Level of Protection. The protection functions of the Specifications (maintaining the confidentiality of Keys, key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing Controlled Content that has been decrypted, from copying or unauthorized viewing) shall be implemented, at a minimum, in a way that they:
Level of Protection e) The identifier for the relevant NIJ Standard, such as NIJ Standard- 0101.06, NIJ Standard- 0101.07 or NIJ Standard-0115.00 or NIJ Standard- 0115.01 (Combination armor shall indicate both).
Level of Protection. Handling of Volume ID, Media ID, Binding Nonce and PMSN. In a Licensed Player that does not implement AACS Drive Authentication, the portion of such Licensed Player that retrieves AACS Content from the optical media and the portion of such Licensed Player that performs the AACS decryption function shall be designed and manufactured in a manner associated and otherwise integrated with each other such that the Volume ID, Media ID, Binding Nonce and PMSN (as those terms are defined in the Specifications) flowing between them are reasonably secure from modification.
Level of Protection. “L1 Core Functions” of DTCP2 consist of “Primary L1 Core Functions” and “Other L1 Core Functions.”
Level of Protection. Core Functions. “Core Functions” of AACS include encryption, decryption, authentication, maintaining confidentiality of Secrecy Required Values and integrity of Integrity Required Values, and preventing exposure of the video portions of compressed, Decrypted AACS Content. The Core Functions of AACS shall be implemented in a reasonable method so that they:
Level of Protection. Unprotected Outputs. Delivery of the video portions of such Decrypted AACS Content to the functions described in Part 2, Section 2.2 and of the audio portions of such Decrypted AACS Content to the functions described in Part 2, Section 2.3.1 shall be implemented in a reasonable method that is intended to make such functions difficult to defeat or circumvent by the use of Widely Available Tools, not including Circumvention Devices or Specialized Tools as defined in Section 7.7.1.
Level of Protection. 3.1 The Trusted Execution Environment shall be implemented, at a minimum, in a way that it:
Level of Protection. Content Protection Requirements other than Core Functions. The content protection requirements, other than Core Functions, of the HDCP Specification Rev 2.0 and the Compliance Rules shall be implemented in a reasonable method so that such implementations: For review only - Not valid for execution