Search
Selected: F

Film fingerprinting

Information security – Prevention of unauthorized use of data including prevention... – Copy inactivation
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Filter generation

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Filter-based attribute value access control

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Filtering a permission set using permission requests...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Filtering a permission set using permission requests...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Filtering a permission set using permission requests...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Filtering technique for processing security measures in web...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fine-grained attribute access control

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fine-grained authorization by authorization table associated...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fingerprint authentication method for accessing wireless...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fingerprinting based entity extraction

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Finite state automaton compression

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Firewall control for secure private networks with public...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Firewall control system based on a next generation network...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Firewall control with multiple profiles

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Firewall device

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Firewall for processing a connectionless network packet

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Firewall for real-time internet applications

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Firewall including local bus

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Firewall including local bus

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.