Method for a secure information transfer
Method for adding and enforcing enhanced authorization...
Method for enabling a program written in untrusted code to...
Method for preventing loading and execution of rogue...
Method for protection against fraudulent modification of...
Method for protection against fraudulent modification of...
Method for transferring privilege access to a resource...
Method of distributing piracy protected computer software
Method of operating a computer system and computer system
Method of producing a response
Method of secure personal identification, information...
Methods and apparatus for accessing resources using a...
Methods and apparatus for credential validation
Methods and apparatus for protecting information
Methods and apparatuses for selecting privileges for use...
Methods and systems for imaging device credential receipt...
Methods and systems for secure shared smartcard access
Mobile terminal and authentication method
Multi-function intelligent electronic device with secure access
Multi-stage authorisation system