Automatic configuration of network tunnels
Automatic generation of a new encryption key
Automatic re-authentication
Automatic sharing of whitelist data
Automatically configuring a computer firewall based on...
Automatically generating rules for connection security
Bearer control of encrypted data flows in packet data...
Biometric authentication with security against eavesdropping
Blocking of spam e-mail at a firewall
Bluetooth™ based security system
Bridged cryptographic VLAN
Cable installation support and management system
Cardspace history validator
Casual access application with context sensitive pin...
Centralized identity management for delegating resource...
Centralized role-based access control for storage servers
Certificate based authentication authorization accounting...
Challenge-response user authentication
Changing states of communication links in computer networks...
Codeword-enhanced peer-to-peer authentication