Application levels of service over a network
Applying a permission grant set to a call stack during runtime
Architecture for multiple channel access to applications
Arrangements and methods relating to security in networks...
Arranging management operations in management system
Authentication and protection for IP application protocols...
Authentication and protection for IP application protocols...
Authentication method using cellular phone in internet
Authentication of unknown parties in secure computer...
Authentication through multiple proxy servers
Authentication using portion of social security number
Authentication, application-authorization, and user...
Authorization access controlled content exchange
Authorization access controlled content exchange
Authorizing communication services
Automated method for electronic software distribution
Automated time zone based grouping
Automatic and transparent synchronization of server-side...
Backoff protocols and methods for distributed mutual...
Bandwidth control service management apparatus