Secret key generation method, encryption method, and...
Secure authentication of users via intermediate parties
Secure authentication using hardware token and computer...
Secure biometric verification of identity
Secure computer password system and method
Secure connection mechanism capable of automatically...
Secure data cartridge
Secure data exchange between date processing systems
Secure data processing method
Secure data transmission from unsecured input environments
Secure database system
Secure device authentication
Secure document access system
Secure entry of a user-identifier in a publicly positioned...
Secure entry of a user-identifier in a publicly positioned...
Secure entry of a user-identifier in a publicly positioned...
Secure identification with biometric data
Secure identity and privilege system
Secure management access control for computers, embedded and...
Secure management access control for computers, embedded and...