Methods for authenticating potential members invited to join...
Methods for broadcasting and receiving a scrambled...
Methods for coordinating access to memory from at least two...
Methods for efficiently authenticating multiple objects...
Methods for efficiently authenticating multiple objects...
Methods for implementing color change frequency as image...
Methods for improved security of software applications
Methods for iteratively deriving security keys for...
Methods for pre-authentication of users using one-time...
Methods for secure enrollment and backup of personal...
Methods for verifying information during telemarketing...
Methods of authenticating a user design in a programmable...
Methods of invisibly embedding and hiding data into...
Methods of scrambling and unscrambling a video signal, a...
Methods, apparatus, and program products for inferring...
Methods, software, and apparatus for secure communication...
Methods, systems and computer program products for detecting...
Methods, systems and computer program products for enhanced...
Methods, systems and computer program products for providing...
Methods, systems and computer program products for rule...