Transfer
* Pirates of XXI century * December, 23 2003 on ORT-1 about infringement of
copyrights. The theme very actual and for today is solved in many countries
of the world. Not unitary collisions with a problem of protection of
copyrights has resulted in development and creation of system JVPsй
There
is no really working mechanism of protection Й everyone may result some
personal examples. Too position is kept in modern systems
of payments and the bank services, the given problems are discussed almost
on each commercial site, as an example-
http://www.inmarket.ru
* Internet Market * the Organization of
calculations through the Internet httpmarket.doc
http://www.extrim.ru
- Payment systems in electronic commerce Й
betala.doc.
The offered
system is based on work of a cell where operations are resolved only
between members of system. Use of an electronic cell of module JVPsйЙ the
mathematical description of guarantees of correctness of decision making
about more than 51 % of reliability. At realization of operations rules not allowing
observed to be anonymous, realization of operations is supervised by the
several parties . That allows to reduce risk of swindle
up to a minimum level and mathematical to estimate risk of operations. The given system
uses the statistical analysis of probability of event in the work and
allows to use in practice in insurance business.
Algorithms
of protection of rights of the author of its product in cell JVPsйare
described below. They allow to realize requirements in the given area,
social need for guarantees of safety described in above specified
documents.
The
given system solves much from not decided problems Й the most valuable - surrogate
the owner of copyrights and the owner of counterfeit production, ways of
realization of the given decisions of a problem does not make difficulty
and demands not the long period of expectation.
The
document (we are sorry for not convenient configuration
in the text of the information) contains the description of principles of
work of system and addit1ional service of deliveries of items of mail,
models of application and the description of the cells, offered
services to users. Services are distributed to Internet users and owners of
mobile phones. The spectrum of application of protective modules of system
is very wide Й the Internet, liquidation of the black market of illegal
program disks (the developed module), street trade before protection of
buildings.
Payment
of all taxes and full a transparency of operations.
The information
allocated with red color is illegal.
It is given
only for acquaintance - as the fact of existence in the Internet
|