Re: Information Theoretically Secure requirements scheme for improving and implementing intelligent encryption requiring human intervention or decision to be valid. [message #180195 is a reply to message #180193] |
Thu, 24 January 2013 12:21   |
Jerry Stuckle
Messages: 2598 Registered: September 2010
Karma:
|
Senior Member |
|
|
On 1/24/2013 12:10 AM, Martin Musatov wrote:
>
> The techniques all listed above and the intellectual property rights
> associated with them are (C) Copyright 2013 Martin Musatov. They may
> be used or adapted by any entity provided partial credit is provided
> to Martin Musatov and is documented as well as when this occurs in
> conjunction with a non-public donation to a charity equal to the value
> of the contribution.
>
And not worth the bandwidth they took to process.
BTW - you can copyright text (including code), but you cannot copyright
a concept. If your concept were worth anything, anyone could use it at
any time without any credit to you or any payment to anyone.
If you want to protect a concept you need to patent it.
--
==================
Remove the "x" from my email address
Jerry Stuckle
JDS Computer Training Corp.
jstucklex(at)attglobal(dot)net
==================
|
|
|