USB-compliant personal key
Use and generation of a session key in a secure socket layer...
Use of a processor identification for authentication
Use of cyclic redundancy checking for segregating control...
Use of geo-location data for spam detection
Use of geo-location data for spam detection
Use of identification codes in the handling and management...
Use of kernel authorization data to maintain security in a...
Use of modular roots to perform authentication including,...
Use of modular roots to perform authentication including,...
Use of modular roots to perform authentication including,...
Use of pseudocode to protect software from unauthorized use
Use of pseudonyms vs. real names
Use of public switched telephone network for capturing...
Use of short message service (SMS) for secure transactions
Use of variant and base keys with two entities
User authentication based on asymmetric cryptography...
User authentication from non-native server domains in a computer
User authentication in a communications network
User authentication system and user authentication method