Undeniable certificates for digital signature verification
Undeniable digital signature scheme based on quadratic field
Unification of directory service with file system service
Unified password prompt of a computer system
Unified permissions control for remotely and locally stored...
Uniform resource locator (URL)-based secure download system...
Unique and secure identification of a networked computing node
Unique block header patterns for media verification
Unique digital signature
Unique digital signature
Universal intelligent card for secure access to system...
Universal smart card access system
Upgradeable timestamp mechanism
USB-compliant personal key
Use and generation of a session key in a secure socket layer...
Use of a processor identification for authentication
Use of cyclic redundancy checking for segregating control...
Use of geo-location data for spam detection
Use of geo-location data for spam detection
Use of identification codes in the handling and management...