Secure Content Decryption Sample Clauses

Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environment.
AutoNDA by SimpleDocs
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place in an isolated processing environment. Decrypted content must be encrypted during transmission to the graphics card for rendering HD Day & Date Requirements In addition to the foregoing requirements, all HD content is subject to the following set of content protection requirements:
Secure Content Decryption. 1.4.7.1. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Clause
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place such that it is protected from attack by other software processes on the device, e.g., via decryption in an isolated processing environment. 1. Users must have an active Account (an “Account”) prior to receiving content for VOD rental. All Accounts must be protected via account credentials consisting of at least a userid and password. 2. Licensed Content can be delivered to Approved Devices by both streaming and temporary download. 3. Licensed Content shall not be transferrable between Approved Devices receiving the content by streaming. 4. Licensed Content shall not be transferrable between Approved Devices receiving the content by temporary download, unless this can be done while still enforcing the single viewing device requirement. 5. Licensed Content may be viewed during the Viewing Period, which is defined as the time period commencing at the time a User is technically enabled to view the Licensed Content during the relevant License Period and ending on the earlier of:
Secure Content Decryption. [Changes and deletions are not acceptable. content whilst not protecting the keys used to protect the content when in an unencrypted state.] 1.4.7.1. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place in an isolated processing environment such that decrypted content and CSPs are protected at all times in the device, including during transmission to the graphics card for rendering, from attack from other software processes on the device. “CSPs” shall mean keys, passwords, and any other information that are critical to the security robustness of the Content Protection System.

Related to Secure Content Decryption

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!