Tamper Resistant Software. The Content Protection System shall employ tamper-resistant software. Examples of tamper resistant software techniques include, without limitation: Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.
Appears in 14 contracts
Samples: Subscription Pay Television License Agreement, Subscription Video on Demand License Agreement, Licensing Agreement
Tamper Resistant Software. The Content Protection System shall employ tamper-tamper- resistant software. Examples of tamper resistant software techniques include, without limitation: Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.:
Appears in 3 contracts
Samples: Vod, Svod & Dhe License Agreement, Supplement License Agreement, Vod & Dhe License Agreement
Tamper Resistant Software. The Content Protection System shall employ tamper-resistant software. Examples of tamper resistant software techniques include, without limitation: Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.:
Appears in 3 contracts
Samples: International Vod & Dhe License Agreement, Subscription Pay Television License Agreement, Vod Content Distribution Agreement