Power controlled computer security system and method
Pre-execution logon (PEL)
Precise exit logic for removal of security overlay of...
Preloading software onto a computer system
Prevention of CD-audio piracy using sub-code channels
Priority-based virus scanning with priorities based at least...
Privacy service
Procedure for carrying out checking functions relating to...
Process and authentication device for secured authentication bet
Process and device for transmitting confidential connection...
Process for group-based cryptographic code management between a
Process for managing and authorizing rights in a computer...
Processes and systems for secured information exchange using...
Processing system security
Processing trusted commands in trusted and untrusted...
Processor unique processor number feature with a user...
Production line boot sector lock
Production line boot sector lock
Program-invocation-count measuring system, program-invocation-co
Protected execution environments within a computer system