Trusted workstation in a networked client/server computing...
Typed, parameterized, and extensible access control permissions
Unification of directory service with file system service
Unified password prompt of a computer system
Uniform resource locator (URL)-based secure download system...
Universal intelligent card for secure access to system...
USB-compliant personal key
Use of a processor identification for authentication
Use of geo-location data for spam detection
Use of geo-location data for spam detection
Use of pseudocode to protect software from unauthorized use
User authentication from non-native server domains in a computer
User control of web browser user data
User customizable secure access token and multiple level...
User profile storage on and retrieval from a non-native server d
User specific automatic data redirection system
User support system for cryptographic communication in...
User-computer interaction method for use by a population of...
Using digital signatures to validate trading and streamline...
Using SYN-ACK cookies within a TCP/IP protocol