http://www.w3.org/ns/prov#value | - Further, the second content processor 1210 in the first embodiment and the second content processor 2210 in the second embodiment may be an element such as a personal computer that limits the access to data to be protected like software or executes tamperproof software designed not to be easily read by combining an unnecessary program with a processing program dealing with data to be protected, fo
|