇàÀ§ ó¹ú°ú °ü·ÃÇÏ¿© ´õ ³ÐÀº »çȸ °æÁ¦Àû ¿µÇâÀ» ¹ÌÄ¥ °ÍÀ¸·Î ÃßÁ¤ÇÏ°í ÀÖ´Ù. °á·ÐÀûÀ¸·Î 2022³â±îÁö ÀÌ¿Í ¿¬°èµÇ´Â Ãß°¡ ºñ¿ë¸¸ 1Á¶ 9,000¾ï ´Þ·¯¿¡ À̸¦ °ÍÀ¸·Î ¿¹ÃøÇÏ°í ÀÖ´Ù.

Á¾ÇÕÇϸé, À§Á¶¿Í ºÒ¹ý º¹Á¦ÀÇ ºÎÀÛ¿ëÀº ¼¼°è °æÁ¦¿¡ ¿¬°£ 4Á¶ 7,000¾ï ´Þ·¯ÀÇ ¼Õ½ÇÀ» ÀÏÀ¸Å°°í, 2022³â±îÁö ÇÕ¹ýÀûÀÎ 540¸¸ °³ÀÇ ÀÏÀÚ¸®¸¦ À§Çè¿¡ ºüÆ®¸± °ÍÀ¸·Î ¿¹ÃøÇÏ°í ÀÖ´Ù.


ÇÁ·±Æ¼¾î ÀÌÄÚ³ë¹Í½ºÀÇ ¼ö¼® ¼±ÀÓ ¾Æ¸¶¸£ ºê·¹Ä˸®ÁöAmar Breckenridge´Â ¡°ÀÌ »õ·Î¿î ¿¬±¸´Â À§Á¶¿Í ºÒ¹ý º¹Á¦ÀÇ ±Ô¸ð°¡ ¾öû³ª°Ô Ä¿Áö°í ÀÖ´Ù.¡±°í ¸»ÇÑ´Ù. ¡°¿ì¸®ÀÇ ¸ñÇ¥´Â °¡´ÉÇÑ ÇÑ Á¤È®ÇÏ°Ô ÀÌ ºÒ¹ýÀûÀÎ ÁöÇÏ °æÁ¦ÀÇ ±Ô¸ð¿Í ¼ºÀå, Á¤ºÎ¿Í ¼ÒºñÀÚ¿¡°Ô ¹ÌÄ¡´Â ¿µÇâÀÇ Æ¯¼ºÀ» Àâ¾Æ³»´Â °ÍÀ̾ú½À´Ï´Ù. °á°ú´Â »óÈ£ ¿¬°áµÈ °æÁ¦¿¡¼­ ÇÕ¹ýÀûÀÎ »ç¾÷ ¿µ¿ª»Ó¸¸ ¾Æ´Ï¶ó ¼ÒºñÀÚ¿Í Á¤ºÎ°¡ À§Á¶Ç°°ú ºÒ¹ý º¹Á¦Ç° °Å·¡·Î ÀÎÇÑ °íÅëÀ» ÇÔ²² °Þ°í ÀÖÀ½À» ´Ù½Ã ÇÑ ¹ø º¸¿©Áá½À´Ï´Ù.¡±


ÇÁ·±Æ¼¾îÀÇ ºÐ¼®Àº °æÁ¦Çù·Â°³¹ß±â±¸OECD¿Í À¯·´¿¬ÇÕ ÁöÀûÀç»ê±Ç»ç¹«±¹the European Union Intellectual Property OfficeÀÌ ¹ßÇ¥ÇÑ 2016³â º¸°í¼­¸¦ ¹ÙÅÁÀ¸·Î ÀÛ¼ºµÇ¾ú´Ù. ÀÌ º¸°í¼­´Â À§Á¶Ç°°ú ÇØÀûÆÇ Á¦Ç°ÀÌ ¼¼°è °æÁ¦ Àüü¿¡ ¹ÌÄ¡´Â °¡Ä¡¿¡ ÁßÁ¡À» µÎ¾ú´Ù. ¿¬±¸´Â µ¿ÀÏ ÁÖÁ¦·Î OECDÀÇ 2008³â º¸°í¼­(´ç½Ã ÀÌ º¸°í¼­¿¡ ¸ðµÎ °æ¾ÇÀ» ±ÝÄ¡ ¸øÇß´Ù)¿¡¼­ ÆÄ¾ÇµÈ ¼öÁغ¸´Ù 80 ÆÛ¼¾Æ® ÀÌ»ó »óȲÀÌ ´õ ¾ÇÈ­µÈ °ÍÀ¸·Î ³ªÅ¸³µ´Ù.


2017³â »õ·Î¿î ¿¬±¸ÀÇ ¹üÀ§´Â ÈξÀ ´õ ¹æ´ëÇß´Ù. ÇÁ·±Æ¼¾îÀÇ ½Ãµµ´Â Àü ¼¼°èÀûÀ¸·Î ¸ðÁ¶Ç°¿¡ ´ëÇÑ ¸ðµç »ý»ê°ú ±³¿ªÀÇ Á÷°£Á¢Àû ¿µÇâÀ» ÃßÁ¤ÇÏ·Á´Â °ÍÀ̾ú´Ù. ¸¸¾à, ¾ÕÀ¸·Î ¾î¶² º¯È­µµ ¾ø´Ù°í °¡Á¤ÇÒ ¶§, 2022³â±îÁö 4°¡Áö ¹üÁÖ¿Í ¿¬°£ ÃßÁ¤ °æÁ¦Àû ¿µÇâÀº ¾Æ·¡¿Í °°´Ù.


1. ±¹Á¦ÀûÀ¸·Î °Å·¡µÇ´Â À§Á¶Ç° ¹× ºÒ¹ý º¹Á¦Ç°_ÃÖ´ë 9,910¾ï ´Þ·¯


2. °¢ ±¹°¡³» »ý»ê?¼Òºñ À§Á¶Ç° ¹× ºÒ¹ý º¹Á¦Ç°_ÃÖ´ë 9,590¾ï ´Þ·¯


3. ¿µÈ­, À½¿ø, ¼ÒÇÁÆ®¿þ¾îÀÇ µðÁöÅÐ ºÒ¹ý º¹Á¦_ÃÖ´ë 8,560¾ï ´Þ·¯


4. ±¤¹üÀ§ÇÑ »çȸ °æÁ¦Àû ºñ¿ë_ÃÖ´ë 1Á¶ 8,800¾ï ´Þ·¯(¾Æ·¡¿Í °°ÀÌ ±¸¼º)


- ÇÕ¹ýÀûÀÎ °æÁ¦ È°µ¿ À§Ãà : ÃÖ´ë 1,250¾ï ´Þ·¯


- ¿Ü±¹ÀÎ Á÷Á¢ ÅõÀÚ °¨¼Ò : ÃÖ´ë 2,310¾ï ´Þ·¯


- ¼¼±Ý°ú °°Àº Á¤ºÎ ÀçÁ¤ ¼Õ½Ç : ÃÖ´ë 2,710¾ï ´Þ·¯


- ¹üÁË Ã³¸® ºñ¿ë : ÃÖ´ë 1,250¾ï ´Þ·¯


Áï, ¼¼°èÀûÀÎ ¹üÁË ÇàÀ§¿¡ µû¸¥ ¿¬°£ ÃÖ´ë ÇÇÇØ°¡ 4Á¶ 7,000¾ï ´Þ·¯¿¡ À̸¥´Ù´Â °ÍÀÌ´Ù. ÀÌ ±Ý¾×Àº Áö±¸¿¡ »ç´Â 70¾ï Àα¸ °¢ °³Àο¡°Ô ¸Å³â ¾à 700´Þ·¯¸¦ Áö±ÞÇÒ ¼ö ÀÖ´Â ¼öÁØÀÌ´Ù.


À§Á¶¿Í ºÒ¹ý º¹Á¦´Â 5°¡Áö ¸é¿¡¼­ °æÁ¦¸¦ ¿Ö°î½ÃŲ´Ù.


ù°, ÀÌ·¯ÇÑ ÇàÀ§´Â º¸»óÀ» ´õ Å« »çȸÀû ÇýÅÃÀ¸·Î ½ÂÈ­½ÃÅ°´Â Çõ½ÅÀ» ÀúÇØÇÑ´Ù. Àå±âÀûÀ¸·Î º¼ ¶§ ÀÌ°ÍÀÌ Çõ½Å·ÂÀ» °¨¼Ò½ÃÅ°±â ¶§¹®ÀÌ´Ù. ÆÐ¼Ç ¾×¼¼¼­¸®³ª ¿£ÅÍÅ×ÀθÕÆ®ÀÇ °æ¿ì¿¡´Â ±×·¸°Ô Áß¿äÇÏÁö ¾ÊÀ» ¼ö ÀÖ´Ù. ÇÏÁö¸¸ ¼ÒÇÁÆ®¿þ¾î¿Í ÀǾàÇ°°ú °°Àº ºÐ¾ß¿¡¼­´Â Â÷¼¼´ëÀÇ Å« ¼Ö·ç¼ÇÀ» °³¹ßÇÒ °ÍÀÎÁö ¾Æ´ÑÁö¸¦ °áÁ¤ÇÏ´Â µ¥ ÀÖ¾î ¸Å¿ì Áß¿äÇÏ´Ù.


µÑ°, ÀÌ·¯ÇÑ ÇàÀ§´Â °ø°øÀÇ ¾ÈÀüÀ» À§ÅÂ·Ó°Ô ÇÑ´Ù. Á¤Ç° »ý»ê °úÁ¤¿¡ Æ÷ÇԵǴ ǰÁú °ü¸®°¡ À§Á¶Ç°¿¡´Â Àû¿ëµÇÁö ¾Ê±â ¶§¹®ÀÌ´Ù. Ç×°ø±â ºÎÇ°, ÀÚµ¿Â÷ ºÎÇ° ¶Ç´Â ÀǾàÇ°ÀÇ °æ¿ì ÀÌ´Â »ý»çÀÇ ¹®Á¦°¡ µÉ ¼ö ÀÖ´Ù.


¼Â°, ÀÌ·¯ÇÑ ÇàÀ§´Â Á¤ºÎ·ÎºÎÅÍ ¼¼±Ý ¼öÀÔÀ» ¹ÚÅ»ÇÑ´Ù. ÁöÇÏ °æÁ¦ÀÇ ¿©·¯ Ãø¸é°ú ¸¶Âù°¡Áö·Î À§Á¶Ç°Àº ¼¼¼ö ºÎÁ·À» ÀÏÀ¸Å°°í, ±× ºÎÁ·ºÐÀ» ´Ù¸¥ ³³¼¼Àڵ鿡°Ô ºÎ´ã½ÃŲ´Ù.


³Ý°, À§Á¶¿Í ¹Ð¼öÀÇ Àº¹ÐÇÑ ¼º°Ý ¶§¹®¿¡ ¸Å¿ì ºÎÀûÀýÇÑ ¹üÁË ¿ä¼Ò°¡ ÇÊ¿¬ÀûÀ¸·Î ¿¬°èµÈ´Ù. ƯÈ÷ OECD ±¹°¡¿¡¼­´Â À§Á¶Ç°À» ¹Ð¸ÅÇÏ´Â µ¥ ³ú¹°, °­¿ä, Æø·ÂÀÌ ¹Ýµå½Ã ¼ö¹ÝµÈ´Ù. ¶ÇÇÑ À§Á¶Ç°À» ÀúÁöÇϱâ À§ÇØ ÇÊ¿äÇÑ ¹ý ÁýÇà ÀÚ¿øÀº »çȸ°¡ ºÎ´ãÇØ¾ß ÇÏ´Â ¶Ç ´Ù¸¥ Áß´ë ºñ¿ëÀÌ µÈ´Ù.


¸¶Áö¸·À¸·Î, ¹Ì±¹ ³»¿¡¼­¸¸ °Å·¡µÇ´Â À§Á¶Ç°¸¸ Çصµ 50ÆÛ¼¾Æ® ÀÌ»óÀÌ Áß±¹¿¡¼­ »ý»êµÇ°í ÀÖ¾î, ÀÌ´Â ÇÊ¿¬ÀûÀ¸·Î ±¹°¡°£ ¹«¿ª °ü°è¸¦ ±äÀå½ÃÅ°°í ´õ¿í ¾ÇÈ­½ÃŲ´Ù. À§Á¶Ç°À¸·Î Á÷ÀåÀÌ »ç¶óÁø 540¸¸ °³ÀÇ ÀÏÀÚ¸® ÇÇÇØ´Â ÁÖ·Î ¹Ì±¹°ú À¯·´¿¬ÇÕ¿¡¼­ ¹ß»ýÇÑ´Ù.


¿À´Ã³¯ OECD¸¦ ºñ·ÔÇÏ¿© ±âŸ ±¹°¡¿¡¼­ ±ÔÁ¦ ±â°ü°ú ¹ýÁýÇà ±â°üÀº À§Á¶ ¹× ºÒ¹ý º¹Á¦ ¹®Á¦¸¦ ÇØ°áÇϱâ À§ÇØ °úÇÐÀÚ, ¿£Áö´Ï¾îµé°ú Çù·ÂÇÏ°í ÀÖ´Ù. ÀÌ¿¡ À§Á¶¿Í ºÒ¹ý º¹Á¦¿¡ ´ëÇÑ ¼¼°èÀû Çö»ó°ú ¹®Á¦¿¡ ´ëÇØ ¿ì¸®´Â ¾ÕÀ¸·Î ´ÙÀ½ 4°¡Áö¸¦ ¿¹ÃøÇÑ´Ù.


ù°, 2018³â±îÁö »õ·Î¿î ±â±âµéÀÌ Æø³Ð°Ô µµÀԵǸ鼭, À§Á¶Ç° »öÃâÀÌ Á» ´õ ¼ö¿ùÇØÁú °ÍÀÌ´Ù.


ÇÑ ¿¬±¸ÆÀÀº ±â°è ÇнÀ ¾Ë°í¸®ÁòÀ» »ç¿ëÇÏ¿© µ¿ÀÏÇÑ Á¦Ç°ÀÇ Á¤Ç° ¹öÀü°ú À§Á¶ ¹öÀüÀ» ±¸º°ÇÏ´Â »õ·Î¿î ½Ã½ºÅÛÀ» °³¹ßÇß´Ù. ÀÌ ½Ã½ºÅÛÀÇ ÁÖ¿ä ¿ø¸®´Â Á¤Ç° Á¦Ç°ÀÇ ¹Ì¼¼ÇÑ Æ¯¼ºÀÌ °íÀ¯ÇÑ À¯»ç¼ºÀ» ³ªÅ¸³»¾î ÇØ´ç Á¦Ç°À» À§Á¶ ¹öÀü°ú ±¸º°ÇÒ ¼ö ÀÖ´Ù´Â ¾ÆÀ̵ð¾î¿¡ ±âÀÎÇÑ´Ù. Áï, ÀÌ ½Ã½ºÅÛÀº Ä«¸Þ¶ó°¡ ¹°Ã¼¸¦ 260¹è·Î È®´ëÇؼ­, Àΰ£ÀÇ ´«¿¡´Â º¸ÀÌÁö ¾Ê´Â Ư¡À» ã¾Æ³» ÆǺ°¿¡ È°¿ëÇÑ´Ù. ÀÌ ½Ã½ºÅÛÀº ¿£Æ®·çÇÇEntrupy Inc¶ó´Â º¥Ã³ ±â¾÷ÀÌ »ó¿ëÈ­Çß´Ù. ¿©·¯ ´Ù¸¥ À§Á¶ °¨Áö ¹æ¹ýÀÌ Á¸ÀçÇÏÁö¸¸ ÀÌ ¹æ¹ýµéÀº Á¦Ç°¿¡ ħÅõÇÏ´Â µî Á¦Ç°À» ¼Õ»ó½Ãų À§ÇèÀÌ ÀÖ¾î ±×´ÙÁö È¿¿ëÀûÀÌÁö ¾Ê´Ù. ±×¿¡ ¹ÝÇØ ¿£Æ®·çÇÇÀÇ ¹æ¹ýÀº ºñ¼Õ»ó ¹æ½ÄÀÇ °¨Áö ½Ã½ºÅÛÀ¸·Î À§Á¶ÀÚ°¡ »ý»êÇÑ Á¦Ç°°ú ¿ø Á¦Á¶¾÷ü ¹öÀüÀ¸·Î »ý»êµÈ Á¤Ç°À» ½±°Ô ±¸º°ÇÒ ¼ö ÀÖ´Ù. Á÷¹°, °¡Á×, ¾àÇ°, ÀüÀÚ Á¦Ç°, Àå³­°¨ ¹× ½Å¹ß°ú °°Àº ´Ù¾çÇÑ ¹°Ã¼¿Í Àç·á¿¡ ´ëÇÑ 3¹é¸¸ °³ÀÇ À̹ÌÁö µ¥ÀÌÅÍ ¼¼Æ®°¡ ÀÌ¹Ì °®ÃçÁ® ÀÖ´Ù. ÇöÀç ºÐ·ù Á¤È®µµ´Â 98ÆÛ¼¾Æ® ÀÌ»óÀÌ´Ù(¿£Æ®·çÇÇ ±â¼ú µ¥¸ð´Â https://www.youtube.com/watch?v=DsdsY8-gljg¿¡¼­ È®ÀÎÇÒ ¼ö ÀÖ´Ù).


µÑ°, 2025³â±îÁö º¹Á¦°¡ ºÒ°¡´ÉÇÑ º¸¾È űװ¡ °í°¡ ¸íÇ° ºê·£µå Á¦Ç°¿¡ ÀμâµÇ¾î, À§Á¶Ç°°ú ½Äº°µÉ ¼ö ÀÖÀ» °ÍÀÌ´Ù.


±×·¡ÇÉgraphene°ú °°Àº 2D ¹°ÁúÀº ºÐÀÚ ¼öÁØ¿¡¼­ ¹«ÀÛÀ§ °áÁ¡defectÀ» °¡Áö°í ÀÖÀ½ÀÌ ¹àÇôÁ³´Ù. ÀÌ·¯ÇÑ 2D ¹°ÁúÀ» º¸¾È ű׷ΠȰ¿ëÇÔÀ¸·Î½á, Á¦Á¶ÀÚµéÀº ½º¸¶Æ®Æù Ä«¸Þ¶ó·Î ÀÐÀ» ¼ö ÀÖ´Â º¹Á¦ ºÒ°¡´ÉÇÑ ½Äº°ÀÚ¸¦ Á¦ÀÛÇÒ ¼ö ÀÖ´Ù. ±×·¡ÇÉÀÌ Æ÷ÇԵǾî Àִ ű״ ½º¸¶Æ®ÆùÀÇ Ç÷¡½Ã¿¡ ³ëÃâµÇ¾úÀ» ¶§ ¹ß±¤Çϵµ·Ï ¼³°èµÇ¾ú´Ù. Ä«¸Þ¶ó°¡ Àд °íÀ¯ÇÑ ÆÐÅÏÀº À§Á¶µÉ ¼ö ¾ø¾î, ±¸¸ÅÀÚ, À¯Åë¾÷ÀÚ, ¹ý ÁýÇà°üµéÀº Á¦Ç°ÀÌ Á¤Ç°ÀÎÁö À§Á¶ÀÎÁö¸¦ Áï½Ã ÆÇ´ÜÇÒ ¼ö ÀÖ´Ù. ¹«¾ùº¸´Ùµµ ÀÌ Å±״ ³Ê¹« ¾ã¾Æ¼­ À¯ÇؼºÀÌ ¾øÀ¸¸ç, °³º° ¾Ë¾à ¹× ĸ½¶¿¡µµ ÀμâµÉ ¼öµµ ÀÖ´Ù. ÀÌ ¾ÆÀ̵ð¾î¸¦ ¾î¶² ±â¾÷µéÀÌ Ã¤ÅÃÇÒÁö´Â ¸ð¸£Áö¸¸, ¾î¶² »ê¾÷ ¿µ¿ª¿¡¼­µç º¹Á¦µÉ ¼ö ¾øµµ·Ï ÇÏ´Â ¹æÇâÀ¸·Î ½Å¼ÓÇÑ ÀüȯÀÌ ÀÌ·ïÁú °ÍÀÌ´Ù. ÄöÅÒ º£À̽ºQuantum Base¶ó´Â ¿µ±¹ ȸ»ç°¡ ÇöÀç ÀÌ·¯ÇÑ ±â¼ú ƯÇ㸦 º¸À¯ÇÏ°í ÀÖÀ¸¸ç ÃÖ±Ù ¼¼°è ÃÖ´ë Ȧ·Î±×·¥ Á¦Á¶¾÷ü ¿É¼½OpSec°ú °è¾àÀÌ Ã¼°áµÆ´Ù. ¿É¼½Àº ³»³âºÎÅÍ È¦·Î±×·¥¿¡ ¿øÀÚ ¼öÁØÀÇ Å±׸¦ ºÎÂø½ÃÅ°´Â ÀÛ¾÷À» ÁøÇàÇÒ °ÍÀ¸·Î ¾Ë·ÁÁ® ÀÖ´Ù. ù ¹ø° ¾ÖÇø®ÄÉÀ̼ǿ¡´Â ¿¡¾î¹é°ú °°Àº ÀÚµ¿Â÷ ºÎÇ°µµ Æ÷Ç﵃ °ÍÀÌ´Ù.


¼Â°, ±â¾÷ÀÌ ¼­ºñ½ºÇü ¼ÒÇÁÆ®¿þ¾î ȤÀº ¼­ºñ½ºÇü Ç÷§ÆûSoftware As A Service, SaaSÀ¸·Î Á¡Â÷ À̵¿ÇÔ¿¡ µû¶ó µðÁöÅÐ ÀúÀÛ±Ç Ä§ÇØ´Â ÁÙ¾îµé °ÍÀÌ´Ù.


OECD ±¹°¡ÀÇ ÁÖ¿ä ±â¾÷µéÀº ¼ÒÇÁÆ®¿þ¾î ºÒ¹ý º¹Á¦¿¡ ´ëÇÑ Á¤Ã¥À» ¿À·§µ¿¾È ½ÃÇàÇØ ¿Ô´Ù. ÇÏÁö¸¸ Àü ¼¼°èÀûÀ¸·Î, ƯÈ÷ ¼ÒºñÀÚµé »çÀÌ¿¡¼­´Â ¿©ÀüÈ÷ ÀÌ ¹®Á¦°¡ Áß¿äÇÑ ÁÖÁ¦·Î ³²¾ÆÀÖ´Ù. ±×·¯³ª ¸¶ÀÌÅ©·Î¼ÒÇÁÆ® ¿ÀÇǽº 364Microsoft Office 364¿Í ¾îµµºñ Å©¸®¿¡ÀÌƼºê Ŭ¶ó¿ìµå Adobe Creative Cloud¿Í °°Àº °¡ÀÔ ¼ÒÇÁÆ®¿þ¾î·ÎÀÇ ÀüȯÀº ¼ÒºñÀÚ°¡ ¼ÒÇÁÆ®¿þ¾î¸¦ ÇØÀûÆÇÀ» ÅëÇØ »ç¿ëÇÏ´Â °ÍÀ» ¾î·Æ°Ô ¸¸µç´Ù. °¡±î¿î ¹Ì·¡ ÀÌ ¹®Á¦°¡ ¸ðµÎ »ç¶óÁöÁø ¾Ê°ÚÁö¸¸, SaaS¿¡ µû¶ó ÀÌ ¹®Á¦´Â »ç¼ÒÇÑ ¹®Á¦·Î Á¡Á¡ ´õ ÀÛ¾ÆÁú °ÍÀÓÀº È®½ÇÇÏ´Ù.


³Ý°, µðÁöÅÐ ¿£ÅÍÅ×ÀθÕÆ®ÀÇ ºÒ¹ý º¹Á¦°¡ ¾ÆÁ÷ Å« ¹®Á¦·Î ³²¾Æ ÀÖÁö¸¸, ±â¼úÀÌ ÀÌ ¹®Á¦µµ ÇØ°áÇÏ´Â µ¥ µµ¿òÀ» ÁÙ °ÍÀÌ´Ù.


µðÁöÅÐ ¿£ÅÍÅ×ÀθÕÆ® ºÒ¹ý º¹Á¦¸¦ ÇØ°áÇÏ´Â ÇÑ °¡Áö Á¢±Ù¹ýÀº À½¾ÇÀ̳ª ºñµð¿ÀÀÇ °¡°Ý¿¡ ¡®µðÁöÅÐ ¿öÅ͸¶Å©¡¯¸¦ ³ìÀÌ´Â °ÍÀÌ´Ù. À̸¦ ÅëÇØ Ç÷¹ÀÌ ½Ã½ºÅÛÀ̳ª ¾îÇø®ÄÉÀ̼ÇÀÌ ±× »óÇ°ÀÌ ¶óÀ̼±½º¸¦ ÃëµæÇÑ °ÍÀÎÁö ¾Æ´ÑÁö¸¦ È®ÀÎÇÒ ¼ö ÀÖ´Ù. Ç÷¹ÀÌ ½Ã½ºÅÛÀ̳ª ¾îÇø®ÄÉÀ̼ÇÀÌ ¿öÅ͸¶Å©¸¦ ÅëÇØ ÄÜÅÙÃ÷ Àç»ýÀ» ÁøÇàÇϰųª, ±×·¸Áö ¾ÊÀº °æ¿ì ÇØ´ç ÄÜÅÙÃ÷ÀÇ ¶óÀ̼±½º ±¸ÀÔ ÆäÀÌÁö·Î À̵¿½Ãų ¼ö ÀÖ´Ù. ÀÌ°ÍÀº ¶óÀ̼±½º°¡ ºÎ¿©µÈ »ç¿ëÀÚ¸¦ ½Äº°ÇÏ°í ÇØ´ç Àç»ý ÀåÄ¡°¡ ÇØ´ç »ç¿ëÀÚ ¶Ç´Â ÇØ´ç ¹®¼­ ¿µ¿ª¿¡ ´ëÇØ ¶óÀ̼±½º°¡ ºÎ¿©µÇ¾ú´ÂÁö¸¦ È®ÀÎÇÏ´Â °ÍÀÌ´Ù. ¹®Á¦´Â ÀÌ ±â´ÉÀ» ¾Èµå·ÎÀ̵åAndroid ¹× iOS¿Í °°Àº ÁÖ¿ä ±â¼ú¿¡ ÅëÇÕÇÏ´Â µ¥ ÀÖ´Ù.


* *

References List :
1. New Scientist, 2 October 2017, By Joshua Howgego The real deal? The lowdown on counterfeits you meet day to day.
https://www.newscientist.com/article/2149110-the-real-deal-the-lowdown-on-counterfeits-you-meet-day-to-day/?cmpid=ILC|NSNS|2017-GLOBAL-inlinelink&utm_medium=ILC&utm_source=NSNS&utm_campaign=inlinelink
 
2. New Scientist, 27 September 2017, By Ida Emilie Steinmark  Fighting fakery: How to make products immune to counterfeiting.
https://www.newscientist.com/article/mg23531452-300-fighting-fakery-how-to-make-products-immune-to-counterfeiting/?cmpid=ILC|NSNS|2017-GLOBAL-inlinelink&utm_medium=ILC&utm_source=NSNS&utm_campaign=inlinelink


3. The Economic Impacts of Counterfeiting and Piracy ? Report prepared for BASCAP and INTA, 2016, Frontier Economics.

https://cdn.iccwbo.org/content/uploads/sites/3/2017/02/ICC-BASCAP-Frontier-report-2016.pdf


4. Document security watermarks to prevent digital piracy , 2017, Locklizard.com.
https://www.locklizard.com/document-security-blog/document-security-watermark/





ÀÌÀü

¸ñ·Ï