Security system using existing network and personal computers
Security system with embedded HTTP server
Security through the use of tokens and automatically...
Selective and multiple programmed settings and passwords for...
Selective loading of client operating system in a computer...
Selective wireless disablement for computers passing through...
Sequence-based anomaly detection using a distance matrix
Session and transport layer proxies via TCP glue
Set top box object security system
Shared intelligence automated access control system
Signal reproducing/recording/transmitting method and...
Simplified data link protocol processor
Simplified method of configuring internet protocol security tunn
Single account portable wireless financial messaging unit
Single sign-on (SSO) mechanism personal key manager
Single sign-on for a network system that includes multiple...
Single sign-on framework with trust-level mapping to...
Single step network logon based on point to point protocol
Size-dependent hashing for credit card verification and...
Smart cards