Method of extending the validity of a cryptographic certificate
Method of generating secret identification numbers
Method of inhibiting copying of digital data
Method of inhibiting copying of digital data
Method of interactive communication between a subscriber and a d
Method of jumping composite PN codes
Method of maintaining security in a common output means and syst
Method of making secure collaboration between objects of an obje
Method of messaging in a communication system
Method of metering and protecting computer software
Method of modifying pseudo-random sequences and device for scram
Method of protecting a linear feedback shift register (LFSR) out
Method of protecting programs and data in a computer against una
Method of protection against the unauthorized unscrambling of sc
Method of providing sound privacy system compatible with mono an
Method of public key generation
Method of public key generation
Method of public key generation
Method of reading a service card
Method of scrambling and of unscrambling composite video signals