摘要 |
Key data is generated that contains a decryption key that decrypts an encrypted content, and a policy that defines the usage restrictions on the content. Binder data is then generated, which contains the encrypted content, key data, and the control data, which describes the applied conditions of the key data.
|