Common use of Integrity detection Clause in Contracts

Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player).

Appears in 14 contracts

Samples: License Agreement, Vod Content Distribution Agreement, Video on Demand License Agreement

AutoNDA by SimpleDocs

Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player). There is no means to connect such device on the LodgeNet D2R system.

Appears in 4 contracts

Samples: wikileaks.org, wikileaks.org, wikileaks.org

AutoNDA by SimpleDocs

Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents is designed to prevent the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels designed to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall be designed to prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player).

Appears in 1 contract

Samples: wikileaks.org

Time is Money Join Law Insider Premium to draft better contracts faster.