Method, device and system for authenticating downloaded content based on authority
A device and permission technology, used in program/content distribution protection, data processing applications, instruments, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] While the present invention can be modified in various ways and has numerous embodiments, specific embodiments will be shown in the drawings and described in detail.
[0040] However, it is not intended to limit the present invention to specific embodiments, and it should be understood that embodiments include all changes, equivalents, and substitutions included within the spirit and technical scope of the present invention.
[0041] Terms such as first and second may be used to describe various elements, but the elements should not be limited by the terms. Terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present invention. The term "and / or" includes a combination of a plurality of related and described items or any one of a plurality of related and described items.
[0042] When an element...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


