Unauthorized modification of values in flash memory
Unauthorized modification of values stored in flash memory
Universal game download methods and system for legacy gaming...
Upgrading of encryption
Use of code obfuscation to inhibit generation of...
Use of cyclic redundancy checking for segregating control...
User access to a unique data subset of a database
User-computer interaction method for use by a population of...
User-friendly rights management systems and methods
Using a rights template to obtain a signed rights label...
Using smartcards or other cryptographic modules for enabling...
Using unpredictable information to minimize leakage from...
Validating keying material by using a validation area of...
Variable security code download for an embedded processor
Vault controller secure depositor for managing secure...
Verbose hardware identification for binding a software...
Verification system and method
Virtualization system for computers having multiple...
Voucher driven on-device content personalization
Watchdog for trusted electronic content distributions