From a first information handling system ("IHS") to a second IHS, in response to a request for initiating an online transaction, a program is downloaded for detecting malicious code on the second IHS.
Web www.patentalert.com
< Demonstrating proof of concept of a project with requirements component providing weights on importance and tracking with use cases
> Copy protection method and system for digital media
> Digital rights management
HOME | NEW USER | LOGIN | SUBSCRIPTIONS | SEARCH | GUESTBOOK | CONTACT