Access protection

IP>QAM has a protected area in the program memory. Unlike conventional set-top boxes and smart TVs, the cloning program is impossible. Reliable authentication is better than that of a credit card. Those who steal content, will not be able to shift the responsibility to someone else. Authorized connection is not difficult to tag on the server side. Thus, all the stolen programs on the Internet will be marked and the connection immediately will be broken. Or you can broadcast the message: "Mr. Pitkin, meet you in court." instead of the football game.