Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red ▇▇▇▇▇▇▇ code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. Licensor deems the Content Protection System to sufficiently meet the foregoing requirements. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player). Licensor deems the Content Protection System to sufficiently meet the foregoing requirements.
Appears in 2 contracts
Sources: Content Protection Agreement, Content Protection Agreement