Search
Selected: All

Access control and entitlement determination for...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Application security model

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Associating security information with information objects

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Authentication system, control method and program thereof,...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Authentication system, mobile terminal, and authentication...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Authentication system, mobile terminal, and authentication...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Authorizing a requesting entity to operate upon data structures

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Calculation of identifier codes distributed among pan devices

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Clustered filesystem for mix of trusted and untrusted nodes

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Computer readable medium on which is stored a program for...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cross-domain authentication

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cross-domain authentication

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Data carrier for the storage of data and circuit arrangement...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Determining roles for automated tasks in a role-based access...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Direct authentication and authorization system and method...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Elevating rights

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Filter-based attribute value access control

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identity management system and method

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Information processing apparatus, information processing...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Internal memory type tamper resistant microprocessor with...

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.