Method of automatically instituting secure, safe libraries...
Method of clock routing for semiconductor chips
Method of connecting base station to cellular system
Method of controlling usage of software components
Method of detaching a security device from a personal computer
Method of distributing piracy protected computer software
Method of downloading of data to an MPEG receiver/decoder...
Method of dynamically assigning network access priorities
Method of dynamically assigning network access priorities
Method of enforcing a policy on a computer network
Method of ensuring that the PC is not used to make...
Method of loading commands in the security module of a terminal
Method of managing computer virus infected files
Method of printing a document
Method of programming, erasing, and reading block lock-bits and
Method of providing enhanced security in a remotely managed...
Method of query return data analysis for early warning...
Method of securely loading commands in a smart card
Method of using an electronic ticket and distributed server...
Method of using fingerprints to authenticate wireless...