WO2011106143A1
|
|
Method and apparatus for applying a partial password in a multi-factor authentication scheme
|
WO2011094272A1
|
|
Client device identification through last-modified date manipulation
|
WO2011056925A1
|
|
Key camouflaging using a machine identifier
|
US2009138950A1
|
|
Two-factor anti-phishing authentication systems and methods
|
US7844827B1
|
|
Method of key generation using biometric features
|
US2005228999A1
|
|
Audit records for digitally signed documents
|
US2005172229A1
|
|
Browser user-interface security application
|
US2005160298A1
|
|
Nonredirected authentication
|
US2005160043A1
|
|
Account protection with one sided access
|
WO2004102879A1
|
|
Method and apparatus for securing pass codes during transmission from capture to delivery
|
US2005210286A1
|
|
Auditing secret key cryptographic operations
|
AU2003301175A1
|
|
Cross-domain transactions through simulated pop-ups
|
WO03104970A1
|
|
Non-textual representation of access activities regarding a resource
|
US7111789B2
|
|
Enhancements to multi-party authentication and other protocols
|
US2002174355A1
|
|
Techniques for searching encrypted files
|
US2002126850A1
|
|
Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
|
US2002143766A1
|
|
Efficient computational techniques for authorization control
|
US7020782B2
|
|
Size-dependent hashing for credit card verification and other applications
|
WO02058357A2
|
|
Pre-authentication of users using one-time passwords
|
US6959303B2
|
|
Efficient searching techniques
|