Distinguishing legitimate modifications from malicious...
Dynamic verification of validity of executable code
Encryption in a secure computerized gaming system
Encryption in a secure computerized gaming system
Encryption of applications to ensure authenticity
Enhancing trusted platform module performance
File processing unit
File protection service for a computer system
Guards for application in software tamperproofing
Image forming apparatus, launching method of program in the...
In-place content substitution via code-invoking link
Information processing apparatus, information processing...
Information processing method and information processing...
Integrated fingerprinting in configuration audit and management
Integrity ordainment and ascertainment of...
Integrity ordainment and ascertainment of...
Licensing the use of software on a particular CPU
Method and apparatus for changing and adding activation keys...
Method and apparatus for incremental code signing
Method and apparatus for securing executable programs...