A method, system and computer readable medium for, from a central Web site, performing at least one of registering a user at a destination Web site, logging in a user at a destination Web site and managing an online financial transaction at a destination Web site, including parsing a form Web page o ...
A method, system, and computer readable medium for managing a financial transaction of a user at a merchant, including authenticating the user via a device of the user while the user is at the merchant; transmitting activation information for activating a reusable, pre-existing, unaltered and perman ...
A method, system, and software for preventing cheating during online gaming on a first computer system, include receiving information regarding cheaters detected during online gaming gathered by a second computer system; and making the received information available to the first computer system. Adv ...
A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are ...
A method and an apparatus for specifying and editing rights associated with a content includes a general model that comprehends rights specification at different levels of the content life cycle. The rights specification includes content association, and the protection of the content is a byproduct ...
The intrusion protection method and system for a communications network provides address agility wherein the cyber coordinates of a target host are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a management unit which generates a random seq ...
A method for creating a composite digital work having usage rights and composite digital works having usage rights. The method comprises creating a digital content portion of a composite digital work including a plurality of content parts, and creating a description structure for the composite digit ...
By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographi ...
A system and method is disclosed for the secure distribution and consumption of electronic documents using a standard rendering engine. The documents have usage rights associated therewith. A server stores the documents in computer readable form. A user operates a client having a standard applicatio ...
One embodiment of the present includes a heterogenous, high-performance, scalable processor having at least one W-type sub-processor capable of processing W bits in parallel, W being an integer value, at least one N-type sub-processor capable of processing N bits in parallel, N being an integer valu ...