Secure IPsec tunnels with a background system accessible via...
Secure IR communication between a keypad and a token
Secure isolation and recovery in wireless networks
Secure key distribution to internet clients
Secure legacy media peripheral association with...
Secure lock mechanism based on a lock word
Secure lock mechanism based on a lock word
Secure login credentials for substantially anonymous users
Secure login using a multifactor split asymmetric crypto-key...
Secure manufacturing devices in a switched Ethernet network
Secure media path methods, systems, and architectures
Secure media path system and method
Secure memory storage device
Secure message system with remote decryption service
Secure method and system for computer protection
Secure method and system for creating a plug and play network
Secure mobile office wireless local-area network application...
Secure mobile platform system
Secure network and method of establishing communication...
Secure network architecture method and apparatus