Authentication, Playback and Storage Sample Clauses
The 'Authentication, Playback and Storage' clause governs how users verify their identity, access content, and store media within a system or service. Typically, it outlines the methods by which users must authenticate themselves, such as through passwords or tokens, and sets the rules for how content can be played back (e.g., streaming, downloading) and stored, possibly restricting copying or redistribution. This clause ensures that only authorized users can access and use the content as intended, protecting intellectual property and maintaining compliance with licensing agreements.
Authentication, Playback and Storage. A valid license, containing the unique cryptographic key/keys and other information necessary to decrypt the associated content and the set of usage rules associated with the content, shall be required in order to decrypt and play a specific instance of content. Each license shall be keyed to work only on a specific individual end user device and shall be incapable of being transferred between devices.
Authentication, Playback and Storage. 1. A valid Playback License (containing the unique cryptographic key(s) and other information necessary to decrypt a file of Included Program content and the set of usage rules associated with such content) will be required in order to decrypt and play a specific instance of Included Program content.
2. Each Playback License will be keyed to work only on a specific Customer's authorised device or client and will be designed to be incapable of being transferred between unauthorised devices or clients.
3. In the event that the DRM Technology includes client side software, each installation of the DRM Technology client software on an end user device will be individualized to such device and thus uniquely identifiable. As a result, if such software is copied or transferred to another device, the content will be designed to not play on the subsequent device without such subsequent device being authorized by a valid Playback License. Although the current industry standard is to individualize DRM software to devices, Licensee may elect to individualize its DRM Technology client software to a different concept (e.g., by browser, key card, Customer) as the industry standard evolves.
4. The DRM Technology will be upgradeable, allow for backward compatibility for a period of time (where the length of such period of time is determined by Licensee in its sole discretion) if desired, and allow for integration of new rules and business models.
Authentication, Playback and Storage. A valid license, containing the unique cryptographic key/keys and other information necessary to decrypt the associated content and the set of usage rules associated with the content, shall be required in order to decrypt and play a specific instance of content. Each license shall be keyed to work only on a specific individual end user device and shall be incapable of being transferred between devices. Each installation of the trusted client software on an end user device shall be individualized and thus uniquely identifiable. For example, if the client software is copied or transferred from one computer to a subsequent computer, it will not work on the subsequent computer without being uniquely individualized. The content protection system shall prohibit recording onto removable media or portable devices except as permitted in Section 2.2.4 of the Agreement.
Authentication, Playback and Storage. A valid license, containing the unique cryptographic key/keys and other information necessary to decrypt the associated content and the set of usage rules associated with the content, shall be required in order to decrypt and play a specific instance of content. Each license shall be keyed to work only on a specific individual end user device and shall be incapable of being transferred between devices.. Each installation of the trusted client software on an end user device shall be individualized and thus uniquely identifiable. For example, if the client software is copied or transferred from one computer to a subsequent computer, it will not work on the subsequent computer without being uniquely individualized.
Authentication, Playback and Storage. A valid license, containing the unique cryptographic key/keys and other information necessary to decrypt the associated content and the set of usage rules associated with the content, shall be required in order to decrypt and play a specific instance of content. Each license shall be keyed to work only on a specific individual end user device and shall be incapable of being transferred between devices. (Note: License/grants are per Approved Set-Top Box. A separate grant is sent to each Approved Set-Top Box within a home.) Each installation of the trusted client software on an Approved Set-Top Box shall be uniquely identifiable at the hardware level. The content protection system shall support a time-based rental model. The content protection system shall prohibit recording onto removable media or portable devices.
Authentication, Playback and Storage. 1. A valid license (containing the unique cryptographic key(s) and other information necessary to decrypt a file of Program content and the set of usage rules associated with such content) will be required in order to decrypt and play a specific instance of Program content.
2. Each license will be keyed to work only on a specific end user's authorised device or client and will be designed to be incapable of being transferred between unauthorised devices or clients.
3. In the event that the DRM Technology includes client side software, each installation of the DRM Technology client software on an end user device will be individualized to such device and thus uniquely identifiable. As a result, if such software is copied or transferred to another device, the content will be designed to not play on the subsequent device without such subsequent device being authorized by a valid license. Although the current industry standard is to individualize DRM software to devices, Google may elect to individualize its DRM Technology client software to a different concept (e.g., by browser, key card, authorized user) as the industry standard evolves.
4. The DRM Technology will be upgradeable, allow for backward compatibility for a period of time (where the length of such period of time is determined by Google in its sole discretion) if desired, and allow for integration of new rules and business models.
