Secure Video Paths. The video portion of unencrypted content shall not be present on any user-accessible bus in any analog or unencrypted, compressed form. In the event such unencrypted, uncompressed content is transmitted over a user-accessible bus in digital form, such content shall be either limited to standard definition (720 X 480 or 720 X 576), or made reasonably secure from unauthorized interception. Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environment.
Appears in 5 contracts
Samples: Video on Demand License Agreement, Video on Demand License Agreement, Video on Demand License Agreement
Secure Video Paths. The video portion of unencrypted content shall not be present on any user-accessible bus in any analog or unencrypted, compressed form. In the event such unencrypted, uncompressed content is transmitted over a user-accessible bus in digital form, such content shall be either limited to standard definition (720 X 480 or 720 X 576), or made reasonably secure from unauthorized interception. Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environment. Decrypted content must be encrypted during transmission to the graphics card for rendering.
Appears in 4 contracts
Samples: Vod Content Distribution Agreement, Sixth Amendment and Assignment, Svod License Agreement
Secure Video Paths. The video portion of unencrypted content shall not be present on any user-accessible bus in any analog or unencrypted, compressed form. In the event such unencrypted, uncompressed compressed content is transmitted over a user-accessible bus in digital form, such content shall be either limited to standard definition (720 X 480 or 720 X 576), or made reasonably secure from unauthorized interception. Secure Content Decryption. [Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place in an isolated processing environment such that it decrypted content is protected from attack access by other unauthroised software processes on the device, e.g. via decryption in an isolated processing environment.
Appears in 2 contracts
Samples: Licence Agreement, Licence Agreement
Secure Video Paths. The video portion of unencrypted content shall not be present on any user-accessible bus in any analog or unencrypted, compressed form. In the event such unencrypted, uncompressed content is transmitted over a user-accessible bus in digital form, such content shall be either limited to standard definition (720 X 480 or 720 X 576), or made reasonably secure from unauthorized interception. Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place in an isolated processing environment such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environmentdevices.
Appears in 1 contract
Samples: wikileaks.org
Secure Video Paths. The video portion of unencrypted content shall not be present on any user-accessible bus in any analog or unencrypted, compressed form. In the event such unencrypted, uncompressed content is transmitted over a user-accessible bus in digital form, such content shall be either limited to standard definition (720 X 480 or 720 X 576), or made reasonably secure from unauthorized interception. Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) sensitive parameters and keys related to the Content Protection System System, shall take place such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environment.
Appears in 1 contract
Secure Video Paths. The video portion of unencrypted content shall not be present on any user-accessible bus in any analog or unencrypted, compressed form. In the event such unencrypted, uncompressed content is transmitted over a user-accessible bus in digital form, such content shall be either limited to standard definition (720 X 480 or 720 X 576), or made reasonably secure from unauthorized interception. Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below1.2.1 of Exhibit D to the Original Agreement) related to the Content Protection System shall take place such that it is protected from attack by other software processes on the devicedevice (e.g., e.g. via decryption in an isolated processing environment).
Appears in 1 contract
Samples: wikileaks.org
Secure Video Paths. The video portion of unencrypted content shall not be present on any user-accessible bus in any analog or unencrypted, compressed form. In the event such unencrypted, uncompressed content is transmitted over a user-accessible bus in digital form, such content shall be either limited to standard definition (720 X 480 or 720 X 576), or made reasonably secure from unauthorized interception. Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below1.2.1 of Exhibit D to the Original Agreement) related to the Content Protection System shall take place such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environment.. Decrypted content must be encrypted during transmission to the graphics card for rendering. SCHEDULE B
Appears in 1 contract
Samples: wikileaks.org