Use of other processors during BIOS boot sequence to...
Use of personal communication devices for user authentication
Use of priority information to intelligently allocate power...
Use of pseudocode to protect software from unauthorized use
Use of pseudonyms vs. real names
Use of public switched telephone network for capturing...
Use of short message service (SMS) for secure transactions
Use of T4 timestamps to calculate clock offset and skew
Use of variant and base keys with two entities
User access to a unique data subset of a database
User alerts in an anti computer virus system
User authentication apparatus, method of user...
User authentication based on asymmetric cryptography...
User authentication for portable electronic devices using...
User authentication from non-native server domains in a computer
User authentication in a communications network
User authentication method and user authentication system
User authentication method for a remote control apparatus...
User authentication method using password
User authentication system and method for multiple process...