Level of Protection. Core Functions. “Core Functions” of AACS include encryption, decryption, authentication, maintaining confidentiality of Secrecy Required Values and integrity of Integrity Required Values, and preventing exposure of the video portions of compressed, Decrypted AACS Content. The Core Functions of AACS shall be implemented in a reasonable method so that they:
Appears in 2 contracts
Level of Protection. Core Functions. “Core Functions” of AACS include encryption, decryption, authenticationauthentication (including but not limited to authentication in the context of Managed Copy Authorization), use of a Bound Copy Method, maintaining confidentiality of Secrecy Required Values and integrity of Integrity Required Values, and preventing exposure of the video portions of compressed, Decrypted AACS ContentContent to unauthorized access. The Core Functions of AACS shall be implemented in a reasonable method so that they:: For review only - Not for execution
Appears in 1 contract
Samples: Aacs Content Provider Agreement
Level of Protection. Core Functions. “Core Functions” of AACS include encryption, decryption, authenticationauthentication (including but not limited to authentication in the context of Managed Copy Authorization), use of a Bound Copy Method, maintaining confidentiality of Secrecy Required Values and integrity of Integrity Required Values, and preventing exposure of the video portions of compressed, Decrypted AACS ContentContent to unauthorized access. The Core Functions of AACS shall be implemented in a reasonable method so that they:
Appears in 1 contract
Samples: Aacs Content Provider Agreement