Turnkey data security
Two-channel challenge-response authentication method in...
Two-factor authentication of a remote administrator
Two-way authentication using a combined code
Unauthorized usage monitoring system for image processing...
Unauthorized usage monitoring system for image processing...
Undetectable firewall
Unified authentication for web method platforms
Unified network and physical premises access control server
Uniform resource locator access management and control...
Uniformly representing and transferring security assertion...
Unit using OS and image forming apparatus using the same
Unit using OS and image forming apparatus using the same
Universal authentication mechanism
Universal device ID registry, back-end, and...
USB hub keypad
Use of network address translation for implementation of...
Used trusted co-servers to enhance security of web interaction
User authentication
User authentication