Search
Selected: All

Trainable rule-based computer file usage auditing system

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transaction system for transporting media files from content...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transaction verification

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transcryption of digital content between content protection...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transcryption of digital content between content protection...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transmission system, a method and an apparatus providing...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transmitter device firewall

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transmitter, signal transfer method, data distribution...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transmitter, signal transfer method, data distribution...

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transmitter, signal transmitting method, and data...

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transmitting data across firewalls

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transparent authentication using an authentication server

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transparent encryption and access control for mass-storage...

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transparent interceptors for privacy policy implementation

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Transporting keys between security protocols

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trial usage for encrypted subscription-based data

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trust management systems and methods

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trust tokens

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trusted computer system

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trusted device-specific authentication

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.