Common use of Protection against Hacking Clause in Contracts

Protection against Hacking. Playback licenses, revocation certificates and security-critical data shall use commercially reasonable cryptographic protection methods to deter against tampering, forging, and spoofing. The content protection system shall employ industry accepted tamper-resistant technology on hardware and software components (e.g., to deter such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). For software-only implementations on open computing platforms (e.g., personal computers), the content protection system shall employ tamper resistant software. Examples of tamper resistant software techniques include: (a) Code obfuscation example: The executable binary dynamically encrypts and decrypts itself in memory, so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 9 contracts

Samples: License Agreement, License Agreement, License Agreement

AutoNDA by SimpleDocs

Protection against Hacking. Playback licenses, revocation certificates certificates, and security-critical data shall use commercially reasonable cryptographic protection methods to deter be cryptographically protected against tampering, forging, and spoofing. The content protection system shall employ industry accepted tamper-resistant technology on hardware and software components (e.g., to deter prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). For software-only implementations on open computing platforms (e.g., personal computers), the content protection system shall employ tamper resistant software. Examples of tamper resistant software techniques include: (a) a. Code obfuscation example: The executable binary dynamically encrypts and decrypts itself in memory, so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 2 contracts

Samples: Distribution Agreement, Distribution Agreement

AutoNDA by SimpleDocs

Protection against Hacking. a. Playback licenses, revocation certificates certificates, and security-critical data shall use commercially reasonable cryptographic protection methods to deter be cryptographically protected against tampering, forging, forging and spoofing. . b. The content protection system shall employ industry industry-accepted tamper-resistant technology on hardware and software components (e.g., to deter prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). . c. For software-only implementations on open computing platforms (e.g., personal computers), the content protection system shall employ tamper tamper-resistant software. Examples of tamper tamper-resistant software techniques include: (a) i. Code obfuscation example: The executable binary dynamically encrypts and decrypts itself in memory, so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 1 contract

Samples: Digital Video Subscription License Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!