Method for providing a secure non-reusable one-time password
Method for retrieving secure information from a database
Method for securely distributing a conditional use private key t
Method for securely storing electronic records
Method for securing software against corruption by computer viru
Method for stega-cipher protection of computer code
Method for testing the intactness of stored data in a processing
Method for the management of an application program loaded in a
Method for transforming message containing sensitive information
Method for transmitting superimposed image data in a radio frequ
Method for utilizing medium nonuniformities to minimize unauthor
Method of and apparatus for scrambling a video signal with full
Method of counterfeit detection of electronic data stored on a d
Method of managing contracts for licensed program use and a mana
Method of preventing power analysis attacks on...
Method of protecting computer software from unauthorized executi
Method of reducing the useful bandwidth of bandwidth-limited sig
Method of secure server control of local media via a trigger thr
Method of securing CD-ROM data for retrieval by one machine
Method of software distribution protection