Method of protecting computer software from unauthorized executi
Method of reducing the useful bandwidth of bandwidth-limited sig
Method of secure server control of local media via a trigger thr
Method of securing CD-ROM data for retrieval by one machine
Method of software distribution protection
Method of using a hand-held device to protect information stored
Method to deter document and intellectual property piracy throug
Method to protect information on a computer storage device
Method to secure the operations for accessing detachable cards f
Methods and apparatus for controlling access to information proc
Methods and apparatus for encrypting and decrypting MIDI files
Methods and apparatus for providing a secure paging system
Methods and apparatus for secure hardware configuration
Methods and apparatus for secure hardware configuration
Methods of transmitting and recording television signals with co
Metropolitan area network arrangement for serving virtual data n
Microcircuit card protected against intrusion
Microprocessor for providing copy protection
Military radar or radio communication system
Mobile radio communications apparatus