Method for allowing a customer to preview, acquire and/or...
Method for authenticating, in particular, software...
Method for BIOS security of computer system
Method for BIOS security of computer system
Method for concealing user identities on computer systems...
Method for controlling customer-implemented data updates
Method for controlling the opening and transmission of...
Method for deployment of a workable public key infrastructure
Method for device dependent access control for device...
Method for distributing software based on software...
Method for electronic data and signature collection, and system
Method for enabling a trusted dialog for collection of...
Method for fingerprinting multimedia content
Method for inserting a watermark into an image
Method for lifetime tracking of intellectual property
Method for managing download of duplicate contents
Method for managing the security of applications with a...
Method for monitoring stored procedures
Method for operating a control device
Method for operating a control device