Search
Selected: I

IC card and access control method

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

IC card and card certification method

Information security – Access control or authentication – Stand-alone
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

IC card terminal unit and IC card duplication method

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

IC intrusion detection

Information security – Protection of hardware
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identification and authentication management

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identification and visualization of trusted user interface...

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identification card manufacturing security

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identification of an attacker in an electronic system

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identification of network policy violations

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identification system and method

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying a distributed denial of service (DDOS) attack...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying dependencies of an application upon a given...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying malware containing computer files using embedded...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying malware containing computer files using embedded...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying malware infected reply messages

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying malware that employs stealth techniques

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying potential intruders on a server

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying the origin of hard-copy documents

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying threats in electronic messages

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Identifying unwanted electronic messages

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.