Peer-to-peer authorization method
Pen-based transponder identity verification system
Pen-based transponder identity verification system
Permission-based scanning of a web site
Persistance and recovery of security keys
Personal authentication apparatus
Personal authentication apparatus and personal...
Personal authentication system and portable unit and storage...
Personal communication apparatus capable of recording...
Personal identification fob
Personal identification system
Portable computer with a hand impression
Portable computer with a hand impression
Portable device and method for accessing data key actuated...
Portable information processor having password code checking...
Portable personal authentication apparatus and electronic...
Portable wireless access to computer-based systems
Process for detecting defective component exchanges