Search
Selected: P

Personal computer internet security system

Information security – Access control or authentication – Stand-alone
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Personal data management system and nonvolatile memory card

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Personal firewall with location dependent functionality

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Personal firewall with location dependent functionality

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Personal virtual bridged local area networks

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Personal website for electronic commerce on a smart Java...

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Pervasive security mechanism by combinations of network and...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Phishing detection, prevention, and notification

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Phishing solution method

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Physical key security management method and apparatus for...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Physical scanning of storage based apparatus for antivirus

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Piggy-backed key exchange protocol for providing secure,...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

PIN recovery in a smart card

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Plug and play device and access control method therefor

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Policies as workflows

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Policy execution

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Policy language and state machine model for dynamic...

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Policy resolution in an entitlement management system

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Policy setting support tool

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Policy specification framework for insider intrusions

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.