Method and system for dynamically generating a web-based...
Method and system for improved computer security utilizing...
Method and system for providing field scalability across a...
Method and system for providing security to processors
Method and system for remote management of personal security...
Method for a secure information transfer
Method for adding and enforcing enhanced authorization...
Method for enabling a program written in untrusted code to...
Method for preventing loading and execution of rogue...
Method for protection against fraudulent modification of...
Method for protection against fraudulent modification of...
Method for transferring privilege access to a resource...
Method of distributing piracy protected computer software
Method of operating a computer system and computer system
Method of producing a response
Method of secure personal identification, information...
Methods and apparatus for accessing resources using a...
Methods and apparatus for credential validation
Methods and apparatus for protecting information
Methods and apparatuses for selecting privileges for use...