http://www.w3.org/ns/prov#value | - Likewise, an illegally designed media reader could duplicate the raw data of the media, including the encrypted content and media content key stored thereon, on a second media and thus create an unauthorized copy conforming to the protocol described above.
|