Common use of Security Solution Robustness Clause in Contracts

Security Solution Robustness. With respect to the playback of High Definition Feature Films, the Content Protection System shall employ Licensor-approved tamper-resistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). Examples of tamper resistant software techniques include, without limitation: a. Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 7 contracts

Samples: Vod & Dhe License Agreement, International Vod & Dhe License Agreement, Vod & Dhe License Agreement

AutoNDA by SimpleDocs

Security Solution Robustness. With respect to the playback of High Definition Feature Films, the Content Protection System shall employ LicensorCDD-approved tamper-resistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). Examples of tamper resistant software techniques include, without limitation: a. Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 3 contracts

Samples: Distribution Agreement, Distribution Agreement, Distribution Agreement

Security Solution Robustness. With respect to the playback of High Definition Feature Films, the Content Protection System shall employ LicensorCDD-approved tamper-resistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). Examples of tamper resistant software techniques include, without limitation: a. : Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 1 contract

Samples: Distribution Agreement

AutoNDA by SimpleDocs

Security Solution Robustness. With respect to the playback of High Definition Feature Films, the Content Protection System shall employ Licensor-approved tamper-resistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). Examples of tamper resistant software techniques include, without limitation: a. : Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 1 contract

Samples: Vod & Dhe License Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!