Common use of Level of Protection Clause in Contracts

Level of Protection. Core Functions" of DTCP include encryption, decryption, authentication, the functions described in Sections 2 (excluding Sections 2.2.1.1 and 2.2.1.3), 3 and 4.4.1 of Part 1 of this Exhibit B and Sections 2.3 and 3 of Part 2 of Exhibit B, maintaining the confidentiality of Highly Confidential cryptographic algorithms and Device Keys and preventing exposure of compressed, Decrypted DT Data. The Core Functions of DTCP shall be implemented in a reasonable method so that they: 3.5.1 Cannot be defeated or circumvented merely by using general-purpose tools or equipment that are widely available at a reasonable price, such as screwdrivers, jumpers, clips and soldering irons ("Widely Available Tools"), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or decompilers ("Specialized Tools"), other than devices or technologies whether Hardware or Software that are designed and made available for the specific purpose of bypassing or circumventing the protection technologies required by DTCP ("Circumvention Devices"); and 3.5.2 Can only with difficulty be defeated or circumvented using professional tools or equipment, such as logic analyzers, chip disassembly systems, or in-circuit emulators or any other tools, equipment, methods, or techniques not described in Section 3.5.1 such as would be used primarily by persons of professional skill and training, but not including professional tools or equipment that are made available only on the basis of a non-disclosure agreement or Circumvention Devices.

Appears in 7 contracts

Samples: Digital Transmission Protection License Agreement, Digital Transmission Protection License Agreement, Digital Transmission Protection License Agreement

AutoNDA by SimpleDocs

Level of Protection. Core Functions" . “Core Functions” of DTCP AACS include encryption, decryption, authentication, authentication (including but not limited to authentication in the functions described in Sections 2 (excluding Sections 2.2.1.1 and 2.2.1.3context of Managed Copy Authorization), 3 and 4.4.1 use of Part 1 of this Exhibit B and Sections 2.3 and 3 of Part 2 of Exhibit Ba Bound Copy Method, maintaining the confidentiality of Highly Confidential cryptographic algorithms Secrecy Required Values and Device Keys integrity of Integrity Required Values, and preventing exposure of the video portions of compressed, Decrypted DT DataAACS Content to unauthorized access. The Core Functions of DTCP AACS shall be implemented in a reasonable method so that they: 3.5.1 7.7.1. Cannot be defeated or circumvented merely by using general-purpose tools or equipment that are widely available at a reasonable price, such as screwdrivers, jumpers, clips and soldering irons ("Widely Available Tools"), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or decompilers ("Specialized Tools"), other than devices or technologies whether Hardware hardware or Software software that are designed and made available for the specific purpose of bypassing or circumventing the protection technologies required by DTCP AACS ("Circumvention Devices"); and 3.5.2 7.7.2. Can only with difficulty be defeated or circumvented using professional tools or equipment, such as logic analyzers, chip disassembly systems, or in-in- circuit emulators or any other tools, equipment, methods, or techniques not described in Section 3.5.1 7.7.1 such as would be used primarily by persons of professional skill and training, but not including professional tools or equipment that are made available only on the basis of a non-disclosure agreement or Circumvention Devices.

Appears in 1 contract

Samples: Aacs Content Provider Agreement

AutoNDA by SimpleDocs

Level of Protection. Core Functions" . “Core Functions” of DTCP AACS include encryption, decryption, authentication, authentication (including but not limited to authentication in the functions described in Sections 2 (excluding Sections 2.2.1.1 and 2.2.1.3context of Managed Copy Authorization), 3 and 4.4.1 use of Part 1 of this Exhibit B and Sections 2.3 and 3 of Part 2 of Exhibit Ba Bound Copy Method, maintaining the confidentiality of Highly Confidential cryptographic algorithms Secrecy Required Values and Device Keys integrity of Integrity Required Values, and preventing exposure of the video portions of compressed, Decrypted DT DataAACS Content to unauthorized access. The Core Functions of DTCP AACS shall be implemented in a reasonable method so that they:: For review only - Not for execution 3.5.1 7.7.1. Cannot be defeated or circumvented merely by using general-purpose tools or equipment that are widely available at a reasonable price, such as screwdrivers, jumpers, clips and soldering irons ("Widely Available Tools"), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or decompilers ("Specialized Tools"), other than devices or technologies whether Hardware hardware or Software software that are designed and made available for the specific purpose of bypassing or circumventing the protection technologies required by DTCP AACS ("Circumvention Devices"); and 3.5.2 7.7.2. Can only with difficulty be defeated or circumvented using professional tools or equipment, such as logic analyzers, chip disassembly systems, or in-in- circuit emulators or any other tools, equipment, methods, or techniques not described in Section 3.5.1 7.7.1 such as would be used primarily by persons of professional skill and training, but not including professional tools or equipment that are made available only on the basis of a non-disclosure agreement or Circumvention Devices.

Appears in 1 contract

Samples: Aacs Content Provider Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!