Use of a signal line to adjust width and/or frequency of a...
Use of a UUID as a time epoch to determine if the system...
Use of biometrics as a methodology for defining components...
Use of biometrics to provide physical and logic access to...
Use of code obfuscation to inhibit generation of...
Use of common language infrastructure for sharing drivers...
Use of cyclic redundancy checking for segregating control...
Use of cyclic redundancy checking for segregating control...
Use of geo-location data for spam detection
Use of geo-location data for spam detection
Use of hashing in a secure boot loader
Use of identification codes in the handling and management...
Use of kernel authorization data to maintain security in a...
Use of modular roots to perform authentication including,...
Use of modular roots to perform authentication including,...
Use of modular roots to perform authentication including,...
Use of NAND flash for hidden memory blocks to store an...
Use of NAND flash for hidden memory blocks to store an...
Use of off-motherboard resources in a computer system
Use of one voltage regulator module to support two...