Then, the user terminal (3) that has acquired the newly permitted user information changes the permitted user information (11) to the newly permitted user information.
Because the transfer user terminal is calling with the substituted user terminal, the transfer user terminal trusts in the substituted user terminal, vice versa.
The security server determines the security level of the user terminal based on historical user data related to the user terminal.
A first user terminal calls a second user terminal via an application server.
An animated sequence of the selected one operation is displayed at a user display of the user terminal.
These user functions are documented in a chain of subfunctions, whereby several subfunctions can occur is several user functions, which user functions are then termed overlapping function domains.
The server may then identify a record of the multiple records that has a username, and associate the record with a user identifier (ID) corresponding to the username.
A first username may be compared with a second username.
The user profile includes a username for at least one social networking site.
The at least one user credential may include at least one of a user password, passphrase, username, certificate, and key data, for example.
The user identifier is different than the root user identifier is.
The memory stores a user ID used to identify the user apparatus.
Upon receiving the user instruction, the user identifier is sent to the TSP.
The method includes receiving the user identifier and an authentication token for the first user identifier.
The user ID can also be loaded using a display (79) associated with the user interface (51).
When the client receives the user information request, the client displays a message prompting input of user information.
The system can track (940) the users by certain user information, as well as block a certain user's access to the system based on the user's access to the system based on the user's information.
In response to receipt of the user information, the server is caused to provide the user informtion to the log.
The user authentication portion reads user information and performs user authentication.
The plurality of parameters includes user-intent features, a contextual user-model, user history, and user preferences.
The user request includes user identification data.
The first user device communicates first user settings to a second user receiving device.
The user inhibit handler includes a user inhibit indicator.
The user credit account corresponds to the user device.
The user input access combination includes a first user input character and a second user input character.
A user assertion may be provided that includes the user authentication result, a user assurance level, and/or a user freshness level.
The expected user equipment capabilities may be obtained based on a user equipment identifier received from the user equipment.
A user application is generated in response to user input, wherein the user application is described in a user application description.
Moreover, the user inhibit handler is configured to activate the user inhibit indicator upon indication of a user inhibit signal.
The user receiving device operates with the first user settings.
User parameters may be available from user profiles.
A technique for user identification based on a user input is provided.
A user equipment registration method, and a user equipment.
Requêtes fréquentes français :1-200, -1k, -2k, -3k, -4k, -5k, -7k, -10k, -20k, -40k, -100k, -200k, -500k, -1000k,
Requêtes fréquentes anglais :1-200, -1k, -2k, -3k, -4k, -5k, -7k, -10k, -20k, -40k, -100k, -200k, -500k, -1000k,
Traduction Translation Traducción Übersetzung Tradução Traduzione Traducere Vertaling Tłumaczenie Mετάφραση Oversættelse Översättning Käännös Aistriúchán Traduzzjoni Prevajanje Vertimas Tõlge Preklad Fordítás Tulkojumi Превод Překlad Prijevod 翻訳 번역 翻译 Перевод