Targeted secure printing
Technique for handling subsequent user identification and...
Technique for localizing keyphrase-based data encryption and...
Techniques for managing database systems with a community...
Time-based computer access controls
Time-based computer access controls
Timer apparatus and computer
Token for storing installation software and drivers
Tokenless identification system for authorization of...
Transaction authentication card
Transaction authentication card
Transaction device with noise signal encryption
Transaction device with noise signal encryption
Transmission of information to a reproduction device having...
Trusted authorization device
Trusted biometric client authentication
Trusted path for transmitting content thereon
Twisted signature
Two-factor computer password client device, system, and method