Tamper Resistant Software. The Content Protection System shall employ tamper-resistant software. Examples of tamper resistant software techniques include, without limitation: Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.
Appears in 8 contracts
Samples: Vod Content Distribution Agreement, Video on Demand License Agreement, Supplement License Agreement
Tamper Resistant Software. The Content Protection System shall employ tamper-tamper- resistant software. Examples of tamper resistant software techniques include, without limitation: Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.:
Appears in 1 contract
Samples: Dhe License Agreement