Search
Selected: All

User registry adapter framework

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

User-level privilege management

Information security – Access control or authentication – Stand-alone
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using a first device to engage in a digital rights...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using GAA to derive and distribute proxy mobile node home...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using object based security for controlling object specific...

Information security – Access control or authentication – Stand-alone
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using packet filters and network virtualization to restrict...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using patterns to perform personal identification data...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using permissions to allocate device resources to an...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Utilizing a mobile device to operate an electronic locking...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Variable trust levels for authentication

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Verification engine for user authentication

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Verifying access to a network account over multiple user...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Verifying authenticity of instant messaging messages

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Verifying authenticity of webpages

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Verifying location of a mobile node

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Virtual devices and virtual bus tunnels, modules and methods

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Virtual host for protocol transforming traffic traversing...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Virtual host for protocol transforming traffic traversing...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Virtual identity apparatus and method for using same

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Virtual media from a directory service

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.