Authentication, Playback and Storage Sample Clauses

Authentication, Playback and Storage. A valid license, containing the unique cryptographic key/keys and other information necessary to decrypt the associated content and the set of usage rules associated with the content, shall be required in order to decrypt and play a specific instance of content. Each license shall be keyed to work only on a specific individual end user device and shall be incapable of being transferred between devices.
AutoNDA by SimpleDocs
Authentication, Playback and Storage. 1. A valid Playback License (containing the unique cryptographic key(s) and other information necessary to decrypt a file of Included Program content and the set of usage rules associated with such content) will be required in order to decrypt and play a specific instance of Included Program content. 2. Each Playback License will be keyed to work only on a specific Customer's authorised device or client and will be designed to be incapable of being transferred between unauthorised devices or clients. 3. In the event that the DRM Technology includes client side software, each installation of the DRM Technology client software on an end user device will be individualized to such device and thus uniquely identifiable. As a result, if such software is copied or transferred to another device, the content will be designed to not play on the subsequent device without such subsequent device being authorized by a valid Playback License. Although the current industry standard is to individualize DRM software to devices, Licensee may elect to individualize its DRM Technology client software to a different concept (e.g., by browser, key card, Customer) as the industry standard evolves. 4. The DRM Technology will be upgradeable, allow for backward compatibility for a period of time (where the length of such period of time is determined by Licensee in its sole discretion) if desired, and allow for integration of new rules and business models.
Authentication, Playback and Storage. A valid license, containing the unique cryptographic key/keys and other information necessary to decrypt the associated content and the set of usage rules associated with the content, shall be required in order to decrypt and play a specific instance of content. Each license shall be keyed to work only on a specific individual end user device and shall be incapable of being transferred between devices. Each installation of the trusted client software on an end user device shall be individualized and thus uniquely identifiable. For example, if the client software is copied or transferred from one computer to a subsequent computer, it will not work on the subsequent computer without being uniquely individualized. The content protection system shall prohibit recording onto removable media or portable devices except as permitted in Section 2.2.4 of the Agreement.
Authentication, Playback and Storage. A valid license, containing the unique cryptographic key/keys and other information necessary to decrypt the associated content and the set of usage rules associated with the content, shall be required in order to decrypt and play a specific instance of content. Each license shall be keyed to work only on a specific individual end user device and shall be incapable of being transferred between devices. (Note: License/grants are per Approved Set-Top Box. A separate grant is sent to each Approved Set-Top Box within a home.) Each installation of the trusted client software on an Approved Set-Top Box shall be uniquely identifiable at the hardware level. The content protection system shall support a time-based rental model. The content protection system shall prohibit recording onto removable media or portable devices.
Authentication, Playback and Storage a. A valid license, containing the unique cryptographic key/keys and other information necessary to decrypt the associated content and the set of usage rules associated with the content, shall be required in order to decrypt and play a specific instance of content. b. Each playback license shall be keyed to work only on a specific individual end user device and shall be incapable of being transferred between devices. c. Each installation of the trusted client software on an end user device shall be individualized and thus uniquely identifiable. For example, if the client software is copied or transferred from one computer to a subsequent computer, it will not work on the subsequent computer without being uniquely individualized.
Authentication, Playback and Storage. 1. A valid license (containing the unique cryptographic key(s) and other information necessary to decrypt a file of Program content and the set of usage rules associated with such content) will be required in order to decrypt and play a specific instance of Program content. 2. Each license will be keyed to work only on a specific end user's authorised device or client and will be designed to be incapable of being transferred between unauthorised devices or clients. 3. In the event that the DRM Technology includes client side software, each installation of the DRM Technology client software on an end user device will be individualized to such device and thus uniquely identifiable. As a result, if such software is copied or transferred to another device, the content will be designed to not play on the subsequent device without such subsequent device being authorized by a valid license. Although the current industry standard is to individualize DRM software to devices, Google may elect to individualize its DRM Technology client software to a different concept (e.g., by browser, key card, authorized user) as the industry standard evolves. 4. The DRM Technology will be upgradeable, allow for backward compatibility for a period of time (where the length of such period of time is determined by Google in its sole discretion) if desired, and allow for integration of new rules and business models.

Related to Authentication, Playback and Storage

  • Authentication of Notes If, at the time the successor by merger or consolidation to the Indenture Trustee succeeds to the trusts created by this Indenture, Notes have been authenticated but not delivered, the successor Indenture Trustee may adopt the certificate of authentication of a predecessor Indenture Trustee and deliver the Notes so authenticated. If at that time any Notes have not been authenticated, the successor Indenture Trustee may authenticate the Notes. In each of those cases, the certificates will have the same force and effect provided in the Notes or in this Indenture as the certificate of the predecessor Indenture Trustee.

  • Execution, Authentication, Delivery and Dating The Securities shall be executed on behalf of the Company by its Chairman of the Board, its Vice Chairman of the Board, its President or one of its Vice Presidents (or any other officer of the Company designated in writing by or pursuant to authority of the Board of Directors and delivered to the Trustee from time to time). The signature of any of these officers on the Securities may be manual or facsimile. The Securities bearing the manual or facsimile signatures of individuals who were at any time the proper officers of the Company shall bind the Company notwithstanding that such individuals or any of them have ceased to hold such offices prior to the authentication and delivery of such Securities did not hold such offices at the date of such Securities. At any time and from time to time after the execution and delivery of this Indenture, the Company may deliver Securities of any series executed by the Company to the Trustee for authentication, together with a Company Order for the authentication and delivery of such Securities, and the Trustee in accordance with the Company Order shall authenticate and deliver such Securities. If the form or terms of the Securities of the series have been established by or pursuant to one or more Board Resolutions as permitted by Sections 2.01 and 3.01, in authenticating such Securities, and accepting the additional responsibilities under this Indenture in relation to such Securities, the Trustee shall be entitled to receive, and (subject to, Section 6.01) shall be fully protected in relying upon, an Opinion of Counsel stating, (a) if the form of such Securities has been established by or pursuant to Board Resolution as permitted by Section 2.01, that such form has been established in conformity with the provisions of this Indenture; (b) if the terms of such Securities have been established by or pursuant to Board Resolution as permitted by Section 3.01, that such terms have been established in conformity with the provisions of this Indenture; and (c) that such Securities, when authenticated and delivered by the Trustee and issued by the Company in the manner and subject to any conditions specified in such Opinion of Counsel will constitute valid and legally binding obligations of the Company enforceable against the Company in accordance with their terms, subject to bankruptcy, insolvency, fraudulent transfer, reorganization, moratorium and similar laws of general applicability relating to or affecting creditors’ rights and to general equity principles or other customary exceptions. If such form or terms have been so established, the Trustee shall not be required to authenticate such Securities if the issue of such Securities pursuant to this Indenture in accordance with the Board Resolutions will affect the Trustee’s own rights, duties, obligations, responsibilities or immunities under the Securities and this Indenture or otherwise in a manner which is not reasonably acceptable to the Trustee. Notwithstanding the provisions of Section 3.01 and of the preceding paragraph, if all Securities of a series are not to be originally issued at one time, it shall not be necessary, unless the Trustee reasonably determines otherwise, for the Company to deliver the Officer’s Certificate otherwise required pursuant to Section 3.01 or the Company Order and Opinion of Counsel otherwise required pursuant to such preceding paragraph at or prior to the authentication of each Security of such series if such documents are delivered at or prior to the authentication upon original issuance of the first Security of such series to be issued. Each Security shall be dated the date of its authentication. No Security shall be entitled to any benefit under this Indenture or be valid or obligatory for any purpose unless there appears on such Security a certificate of authentication substantially in the form provided for herein executed by the Trustee by manual signature, and such certificate upon any Security shall be conclusive evidence, and the only evidence, that such Security has been duly authenticated and delivered hereunder and is entitled to the benefits of this Indenture. Notwithstanding the foregoing, if any Security shall have been authenticated and delivered hereunder but never issued and sold by the Company, and the Company shall deliver such Security to the Trustee for cancellation as provided in Section 3.09, for all purposes of this Indenture such Security shall be deemed never to have been authenticated and delivered hereunder and shall never be entitled to the benefits of this Indenture.

  • Certificate of Authentication Only such Securities as shall bear thereon a certificate of authentication substantially in the form hereinbefore recited, executed by the Trustee by the manual signature of one of its authorized officers, shall be entitled to the benefits of this Indenture or be valid or obligatory for any purpose. The execution of such certificate by the Trustee upon any Security executed by the Issuer shall be conclusive evidence that the Security so authenticated has been duly authenticated and delivered hereunder and that the Holder is entitled to the benefits of this Indenture.

  • Multi-Factor Authentication for Remote Access DST shall use multi factor authentication and a secure tunnel, or another strong authentication mechanism, when remotely accessing DST’s internal network.

  • Authentication This Note shall not be valid until authenticated by the manual signature of the Trustee or an authenticating agent.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!