Alternatively, to provide enhanced security for certain other applications, the object could be encrypted, such as through use of a symmetric encryption key, and a ???basic??? license, though not linked to any watermark, employed to supply that key to each requested user.