Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) sensitive parameters and keys related to the Content Protection System, shall take place such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environment.
Appears in 8 contracts
Samples: Second Amendment, Agreement, Vod License Agreement
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) sensitive parameters and keys CSPs (as defined in Section 2.1 below) related to the Content Protection System, System shall take place such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environment.
Appears in 7 contracts
Samples: License Agreement, Basic Television and Svod License Agreement, wikileaks.org
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) sensitive parameters and keys CSPs (as defined in Section 2.1 below) related to the Content Protection System, System shall take place such that it is protected from attack by other software processes on the device, e.g. e.g., via decryption in an isolated processing environment.
Appears in 2 contracts
Secure Content Decryption. Decryption of (i) content contentIncluded Programs protected by the Content Protection System and (ii) sensitive parameters and keys related to the Content Protection System, shall take place such that it is isusing reasonable measures designed to ensure that the same are protected from attack by other software processes on the device, (e.g. via decryption in an isolated processing environment).
Appears in 2 contracts
Samples: Home Entertainment License Agreement, Home Entertainment License Agreement
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) sensitive parameters and keys related to the Content Protection System, shall take place such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environment.and
Appears in 1 contract
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) sensitive parameters and keys CSPs (as defined in Section 2.1 below) related to the Content Protection System, System shall take place such that it is protected from attack by other software processes on the device, e.g. e.g., via decryption in an isolated processing environment.. [3D language to come] [SONY TO PROVIDE] SCHEDULE U USAGE RULES
Appears in 1 contract
Samples: PPV/Vod License Agreement
Secure Content Decryption. Decryption of (i) content Included Programs protected by the Content Protection System and (ii) sensitive parameters and keys related to the Content Protection System, shall take place such using reasonable measures designed to ensure that it is the same are protected from attack by other software processes on the device, device (e.g. via decryption in an isolated processing environment).
Appears in 1 contract