Search
Selected: O

Obfuscation of executable code

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Obtaining temporary exclusive control of a printing device

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Off-line economies for digital media

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Offline access in a document control system

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Offline playback of advertising supported media

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

One time passcode system

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Online publishing portal for controlling brand integrity

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Optical disc, illegal copy finding system and method using...

Information security – Prevention of unauthorized use of data including prevention... – Copy detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Optical imaging device with motion sensing accelerometers...

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Optical jukebox with copy protection caching and methods of...

Information security – Prevention of unauthorized use of data including prevention... – Limitations on number or amount of copies
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Optimization of distributed anti-virus scanning

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Origin and custody of copies from a stored electronic record...

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Originator authentication using platform attestation

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.