Software or other information integrity verification using...
Software usage/procurement management
Software use permission method and system
Software-generated machine identifier
Steganographic method and device
Storage device
Storage medium, method of producing transfer file data, and...
Storage system, computer system, and method of authorizing...
Storage system, computer system, and method of authorizing...
System and method for activating a rendering device in a...
System and method for applying an OMA DRM permission model...
System and method for auditing software usage
System and method for automatic verification of the holder...
System and method for automatically hiding sensitive...
System and method for controlling access to an electronic...
System and method for controlling comments in a...
System and method for controlling network access in wireless...
System and method for defending against reverse engineering...
System and method for detecting computer port inactivity
System and method for dynamically extending a DRM system...