Search
Selected: All

Software or other information integrity verification using...

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Software usage/procurement management

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Software use permission method and system

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Software-generated machine identifier

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Steganographic method and device

Information security – Prevention of unauthorized use of data including prevention... – Copy detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Storage device

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Storage medium, method of producing transfer file data, and...

Information security – Prevention of unauthorized use of data including prevention... – Limitations on number or amount of copies
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Storage system, computer system, and method of authorizing...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Storage system, computer system, and method of authorizing...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for activating a rendering device in a...

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for applying an OMA DRM permission model...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for auditing software usage

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for automatic verification of the holder...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for automatically hiding sensitive...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for controlling access to an electronic...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for controlling comments in a...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for controlling network access in wireless...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for defending against reverse engineering...

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for detecting computer port inactivity

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for dynamically extending a DRM system...

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.