Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player).
Appears in 14 contracts
Samples: License Agreement, Vod Content Distribution Agreement, Video on Demand License Agreement
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player). There is no means to connect such device on the LodgeNet D2R system.
Appears in 4 contracts
Samples: wikileaks.org, wikileaks.org, wikileaks.org
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents is designed to prevent the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels designed to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall be designed to prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player).
Appears in 1 contract
Samples: wikileaks.org