Copyright Management and Control Systems: Metering
Metering systems allow copyright owners to ensure payment to or at the time of a consumer's use of the work. Those technologies include:
Hardware Devices
Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works.
Digital Certificates
Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides information on the identity of the holder can also include rights associated with a particular person. Vendors can so control access system resources, including copyrighted files, by making them available only to users who can provide a digital certificate with specified rights (e.g. access, use, downloading).
Centralized Computing
Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access.
Access Codes
Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the intellectual property for a one-time license fee or by requiring periodic procurement of access codes.
Copyright Clearinghouses
Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property.
|
TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611725/100438659615
|
|
Global Digital Security
Surveillance and control systems of state agencies, private and military institutions exist around the globe. World-Information.Org provides in depth information on the major surveillance systems such as ECHELON and an analysis of their political, geographical, technical and organizational status. Moreover the status quo in the development and usage of digital identification and tracking technology and the evolution and utilization of cryptography is investigated.
Related search: Global Digital Security
|
TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/researchareas/104853411775
|
|
1996 WIPO Copyright Treaty (WCT)
The
1996 WIPO
Copyright Treaty, which focused on taking steps to protect copyright
"in the digital age" among other provisions 1) makes clear
that computer programs are protected as literary works, 2) the
contracting parties must protect databases that constitute
intellectual creations, 3) affords authors with the new right of
making their works "available to the public", 4) gives
authors the exclusive right to authorize "any communication to
the public of their works, by wire or wireless means ... in such a
way that members of the public may access these works from a place
and at a time individually chosen by them." and 5) requires the
contracting states to protect anti-copying technology and copyright
management information that is embedded in any work covered by the
treaty. The WCT is available on: http://www.wipo.int/documents/en/diplconf/distrib/94dc.htm
http://www.wipo.int/documents/en/diplconf/dis...
|
INDEXCARD, 1/2
|
|
Industrial design
Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for intellectual property protection the design must be novel or original. Protection can be obtained through registration in a government office and usually is given for 10 to 15 years.
|
INDEXCARD, 2/2
|
|