| http://www.w3.org/ns/prov#value | - In another embodiment, point-to-point authentication is not used and system security rests on the use of targeting and/or digital signature authentication. [0050] Targeting Protocol [0051] The targeting protocol of the present invention is a means and method for limiting the playback of digital information content, the adjustment of player configuration data, and the downl
|