|
Copyright Management and Control Systems: Metering Hardware Devices Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works. Digital Certificates Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides Centralized Computing Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access. Access Codes Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the Copyright Clearinghouses Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property. |
|
|
|
NSA U.S. intelligence agency within the Department of Defense that is responsible for cryptographic and communications intelligence and security. The NSA grew out of the communications intelligence activities of U.S. military units during World War II. The NSA was established in 1952 by a presidential directive and, not being a creation of the Congress, is relatively immune to Congressional review; it is the most secret of all U.S. intelligence agencies. The agency's mission includes the protection and formulation of codes, ciphers, and other cryptology for the U.S. military and other government agencies, as well as the interception, analysis, and solution of coded transmissions by electronic or other means. The agency conducts research into all forms of electronic transmission. It operates posts for the interception of signals around the world. Being a target of the highest priority for penetration by hostile intelligence services, the NSA maintains no contact with the public or the press. |
|
|