Level of Protection. “L1 Core Functions” of DTCP2 consist of “Primary L1 Core Functions” and “Other L1 Core Functions.” 3.5.1 The Primary L1 Core Functions shall be implemented in Hardware, and include the following: (a) handling in plaintext form of the DTCP2 Device Private Key, Exchange Keys (KM, KS, KR and KXM in Table 1 in Exhibit C-General), and parameters applicable to DTCP2 disclosed by DTLA as Highly Confidential Information (collectively, the “DTCP2 L1 Core Keys”), such as calculations of device signature and Content Key; (b) maintaining the confidentiality and integrity of (i) DTCP2 L1 Core Keys, (ii) algorithms classified by DTLA as Highly Confidential Information, and (iii) other information or materials, including but not limited to cryptographic keys used to encrypt or decrypt the DTCP2 L1 Core Keys, from which any of the DTCP2 L1 Core Keys could reasonably be derived including the values of u, XK and XXXXX in Table 1 in Exhibit C-General; (c) verifying the signature signed by DTLA or another device during the DTCP2 authentication protocol; and, (d) maintaining the integrity of the usage rules defined in the DTCP2 Specification. (e) maintaining the integrity of the values of C1, L1, X1, XSRMV, XSRMC, IDU, IID, NC, IDSM, IDSU, CMI and SRM in Table 1 in Exhibit C-General. 3.5.2 The "Other L1 Core Functions" of DTCP2 include encryption, decryption, authentication, the functions described in Sections 2 (excluding Sections 2.2.1.1 and 2.2.1.3), 3, 4.4.1 and 4.4.2 of Part 1-A of this Exhibit B and Sections 2.3 and 3 of Exhibit B Part 2 and preventing exposure of compressed, Decrypted DT Data, which are not Primary L1 Core Functions. 3.5.3 The L1 Core Functions of DTCP2 shall be implemented in a reasonable method so that they: 3.5.3.1 Cannot be defeated or circumvented merely by using general-purpose tools or equipment that are widely available at a reasonable price, such as screwdrivers, jumpers, clips, file editors, and soldering irons ("Widely Available Tools"), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or decompilers, integrated development environments and similar software development products (“Specialized Tools”), or software tools such as disassemblers, loaders, patchers, or any other software tools, techniques or methods not described in Widely Available Tools and Specialized Tools (e.g., the software equivalent of in-circuit emulators, software tools used for reverse engineering and penetration testing), as would be used primarily by persons of professional skill and training (“Professional Software Tools”), other than Circumvention Devices); and 3.5.3.2 Can only with difficulty be defeated or circumvented using professional tools or equipment, such as logic analyzers, PCB rework stations, oscilloscopes, electromagnetic probes, chip disassembly systems, or in-circuit emulators or any other tools, equipment, methods, or techniques not described in Section 3.5.3.1 (“Professional Hardware Tools”) such as would be used primarily by persons of professional skill and training, but not including professional tools or equipment that are made available only on the basis of a non-disclosure agreement or Circumvention Devices.
Appears in 4 contracts
Samples: Dtcp2 Digital Transmission Protection License Agreement, Dtcp2 Digital Transmission Protection License Agreement, Dtcp2 Digital Transmission Protection License Agreement