美国国家安全局先进技术转移规范评鉴
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Evaluation on Advanced Technology Transfer Policy of U.S. National Security Agency
  • 作者:赵丽莉
  • 英文作者:ZHAO Li-li;College of Intellectual Property Rights,Shandong University of Science and Technology;
  • 关键词:国家安全 ; 先进技术 ; 美国国家安全局 ; 技术转移规范
  • 英文关键词:National Security;;Advanced Technology;;U.S. National Security Agency;;Regulation for Technology Transfer
  • 中文刊名:DBSS
  • 英文刊名:Journal of Northeast Normal University(Philosophy and Social Sciences)
  • 机构:山东科技大学知识产权学院;
  • 出版日期:2019-01-01
  • 出版单位:东北师大学报(哲学社会科学版)
  • 年:2019
  • 期:No.297
  • 基金:国家社科基金西部项目(16XFX014)
  • 语种:中文;
  • 页:DBSS201901016
  • 页数:8
  • CN:01
  • ISSN:22-1062/C
  • 分类号:120-127
摘要
随着互联网和全球化的发展,网络、大数据、移动技术、物联网等领域先进技术在信息化建设中角色日益突出。与此同时,先进技术的商业需求与安全应用保障之间关联度,以及先进技术利用中国家安全利益的需求被关注。美国国家安全局先进技术转移规范显示其重视协调先进技术产业发展以及保护国家安全利益需求间的矛盾;公私合作推进先进技术的研究与应用;实施规范化的许可程序,以及对专利技术转让实施严格的国家安全审查机制。这对于探索中国相应领域先进技术转移规范设计提供了很好的借鉴性。我国应当强化上述领域先进技术转移规范建设,并注重兼顾"安全"和"发展"的双重价值追求。
        With the development of Internet and globalization,the advanced technology such as network,big data,mobile technology,and networking play a more eminent role in information construction.Meanwhile,more and more people pay attention to the relation between commercial need for advanced technology and security application of technology.How to protect national interest in the process of applying advanced technology is also a problem which needs to be considered.According to the regulations of the technology transfer policy of National Security,they focus on coordinating the conflict between the development of advanced technology and the protection of national interest.They build up private-public cooperation to promote the research and application for advanced technology.To make sure the security of patent transfer,they have constructed censorship for national security.This provides a good reference for the exploration of China's advanced technology licensing design.To seek further development and guarantee security,we should reinforce the regulation for advanced technology transfer.
引文
[1]姬睿,申辉.基于信息安全领域的密码技术[J].实验室研究与探索,2010(9).
    [2]Bissessar D,Adams C,Stoianov A.Privacy,Security and Convenience:Biometric Encryption for SmartphoneBased Electronic Travel Documents[M]//Recent Advances in Computational Intelligence in Defense and Security.Springer International Publishing,2016.
    [3]National Security Agency.NSA Patent PortfolioV4.0[R/OL].https://www.nsa.gov/what-we-do/research/technology-transfer/assets/files/nsa-technology-transferprog ram.pdf.
    [4]National Security Agency.NSA Technology Transfer Program(2015)[R/OL].https://www.nsa.gov/research/_files/tech_transfers/nsa_technology_transfer_program.pdf.
    [5]Matwyshyn A M.Data Devolution:Corporate Information Security,Consumers,and Future of Regulation[J].ChicagoKent Law Review,2010,84(3).
    [6]Merkle J.Elliptic Curve Cryptography(ECC)Brainpool Standard Curves and Curve Generation[J].N Koblitz An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm Proceedings of Crypto'98 Lncs,2010,218(1).
    [7]娄策群,李青维,娄冬.网络信息生态链技术环境优化研究[J].情报理论与实践,2016,39(12).
    [8]马民虎,马宁.国家网络安全审查制度的法律困惑与中国策略[J].云南师范大学学报(哲学社会科学版),2015,47(5).
    [9]赵丽莉.版权技术保护措施信息安全遵从模式比较分析——以美国和德国为主要研究对象[J].河北法学,2016,34(4).
    [10]国家知识产权局条法司.关于保密专利制度的修改[J].电子知识产权,2014(4).
    [11]梁珈,罗干生,王惠君,等.加强密码标准化建设,提高信息安全防御能力[J].电脑与信息技术,2014,22(6).
    (1)NSA在其网站www.nsa.gov/research/tech_transfer技术转移类别下发布有完整的可转移技术的概要说明书清单。本文基于研究的需要,亦将先进技术的类型和范围限定与此。