Systems and methods of securing resources through passwords
Systems and methods of securing resources through passwords
Systems, methods and software for remote password...
Targeted secure printing
Technique for handling subsequent user identification and...
Technique for localizing keyphrase-based data encryption and...
Techniques for managing database systems with a community...
Time-based computer access controls
Time-based computer access controls
Timer apparatus and computer
Token for storing installation software and drivers
Tokenless identification system for authorization of...
Transaction authentication card
Transaction authentication card
Transaction device with noise signal encryption
Transaction device with noise signal encryption
Transmission of information to a reproduction device having...
Trusted authorization device
Trusted biometric client authentication
Trusted path for transmitting content thereon