Trust tokens
Trusted device-specific authentication
Trusted license removal in a content protection system or...
Trusted operating environment for malware detection
Trusted third party authentication for web services
Tunnel designation system for virtual private networks
Two-factor authentication of a remote administrator
Two-way authentication using a combined code
Unauthorized usage monitoring system for image processing...
Unauthorized usage monitoring system for image processing...
Undetectable firewall
Unified authentication for web method platforms
Unified network and physical premises access control server
Uniform resource locator access management and control...
Uniformly representing and transferring security assertion...
Universal authentication mechanism
Universal device ID registry, back-end, and...
USB hub keypad
Use of network address translation for implementation of...
User authentication