Search
Selected: D

Data authentication method and data authentication system

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Data conversion system for protecting software against...

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Decryption method

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Detection of suspect software objects and signatures after...

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Detection of suspicious privileged access to restricted...

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Device and method capable of verifying program operation of...

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Disk drive which provides a secure boot of a host computer...

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Distinguishing legitimate modifications from malicious...

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Distinguishing legitimate modifications from malicious...

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Dynamic verification of validity of executable code

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.