Examples of Content Protection Systems in a sentence
The DPO acknowledges and agrees that STBs, and their installed Content Protection Systems, used by Subscribers of the Distribution System shall prohibit the use of digital outputs.
The DPO shall adhere to the Anti-Piracy Obligations and Content Protection Systems set out in Annexure F of the SLA.
In order to prevent theft, Piracy, unauthorized Exhibition, copying or duplication of any Subscribed Channel, in whole or in part, (, the DPO shall, prior to the commencement of the Term of the SLA and at all times during such Term, employ, maintain, and enforce fully effective conditional access delivery, security systems and Content Protection Systems, as may be specified from time to time, by STAR.
Implementation of Content Protection Systems on General Purpose Computer Platforms shall, in all cases, use state of the art obfuscation mechanisms for the security sensitive parts of the software implementing the Content Protection System.
In order to prevent theft, Piracy, unauthorized Exhibition, copying or duplication of any Subscribed Channel, in whole or in part, (, the DPO shall, prior to the commencement of the Term of the SLA and at all times during such Term, employ, maintain, and enforce fully effective conditional access delivery, security systems and Content Protection Systems, as may be specified from time to time, by TVTN.
In order to prevent theft, Piracy, unauthorized Exhibition, copying or duplication of any Subscribed Channel, in whole or in part, the DPO shall, prior to the commencement of the Term of the SLA and at all times during such Term, employ, maintain, and enforce fully effective conditional access delivery, security systems and Content Protection Systems, as may be specified from time to time, by STAR.
Robust Implementation Implementations of Content Protection Systems on General Purpose Computer Platforms shall use hardware-enforced security mechanisms, including secure boot and trusted execution environments, where possible.
Non-TEE software that is part of the Content Protection Systems shall ideally be protected from reverse engineering.
The protection of Studio content between Comcast servers and end user devices shall use (for the protection of keys used to encrypt HLS streams) an industry accepted DRM or secure streaming method approved by Studio under Section 1 of this Exhibit C (for the avoidance of doubt, the Content Protection Systems listed in Section 1 are deemed “approved”).
Restrictions & Requirements In addition to the foregoing requirements, playback of UHD content is subject to the following set of restrictions & requirements: Robust Implementation Implementations of Content Protection Systems in the Approved Devices shall use hardware-enforced security mechanisms, including secure boot, secure key storage and a trusted execution environment.