Method of and system for detecting an anomalous operation of...
Method of authenticating and charging a client using a web...
Method of authenticating membership for providing access to...
Method of authentication based on intersection of password sets
Method of automatically instituting secure, safe libraries...
Method of clock routing for semiconductor chips
Method of connecting base station to cellular system
Method of controlling usage of software components
Method of detaching a security device from a personal computer
Method of distributing piracy protected computer software
Method of downloading of data to an MPEG receiver/decoder...
Method of dynamically assigning network access priorities
Method of dynamically assigning network access priorities
Method of enforcing a policy on a computer network
Method of ensuring that the PC is not used to make...
Method of loading commands in the security module of a terminal
Method of managing computer virus infected files
Method of printing a document
Method of programming, erasing, and reading block lock-bits and
Method of providing enhanced security in a remotely managed...