AU2106901A
|
|
Method closing sales over an open network using an automated haggling system
|
US6931546B1
|
|
System and method for providing application services with controlled access into privileged processes
|
US6708292B1
|
|
System, method and software for protocol analyzer remote buffer management
|
US6553378B1
|
|
System and process for reporting network events with a plurality of hierarchically-structured databases in a distributed computing environment
|
US6553377B1
|
|
System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment
|
US6550012B1
|
|
Active firewall system and methodology
|
US6353446B1
|
|
Method and system for integrated network management applications
|
US6230288B1
|
|
Method of treating whitespace during virus detection
|
US6275942B1
|
|
System, method and computer program product for automatic response to computer system misuse using active response modules
|
AU7174798A
|
|
Process-level data security system
|
WO9847260A2
|
|
Publicly verifiable key recovery
|
US6249585B1
|
|
Publicly verifiable key recovery
|
US6272632B1
|
|
System and method for controlling access to a user secret using a key recovery field
|
US6035423A
|
|
Method and system for providing automated updating and upgrading of antivirus applications using a computer network
|
US6029256A
|
|
Method and system for allowing computer programs easy access to features of a virus scanning engine
|
US5991856A
|
|
System and method for computer operating system protection
|
US6208999B1
|
|
Recoverable computer file system with a signature area containing file integrity information located in the storage blocks
|
US5831987A
|
|
Method for testing cache memory systems
|
US6064811A
|
|
Computer memory conservation system
|
US6298422B1
|
|
Method for reducing the memory requirements for an application program executing in a multi-tasking environment
|