Tag Archives: digital commerce

A rudimentary OpenDRM

We all know that Open Source was to free ideas from incarceration, not deprive programmers of income. Here is a rudimentary “OpenDRM” scheme. Step 1 (Python script) Comments Updated Apr 22 Step 2 (Python script) – One possible “salt3” might … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

A work protocol for digital work product contract

Digital work product can be intercepted online, and distributed without the permission of either an employer or employee. To limit problems due to intercepted work product, here is an experimental protocol. Prepare an anonymous email account to receive the work. … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Illustration of Watermarking (Lossy Vigenere)

Simon Singh demonstrated a lossless Vigenere in his book, “The Code Book.” I learned it differently in my youth, under the moniker “Rogue’s Gallery.” This (symmetric) Vigenere is “lossy,” and replaces lost information with the character “z.” The placement of … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Abstract Digital Bill of Sale

The concept of duplicating a bill of sale does not usually¬†make us lose confidence in it. However, digitally, a duplicated bill of sale might be presented as a new and separate purchase, perhaps after minor modification. This theory attempts to … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Can stolen passwords be proven to be tampered or stolen?

Passwords are by their nature unverifiable by eye-witness testimony. If a person had a password that they were obligated by law not to divulge, if it were stolen, would not be able to prove what it had been. Password theft … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Possible Uses for Mathematical Secret Sharing

Secret Sharing is difficult mathematically, but has been accomplished “recently,” as such developments go. It is analogous to developing a Cartesian equation of an order of the number of participants, plus one, and then choosing such points on the line, … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Open DRM calls to identify the end user (by password or decryption,) not the author.

An example of an Open DRM application, might be to manufacture a batch of digital movie projectors, that decrypt with unique RSA private keys. The use of the device, would be for the Studio to encipher the same movie uniquely … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment