From a first information handling system ("IHS") to a second IHS, in response to a request for initiating an online transaction, a program is downloaded for detecting malicious code on the second IHS.

 
Web www.patentalert.com

< Demonstrating proof of concept of a project with requirements component providing weights on importance and tracking with use cases

> Copy protection method and system for digital media

> Digital rights management

~ 00506