Hardware key encryption for data scrambling
Hardware-based authentication of a software program
Hidden identification
Hierarchical trusted code for content protection in computers
Host protected area (HPA) duplication process
Canada
World
United States