Search results

Jump to: navigation, search
  • ...ase the app would need to be certified and given a certification, like the Mobile Authentication Assurance Statement" link above. ...an Android SafetyNet attestation from Google gives some assurance about a mobile app.</pre>
    4 KB (624 words) - 09:35, 19 October 2020
  • |[https://www.airsidemobile.com/ Airside] || Canada || Cloud || mobile passport for entering US from Canada
    7 KB (989 words) - 09:57, 7 May 2019
  • ...art background processes. Due to hardware limits, background processes on mobile operating systems are often restricted to certain tasks or consumption leve
    2 KB (246 words) - 08:47, 18 May 2019
  • ...ive notifications. This best practice applies to applications installed on mobile devices as well as to web browsers.
    20 KB (3,337 words) - 17:30, 25 November 2019
  • ...ive notifications. This best practice applies to applications installed on mobile devices as well as to web browsers.
    22 KB (3,678 words) - 17:34, 25 November 2019
  • ...ive notifications. This best practice applies to applications installed on mobile devices as well as to web browsers. * [https://docs.microsoft.com/en-us/xamarin/xamarin-forms/creating-mobile-apps-xamarin-forms/ Charles Petzold ebook on Xamarin Forms] slightly out of
    29 KB (4,564 words) - 14:30, 20 February 2020
  • ...ive notifications. This best practice applies to applications installed on mobile devices as well as to web browsers.
    27 KB (4,073 words) - 11:58, 11 August 2020
  • ...a [[Native User Agent]] that can handle [[Authentication]] requests on any mobile platform. The goal is to enable [[Authentication]] requests from any source
    7 KB (1,020 words) - 16:19, 19 February 2020
  • # All major operating system providers for mobile device provide the means to protect user secrets in the phone in a manner t
    7 KB (1,112 words) - 11:17, 26 August 2020
  • [[Category:Mobile]]
    6 KB (970 words) - 18:02, 12 November 2019
  • ...or authentication and identity management services for cloud, web, VPN and mobile resources.",
    3 KB (503 words) - 16:26, 4 November 2018
  • ...ara-identity-privacy-incubator/mobile-authentication-for-first-responders/ Mobile Authentication for First Responders]
    3 KB (479 words) - 09:46, 26 May 2020
  • ...art background processes. Due to hardware limits, background processes on mobile operating systems are often restricted to certain tasks or consumption leve
    2 KB (294 words) - 08:49, 18 May 2019
  • ...cessor Computer || Local processing & virtualization || bgcolor="SkyBlue"|Mobile or Desktop device that maintains user info
    20 KB (3,036 words) - 11:15, 29 August 2020
  • ...ntent moves from servers to clients, where it's displayed inside browsers, mobile apps, or other applications. If the race between corporate giants Amazon, M
    6 KB (893 words) - 12:12, 7 November 2020
  • # How do we identify unique users across systems using person-centric mobile technologies? ...[https://kantarainitiative.org/confluence/display/WT/Draft+Recommendations Mobile Authentication Assurance Statement] to allow the Electronic Health Records
    12 KB (1,734 words) - 14:14, 31 October 2020
  • # How do we identify unique users across systems using person-centric mobile technologies? | 8A || Patient's Credential || Mobile Driver's License || digital || one version of a patient's IAL2 identity pro
    7 KB (1,108 words) - 12:50, 5 November 2020
  • ...p/library/alt-SP800-124r1.pdf NIST Guidelines for Managing the Security of Mobile Devices in the Enterprise] ...ties and on the organization’s networks). Before designing and deploying mobile device solutions, organizations should develop system threat models. Threat
    13 KB (2,076 words) - 13:51, 16 October 2020
  • ...ial care to proof and protect from disclosure, just as email addresses and mobile phone numbers often go through some sort of proofing process. That is all b ...worth, driver’s license number, social security number, e-mail address, mobile number, and data such as the subject’s network presence, the device used
    54 KB (8,856 words) - 11:20, 9 March 2020
  • # User held mobile devices like [[Smart Phone]]s that come with a built in [[Trusted Execution
    2 KB (406 words) - 14:29, 23 July 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)