Validity Report
Full Report
US8850535B2 — Methods and systems for identity verification in a social network using ratings
Priority Date: 2011-08-05, Publication Date: 2014-09-30, Current Assignee: Street Spirit Ip LLCReport Generated: 2022-10-06

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
US8966590B20.947Managing social network accessibility based on ageGRANT2015-02-242010-08-1750774536GreatFacebook IncMeta Platforms Inc
US8671453B20.928Social age verification engineGRANT2014-03-112010-08-1745595117GreatFacebook IncMeta Platforms Inc
US9208337B20.915Systems  methods  and software applications for providing and identity and age-appropriate verification registryGRANT2015-12-082009-09-2243757528Great
EP1288765B10.909Universal authentication mechanismGRANT2007-11-212001-09-048178537GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US8959584B20.909Systems and methods for universal enhanced log-in  identity document verification and dedicated survey participationGRANT2015-02-172007-06-0148798362GreatAlbright AssociatesAlbright Associates
US9398022B20.907Systems and methods for universal enhanced log-in  identity document verification  and dedicated survey participationGRANT2016-07-192007-06-0153183862Great
US8893241B20.906Systems and methods for universal enhanced log-in  identity document verification and dedicated survey participationGRANT2014-11-182007-06-0148871531GreatAlbright AssociatesAlbright Associates
EP2404233A10.897USING SOCIAL INFORMATION FOR AUTHENTICATING A USER SESSIONGRANT2012-01-112009-03-0642679406GreatFacebook IncMeta Platforms Inc
EP2695136B10.883SYSTEM  METHOD  SERVER AND COMPUTER-READABLE MEDIUM FOR REAL-TIME VERIFICATION OF A STATUS OF A MEMBER OF AN ORGANIZATIONGRANT2017-06-212011-04-0146929253GreatClawd Technologies IncClawd Technologies Inc
EP1425645B10.876A DISTRIBUTED NETWORK SYSTEM USING BIOMETRIC AUTHENTICATION ACCESSGRANT2010-09-292001-07-1842932667GreatDaon Holdings LtdDaon Holdings Ltd
US8056118B20.874Systems and methods for universal enhanced log-in  identity document verification  and dedicated survey participationGRANT2011-11-082007-06-0140383404Great
EP1386470B10.860ARCHITECTURE FOR PROVIDING SERVICES IN THE INTERNETGRANT2006-10-182001-04-2327512433GreatKoninklijke PTT Nederland NV, Koninklijke KPN NVKoninklijke PTT Nederland NV, Koninklijke KPN NV
EP2283669B10.859TRUSTED DEVICE-SPECIFIC AUTHENTICATIONGRANT2020-03-042008-06-0241381542GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9805213B10.858Identity validation and verification system and associated methodsGRANT2017-10-312009-06-0360143266Great
US8224753B20.853System and method for identity verification and managementGRANT2012-07-172004-12-0736578498Great
EP2353125A10.843USER AUTHENTICATION FOR SOCIAL NETWORKSGRANT2011-08-102008-11-0342129256GreatVeritrix IncTHE FRANCINE GANI 2002 LIVING TRUST
EP1305926B10.832ARRANGEMENT FOR AUTHENTICATING A USER AND AUTHORIZING USE OF A SECURED SYSTEMGRANT2008-12-312000-06-2226161027GreatFujitsu Finland OyFujitsu Finland Oy
US8819413B10.829Method and apparatus for collaborative claim verificationGRANT2014-08-262006-12-2251358761GreatSymantec CorpCA Inc
EP2052345B10.825METHOD FOR THE ANONYMOUS ANALYSIS OF AUTHENTICATING IDENTITY CODES OF A USER OR AN OBJECTGRANT2010-04-142006-08-0437686080Great
US7231657B20.817User authentication system and methods thereofGRANT2007-06-122002-02-1427668360GreatAmerican Management Systems IncCGI Technologies and Solutions Inc
EP2526503B10.817PERSONAL PORTABLE SECURED NETWORK ACCESS SYSTEMGRANT2019-05-082009-01-2042338014GreatGemcar IncGemcar Inc
EP1721256B10.815USE OF PUBLIC SWITCHED TELEPHONE NETWORK FOR CAPTURING ELECTRONIC SIGNATURES IN ON-LINE TRANSACTIONSGRANT2010-03-312003-11-1434860666GreatAuthentify IncAuthentify Inc
US20080127296A10.814IDENTITY ASSURANCE METHOD AND SYSTEMAPPLICATION2008-05-292006-11-2939495808GreatInternational Business Machines CorpInternational Business Machines Corp
US7333635B20.812Method and system for confirming personal identityGRANT2008-02-192005-09-0238322126GreatIntersections IncAura Sub LLC
EP2721521B10.809VIRTUAL IDENTITY MANAGERGRANT2018-08-152011-06-2047354447GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2008398B10.809ENHANCED SECURITY FOR ELECTRONIC COMMUNICATIONSGRANT2016-01-132006-03-3138561106GreatAmazon Technologies IncAmazon Technologies Inc
EP2355443B10.808Network authentication method and device for implementing the sameGRANT2019-06-192010-01-2743881253GreatKeypasco ABKeypasco AB
US8554835B10.806System and method for secure social networkingGRANT2013-10-082010-06-1149262596Great
US20100122347A10.805AUTHENTICITY RATINGS BASED AT LEAST IN PART UPON INPUT FROM A COMMUNITY OF RATERSAPPLICATION2010-05-132008-11-1342166403GreatInternational Business Machines CorpInternational Business Machines Corp
US10042993B20.805Access control through multifactor authentication with multimodal biometricsGRANT2018-08-072010-11-0254702116Great
EP2394225B10.800CENTRALIZED AUTHENTICATION SYSTEM WITH SAFE PRIVATE DATA STORAGE AND METHODGRANT2019-01-092009-02-0542398668GreatWWPass CorpWWPass Corp
EP1461718A10.793DISTRIBUTED NETWORK IDENTITYGRANT2004-09-292001-12-0427407184GreatSun Microsystems IncOracle America Inc
EP1680720B10.793METHOD AND SYSTEM FOR THE AUTHENTICATION OF A USER OF A DATA PROCESSING SYSTEMGRANT2012-01-042003-11-0734560135GreatTelecom Italia SpATelecom Italia SpA
EP2676497B10.791SYSTEM AND METHOD FOR IDENTITY MANAGEMENT FOR MOBILE DEVICESGRANT2018-04-182011-02-1546653145GreatBlackBerry LtdBlackBerry Ltd
EP1214678A10.786SYSTEM AND METHOD FOR PROCESSING TOKENLESS BIOMETRIC ELECTRONIC TRANSMISSIONS USING AN ELECTRONIC RULE MODULE CLEARINGHOUSEGRANT2002-06-191999-09-1623577333GreatIndivos CorpYOU Technology Inc
EP1514446B10.785SELF-REGISTRATION METHOD AND AUTOMATIC ISSUE OF DIGITAL CERTIFICATES AND RELATED NETWORK ARCHITECTURE IMPLEMENTING SUCH METHODGRANT2008-03-262002-06-1411456367GreatTelecom Italia SpATelecom Italia SpA
EP2652682B10.785Method and device for authentication of service requestsGRANT2015-05-132010-12-1445478504GreatLivePerson IncLivePerson Inc
EP2074513A20.784VERIFICATION AND AUTHENTICATION SYSTEMS AND METHODSGRANT2009-07-012006-10-1039275957GreatEquifax IncEquifax Inc
EP1997066A20.784METHOD AND SYSTEM FOR PROVIDING ONLINE AUTHENTICATION UTILIZING BIOMETRIC DATAGRANT2008-12-032006-02-0638345870GreatSolidus Networks IncYOU Technology Inc
EP2308002B10.783SINGLE-CHANNEL MULTI-FACTOR AUTHENTICATIONGRANT2017-08-162008-06-1141414211GreatIdefend LtdIDEFEND LTD.
EP1530860B10.781METHOD AND SYSTEM FOR USER-DETERMINED AUTHENTICATION AND SINGLE-SIGN-ON IN A FEDERATED ENVIRONMENTGRANT2006-09-272002-06-2829779416GreatInternational Business Machines CorpInternational Business Machines Corp
EP2564345B10.779DEVICE  SYSTEM  AND METHOD FOR REGISTERING AND AUTHENTICATING HANDWRITTEN SIGNATURES AND ARCHIVING HANDWRITTEN INFORMATIONGRANT2015-09-022010-07-0658228715Great
US9225701B20.779Secure communication systems and methodsGRANT2015-12-292011-04-1849236910GreatINTELMATE LLCINTELMATE LLC
US20090320101A10.777SYSTEM AND METHOD FOR AUTHENTICATING USERS IN A SOCIAL NETWORKAPPLICATION2009-12-242008-06-1841432695GreatPORTCARDNETPORTCARDNET
EP2258094B10.774DEVOLVED AUTHENTICATIONGRANT2019-04-032008-03-2839682494GreatBritish Telecommunications PLCBritish Telecommunications PLC
EP1969478A20.774SYSTEM AND METHOD FOR CROSS-DOMAIN SOCIAL NETWORKINGGRANT2008-09-172005-12-2238218691GreatCatalog com IncCatalog com Inc
EP1358572B10.773SUPPORT FOR MULTIPLE DATA STORESGRANT2019-09-112000-12-2227401106GreatOracle International CorpOracle International Corp
EP1310077B10.772METHOD AND APPARATUS FOR A WEB-BASED APPLICATION SERVICE MODEL FOR SECURITY MANAGEMENTGRANT2008-01-092000-08-1527397524GreatViaquo CorpViaquo Corp
EP3065339B10.771RECORD AND PLAYBACK IN A CONFERENCEGRANT2020-02-122010-04-3044861829GreatAmerican Teleconferencing Services LtdAmerican Teleconferencing Services Ltd
EP1456760B10.766METHOD AND APPARATUS OF STORAGE ANTI-PIRACY KEY ENCRYPTION (SAKE) DEVICE TO CONTROL DATA ACCESS FOR NETWORKSGRANT2008-09-102002-07-3131493125GreatTrek 2000 International LtdTrek 2000 International Ltd
EP1905191B10.764NETWORK USER AUTHENTICATION SYSTEM AND METHODGRANT2014-09-032005-07-2037669580GreatVerimatrix IncVerimatrix Inc
EP2456245B10.763System  devices and method for secure authenticationGRANT2013-09-112010-11-1943796528GreatBlackBerry LtdBlackBerry Ltd
EP1816821B10.763System and method for validating a user of an account using a wireless deviceGRANT2011-05-182006-02-0142732727GreatResearch in Motion LtdBlackBerry Ltd
EP2460307B10.762SYSTEM AND METHOD FOR STRONG REMOTE IDENTITY PROOFINGGRANT2019-12-112009-07-3143529739GreatAnakam IncAnakam Inc
EP1738323A20.761SHARING SOCIAL NETWORK INFORMATIONGRANT2007-01-032004-03-1534994242GreatAOL IncOath Inc
EP2008220B10.760SERVICE MANAGEMENT FRAMEWORKGRANT2012-09-052006-03-3138433010GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
EP2359290B10.759METHOD AND SYSTEM PROTECTING AGAINST IDENTITY THEFT OR REPLICATION ABUSEGRANT2017-05-102008-11-1041572489GreatSMS Passcode ASCENSORNET A/S
US8087068B10.759Verifying access to a network account over multiple user communication portals based on security criteriaGRANT2011-12-272005-03-0844657867GreatGoogle LLCGoogle LLC
US10049359B20.758Identity risk scoringGRANT2018-08-142007-06-2740161742GreatCheckFree CorpCheckFree Services Corp
EP2149084B10.756METHOD AND SYSTEM FOR AUTHENTICATING A PARTY TO A TRANSACTIONGRANT2019-03-272007-04-1739875877GreatVisa USA IncVisa USA Inc
EP1982288A20.756SYSTEMS AND METHODS FOR MULTI-FACTOR AUTHENTICATIONGRANT2008-10-222006-01-2638292762GreatImprivata IncImprivata Inc
EP2404427B10.755METHOD AND APPARATUS FOR SECURING NETWORK COMMUNICATIONSGRANT2013-01-162009-03-0440580609Great
EP2208304A10.752USER-CENTRIC AUTHENTICATION SYSTEM AND METHODGRANT2010-07-212007-10-2240339411GreatTruesigna IncTruesigna Inc
EP2289222B10.751METHOD  AUTHENTICATION SERVER AND SERVICE SERVER FOR AUTHENTICATING A CLIENTGRANT2019-07-032008-05-2340996573GreatDeutsche Telekom AGDeutsche Telekom AG
EP2439969B10.751Authentication of personal data over telecommunications systemGRANT2013-08-212010-10-0643064192GreatTeliaSonera ABTelia Co AB
EP1269425A20.750SECURE TRANSACTION SYSTEMGRANT2003-01-022000-02-2522678992GreatIdentix IncIdemia Identity and Security USA LLC
EP2456157B10.749Protecting privacy when a user logs into a secure web service using a mobile deviceGRANT2013-06-052010-11-1743778625GreatDeutsche Telekom AGDeutsche Telekom AG
US8756661B20.748Dynamic user authentication for access to online servicesGRANT2014-06-172009-08-2443606357GreatUFP Identity IncUFP Identity Inc
EP2394388A10.747NETWORK TRANSACTION VERIFICATION AND AUTHENTICATIONGRANT2011-12-142009-02-0342398667GreatInbay Technologies IncINBAY TECHNOLOGIES INC.
EP2572498A10.747CERTIFIED COMMUNICATIONS SYSTEM AND METHODGRANT2013-03-272010-05-1844992032GreatCerticall LLCCerticall LLC
EP2521329B10.746A server  a system  a method  a computer program and a computer program product for accessing a server in a computer networkGRANT2013-07-102011-05-0445928885GreatAlcatel Lucent SASAlcatel Lucent SAS
US10430570B20.746System and method for identity and reputation score based on transaction historyGRANT2019-10-012011-07-1453183851GreatDocusign IncDocusign Inc
EP2348763B10.745Method for authenticating a mobile terminal to access an application serverGRANT2022-01-052010-01-2142937471GreatSociete Francaise du Radiotelephone SFR SASociete Francaise du Radiotelephone SFR SA
EP1244266B10.745Method and apparatus to facilitate secure network communications with a voice responsive network interface deviceGRANT2008-10-152000-12-0824941148GreatITT Manufacturing Enterprises LLCITT Manufacturing Enterprises LLC
US7444672B20.744System and method for single sign on process for websites with multiple applications and servicesGRANT2008-10-281999-07-0236569087GreatJPMorgan Chase Bank NAJPMorgan Chase Bank NA
EP2368339B10.743SECURE TRANSACTION AUTHENTICATIONGRANT2017-08-092008-12-0342233671GreatEntersekt International LtdEntersekt International Ltd
EP2016553B10.743APPARATUS FOR ACCESS CONTROL AND PROCESSINGGRANT2019-10-302006-05-0939033447GreatTicketmaster LLCTicketmaster LLC
US8428227B20.742Certified communications system and methodGRANT2013-04-232010-05-1844972498GreatCerticall LLCAngel Holdings LLC
US7953671B20.742Methods and apparatus for conducting electronic transactionsGRANT2011-05-311999-08-3146332061GreatAmerican Express Travel Related Services Co IncLiberty Peak Ventures LLC
EP1710980B10.742Authentication services using mobile deviceGRANT2012-08-082005-04-0836636465GreatFujitsu LtdFujitsu Ltd
EP2491673B10.742AUTHENTICATION USING CLOUD AUTHENTICATIONGRANT2018-05-162009-10-2343899529GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP1427160B10.741Methods and systems for authentication of a user for sub-locations of a network locationGRANT2010-06-092002-12-0532312267GreatMicrosoft CorpMicrosoft Corp
US9047473B20.741System and method for second factor authentication servicesGRANT2015-06-022004-07-1541434396GreatAnakam IncAnakam Inc
US20090305667A10.740Method and system for mobile identity verification and securityAPPLICATION2009-12-102007-04-2441400769GreatGula Consulting LLCGENMOBI TECHNOLOGIES Inc
EP2343679A10.740Secure transaction systems and methodsGRANT2011-07-132010-01-0643759948GreatValidity Sensors IncSynaptics Inc
EP0944004B10.740IRC name translation protocolGRANT2008-02-061998-03-188231608GreatSony Deutschland GmbHSony Deutschland GmbH
EP2297685A10.739METHODS AND SYSTEMS FOR BRANDS SOCIAL NETWORKS (BSN) PLATFORMGRANT2011-03-232008-07-0440756210Great
US20080222271A10.739Age-restricted website service with parental notificationAPPLICATION2008-09-112007-03-0539742746Great
EP1472813B10.738SINGLE SIGN-ON OVER THE INTERNET USING PUBLIC-KEY CRYPTOGRAPHYGRANT2019-08-072002-01-2927658256GreatOracle International CorpOracle International Corp
EP2338268B10.735A TRANSACTION SYSTEM FOR BUSINESS AND SOCIAL NETWORKINGGRANT2016-07-062008-10-1042233508Great
US9736149B20.735Method and system for establishing trusted communication using a security deviceGRANT2017-08-152009-02-0357776485GreatINBAY TECHNOLOGIES IncINBAY TECHNOLOGIES Inc
US8976008B20.735Cross-domain collaborative systems and methodsGRANT2015-03-102006-08-2447091062GreatPrivacyDataSystems LLCPrivacyDataSystems LLC
EP1646254B10.733Identification and/or authentification method by means of fingerprintsGRANT2008-04-162004-10-1134929691GreatSwisscom Mobile AGSwisscom AG
US20030046237A10.732Method and system for enabling the issuance of biometrically secured online credit or other online payment transactions without tokensAPPLICATION2003-03-062000-05-0946281412GreatTOUCHCREDIT FINANCIAL SERVICES IncTOUCHCREDIT FINANCIAL SERVICES Inc
WO2008141255A10.731SECURE SOCIAL NETWORKING SYSTEM WITH ANTI-PREDATOR MONITORINGAPPLICATION2008-11-202007-05-1039970342Great
US8464358B20.731Portable identity ratingGRANT2013-06-112010-12-0846200859Great
US8918904B20.730Systems and methods for user identity verification and risk analysis using available social and personal dataGRANT2014-12-232010-12-1746236349GreatWePay IncWePay Inc
EP1497947B10.729MOBILE ACCOUNT AUTHENTICATION SERVICEGRANT2009-06-172002-04-1729219700GreatVisa International Service AssociationVisa International Service Association
EP1756994B10.728NETWORK SECURITY AND FRAUD DETECTION METHODGRANT2018-10-102004-06-1435461883GreatIovation IncIovation Inc
US20100115610A10.728METHOD AND SYSTEM FOR PROVIDING AUTHENTICATION THROUGH AGGREGATE ANALYSIS OF BEHAVIORAL AND TIME PATTERNSAPPLICATION2010-05-062008-11-0542133106GreatXerox CorpXerox Corp
EP2614458B10.726METHOD OF AUTHENTIFICATION FOR ACCESS TO A WEBSITEGRANT2015-05-202010-09-0943923712GreatLOGINPEOPLE SALOGINPEOPLE SA
US7404086B20.724Method and apparatus for biometric authenticationGRANT2008-07-222003-01-2432735476GreatAC Technology IncAC Technology Inc, Advanced Biometric Controls LLC
EP2304616B10.723METHOD AND SYSTEM FOR SINGLE SIGN ON WITH DYNAMIC AUTHENTICATION LEVELSGRANT2018-03-212008-05-2341340881GreatHSBC Technology and Services USA IncHSBC Technology and Services USA Inc
US7797732B20.722System and method for creating a secure trusted social networkGRANT2010-09-142004-11-0436318856GreatTopeer CorpTopeer Corp
EP2335146A10.722SECURE MESSAGE AND FILE DELIVERYGRANT2011-06-222008-09-0841797543GreatPrivacyDataSystems LLCPrivacyDataSystems LLC
EP2684347B10.722AUTHORISING A USER TO PARTICIPATE IN A CONFERENCE CONDUCTED OVER A COMMUNICATION NETWORKGRANT2019-02-202011-04-1445976932GreatSkype Ltd IrelandSkype Ltd Ireland
EP2375688A10.722Managing automatic log in to Internet target resourcesGRANT2011-10-122010-03-2944212206GreatVodafone Espana SA, Vodafone Group PLCVodafone Espana SA, Vodafone Group PLC
US7234156B20.720System and method for authentication of network usersGRANT2007-06-191998-05-2122197333GreatEquifax IncEquifax Inc
US8554827B20.720Virtual peer for a content sharing systemGRANT2013-10-082006-09-2939261063GreatQurio Holdings IncQurio Holdings Inc
US8762288B20.719Methods and systems for establishing an identity confidence databaseGRANT2014-06-242009-04-2242992922GreatWestern Union CoWestern Union Co
US7505941B20.718Methods and apparatus for conducting electronic transactions using biometricsGRANT2009-03-171999-08-3146304546GreatAmerican Express Travel Related Services Co IncLiberty Peak Ventures LLC
EP2206278B10.717SYSTEMS AND METHODS FOR WIRELESS NETWORK SELECTION BASED ON ATTRIBUTES STORED IN A NETWORK DATABASEGRANT2014-11-122007-09-2840511918GreatDevicescape Software IncDevicescape Software Inc
US9460299B20.716System and method for monitoring and reporting peer communicationsGRANT2016-10-042010-12-0946200532GreatLocation Labs LLCSmith Micro Software LLC
EP1766852B10.715Device for user identity managementGRANT2013-08-212004-06-1635481929GreatDormarke Assets LLCCallahan Cellular LLC
EP2479957B10.715SYSTEM AND METHOD FOR AUTHENTICATING REMOTE SERVER ACCESSGRANT2016-09-142006-10-1939319449GreatQualcomm IncQualcomm Inc
EP2053531B10.715Authentication certificate management for access to a wireless communication deviceGRANT2014-07-302007-10-2539247774GreatBlackBerry LtdBlackBerry Ltd
EP2456158B10.714APPARATUS  SYSTEM AND METHOD FOR VERIFYING SERVER CERTIFICATESGRANT2016-06-012010-11-1643857823GreatBlackBerry LtdBlackBerry Ltd
US7865937B10.712Methods and systems for authenticating usersGRANT2011-01-042009-08-0543385110GreatDaon Holdings LtdDaon Enterprises Ltd
EP1574001B10.711SYSTEM AND METHOD OF SECURE AUTHENTICATION INFORMATION DISTRIBUTIONGRANT2011-04-132002-12-0932511601GreatResearch in Motion LtdBlackBerry Ltd
EP2070248B10.711SYSTEM AND METHOD FOR FACILITATING SECURE ONLINE TRANSACTIONSGRANT2018-10-102006-09-2739226421GreatSecureAuth CorpSecureAuth Corp
US8171288B20.710System and method for authenticating users in a computer networkGRANT2012-05-011998-07-0630117687GreatImprivata IncImprivata Inc, National Registry Inc
EP2321761B10.710INVOCATION OF SYSTEM SERVICES THROUGH AUXILIARY INTERFACEGRANT2015-10-142008-08-2241650044GreatYougetitback LtdYougetitback Ltd
US8136148B10.710Reusable authentication experience toolGRANT2012-03-132008-04-0945788034GreatBank of America CorpBank of America Corp
US20060053296A10.709Method for authenticating a user to a service of a service providerAPPLICATION2006-03-092002-05-2429558288GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB, Individual
US6810480B10.709Verification of identity and continued presence of computer usersGRANT2004-10-262002-10-2132174541GreatSprint Communications Co LPT Mobile Innovations LLC
EP2531969A20.709INTEGRATED ADVERTISING SYSTEMGRANT2012-12-122010-02-0144320210GreatJumptap IncJumptap Inc
US8788657B20.709Communication monitoring system and method enabling designating a peerGRANT2014-07-222010-12-0946200533GreatLocation Labs LLCSmith Micro Software LLC
US8266443B20.708Systems and methods for secure and authentic electronic collaborationGRANT2012-09-112006-08-2443826587GreatPrivacyDataSystems LLCBIOCONFIRM LLC, PrivacyDataSystems LLC
US7290288B20.708Method and system for controlling access  by an authentication server  to protected computer resources provided via an internet protocol networkGRANT2007-10-301997-06-1141118015GreatPrism Technologies LLCPrism Technologies LLC
EP1494429B10.708Method for implementing secure corporate communicationGRANT2012-05-092003-06-3033435363GreatNokia IncNokia Inc
EP1677489B10.707A method and an apparatus for providing a switch-over of the same session between the terminals of an end-userGRANT2007-02-072004-12-3035788399GreatLucent Technologies IncNokia of America Corp
EP2224670B10.707Cookie verification methods and apparatus for use in providing application services to communication devicesGRANT2019-03-132009-02-2740647045GreatBlackBerry LtdBlackBerry Ltd
WO2011063827A10.706PERSONAL IDENTITY MANAGEMENT SYSTEM AND METHODAPPLICATION2011-06-032009-11-2442668877Great
EP2321951B10.706SYSTEM FOR ADVERTISING INTEGRATION WITH AUXILIARY INTERFACEGRANT2015-10-142008-08-2241694745GreatYougetitback LtdYougetitback Ltd
EP2016543B10.706AUTHENTICATION FOR A COMMERCIAL TRANSACTION USING A MOBILE MODULEGRANT2021-05-262006-04-1838625335GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2321757B10.704API FOR AUXILIARY INTERFACEGRANT2014-08-132008-08-2241707516GreatYougetitback LtdYougetitback Ltd
EP2508036B10.704UNIVERSAL CALL MANAGEMENT PLATFORMGRANT2019-03-062009-12-0144069291GreatRingCentral IncRing Central Inc
US8782217B10.703Online identity managementGRANT2014-07-152010-11-1051135803GreatSafetyweb IncConsumerinfo com Inc
EP1468540B10.701METHOD AND SYSTEM FOR SECURE HANDLING OF ELECTRONIC BUSINESS TRANSACTIONS ON THE INTERNETGRANT2007-06-132001-12-218179639GreatInternational Business Machines CorpInternational Business Machines Corp
EP1964360B10.701METHOD AND SYSTEM FOR EXTENDING AUTHENTICATION METHODSGRANT2013-05-152005-12-1637909766GreatInternational Business Machines CorpInternational Business Machines Corp
EP2435961A10.701SYSTEMS AND METHODS TO PROCESS TRANSACTIONS BASED ON SOCIAL NETWORKINGGRANT2012-04-042009-05-2743221328GreatBoku IncBoku Inc
EP2321758B10.700DISPLAY OF INFORMATION THROUGH AUXILIARY USER INTERFACEGRANT2016-11-022008-08-2241568391GreatYougetitback LtdYougetitback Ltd
EP1494428B10.699Method and apparatus for implementing secure VPN access via modified certificate stringsGRANT2007-01-172003-06-3033435362GreatNokia IncNokia Inc
US8316233B20.699Systems and methods for accessing secure and certified electronic messagesGRANT2012-11-202006-08-2443732758GreatPrivacyDataSystems LLCPrivacyDataSystems LLC
EP2055077B10.699METHOD AND APPARATUS FOR PROVIDING TRUSTED SINGLE SIGN-ON ACCESS TO APPLICATIONS AND INTERNET-BASED SERVICESGRANT2017-04-052006-08-2238962915GreatInterDigital Technology CorpInterDigital Technology Corp
US8904495B20.698Secure transaction systems and methodsGRANT2014-12-022009-10-0643823942GreatSynaptics IncSynaptics Inc
US7689832B20.697Biometric-based system and method for enabling authentication of electronic messages sent over a networkGRANT2010-03-302000-09-1127398199GreatSentryCom LtdSentryCom Ltd
EP2577468B10.695MANAGING DATA ON COMPUTER AND TELECOMMUNICATIONS NETWORKSGRANT2019-05-222010-05-2845004397GreatPRIVOWNY IncPRIVOWNY Inc
EP1766853B10.694Methods and devices for auditable privacy policiesGRANT2014-07-232004-06-1635481808GreatDormarke Assets LLCCallahan Cellular LLC
US20060021009A10.692Authorization and authentication based on an individual's social networkAPPLICATION2006-01-262004-07-2235004208GreatFriendster IncMeta Platforms Inc, Individual
EP2360922B10.692Disposition of video alerts and integration of a mobile device into a local service domainGRANT2018-07-112010-02-1644123406GreatComcast Cable Communications LLCComcast Cable Communications LLC
US9098844B20.690Mobile electronic walletGRANT2015-08-042007-11-2040642961GreatWells Fargo Bank NAWells Fargo Bank NA
EP1252594A20.689SCHEDULING AND PLANNING BEFORE AND PROACTIVE MANAGEMENT DURING MAINTENANCE AND SERVICE IN A NETWORK-BASED SUPPLY CHAIN ENVIRONMENTGRANT2002-10-301999-11-2227034103GreatAccenture LLPAccenture LLP
EP2586174A10.688IDENTITY VERIFICATIONGRANT2013-05-012010-06-2342582862GreatApplied Neural Technologies LtdARTIFICIAL INTELLIGENCE RESEARCH GROUP LIMITED (AI
EP2282477B10.688Identity management and service access for local user group based on network-resident user profilesGRANT2017-09-062009-07-2943132164GreatComcast Cable Communications LLCComcast Cable Communications LLC
US7552467B20.688Security systems for protecting an assetGRANT2009-06-232006-04-2438620975GreatIndividualIndividual
EP1287458A20.687COLLABORATIVE CAPACITY PLANNING AND REVERSE INVENTORY MANAGEMENT DURING DEMAND AND SUPPLY PLANNING IN A NETWORK-BASED SUPPLY CHAIN ENVIRONMENT AND METHOD THEREOFGRANT2003-03-051999-11-2227034002GreatAccenture LLPAccenture LLP
US20120144468A10.687Systems  Methods  and Computer Program Products for User AuthenticationAPPLICATION2012-06-072010-12-0746163548GreatAT&T Intellectual Property I LPAT&T Intellectual Property I LP
EP1244974A10.685METHOD FOR AFFORDING A MARKET SPACE INTERFACE BETWEEN A PLURALITY OF MANUFACTURERS AND SERVICE PROVIDERS AND INSTALLATION MANAGEMENT VIA A MARKET SPACE INTERFACEGRANT2002-10-021999-11-2227034052GreatAccenture LLPAccenture LLP
US7566002B20.685Identity verification systems and methodsGRANT2009-07-282005-01-0636639233GreatEarly Warning Services LLCEarly Warning Services LLC
EP2197168B10.684Verification method and apparatus for use in providing application services to mobile communication devicesGRANT2012-08-292008-12-0940578426GreatResearch in Motion LtdBlackBerry Ltd
EP1198762B10.684APPARATUS AND METHODS FOR USE OF ACCESS TOKENS IN AN INTERNET DOCUMENT MANAGEMENT SYSTEMGRANT2010-06-021999-04-0726964814GreatMicrosoft CorpMicrosoft Corp
EP2076071B10.683Method for transferring provisioning dataGRANT2015-08-122007-12-2440513858GreatQualcomm IncQualcomm Inc
EP1475938B10.682Web access to secure dataGRANT2008-08-132003-05-0932990557GreatMicrosoft CorpMicrosoft Corp
EP2179532B10.681SYSTEM AND METHOD FOR AUTHENTICATION  DATA TRANSFER  AND PROTECTION AGAINST PHISHINGGRANT2019-07-102007-08-0640341721Great
EP1393169B10.681METHOD AND SYSTEM FOR AUTOMATICALLY CONFIGURING A CLIENT-SERVER NETWORKGRANT2006-11-022001-06-0125360501GreatIntergenixIntergenix
EP1771782B10.681SINGLE SIGN-ON WITH COMMON ACCESS CARDGRANT2009-02-252004-06-2535134118GreatAccenture Global Services GmbHAccenture Global Services GmbH
EP0830774B10.680INTERNET SERVER ACCESS CONTROL AND MONITORING SYSTEMSGRANT2004-10-061995-06-0727044350GreatDivine Tech VenturesDivine Tech Ventures
US6871287B10.680System and method for verification of identityGRANT2005-03-222000-01-2123942445GreatEDENTIFY IncEDENTIFY Inc
WO2012028168A10.679IDENTITY GATEWAYAPPLICATION2012-03-082010-08-3043597789Great
US20100274815A10.679System and method for indexing  correlating  managing  referencing and syndicating identities and relationships across systemsAPPLICATION2010-10-282007-01-3042993051Great
EP3200493A10.679USER AUTHENTICATION MANAGEMENTGRANT2017-08-022008-10-2042109674GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9537853B20.678Sign-on service and client service information exchange interactionsGRANT2017-01-032006-03-3138560511GreatAmazon Technologies IncAmazon Technologies Inc
US9635008B20.678Systems and methods for authenticating an avatarGRANT2017-04-252006-11-1653174668GreatBotanic Technologies IncBotanic Technologies Inc
US20100050233A10.678VERIFICATION ENGINE FOR USER AUTHENTICATIONAPPLICATION2010-02-252000-10-3022922698GreatRaf Technology IncMatthews International Corp
EP2011301B10.676ARRANGEMENT OF AND METHOD FOR SECURE DATA TRANSMISSION.GRANT2011-06-222006-04-1037596208GreatTrust Integration Services BVTrust Integration Services BV
EP2087637B10.676WEB SITE AUTHENTICATIONGRANT2014-04-162006-11-0639361034GreatSymantec International ULCSymantec International ULC
US20130019289A10.675ONLINE SIGNATURE IDENTITY AND VERIFICATION IN COMMUNITYAPPLICATION2013-01-172011-07-1447506977GreatDocusign IncDocusign Inc
EP2700003B10.674KEY MANAGEMENT USING QUASI OUT OF BAND AUTHENTICATION ARCHITECTUREGRANT2020-04-082011-04-1947022187GreatEarly Warning Services LLCPayfone Inc
EP1200940A20.674A SYSTEM AND METHOD FOR SECURE NETWORK PURCHASINGGRANT2002-05-021999-07-3027538275GreatSafewww IncEGI Internet Ltd, Safewww Inc, EGI Internet Ltd
US8776169B20.674Disposable browsers and authentication techniques for a secure online user environmentGRANT2014-07-082010-03-3044711171GreatAuthentic8 IncAuthentic8 Inc
EP2199945A20.674Biometric authentication device and method  computer-readable recording medium recorded with biometric authentication computer program  and computer systemGRANT2010-06-232008-12-1641785901GreatFujitsu LtdFujitsu Ltd
EP2154817B10.673Server certificate issuing systemGRANT2013-09-042007-06-2740185668GreatGlobalSign KKGlobalSign KK
US8359631B20.673Portable identity ratingGRANT2013-01-222010-12-0846200864Great
US7366702B20.672System and method for secure network purchasingGRANT2008-04-291999-07-3046277715GreatiPass InciPass Inc
US20070124226A10.672Method for Verifying Data in a Dating Service  Dating-Service Database including Verified Member Data  and Method for Prioritizing Search Results Including Verified Data  and Methods for Verifying DataAPPLICATION2007-05-312007-02-0838088681GreatGlobal Personals LLCGlobal Personals LLC
EP1259947B10.669METHOD FOR MANAGING A USER ONLINE FINANCIAL TRANSACTIONGRANT2004-10-202000-03-0127392074GreatPassGate CorpPassGate Corp
EP2101276A10.668Data access and user identity verificationGRANT2009-09-162008-03-1040800450GreatAceinc Pty LtdFIXED STARS ENTERPRISES Pty Ltd
US9817963B20.668User-touchscreen interaction analysis authentication systemGRANT2017-11-142006-04-1045698440GreatInternational Business Machines CorpInternational Business Machines Corp
EP0998091B10.668System and method for web server user authenticationGRANT2007-01-311998-08-1922473906GreatComputer Associates Think IncCA Inc
EP1755062B10.667METHODS AND SYSTEMS FOR SECURE USER AUTHENTICATIONGRANT2016-09-282005-07-2937451095GreatCiticorp Credit Services Inc USACiticorp Credit Services Inc USA
EP1719283A20.666METHOD AND APPARATUS FOR AUTHENTICATION OF USERS AND COMMUNICATIONS RECEIVED FROM COMPUTER SYSTEMSGRANT2006-11-082004-02-0436036758GreatPassmark Security IncEMC Corp
EP2507935B10.666SYSTEM AND METHODS FOR IDENTITY ATTRIBUTE VALIDATIONGRANT2020-04-292009-12-0144114578GreatSecurekey Technologies IncSecurekey Technologies Inc
EP2689386B10.666IN-PERSON ONE-TAP PURCHASING APPARATUSES  METHODS AND SYSTEMSGRANT2018-07-112011-03-2546932272GreatVisa International Service AssociationVisa International Service Association
EP2266071B10.665SYSTEM FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICEGRANT2014-11-262008-04-0241132725GreatYougetitback LtdYougetitback Ltd
EP1920380B10.665MASS STORAGE DEVICE WITH AUTOMATED CREDENTIALS LOADINGGRANT2011-02-162005-07-0837432415GreatSanDisk CorpSanDisk Corp
EP1542135B10.664A METHOD WHICH IS ABLE TO CENTRALIZE THE ADMINISTRATION OF THE USER REGISTERED INFORMATION ACROSS NETWORKSGRANT2013-10-092002-08-0531193860GreatTaiguen Technology Shenzhen Co LtdTaiguen Technology Shenzhen Co Ltd
US8528078B20.664System and method for blocking unauthorized network log in using stolen passwordGRANT2013-09-032004-07-1538686469GreatAnakam IncAnakam Inc
EP1971950A20.664COMPUTER SESSION MANAGEMENT DEVICE AND SYSTEMGRANT2008-09-242005-12-2737898750GreatAtomynet IncAtomynet Inc
EP2204033B10.663METHOD AND SYSTEM FOR ENCOURAGING SECURE COMMUNICATIONSGRANT2011-08-172007-10-1540303421GreatPENANGO IncPENANGO Inc
US9652802B10.662Indirect monitoring and reporting of a user's credit dataGRANT2017-05-162010-03-2458670550GreatConsumerinfo com IncConsumerinfo com Inc
EP2684330B10.661METHOD AND SYSTEM FOR GRANTING ACCESS TO A SECURED WEBSITEGRANT2019-12-042011-03-1044115558GreatOrange SAOrange SA
EP1212732B10.661METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONSGRANT2004-01-211999-08-3127495993GreatAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
EP2166697B10.660Method and system for authenticating a user by means of a mobile deviceGRANT2011-09-142008-09-1740332885GreatGMV Soluciones Globales Internet SAGMV Soluciones Globales Internet SA
WO2010151873A10.660SYSTEMS AND METHODS FOR SECURE  AND CERTIFIED ELECTRONIC MESSAGINGAPPLICATION2010-12-292009-06-2643386927Great
US8788836B10.658Method and apparatus for providing identity claim validationGRANT2014-07-222006-12-2251178057GreatSymantec CorpCA Inc
EP2534810B10.658METHOD AND APPARATUS FOR TRUSTED FEDERATED IDENTITYGRANT2014-04-162010-02-0943877206GreatInterDigital Patent Holdings IncInterDigital Patent Holdings Inc
WO2005096117A10.658TRUST TOKENSAPPLICATION2005-10-132004-03-3132247638Great
EP2263186B10.657SYSTEM FOR MONITORING THE UNAUTHORIZED USE OF A DEVICEGRANT2016-07-202008-04-0141066656GreatYougetitback LtdYougetitback Ltd
US7448070B20.657Network fingerprintingGRANT2008-11-042003-10-1734377679GreatMicrosoft CorpMicrosoft Technology Licensing LLC
EP1625690B10.657METHOD AND APPARATUS FOR AUTHENTICATION OF USERS AND WEB SITESGRANT2008-04-092003-05-0933449697GreatRSA Security LLCRSA Security LLC
US8424061B20.656Method  system and program product for authenticating a user seeking to perform an electronic service requestGRANT2013-04-162006-09-1239171315GreatInternational Business Machines CorpKyndryl Inc
US7574733B20.656System and method of using the public switched telephone network in providing authentication or authorization for online transactionGRANT2009-08-111999-12-1526866449GreatAuthentify IncPayfone Inc
US8316237B10.655System and method for secure three-party communicationsGRANT2012-11-202001-03-2343416589GreatFELSHER DAVID P MRRPX Corp
US20080114987A10.655Multiple security access mechanisms for a single identifierAPPLICATION2008-05-152006-10-3138996649GreatMicro Focus Software IncEMC Corp
US20050027983A10.655Integrated verification systemAPPLICATION2005-02-032003-08-0134104528Great
EP1151598B10.654LOCAL AND REMOTE MONITORING USING A STANDARD WEB BROWSERGRANT2018-08-221998-12-173811968GreatPortus Singapore Pte LtdPORTUS SINGAPORE PTE LTD
EP1547298B10.654SYSTEMS AND METHODS FOR SECURE AUTHENTICATION OF ELECTRONIC TRANSACTIONSGRANT2016-12-142002-09-0931982757GreatU S Encode CorpU S Encode Corp
US7941835B20.654Multi-mode credential authorizationGRANT2011-05-102006-01-1338255953GreatAuthenticor Identity Protection Services IncAuthenticor Identity Protection Services Inc
US8175959B20.653System and method for implementing financial transactionGRANT2012-05-082004-11-0836317509GreatCFPH LLCCFPH LLC
US20120331557A10.653Global identity protector E-commerce payment code certified processing systemAPPLICATION2012-12-272011-06-2147363118Great
US7464162B20.653Systems and methods for testing whether access to a resource is authorized based on access informationGRANT2008-12-092000-07-1026911481GreatOracle International CorpOracle International Corp
US7680819B10.652Managing digital identity informationGRANT2010-03-161999-11-1241819595GreatMicro Focus Software IncEMC Corp, Micro Focus Software Inc
US8515847B20.652System and method for password-free access for validated usersGRANT2013-08-202006-10-3151690756GreatMicrofolio Data LLCGula Consulting LLC
EP2266070B10.651SYSTEM FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICEGRANT2015-01-142008-04-0241133722GreatYougetitback LtdYougetitback Ltd
EP2356791B10.650COMMUNICATION SYSTEM AND METHODGRANT2019-07-242008-10-2240097857GreatSkype Ltd IrelandSkype Ltd Ireland
US20100179856A10.650CONDITIONAL INCENTIVE PRESENTATION  TRACKING AND REDEMPTIONAPPLICATION2010-07-152009-01-1442319710GreatYahoo IncYahoo Inc, Excalibur IP LLC
EP2617161B10.649SYSTEM AND METHOD FOR UPDATING A PRINTER LOCATION INFORMATION FIELDGRANT2020-05-272010-09-1745816211GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
US8126882B20.649Credibility of an author of online contentGRANT2012-02-282007-12-1240754474GreatGoogle LLCGoogle LLC
EP1661362B10.649METHOD AND SYSTEM FOR STEPPING UP TO CERTIFICATE-BASED AUTHENTICATION WITHOUT BREAKING AN EXISTING SSL SESSIONGRANT2009-10-212003-07-1734063095GreatInternational Business Machines CorpInternational Business Machines Corp
EP1305745B10.648A TRADING AND AUCTION SYSTEM  AND METHODS FOR THE AUTHENTICATION OF BUYERS AND SELLERS AND FOR THE TRANSMISSION OF TRADING INSTRUCTIONS IN A TRADING AND AUCTION SYSTEMGRANT2007-04-252000-06-2120428832GreatChikka Pte LtdChikka Pte Ltd
EP1254432B10.647SECURE GATEWAY HAVING USER IDENTIFICATION AND PASSWORD AUTHENTICATIONGRANT2011-05-251999-12-1426866352GreatVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US8694401B20.647Systems and methods for using online social footprint for affecting lending performance and credit scoringGRANT2014-04-082011-01-1348780666GreatLenddo LtdLenddo Pte Ltd
US8474017B20.646Identity management and single sign-on in a heterogeneous composite service scenarioGRANT2013-06-252010-07-2345494640GreatVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
EP2401838B10.645SYSTEM AND METHODS FOR ONLINE AUTHENTICATIONGRANT2013-12-112009-02-1942633393GoodSecurekey Technologies IncSecurekey Technologies Inc
US20170272421A10.644SYSTEMS AND METHODS FOR SECURELY MONITORING AN INDIVIDUALAPPLICATION2017-09-212009-09-2143759245GoodConvergence Biometrics LLCHalo Wearables LLC
EP2077013B10.644Apparatus and method for creating service accounts and configuring devicesGRANT2012-10-242006-10-2439259640GoodNokia OyjNokia Oyj
US7908645B20.644System and method for fraud monitoring  detection  and tiered user authenticationGRANT2011-03-152005-04-2937308508GoodOracle International CorpOracle International Corp
US20070256143A10.644Method and apparatus to provide an authoring tool to create content for a secure content serviceAPPLICATION2007-11-012006-04-1338610079GoodVerisign IncMoreover Acquisition Corp
EP2263185B10.642SYSTEM FOR MONITORING THE UNAUTHORIZED USE OF A DEVICEGRANT2017-01-042008-04-0141110443GoodYougetitback LtdYougetitback Ltd
US7431207B10.641System and method for two-step payment transaction authorizationsGRANT2008-10-072005-01-0539797199GoodAmerican Express Travel Related Services Co IncLiberty Peak Ventures LLC
WO2009039223A10.640METHODS AND SYSTEMS FOR MANAGEMENT OF IMAGE-BASED PASSWORD ACCOUNTSAPPLICATION2009-03-262007-09-1740468324Good
EP2314046B10.640CREDENTIAL MANAGEMENT SYSTEM AND METHODGRANT2018-04-182008-08-0641653990GoodVerisign IncNortonLifeLock Inc
EP2385679A10.639Locally stored phishing countermeasureGRANT2011-11-092010-05-0744064203GoodResearch in Motion LtdBlackBerry Ltd
EP2572489B10.639SYSTEM AND METHOD FOR PROTECTING ACCESS TO AUTHENTICATION SYSTEMSGRANT2018-07-042010-05-2044314120GoodVaultive LtdVaultive Ltd
EP1766839A10.639SYSTEM AND METHOD FOR BLOCKING UNAUTHORIZED NETWORK LOG IN USING STOLEN PASSWORDGRANT2007-03-282004-07-1535907694GoodAnakam IncAnakam Inc
WO2007078351A20.637DYNAMIC NETWORK IDENTITY AND POLICY MANAGEMENTAPPLICATION2007-07-122005-12-2238195423Good
US10027714B20.637Secure web container for a secure online user environmentGRANT2018-07-172010-03-3051581630GoodAuthentic8 IncAuthentic8 Inc
US20030070101A10.636Method and apparatus for protecting personal information and for verifying identitiesAPPLICATION2003-04-102001-10-0926952387Good
EP1224631A20.636MACHINE DEPENDENT LOGIN FOR ON-LINE VALUE-BEARING ITEM SYSTEMGRANT2002-07-241999-10-1827496408GoodStamps com IncStamps com Inc
EP1368722B10.635METHOD AND SYSTEM FOR WEB-BASED CROSS-DOMAIN SINGLE-SIGN-ON AUTHENTICATIONGRANT2007-08-152000-11-0924856086GoodIBM Deutschland GmbH, International Business Machines CorpInternational Business Machines Corp
EP2425394A10.634SECURE CUSTOMER SERVICE PROXY PORTALGRANT2012-03-072009-04-2743032510GoodFace It CorpFive9 Inc
US20050005168A10.634Verified personal information databaseAPPLICATION2005-01-062003-03-1133554978GoodInnovatrend IncInnovatrend Inc
US7886000B10.633Aggregation system for social network sitesGRANT2011-02-082006-06-2743532027GoodConfluence Commons IncFingerprint Cards Anacatum IP AB
EP1363424B10.633Authentication method and system encrypting a ticket with an symmetric key  said symmetric key being encrypted with an asymmetric keyGRANT2008-07-022002-05-1529269760GoodMicrosoft CorpMicrosoft Corp
US9594840B20.633System and method for managing information flow between members of an online social networkGRANT2017-03-142004-05-2635426543GoodFacebook IncMeta Platforms Inc
EP1673150B10.633SYSTEM AND METHOD FOR CONTROLLING ACCESS TO A MASSIVELY MULTIPLAYER ON-LINE ROLE-PLAYING GAMEGRANT2012-11-282003-09-1834375522GoodTurbine IncTurbine Inc
EP2095254B10.633OVER-THE-AIR DEVICE KILL PILL AND LOCKGRANT2020-05-062006-11-1539402623GoodQualcomm IncQualcomm Inc
US8671021B20.632Consumption profile for mobile mediaGRANT2014-03-112006-12-1339512157GoodQuickplay Media CoQp Holdings LLC, DirecTV LLC
EP2304636B10.631MOBILE DEVICE ASSISTED SECURE COMPUTER NETWORK COMMUNICATIONSGRANT2018-08-012008-05-1641317274GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20070101400A10.631Method of providing secure access to computer resourcesAPPLICATION2007-05-032005-10-3137998167GoodOvercow CorpOvercow Corp
EP2021954B10.630A METHOD OF PROVIDING DIGITAL RIGHTS MANAGEMENT FOR MUSIC CONTENT BY MEANS OF A FLAT-RATE SUBSCRIPTIONGRANT2018-06-272006-05-0537899084GoodOmnifone LtdOmnifone Ltd
EP1980047B10.630ONLINE DATA ENCRYPTION AND DECRYPTIONGRANT2016-10-192006-01-2538309822GoodOracle International CorpOracle International Corp
EP1902581B10.630SYSTEM AND METHOD FOR PROVIDING MOBILE DEVICE SERVICES USING SMS COMMUNICATIONSGRANT2015-06-242005-07-1341571852GoodGrape Technology Group IncGrape Technology Group Inc
US7853984B20.630Methods and systems for authenticationGRANT2010-12-142002-12-1132600093GoodAuthorize Net LLCAuthorize Net LLC
EP2553894A10.629CERTIFICATE AUTHORITYGRANT2013-02-062010-04-0143416418GoodNokia Siemens Networks OyNokia Solutions and Networks Oy
EP1311930B10.629System and method for authenticating a user to a web serverGRANT2010-04-212000-08-0422834356GoodComputer Associates Think IncCA Inc
EP1697818B10.628AUTHENTICATION SYSTEM FOR NETWORKED COMPUTER APPLICATIONSGRANT2018-05-302003-12-2334738680GoodWells Fargo Bank NAWells Fargo Bank NA
US8881227B20.628Secure web container for a secure online user environmentGRANT2014-11-042010-03-3049757230GoodAuthentic8 IncAuthentic8 Inc
US10135831B20.627System and method for combining an access control system with a traffic management systemGRANT2018-11-202011-01-2846578535GoodF5 Networks IncF5 Inc
US20080072294A10.627System and method for authenticating users of online servicesAPPLICATION2008-03-202006-09-1439190198GoodEmbarq Holdings Co LLCCenturyLink Intellectual Property LLC
EP0960500B10.627METHOD FOR PROVIDING SECURE REMOTE COMMAND EXECUTIONGRANT2006-08-021997-02-1225175817GoodVerizon Laboratories IncVerizon Laboratories Inc
US7895332B20.627Identity migration system apparatus and methodGRANT2011-02-222006-10-3039331712GoodQuest Software IncQuest Software Inc
EP2622889A10.626USER ACCOUNT RECOVERYGRANT2013-08-072010-09-2745891774GoodNokia Siemens Networks OyNokia Solutions and Networks Oy
EP2529301B10.626A NEW METHOD FOR SECURE USER AND TRANSACTION AUTHENTICATION AND RISK MANAGEMENTGRANT2017-04-262010-01-2744309993GoodEarly Warning Services LLCEarly Warning Services LLC
EP2533172B10.625Secure access to data in a deviceGRANT2019-05-012011-06-0646514084GoodKobil Systems GmbHKobil GmbH
US20080288299A10.625SYSTEM AND METHOD FOR USER IDENTITY VALIDATION FOR ONLINE TRANSACTIONSAPPLICATION2008-11-202006-10-3141199378GoodGenMobi Tech IncGula Consulting LLC
US20030126437A10.625ABDS Method and Verification Status for Authenticating Entity AccessAPPLICATION2003-07-032000-08-0422834916GoodFirst Data CorpGraphic Packaging International LLC, First Data Corp
US7086085B10.624Variable trust levels for authenticationGRANT2006-08-012000-04-1136710706GoodiLumin CorpiLumin Corp
EP2564308B10.624SECURE AND EFFICIENT LOGIN AND TRANSACTION AUTHENTICATION USING IPHONES AND OTHER SMART MOBILE COMMUNICATION DEVICESGRANT2021-01-132010-04-2644816912GoodPayfone IncPayfone Inc
WO2001060012A20.624WEB BASED HUMAN SERVICES CONFERENCING NETWORKAPPLICATION2001-08-162000-02-1127539060Good
EP2586175B10.623METHOD AND DEVICE FOR VERIFYING PHYSICAL RECOGNITION BETWEEN A CALLER AND A CALLED PARTYGRANT2014-04-092010-06-2843063310GoodSigma MediterraneeSigma Mediterranee
EP1177666B10.623A DISTRIBUTED SYSTEM TO INTELLIGENTLY ESTABLISH SESSIONS BETWEEN ANONYMOUS USERS OVER VARIOUS NETWORKSGRANT2009-12-161999-05-1022458440GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US7350229B10.622Authentication and authorization mapping for a computer networkGRANT2008-03-252001-03-0739199362GoodNetegrity LLCCA Inc
EP1723600A20.622METHOD  SYSTEM AND COMPUTER READABLE MEDIUM FOR WEB SITE ACCOUNT AND E-COMMERCE MANAGEMENT FROM A CENTRAL LOCATIONGRANT2006-11-222004-02-2635056638GoodPassGate CorpPassGate Corp
EP1244270B10.621Method for generating an authentic electronic certificateGRANT2006-05-312001-03-227678640GoodDeutsche Telekom AGDeutsche Telekom AG
EP1634133B10.620AN ARRANGEMENT AND A METHOD RELATING TO IP NETWORK ACCESSGRANT2008-05-072003-06-1833550566GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US20200013492A10.619MULTI-SERVICES APPLICATION GATEWAY AND SYSTEM EMPLOYING THE SAMEAPPLICATION2020-01-092006-12-2954702091GoodKIP Prod P1 LPKIP Prod P1 LP
EP2384483A10.618SERVICE ACCESS CONTROLGRANT2011-11-092008-12-3040555819GoodNokia Siemens Networks OyNokia Solutions and Networks Oy
US7013290B20.617Personalized interactive digital catalog profilingGRANT2006-03-142001-08-0323200287GoodHaven Networks IncIntentionize LLC, Individual
US8219689B20.617System and method for expert service providers to provide one on one chat advice services through unique empowered independent agents to consumersGRANT2012-07-102004-09-2436126956Good
US8744956B10.617Systems and methods for permission arbitrated transaction servicesGRANT2014-06-032010-07-0150781374GoodExperian Information Solutions LLCExperian Information Solutions LLC
US5897616A0.616Apparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic models and databasesGRANT1999-04-271997-06-1125358125GoodInternational Business Machines CorpInternational Business Machines Corp
US20070094152A10.616Secure electronic transaction authentication enhanced with RFIDAPPLICATION2007-04-262005-10-2037986449GoodInternational Business Machines CorpInternational Business Machines Corp
EP0782805B10.616PERSONAL COMMUNICATIONS INTERNETWORKINGGRANT2006-11-021994-09-1923197780GoodAccess Co LtdAccess Co Ltd
US8769304B20.616Method and system for fully encrypted repositoryGRANT2014-07-012011-06-1647354466GoodOneID IncNeustar Inc
US20070245158A10.615SINGLE STEP TRANSACTION AUTHENTICATION USING PROXIMITY AND BIOMETRIC INPUTAPPLICATION2007-10-182005-11-3038694426GoodProxense LLCProxense LLC
US11210674B20.615Method  device  and system of detecting mule accounts and accounts used for money launderingGRANT2021-12-282010-11-2979025375GoodBioCatch LtdBioCatch Ltd
EP2224665B10.614Authentication using a wireless mobile communication deviceGRANT2015-04-082009-02-2640758988GoodBlackBerry LtdBlackBerry Ltd
US9438733B20.614Methods and systems for data transfer and campaign managementGRANT2016-09-062008-09-0856112374GoodInvoca IncInvoca Inc
US20050125686A10.613Method and system for preventing identity theft in electronic communicationsAPPLICATION2005-06-092003-12-0534633929GoodElectronic Data Systems LLCHewlett Packard Enterprise Development LP
US10586036B20.613System  device  and method of recovery and resetting of user authentication factorGRANT2020-03-102010-11-2966170636GoodBioCatch LtdBioCatch Ltd
US20110209196A10.612FLEXIBLE SECURITY REQUIREMENTS IN AN ENTERPRISE NETWORKAPPLICATION2011-08-252010-02-2244477577GoodAvaya IncAvaya Inc
EP1661024B10.612METHOD AND SYSTEM FOR PROVIDING CONFERENCING SERVICESGRANT2012-07-182003-08-0534193136GoodVerizon Patent and Licensing IncOL Security LLC
US9171322B20.612Methods and systems for routing calls in a marketing campaignGRANT2015-10-272008-09-0853679473GoodInvoca IncInvoca Inc
EP2364043B10.611Methods and devices for transmitting and receiving data used to activate a device to operate with a serverGRANT2016-04-202010-02-2642320302GoodBlackBerry LtdBlackBerry Ltd
US9292861B20.611Methods and systems for routing callsGRANT2016-03-222008-09-0854931014GoodInvoca IncInvoca Inc
US7526485B20.611Privacy and security method and system for a world-wide-web siteGRANT2009-04-281999-12-2123862426GoodAlere Health Systems IncPronounced Health Solutions Inc
US20060026669A10.611System and method of characterizing and managing electronic trafficAPPLICATION2006-02-022004-07-2936060469GoodINTELLI7INTELLI7
EP1145526A20.610REMOTE PHYSICIAN AUTHENTICATION SERVICEGRANT2001-10-171998-11-0326804081GoodPhysician Verification Services IncDUBNER Robert, Physician Verification Services Inc, DUBNER Robert
US20060184997A10.610Control for inviting an unauthenticated user to gain access to display of content that is otherwise accessible with an authentication mechanismAPPLICATION2006-08-172004-01-2934831206GoodYahoo IncYahoo Inc, Slack Technologies LLC
US8917860B20.609Methods and systems for processing and managing communicationsGRANT2014-12-232008-09-0851728999GoodInvoca IncInvoca Inc
US9036808B20.609Methods and systems for data transfer and campaign managementGRANT2015-05-192008-09-0852625631GoodInvoca IncInvoca Inc
EP1759521B10.607ADVANCED CONTACT IDENTIFICATION SYSTEMGRANT2016-06-292004-05-1235428748GoodSynchronoss Technologies IncSynchronoss Technologies Inc
US20080005578A10.607System and method for traceless biometric identificationAPPLICATION2008-01-032006-06-2938543695GoodInnovya Research and Development LtdInnovya Research and Development Ltd
US8818049B20.606Retrieving contact information based on image recognition searchesGRANT2014-08-262011-05-1847174947GoodGoogle LLCGoogle LLC
US20060042483A10.606Method and system for reputation evaluation of online users in a social networking schemeAPPLICATION2006-03-022004-09-0235941200GoodLinkedIn CorpMicrosoft Technology Licensing LLC
EP1702455B10.606SECURE MULTIMEDIA TRANSFER SYSTEMGRANT2017-01-182003-12-1834710530GoodTivo Solutions IncTivo Solutions Inc
EP1188138A10.605A COMMUNICATIONS NETWORK ACCESS METHOD AND SYSTEMGRANT2002-03-201999-05-0625646048GoodSharinga Networks IncSharinga Networks Inc
US8078515B20.605Systems and methods for facilitating electronic transactions and deterring fraudGRANT2011-12-132007-05-0439940235Good
US20080091591A10.605Methods and systems for opening and funding a financial account onlineAPPLICATION2008-04-172006-04-2838656232GoodEfunds CorpFidelity Information Services LLC
US7908647B10.604Aggregation systemGRANT2011-03-152006-06-2743708244GoodConfluence Commons IncFingerprint Cards Anacatum IP AB
EP2012229B10.603Mobile provisioning tool systemGRANT2017-08-162003-10-0734314107GoodAccenture Global Services LtdAccenture Global Services Ltd
US8996654B20.603Aggregator with managed contentGRANT2015-03-312006-06-2748086751GoodFingerprint Cards ABFingerprint Cards Anacatum IP AB
US7673327B10.602Aggregation systemGRANT2010-03-022006-06-2741717769GoodConfluence Commons IncFingerprint Cards Anacatum IP AB
US20010026632A10.602Apparatus for identity verification  a system for identity verification  a card for identity verification and a method for identity verification  based on identification by biometricsAPPLICATION2001-10-042000-03-2418601516GoodMatsushita Electric Industrial Co LtdPanasonic Holdings Corp, Individual
EP1356622B10.602DIGITAL CONTENT DISTRIBUTION AND SUBSCRIPTION SYSTEMGRANT2012-04-042000-11-1022935133GoodAOL Musicnow LLCOath Inc
EP2705642B10.601SYSTEM AND METHOD FOR PROVIDING ACCESS CREDENTIALSGRANT2017-04-262011-05-0546052924GoodGood Technology Holdings LtdBlackBerry Ltd
WO2011038752A10.601AUTHENTICATION GATEWAYAPPLICATION2011-04-072009-09-2942352253Good
EP2414983B10.600Secure Data SystemGRANT2018-01-172009-04-0340784731GoodDigidentity BVDigidentity BV
EP2716024B10.599SYSTEMS AND METHODS FOR REGISTRATION  VALIDATION  AND MONITORING OF USERS OVER MULTIPLE WEBSITESGRANT2018-09-192011-06-0346331682GoodUC Group LtdUC Group Ltd
EP1716468A10.598SYSTEM AND METHOD FOR PREVENTING IDENTITY THEFT USING A SECURE COMPUTING DEVICE.GRANT2006-11-022003-11-1334594985GoodAxalto SAThales DIS France SA
US10776476B20.598System  device  and method of visual loginGRANT2020-09-152010-11-2963916159GoodBioCatch LtdBioCatch Ltd
US8161530B20.598Behaviormetrics application system for electronic transaction authorizationGRANT2012-04-172006-07-1138923920GoodIdentity Metrics IncAGENT SCIENCE TECHNOLOGIES Inc, Identity Metrics Inc
EP1346510B10.598A MESSAGING SYSTEM INVOLVING WIRELESS COMMUNICATIONS AND METHOD THEREFORGRANT2007-05-162000-12-0826665224GoodChikka Pte LtdChikka Pte Ltd
US20120226701A10.597User Validation In A Social NetworkAPPLICATION2012-09-062011-03-0446753951Good
EP2180706B10.596Method of sharing personal media using a digital recorderGRANT2017-03-152003-12-1842046338GoodTivo Solutions IncTivo Solutions Inc
EP2449741A10.596SYSTEM FOR PROTECTING PERSONAL DATAGRANT2012-05-092009-06-3042651047GoodNokia Siemens Networks OyNokia Solutions and Networks Oy
WO2009076555A20.596USER-CREATED CONTENT AGGREGATION AND SHARINGAPPLICATION2009-06-182007-12-1240756125Good
EP2625820B10.595PRIVATE DATA SHARING SYSTEMGRANT2021-06-022010-10-0866951608GoodIndividualMOFFAT, BRIAN LEE
EP2384573A10.595USER-DEPENDENT CONTENT DELIVERYGRANT2011-11-092008-12-3041226729GoodNokia Siemens Networks OyNokia Solutions and Networks Oy
US20120204239A10.594TERMINAL MANAGEMENT SYSTEM AND TERMINAL MANAGEMENT METHODAPPLICATION2012-08-092009-10-1943899899Good
EP1523152B10.594Connector gatewayGRANT2016-04-132003-10-0734314110GoodAccenture Global Services LtdAccenture Global Services Ltd
EP1616263B10.593METHOD AND SYSTEM FOR PROVIDING SECURE ACCESS TO PRIVATE NETWORKS WITH CLIENT REDIRECTIONGRANT2018-08-222003-04-0833298314GoodPulse Secure LLCPulse Secure LLC
EP2381385B10.592Method and system for third party client authenticationGRANT2013-08-282010-04-2643480836GoodResearch in Motion LtdBlackBerry Ltd
US7013001B10.592Method of billing a communication session conducted over a computer networkGRANT2006-03-141996-06-0535998853GoodFraud Control Systems com CorpFraud Control Systems com Corp, Credit Card Fraud Control Corp
US8767946B10.592Methods and systems for processing and managing communicationsGRANT2014-07-012008-09-0850931989GoodInvoca IncInvoca Inc
US9569678B20.591Method and system to authenticate an objectGRANT2017-02-142004-08-2036142948GoodMorphoTrust USA LLCIdemia Identity and Security USA LLC
US20080127305A10.591AUTHENTICATION QUERY STRATEGIZER AND RESULTS COMPILERAPPLICATION2008-05-292002-05-2929712055GoodRaf Technology IncMatthews International Corp
US8931058B20.591Systems and methods for permission arbitrated transaction servicesGRANT2015-01-062010-07-0145467910GoodExperian Information Solutions LLCExperian Information Solutions LLC
US8781105B10.591Methods and systems for processing and managing communicationsGRANT2014-07-152008-09-0851135722GoodInvoca IncInvoca Inc
EP2282472B10.589System and method for exchanging key generation parameters for secure communicationsGRANT2018-05-232009-07-1541429437GoodBlackBerry LtdBlackBerry Ltd
EP1766848A10.589METHOD  SYSTEM AND COMPUTER PROGRAM FOR PROTECTING USER CREDENTIALS AGAINST SECURITY ATTACKSGRANT2007-03-282004-06-2135510092GoodEchoworx CorpEchoworx Corp
US20110238755A10.589PROXIMITY-BASED SOCIAL NETWORKINGAPPLICATION2011-09-292010-03-2444657583GoodPROXIMATE GLOBAL IncPROXIMATE GLOBAL Inc
US9021254B20.588Multi-platform user device malicious website protection systemGRANT2015-04-282007-07-2750976358GoodWhite Sky IncAura Sub LLC
US20060191995A10.588Secure transaction systemAPPLICATION2006-08-312005-02-0136777818GoodSource IncSource Inc
US7437752B20.588Client architecture for portable device with security policiesGRANT2008-10-142002-09-2337110108GoodCredant Technologies IncDell Marketing LP
EP2281261A10.588ENCRYPTED BANNER OVERLAYSGRANT2011-02-092008-05-1141119941GoodIspforce LtdIspforce Ltd
US11301855B20.586Data verification in transactions in distributed networkGRANT2022-04-122009-07-0743429530GoodVisa International Service AssociationVisa International Service Association
US7016960B20.586Authenticating user access to a network server without communicating user authentication cookie to the network serverGRANT2006-03-211999-07-0823373238GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP2425646B10.585NETWORK ACCESS NODESGRANT2018-03-142009-05-1840834159GoodSkype Ltd IrelandSkype Ltd Ireland
EP2134063B10.585Methods and apparatus for use in facilitating access to a communication service via WLAN hotspotGRANT2013-10-022008-05-1241059920GoodBlackBerry LtdBlackBerry Ltd
US6983061B20.582Personal authentication system and method using biometrics information  and registering apparatus  authenticating apparatus and pattern information input medium for the systemGRANT2006-01-032000-04-2718637474GoodFujitsu LtdFujitsu Ltd
US6931382B20.582Payment instrument authorization techniqueGRANT2005-08-162001-01-2426950069GoodCDCK CorpEVANGELISTA (LAAGE) MARIA THERESA, Kioba Processing LLC, LAAGE MARIA THERESA, LAAGE MARIA THERESA MRS, LAAGE MARIA THERESA, LAAGE MARIA THERESA MRS
US7757943B20.582Combined payment/access-control instrumentGRANT2010-07-202006-08-2939136780GoodMetavante CorpMetavante Corp, Fidelity Information Services LLC
EP1442580B10.581METHOD AND SYSTEM FOR PROVIDING SECURE ACCESS TO RESOURCES ON PRIVATE NETWORKSGRANT2017-05-312001-11-0227369863GoodJuniper Networks IncJuniper Networks Inc
EP1488319B10.581SYSTEMS AND METHODS FOR HANDLING A PLURALITY OF COMMUNICATIONSGRANT2016-10-192002-03-1828457771GoodOracle International CorpOracle International Corp
EP1183583A10.581SYSTEM AND METHOD FOR PROVIDING USER AUTHENTICATION AND IDENTITY MANAGEMENTGRANT2002-03-061999-04-2210851986GoodVisage Development LtdVisage Development Ltd
US11223619B20.579Device  system  and method of user authentication based on user-specific characteristics of task performanceGRANT2022-01-112010-11-2969229245GoodBioCatch LtdBioCatch Ltd
US20100306076A10.577Trusted Integrity Manager (TIM)APPLICATION2010-12-022009-05-2943221312GoodeBay IncPayPal Inc
US8364605B20.575Calculating connectivity  social proximity and trust level between web userGRANT2013-01-292008-07-1341505950GoodTros Interactive LtdTros Interactive Ltd
US20050171954A10.574Selective electronic messaging within an online social network for SPAM detectionAPPLICATION2005-08-042004-01-2934812088GoodYahoo IncOath Inc
US10949514B20.573Device  system  and method of differentiating among users based on detection of hardware componentsGRANT2021-03-162010-11-2959226478GoodBioCatch LtdBioCatch Ltd
US10474815B20.573System  device  and method of detecting malicious automatic script and code injectionGRANT2019-11-122010-11-2958407317GoodBioCatch LtdBioCatch Ltd
US6226752B10.573Method and apparatus for authenticating usersGRANT2001-05-011999-05-1123197812GoodSun Microsystems IncOracle America Inc
EP1157344B10.572PROXY SERVER AUGMENTING A CLIENT REQUEST WITH USER PROFILE DATAGRANT2002-11-201999-02-2622979704GoodAmerica Online IncOath Inc
EP1806902A10.571Method and login server for providing a user with a centralised login procedureGRANT2007-07-112006-01-1036513083GoodAlcatel Lucent SASAlcatel Lucent SAS
US8755511B20.571Methods and systems for processing and managing telephonic communicationsGRANT2014-06-172008-09-0850148850GoodInvoca IncInvoca Inc
US20050097320A10.570System and method for risk based authenticationAPPLICATION2005-05-052003-09-1234312372GoodCyota IncEMC Corp, Cyota Inc
US9690915B20.570Device  method  and system of detecting remote access users and differentiating among usersGRANT2017-06-272010-11-2954335048GoodBioCatch LtdBioCatch Ltd
EP1122926B10.570Messaging between terminals in different communitiesGRANT2010-05-191999-12-0323805661GoodNortel Networks LtdNortel Networks Ltd
US20200008060A10.570SYSTEM AND METHOD FOR MOBILE IDENTITY PROTECTION FOR ONLINE USER AUTHENTICATIONAPPLICATION2020-01-022007-03-1640939900GoodVisa International Service AssociationVisa International Service Association
US9373149B20.569Autonomous neighborhood vehicle commerce network and communityGRANT2016-06-212006-03-1750682676GoodFatdoor IncFatdoor Inc
US8533857B20.568Methods for providing cross-vendor support servicesGRANT2013-09-102011-04-1246025930GoodTeletech Holdings IncTeletech Holdings Inc
US20110225045A10.568Paperless Coupon Transactions SystemAPPLICATION2011-09-152009-03-3044560835Good
US6249873B10.567Method of and apparatus for providing secure distributed directory services and public key infrastructureGRANT2001-06-191997-02-2825199919GoodXcert Software IncXcert Software Inc, EMC Corp
US10395018B20.567System  method  and device of detecting identity of a user and authenticating a userGRANT2019-08-272010-11-2957883686GoodBioCatch LtdBioCatch Ltd
EP1369801B10.566An information management systemGRANT2007-11-072000-11-089902787GoodOrchestria LtdOrchestria Ltd
US20070284436A10.565Credit card payment systemAPPLICATION2007-12-132006-06-0738820902GoodFEARLESS INTERNET Ltd OyFEARLESS INTERNET Ltd Oy
US6175831B10.565Method and apparatus for constructing a networking database and systemGRANT2001-01-161997-01-1725135887Goodsix degrees IncDEGREES OF CONNECTION LLC, MACROVIEW COMMUNICATIONS CORP, six degrees Inc
US9118666B20.564Computing device integrity verificationGRANT2015-08-252010-06-3053522345GoodGoogle LLCGoogle LLC
US9607336B10.563Providing credit inquiry alertsGRANT2017-03-282011-06-1658360384GoodConsumerinfo com IncConsumerinfo com Inc
US10298614B20.563System  device  and method of generating and managing behavioral biometric cookiesGRANT2019-05-212010-11-2961010659GoodBioCatch LtdBioCatch Ltd
EP1015986A10.562INTEGRATED CUSTOMER INTERFACE FOR WEB BASED COMMUNICATIONS NETWORK MANAGEMENTGRANT2000-07-051997-09-2622030944GoodTusa MichaelBarry B Reilly, CHODORONEK, MARK A., DEROSE, ERIC, Gonzales Mark N, JAMES, ANGELA R., Levy Lynne, Tusa Michael, Barry B Reilly, Chodoronek Mark A, Derose Eric, Gonzales Mark N, James Angela R, Levy Lynne
US20090150320A10.561MULTI-MODULE AUTHENTICATION PLATFORMAPPLICATION2009-06-112007-12-0640718051GoodFirst Data CorpFirst Data Corp
US8087075B20.561Disconnected credential validation using pre-fetched service ticketsGRANT2011-12-272006-02-1338370292GoodQuest Software IncQuest Software Inc
US6609198B10.561Log-on service providing credential level change without loss of session continuityGRANT2003-08-191999-08-0523451537GoodSun Microsystems IncOracle America Inc
US20090241175A10.561METHODS AND SYSTEMS FOR USER AUTHENTICATIONAPPLICATION2009-09-242008-03-2041090190Good
US7213032B20.561System and method for anonymous transaction in a data network and classification of individuals without knowing their real identityGRANT2007-05-012000-07-0622807272GoodProtigen IncResource Consortium Ltd
US20110239276A10.561METHOD AND SYSTEM FOR CONTROLLING CONTEXT-BASED WIRELESS ACCESS TO SECURED NETWORK RESOURCESAPPLICATION2011-09-292008-10-2242082774GoodTelefonica SATelefonica SA
EP2348423B10.560USER TERMINAL CAPABLE OF PROCESSING GEOGRAPHICAL LOCATION DATAGRANT2018-05-092000-08-259898369GoodQualcomm IncQualcomm Inc
US20060224898A10.560System and method for determining a computer user profile from a motion-based input deviceAPPLICATION2006-10-052003-05-0233310267GoodVICTORIA INNOVATION AND DEVELOPMENT Corp UNIVERSITY OFPlurilock Security Solutions Inc
EP2165499B10.560A METHOD OF PREVENTING WEB BROWSER EXTENSIONS FROM HIJACKING USER INFORMATIONGRANT2013-01-302007-06-2239864887GoodGemalto SAThales DIS France SA
US20060133651A10.559Recoverable biometric identity system and methodAPPLICATION2006-06-222002-12-3136595804Good
EP2137939B10.559NETWORK SECURITY METHODGRANT2015-05-062007-03-2338024735GoodIP Marketing LtdIP Marketing Ltd
EP1484894B10.558Method and system for connecting a remote client to a local client desktop via an Intranet serverGRANT2006-08-022003-06-0633159580GoodMicrosoft CorpMicrosoft Corp
US10917431B20.558System  method  and device of authenticating a user based on selfie image or selfie videoGRANT2021-02-092010-11-2968385589GoodBioCatch LtdBioCatch Ltd
US20080091684A10.558INTERNET-BASED BIBLIOGRAPHIC DATABASE AND DISCUSSION FORUMAPPLICATION2008-04-172006-10-1639304241GoodJOURNALREVIEW LLCJOURNALREVIEW LLC
EP1391105A10.557AUDIO CONFERENCING SYSTEM AND METHODGRANT2004-02-252001-04-3023102929GoodOctave Communications IncPolycom Inc
EP1997270B10.556METHOD AND SYSTEM FOR AUTHENTICATING A USERGRANT2014-12-032006-03-0938475164GoodVasco Data Security International GmbHOnespan International GmbH
US20060143084A10.555Software and method for advertisor sponsored events within a private centrally managed local or distributed network of users and an optional associated private network card for specialty marketing identification or bankingAPPLICATION2006-06-292004-12-2836612939GoodBoloto IncBoloto Inc
US8195549B20.555Systems and methods of on-line credit information monitoring and controlGRANT2012-06-052002-09-2142669722GoodConsumerinfo com IncConsumerinfo com Inc, ConsumerInfo com
US7478078B20.554Method for sharing relationship information stored in a social network database with third party databasesGRANT2009-01-132004-06-1435515261GoodFriendster IncMeta Platforms Inc
US20060282270A10.554Identity verification noise filter systems and methodsAPPLICATION2006-12-142005-06-0937525145GoodEarly Warning Services LLCEarly Warning Services LLC
US8780383B20.554Authenticated facsimile transmission from mobile devicesGRANT2014-07-152008-11-2542195963GoodRingCentral IncRingCentral Inc
US20100082354A10.554USER DEFINITION AND IDENTIFICATIONAPPLICATION2010-04-012008-09-2942058398GoodeBay InceBay Inc, Individual
US20090024506A10.554CELLPHONE ACTIVATED ATM TRANSACTIONSAPPLICATION2009-01-222007-07-1840260185GoodCidway Technologies LtdCidway Technologies Ltd
WO2009065154A20.552METHOD OF AND APPARATUS FOR PROTECTING PRIVATE DATA ENTRY WITHIN SECURE WEB SESSIONSAPPLICATION2009-05-222007-11-1240565117Good
US9953337B20.552System and method for tracking and rewarding users and enhancing user experiencesGRANT2018-04-242007-01-0839595186Good
US20080255977A10.551Systems and Methods to Facilitate Searches via Social NetworkAPPLICATION2008-10-162007-04-1039854624GoodUTBK IncUTBK Inc
US20080091681A10.551ARCHITECTURE FOR UNIFIED THREAT MANAGEMENTAPPLICATION2008-04-172006-10-1239325241GoodHoneywell International IncHoneywell International Inc
EP2404428B10.551A SYSTEM AND METHOD FOR PROVIDING SECURITY IN BROWSER-BASED ACCESS TO SMART CARDSGRANT2017-11-152009-03-0642710055GoodGemalto SAThales DIS France SA
US8577016B10.550Methods and systems for processing and managing telephonic communications using ring poolsGRANT2013-11-052008-09-0849487905GoodRingRevenue IncInvoca Inc
US20060004892A10.549Visual tags for search results generated from social network informationAPPLICATION2006-01-052004-06-1446321656GoodFriendster IncMeta Platforms Inc, Individual
US20040254891A10.547Method and system for restricting the usage of payment accountsAPPLICATION2004-12-162000-09-2833490976GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20050197846A10.546Method and system for generating a proximity index in a social networking environmentAPPLICATION2005-09-082004-03-0434912002GoodPezaris Design IncMULTIPLY Inc
US20050165797A10.546Profile verification systemAPPLICATION2005-07-282004-01-1634794779Good
US8892690B20.546System and method for managing account of instant messengerGRANT2014-11-182006-03-1038509047GoodTencent Technology Shenzhen Co LtdTencent Technology Shenzhen Co Ltd
US8219558B10.546Methods and systems for inventory managementGRANT2012-07-102008-04-2546396014Good
US20050172116A10.546Techniques for dynamically establishing and managing trust relationshipsAPPLICATION2005-08-042004-02-0334679349GoodMicro Focus Software IncOracle International Corp
EP1299862A10.544WEB-ENABLED VALUE BEARING ITEM PRINTINGGRANT2003-04-092000-07-1323077770GoodStamps com IncStamps com Inc
US20060219776A10.544RFID READER WITH MULTIPLE INTERFACESAPPLICATION2006-10-052003-11-1737069117GoodDPD Patent TrustDPD Patent Trust, DPD Patent Trust Ltd
US20060242554A10.544User-driven media system in a computer networkAPPLICATION2006-10-262005-04-2537525194GoodGather IncRakuten Group Inc
EP1423796A10.543HYBRID SYSTEM ARCHITECTURE FOR SECURE PEER-TO-PEER-COMMUNICATIONGRANT2004-06-022001-08-0927575378GoodGigamedia Access CorpGigamedia Access Corp
US20060288234A10.543System and method for providing secure access to an electronic device using facial biometricsAPPLICATION2006-12-212005-06-1637574755GoodSENSIBLE VISION IncSENSIBLE VISION Inc
US7392388B20.542Systems and methods for identity verification for secure transactionsGRANT2008-06-242000-09-0727255877GoodSwivel Secure LtdSWIVEL TECHNOLOGIES Ltd, Swivel Secure Ltd
US20110270761A10.542METHODS AND APPARATUS FOR A FINANCIAL DOCUMENT CLEARINGHOUSE AND SECURE DELIVERY NETWORKAPPLICATION2011-11-032010-04-3044859067GoodTOBSC IncT-CENTRAL Inc, TOBSC Inc
US7577987B20.541Operation modes for user authentication system based on random partial pattern recognitionGRANT2009-08-182002-12-2332599683GoodAuthernative IncAuthernative Inc
EP2347559A10.540SERVICE ACCESS CONTROLGRANT2011-07-272008-11-0441009841GoodNokia Siemens Networks OyNokia Solutions and Networks Oy
US9037700B20.540Predictive placement of content through network analysisGRANT2015-05-192011-04-2947068837GoodInternational Business Machines CorpInternational Business Machines Corp
US8583746B10.540Methods and systems for web and call processingGRANT2013-11-122007-05-2549518164GoodCallwave Communications LLCCallwave Communications LLC, FuzeBox Software Corp
US20080228598A10.539Providing marketplace functionality in a business directory and/or social-network siteAPPLICATION2008-09-182007-03-0639763616GoodLEFF TECHNOLOGY HOLDINGS LLCLEFF TECHNOLOGY HOLDINGS LLC
US20070055871A10.539Method and system for authenticating a userAPPLICATION2007-03-082003-09-3029287123GoodBritish Telecommunications PLCBritish Telecommunications PLC
US20070061254A10.539Systems and methods for opening  funding  and managing financial accountsAPPLICATION2007-03-152005-09-1537856474GoodWashington Mutual IncJPMorgan Chase Bank NA
US7874005B20.539System and method for non-law enforcement entities to conduct checks using law enforcement restricted databasesGRANT2011-01-182006-04-1138576560GoodGold Type Business MachinesGTBM Inc, Gold Type Business Machines
US20090171723A10.539SYSTEMS AND METHODS FOR ELECTRONIC ACCOUNT CERTIFICATION AND ENHANCED CREDIT REPORTINGAPPLICATION2009-07-022007-12-2640799596GoodFormfree Holdings CorpFormfree Holdings Corp
US20100280955A10.539SYSTEMS AND METHODS FOR VERIFYING IDENTITYAPPLICATION2010-11-042009-04-3043031124GoodGeneral Electric CoGeneral Electric Co, GE Trading and Licensing
US20110004526A10.538PORTABLE CONSUMER DEVICE VERIFICATION SYSTEMAPPLICATION2011-01-062006-06-1938834262Good
US8364713B20.538Personal data manager systems and methodsGRANT2013-01-292009-01-2042337770GoodTitanium Fire LtdTITANIUM FIRE Ltd EXECUTIVE PENSION SCHEME
US9319390B20.538Method and apparatus for providing a trust level to access a resourceGRANT2016-04-192010-03-2644672451GoodNokia Technologies OyNokia Technologies Oy
EP1695176B10.538UPLOAD SECURITY SCHEMEGRANT2014-05-212003-11-1034557820GoodYahoo IncYahoo Inc
EP1657871B10.538Integrated electronic mail and instant messaging applicationGRANT2018-05-232004-11-1035482317GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7246164B20.537Distributed personal relationship information management system and methodsGRANT2007-07-172001-05-1026838773GoodWhoGlue IncWhoGlue Inc
US20070192588A10.537ADAPTIVE MULTI-TIER AUTHENTICATION SYSTEMAPPLICATION2007-08-162000-05-1921741402GoodAOL IncMicrosoft Technology Licensing LLC
US20110106610A10.536Systems and methods for providing and commercially exploiting online persona validationAPPLICATION2011-05-052009-10-0643857044GoodDeloitte Development LLCDeloitte Development LLC
EP2203867A10.536PASSWORD MANAGEMENTGRANT2010-07-072007-09-2638701714GoodBritish Telecommunications PLCBritish Telecommunications PLC
US20050278443A10.536Online content delivery based on information from social networksAPPLICATION2005-12-152004-06-1435461818GoodFriendster IncMeta Platforms Inc, Individual
US9691073B20.535Displaying social opportunities by location on a mapGRANT2017-06-272010-12-2246314333GoodFacebook IncMeta Platforms Inc
US20090038005A10.534PRIVILEGE-BASED ACCESS SYSTEMAPPLICATION2009-02-052007-07-3140304782GoodCisco Technology IncCisco Technology Inc
US10621585B20.534Contextual mapping of web-pages  and generation of fraud-relatedness score-valuesGRANT2020-04-142010-11-2957128883GoodBioCatch LtdBioCatch Ltd
US20120290654A10.534Rewarding Users for Sharing Digital ContentAPPLICATION2012-11-152011-05-1247142472GoodHothead Games Inc1098109 Bc Ltd, Hothead Holdings Inc, Hothead Games Inc
EP1784716A20.533RESOURCE BASED VIRTUAL COMMUNITIESGRANT2007-05-162004-08-1535908134GoodIndividualXU, YONGYONG
US20070214259A10.533Peer-to-peer trading platform with relative reputation-based item search and buddy ratingAPPLICATION2007-09-132006-03-1338480241GoodeBay InceBay Inc
US7979900B20.532Method and system for logging into and providing access to a computer system via a communication networkGRANT2011-07-122001-05-2923131848GoodAlphawolf Consulting IncAlphawolf Consulting Inc
US20040005051A10.532Entity authentication in eletronic communications by providing verification status of deviceAPPLICATION2004-01-082000-08-0430000362GoodFirst Data CorpFirst Data Corp
EP1986395B10.532Enhanced cross-site attack preventionGRANT2009-06-172007-04-2339673148GoodSAP SE SAP SE
US9823803B20.531Modular user profile overlayGRANT2017-11-212010-12-2246318573GoodFacebook IncMeta Platforms Inc
US8489071B20.530System and method for assuring identity on a mobile deviceGRANT2013-07-162010-10-2745994728GoodMobileSphere Holdings LLCCOM INVESTMENTS LLC, MobileSphere Holdings LLC
US20110231223A10.530Systems and Methods to Enhance Search Data with Transaction Based DataAPPLICATION2011-09-222010-03-1944647936GoodVisa USA IncVisa USA Inc
US7143066B20.530Systems and methods for matching  selecting  narrowcasting  and/or classifying based on rights management and/or other informationGRANT2006-11-281997-11-0627052814GoodIntertrust Technologies CorpIntertrust Technologies Corp
US8700535B20.530Issuing a publisher use license off-line in a digital rights management (DRM) systemGRANT2014-04-152003-02-2532850467GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080005086A10.530CERTIFICATE-BASED SEARCHAPPLICATION2008-01-032006-05-1738724025Good
US9013271B20.529Biometric authentication apparatus and methodGRANT2015-04-212010-03-0844563003GoodFujitsu LtdFujitsu Ltd
US11122009B20.528Systems and methods for identifying geographic locations of social media content collected over social networksGRANT2021-09-142009-12-0150026583GoodApple IncApple Inc
US20030195847A10.528Method of billing a purchase made over a computer networkAPPLICATION2003-10-161996-06-0546282273GoodFraud Control Systems com CorpFraud Control Systems com Corp
US10834590B20.527Method  device  and system of differentiating between a cyber-attacker and a legitimate userGRANT2020-11-102010-11-2962243623GoodBioCatch LtdBioCatch Ltd
US20070291995A10.527System  Method  and Apparatus for Preventing Identity Fraud Associated With Payment and Identity CardsAPPLICATION2007-12-202006-06-0938832418Good
EP1332599B10.527SYSTEM AND METHOD FOR SECURING A NON-SECURE COMMUNICATION CHANNELGRANT2013-03-202000-11-0324836276GoodCitrix Systems IncCitrix Systems Inc
US8615434B20.527Systems and methods for automatically generating campaigns using advertising targeting information based upon affinity information obtained from an online social networkGRANT2013-12-242010-10-1946235608GoodCitizenNet IncCitizenNet Inc
US20080211627A10.526BIOMETRIC AUTHENTICATION METHOD AND BIOMETRIC AUTHENTICATION APPARATUSAPPLICATION2008-09-042007-03-0239534954GoodFujitsu LtdFujitsu Ltd
US8429712B20.526Centralized user authentication system apparatus and methodGRANT2013-04-232006-06-0838823469GoodQuest Software IncQuest Software Inc
US7664952B20.526Service verifying system  authentication requesting terminal  service utilizing terminal  and service providing methodGRANT2010-02-162002-10-1632211549GoodNTT Docomo IncNTT Docomo Inc
US8850539B20.525Adaptive policies and protections for securing financial transaction data at restGRANT2014-09-302010-06-2245329873GoodAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
US6122624A0.525System and method for enhanced fraud detection in automated electronic purchasesGRANT2000-09-191998-05-2822196415GoodAutomated Transaction CorpAutomated Transaction Corp
US20100293094A10.525TRANSACTION ASSESSMENT AND/OR AUTHENTICATIONAPPLICATION2010-11-182009-05-1543069307GoodIDENTITYMIND IncAcuant Inc
US10262324B20.525System  device  and method of differentiating among users based on user-specific page navigation sequenceGRANT2019-04-162010-11-2959385727GoodBioCatch LtdBioCatch Ltd
US20110137997A10.524Social Networking System which Provides Location Information of Related UsersAPPLICATION2011-06-092005-12-1942733963GoodLATESCO LPChemtron Research LLC
US20120304284A10.524PICTURE GESTURE AUTHENTICATIONAPPLICATION2012-11-292011-05-2446605551GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20120200390A10.524System and method to streamline identity verification at airports and beyondAPPLICATION2012-08-092010-11-2346600271GoodIdemia Identity and Security USA LLCIdemia Identity and Security USA LLC
EP2031820B10.524Method for enriching content of a web page with presence informationGRANT2014-07-302007-08-3138752484GoodAlcatel Lucent SASAlcatel Lucent SAS
US20040187024A10.523Authentication of network usersAPPLICATION2004-09-232003-03-1733477390GoodBritish Telecommunications PLCBritish Telecommunications PLC
US10949757B20.523System  device  and method of detecting user identity based on motor-control loop modelGRANT2021-03-162010-11-2958691988GoodBioCatch LtdBioCatch Ltd
US20120060214A10.523Behavioral Stochastic Authentication (BSA)APPLICATION2012-03-082009-12-2145771627GoodeBay IncPayPal Inc
US8924296B20.523Dynamic pairing system for securing a trusted communication channelGRANT2014-12-302010-06-2245329535GoodAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
US8612293B20.522Generation of advertising targeting information based upon affinity information obtained from an online social networkGRANT2013-12-172010-10-1946235586GoodCitizenNet IncCitizenNet Inc
US20070265964A10.521System and Method for Payment Using Radio Frequency Identification in Contact and Contactless TransactionsAPPLICATION2007-11-152001-07-1023175563GoodAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc, Liberty Peak Ventures LLC
US8086710B20.520Identity migration apparatus and methodGRANT2011-12-272006-10-3039331692GoodQuest Software IncQuest Software Inc
US20050198031A10.520Method and system for controlling access to user information in a social networking environmentAPPLICATION2005-09-082004-03-0434911999GoodPezaris Design IncMULTIPLY Inc
US20120054095A10.520ACCOUNT OPENING COMPUTER SYSTEM ARCHITECTURE AND PROCESS FOR IMPLEMENTING SAMEAPPLICATION2012-03-012010-05-2144992059GoodHSBC Tech IncHSBC Technology and Services USA Inc
US20130173457A10.519SYSTEMS AND METHODS FOR CONDUCTING MORE RELIABLE FINANCIAL TRANSACTIONS  CREDIT DECISIONS  AND SECURITY ASSESSMENTSAPPLICATION2013-07-042010-01-1444303771Goodwww TrustScience com Incwww TrustScience com Inc
EP1346548B10.519SECURE SESSION MANAGEMENT AND AUTHENTICATION FOR WEB SITESGRANT2006-01-252000-11-304167768GoodInternational Business Machines CorpInternational Business Machines Corp
US20030046552A10.519Method and system for providing access to secure entity or service by a subset of N persons of M designated personsAPPLICATION2003-03-062001-08-2925475432GoodActivCard Ireland LtdActivCard Ireland Ltd, Individual
US7778926B10.519Processes for verifying  and accepting content postings from  creators of works represented in an electronic catalogGRANT2010-08-172006-03-2942555867GoodAmazon Technologies IncAmazon Technologies Inc
US8539359B20.518Social network driven indexing system for instantly clustering people with concurrent focus on same topic into on-topic chat rooms and/or for generating on-topic search results tailored to user preferences regarding topicGRANT2013-09-172009-02-1142541415Good
US20080005064A10.517Apparatus and method for content annotation and conditional annotation retrieval in a search contextAPPLICATION2008-01-032005-06-2837595964GoodYahoo IncOath Inc
EP2721503A20.517METHOD AND SYSTEM FOR CLOUD-BASED IDENTITY MANAGEMENT (C-IDM) IMPLEMENTATIONGRANT2014-04-232011-06-1447357725GoodZTE Corp, ZTE USA IncZTE Corp, ZTE USA Inc
US8229861B10.517Methods and systems for online warranty managementGRANT2012-07-242008-06-1148225544Good
EP1325425B10.516METHOD AND SYSTEM OF AUTOMATING INTERNET INTERACTIONSGRANT2007-08-152000-10-1324762671GoodAmerica Online IncOath Inc
US20110047610A10.516Modular Framework for Virtualization of Identity and Authentication Processing for Multi-Factor AuthenticationAPPLICATION2011-02-242009-08-1943606358GoodKEYPAIR Tech IncKEYPAIR Tech Inc
US8260789B20.516System and method for authority value obtained by defining ranking functions related to weight and confidence valueGRANT2012-09-042010-04-0144710860GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6308175B10.516Integrated collaborative/content-based filter structure employing selectively shared  content-based profile data to evaluate information entities in a massive information networkGRANT2001-10-231996-04-0446256180GoodLycos IncI/P Engine Inc
US20090313681A10.514Preliminary Verification System which has a Authentication by Phone on the Internet EnvironmentAPPLICATION2009-12-172006-07-0339214827GoodTHINKAT Co LtdTHINKAT Co Ltd
US5848396A0.514Method and apparatus for determining behavioral profile of a computer userGRANT1998-12-081996-04-2624545611GoodFreedom of Information IncVALUE CLICK Inc, Conversant LLC
US8255984B10.514Single sign-on system for shared resource environmentsGRANT2012-08-282009-07-0146689950GoodQuest Software IncDell Products LP
US8295452B10.514Methods and systems for processing telephonic communications and product dataGRANT2012-10-232009-06-1747017464Good
US20070237367A10.513Person verification apparatus and person verification methodAPPLICATION2007-10-112006-02-0738491530GoodKonica Minolta IncKonica Minolta Inc
US20090076959A10.513SYSTEM AND METHOD FOR BROKERING AD HOC PERSONAL IDENTIFICATION TRANSACTIONS BETWEEN TWO CONSENTING PARTIESAPPLICATION2009-03-192007-09-1140455606Good
US20070038931A10.513Distribution of contentAPPLICATION2007-02-152005-08-1237743722GoodBrightcove IncBrightcove Inc
US7886334B10.513System and method for social network trust assessmentGRANT2011-02-082006-12-1143532065GoodQurio Holdings IncQurio Holdings Inc
US20090210444A10.513SYSTEM AND METHOD FOR COLLECTING BONAFIDE REVIEWS OF RATABLE OBJECTSAPPLICATION2009-08-202007-10-1740567793GoodRatePoint IncRatePoint Inc
US8312276B20.513Method for sending and receiving an evaluation of reputation in a social networkGRANT2012-11-132009-02-0642541364GoodIndustrial Technology Research Institute ITRIIndustrial Technology Research Institute ITRI
US20080059992A10.512System and method for controlled viral distribution of digital content in a social networkAPPLICATION2008-03-062006-09-0639153569GoodQurio Holdings IncQurio Holdings Inc
US5941947A0.512System and method for controlling access to data entities in a computer networkGRANT1999-08-241995-08-1824056179GoodMicrosoft CorpRovi Technologies Corp
US7899823B10.512Methods and systems for inventory managementGRANT2011-03-012008-04-2543617393Good
US8401245B20.512Biometric authentication using variable threshold based on normal entry/exit timesGRANT2013-03-192007-06-2140136518GoodSony CorpSony Corp
US20100088364A10.512SOCIAL NETWORKING ARCHITECTURE IN WHICH PROFILE DATA HOSTING IS PROVIDED BY THE PROFILE OWNERAPPLICATION2010-04-082008-10-0842076644GoodInternational Business Machines CorpInternational Business Machines Corp
US7174462B20.511Method of authentication using familiar photographsGRANT2007-02-062002-11-1232229569GoodIntel CorpIntel Corp
US20040029567A10.511Technique for effectively providing personalized communications and information assistance servicesAPPLICATION2004-02-122001-05-2531999087GoodMetro One Telecommunications IncMetro One Telecommunications Inc
US7069318B20.510Content tracking in transient network communitiesGRANT2006-06-272002-03-2729418316GoodInternational Business Machines CorpInternational Business Machines Corp
US20050267940A10.510System and method for managing an online social networkAPPLICATION2005-12-012004-05-2635426673GoodFriendster IncMeta Platforms Inc, Individual
US5884270A0.509Method and system for facilitating an employment search incorporating user-controlled anonymous communicationsGRANT1999-03-161996-09-0624828960GoodWalker Asset Management LPThomas Jefferson University, Walker Asset Management LP, Inventor Holdings LLC
US20100064365A10.508METHOD FOR PASSWORD BASED AUTHENTICATION TRUST GENERATION AND AUTHORIZATION THEREOFAPPLICATION2010-03-112008-08-1241800299GoodInfosys LtdInfosys Ltd
US7673045B10.508Multiple site automated logoutGRANT2010-03-022000-06-1541717729GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP2193654A10.508INBOUND CALL IDENTIFICATION AND MANAGEMENTGRANT2010-06-092007-09-2840508369GoodRingCentral IncRing Central Inc
US20030055898A10.508Propagating and updating trust relationships in distributed peer-to-peer networksAPPLICATION2003-03-202001-07-3126861292GoodSun Microsystems IncOracle America Inc
US10031804B20.507Social networking utilizing a dispersed storage networkGRANT2018-07-242009-09-2943780985GoodInternational Business Machines CorpPure Storage Inc
US20110314559A10.507SYSTEM ACCESS DETERMINATION BASED ON CLASSIFICATION OF STIMULIAPPLICATION2011-12-222010-06-1645329891GoodRAVENWHITE IncRavenwhite Security Inc, RAVENWHITE Inc
US7904949B20.507Apparatus  systems and methods to provide authentication services to a legacy applicationGRANT2011-03-082005-12-1938175331GoodQuest Software IncQuest Software Inc
US8600830B20.506System and method for providing a payment to a non-winning auction participantGRANT2013-12-032003-02-0543306884Good
US20100186066A10.506METHODS AND SYSTEMS FOR FACILITATING PERSONAL DATA PROPAGATIONAPPLICATION2010-07-222009-01-2042338006GoodTitanium Fire LtdTitanium Fire Ltd
US20110007705A10.506MOBILITY ACCESS GATEWAYAPPLICATION2011-01-132002-10-2134555454GoodAlcatel Lucent USA IncPiece Future Pte Ltd
US20090249244A10.506Dynamic information management system and method for content delivery and sharing in content-  metadata- & viewer-based  live social networking among users concurrently engaged in the same and/or similar contentAPPLICATION2009-10-012000-10-1041114500GoodAddnClick IncNeonekt LLC
US10140598B20.506Device including encrypted data for expiration date and verification value creationGRANT2018-11-272009-05-2043125228GoodVisa International Service AssociationVisa International Service Association
US8938690B10.505Intelligent social collaboration hover cardGRANT2015-01-202010-11-1552301778GoodCisco Technology IncCisco Technology Inc
US20050086300A10.504Trust mechanism for a peer-to-peer network computing platformAPPLICATION2005-04-212001-01-2227535320GoodSun Microsystems IncOracle America Inc
EP2232401B10.503SYSTEM  METHOD AND PROGRAM PRODUCT FOR CONSOLIDATED AUTHENTICATIONGRANT2018-03-072008-05-0740934091GoodInternational Business Machines CorpInternational Business Machines Corp
US9311670B20.502Game theoretic prioritization system and methodGRANT2016-04-122004-09-1036037011Good
US8108406B20.502Pangenetic web user behavior prediction systemGRANT2012-01-312008-12-3042286155GoodExpanse Networks Inc23andMe Inc
WO2003102776A10.502SYSTEM AND METHOD FOR REVIEWING RECEIVED DIGITAL CONTENTAPPLICATION2003-12-112002-04-0829715195Good
US20110145355A10.502System and Method for Improved Social NetworkingAPPLICATION2011-06-162009-09-0344144109Good
US20100169952A10.502METHOD  APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING AN ADAPTIVE AUTHENTICATION SESSION VALIDITY TIMEAPPLICATION2010-07-012008-12-3042286541GoodNokia OyjNokia Oyj
US20090172021A10.501RECOMMENDATIONS BASED ON ACTIONS PERFORMED ON MULTIPLE REMOTE SERVERSAPPLICATION2009-07-022007-12-2840799832GoodAmazon Technologies IncAmazon Technologies Inc
US20110013812A10.501ENTRANCE CONTROL SYSTEM HAVING A CAMERA AND CONTROL METHOD THEREOFAPPLICATION2011-01-202009-07-1643465335GoodUNION COMMUNITY Co LtdUNION COMMUNITY Co Ltd
US20040064693A10.501Distributed indexing of identity information in a peer-to-peer networkAPPLICATION2004-04-012002-09-2632029178GoodSun Microsystems IncOracle America Inc
US7564993B20.500Personal authentication method and deviceGRANT2009-07-212001-02-2818914044GoodPanasonic CorpPanasonic Corp
US9262517B20.500Systems and methods for social media data miningGRANT2016-02-162010-08-1845594913GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US10360625B20.500Dynamically adaptive policy management for securing mobile financial transactionsGRANT2019-07-232010-06-2245329540GoodAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
US7536346B20.500System and method for facilitating reciprocative small business financial information exchangesGRANT2009-05-192001-10-2921804408GoodEquifax IncEquifax Inc
US7822703B10.499Automatic verification of a userGRANT2010-10-262001-12-3142987615GoodAOL IncMeta Platforms Inc
US7689418B20.498Method and system for non-intrusive speaker verification using behavior modelsGRANT2010-03-302000-03-0127807115GoodNuance Communications IncNuance Communications Inc
US20090064287A10.497APPLICATION PROTECTION ARCHITECTURE WITH TRIANGULATED AUTHORIZATIONAPPLICATION2009-03-052007-08-2840407382GoodRohati Systems LLCCisco Technology Inc
US8954863B20.497Intelligent social collaboration unified mediaGRANT2015-02-102010-11-1544117331GoodCisco Technology IncCisco Technology Inc
US20160050201A10.497METHOD FOR AUTHENTICATING USERS AND DEVICES ON A COMPUTING NETWORKAPPLICATION2016-02-182011-04-0450476706GoodConnectX IncConnectX Inc
US9207832B10.497Intelligent social collaboration watchlist that visually indicates an order of relevanceGRANT2015-12-082010-11-1554708277GoodCisco Technology IncCisco Technology Inc
EP1400135A10.497METHOD AND DEVICE FOR EFFECTING VENUE SPECIFIC WIRELESS COMMUNICATIONGRANT2004-03-242001-06-2523160604Good
US10187277B20.496Scoring using distributed database with encrypted communications for credit-granting and identification verificationGRANT2019-01-222009-10-2343899254Goodwww TrustScience com Incwww TrustScience com Inc
US7769740B20.496Systems and methods of ranking attentionGRANT2010-08-032007-12-2140789833GoodYahoo IncYahoo Inc, R2 Solutions LLC
US20080033739A10.496Systems and methods for dynamically generating segmented community flyersAPPLICATION2008-02-072006-08-0239030353GoodFacebook IncMeta Platforms Inc
US20100153278A10.496WEB SITES THAT INTRODUCE A SELLER TO A UNIVERSE OF BUYERS  WEB SITES THAT RECEIVE A BUYER'S LISTING OF WHAT HE WANTS TO BUY  OTHER INTRODUCTION WEB SITES  SYSTEMS USING INTRODUCTION WEB SITES AND INTERNET-BASED INTRODUCTIONSAPPLICATION2010-06-172008-12-1642241701Good
US7055170B10.495Security mechanism and architecture for collaborative software systems using tuple spaceGRANT2006-05-301999-10-0510862162GoodMitel Networks CorpUniversity of Ottawa, MLN AcquisitionCo ULC, RingCentral Inc
EP1279116B10.495METHOD AND SYSTEM  FOR AUTOMATING INTERNET INTERACTIONS USING RECORDED DATAGRANT2007-05-302000-04-2824242017GoodAmerica Online IncOath Inc
US20080109244A10.494METHOD AND SYSTEM FOR MANAGING REPUTATION PROFILE ON ONLINE COMMUNITIESAPPLICATION2008-05-082006-11-0339360760GoodSEZWHO IncSEZWHO Inc
US6839680B10.494Internet profilingGRANT2005-01-041999-09-3023623448GoodFujitsu LtdFujitsu Ltd
US9256904B10.493Multi-bureau credit file freeze and unfreezeGRANT2016-02-092008-08-1455235632GoodExperian Information Solutions LLCExperian Information Solutions LLC
US20030050977A10.493Peer discovery and connection management based on context sensitive social networksAPPLICATION2003-03-132001-09-1025488169GoodIntel CorpIntel Corp
US8874477B20.491Multifactorial optimization system and methodGRANT2014-10-282005-10-0437943336GoodMeadwestvaco CorpWestRock MWV LLC
EP1422907B10.491Securely processing client credentials used for web-based access to resourcesGRANT2013-07-032002-11-2032233681GoodMicrosoft CorpMicrosoft Corp
US10406441B20.491Systems and methods for managing a persistent virtual avatar with migrational abilityGRANT2019-09-102006-11-1639418313GoodBotanic Technologies IncOGG LLC, Botanic Technologies Inc
US8001050B20.491Methods and systems for verifying customer supplied financial account information using debit and credit transactionsGRANT2011-08-162008-06-2441432238GoodHSBC Tech IncHSBC Technology and Services USA Inc
US8321672B20.490Authentication system  information processing apparatus and method  program  and recording mediumGRANT2012-11-272007-01-2439717482GoodSony CorpSony Corp
US5867799A0.490Information system and method for filtering a massive flow of information entities to meet user information classification needsGRANT1999-02-021996-04-0424514636GoodLycos IncI/P Engine Inc
US9325560B20.490Method  device and system for providing web page content according to user rankingGRANT2016-04-262011-06-2747423420GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd, Huawei Digital Technologies Chengdu Co Ltd
EP2721548B10.490PASSPORTING CREDENTIALS BETWEEN A MOBILE APP AND A WEB BROWSERGRANT2017-12-202011-06-1747354870GoodPayPal IncPayPal Inc
US20110191416A10.490Content Author BadgesAPPLICATION2011-08-042010-02-0144320220GoodGoogle LLCGoogle LLC
US8032508B20.489System and method for URL based query for retrieving data related to a contextGRANT2011-10-042008-11-1842172798GoodYahoo IncYahoo Inc, R2 Solutions LLC
US20060190281A10.489Systems and methods to facilitate self regulation of social networks through trading and gift exchangeAPPLICATION2006-08-242005-02-2236913926GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7974983B20.489Website network and advertisement analysis using analytic measurement of online social media contentGRANT2011-07-052008-11-1342165224GoodBuzzient IncBuzzient Inc
US20120171999A10.488APPARATUS AND METHOD FOR PROVIDING SOCIAL NETWORK SERVICE IN PORTABLE TERMINALAPPLICATION2012-07-052011-01-0446381178GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20030182421A10.488Distributed identitiesAPPLICATION2003-09-252002-03-2228044452GoodSun Microsystems IncOracle America Inc
US8261329B20.487Trust and identity in secure calendar sharing collaborationGRANT2012-09-042009-05-2743221792GoodInternational Business Machines CorpInternational Business Machines Corp
US8640021B20.487Audience-based presentation and customization of contentGRANT2014-01-282010-11-1246048955GoodMicrosoft CorpZhigu Holdings Ltd
US8694542B20.486Customizing tracking changes to user content in an online social networkGRANT2014-04-082006-09-1246328500GoodFacebook IncMeta Platforms Inc
US6334121B10.486Usage pattern based user authenticatorGRANT2001-12-251998-05-0426770633GoodVirginia Commonwealth UniversityVirginia Commonwealth University
US20090132689A10.485TRUST BASED MODERATIONAPPLICATION2009-05-212007-11-1540639397GoodYahoo IncYahoo Assets LLC
US20130006626A10.485VOICE-BASED TELECOMMUNICATION LOGINAPPLICATION2013-01-032011-06-2947391470GoodInternational Business Machines CorpInternational Business Machines Corp
EP1347397B10.485Web-based management of collections of image dataGRANT2010-09-222002-03-1927785233GoodCanon IncCanon Inc
US20040215793A10.484Personal contact networkAPPLICATION2004-10-282001-09-3026652278GoodRealContacts LtdZoom Video Communications Inc
US20070050845A10.484Fortified authentication on multiple computers using collaborative agentsAPPLICATION2007-03-012005-08-3137805897GoodEncentuate Pte LtdEncentuate Pte Ltd
US6314420B10.484Collaborative/adaptive search engineGRANT2001-11-061996-04-0446256202GoodLycos IncI/P Engine Inc
US7677459B20.483Dual-sided smart card readerGRANT2010-03-162003-12-2434703598GoodIndividualArnouse Digital Devices Corp
US20110035789A10.483Determining a Trust Level of a User in a Social Network EnvironmentAPPLICATION2011-02-102007-02-0239677302GoodIndividualMeta Platforms Inc
US7946477B10.483Automated banking machine with noncontact reading of card dataGRANT2011-05-242004-03-3144022152GoodDiebold IncDiebold Nixdorf Inc
US8024317B20.483System and method for deriving income from URL based context queriesGRANT2011-09-202008-11-1842172768GoodYahoo IncYahoo Inc, R2 Solutions LLC
US9922134B20.482Assessing and scoring people  businesses  places  things  and brandsGRANT2018-03-202010-04-3044860718Goodwww TrustScience com Incwww TrustScience com Inc
US20040268132A10.482Radio frequency identification (RFID) based network access managementAPPLICATION2004-12-302003-06-3033541225GoodNokia OyjNokia Solutions and Networks Oy
WO2002084565A10.482SYSTEM AND METHOD FOR CONTROLLING ACCESS AND USE OF PRIVATE INFORMATIONAPPLICATION2002-10-242001-04-1326962121Good
US9325750B20.481Method and system for viewing a contact network feed in a business directory environmentGRANT2016-04-262011-07-2655754021GoodSalesforce com IncSalesforce com Inc
US8015484B20.481Reputation system for web pages and online entitiesGRANT2011-09-062006-02-0938472505Good
US20100174709A10.481Methods For Searching Private Social Network DataAPPLICATION2010-07-082008-12-1842312354GoodPear Software LLCPear Software LLC
US20040064568A10.480Presence detection using distributed indexes in peer-to-peer networksAPPLICATION2004-04-012002-09-2632029237GoodSun Microsystems IncOracle America Inc
US20090025081A10.480METHOD AND SYSTEM FOR CONFIGURING LOCAL AND REMOTE RESOURCES TO ACCOMPLISH RENDERING OF MULTIMEDIA CONTENT ON DISSIMILAR FORMAT DEVICES BASED ON USER BIOMETRIC DATAAPPLICATION2009-01-222007-07-2040265955GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US10878065B20.480Federated digital rights management scheme including trusted systemsGRANT2020-12-292006-03-1438510257GoodDivx LLCDivx LLC
US8977633B20.479System and method for generating a pool of matched contentGRANT2015-03-102009-12-1544166644GoodGuvera IP Pty LtdGuvera IP Pty Ltd
US20080295151A10.479METHOD AND SYSTEM FOR ANONYMOUS INFORMATION VERIFICATIONAPPLICATION2008-11-272007-03-1840073645Good
US20020035539A10.479System and methods of validating an authorized user of a payment card and authorization of a payment card transactionAPPLICATION2002-03-212000-07-1722815693Good
US20080109491A10.479METHOD AND SYSTEM FOR MANAGING REPUTATION PROFILE ON ONLINE COMMUNITIESAPPLICATION2008-05-082006-11-0339360939GoodSEZWHO IncSEZWHO Inc
US20120303534A10.479SYSTEM AND METHOD FOR A SECURE TRANSACTIONAPPLICATION2012-11-292011-05-2747219889GoodTomaxx GmbHTomaxx GmbH
US20080222199A10.478Multimedia Aggregation in an Online Social NetworkAPPLICATION2008-09-112007-03-0639742707GoodFriendster IncMeta Platforms Inc, Individual
EP0953170B10.478DATA ACCESS CONTROLGRANT2003-09-101997-01-208229185GoodBritish Telecommunications PLCBritish Telecommunications PLC
US20100281364A10.478Apparatuses  Methods and Systems For Portable Universal ProfileAPPLICATION2010-11-042005-01-1141162272GoodLINKSTORMLINKSTORM
US7433960B10.478Systems  methods and computer products for profile based identity verification over the internetGRANT2008-10-072008-01-0439797377GoodInternational Business Machines CorpSAP SE
US8924285B20.478Building whitelists comprising voiceprints not associated with fraud and screening calls using a combination of a whitelist and blacklistGRANT2014-12-302005-04-2140589099GoodVerint Americas IncVerint Americas Inc
US8566956B20.477Monitoring and reporting of data access behavior of authorized database usersGRANT2013-10-222010-06-2345353921GoodSalesforce com IncSalesforce com Inc
US20100306249A10.477SOCIAL NETWORK SYSTEMS AND METHODSAPPLICATION2010-12-022009-05-2743221432Good
US8244848B10.477Integrated social network environmentGRANT2012-08-142010-04-1946613606GoodFacebook IncMeta Platforms Inc
US20060020459A10.477System and method for immigration tracking and intelligenceAPPLICATION2006-01-262004-07-2135658380Good
US20120233665A10.476DEVICE REPUTATIONAPPLICATION2012-09-132011-03-0946797262GoodeBay IncPayPal Inc
US11100431B20.476Systems and methods for mobile authorizationsGRANT2021-08-242011-05-1047139649GoodDynamics IncDYNAMCIS Inc, Dynamics Inc
US20030046587A10.475Secure remote access using enterprise peer networksAPPLICATION2003-03-062001-09-0527392571GoodNETSILICA IncNETSILICA Inc
US20070192870A10.475Method and system for actively defending a wireless LAN against attacksAPPLICATION2007-08-162002-05-2029731938GoodAirDefense LLCExtreme Networks Inc
US20050209999A10.475Systems and methods for class designation in a computerized social network applicationAPPLICATION2005-09-222004-03-1934987561Good
US9208505B10.475Systems and methods for providing compensation  rebate  cashback  and reward for using mobile and wearable payment servicesGRANT2015-12-082002-10-0157942491Good
US20060009994A10.474System and method for reputation ratingAPPLICATION2006-01-122004-07-0735542474GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US7092821B20.474Large group interactions via mass communication networkGRANT2006-08-152000-05-0126324006GoodInvoke Solutions IncInvoke Solutions Inc
US7890627B10.473Hierarchical statistical model of internet reputationGRANT2011-02-152009-09-0243568660GoodSophos LtdSophos Ltd
US9866516B10.473Method and apparatus of processing social networking-based user input informationGRANT2018-01-092011-07-1952101927GoodOpen Invention Network LLCPhilips North America LLC
US20070067853A10.473Method and system for adaptive identity analysis  behavioral comparison  compliance  and application protection using usage informationAPPLICATION2007-03-222005-09-2037885748GoodInternational Business Machines CorpInternational Business Machines Corp
US8539331B20.473Editable bookmarks shared via a social networkGRANT2013-09-172010-05-1344912808GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10404729B20.473Device  method  and system of generating fraud-alerts for cyber-attacksGRANT2019-09-032010-11-2958283469GoodBioCatch LtdBioCatch Ltd
US9922167B20.473Context-aware method and system for facilitating the delivery of healthcare to patients within a clinical environment monitored by real-time locating apparatusGRANT2018-03-202009-11-2044059901GoodVersus Technology IncVersus Technology Inc
US8020005B20.472Method and apparatus for multi-model hybrid comparison systemGRANT2011-09-132005-12-2338050063GoodScout Analytics IncBioPassword LLC, ServiceSource International Inc
US20070073687A10.472System and method for providing enhanced questions for matching in a network environmentAPPLICATION2007-03-292005-09-2737895363GoodMatch com LLCMatch Group LLC
US20090216859A10.472METHOD AND APPARATUS FOR SHARING CONTENT AMONG MULTIPLE USERSAPPLICATION2009-08-272008-02-2240985900GoodWILLIAMS SUSAN BARNHARDTWILLIAMS SUSAN BARNHARDT
US20110137789A10.472Trust Based Transaction SystemAPPLICATION2011-06-092009-12-0344082959GoodVenmo IncPayPal Inc
US20130263218A10.472PRIVACY COMPLIANT CONSENT AND DATA ACCESS MANAGEMENT SYSTEM AND METHODSAPPLICATION2013-10-032004-07-2335786761GoodPrivlT IncPrivit Inc, PrivlT Inc
US8621636B20.471Systems  methods  and computer program products for collecting and reporting sensor data in a communication networkGRANT2013-12-312009-12-1744153136GoodAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
US20080109245A10.470METHOD AND SYSTEM FOR MANAGING DOMAIN SPECIFIC AND VIEWER SPECIFIC REPUTATION ON ONLINE COMMUNITIESAPPLICATION2008-05-082006-11-0339360761GoodSEZWHO IncSEZWHO Inc
US20070073549A10.470System and method for providing testing and matching in a network environmentAPPLICATION2007-03-292005-09-2737895272GoodMatch com LLCMatch Group LLC
US20100082490A10.470Systems and methods for secure wireless transactionsAPPLICATION2010-04-012008-09-3042058507GoodApple IncApple Inc
US6480885B10.469Dynamically matching users for group communications based on a threshold degree of matching of sender and recipient predetermined acceptance criteriaGRANT2002-11-121998-09-1527379015GoodIndividualLocal2mecom Inc, Tumbleweed Holdings LLC
EP1208451A10.469BROWSING METHOD FOR FOCUSING RESEARCHGRANT2002-05-291999-06-3027495463GoodMissiontrek Ltd CoMissiontrek Ltd Co
US10176233B10.468LifescoreGRANT2019-01-082011-07-0857189416GoodConsumerinfo com IncConsumerinfo com Inc
US20070073803A10.468System and method for providing a post-date component in a network environmentAPPLICATION2007-03-292005-09-2737895441GoodMatch com LLCMatch Group LLC
US20030002521A10.468Bootstrapping for joining the peer-to-peer environmentAPPLICATION2003-01-022001-01-2227500784GoodSun Microsystems IncOracle America Inc
US20050129290A10.468Method and apparatus for enrollment and authentication of biometric imagesAPPLICATION2005-06-162003-12-1634657312GoodMotorola IncMotorola Solutions Inc
US9843541B20.468Recommender system and method of operating sameGRANT2017-12-122011-07-0145497902GoodFUNKE DIGITAL TV GUIDE GmbHFunke Tv Guide GmbH
US10127618B20.467Determining connectivity within a communityGRANT2018-11-132009-09-3043825460Goodwww TrustScience com Incwww TrustScience com Inc
US7039951B10.467System and method for confidence based incremental access authenticationGRANT2006-05-022000-06-0624354181GoodInternational Business Machines CorpNuance Communications Inc
US20070073711A10.467System and method for providing a pre-date component in a network environmentAPPLICATION2007-03-292005-09-2737895383GoodMatch com LLCMatch Group LLC
US20080045236A10.466Methods and apparatus for gathering and delivering contextual messages in a mobile communication systemAPPLICATION2008-02-212006-08-1839101964GoodFrance Telecom SAGazdzinski & Associates PC
US20070073710A10.466System and method for providing a search feature in a network environmentAPPLICATION2007-03-292005-09-2737895382GoodMatch com LLCMatch Group LLC
US10666710B20.465Content management system using sources of experience data and modules for quantification and visualizationGRANT2020-05-262009-01-2746719746GoodApple IncApple Inc
US20040122958A10.465Method and system for peer-to-peer authorizationAPPLICATION2004-06-242002-12-1932593446GoodInternational Business Machines CorpInternational Business Machines Corp
US20020198866A10.465Credibility rating platformAPPLICATION2002-12-262001-03-1325192556GoodInternational Business Machines CorpInternational Business Machines Corp
US20080082381A10.464USER GENERATED CONTENT PUBLISHING SYSTEMAPPLICATION2008-04-032006-09-2839231032GoodDemand Media IncLeaf Group Ltd
US20060119883A10.464Methods and systems for imaging device credential consolidationAPPLICATION2006-06-082004-10-0846205662GoodSharp Laboratories of America IncSharp Laboratories of America Inc
US7822631B10.464Assessing content based on assessed trust in usersGRANT2010-10-262003-08-2242987600GoodAmazon Technologies IncAmazon Technologies Inc
US20030115487A10.464Object security boundariesAPPLICATION2003-06-191998-11-3022744318GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080167966A10.463Transaction System and MethodAPPLICATION2008-07-102004-10-2636226702GoodCoca Cola CoCoca Cola Co
US10230593B20.463Method  system and computer program product for interception  quarantine and moderation of internal communications of uncontrolled systemsGRANT2019-03-122010-05-2149640900GoodProofpoint IncProofpoint Inc
US7092952B10.463Method for grouping computer subscribers by common preferences to establish non-intimate relationshipsGRANT2006-08-152001-11-2036781891GoodIndividualResource Consortium Ltd
US20070073548A10.462System and method for providing a system that includes on-line and off-line features in a network environmentAPPLICATION2007-03-292005-09-2737895271GoodMatch com LLCMatch Group LLC
US9798789B20.462Method and system for tracking changes to user content in an online social networkGRANT2017-10-242006-09-1239170994GoodFacebook IncMeta Platforms Inc
US7792709B10.461Methods and systems for receipt management and price comparisonGRANT2010-09-072008-10-0842669720Good
US20050021476A10.461Method and system for detecting identify theft in non-personal and personal transactionsAPPLICATION2005-01-272001-07-0634084379GoodFRAUD-CHECK IncFRAUD-CHECK Inc
US20070294281A10.460SYSTEMS AND METHODS FOR CONSUMER-GENERATED MEDIA REPUTATION MANAGEMENTAPPLICATION2007-12-202006-05-0538862745GoodVisible Technologies LLCCision Us Inc
US10437896B20.460Singular  collective  and automated creation of a media guide for online contentGRANT2019-10-082009-01-0742316810GoodDivx LLCDivx LLC
US7302480B20.459Monitoring the flow of a data streamGRANT2007-11-272002-01-188185777GoodStonesoft CorpForcepoint LLC, Forcepoint Federal Holdings LLC
US7069308B20.459System  method and apparatus for connecting users in an online computer system based on their relationships within social networksGRANT2006-06-272003-06-1634061879GoodFriendster IncMeta Platforms Inc
US9143533B20.459Integrating communicationsGRANT2015-09-222010-10-1244484820GoodSkype Ltd IrelandMicrosoft Technology Licensing LLC
US7451161B20.459Compatibility scoring of users in a social networkGRANT2008-11-112005-04-2837215472GoodFriendster IncMeta Platforms Inc
US20030061163A10.459Method and apparatus for verification/authorization by credit or debit card owner of use of card concurrently with merchant transactionAPPLICATION2003-03-272001-09-2725511251Good
EP2008193B10.459HOSTED VOICE RECOGNITION SYSTEM FOR WIRELESS DEVICESGRANT2012-11-282006-04-0538581654GoodCanyon IP Holdings LLCCanyon IP Holdings LLC
US20170060869A10.459Methods and System for Generating Content Delivery URLs from Business CardsAPPLICATION2017-03-022010-07-0948445429GoodIII Holdings 1 LLCIII Holdings 1 LLC
US20050097364A10.458System and method for securing computer system against unauthorized accessAPPLICATION2005-05-052003-07-2334555582Good
US7562813B20.458System and method for activating telephone-based payment instrumentGRANT2009-07-212006-05-1038684179GoodFirst Data CorpFirst Data Corp
US20120016794A10.458Real-Time Gifting Using a Computing device and Social MediaAPPLICATION2012-01-192010-07-1545467697GoodATX INNOVATIONS IncATX INNOVATIONS Inc
US8523069B20.458Mobile transit fare paymentGRANT2013-09-032006-09-2839230922GoodVisa USA IncVisa USA Inc
US20020156893A10.457System and method for dynamic  transparent migration of servicesAPPLICATION2002-10-242001-01-2227582547GoodSun Microsystems IncOracle America Inc
US8752142B20.457Systems  methods  and computer program products for adapting the security measures of a communication network based on feedbackGRANT2014-06-102009-07-1743449778GoodAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
US20050154886A10.456Declarative trust model between reverse proxy server and websphere application serverAPPLICATION2005-07-142004-01-1234739672GoodInternational Business Machines CorpInternational Business Machines Corp
US20070073802A10.456System and method for providing on-line dating features in a network environmentAPPLICATION2007-03-292005-09-2737895440GoodMatch com LLCMatch Group LLC
US20090193433A10.455INTEGRATING OPERATIONAL AND BUSINESS SUPPORT SYSTEMS WITH A SERVICE DELIVERY PLATFORMAPPLICATION2009-07-302008-01-2440900547GoodOracle International CorpOracle International Corp
US20040148275A10.455System and method for employing social networks for information discoveryAPPLICATION2004-07-292003-01-2932736218GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8006309B20.455Information processing device and communication methodGRANT2011-08-232003-08-1134137955GoodSony CorpSony Corp
US8386482B20.454Method for personalizing information retrieval in a communication networkGRANT2013-02-262009-09-0243626354GoodXurmo Tech Private LtdXurmo Tech Private Ltd
US20070072468A10.454System and method for providing an enhanced selection process in a network environmentAPPLICATION2007-03-292005-09-2737894684GoodMatch com LLCMatch Group LLC
US8589516B20.454Method and system for intermediating content provider website and mobile deviceGRANT2013-11-192009-09-1043648507GoodMotorola Mobility LLCMotorola Solutions Inc, Google Technology Holdings LLC
US20110145920A10.453SYSTEM AND METHOD FOR ADVERSE MOBILE APPLICATION IDENTIFICATIONAPPLICATION2011-06-162008-10-2144144446GoodLookOut IncLookOut Inc
US9189601B20.453Apparatus  system  and method for accurate dispensing of prescription medicationsGRANT2015-11-172010-03-1649114795GoodJIREH HEALTH LLCJIREH HEALTH LLC
US6793134B20.453Self-service terminalGRANT2004-09-212002-08-019941531GoodNCR CorpNCR Corp
US9147042B10.452Systems and methods for data verificationGRANT2015-09-292010-11-2254149636GoodExperian Information Solutions LLCExperian Information Solutions LLC
US10104518B20.452System and method for provisioning user computing devices based on sensor and state informationGRANT2018-10-162010-07-2144629346GoodSensoriant IncSensoriant Inc
US20140259164A10.452SECURITY MONITORINGAPPLICATION2014-09-112010-05-1344912672GoodSalesforce com IncSalesforce com Inc
US8118223B20.451Smart sign mobile transit fare paymentGRANT2012-02-212006-09-2839707458GoodVisa USA IncVisa USA Inc
US8285656B10.451Systems and methods for data verificationGRANT2012-10-092007-03-3046964309GoodConsumerinfo com IncConsumerinfo com Inc
US20040044727A10.450Decentralized peer-to-peer advertisementAPPLICATION2004-03-042002-08-3031976729GoodSun Microsystems IncOracle America Inc
US8897820B20.449System  method  and apparatus for storing  transmitting  receiving  and using structured data using un-structured text message bodiesGRANT2014-11-252010-11-1648086336Good
US20100332326A10.449System And Methods For Positioning Information From A Plurality Of UsersAPPLICATION2010-12-302008-02-1340957349Good
US20040014423A10.449Functionality and policies based on wireless device dynamic associationsAPPLICATION2004-01-222002-05-1530448364GoodSocket Mobile IncSocket Mobile Inc
US7703030B20.449Method and system for providing customized recommendations to usersGRANT2010-04-202005-01-1138174954GoodTrusted Opinion IncTRUSTED OPINION Inc, Trusted Opinion Inc
US8103382B20.449Method and system for sharing information through a mobile multimedia platformGRANT2012-01-242008-04-2441216274GoodNORTH END TechnologyNORTH END Technology
US10262364B20.449Card registry systems and methodsGRANT2019-04-162007-12-1462235147GoodConsumerinfo com IncConsumerinfo com Inc
US10755287B20.448Selecting between client-side and server-side market detectionGRANT2020-08-252008-11-2542197177GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20050138430A10.448Community messaging lists for authorization to deliver electronic messagesAPPLICATION2005-06-232003-12-1934738663GoodAmerica Online IncMeta Platforms Inc, Individual
US8589407B20.448Automated generation of suggestions for personalized reactions in a social networkGRANT2013-11-192011-06-1747354563GoodGoogle LLCGoogle LLC
US20040162871A10.447Infrastructure for accessing a peer-to-peer network environmentAPPLICATION2004-08-192003-02-1332849717GoodSun Microsystems IncOracle America Inc
EP1590747A20.447IMPROVEMENTS IN WEB SERVERSGRANT2005-11-022003-01-2131980025GoodW3iln LtdW3iln Ltd
EP1132847A20.446System and method for collaborative multi-device web browsingGRANT2001-09-122000-02-2424039402GoodInternational Business Machines CorpInternational Business Machines Corp
US8549657B20.446Owner privacy in a shared mobile deviceGRANT2013-10-012008-05-1241267976GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20110185354A10.446Mobile Application Delivery Management SystemAPPLICATION2011-07-282010-01-2644309969GoodEmdigo IncEmdigo Inc
US20120331521A10.445SYSTEM AND METHOD FOR APPLICATION CENTRIC CLOUD MANAGEMENTAPPLICATION2012-12-272011-06-2747363100GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US6854069B20.445Method and system for achieving high availability in a networked computer systemGRANT2005-02-082000-05-0222744487GoodSun Microsystems IncOracle America Inc
US20080021920A10.445Memory content generation  management  and monetization platformAPPLICATION2008-01-242004-03-2538972638Good
US20120203733A10.445Method and system for personal cloud engineAPPLICATION2012-08-092011-02-0946601368Good
US20020059379A10.445System and method for information and application distributionAPPLICATION2002-05-161998-09-1524044871GoodiKimbo IncCROSS ATLANTIC CAPITAL PARTNERS Inc
US9626545B20.445Semantic note taking systemGRANT2017-04-182009-01-2746018663GoodApple IncApple Inc
US6829569B10.444Social dilemma software for evaluating online interactive societiesGRANT2004-12-071998-09-1533479131GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6301609B10.444Assignable associate priorities for user-definable instant messaging buddy groupsGRANT2001-10-091999-07-0727385825GoodLucent Technologies IncAlcatel Lucent SAS, Sound View Innovations LLC
US7004385B10.444Currency dispensing ATM with RFID card readerGRANT2006-02-282003-04-0135922626GoodDiebold IncDiebold Nixdorf Inc
US20070244816A10.444SYSTEMS AND METHODS FOR OPENING  FUNDING  AND/OR USING A FINANCIAL ACCOUNT  SUCH AS A CHECKING ACCOUNTAPPLICATION2007-10-182006-04-1438606003GoodWashington Mutual IncJPMorgan Chase Bank NA
US20090216608A10.444COLLABORATIVE REVIEW SYSTEMAPPLICATION2009-08-272008-02-2240999208GoodAccenture Global Services GmbHAccenture Global Services Ltd
US20090089264A10.443Method and System for Managing Message BoardsAPPLICATION2009-04-022002-11-1132312976Good
US20050052998A10.441Management of peer-to-peer networks using reputation dataAPPLICATION2005-03-102003-04-059956267GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20090307003A10.440SOCIAL ADVERTISEMENT NETWORKAPPLICATION2009-12-102008-05-1641401101GoodCitizenNet IncCitizenNet Inc
US20070203850A10.440Multifactor authentication systemAPPLICATION2007-08-302006-02-1538445218GoodSapphire Mobile Systems IncMpower Mobile Inc
US20020156875A10.440Peer group name serverAPPLICATION2002-10-242001-04-2426699382GoodSun Microsystems IncOracle America Inc
US8019365B20.439Conducting a payment using a secure element and SMSGRANT2011-09-132005-12-3146329684GoodBlaze Mobile IncBlaze Mobile Inc, Individual
US8622309B10.439Payment cards and devices with budgets  parental controls  and virtual accountsGRANT2014-01-072009-04-0649840762GoodDynamics IncDynamics Inc
US9391853B20.438Efficient service advertisement and discovery in a peer-to-peer networking environment with dynamic advertisement and discovery periods based on operating conditionsGRANT2016-07-122009-12-2344152643GoodApple IncApple Inc
US7730546B20.438Method and apparatus for authenticating usage of an applicationGRANT2010-06-012005-07-0137591367GoodTime Warner LLCWarner Media LLC
US20050077350A10.438Dual cardAPPLICATION2005-04-142003-10-1334426296GoodStarbucks CorpIntel Corp, Starbucks Corp
US20050171955A10.437System and method of information filtering using measures of affinity of a relationshipAPPLICATION2005-08-042004-01-2934812089GoodYahoo IncYahoo Inc, Slack Technologies LLC
US20030038707A10.436Method for secured identification of user's idAPPLICATION2003-02-272000-03-1711073955Good
US20120016948A10.436SOCIAL NETWORK ACTIVITY MONITORING AND AUTOMATED REACTIONAPPLICATION2012-01-192010-07-1545467765GoodAvaya IncAvaya Inc
US7881701B20.435Method and system for verifying telephone numbersGRANT2011-02-012006-10-0539274951GoodInternational Business Machines CorpInternational Business Machines Corp
US20050234778A10.435Proximity transaction apparatus and methods of use thereofAPPLICATION2005-10-202004-04-1534970173GoodHand Held Products IncHand Held Products Inc
US20090228714A10.435Secure mobile device with online vaultAPPLICATION2009-09-102004-11-1841054831GoodBiogy IncBiogy Inc
US8996627B10.434Extension system for rendering custom posts in the activity streamGRANT2015-03-312011-06-2752708003GoodGoogle LLCGoogle LLC
US7185065B10.434System and method for scoring electronic messagesGRANT2007-02-272000-10-1146204163GoodBuzzmetrics LtdBuzzmetrics Ltd
US11106744B20.434Search engineGRANT2021-08-312011-03-1446829293GoodNewsplug IncNewsplug Inc
US7783652B20.434Keeping offensive content out of default view on a websiteGRANT2010-08-242006-04-0738576713GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10747305B20.433Method  system  and device of authenticating identity of a user of an electronic deviceGRANT2020-08-182010-11-2967768091GoodBioCatch LtdBioCatch Ltd
US20090070133A10.433System and Method for Providing a Near Matches Feature in a Network EnvironmentAPPLICATION2009-03-122005-09-2740432845GoodMatch com LLCMatch Group LLC
US8364588B20.433System and method for automated detection of never-pay data setsGRANT2013-01-292007-05-2540073287GoodExperian Information Solutions LLCExperian Information Solutions LLC
US7268667B20.432Systems and methods for providing a RF transaction device operable to store multiple distinct accountsGRANT2007-09-112003-05-0946205136GoodAmerican Express Travel Related Services Co IncLiberty Peak Ventures LLC
US20060190536A10.432Method  system and program product for building social networksAPPLICATION2006-08-242005-02-2336914106GoodInternational Business Machines CorpInternational Business Machines Corp
US8402268B20.432System and method for providing security aboard a moving platformGRANT2013-03-192009-06-1143307424GoodPanasonic Avionics CorpPanasonic Avionics Corp
US8990338B20.432Method of exchanging photos with interface content provider websiteGRANT2015-03-242009-09-1043733102GoodGoogle Technology Holdings LLCGoogle Technology Holdings LLC
EP1810177B10.431ONLINE COMMERCIAL TRANSACTION SYSTEM AND METHOD OF OPERATION THEREOFGRANT2011-09-072004-09-1433306534GoodWaterleaf LtdWaterleaf Ltd
US9251297B20.430Semantic note taking systemGRANT2016-02-022009-01-2746048193GoodApple IncApple Inc
US20070037574A10.429Method and apparatus of a location-based network service for mutual social notificationAPPLICATION2007-02-152005-08-0937743179GoodSKINNER JOHN J JRSKINNER JOHN J JR
US20110126132A10.429SYSTEM AND METHODS OF GENERATING SOCIAL NETWORKS IN VIRTUAL SPACEAPPLICATION2011-05-262009-11-2044063013Good
US7142651B20.429Fraud detection in a distributed telecommunications networksGRANT2006-11-282001-11-2925542219GoodEctel LtdAmdocs Development Ltd
US7827592B20.429Implicit authentication to computer resources and error recoveryGRANT2010-11-022007-05-0239940528GoodInternational Business Machines CorpInternational Business Machines Corp
US10003547B20.428Monitoring computer process resource usageGRANT2018-06-192010-05-0753718925GoodZiften Technologies IncZiften Technologies Inc
US20090144272A10.428RATING RATERSAPPLICATION2009-06-042007-12-0440676798GoodGoogle LLCGoogle LLC
US8073691B20.428Method and system for screening using voice data and metadataGRANT2011-12-062005-04-2146327963GoodVictrio IncVerint Americas Inc
US20030055892A10.428Peer-to-peer group management and method for maintaining peer-to-peer graphsAPPLICATION2003-03-202001-09-1925497542GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20040267625A10.428System and method for community centric resource sharing based on a publishing subscription modelAPPLICATION2004-12-302003-06-2433539962GoodAmerica Online IncGoogle LLC, Individual
US7006999B10.427Method for enabling privacy and trust in electronic communitiesGRANT2006-02-281999-05-1326832051GoodXerox CorpXerox Corp
US20120011587A10.427SYSTEMS AND METHODS FOR ESTABLISHING TRUST BETWEEN ENTITIES IN SUPPORT OF TRANSACTIONSAPPLICATION2012-01-122010-07-0645439541GoodIpsiti IncIpsiti Inc
US7818290B20.426System to associate a demographic to a user of an electronic systemGRANT2010-10-192006-06-1438834017GoodIdentity Metrics IncAGENT SCIENCE TECHNOLOGIES Inc, Identity Metrics Inc
US20190158920A10.426SYNCHRONIZATION OF FAVORITES AND/OR RECENTLY VIEWED LISTS BETWEEN REGISTERED CONTENT PLAYBACK DEVICESAPPLICATION2019-05-232011-02-1146637859GoodSony Interactive Entertainment LLCSony Interactive Entertainment LLC
US20040184478A10.426Method of allocating a service by a first peer to a second peer in a communication networkAPPLICATION2004-09-232003-02-2732843034GoodCanon IncCanon Inc
US8621565B20.425Authentication apparatus  authentication method and computer readable information recording mediumGRANT2013-12-312011-06-0347262773GoodRicoh Co LtdRicoh Co Ltd
US20050246420A10.425Social network email filteringAPPLICATION2005-11-032004-04-2834939220GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6587755B10.424Virtual signs for improving information communicated to the automotive driverGRANT2003-07-012000-07-1224462902GoodInternational Business Machines CorpInternational Business Machines Corp
US20040122803A10.424Detect and qualify relationships between people and find the best path through the resulting social networkAPPLICATION2004-06-242002-12-1932593251GoodInternational Business Machines CorpInternational Business Machines Corp
US11128720B10.423Method and system for searching network resources to locate contentGRANT2021-09-212010-03-2566673425GoodOpen Invention Network LLCOpen Invention Network LLC
US20090265198A10.423Reputation Evalution Using a contact Information DatabaseAPPLICATION2009-10-222008-04-2240902825GoodPlaxo IncPlaxo Inc
US8392969B10.423Method and apparatus for hosting multiple tenants in the same database securely and with a variety of access modesGRANT2013-03-052009-06-1747749180GoodIntuit IncIntuit Inc
US9219815B20.423Identifier technique for communication interchangeGRANT2015-12-222006-08-1839499487GoodTriplay IncT Play Holdings LLC
US20040088586A10.422Firewall providing enhanced network security and user transparencyAPPLICATION2004-05-061996-02-2624947298Good
US9230283B10.422Card registry systems and methodsGRANT2016-01-052007-12-1445757856GoodConsumerinfo com IncConsumerinfo com Inc
US8438645B20.422Secure clock with grace periodsGRANT2013-05-072005-04-2737235971GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20100280904A10.421Social marketing and networking tool with user matching and content broadcasting / receiving capabilitiesAPPLICATION2010-11-042009-05-0143031102Good
US9183270B20.421Social genomeGRANT2015-11-102010-05-1745316067GoodWal Mart Stores IncWalmart Apollo LLC
US10168413B20.421Service enhancements using near field communicationGRANT2019-01-012011-03-2546878150GoodT Mobile USA IncT Mobile USA Inc
US6041311A0.420Method and apparatus for item recommendation using automated collaborative filteringGRANT2000-03-211995-06-3025148604GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9345427B20.420Method of using a combination vein contrast enhancer and bar code scanning deviceGRANT2016-05-242006-06-2939674654GoodAccuVein IncAccuVein Inc
US8346639B20.419Authentication of a data card using a transit verification valueGRANT2013-01-012007-02-2839714754GoodVisa USA IncVisa USA Inc
US20100332669A10.419METHOD AND APPARATUS FOR CREATING TRUSTED COMMUNICATION USING CO-EXPERIENCE DATAAPPLICATION2010-12-302009-06-3043381964GoodNokia OyjNokia Oyj
WO2005001698A10.419INFORMATION SERVER  INFORMATION DEVICE  INFORMATION PROCESSING SYSTEM  INFORMATION PROCESSING METHOD  AND INFORMATION PROCESSING PROGRAMAPPLICATION2005-01-062003-06-2533549535Good
US20060037077A10.418Network intrusion detection system having application inspection and anomaly detection characteristicsAPPLICATION2006-02-162004-08-1635801524GoodCisco Technology IncCisco Technology Inc
US20090036165A10.418Mobile Phone With Rfid Reader and Wlan Transmitter Intergrated On Sim CardAPPLICATION2009-02-052005-06-2035295109Good
US7527208B20.418Bank issued contactless payment card used in transit fare collectionGRANT2009-05-052006-12-0439493684GoodVisa USA IncVisa USA Inc
US20080107309A10.417Method and apparatus for biometric identificationAPPLICATION2008-05-082006-11-0339359779GoodCerni Consulting LLCCerni Consulting LLC
US8838082B20.417Centralized status server for call management of location-aware mobile devicesGRANT2014-09-162008-11-2642226380GoodRingCentral IncRingCentral Inc
US20060101515A10.417System and method for monitoring network trafficAPPLICATION2006-05-112004-08-1934981363GoodAT&T CorpAT&T Corp
US10453093B10.417System and method of optimizing matching of leadsGRANT2019-10-222010-04-3068241831GoodLmb Mortgage Services IncLmb Mortgage Services Inc
US8738485B20.417Contactless prepaid product for transit fare collectionGRANT2014-05-272007-12-2840799563GoodVisa USA IncVisa USA Inc
US9571652B10.416Enhanced diarization systems  media and methods of useGRANT2017-02-142005-04-2157962945GoodVerint Americas IncVerint Americas Inc
US7467402B20.415Automated login session extender for use in security analysis systemsGRANT2008-12-162004-08-2435945047GoodWhiteHat Security IncSynopsys Inc
US9113001B20.415Systems  methods  and media for disambiguating call data to determine fraudGRANT2015-08-182005-04-2147006382GoodVerint Americas IncVerint Americas Inc
US8650129B20.414Dynamically reacting policies and protections for securing mobile financial transaction data in transitGRANT2014-02-112010-01-2044278254GoodAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
US8600391B20.414Call management for location-aware mobile devicesGRANT2013-12-032008-11-2442196811GoodRingCentral IncRingCentral Inc
US8478674B10.414Application clustersGRANT2013-07-022010-11-1248671302GoodConsumerinfo com IncConsumerinfo com Inc
US9826007B20.413Method and apparatus for sharing viewing informationGRANT2017-11-212010-09-0745771564GoodHulu LLCHulu LLC
US20030218061A10.412Distributed signature verification with dynamic database of reference signaturesAPPLICATION2003-11-272002-05-2329549067GoodParascript LLCParascript LLC
US9756076B20.412Dynamically reacting policies and protections for securing mobile financial transactionsGRANT2017-09-052009-12-1744152812GoodAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
US20100212001A10.411SYSTEM AND METHOD FOR USER LOGIN TO A MULTIMEDIA SYSTEM USING A REMOTE CONTROLAPPLICATION2010-08-192009-02-1342561027GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US9818125B20.411Systems and methods for information exchange mechanisms for powered cards and devicesGRANT2017-11-142011-02-1646637645GoodDynamics IncDynamics Inc
US20090106043A10.411Method and system for identifying people who are likely to have a successful relationshipAPPLICATION2009-04-232000-08-1032230625GoodeHarmony InceHarmony Inc
US10339196B20.410Lifestream annotation method and systemGRANT2019-07-022009-01-2745997875GoodApple IncApple Inc
US6895385B10.410Method and system for ascribing a reputation to an entity as a rater of other entitiesGRANT2005-05-172000-06-0234576232GoodOpen Ratings IncOpen Ratings Inc
US20080168048A10.410User content feeds from user storage devices to a public search engineAPPLICATION2008-07-102007-01-0439595152GoodYahoo IncYahoo Inc, R2 Solutions LLC
US8386349B20.409Verification of a portable consumer device in an offline environmentGRANT2013-02-262007-02-2839714753GoodVisa USA IncVisa USA Inc
US8271285B20.409Using speaker identification and verification speech processing technologies to activate and deactivate a payment cardGRANT2012-09-182007-08-0239874958GoodInternational Business Machines CorpInternational Business Machines Corp
US7194438B20.408Electronic payment schemes in a mobile environment for short-range transactionsGRANT2007-03-202004-02-2534861551GoodNokia OyjNokia Technologies Oy
US20100242062A10.408METHOD AND APPARATUS FOR AUTHENTICATING A PLURALITY OF MEDIA DEVICES SIMULTANEOUSLYAPPLICATION2010-09-232009-03-2342738782GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US9509830B20.407System and method for controlling mobile communication devicesGRANT2016-11-292011-01-0746457160GoodBlackBerry LtdBlackBerry Ltd
US8700895B10.406System and method for operating a computing device in a secure modeGRANT2014-04-152010-06-3050441601GoodGoogle LLCGoogle LLC
US7093282B20.406Method for supporting dynamic passwordGRANT2006-08-152001-08-0925450282GoodActivCard Ireland LtdActivCard Ireland Ltd, Individual
US10728761B20.406Method  device  and system of detecting a lie of a user who inputs dataGRANT2020-07-282010-11-2961971601GoodBioCatch LtdBioCatch Ltd
US8478692B20.406Systems and methods for geographic location notifications of payment transactionsGRANT2013-07-022008-06-2641445327GoodVisa International Service AssociationVisa International Service Association
US20100074476A10.405IMAGE TAKING DEVICE  IMAGE TAKING METHOD  AND IMAGE TAKING PROGRAMAPPLICATION2010-03-252007-03-2939807986GoodFujitsu LtdFujitsu Ltd
US7797274B20.405Online content collaboration modelGRANT2010-09-142007-12-1240754557GoodGoogle LLCGoogle LLC
US8995726B20.404Apparatus and method for biometric authenticationGRANT2015-03-312007-04-0639826934GoodSeiko Epson CorpSeiko Epson Corp
US20100169971A10.404METHODS FOR USER PROFILING FOR DETECTING INSIDER THREATS BASED ON INTERNET SEARCH PATTERNS AND FORENSICS OF SEARCH KEYWORDSAPPLICATION2010-07-012008-12-2542286555GoodCheck Point Software Technologies LtdCheck Point Software Technologies Ltd
US20100114573A10.401Method and Device for Verifying a UserAPPLICATION2010-05-062008-10-3042132515GoodMotorola IncGoogle Technology Holdings LLC
US9542687B20.401Systems and methods for visual representation of offersGRANT2017-01-102008-06-2641445333GoodVisa International Service AssociationVisa International Service Association
US8908930B20.400Biometrics authentication device and methodGRANT2014-12-092010-11-0444999644GoodHitachi LtdHitachi Ltd
US7934266B20.400Contents reproduction device  contents reproduction control method  programGRANT2011-04-262004-07-2135785325GoodSony CorpSony Corp
US7461780B20.400System and method for checkless cash advance settlementGRANT2008-12-092004-09-0935457519GoodEveri Payments IncEveri Payments Inc
US20030204460A10.400Data collection and transaction initiation using a financial messaging protocolAPPLICATION2003-10-302002-04-3029254650GoodTeknowledge CorpIntuit Inc
US8204878B20.400System and method for finding unexpected  but relevant content in an information retrieval systemGRANT2012-06-192010-01-1544278304GoodYahoo IncYahoo Inc, R2 Solutions LLC
US6687703B20.399Information filtering system and information filtering methodGRANT2004-02-031997-12-2618491733GoodMatsushita Electric Industrial Co LtdPanasonic Holdings Corp, Red Hat Inc
US11354584B20.399Systems and methods for trend aware self-correcting entity relationship extractionGRANT2022-06-072010-03-2344657503GoodeBay InceBay Inc
US20040039814A10.399Method of updating interestsAPPLICATION2004-02-262000-11-2027223572GoodBritish Telecommunications PLCBritish Telecommunications PLC
US20110179119A10.398International data memorial.com ("IDM")APPLICATION2011-07-212010-01-0844278347Good
US8275110B20.398Active call filtering  screening and dispatchingGRANT2012-09-252007-09-2840508372GoodRingCentral IncRingCentral Inc
US20100274661A10.397OPTIMIZATION OF ADVERTISING CAMPAIGNS ON MOBILE NETWORKSAPPLICATION2010-10-282006-11-0137903987GoodCVON Innovations LtdApple Inc
US20100332392A10.395Portable Terminal Device and Method of Determining Communication Permission ThereofAPPLICATION2010-12-302008-01-3040912909GoodKyocera CorpKyocera Corp
US20060288041A10.393Providing community-based media item ratings to usersAPPLICATION2006-12-212005-06-2037574631GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20010032210A10.392Method and apparatus for research managementAPPLICATION2001-10-182000-01-3122655708GoodPharsight CorpPharsight Corp
US8793131B20.392Systems  methods  and media for determining fraud patterns and creating fraud behavioral modelsGRANT2014-07-292005-04-2145818672GoodVerint Americas IncVerint Americas Inc
US9400589B10.392Circular rotational interface for display of consumer credit informationGRANT2016-07-262002-05-3053279928GoodConsumerinfo com IncConsumerinfo com Inc
US20040039504A10.390Vehicle tracking  communication and fleet management systemAPPLICATION2004-02-261999-12-1923850779GoodFleet Management Services IncFleet Management Services Inc
US20060282304A10.390System and method for an electronic product advisorAPPLICATION2006-12-142005-05-0237525171GoodCNET Networks IncCBS Interactive Inc
US20030189592A10.390Systems and methods for providing self-governing online communitiesAPPLICATION2003-10-092002-04-0528673883Good
US10078868B10.389System and method for providing an aggregation toolGRANT2018-09-182007-01-3149681648GoodExperian Information Solutions LLCExperian Information Solutions LLC
US5838251A0.389Method and device for programming operating data into vehicle componentsGRANT1998-11-171995-08-317770861GoodMercedes Benz AGDaimler AG
US8396455B20.388Systems and methods for sorting alert and offer messages on a mobile deviceGRANT2013-03-122008-09-2542038181GoodVisa International Service AssociationVisa International Service Association
US20130003106A10.387PRINT CONTROL DEVICE  PRINT CONTROL METHOD  INFORMATION PROCESSING SYSTEM  INFORMATION PROCESSING APPARATUS  INFORMATION PROCESSING METHOD  AND STORAGE MEDIUMAPPLICATION2013-01-032011-06-2947390380GoodCanon IncCanon Inc
US9503571B20.386Systems  methods  and media for determining fraud patterns and creating fraud behavioral modelsGRANT2016-11-222005-04-2149958066GoodVerint Americas IncVerint Americas Inc
US8225104B10.386Data access securityGRANT2012-07-172005-10-0646465612GoodSymantec CorpCA Inc
US8312033B10.386Systems and methods for providing an integrated identifierGRANT2012-11-132008-06-2647114633GoodExperian Marketing Solutions IncExperian Information Solutions LLC
US20080098222A10.384Device with built-in user authentication and method for user authentication and identity theft protectionAPPLICATION2008-04-242004-09-2239319447GoodBekad Mgmt II LLCF Poszat HU LLC
US20070055926A10.383SYSTEMS AND METHODS FOR COLLABORATIVELY ANNOTATING ELECTRONIC DOCUMENTSAPPLICATION2007-03-082005-09-0237831320GoodFourteen40 IncFollett Higher Education Group Inc
US20130295907A10.383INFORMATION PROVIDING SERVER AND WIRELESS COMMUNICATION TERMINALAPPLICATION2013-11-072009-08-2443606190GoodHitachi LtdHitachi Ltd
US8373582B20.383Adaptive pattern recognition based controller apparatus and method and human-factored interface thereforeGRANT2013-02-121998-01-2738473267Good
US20120179909A10.382SYSTEMS AND METHODS FOR PROVIDING INDIVIDUAL ELECTRONIC DOCUMENT SECURE STORAGE  RETRIEVAL AND USEAPPLICATION2012-07-122011-01-0646456146GoodPitney Bowes IncPitney Bowes Inc
US8726009B10.381Secure messaging using a trusted third partyGRANT2014-05-132010-01-2650635792Good
US20140310095A10.381MOBILE CLICK FRAUD PREVENTIONAPPLICATION2014-10-162007-12-2140789693GoodYahoo IncYahoo Inc, Excalibur IP LLC
US20040086157A10.381Person recognizing apparatus  person recognizing method and passage controllerAPPLICATION2004-05-062002-11-0132089621GoodToshiba CorpToshiba Corp
US8949337B20.381Generation and establishment of identifiers for communicationGRANT2015-02-032006-06-3046328343GoodInvention Science Fund I LLCT Play Holdings LLC
US11269977B20.381System  apparatus  and method of collecting and processing data in electronic devicesGRANT2022-03-082010-11-2980444520GoodBioCatch LtdBioCatch Ltd
US10373198B10.380System and method of generating existing customer leadsGRANT2019-08-062008-06-1367477521GoodLower My Bills Inc, Lmb Mortgage Services IncLmb Mortgage Services Inc
US20050234877A10.380System and method for searching using a temporal dimensionAPPLICATION2005-10-202004-04-0835097512GoodInternational Business Machines CorpInternational Business Machines Corp
US20090214083A10.380VEIN AUTHENTICATION DEVICE AND VEIN AUTHENTICATION METHODAPPLICATION2009-08-272008-01-1640888748GoodSony CorpSony Corp
US20050097319A10.380System and method for managing a trusted email datastoreAPPLICATION2005-05-052003-11-0434556328GoodYahoo IncYahoo Inc, R2 Solutions LLC
US20050165715A10.379Identification of relationships in an environmentAPPLICATION2005-07-282002-02-2034794669GoodMicrosoft CorpMicrosoft Corp
US8285317B20.379Proactive application communicationsGRANT2012-10-092009-10-1643216277GoodSony Mobile Communications ABSony Corp
US20080261698A10.378Automated method and system for a gaming opportunityAPPLICATION2008-10-232007-04-1839872778GoodTechnology Assurance Labs IncTECHNOLOGY ASSURANCE LABORATORY Inc, Technology Assurance Labs Inc
US8175889B10.378Systems and methods for tracking changes of address based on service disconnect/connect dataGRANT2012-05-082005-04-0646002158GoodExperian Information Solutions LLCExperian Information Solutions LLC
US9037656B20.377Method and system for facilitating interaction with multiple content provider websitesGRANT2015-05-192010-12-2045443153GoodGoogle Technology Holdings LLCGoogle Technology Holdings LLC
US20100299292A10.377Systems and Methods for Application-Level  SecurityAPPLICATION2010-11-252009-05-1943125243GoodMariner Systems IncLAYER8 SECURITY Inc
US20120054813A10.377Immersive interactive publicationAPPLICATION2012-03-012010-07-2045698935GoodUbiquity Holdings IncPatential Holdings Inc, Ubiquity Holdings Inc
US8903859B20.376Systems  methods  and media for generating hierarchical fused risk scoresGRANT2014-12-022005-04-2146928417GoodVerint Americas IncVerint Americas Inc
US8315595B20.376Providing trusted communicationGRANT2012-11-202009-06-1043306846GoodInternational Business Machines CorpInternational Business Machines Corp
US8249903B20.374Method and system of determining and evaluating a business relationship network for forming business relationshipsGRANT2012-08-212006-10-1039275677GoodAccenture Global Services LtdAccenture Global Services Ltd
US20040267665A10.374System for providing banking services by use of mobile communicationAPPLICATION2004-12-302003-06-2433425671GoodLG Telecom LtdLG Uplus Corp
US8275899B20.374Methods  devices and computer program products for regulating network activity using a subscriber scoring systemGRANT2012-09-252008-12-2942286237GoodAT&T Intellectual Property I LPUber Technologies Inc
US8393545B10.374Cards deployed with inactivated products for activationGRANT2013-03-122009-06-2347780383GoodDynamics IncDynamics Inc
US20090070435A10.373Targeted websites based on a user profileAPPLICATION2009-03-122007-09-1040433048GoodFatdoor IncGEOTAG Inc, Raj Abhyanker Professional Corp, Nextdoor com Inc
US20070280436A10.372Method and System to Seed a Voice DatabaseAPPLICATION2007-12-062006-04-1446327962GoodVictrio IncVictrio Inc
US9710852B10.372Credit report timeline user interfaceGRANT2017-07-182002-05-3059296426GoodConsumerinfo com IncConsumerinfo com Inc
US8510215B20.371Method and system for enrolling a voiceprint in a fraudster databaseGRANT2013-08-132005-04-2143221225GoodVictrio IncVerint Americas Inc
US9241063B20.370Methods for responding to an email message by call from a mobile deviceGRANT2016-01-192007-11-0153522415GoodGoogle LLCGoogle LLC
US10593004B20.370System and methods for identifying compromised personally identifiable information on the internetGRANT2020-03-172011-02-1846653606GoodCsidentity CorpCsidentity Corp
US20050234920A10.369System  computer-usable medium and method for monitoring network activityAPPLICATION2005-10-202004-04-0535062394GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20040148434A10.369Method and apparatus for peer-to peer accessAPPLICATION2004-07-292003-01-2432735752GoodHitachi LtdHitachi Ltd
US9678933B10.368Methods for auto-completing contact entry on mobile devicesGRANT2017-06-132007-11-0150635803GoodGoogle LLCGoogle LLC
US20040122696A10.368Collaborative information spacesAPPLICATION2004-06-242002-12-2332601088GoodSAP SE SAP SE
US8407290B20.368Dynamic data sharing using a collaboration-enabled web browserGRANT2013-03-262009-08-3143626453GoodInternational Business Machines CorpInternational Business Machines Corp
US8370330B20.368Predicting content and context performance based on performance history of usersGRANT2013-02-052010-05-2845022940GoodApple IncApple Inc
US8869194B20.367Methods  computer program products  and apparatus for providing targeted content based on user dataGRANT2014-10-212008-08-2641727268GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US20050013298A10.367Policy based network address translationAPPLICATION2005-01-202003-05-2833490680GoodCaymas Systems IncCitrix Systems Inc
US8600121B20.367Face recognition system and methodGRANT2013-12-032008-07-0241465533GoodC True LtdC-TRUE Ltd, C True Ltd
US20120110568A10.366Viral Application DistributionAPPLICATION2012-05-032010-10-2945998109GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20020046105A10.365Communicating with a computer based on the offline purchase history of a particular consumerAPPLICATION2002-04-181998-12-3026812220GoodSuperMarkets Online IncCatalina Marketing Corp
US20090089678A10.365SYSTEM AND METHOD FOR CREATING TOPIC NEIGHBORHOOD VISUALIZATIONS IN A NETWORKED SYSTEMAPPLICATION2009-04-022007-09-2840509593GoodeBay InceBay Inc
US7991740B20.364Synchronization server processGRANT2011-08-022008-03-0440651459GoodApple IncApple Inc
US20090294526A10.363TESTING CAPABILITY ALLOWING NEW DATA TAGSAPPLICATION2009-12-032008-05-2741377547GoodVisa USA IncVisa USA Inc
US20080101572A10.362METHOD AND SYSTEM FOR VERIFYING TELEPHONE NUMBERS ACROSS SERVICE PROVIDERSAPPLICATION2008-05-012006-10-2639330174GoodInternational Business Machines CorpInternational Business Machines Corp
US6691106B10.361Profile driven instant web portalGRANT2004-02-102000-05-2330771357GoodIntel CorpIntel Corp
US20050229000A10.361Individual authentication method using input characteristic of input apparatus by network  program thereof  and recording medium containing the programAPPLICATION2005-10-132002-02-1527678136GoodScience Park CorpScience Park Corp
US20120311695A10.360METHOD AND APPARATUS FOR DYNAMIC MODIFICATION OF AUTHENTICATION REQUIREMENTS OF A PROCESSING SYSTEMAPPLICATION2012-12-062011-05-3147259706GoodIntel CorpIntel Corp
US9319360B20.360Systems and methods for prefetching relevant information for responsive mobile email applicationsGRANT2016-04-192007-11-0153522312GoodGoogle LLCGoogle LLC
US20030115251A10.360Peer data protocolAPPLICATION2003-06-192001-02-2327732479GoodHORIZON A GLIMPSE OF TOMORROWHORIZON A GLIMPSE OF TOMORROW
US8949361B20.360Methods for truncating attachments for mobile devicesGRANT2015-02-032007-11-0150240482GoodGoogle LLCGoogle LLC
US20080203170A10.359FRAUD PREVENTION FOR TRANSIT FARE COLLECTIONAPPLICATION2008-08-282007-02-2839714762GoodVisa USA IncVisa USA Inc
US6209104B10.359Secure data entry and visual authentication system and methodGRANT2001-03-271996-12-1026709321GoodAccullink IncAccullink Inc
US20040145773A10.359Message authorization system and methodAPPLICATION2004-07-292003-01-2932736210GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US7974446B20.359Face authentication system and face authentication methodGRANT2011-07-052006-06-2938876699GoodKonica Minolta IncKonica Minolta Inc
US8214762B20.359Presenting information regarding selected itemsGRANT2012-07-032008-05-3041381412GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6681331B10.359Dynamic software system intrusion detectionGRANT2004-01-201999-05-1123199550GoodCylant IncStrataCloud Inc
US20080046976A10.358Systems and methods for dynamically generating a privacy summaryAPPLICATION2008-02-212006-07-2539102864GoodFacebook IncMeta Platforms Inc
US20060116926A10.358Method and system for internet publishing and advertising forumsAPPLICATION2006-06-012004-11-2736568384Good
US8554854B20.357Systems and methods for identifying terms relevant to web pages using social network messagesGRANT2013-10-082009-12-1144144108GoodCitizenNet IncCitizenNet Inc
US9497147B20.357Systems and methods for supporting downloadable applications on a portable client deviceGRANT2016-11-152007-11-0240589462GoodGoogle LLCGoogle LLC
US9508092B10.356Systems and methods for providing a direct marketing campaign planning environmentGRANT2016-11-292007-01-3149681641GoodExperian Information Solutions LLCExperian Information Solutions LLC
US7793851B20.355Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit cardGRANT2010-09-142005-05-0939028194GoodDynamics IncDynamics Inc
US6951302B20.355System and method for performing a quasi-cash transactionGRANT2005-10-042003-03-0632927039GoodCash Systems IncEveri Payments Inc
US10572556B20.355Systems and methods for facilitating enhancements to search results by removing unwanted search resultsGRANT2020-02-252011-05-0147068761Good
US20100332845A10.354INFORMATION PROCESSING SERVER  INFORMATION PROCESSING APPARATUS  AND INFORMATION PROCESSING METHODAPPLICATION2010-12-302009-06-2943382070GoodSony CorpSony Corp
US9208502B20.354Sentiment analysisGRANT2015-12-082011-01-2045607363GoodIPC Systems IncIPC Systems Inc
US20100023204A10.353POWER MANAGEMENT SYSTEMAPPLICATION2010-01-282008-07-2441569386GoodIntelligent Mechatronic Systems IncE-LANE SYSTEMS Inc, Appy Risk Technologies Ltd
US9152928B20.352Context parameters and identifiers for communicationGRANT2015-10-062006-06-3046328462GoodTriplay IncT Play Holdings LLC
US20090006846A10.352Bluetooth device as security access keyAPPLICATION2009-01-012007-06-2740162187GoodApple IncApple Inc
US10897482B20.352Method  device  and system of back-coloring  forward-coloring  and fraud detectionGRANT2021-01-192010-11-2968385586GoodBioCatch LtdBioCatch Ltd
US8549077B20.351Usage parameters for communication contentGRANT2013-10-012006-06-3046328359GoodInvention Science Fund I LLCT Play Holdings LLC
US20100241498A10.351DYNAMIC ADVERTISING PLATFORMAPPLICATION2010-09-232009-03-1942738448GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20060058958A10.350Proximity search methods using tiles to represent geographical zonesAPPLICATION2006-03-162004-09-1436035209GoodFriendster IncMeta Platforms Inc, Individual
US20040210525A10.350Billing system for verifying billing informationAPPLICATION2004-10-212003-04-1633158759GoodUNITED TELEMANAGEMENT CorpUNITED TELEMANAGEMENT Corp
US9563916B10.349System and method for generating a finance attribute from tradeline dataGRANT2017-02-072006-10-0544730031GoodExperian Information Solutions LLCExperian Information Solutions LLC
US8561894B10.349Powered cards and devices designed  programmed  and deployed from a kioskGRANT2013-10-222010-10-2049355130GoodDynamics IncDynamics Inc
US8990318B20.349Message focusingGRANT2015-03-242010-12-1546235847GoodApple IncApple Inc
US5537586A0.348Enhanced apparatus and methods for retrieving and selecting profiled textural information records from a database of defined category structuresGRANT1996-07-161992-04-3025367454GoodIndividual IncThomson Reuters Global Resources ULC
US8549086B20.348Data clusteringGRANT2013-10-012010-12-1546235846GoodApple IncApple Inc
US20020156917A10.347Method for providing an attribute bounded network of computersAPPLICATION2002-10-242001-01-1127556466GoodGeosign CorpTrueLocal Inc
US8751588B20.346Message thread clusteringGRANT2014-06-102010-12-1546235848GoodApple IncApple Inc
US20070117557A10.346Parametric user profilingAPPLICATION2007-05-242005-11-2138054198GoodConopco IncConopco Inc
US20050198131A10.346Passively populating a participant list with known contactsAPPLICATION2005-09-082004-03-0538620738GoodAmerica Online IncVerizon Patent and Licensing Inc
US8214262B10.346System and method of enhancing leadsGRANT2012-07-032006-12-0442555859GoodLower My Bills IncLmb Mortgage Services Inc, Lower My Bills Inc
US6260069B10.346Direct data retrieval in a distributed computing systemGRANT2001-07-101998-02-1021804587GoodInternational Business Machines CorpInternational Business Machines Corp
US8930261B20.344Method and system for generating a fraud risk score using telephony channel based audio and non-audio dataGRANT2015-01-062005-04-2143220220GoodVerint Americas IncVerint Americas Inc
US7543741B20.343System  method and program product for credit card transaction validationGRANT2009-06-092005-06-1337523259Good
US6026491A0.343Challenge/response security architecture with fuzzy recognition of long passwordsGRANT2000-02-151997-09-3025475598GoodCompaq Computer CorpHewlett Packard Development Co LP
US11113299B20.342System and method for metadata transfer among search entitiesGRANT2021-09-072009-12-0168161807GoodApple IncApple Inc
US20020107721A10.342Story-based organizational assessment and effect systemAPPLICATION2002-08-082000-10-2426669717GoodInternational Business Machines CorpInternational Business Machines Corp
US9324234B20.341Vehicle comprising multi-operating systemGRANT2016-04-262010-10-0148430173GoodAutoConnect Holdings LLCAutoConnect Holdings LLC
US9053231B20.341Systems and methods for analyzing operations in a multi-tenant database system environmentGRANT2015-06-092010-06-0745065312GoodSalesforce com IncSalesforce com Inc
US20040068527A10.340Method and apparatus for facilitating use of hypertext links on the World Wide WebAPPLICATION2004-04-081998-10-0532044839GoodGula Consulting LLCGula Consulting LLC
US20020049848A10.340Updatable digital media system and method of use thereofAPPLICATION2002-04-252000-06-1226905846Good
US7536637B10.339Method and system for the utilization of collaborative and social tagging for adaptation in web portalsGRANT2009-05-192008-02-0740636086GoodInternational Business Machines CorpInternational Business Machines Corp
US8869193B20.339Methods  computer program products  and apparatus for receiving targeted content based on locally stored user dataGRANT2014-10-212008-08-2641727266GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US20060259320A10.339TRANSITIVE TRUST NETWORKAPPLICATION2006-11-162001-08-3025483137GoodAccenture Global Services GmbHAccenture Global Services Ltd
US20100305946A10.338SPEAKER VERIFICATION-BASED FRAUD SYSTEM FOR COMBINED AUTOMATED RISK SCORE WITH AGENT REVIEW AND ASSOCIATED USER INTERFACEAPPLICATION2010-12-022005-04-2143221220GoodVictrio IncVictrio Inc
US20070233828A10.338METHODS AND SYSTEMS FOR PROVIDING DATA STORAGE AND RETRIEVALAPPLICATION2007-10-042006-03-3138560726Good
US20040225577A10.337System and method for measuring rating reliability through rater prescienceAPPLICATION2004-11-112001-10-1823355463GoodTRANSPOSE LLCTRANSPOSE LLC
US7550707B20.336Biometrics authentication system with authentication based upon multiple layersGRANT2009-06-232007-03-0139732695GoodSony CorpSony Corp
US20090171799A10.336WIRELESS POINT-OF-SALE TRANSACTION SYSTEM AND METHODAPPLICATION2009-07-022004-02-0434808584GoodIO Controls CorpIO Controls Corp
US7363492B20.335Method for zero-knowledge authentication of a prover by a verifier providing a user-selectable confidence level and associated application devicesGRANT2008-04-222005-02-2536933144GoodMotorola IncGoogle Technology Holdings LLC
US8620927B20.335Unguided curiosity in support of entity resolution techniquesGRANT2013-12-312010-06-2845352617GoodInternational Business Machines CorpInternational Business Machines Corp
US20070057038A10.334Wireless devices for storing a financial account card and methods for storing card data in a wireless deviceAPPLICATION2007-03-152005-09-1537854060GoodCapital One Financial CorpCapital One Services LLC
US8473517B20.333Privacy-sensitive cooperative location namingGRANT2013-06-252009-09-1843757524GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20100205057A10.333PRIVACY-SENSITIVE METHODS  SYSTEMS  AND MEDIA FOR TARGETING ONLINE ADVERTISEMENTS USING BRAND AFFINITY MODELINGAPPLICATION2010-08-122009-02-0642541173GoodMedia6Degrees IncDstillery Inc
US20050154671A10.333Systems and methods for mitigating identity theft associated with use of credit and debit cardsAPPLICATION2005-07-142004-01-0834739279GoodInternational Business Machines CorpInternational Business Machines Corp
US20090023474A10.332TOKEN-BASED DYNAMIC AUTHORIZATION MANAGEMENT OF RFID SYSTEMSAPPLICATION2009-01-222007-07-1840260295GoodMotorola IncInternational Business Machines Corp, Motorola Mobility LLC
US7786935B20.332Method and system for inferring a location of a mobile computing deviceGRANT2010-08-312007-01-0739593803GoodConnectSoft IncConnectSoft Inc
US20060272015A10.331Virtual devices and virtual bus tunnels  modules and methodsAPPLICATION2006-11-302005-05-2637464984GoodIntellectual Ventures I LLCIntellectual Ventures I LLC
US8245242B20.331Systems and methods for managing policies on a computerGRANT2012-08-142004-07-0935542790GoodQuest Software IncQuest Software Inc
US20090300355A10.331Information Sharing Method and ApparatusAPPLICATION2009-12-032008-05-2839616141GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9065793B20.331Rendering web content using pre-cachingGRANT2015-06-232011-02-2446719852GoodCBS Interactive IncCBS Interactive Inc
US10621657B20.330Systems and methods of credit information reportingGRANT2020-04-142008-11-0542132630GoodConsumerinfo com IncConsumerinfo com Inc
US6360222B10.330Method and system thereof for organizing and updating an information directory based on relationships between usersGRANT2002-03-191998-05-0622117218GoodOracle CorpOracle International Corp
US7120681B20.329Cluster control in network systemsGRANT2006-10-102001-01-308176335GoodInternational Business Machines CorpInternational Business Machines Corp
US8504550B20.327Social network message categorization systems and methodsGRANT2013-08-062009-05-1543069347GoodCitizenNet IncCitizenNet Inc
US20110154434A10.327Utilizing Location Information to Minimize User Interaction Required for Authentication on a DeviceAPPLICATION2011-06-232009-12-2144153089GoodPalm IncQualcomm Inc
US20080159383A10.326Tagboard for video taggingAPPLICATION2008-07-032006-12-2739583948GoodYahoo IncOath Inc
US20090024629A10.326ACCESS CONTROL DEVICE AND METHOD THEREOFAPPLICATION2009-01-222007-07-1740265695GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20110265167A10.326MULTIFUNCTION APPARATUS  AUTHENTICATION SERVER  AND MULTIFUNCTION APPARATUS CONTROL SYSTEMAPPLICATION2011-10-272010-04-2644816920GoodSharp CorpSharp Corp
US20050125307A10.325Approach for estimating user ratings of itemsAPPLICATION2005-06-092000-04-2834860805GoodNetflix IncNetflix Inc
US20080175448A10.325Face authentication system and face authentication methodAPPLICATION2008-07-242007-01-1939641251GoodKonica Minolta IncKonica Minolta Inc
US20060168022A10.322Method and system for processing a communication based on trust that the communication is not unwanted as assigned by a sending domainAPPLICATION2006-07-272004-12-0936698233GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10586279B10.320Automated analysis of data to generate prospect notifications based on trigger eventsGRANT2020-03-102004-09-2250692335GoodExperian Information Solutions LLCExperian Information Solutions LLC
US7124353B20.320System and method for calculating a user affinityGRANT2006-10-172002-01-1428044938GoodInternational Business Machines CorpAwemane Ltd
US8523059B10.320Advanced payment options for powered cards and devicesGRANT2013-09-032009-10-2049034533GoodDynamics IncDynamics Inc
US20060248019A10.320Method and system to detect fraud using voice dataAPPLICATION2006-11-022005-04-2137235631GoodVerint Americas IncVerint Americas Inc
US9015141B20.319Methods  apparatus  and articles of manufacture to measure search resultsGRANT2015-04-212011-02-0846601380GoodNielsen Co US LLCTNC US Holdings Inc
US20060190475A10.319Group polling for consumer reviewAPPLICATION2006-08-242004-12-2036602279GoodYahoo IncOath Inc
US20040073659A10.319Method and apparatus for managing nodes in a networkAPPLICATION2004-04-152002-10-1532069169GoodAlcatel Canada IncNokia Canada Inc
US20050100198A10.318Authentication device  authentication system  and sensorAPPLICATION2005-05-122003-11-1034544525GoodFujitsu LtdFujitsu Ltd
US20070038118A10.318Subcutaneous tissue imagerAPPLICATION2007-02-152005-08-1037027273GoodAvago Technologies General IP Singapore Pte Ltd, Avago Technologies ECBU IP Singapore Pte LtdAvago Technologies International Sales Pte Ltd
US6366907B10.318Real-time search engineGRANT2002-04-021999-12-1523844756GoodNapster IncMoon Glow Series 82 Of Allied Security Trust I
US11106677B20.316System and method of removing duplicate user recordsGRANT2021-08-312006-11-2841581409GoodLower My Bills Inc, Lmb Mortgage Services IncLmb Mortgage Services Inc
US20090254628A10.316Method  System And Apparatus For Instant MessagingAPPLICATION2009-10-082006-12-1939405608GoodTencent Technology Shenzhen Co LtdTencent Technology Shenzhen Co Ltd
US20090125518A10.315Collaborative AuthoringAPPLICATION2009-05-142007-11-0940624726GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20090100511A10.315METHOD AND APPARATUS FOR USE IN PERSONALIZING IDENTIFICATION TOKENAPPLICATION2009-04-162007-10-1040535508GoodMastercard International IncMastercard International Inc
US9104670B20.315Customized search or acquisition of digital media assetsGRANT2015-08-112010-07-2145494417GoodApple IncApple Inc
US8511574B10.315Advanced loyalty applications for powered cards and devicesGRANT2013-08-202009-08-1748952064GoodDynamics IncDynamics Inc
US20120011103A10.314SYSTEM AND METHOD FOR PROVIDING SEARCH SERVICEAPPLICATION2012-01-122010-07-0945439311GoodNHN CorpNHN Corp
US8320643B20.314Face authentication deviceGRANT2012-11-272006-12-1339511643GoodPanasonic CorpPanasonic Corp
US20110246301A10.314METHODS TO ACCESS PRODUCT PLACEMENT DATAAPPLICATION2011-10-062010-03-3144710749GoodNCR CorpNCR Corp
US20060029015A10.313Method for identification using bluetooth wireless keyAPPLICATION2006-02-092004-08-0535757303GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US8806325B20.313Mode identification for selective document content presentationGRANT2014-08-122009-11-1844012233GoodApple IncApple Inc
US20130297453A10.312System and Method for Listing Items OnlineAPPLICATION2013-11-072008-06-0341397665GoodJust Parts Online IncJust Parts Online Inc
US20040003283A10.312Spam detector with challengesAPPLICATION2004-01-012002-06-2629717922GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8682140B20.311Playback device  content distribution system  playback method  computer program and integrated circuitGRANT2014-03-252010-03-2644672800GoodPanasonic CorpSovereign Peak Ventures LLC
US8875007B20.310Creating and modifying an image wiki pageGRANT2014-10-282010-11-0846020811GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8751520B10.309Query suggestions with high utilityGRANT2014-06-102010-06-2350845564GoodGoogle LLCGoogle LLC
US8266081B20.309Parameter controlling apparatus and multistage collation apparatusGRANT2012-09-112008-10-0341557517GoodFujitsu LtdFujitsu Ltd
US20090199106A10.309COMMUNICATION TERMINAL INCLUDING GRAPHICAL BOOKMARK MANAGERAPPLICATION2009-08-062008-02-0539872574GoodSony Ericsson Mobile Communications ABSony Mobile Communications AB
US8645469B20.308Method  apparatus and computer program product for constructing topic structure in instance message meetingGRANT2014-02-042007-02-0239677095GoodInternational Business Machines CorpAirbnb Inc
US8458656B10.308Systems and methods for providing mobile browser access to mobile device functionalitiesGRANT2013-06-042008-08-2548484465GoodUnited Services Automobile Association USAAUnited Services Automobile Association USAA
US8290541B20.307Integrated instant messaging and web browsing client and related methodsGRANT2012-10-162006-09-0639153322GoodMicrofolio Data LLCGula Consulting LLC
US20130024813A10.307METHOD  SYSTEM  AND MEANS FOR EXPRESSING RELATIVE SENTIMENTS TOWARDS SUBJECTS AND OBJECTS IN AN ONLINE ENVIRONMENTAPPLICATION2013-01-242011-07-1847556720Good
US10504105B20.304Systems and methods for cards and devices operable to communicate to touch sensitive displaysGRANT2019-12-102010-05-1844971676GoodDynamics IncDynamics Inc
US10402141B20.304Method for application extension and image display apparatus using sameGRANT2019-09-032010-07-0645441374GoodLG Electronics IncLG Electronics Inc
US20020087460A10.303Method for identity theft protectionAPPLICATION2002-07-042001-01-0426713902Good
US9672471B20.303Systems  devices  and methods for detecting occlusions in a biological subject including spectral learningGRANT2017-06-062007-12-1841342602GoodGearbox LLCGearbox LLC
US20060204057A10.301Digital image adjustable compression and resolution using face detection informationAPPLICATION2006-09-142003-06-2636970940GoodFotonation Vision LtdFotonation Ltd
US20120300989A10.300IMAGING DEVICE  BIOMETRIC AUTHENTICATION DEVICE  ELECTRONIC EQUIPMENTAPPLICATION2012-11-292011-05-2647219251GoodSeiko Epson CorpSeiko Epson Corp
US9135358B20.299Result types for conditional data displayGRANT2015-09-152010-10-2045973842GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20080132243A10.298DEVICE AND METHOD FOR PROVIDING LOCATION INFORMATION ON A PORTABLE MOBILE COMMUNICATIONS DEVICEAPPLICATION2008-06-052006-11-3038870597GoodSony Ericsson Mobile Communications ABSony Mobile Communications AB
US20020152237A10.297System and method for providing customized web pagesAPPLICATION2002-10-172000-05-2426901545GoodClickFox LLCIgnite Enterprise Software Solutions Inc
US20120194662A10.296METHOD AND SYSTEM FOR MULTISPECTRAL PALMPRINT VERIFICATIONAPPLICATION2012-08-022011-01-2846577056GoodHong Kong Polytechnic University HKPUHong Kong Polytechnic University HKPU
US20100017209A10.296RANDOM VOICEPRINT CERTIFICATION SYSTEM  RANDOM VOICEPRINT CIPHER LOCK AND CREATING METHOD THEREFORAPPLICATION2010-01-212006-12-0739547491GoodTop Digital Co LtdTop Digital Co Ltd
US20050198290A10.295Content distribution overlay network and methods for operating same in a P2P networkAPPLICATION2005-09-082003-06-0433511753GoodSony Computer Entertainment IncSony Interactive Entertainment Inc, Sony Network Entertainment Platform Inc
US9798822B20.293Location based grouping of browsing historiesGRANT2017-10-242010-06-2945353506GoodApple IncApple Inc
US9306666B10.293Programming protocols for powered cards and devicesGRANT2016-04-052009-10-0855589136GoodDynamics IncDynamics Inc
US20110154467A10.293TOKENIZED DATA SECURITYAPPLICATION2011-06-232009-12-1844153110GoodSabre IncSabre GLBL Inc
US7243109B20.292Scheme for creating a ranked subject matter expert indexGRANT2007-07-102004-01-2034794787GoodXerox CorpIII Holdings 6 LLC
US8187182B20.292Sensor fusion for activity identificationGRANT2012-05-292008-08-2941721986GoodDP Technologies IncHuawei Technologies Co Ltd
US20070028000A10.291Content router processingAPPLICATION2007-02-012005-07-1437661574GoodYahoo IncOath Inc
US20050117783A10.291Large volume face recognition apparatus and methodAPPLICATION2005-06-022003-12-0234617428GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20110231416A10.290Analyzing script for scanning mass internet contentAPPLICATION2011-09-222010-03-2244648049Good
US8386454B20.289Systems and methods for providing advanced search result page contentGRANT2013-02-262009-09-2043757506GoodYahoo IncYahoo Inc, R2 Solutions LLC
US8121895B20.287Method and system for delivering electronic communicationsGRANT2012-02-212005-07-2137680212GoodAdknowledge IncNokia of America Corp, Adknowledge Inc
US8799798B20.287Method and system for handwriting-based launch of an applicationGRANT2014-08-052010-06-0945097099GoodFujitsu LtdFujitsu Ltd
US20110258223A10.287VOICE-BASED MOBILE SEARCH APPARATUS AND METHODAPPLICATION2011-10-202010-04-1444789008GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US20150294016A10.286SYSTEM  METHOD AND COMPUTER PROGRAM FOR PREPARING DATA FOR ANALYSISAPPLICATION2015-10-152010-07-0845439327GoodPatent Analytics Holding Pty LtdPatent Analytics Holding Pty Ltd
US20090161920A10.285Biometric information acquisition apparatus  image acquisition apparatus  and electronic equipmentAPPLICATION2009-06-252007-12-2540788686GoodHitachi Maxell LtdMaxell Holdings Ltd
US10691755B20.283Organizing search results based upon clustered contentGRANT2020-06-232010-06-1145097038GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US10212486B20.283Elementary bitstream cryptographic material transport systems and methodsGRANT2019-02-192009-12-0444082023GoodDivx LLCDivx LLC
US20070098230A10.281Authentication system  registration system  and programAPPLICATION2007-05-032005-10-2837996337GoodKonica Minolta IncKonica Minolta Inc
US8326866B10.280Using geographic data to identify correlated geographic synonymsGRANT2012-12-042006-10-2444773409GoodGoogle LLCGoogle LLC
US20050163135A10.279Method for improving peer to peer network communicationAPPLICATION2005-07-282004-01-2334795209GoodTiversa IncKroll Information Assurance LLC
US20090030943A10.279SYSTEM AND METHOD FOR PROCESSING DATA RECORDS IN A MEDIATION SYSTEMAPPLICATION2009-01-292005-06-0635064598GoodComptel CorpComptel Corp
US8731251B20.278Method of matching  biometric matching apparatus  and computer programGRANT2014-05-202011-03-0243901130GoodPrecise Biometrics ABPrecise Biometrics AB
US8788927B20.278System and method for displaying web page contentGRANT2014-07-222011-02-2446719851GoodCBS Interactive IncCBS Interactive Inc
US9613142B20.277Method and system for providing the download of transcoded filesGRANT2017-04-042010-04-2644816679GoodFlash Networks LtdFlash Networks Ltd
US9805085B20.276Locating ambiguities in dataGRANT2017-10-312011-07-2546717712GoodBoeing CoBoeing Co
US8392435B10.274Query suggestions for a document based on user historyGRANT2013-03-052010-04-1447749133GoodGoogle LLCGoogle LLC
US20050080655A10.273System and model for performance value based collaborative relationshipsAPPLICATION2005-04-142003-10-0934422556GoodGM Global Technology Operations LLCGM Global Technology Operations LLC
US20120035990A10.272SYSTEM AND METHOD FOR REWARDING APPLICATION INSTALLSAPPLICATION2012-02-092010-08-0645556811GoodTapjoy IncTapjoy Inc
US20060004628A10.271Adjusting ad costs using document performance or document collection performanceAPPLICATION2006-01-052004-06-3035515152GoodGoogle LLCGoogle LLC
US8463003B20.270Biometric information acquisition apparatus  biometric authentication apparatus  light guide  and image acquisition apparatusGRANT2013-06-112008-12-0842242542GoodHitachi Maxell LtdMaxell Ltd
US20020194256A10.270Limiting request propagation in a distributed file systemAPPLICATION2002-12-192001-05-3125358926GoodIntel CorpIntel Corp
US8793157B20.269Information providing device  method of processing reward payment  reward payment processing program  and recording medium with reward payment processing program recorded thereonGRANT2014-07-292010-06-2945402057GoodRakuten IncRakuten Group Inc
US20080317293A10.268Finger vein authentication apparatus and information processing apparatusAPPLICATION2008-12-252007-06-2240136517GoodHitachi LtdHitachi Ltd
US20030123713A10.267Face recognition system and methodAPPLICATION2003-07-032001-12-1732680710GoodGenex Technologies IncTechnest Holdings Inc
US10693263B10.266Systems and methods for audio connectors for powered cards and devicesGRANT2020-06-232010-03-1671105050GoodDynamics IncDynamics Inc
US11250499B20.266Generating optimal strategy for providing offersGRANT2022-02-152011-07-2947598055GoodFair Isaac CorpFair Isaac Corp
US20120047574A10.264TERMINAL AND METHOD FOR RECOGNIZING MULTI USER INPUTAPPLICATION2012-02-232010-08-2345595124GoodPantech Co LtdPantech Co Ltd
US8393546B10.264Games  prizes  and entertainment for powered cards and devicesGRANT2013-03-122009-10-2547780384GoodDynamics IncDynamics Inc
US9734197B20.263Determining corresponding terms written in different formatsGRANT2017-08-152000-07-0634422117GoodGoogle LLCGoogle LLC
US8903793B20.263System and method for speech-based incremental searchGRANT2014-12-022009-12-1544144035GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US20090193053A10.262INFORMATION MANAGEMENT SYSTEMAPPLICATION2009-07-302008-01-2940900292Good
US8484179B20.262On-demand search result detailsGRANT2013-07-092008-12-0842232189GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20030084439A10.261Incentive system for distributing software over a computer networkAPPLICATION2003-05-012001-10-0423276667GoodAccretive Technology Group IncAccretive Technology Group Inc
US20090299864A10.261SYSTEMS AND METHODS OF PAYMENT ACCOUNT ACTIVATIONAPPLICATION2009-12-032008-05-2841380953GoodFirst Data CorpFirst Data Corp
US8626681B10.261Training a probabilistic spelling checker from structured dataGRANT2014-01-072011-01-0449840983GoodGoogle LLCGoogle LLC
US20070116330A10.258LIVING-TISSUE PATTERN DETECTING METHOD  LIVING-TISSUE PATTERN DETECTING DEVICE  BIOMETRIC AUTHENTICATION METHOD  AND BIOMETRIC AUTHENTICATION DEVICEAPPLICATION2007-05-242002-05-0929422383GoodSony CorpSony Corp
US20060085297A10.257Customer interaction with inventory via RFIDAPPLICATION2006-04-202004-10-1436181932GoodInternational Business Machines CorpInternational Business Machines Corp
US8931703B10.256Payment cards and devices for displaying barcodesGRANT2015-01-132009-03-1652247675GoodDynamics IncDynamics Inc
US8204476B20.253Portable telephone and electronic deviceGRANT2012-06-192006-03-2438533494GoodSony CorpSony Corp
US20070100514A10.253Remote control of conveyance and appliance functionsAPPLICATION2007-05-032005-11-0237997570Good
US6285999B10.246Method for node ranking in a linked databaseGRANT2001-09-041997-01-1026673538GoodLeland Stanford Junior UniversityLeland Stanford Junior University, Google LLC
US9582533B20.246Content reproduction device  control method for content reproduction device  control program  and recording mediumGRANT2017-02-282010-06-0845097958GoodSharp CorpSharp Corp
US9471565B20.245System and method for locating bilingual web sitesGRANT2016-10-182011-07-2947597954GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US20060259733A10.243Methods and apparatus for resource management in a logically partitioned processing environmentAPPLICATION2006-11-162005-05-1336659824GoodSony Computer Entertainment IncSony Interactive Entertainment Inc, Sony Network Entertainment Platform Inc, International Business Machines Corp
US5517617A0.243Automatic assignment of addresses in a computer communications networkGRANT1996-05-141994-06-2923021969GoodDigital Equipment CorpEnterasys Networks Inc
US20110126117A10.243REMOTE COMPUTER CONTROL DEVICE USING VEHICLE TERMINAL AND METHOD THEREOFAPPLICATION2011-05-262009-11-2444063003GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US8812631B20.242Method and arrangement for operating a computer clusterGRANT2014-08-192011-05-1147142641GoodInternational Business Machines CorpInternational Business Machines Corp
US8688688B10.241Automatic derivation of synonym entity namesGRANT2014-04-012011-07-1450348977GoodGoogle LLCGoogle LLC
US9335920B20.238Remote control apparatus  remote control system  information processing method of remote control apparatus  and programGRANT2016-05-102009-11-2443607899GoodSony CorpSaturn Licensing LLC
US9329619B10.236Cards with power managementGRANT2016-05-032009-04-0655807459GoodDynamics IncDynamics Inc
US7784687B20.235Payment cards and devices with displays  chips  RFIDS  magnetic emulators  magnetic decoders  and other componentsGRANT2010-08-312007-12-2440787420GoodDynamics IncDynamics Inc
US20050204158A10.234Login management techniqueAPPLICATION2005-09-152004-03-1534836483GoodFujitsu LtdFujitsu Ltd
US8903527B20.231Apparatus and method for reproducing multi-sound channel contents using DLNA in mobile terminalGRANT2014-12-022009-11-0943970504GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20060110029A10.225Pattern recognizing method and apparatusAPPLICATION2006-05-252004-11-2236460975GoodHitachi LtdHitachi Ltd
US20020184091A10.224Vehicle radio system with customized advertisingAPPLICATION2002-12-052001-05-3025355252GoodMotors Liquidation CoGeneral Motors LLC
US20070061882A10.224Instance based learning framework for effective behavior profiling and anomaly intrusion detectionAPPLICATION2007-03-152005-09-1337856888GoodHoneywell International IncHoneywell International Inc
US6526440B10.223Ranking search results by reranking the results based on local inter-connectivityGRANT2003-02-252001-01-3025092610GoodGoogle LLCGoogle LLC
US9953039B20.223Method and system for providing a compact graphical user interface for flexible filtering of dataGRANT2018-04-242011-07-1947556715GoodDisney Enterprises IncDisney Enterprises Inc
US8898155B20.222Personalized meta-search method and application terminal thereofGRANT2014-11-252010-06-1142804799GoodZTE CorpZTE Corp
US9372619B20.221Display apparatus and method thereofGRANT2016-06-212010-01-1544277275GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20080075332A10.221Finger vein pattern inputting deviceAPPLICATION2008-03-272006-09-2539225008GoodHitachi LtdHitachi Industry and Control Solutions Co Ltd
US20120191569A10.219AUTOMATIC DETECTION AND USE OF MOBILE PAYMENT APPLICATIONSAPPLICATION2012-07-262011-01-2146544886GoodeBay IncPayPal Inc
US10430045B20.213Method for creating short message and portable terminal using the sameGRANT2019-10-012009-03-3142784923GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US7523099B10.213Category suggestions relating to a searchGRANT2009-04-212004-12-3040550473GoodGoogle LLCGoogle LLC
US9247312B20.212Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocolGRANT2016-01-262011-01-0546380759GoodSonic IP IncDivx LLC
US10095970B10.211Cards including anti-skimming devicesGRANT2018-10-092011-01-3163685451GoodDynamics IncDynamics Inc
US20120116609A10.206SYSTEM AND METHOD FOR PROVIDING VEHICLE DIAGNOSTIC SERVICEAPPLICATION2012-05-102010-11-1045971302GoodHyundai Motor Co, Kia Motors CorpHyundai Motor Co, Kia Corp
US7529739B20.206Temporal ranking scheme for desktop searchingGRANT2009-05-052005-08-1937768370GoodGoogle LLCGoogle LLC
US6556196B10.206Method and apparatus for the processing of imagesGRANT2003-04-291999-03-198237823GoodMax Planck Gesellschaft zur Foerderung der Wissenschaften eVMax Planck Gesellschaft zur Foerderung der Wissenschaften eV
US20080137856A10.205METHOD FOR GENERATING INDIRECT TRUST BINDING BETWEEN PEERS IN PEER-TO-PEER NETWORKAPPLICATION2008-06-122006-12-0639498050GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US10028676B20.201Hyperspectral technology for assessing and treating diabetic foot and tissue diseaseGRANT2018-07-242005-04-0437743413GoodHypermed Imaging IncHypermed Imaging Inc
US20120231738A10.195ENHANCING VEHICLE INFOTAINMENT SYSTEMS BY ADDING REMOTE SENSORS FROM A PORTABLE DEVICEAPPLICATION2012-09-132011-03-1045819263GoodContinental Automotive Systems IncContinental Automotive Systems Inc
US20060200755A10.195Method and system for resolving conflicts in attribute operations in a collaborative editing environmentAPPLICATION2006-09-072005-03-0436945460GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8811690B20.195Imaging device having a prismatic elementGRANT2014-08-192009-06-1641666957GoodMorpho SAIdemia Identity and Security France SAS
US7620912B10.194Graphical assignment of object behaviorsGRANT2009-11-172001-10-2541279778GoodAdobe Systems IncAdobe Inc
US9408530B20.193Parameter-based navigation by a lumen traveling deviceGRANT2016-08-092006-04-1246332588GoodGearbox LLCGearbox LLC
US20040081105A10.191Layered network node  network incorporating the same  node  and layered networkAPPLICATION2004-04-292002-10-0732044676GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US9020919B20.185Method and apparatus for performing extended searchGRANT2015-04-282010-05-3144359495GoodInternational Business Machines CorpInternational Business Machines Corp
US9151830B20.184Six degree-of-freedom laser tracker that cooperates with a remote structured-light scannerGRANT2015-10-062011-04-1545955180GoodFaro Technologies IncFaro Technologies Inc
US9377885B20.177Method and apparatus for locking onto a retroreflector with a laser trackerGRANT2016-06-282010-04-2152466630GoodFaro Technologies IncFaro Technologies Inc
US9772394B20.174Method and apparatus for following an operator and locking onto a retroreflector with a laser trackerGRANT2017-09-262010-04-2156129037GoodFaro Technologies IncFaro Technologies Inc
US20060182421A10.173Universal multimedia optic disc player and its application for revocable copy protectionAPPLICATION2006-08-172001-03-2925233933GoodMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US8606769B10.168Ranking a URL based on a location in a search engine results pageGRANT2013-12-102010-12-0749681666GoodConductor IncConductor LLC
US8226001B10.167Method for broadcasting a magnetic stripe data packet from an electronic smart cardGRANT2012-07-242010-06-2346512968GoodFiteq IncFiteq Inc
US5859921A0.164Apparatus for processing an image of a faceGRANT1999-01-121995-05-1014576776GoodMitsubishi Electric CorpMitsubishi Electric Corp
US6738516B10.163Monitor display apparatusGRANT2004-05-181998-06-1826494006GoodMinolta Co LtdMinolta Co Ltd
US8567679B10.161Cards and devices with embedded hologramsGRANT2013-10-292011-01-2349448503GoodDynamics IncDynamics Inc
US8602312B20.157Systems and methods for drive circuits for dynamic magnetic stripe communications devicesGRANT2013-12-102010-02-1644483284GoodDynamics IncDynamics Inc
US20100332190A10.149METHOD AND APPARATUS FOR NOTIFYING SENSOR OBSERVATION DATAAPPLICATION2010-12-302009-06-2943381679GoodFujitsu LtdFujitsu Ltd
US8579203B10.142Electronic magnetic recorded media emulators in magnetic card devicesGRANT2013-11-122008-12-1949517940GoodDynamics IncDynamics Inc
US8066191B10.139Cards and assemblies with user interfacesGRANT2011-11-292009-04-0644994276GoodDynamics IncDynamics Inc
US20100329569A10.133IMAGE PROCESSING PROGRAM  IMAGE PROCESSING APPARATUS  AND IMAGE PROCESSING METHODAPPLICATION2010-12-302009-06-2943380809GoodFujitsu Semiconductor LtdFujitsu Semiconductor Ltd
US20060018517A10.121Image processing methods and apparatus for detecting human eyes  human face  and other objects in an imageAPPLICATION2006-01-262000-09-1525739579GoodCanon IncCanon Inc
US8485446B10.115Shielded magnetic stripe for magnetic cards and devicesGRANT2013-07-162011-03-2848748961GoodDynamics IncDynamics Inc
US8540165B20.064Laminated electronic card assemblyGRANT2013-09-242005-03-2637054011GoodPrivaSys IncPrivaSys Inc
US8437515B20.055Face detection apparatus and face detection methodGRANT2013-05-072009-05-0843062349GoodNovatek Microelectronics CorpNovatek Microelectronics Corp
KR20120081404ANRA REAL TIME LINKING METHOD FOR LINKING APP SERVICE WITH A PROMOTION TO AN ADVERTISING MEDIAAPPLICATION2012-07-192011-01-1146713557Good
KR20070081773ANRINFRARED FACE AUTHENTICATING APPARATUS  AND PORTABLE TERMINAL AND SECURITY APPARATUS INCLUDING THE SAMEAPPLICATION2007-08-172006-02-1338089123Good
KR20060020874ANRAPPARATUS AND METHOD OF SAME CATEGORY COMPANY APPRAISING WITH CUSTOMER CREDIT CLASSAPPLICATION2006-03-072004-09-0137127882Good
KR20060018031ANRTHE LIMITED ADVERTISEMENT RECEIVING SYSTEM AND METHOD USING CLIENT TERMINALAPPLICATION2006-02-282004-08-2337125761Good
KR20040048114ANRAUTHENTICATION METHOD AND DEVICE USING MULTI BIOLOGICAL IDENTIFICATION IN PORTABLE RADIOTELEPHONEAPPLICATION2004-06-072002-12-0237343026Good
KR20030093464ANRSecurity Certifying Method of Mobile Telecommunication Devices using Face-RecognitionAPPLICATION2003-12-112002-06-0332385635Good
KR20030017457ANRSAFE DEPOSIT BOX BY USING BIO RECOGNITION TECHNOLOGYAPPLICATION2003-03-032002-12-2727729971Good
KR20020026702ANRMethod of Automatic Contents ranking by multi user estimationAPPLICATION2002-04-122000-10-0219691510Good
KR101054096B1NRA METHOD AND A COMPUTER READABLE MEDIA FOR SECURE PASSWORD INPUT USING TOUCHSCREEN INTERFACESGRANT2011-08-042010-06-0444932836Good
KR100608605B1NRMethod and apparatus for digital rights managementGRANT2006-08-032004-09-1536035295Good
JP2009521865ANRNo titleAPPLICATION2009-06-042005-12-2238218639Good
JP2007520011ANRNo titleAPPLICATION2007-07-192004-02-0236751955Good
JP2006050624ANRMETHOD OF PROVIDING ACCESS TO ENCRYPTED CONTENT TO ONE OF A PLURALITY OF CONSUMER SYSTEMS  DEVICE FOR PROVIDING ACCESS TO ENCRYPTED CONTENT AND METHOD OF GENERATING CONTENT PACKAGE PROTECTED BY SECURITYAPPLICATION2006-02-162004-07-3034929402Good
CN102542012ANRClassifying results of search queriesGRANT2012-07-042010-12-1546235745Good
CN101853342ANRThe anti identity theft and the payment network of protection privacyGRANT2010-10-062009-03-3042785406Good
US8839720B20.531Security enhanced blasting apparatus  and method of blastingGRANT2014-09-232005-02-1636916116FairOrica Explosives Technology Pty LtdOrica Explosives Technology Pty Ltd
US20100277314A10.495ALARM APPARATUSAPPLICATION2010-11-042007-11-0840266016Fair
US8583725B20.424Social context for inter-media objectsGRANT2013-11-122010-04-0544710903FairMicrosoft CorpMicrosoft Technology Licensing LLC
US20060212931A10.408Trust evaluation systems and methodsAPPLICATION2006-09-212005-03-0236941880FairMarkMonitor IncMarkMonitor Inc
US20130030645A10.400AUTO-CONTROL OF VEHICLE INFOTAINMENT SYSTEM BASED ON EXTRACTED CHARACTERISTICS OF CAR OCCUPANTSAPPLICATION2013-01-312011-07-2847597904FairPanasonic CorpGodo Kaisha IP Bridge 1
US9258491B20.360Imaging method and imaging deviceGRANT2016-02-092010-12-0946198988FairSony CorpSony Corp
US20120262749A10.359IMAGE OUTPUT SYSTEMAPPLICATION2012-10-182011-04-1346994645FairSharp CorpSharp Corp
US8792118B20.355User interfaces and methods to provision electronic facsimilesGRANT2014-07-292007-09-2640471273FairRingCentral IncRingCentral Inc
US20120162403A10.354BIOMETRIC AUTHENTICATION SYSTEMAPPLICATION2012-06-282010-12-2846316210FairSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20090304237A10.352Biometric Authentication ApparatusAPPLICATION2009-12-102005-06-2937595274FairKyocera Corp, Kyocera Optec Co LtdKyocera Corp, Kyocera Optec Co Ltd
US7380711B20.341Self-check system and method for protecting digital mediaGRANT2008-06-032004-07-2335656086FairCheckpoint Systems IncCheckpoint Systems Inc
US6542794B20.326Technique for effectively communicating information concerning vehicle service providers to a userGRANT2003-04-011997-01-2825149157FairAmerican Calcar IncTALKING QUICK TIPS Inc
US20050244033A10.312System and method for assuring high resolution imaging of distinctive characteristics of a moving objectAPPLICATION2005-11-032004-04-3035187144FairInternational Business Machines CorpInternational Business Machines Corp
US20110188711A10.309VEIN AUTHENTICATION DEVICEAPPLICATION2011-08-042005-06-1337532041FairHitachi LtdHitachi Ltd
US9780835B20.305Interference control in a broadband powerline communication systemGRANT2017-10-032004-12-0136565932FairAT&T Intellectual Property II LPAT&T Corp, AT&T Intellectual Property II LP
US8280484B20.303System  devices  and methods for detecting occlusions in a biological subjectGRANT2012-10-022007-12-1841431937FairInvention Science Fund I LLCSonavex Inc
US9501455B20.303Systems and methods for processing dataGRANT2016-11-222011-06-3046717696FairBoeing CoBoeing Co
US9063927B20.301Short message age classificationGRANT2015-06-232011-04-0646966781FairCitizenNet IncCitizenNet Inc
US20080192932A10.300Method of Securely Reading Data From a TransponderAPPLICATION2008-08-142005-05-2037431655FairNXP BVNXP BV
US20100046807A10.282Vein Imaging Apparatus  Vein Imaging Method and Vein Authentication ApparatusAPPLICATION2010-02-252008-08-2541696446FairSony CorpSony Corp
US8223199B20.277Finger vein authentication unit and information processing unitGRANT2012-07-172007-06-2839760516FairHitachi LtdHitachi Ltd
US20040068669A10.256Fingerprint authentication method  Program and device capable of judging inexpensively whether input image is proper or notAPPLICATION2004-04-082002-09-2731973347FairNEC CorpNEC Corp
US6124805A0.253Remotely operable vehicle identification and disabling systemGRANT2000-09-261998-05-1926765608FairCHG SAFETY TECHNOLOGIES IncCHG SAFETY TECHNOLOGIES Inc
US8827153B10.250Systems and methods for waveform generation for dynamic magnetic stripe communications devicesGRANT2014-09-092011-07-1851455050FairDynamics IncDynamics Inc
US10055614B10.244Systems and methods for advanced detection mechanisms for magnetic cards and devicesGRANT2018-08-212010-08-1263144607FairDynamics IncDynamics Inc
US9836680B10.234Systems and methods for advanced communication mechanisms for magnetic cards and devicesGRANT2017-12-052011-03-0360452096FairDynamics IncDynamics Inc
US20100162319A10.232Navigation Method and System to Provide a Navigation InterfaceAPPLICATION2010-06-242008-12-2342268068FairAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US7693304B20.230Method and system for image quality calculationGRANT2010-04-062005-05-1237419185FairHewlett Packard Development Co LPHewlett Packard Development Co LP
US20090299572A10.225In-vehicle apparatusAPPLICATION2009-12-032008-05-3041380789FairDenso Ten LtdDenso Ten Ltd
US9646240B10.221Locking features for powered cards and devicesGRANT2017-05-092010-11-0558643508FairDynamics IncDynamics Inc
US8231063B20.220Electronic card and methods for making sameGRANT2012-07-312005-03-2637215598FairPrivaSys IncPrivaSys Inc
US8727219B10.211Magnetic stripe track signal having multiple communications channelsGRANT2014-05-202009-10-1250692143FairDynamics IncDynamics Inc
US9482529B20.192Three-dimensional coordinate scanner and method of operationGRANT2016-11-012011-04-1549515110FairFaro Technologies IncFaro Technologies Inc
US20060204053A10.191Pattern identification method  device thereof  and program thereofAPPLICATION2006-09-142002-12-1632599267FairCanon IncCanon Inc
US9400170B20.190Automatic measurement of dimensional data within an acceptance region by a laser trackerGRANT2016-07-262010-04-2154017036FairFaro Technologies IncFaro Technologies Inc
US6311085B10.183Method and apparatus for magnetic resonance arteriography using contrast agentsGRANT2001-10-301997-10-0625481376Fair
US8628022B10.182Systems and methods for sensor mechanisms for magnetic cards and devicesGRANT2014-01-142011-05-2349886007FairDynamics IncDynamics Inc
US9007601B20.181Automatic measurement of dimensional data with a laser trackerGRANT2015-04-142010-04-2146828202FairFaro Technologies IncFaro Technologies Inc
US9053398B10.179Passive detection mechanisms for magnetic cards and devicesGRANT2015-06-092010-08-1253267938FairDynamics IncDynamics Inc
US8907968B20.177Image rendering device  image rendering method  and image rendering program for rendering stereoscopic panoramic imagesGRANT2014-12-092011-03-3146930030FairPanasonic CorpSovereign Peak Ventures LLC
US8348172B10.175Systems and methods for detection mechanisms for magnetic cards and devicesGRANT2013-01-082010-03-0247427801FairDynamics IncDynamics Inc
US8322623B10.170Systems and methods for advanced card printingGRANT2012-12-042010-07-2647226606FairDynamics IncDynamics Inc
US9686532B20.170System and method of acquiring three-dimensional coordinates using multiple coordinate measurement devicesGRANT2017-06-202011-04-1549994500FairFaro Technologies IncFaro Technologies Inc
US10022884B10.167Systems and methods for alignment techniques for magnetic cards and devicesGRANT2018-07-172010-10-1562837521FairDynamics IncDynamics Inc
US8488050B20.166Camera body  and camera systemGRANT2013-07-162008-04-2141216633FairPanasonic CorpPanasonic Corp
US9453913B20.157Target apparatus for three-dimensional measurement systemGRANT2016-09-272008-11-1747359544FairFaro Technologies IncFaro Technologies Inc
US5899863A0.156Method and apparatus for segmenting B-mode intensity data using doppler shift data in three-dimensional ultrasound imagingGRANT1999-05-041997-05-0725312874FairGeneral Electric CoGeneral Electric Co
US9482755B20.154Measurement system having air temperature compensation between a  target and a laser trackerGRANT2016-11-012008-11-1757207965FairFaro Technologies IncFaro Technologies Inc
US8684267B20.149Method for broadcasting a magnetic stripe data packet from an electronic smart cardGRANT2014-04-012005-03-2646543446FairPrivaSysPrivaSys
US8317103B10.149Method for broadcasting a magnetic stripe data packet from an electronic smart cardGRANT2012-11-272010-06-2347190771FairFiTeqFiTeq
US20110255787A10.147PORTABLE ELECTRONIC DEVICEAPPLICATION2011-10-202010-04-1444779855FairHon Hai Precision Industry Co LtdHon Hai Precision Industry Co Ltd
US5131412A0.135Pediatric intravenous deviceGRANT1992-07-211991-08-2625015657Fair
US7943909B20.134Fluorescence detecting apparatus and fluorescence observation systemGRANT2011-05-172006-12-1339511397FairNikon CorpNikon Corp
US6488377B20.124Ophthalmic imaging apparatusGRANT2002-12-032000-03-1718593918FairCanon IncCanon Inc
US9164173B20.123Laser tracker that uses a fiber-optic coupler and an achromatic launch to align and collimate two wavelengths of lightGRANT2015-10-202011-04-1553270948FairFaro Technologies IncFaro Technologies Inc
US7944498B20.122Multi-focal camera apparatus and methods and mediums for generating focus-free image and autofocus image using the multi-focal camera apparatusGRANT2011-05-172006-10-0239260727FairSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20050078340A10.120Image reading apparatus and copying machine equipped with the sameAPPLICATION2005-04-142003-08-2934410656FairBrother Industries LtdBrother Industries Ltd
US9740291B20.099Presentation system  presentation apparatus  and computer-readable recording mediumGRANT2017-08-222011-07-1147519678FairKonica Minolta Business Technologies IncKonica Minolta Business Technologies Inc
US9089602B20.083Compositions and methods for the prevention and treatment of cardiovascular diseasesGRANT2015-07-282008-07-2541570624FairReven Pharmaceuticals IncNoventis Inc, Reven Pharmaceuticals Inc
USD792513S1NRDisplay with fontGRANT2017-07-182010-07-0959297730FairDynamics IncDynamics Inc
USD792512S1NRDisplay with fontGRANT2017-07-182010-07-0959297767FairDynamics IncDynamics Inc
USD792511S1NRDisplay with fontGRANT2017-07-182010-07-0959297717FairDynamics IncDynamics Inc
USD687094S1NRMultiple button interactive electronic card with light sourcesGRANT2013-07-302010-07-0248809067FairDynamics IncDynamics Inc
USD676904S1NRInteractive display cardGRANT2013-02-262011-05-1247721680FairDynamics IncDynamics Inc
USD674013S1NRMultiple button interactive electronic card with light sourcesGRANT2013-01-082010-07-0247428283FairDynamics IncDynamics Inc
USD672389S1NRMultiple button interactive electronic card with light sourcesGRANT2012-12-112010-07-0247289536FairDynamics IncDynamics Inc
USD670759S1NRMultiple button interactive electronic card with light sourcesGRANT2012-11-132010-07-0247114936FairDynamics IncDynamics Inc
USD670332S1NRInteractive cardGRANT2012-11-062011-05-1247075849FairDynamics IncDynamics Inc
USD670331S1NRInteractive display cardGRANT2012-11-062011-05-1247075848FairDynamics IncDynamics Inc
USD670330S1NRInteractive cardGRANT2012-11-062011-05-1247075847FairDynamics IncDynamics Inc
USD670329S1NRInteractive display cardGRANT2012-11-062011-05-1247075846FairDynamics IncDynamics Inc
USD666241S1NRMultiple button interactive electronic card with light sourceGRANT2012-08-282010-07-0946690215FairDynamics IncDynamics Inc
USD665447S1NRMultiple button interactive electronic card with light source and displayGRANT2012-08-142010-07-0946613932FairDynamics IncDynamics Inc
USD665022S1NRMultiple button interactive electronic card with light sourceGRANT2012-08-072010-07-0946583680FairDynamics IncDynamics Inc
USD653288S1NRMultiple button interactive electronic cardGRANT2012-01-312010-07-0945508543FairDynamics IncDynamics Inc
USD652867S1NRMultiple button interactive electronic cardGRANT2012-01-242010-07-0245477170FairDynamics IncDynamics Inc
USD652450S1NRMultiple button interactive electronic cardGRANT2012-01-172010-07-0945445436FairDynamics IncDynamics Inc
USD652449S1NRMultiple button interactive electronic cardGRANT2012-01-172010-07-0245445435FairDynamics IncDynamics Inc
USD652448S1NRMultiple button interactive electronic cardGRANT2012-01-172010-07-0245445434FairDynamics IncDynamics Inc
USD652076S1NRMultiple button interactive electronic card with displayGRANT2012-01-102010-07-0945419558FairDynamics IncDynamics Inc
USD652075S1NRMultiple button interactive electronic cardGRANT2012-01-102010-07-0245419557FairDynamics IncDynamics Inc
USD651644S1NRInteractive electronic card with displayGRANT2012-01-032010-07-0945374955FairDynamics IncDynamics Inc
USD651238S1NRInteractive electronic card with displayGRANT2011-12-272010-07-0945350241FairDynamics IncDynamics Inc
USD651237S1NRInteractive electronic card with displayGRANT2011-12-272010-07-0945350240FairDynamics IncDynamics Inc
USD643063S1NRInteractive electronic card with displayGRANT2011-08-092010-07-0944351226FairDynamics IncDynamics Inc
KR20120090135ANRMOBILE APPLICATIONS AD TRADING SYSTEM AND HOW TO PROGRAMAPPLICATION2012-08-172011-01-1346883254Fair
KR20100033371ANRAPPARATUS AND METHOD FOR RECOGNIZING SUBCUTANEOUS VEIN PATTERNAPPLICATION2010-03-292007-05-0739944126Fair
KR20040053680ANRMETHOD OF COLLECTION APPRAISAL AND MANAGEMENT FOR FOREIGN COUNTRIES SCIENTIFIC TECHNICAL INFORMATION AND MEDIA THAT CAN RECORD COMPUTER PROGRAM SOURCES FOR METHOD THEREOFAPPLICATION2004-06-242002-12-1737346891Fair
JP4677840B2NRNo titleGRANT2011-04-272004-07-2136106715Fair
JP4613721B2NRNo titleGRANT2011-01-192004-07-2136106717Fair
JP4556389B2NRNo titleGRANT2010-10-062003-06-3034185442Fair
JP2008305133ANRINFORMATION PROCESSOR  INFORMATION PROCESSING METHOD  AND INFORMATION PROCESSING PROGRAMAPPLICATION2008-12-182007-06-0740233818Fair
JP2008052317ANRAUTHENTICATION APPARATUS AND AUTHENTICATION METHODAPPLICATION2008-03-062006-08-2239236356Fair
JP2006182597ANRSILICON-BASED CERAMIC JOINING MATERIAL  JOINED BODY AND ITS MANUFACTURING METHODAPPLICATION2006-07-132004-12-2736735989Fair
JP2004139343ANRMETHOD AND DEVICE FOR EVALUATING CONTENTS AND PROGRAMAPPLICATION2004-05-132002-10-1732451115Fair
JP2004126738ANRPERSONAL AUTHENTICATION DEVICE AND AUTHENTICATION METHOD USING THREE-DIMENSIONAL MEASUREMENTAPPLICATION2004-04-222002-09-3032279735Fair
JP2004074220ANRJOINT BODY OF METAL-CERAMICS COMPOSITE MATERIAL AND ITS MANUFACTURING METHODAPPLICATION2004-03-112002-08-1932021528Fair
JP2004013128ANRFLUORESCENCE MICROSCOPEAPPLICATION2004-01-152002-06-1130436847Fair
JP2003173381ANRRIGHT TO USE CONTROL DEVICEAPPLICATION2003-06-202001-05-2927482308Fair
JP2002007341ANRAUTHENTICATING METHOD AND COMPUTER READABLE STORAGE MEDIUMAPPLICATION2002-01-112000-06-1918683271Fair
JP2001282940ANRPRODUCT EVALUATION SYSTEMAPPLICATION2001-10-122000-03-3118613496Fair

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
1,237
Recommended Classes
310
Government Assigned Classes
15
CPC
Title
Score
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)2.494
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)2.492
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)1.270
G06F21/33using certificates1.261
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.213
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)1.212
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.201
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)1.201
G06F21/31User authentication1.194
H04L63/0815providing single-sign-on or federations1.190
G06Q20/02involving a neutral party  e.g. certification authority  notary or trusted third party [TTP]1.188
H04W4/08User group management1.177
G06F21/552involving long-term monitoring or reporting1.173
G06F21/35communicating wirelessly1.171
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks1.171
G06F21/42using separate channels for security data1.171
H04L63/126the source of the received data1.168
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics1.161
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)1.160
G06F21/41where a single sign-on provides access to a plurality of computers1.155
H04L51/52for supporting social networking services1.150
G06Q50/01Social networking1.150
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.149
G06F21/45Structures or tools for the administration of authentication1.143
H04W12/06Authentication1.140
H04L63/102Entity profiles1.134
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database1.134
H04L67/148Migration or transfer of sessions1.134
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints1.132
H04M3/5183Call or contact centers with computer-telephony arrangements1.130
H04L67/34involving the movement of software or configuration parameters  | network booting or remote initial program loading [RIPL] | (ref: G06F9/4416)1.129
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)1.124
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)1.123
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.115
G06Q20/3823combining multiple encryption tools for a transaction1.112
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards1.111
H04L63/14for detecting or protecting against malicious traffic1.110
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)1.109
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)1.108
G06F21/60Protecting data1.108
H04L9/321involving a third party or a trusted authority1.108
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)1.107
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint1.107
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage1.106
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour1.106
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM]1.106
H04L67/306User profiles1.105
H04L63/0838using one-time-passwords1.103
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)1.103
G06Q20/40145Biometric identity checks1.103
G06F21/335for accessing specific resources  e.g. using Kerberos tickets1.101
G06F21/46by designing passwords or checking the strength of passwords1.098
G07F7/0866by active credit-cards adapted therefor | (ref: G07F7/1008)|  takes precedence1.097
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists1.097
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key1.094
G06Q50/16Real estate1.093
G06Q20/425using two different networks  one for transaction and one for security confirmation1.092
G06Q20/3821Electronic credentials1.092
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.091
G06Q20/4014Identity check for transactions1.088
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds1.088
H04W12/30Security of mobile devices| Security of mobile applications1.088
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords1.087
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)1.087
G06F21/36by graphic or iconic representation1.086
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding1.085
H04M1/677Preventing the dialling or sending of predetermined telephone numbers or selected types of telephone numbers  e.g. long distance numbers1.085
H04L12/1831Tracking arrangements for later retrieval  e.g. recording contents  participants activities or behavior  network status1.085
G06F21/88Detecting or preventing theft or loss1.084
G06F21/43wireless channels1.083
G06Q30/06Buying  selling or leasing transactions1.082
G06Q30/02Marketing  e.g. market research and analysis  surveying  promotions  advertising  buyer profiling  customer management or rewards| Price estimation or determination1.081
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor1.079
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability1.078
G06F21/629to features or functions of an application1.078
G06Q20/384using social networks1.076
G06F21/6245Protecting personal data  e.g. for financial or medical purposes1.076
H04L45/00Routing or path finding of packets in data switching networks | routing or path finding in wireless networks | (ref: H04W40/00)1.074
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)1.074
H04L51/10Multimedia information1.073
H04M3/42153by subscriber1.073
H04W4/02Services making use of location information1.072
H04L67/55Push-based network services1.072
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.071
H04L9/3236using cryptographic hash functions1.070
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity1.069
H04L51/48Message addressing  e.g. address format or anonymous messages  aliases1.069
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity1.068
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)1.067
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)1.067
G07F7/1025Identification of user by a PIN code1.067
G06Q30/0641Shopping interfaces1.066
H04L63/0281Proxies1.065
H04L63/1433Vulnerability analysis1.065
G06Q10/20Product repair or maintenance administration1.064
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks1.064
G06F16/9577Optimising the visualization of content  e.g. distillation of HTML documents1.064
G06F21/40by quorum  i.e. whereby two or more security principals are required1.062
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)1.062
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)1.062
G06F16/955using information identifiers  e.g. uniform resource locators [URL]1.061
G06Q90/00Systems or methods specially adapted for administrative  commercial  financial  managerial  supervisory or forecasting purposes  not involving significant data processing1.060
H04L9/0822using key encryption key1.057
H04L9/3297involving time stamps  e.g. generation of time stamps1.056
G06K19/14the marking being sensed by radiation1.056
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC1.054
H04L63/0272Virtual private networks1.053
G06F15/00Digital computers in general | details | (ref: G06F1/00)|  – | (ref: G06F13/00)| Data processing equipment in general1.053
H04L12/1818Conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources  notifying involved parties1.052
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences1.051
G06F21/6254by anonymising data  e.g. decorrelating personal data from the owner's identification1.051
H04L63/101Access control lists [ACL]1.051
H04L63/02for separating internal from external traffic  e.g. firewalls1.051
H04L67/141Setup of application sessions | admission control or resource allocation in data switching networks | (ref: H04L47/70)1.051
G06Q30/012Product or service warranty1.050
G06K7/10297arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs  e.g. ISO/IEC 14443 and 18092 | cryptographic protocols | (ref: H04L9/00)| | network security protocols | (ref: H04L63/00)| | real-time communication protocols in data switching networks | (ref: H04L65/00)| | network protocols for data switching network services | (ref: H04L67/00)1.050
G06Q10/06315Needs-based resource requirements planning or analysis1.049
H04L63/104Grouping of entities1.049
G06Q50/30Transportation| Communications1.048
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols1.048
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)1.048
G06Q30/0267Wireless devices1.047
G06Q30/0607Regulated1.047
H04W4/16Communication-related supplementary services  e.g. call-transfer or call-hold1.046
H04L9/3247involving digital signatures1.046
H04W12/02Protecting privacy or anonymity  e.g. protecting personally identifiable information [PII]1.046
H04L63/1425Traffic logging  e.g. anomaly detection1.046
H04M11/04with alarm systems  e.g. fire  police or burglar alarm systems1.046
H04L41/0856by backing up or archiving configuration information1.045
H04L65/1104Session initiation protocol [SIP]1.044
H04L65/1108Web based protocols  e.g. webRTC1.044
G06Q50/265Personal security  identity or safety1.044
G06Q30/018Business or product certification or verification1.044
G06Q20/12specially adapted for electronic shopping systems1.043
G06F21/606by securing the transmission between two devices or processes1.043
G06F21/604Tools and structures for managing or administering access control systems1.042
G06Q50/18Legal services| Handling legal documents1.042
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | user-to-user messaging in packet switching-networks  transmitted according to store-and-forward or real-time protocols  e.g. e-mail  | (ref: H04L51/00)| Time management  e.g. calendars  reminders  meetings or time accounting1.041
G06Q20/3674involving authentication1.041
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)1.040
G06Q20/00Payment architectures  schemes or protocols | apparatus for performing or posting payment transactions | (ref: G07F7/08)|   | (ref: G07F19/00)| | electronic cash registers | (ref: G07G1/12)1.039
H04L61/45Network directories| Name-to-address mapping1.039
H04L12/1813for computer conferences  e.g. chat rooms | instant messaging | (ref: H04L51/04)| | protocols for multimedia communication | (ref: H04L65/1101)| | arrangements for multi-party communication | (ref: H04L65/403)| | telephonic conference arrangements | (ref: H04M3/56)| | television conference systems | (ref: H04N7/15)1.039
H04M3/5191interacting with the Internet1.039
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy1.038
H04W12/08Access security1.037
G06Q30/0202Market predictions or demand forecasting1.036
H04L51/222using geographical location information  e.g. messages transmitted or received in proximity of a certain spot or area1.035
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates1.035
G06Q30/0246Traffic1.032
H04L63/105Multiple levels of security1.032
G06V40/166using acquisition arrangements1.032
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer1.032
H04L63/168above the transport layer1.031
G06F21/602Providing cryptographic facilities or services1.031
H04L67/63Routing a service request depending on the request content or context1.031
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine1.031
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself1.030
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)1.029
H04W4/14Short messaging services  e.g. short message services [SMS] or unstructured supplementary service data [USSD]1.029
H04L67/14Session management | for real-time applications in data packet communications networks | (ref: H04L65/1066)1.029
G06Q20/4016involving fraud or risk level assessment in transaction processing1.028
G06Q30/0275Auctions1.028
G06Q20/3829involving key management1.027
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals1.026
G07C9/37using biometric data  e.g. fingerprints  iris scans or voice recognition1.026
G16H50/20for computer-aided diagnosis  e.g. based on medical expert systems1.025
A61B5/1459invasive  e.g. introduced into the body by a catheter | (ref: A61B5/1464)|  takes precedence1.025
H04L67/30Profiles1.025
H04L41/00Arrangements for maintenance  administration or management of data switching networks  e.g. of packet switching networks1.025
G10L15/26Speech to text systems | (ref: G10L15/08)|  takes precedence1.025
H04L9/06the encryption apparatus using shift registers or memories for block-wise | or stream|  coding  e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators1.024
H04M1/72436for text messaging  e.g. SMS or e-mail1.023
G07C9/27with central registration1.020
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)1.019
G06Q30/0633Lists  e.g. purchase orders  compilation or processing1.019
G06F9/542Event management| Broadcasting| Multicasting| Notifications1.019
G06Q10/087Inventory or stock management  e.g. order filling  procurement  balancing against orders1.019
H04K1/00Secret communication1.018
G06Q20/401Transaction verification1.018
H04L65/1069Session establishment or de-establishment1.018
H04W48/18Selecting a network or a communication service1.018
H04L9/3271using challenge-response1.018
G06F11/1474in transactions | (ref: G06F16/20)|  takes precedence1.017
G06F16/958Organisation or management of web site content  e.g. publishing  maintaining pages or automatic linking1.017
H04Q3/0029Provisions for intelligent networking1.017
H04W8/20Transfer of user or subscriber data1.016
H04W8/205Transfer to or from user equipment or user record carrier1.016
G06F7/02Comparing digital values | (ref: G06F7/06)|   | (ref: G06F7/22)|  |  | (ref: G06F7/38)|  take precedence1.015
G06Q20/354Card activation or deactivation1.015
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]1.015
H04L67/02based on web technology  e.g. hypertext transfer protocol [HTTP]1.014
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)1.014
G06F16/957Browsing optimisation  e.g. caching or content distillation1.014
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.014
H04M1/72442for playing music files1.014
H04N21/4627Rights management | associated to the content | security in data switching network management | (ref: H04L41/28)| | security management or policies for network security | (ref: H04L63/20)| | access security in wireless networks | (ref: H04W12/08)1.014
H04L51/046Interoperability with other network applications or services1.012
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes1.011
H04L67/06specially adapted for file transfer  e.g. file transfer protocol [FTP]1.011
G06F16/951Indexing| Web crawling techniques1.011
H04L69/40for recovering from a failure of a protocol instance or entity  e.g. service redundancy protocols  protocol state redundancy or protocol service redirection | management of faults  events  alarms or notifications in data switching networks | (ref: H04L41/06)1.011
H04L67/1097for distributed storage of data in networks  e.g. transport arrangements for network file system [NFS]  storage area networks [SAN] or network attached storage [NAS]1.010
G06F9/45558Hypervisor-specific management and integration aspects1.010
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)1.010
G06F9/451Execution arrangements for user interfaces1.010
G06Q20/3223Realising banking transactions through M-devices1.010
H04W4/18Information format or content conversion  e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals1.010
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals1.010
H04L12/2898Subscriber equipments | DSL modems | (ref: H04M11/062)| | cable modems | (ref: H04L12/2801)1.009
G06F16/9566URL specific  e.g. using aliases  detecting broken or misspelled links1.008
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/212)1.008
H04L61/4511using domain name system [DNS]1.008
G06F13/16for access to memory bus | (ref: G06F13/28)|  takes precedence1.008
G06F21/445by mutual authentication  e.g. between devices or programs1.008
G06F16/9562Bookmark management1.008
G06F21/55Detecting local intrusion or implementing counter-measures1.007
G06Q20/0855involving a third party1.007
G06F21/6263during internet communication  e.g. revealing personal data from cookies1.007
G06Q20/10specially adapted for electronic funds transfer [EFT] systems| specially adapted for home banking systems1.006
G06Q20/123Shopping for digital content1.006
G06F21/44Program or device authentication1.006
G06F8/61Installation1.006
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)1.005
H04L67/51Discovery or management thereof  e.g. service location protocol [SLP] or web services1.005
H04L67/025for remote control or remote monitoring of applications1.005
H04L51/066Format adaptation  e.g. format conversion or compression1.005
H04N21/43615Interfacing a Home Network  e.g. for connecting the client to a plurality of peripherals | home Audio Video Interoperability [HAVI] data switching networks | (ref: H04L12/2805)1.005
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system1.005
G06V40/30Writer recognition| Reading and verifying signatures1.005
G07B17/0008Communication details outside or between apparatus | coin-freed apparatus for franking | per se|  | (ref: G07F17/26)1.005
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)1.004
H04M3/42068where the identifier is used to access a profile1.004
H04L51/224providing notification on incoming messages  e.g. pushed notifications of received messages1.004
G06F3/03545Pens or stylus1.004
G06Q20/3678e-cash details  e.g. blinded  divisible or detecting double spending1.003
H04L51/08Annexed information  e.g. attachments1.003
H04L67/561Adding application-functional data or data for application control  e.g. adding metadata1.003
H04L65/403Arrangements for multi-party communication  e.g. for conferences | data switching systems for conference | (ref: H04L12/18)| | arrangements for connecting several subscribers to a common circuit  i.e. affording conference facilities | (ref: H04M3/56)| | television conferencing systems | (ref: H04N7/15)1.003
A63F13/75Enforcing rules  e.g. detecting foul play or generating lists of cheating players1.003
G06F16/954Navigation  e.g. using categorised browsing1.003
H04L9/3252using DSA or related signature schemes  e.g. elliptic based signatures  ElGamal or Schnorr schemes1.001
H04L9/3218using proof of knowledge  e.g. Fiat-Shamir  GQ  Schnorr  ornon-interactive zero-knowledge proofs1.001
G06Q30/016Customer service  i.e. after purchase service1.001
G06F21/6236between heterogeneous systems1.000
G06V30/418Document matching  e.g. of document images1.000
G06F16/9535Search customisation based on user profiles and personalisation1.000
G05B13/042in which a parameter or coefficient is automatically adjusted to optimise the performance0.999
H04N21/25866Management of end-user data | customer care in data networks | (ref: H04L41/5077)0.999
H04N21/26258for generating a list of items to be played back in a given order  e.g. playlist  or scheduling item distribution according to such list | retrieval of multimedia data based on playlists | (ref: G06F16/40)0.999
H04N21/41265having a remote control device for bidirectional communication between the remote control device and client device | unidirectional remote control device | (ref: H04N21/42204)0.999
G06F11/2005using redundant communication controllers0.998
G06F16/95Retrieval from the web0.998
H04N21/26613for generating or managing keys in general | key distribution for secret or secure communication involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP] | (ref: H04L9/083)| | network support of key management | (ref: H04L63/06)| | key management for network security in communication control or processing | (ref: H04W12/04)0.997
H04L67/01Protocols0.997
G06Q10/1097Task assignment0.997
H04M3/42221Conversation recording systems | at the subscriber's set | (ref: H04M1/656)0.997
G06Q20/382insuring higher security of transaction0.996
G06Q30/08Auctions |   matching or brokerage | matching or brokerage for stock exchange | (ref: G06Q40/04)0.996
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)0.996
G06F16/40of multimedia data  e.g. slideshows comprising image and additional audio data | retrieval of still image data | (ref: G06F16/50)| | retrieval of audio data | (ref: G06F16/60)| | retrieval of video data | (ref: G06F16/70)0.996
H04N21/25816involving client authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | cryptographic authentication protocols | (ref: H04L9/32)| | networks authentication protocols | (ref: H04L63/08)| | authentication in wireless network security | (ref: H04W12/06)0.996
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files0.995
G06F8/34Graphical or visual programming0.995
G06F8/20Software design0.995
G06F21/554involving event detection and direct action0.995
G06Q10/0635Risk analysis0.995
H04L9/50using hash chains  e.g. blockchains or hash trees0.995
H04L51/02using automatic reactions or user delegation  e.g. automatic replies or chatbot-generated messages0.995
H04L41/12Discovery or management of network topologies0.995
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level0.994
G06F21/645using a third party0.994
G06Q30/0629for generating comparisons0.994
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)0.994
G06Q10/109Time management  e.g. calendars  reminders  meetings  time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)0.994
G06Q30/0619Neutral agent0.994
H04W4/12Messaging| Mailboxes| Announcements0.994
H04L51/18Commands or executable codes0.994
G06F9/50Allocation of resources  e.g. of the central processing unit [CPU]0.994
H04L67/10in which an application is distributed across nodes in the network | software deployment | (ref: G06F8/60)| | multiprogramming arrangements | (ref: G06F9/46)0.994
H04L5/0037Inter-user or inter-terminal allocation0.994
H01L23/3735Laminates or multilayers  e.g. direct bond copper ceramic substrates0.994
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)0.994
G06F21/313using a call-back technique via a telephone network0.994
H04M3/5175Call or contact centers supervision arrangements0.993
H04L12/2805Home Audio Video Interoperability [HAVI] networks0.993
G06Q50/00Systems or methods specially adapted for specific business sectors  e.g. utilities or tourism | healthcare informatics | (ref: G16H)0.993
H04M3/567Multimedia conference systems0.993
G06Q40/06Investment  e.g. financial instruments  portfolio management or fund management0.993
A63F13/71using secure communication between game devices and game servers  e.g. by encrypting game data or authenticating players0.993
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules0.992
H04L61/4523using lightweight directory access protocol [LDAP]0.992
H04L41/0213Standardised network management protocols  e.g. simple network management protocol [SNMP]0.992
H04M3/56Arrangements for connecting several subscribers to a common circuit  i.e. affording conference facilities | video conference systems | (ref: H04N7/15)0.992
G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled | logic circuits | (ref: H03K19/00)0.992
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment0.992
H04L63/0263Rule management0.991
H04N5/782on tape0.990
H04L51/212using filtering or selective blocking0.990
H04L43/08Monitoring or testing based on specific metrics  e.g. QoS  energy consumption or environmental parameters0.935
H04L9/40Network security protocols0.476
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.476
G06Q20/322Aspects of commerce using mobile devices [M-devices]0.476
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it0.455
H04W12/069using certificates or pre-shared keys0.450
H04W4/06Selective distribution of broadcast services  e.g. multimedia broadcast multicast service [MBMS]| Services to user groups| One-way selective calling services0.441
H04L47/70Admission control| Resource allocation0.441
H04W12/088using filters or firewalls0.441
H04W12/082using revocation of authorisation0.441
H04W12/086using security domains0.441
H04L1/1621Group acknowledgement  i.e. the acknowledgement message defining a range of identifiers  e.g. of sequence numbers0.441
H04W72/005Resource management for broadcast services0.441
H04L61/4547for personal communications  i.e. using a personal identifier0.440
H04W12/068using credential vaults  e.g. password manager applications or one time password [OTP] applications0.440
G06V20/52Surveillance or monitoring of activities  e.g. for recognising suspicious objects | recognising microscopic objects | (ref: G06V20/69)0.439
G06V40/45Detection of the body part being alive0.439
G06V40/50Maintenance of biometric data or enrolment thereof0.439
G06V40/173face re-identification  e.g. recognising unknown faces across different face tracks0.439
G06Q20/38215Use of certificates or encrypted proofs of transaction rights0.438
H04W12/084using delegated authorisation  e.g. open authorisation [OAuth] protocol0.435
G06Q20/385using an alias or single-use codes0.435
G06Q20/3276using a pictured code  e.g. barcode or QR-code  being read by the M-device0.435
G06Q20/3224Transactions dependent on location of M-devices0.435
G09C5/00Ciphering apparatus or methods not provided for in the preceding groups  e.g. involving the concealment or deformation of graphic data such as designs  written or printed messages0.435
G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer  e.g. network details  transfer of information from host to ECR or from ECR to ECR0.435
G06Q20/18involving self- service terminals [SSTs]  vending machines  kiosks or multimedia terminals0.435
G07F9/001Interfacing with vending machines using mobile or wearable devices0.435
H04W12/77Graphical identity0.435
G06Q20/3272using an audio code0.435
G06K19/06037multi-dimensional coding0.435
G06K7/14172D bar codes0.435
H04L67/563Data redirection of data network streams0.433
H04L67/125involving control of end-device applications over a network0.433
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)0.429
H04M7/128Details of addressing  directories or routing tables0.428
H04M7/0078Security| Fraud detection| Fraud prevention0.428
H04M3/382using authorisation codes or passwords0.428
G06K7/10821further details of bar or optical code scanning devices0.428
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)0.428
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)0.428
G06Q20/3227using secure elements embedded in M-devices0.427
H04L9/3073involving pairings  e.g. identity based encryption [IBE]  bilinear mappings or bilinear pairings  e.g. Weil or Tate pairing0.424
H04L67/53using third party service providers0.424
H04M3/51Centralised call answering arrangements requiring operator intervention |   e.g. call or contact centers for telemarketing0.424
H04L67/146Markers for unambiguous identification of a particular session  e.g. session cookie or URL-encoding0.424
G06V40/70Multimodal biometrics  e.g. combining information from different biometric modalities0.421
G06V10/17using hand-held instruments0.421
G06V40/167using comparisons between temporally consecutive images0.421
G06V40/67by interactive indications to the user0.421
G06V40/172Classification  e.g. identification0.421
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.418
G06Q20/326Payment applications installed on the mobile devices0.418
G06F16/93Document management systems0.418
G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction0.418
H04W4/029Location-based management or tracking services0.418
G07C9/22in combination with an identity check of the pass holder0.418
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip0.417
G06Q20/346Cards serving only as information carrier of service0.417
G06Q20/40975using encryption therefor0.417
H04L63/1416Event detection  e.g. attack signature detection0.417
H04L69/329in the application layer [OSI layer 7]0.417
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)0.416
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC0.415
H04L9/0869involving random numbers or seeds0.415
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD0.415
H04L67/535Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)0.415
G06Q30/0609Buyer or seller confidence or verification0.415
G06V10/40Extraction of image or video features0.415
G07F19/20Automatic teller machines [ATMs]0.415
G06V40/161Detection| Localisation| Normalisation0.415
H04N21/8545for generating interactive applications0.414
G06Q10/107Computer aided management of electronic mail | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L51/00)| | network security protocols | (ref: H04L63/00)| | real-time communication protocols in data switching networks | (ref: H04L65/00)| | network protocols for data switching network services | (ref: H04L67/00)0.414
H04N21/4622Retrieving content or additional data from different sources  e.g. from a broadcast channel and the Internet | web site content organization and management for information retrieval from the Internet | (ref: G06F16/958)| | transmission by internet of broadcast information | (ref: H04H60/82)| | stock exchange data over packet-switching network | (ref: H04L12/1804)| | push services including data channel over packet-switching network | (ref: H04L12/1859)0.414
G06F3/0484for the control of specific functions or operations  e.g. selecting or manipulating an object  an image or a displayed text element  setting a parameter value or selecting a range0.414
H04N21/4788communicating with other users  e.g. chatting | arrangements for providing for computer conferences  e.g. chat rooms  to substation in data switching networks | (ref: H04L12/1813)| | distributed application using peer-to-peer [P2P] networks | (ref: H04L67/104)0.414
G06Q40/02Banking  e.g. interest calculation  credit approval  mortgages  home banking or on-line banking0.414
G06F16/9017using directory or table look-up | use of a directory or look-up table in file systems | (ref: G06F16/13)0.414
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communications| Network security protocols0.412
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.412
G06Q20/363with the personal data of a user0.411
G06Q20/4097using mutual authentication between devices and transaction partners0.411
G06Q20/3827Use of message hashing0.410
G06Q20/3274using a pictured code  e.g. barcode or QR-code  being displayed on the M-device0.410
G06F16/2455Query execution0.410
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals0.410
G06Q20/1085involving automatic teller machines [ATMs]0.409
G06Q30/0185Product  service or business identity fraud0.409
G07F7/1083Counting of PIN attempts0.409
G07F7/1041PIN input keyboard gets new key allocation at each use0.409
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords0.409
H04L63/1475Passive attacks  e.g. eavesdropping or listening without modification of the traffic monitored0.409
H04W12/062Pre-authentication0.408
G06Q50/184Intellectual property management0.408
H04L9/085Secret sharing or secret splitting  e.g. threshold schemes0.408
H04L9/0819Key transport or distribution  i.e. key establishment techniques where one party creates or otherwise obtains a secret value  and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062)0.408
G06Q20/065using e-cash0.408
H04W12/37Managing security policies for mobile devices or for controlling mobile applications0.408
H04M1/72463to restrict the functionality of the device0.408
H04M15/88Provision for limiting connection  or expenditure0.408
H04W4/027using movement velocity  acceleration information0.408
H04W4/50Service provisioning or reconfiguring0.408
H04M15/58based on statistics of usage or network monitoring0.408
H04W12/63Location-dependent| Proximity-dependent0.408
G06Q20/42Confirmation  e.g. check or permission by the legal debtor of payment0.408
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB0.408
G07C9/23by means of a password0.407
G06Q20/4012Verifying personal identification numbers [PIN]0.407
G06Q30/0601Electronic shopping0.407
H04L67/564Enhancement of application control based on intercepted application data0.407
G06F40/174Form filling| Merging0.407
G06F21/83input devices  e.g. keyboards  mice or controllers thereof0.407
H04M3/42161via computer interface0.407
H04M1/72457according to geographic location0.407
H04W12/126Anti-theft arrangements  e.g. protection against subscriber identity module [SIM] cloning0.407
H04M7/0021Details of Application Programming Interfaces0.407
G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending  hiring  coin or paper currency dispensing or refunding apparatus0.406
G06Q40/00Finance| Insurance| Tax strategies| Processing of corporate or income taxes0.406
G06Q20/108Remote banking  e.g. home banking0.406
H04M3/4938comprising a voice browser which renders and interprets  e.g. VoiceXML0.405
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements0.404
G06Q20/405Establishing or using transaction specific rules0.404
H04L63/123received data contents  e.g. message integrity0.403
G06F16/252between a Database Management System and a front-end application0.403
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.403
H04L67/303Terminal profiles0.403
H04L69/14Multichannel or multilink protocols0.403
H04L51/214using selective forwarding0.402
H04L51/234for tracking messages0.402
H04L51/00User-to-user messaging in packet-switching networks  transmitted according to store-and-forward or real-time protocols  e.g. e-mail0.402
H04M7/0024Services and arrangements where telephone services are combined with data services | arrangements which combine a telephonic equipment and a computer | (ref: H04M7/0012)0.402
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries0.402
G06V10/95structured as a network  e.g. client-server architectures0.402
G06Q20/386using messaging services or messaging apps | using mobile network messaging services for payment  e.g. SMS | (ref: G06Q20/3255)0.402
G07C9/00Individual registration on entry or exit0.402
H04W12/68Gesture-dependent or behaviour-dependent0.402
H04W76/14Direct-mode setup0.402
H04L65/1096Supplementary features  e.g. call forwarding or call holding | systems providing special services or facilities to telephony subscribers | (ref: H04M3/42)0.402
H04M1/72418for supporting emergency services0.402
H04N7/148Interfacing a video terminal to a particular transmission medium  e.g. ISDN0.402
H04N7/147Communication arrangements  e.g. identifying the communication as a video-communication  intermediate storage of the signals | selecting | (ref: H04Q)0.402
H04N7/15Conference systems0.402
H04L67/52specially adapted for the location of the user terminal0.402
H04L65/1059End-user terminal functionalities specially adapted for real-time communication0.402
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]0.402
H04L9/0827involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.402
H04L63/0478applying multiple layers of encryption  e.g. nested tunnels or encrypting the content with a first key and then with at least a second key | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.401
H04W12/009specially adapted for networks  e.g. wireless sensor networks  ad-hoc networks  RFID networks or cloud networks0.401
H04W12/61Time-dependent0.401
G10L17/00Speaker identification or verification0.401
G06V40/40Spoof detection  e.g. liveness detection0.401
G06Q30/0207Discounts or incentives  e.g. coupons  rebates  offers or upsales0.400
G06Q30/0203Market surveys or market polls0.400
G06Q30/0269based on user profile or attribute0.400
G06Q20/102Bill distribution or payments0.400
G07F19/211Software architecture within ATMs or in relation to the ATM network0.400
G06F16/903Querying | for retrieval from the web | (ref: G06F16/953)0.400
H04W12/065Continuous authentication0.400
G06F16/24578using ranking0.399
H04W12/12Detection or prevention of fraud0.399
G06F21/577Assessing vulnerabilities and evaluating computer system security0.399
H04W12/67Risk-dependent  e.g. selecting a security level depending on risk profiles0.399
H04W4/21for social networking applications0.399
G06Q30/01Customer relationship  e.g. warranty0.399
H04M7/003Click to dial services0.399
H04L67/56Provisioning of proxy services | store-and-forward switching systems in data switching networks | (ref: H04L12/54)0.399
H04L67/565Conversion or adaptation of application format or content | adding application control or application functional data | (ref: H04L67/561)0.399
G06F16/9574of access to content  e.g. by caching0.399
G06Q20/38Payment protocols| Details thereof0.399
G06Q20/388using mutual authentication without cards  e.g. challenge-response0.399
G06Q20/3825Use of electronic signatures0.399
H04L63/166at the transport layer0.398
H04L61/5007Internet protocol [IP] addresses0.398
H04L67/1095Replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes0.398
H04L67/1001for accessing one among a plurality of replicated servers0.398
G06Q40/12Accounting0.398
H04L63/0218Distributed architectures  e.g. distributed firewalls0.397
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)0.397
H04L51/58Message adaptation for wireless communication0.397
H04M3/5322for recording text messages0.397
H04W8/005Discovery of network devices  e.g. terminals0.397
H04M15/44Augmented  consolidated or itemized billing statement or bill presentation0.397
H04M15/46Real-time negotiation between users and providers or operators0.397
H04M15/80Rating or billing plans| Tariff determination aspects0.397
H04M15/72by the user0.397
H04L67/1014based on the content of a request0.397
H04W12/35Protecting application or service provisioning  e.g. securing SIM application provisioning0.397
H04M15/745Customizing according to wishes of subscriber  e.g. friends or family0.397
H04M15/765Linked or grouped accounts  e.g. of users or devices0.397
H04M15/77involving multiple accounts per user0.397
H04M15/70Administration or customization aspects| Counter-checking correct charges0.397
H04M15/43Billing software details0.397
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.396
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)0.396
G16H80/00ICT specially adapted for facilitating communication between medical practitioners or patients  e.g. for collaborative diagnosis  therapy or health monitoring0.396
G06Q50/22Social work0.396
G16H10/60for patient-specific data  e.g. for electronic patient records0.396
G06Q20/306using TV related infrastructures | external card used for payment with client device | (ref: H04N21/4185)0.396
G06F21/16Program or content traceability  e.g. by watermarking0.396
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]0.396
G06Q10/00Administration| Management0.396
G07F7/08by coded identity card or credit card | or other personal identification means | without personal verification means | (ref: G07F7/02)0.396
G06K7/10366the interrogation device being adapted for miscellaneous applications0.396
G06K19/0723the record carrier comprising an arrangement for non-contact communication  e.g. wireless communication circuits on transponder cards  non-contact smart cards or RFIDs0.396
G06K7/14131D bar codes0.396
G06Q20/409Device specific authentication in transaction processing0.396
H04M7/00Arrangements for interconnection between switching centres0.394
H04L61/00Network arrangements  protocols or services for addressing or naming0.394
H04L65/4038with floor control0.394
H04L51/56Unified messaging  e.g. interactions between e-mail  instant messaging or converged IP messaging [CPM]0.394
H04M3/42008Systems for anonymous communication between parties  e.g. by use of disposal contact identifiers0.394
H04L12/46Interconnection of networks0.394
H04L65/1101Session protocols0.394
G06F17/00Digital computing or data processing equipment or methods  specially adapted for specific functions | information retrieval  database structures or file system structures therefor | (ref: G06F16/00)0.394
G06Q40/08Insurance  e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10)0.394
G06Q20/3672initialising or reloading thereof0.394
H04L41/5054Automatic deployment of services triggered by the service manager  e.g. service implementation by automatic configuration of network components0.393
G06Q50/32Post and telecommunications | franking apparatus | (ref: G07B17/00)0.393
G06F21/85interconnection devices  e.g. bus-connected or in-line devices0.393
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.393
G06F21/79in semiconductor storage media  e.g. directly-addressable memories0.393
G06F12/14Protection against unauthorised use of memory | or access to memory0.393
G06Q30/0251Targeted advertisement0.393
G06Q20/047using payment protocols involving electronic receipts0.393
G06Q20/20Point-of-sale [POS] network systems0.393
G07G3/003Anti-theft control | theft alarms | (ref: G08B13/00)0.393
G06Q20/36using electronic wallets or electronic money safes0.393
G06Q20/209Specified transaction journal output feature  e.g. printed receipt or voice output0.393
G07G1/0036Checkout procedures0.393
G06Q20/3221Access to banking information through M-devices0.393
G07G1/0081the reader being a portable scanner or data reader | (ref: G07G1/009)|  takes precedence0.393
G06Q20/387Payment using discounts or coupons | relating to marketing | (ref: G06Q30/02)0.393
G06Q20/208Input by product or record sensing  e.g. weighing or scanner processing0.393
G06Q30/0277Online advertisement0.392
G10L17/22Interactive procedures| Man-machine interfaces0.392
H04L65/1076Screening of IP real time communications  e.g. spam over Internet telephony [SPIT]0.392
H04L67/12specially adapted for proprietary or special-purpose networking environments  e.g. medical networks  sensor networks  networks in vehicles or remote metering networks0.392
G08B25/10using wireless transmission systems | (ref: G08B25/009)|  takes precedence0.392
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)| | virtual private networks for security | (ref: H04L63/0272)0.392
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.392
H04L41/082the condition being updates or upgrades of network functionality0.392
H04L63/164at the network layer0.392
H04L41/0806for initial configuration or provisioning  e.g. plug-and-play0.392
H04L41/0893Assignment of logical groups to network elements0.392
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication0.392
H04L65/65Network streaming protocols  e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]0.392
H04L65/1053IP private branch exchange [PBX] functionality entities or arrangements | circuit switched PBXs | (ref: H04M3/00)0.392
H04M3/42Systems providing special services or facilities to subscribers | specially adapted for wireless communication networks | (ref: H04W4/00)0.392
H04W12/10Integrity0.392
G06Q20/32using wireless devices0.392
G06Q20/3255using mobile network messaging services for payment  e.g. SMS0.392
H04L43/10Active monitoring  e.g. heartbeat  ping or trace-route0.392
H04L63/108when the policy decisions are valid for a limited amount of time0.392
G06Q50/26Government or public services0.391
G06Q10/025Coordination of plural reservations  e.g. plural trip segments  transportation combined with accommodation0.391
G06Q20/14specially adapted for billing systems0.391
G07F17/26for printing  stamping  franking  typing or teleprinting apparatus | ticket printing or the like apparatus | (ref: G07F17/42)0.391
H04W12/04Key management  e.g. using generic bootstrapping architecture [GBA]0.391
G06Q40/04Exchange  e.g. stocks  commodities  derivatives or currency exchange0.391
G06Q30/04Billing or invoicing |   e.g. tax processing in connection with a sale0.391
G06F16/972Access to data in other repository systems  e.g. legacy data or dynamic Web page generation0.391
H04W12/33using wearable devices  e.g. using a smartwatch or smart-glasses0.391
G06Q10/103Workflow collaboration or project management0.391
G06Q10/063Operations research or analysis0.390
H04L12/06Answer-back mechanisms or circuits0.390
H04L67/1023based on a hash applied to IP addresses or costs0.390
H04L12/28characterised by path configuration  e.g. LAN [Local Area Networks] or WAN [Wide Area Networks] | wireless communication networks | (ref: H04W)|  | | arrangements for dividing the transmission path | (ref: H04W40/00)0.390
H04L47/82Miscellaneous aspects0.390
H04L43/0852Delays0.390
H04L61/30Managing network names  e.g. use of aliases or nicknames | name-to-address mapping | (ref: H04L61/45)0.390
H04L61/58Caching of addresses or names0.390
H04L67/54Presence management  e.g. monitoring or registration for receipt of user log-on information  or the connection status of the users0.389
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys0.389
G06Q20/367involving electronic purses or money safes0.389
G06Q20/227characterised in that multiple accounts are available  e.g. to the payer0.389
H04W88/02Terminal devices0.389
H04M3/4878Advertisement messages0.388
H04M3/493Interactive information services  e.g. directory enquiries | | Arrangements therefor  e.g. interactive voice response [IVR] systems or voice portals0.388
G06V40/16Human faces  e.g. facial parts  sketches or expressions0.388
G01S13/46Indirect determination of position data0.388
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.388
G06F21/305by remotely controlling device operation0.387
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems0.387
H04M3/42042Notifying the called party of information on the calling party | details within substation equipment | (ref: H04M1/57)|   signalling details | (ref: H04Q3/72)0.387
H04M3/42195Arrangements for calling back a calling subscriber | when the wanted subscriber ceases to be busy | (ref: H04M3/48)0.387
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]0.387
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model0.387
H04M3/5158in combination with automated outdialling systems | devices for signalling identity of wanted subscriber | (ref: H04M1/26)0.387
G06Q10/0639Performance analysis0.387
H04M3/38Graded-service arrangements  i.e. some subscribers prevented from establishing certain connections | queuing arrangements | (ref: H04Q3/64)0.387
H04M3/4228in networks0.387
G06Q30/0201Market data gathering  market analysis or market modelling0.387
G06F16/9537Spatial or temporal dependent retrieval  e.g. spatiotemporal queries0.387
G06F16/29Geographical information databases0.387
H04L67/04specially adapted for terminals or networks with limited capabilities| specially adapted for terminal portability0.387
G06F3/048Interaction techniques based on graphical user interfaces [GUI]0.387
G06F16/58Retrieval characterised by using metadata  e.g. metadata not derived from the content or metadata generated manually0.387
G06F3/04842Selection of displayed objects or displayed text elements | (ref: G06F3/0482)|  takes precedence0.386
G06F3/04817using icons | graphical or visual programming using iconic symbols | (ref: G06F8/34)0.386
G06F3/0482Interaction with lists of selectable items  e.g. menus0.386
H04L67/60Scheduling or organising the servicing of application requests  e.g. requests for application data transmissions using the analysis and optimisation of the required network resources | admission control or resource allocation | (ref: H04L47/70)0.386
H04L67/567Integrating service provisioning from a plurality of service providers0.386
H04L67/104Peer-to-peer [P2P] networks0.386
H04L1/0025Transmission of mode-switching indication0.386
G06F9/543User-generated data transfer  e.g. clipboards  dynamic data exchange [DDE]  object linking and embedding [OLE]0.386
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]0.386
H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation | means for verifying the identity or the authority of a user of a secure or secret communication system | (ref: H04L9/32)0.386
G06Q20/3263characterised by activation or deactivation of payment capabilities0.386
G07F7/1091Use of an encrypted form of the PIN0.386
G06K19/06028using bar codes0.386
G06F9/4451User profiles| Roaming0.386
G06F9/452Remote windowing  e.g. X-Window System  desktop virtualisation | protocols for virtual reality | (ref: H04L67/131)0.386
H04N21/25841involving the geographical location of the client | retrieval from the Internet by querying based on geographical locations | (ref: G06F16/9537)| | arrangements for identifying locations of receiving stations in broadcast systems | (ref: H04H60/51)| | location of the user terminal in data switching networks | (ref: H04L67/52)| | services making use of the location of users or terminals in wireless networks | (ref: H04W4/02)| | locating users or terminals in wireless networks | (ref: H04W64/00)0.386
H04N21/6131involving transmission via a mobile phone network | wireless downlink channel access | (ref: H04W74/006)0.386
H04N21/6175involving transmission via Internet | broadcast-related systems characterised by the transmission system being the Internet | (ref: H04H60/82)0.386
H04N21/4786e-mailing | message switching systems  e.g. electronic mail systems | (ref: H04L51/00)0.386
H04N21/4755for defining user preferences  e.g. favourite actors or genre | retrieval personalisation and generation of user profiles for the retrieval of video data | (ref: G06F16/739)| | user profiles in network data switching protocols | (ref: H04L67/306)0.386
H04N21/4753for user identification  e.g. by entering a PIN or password | cryptographic authentication protocols | (ref: H04L9/32)| | networks authentication protocols | (ref: H04L63/08)0.386
H04N21/6181involving transmission via a mobile phone network | arrangements for providing broadcast or conference services to substation in data switching networks in combination with wireless systems | (ref: H04L12/189)| | wireless uplink channel access | (ref: H04W74/004)0.386
H04N21/41407embedded in a portable device  e.g. video client on a mobile phone  PDA  laptop | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)| | arrangements specially adapted for mobile receivers in broadcast systems | (ref: H04H20/57)0.386
H04N21/252Processing of multiple end-users' preferences to derive collaborative data0.386
H04N21/6125involving transmission via Internet | transmission by internet of broadcast information | (ref: H04H60/82)0.386
H04N21/6543for forcing some client operations  e.g. recording | remote booting in general | (ref: G06F9/4416)0.386
H04N21/4751for defining user accounts  e.g. accounts for children0.386
G06Q20/347Passive cards0.385
G07F7/10together with a coded signal |   e.g. in the form of personal identification information  like personal identification number [PIN] or biometric data0.385
G07F7/1075PIN is checked remotely0.385
G06Q20/3226Use of secure elements separate from M-devices0.385
G06Q20/352Contactless payments by cards0.385
G06Q20/3278RFID or NFC payments by means of M-devices0.385
H04W12/50Secure pairing of devices0.385
H04W76/11Allocation or use of connection identifiers0.385
H04L12/14Charging |   metering or billing|  arrangements | for data wireline or wireless communications0.385
H04L61/5076Update or notification mechanisms  e.g. DynDNS0.385
C07K14/53Colony-stimulating factor [CSF]0.385
G07F7/025by means  e.g. cards  providing billing information at the time of purchase  e.g. identification of seller or purchaser  quantity of goods delivered or to be delivered0.385
G06Q30/0225Avoiding frauds0.385
G06Q20/342Cards defining paid or billed services or quantities0.385
A63F13/352involving special game server arrangements  e.g. regional servers connected to a national server or a plurality of servers managing partitions of the game world0.385
A63F13/79involving player-related data  e.g. identities  accounts  preferences or play histories0.385
H04L67/131Protocols for games  networked simulations or virtual reality0.385
G16H70/60relating to pathologies0.385
G16H20/30relating to physical therapies or activities  e.g. physiotherapy  acupressure or exercising0.385
G16H50/70for mining of medical data  e.g. analysing previous cases of other patients0.385
A61B5/0205Simultaneously evaluating both cardiovascular conditions and different types of body conditions  e.g. heart and respiratory condition0.385
A61B5/14532for measuring glucose  e.g. by tissue impedance measurement0.385
A61B5/1455using optical sensors  e.g. spectral photometrical oximeters0.385
G16H20/10relating to drugs or medications  e.g. for ensuring correct administration to patients0.385
A61B5/1495Calibrating or testing of in-vivo probes0.385
G16H20/70relating to mental therapies  e.g. psychological therapy or autogenous training0.385
G16H40/63for local operation0.385
G16H70/20relating to practices or guidelines0.385
A61B5/7475User input or interface means  e.g. keyboard  pointing device  joystick0.385
A61B5/6898Portable consumer electronic devices  e.g. music players  telephones  tablet computers0.385
G16H40/67for remote operation0.385
G16H70/40relating to drugs  e.g. their side effects or intended usage0.385
A61B5/7465Arrangements for interactive communication between patient and care services  e.g. by using a telephone network | telemetry of measured physiological signal | (ref: A61B5/0002)0.385
G16H20/60relating to nutrition control  e.g. diets0.385
G06Q20/383Anonymous user system0.384
G06Q10/02Reservations  e.g. for tickets  services or events0.384
G10L13/00Speech synthesis| Text to speech systems0.384
G10L15/30Distributed recognition  e.g. in client-server systems  for mobile phones or network applications0.384
H04M1/72469for operating the device by selecting functions from two or more displayed items  e.g. menus or icons0.384
H04M7/0045where the text-based messaging service is an instant messaging service0.384
H04M3/42382Text-based messaging services in telephone networks such as PSTN/ISDN  e.g. User-to-User Signalling or Short Message Service for fixed networks0.384
G06Q20/3229Use of the SIM of a M-device as secure element0.384
G06F21/86Secure or tamper-resistant housings0.383
G06F11/3438monitoring of user actions | tracking the activity of the user | (ref: H04L67/535)0.383
H04W12/041Key generation or derivation0.382
H04W12/0431Key distribution or pre-distribution| Key agreement0.382
H04W12/0433Key management protocols0.382
G06Q30/0631Item recommendations0.382
G06F3/0683Plurality of storage devices0.382
G06F3/0689Disk arrays  e.g. RAID  JBOD0.382
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme0.382
H04L65/1086session scope modification0.382
H04L12/1822Conducting the conference  e.g. admission  detection  selection or grouping of participants  correlating users to one or more conference sessions  prioritising transmission0.382
H04L65/1094Inter-user-equipment sessions transfer or sharing0.382
H04L65/1093by adding participants| by removing participants0.382
G06Q40/025Credit processing or loan processing  e.g. risk analysis for mortgages0.382
G06F16/2379Updates performed during online database operations| commit processing0.382
G06F8/38for implementing user interfaces0.382
G06F8/35model driven0.382
G06F21/608Secure printing0.381
G06Q20/08Payment architectures0.381
G06Q20/085involving remote charge determination or related payment systems0.381
G06Q20/16Payments settled via telecommunication systems0.381
G06F21/6272by registering files or documents with a third party0.381
H04M3/5231with call back arrangements0.381
G06Q30/0242Determination of advertisement effectiveness0.381
H04W8/245from a network towards a terminal0.381
H04W12/42using virtual identity modules0.381
G06Q10/0833Tracking0.380
G06V40/1365Matching| Classification0.380
G06Q30/0239Online discounts or incentives0.380
G06Q30/0247Calculate past  present or future revenues0.380
H04L12/1403Architecture for metering  charging or billing0.380
G06F16/686using information manually generated  e.g. tags  keywords  comments  title or artist information  time  location or usage information  user ratings0.380
G06Q50/10Services0.380
H04M15/41Billing record details  i.e. parameters  identifiers  structure of call data record [CDR]0.380
H04W4/24Accounting or billing0.380
G06F16/64Browsing| Visualisation therefor | generation of a list or set of audio data | (ref: G06F16/638)0.380
H04N21/2543Billing |   e.g. for subscription services | payment schemes  architectures or protocols | (ref: G06Q20/00)| | e-commerce | (ref: G06Q30/00)| | arrangements for billing for the use of broadcast information or broadcast-related information | (ref: H04H60/21)0.380
H04L51/42Mailbox-related aspects  e.g. synchronisation of mailboxes0.380
H04M3/4872Non-interactive information services0.380
G06F16/637Administration of user profiles  e.g. generation  initialization  adaptation or distribution0.380
G06F16/68Retrieval characterised by using metadata  e.g. metadata not derived from the content or metadata generated manually0.380
H04L67/62Establishing a time schedule for servicing the requests0.380
G06F16/639using playlists0.380
H04M15/8005Flat-fee0.380
G06F16/901Indexing| Data structures therefor| Storage structures | for retrieval from the web | (ref: G06F16/951)0.380
H04L67/566Grouping or aggregating service requests  e.g. for unified processing0.380
G06F9/5072Grid computing0.380
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)0.380
H04L41/5041characterised by the time relationship between creation and deployment of a service0.380
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities0.379
G06F21/77in smart cards0.379
G06F21/73by creating or determining hardware identification  e.g. serial numbers0.379
H04L9/0662with particular pseudorandom sequence generator0.379
H04L12/1482involving use of telephony infrastructure for billing for the transport of data  e.g. call detail record [CDR] or intelligent network infrastructure0.379
H04N21/25875involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | networks authentication protocols | (ref: H04L63/08)| | authentication in wireless network security | (ref: H04W12/06)0.379
H04N21/4524involving the geographical location of the client | retrieval from the Internet by querying based on geographical locations | (ref: G06F16/9537)| | systems specially adapted for using geographical information in broadcast systems | (ref: H04H60/70)| | protocols in which the network application is adapted for the location of the user terminal in communication control or processing | (ref: H04L67/52)| | services making use of the location of users or terminals in wireless networks | (ref: H04W4/02)| | locating users or terminals in wireless networks | (ref: H04W64/00)0.379
G06F16/953Querying  e.g. by the use of web search engines0.379
H04W12/00Security arrangements| Authentication| Protecting privacy or anonymity0.379
G06F16/256in federated or virtual databases0.379
H04L67/142Managing session states for stateless protocols| Signalling session states| State transitions| Keeping-state mechanisms0.379
H04L43/04Processing captured monitoring data  e.g. for logfile generation0.379
H04L41/28Restricting access to network management systems or functions  e.g. using authorisation function to access network configuration0.379
H04L67/5681Pre-fetching or pre-delivering data based on network characteristics0.379
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)0.379
H04L12/6418Hybrid transport0.379
H04L67/289Intermediate processing functionally located close to the data consumer application  e.g. in same machine  in same home or in same sub-network0.379
H04L43/045for graphical visualisation of monitoring data0.379
G06F11/0709in a distributed system consisting of a plurality of standalone computer nodes  e.g. clusters  client-server systems0.379
G06F11/0769Readable error formats  e.g. cross-platform generic formats  human understandable formats0.379
G06F11/0787Storage of error reports  e.g. persistent data storage  storage using memory protection0.379
H04L67/562Brokering proxy services0.379
G06F16/2228Indexing structures0.378
G06Q20/027involving a payment switch or gateway0.378
G06F12/16Protection against loss of memory contents | contains no material  | see|  | (ref: G06F11/00)0.378
H04L67/00Network arrangements or protocols for supporting network services or applications | user-to-user messaging | (ref: H04L51/00)| | network arrangements  protocols or services for supporting real-time applications in data packet communications networks | (ref: H04L65/00)0.378
G06F21/121Restricting unauthorised execution of programs0.378
G06V40/19Sensors therefor0.378
H04L67/568Storing data temporarily at an intermediate stage  e.g. caching0.378
H04L61/3015Name registration  generation or assignment0.377
H04L61/4552Lookup mechanisms between a plurality of directories| Synchronisation of directories  e.g. metadirectories0.377
H04L1/1614using bitmaps0.377
H04L65/1036at the edge0.377
G06F16/43Querying0.377
G06F16/41Indexing| Data structures therefor| Storage structures0.377
G06F1/329by task scheduling0.377
H04N21/43637involving a wireless protocol  e.g. Bluetooth  RF or wireless LAN [IEEE 802.11] | arrangements for wireless networking or broadcasting of information in indoor or near-field type systems | (ref: H04B10/114)0.377
H04N21/433Content storage operation  e.g. storage operation in response to a pause request  caching operations0.377
H04N21/4882for displaying messages  e.g. warnings  reminders | arrangements for providing short real-time information to substation in data switching networks | (ref: H04L12/1895)0.377
H04W48/16Discovering  processing access restriction or access information0.377
G07F7/1016Devices or methods for securing the PIN and other transaction-data  e.g. by encryption | arrangements for secret communication  | see|  | (ref: H04L9/00)0.377
G06K19/16the marking being a hologram or diffraction grating0.377
H04M1/72409by interfacing with external accessories | hands-free | (ref: H04M1/60)0.377
H04L61/4594Address books  i.e. directories containing contact information about correspondents | telephone directories in user terminals | (ref: H04M1/27453)0.377
H04W8/18Processing of user or subscriber data  e.g. subscribed services  user preferences or user profiles| Transfer of user or subscriber data0.377
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits0.376
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]0.376
G06F3/033Pointing devices displaced or positioned by the user |   e.g. mice  trackballs  pens or joysticks| Accessories therefor | digitisers characterised by the transducing means | (ref: G06F3/041)0.376
G06F3/038Control and interface arrangements therefor  e.g. drivers or device-embedded control circuitry0.376
A61B5/1116Determining posture transitions0.376
G06F1/1694the I/O peripheral being a single or a set of motion sensors for pointer control or gesture input obtained by sensing movements of the portable computer0.376
G06F1/163Wearable computers  e.g. on a belt0.376
G06F3/0346with detection of the device orientation or free movement in a 3D space  e.g. 3D mice  6-DOF [six degrees of freedom] pointers using gyroscopes  accelerometers or tilt-sensors0.376
A61B5/681Wristwatch-type devices0.376
A61B5/02438with portable devices  e.g. worn by the patient0.376
A61B5/6844Monitoring or controlling distance between sensor and tissue0.376
G06Q20/3267In-app payments0.376
H04L51/063Content adaptation  e.g. replacement of unsuitable content0.376
G06F16/9554by using bar codes0.376
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities0.376
H04W76/19Connection re-establishment0.376
H04W76/10Connection setup0.376
G07F17/3276wherein the players compete  e.g. tournament0.376
G07F17/32for games  toys  sports  or amusements0.376
A63F13/335using Internet0.376
H04L65/401wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions  e.g. white board sharing or spawning of a subconference0.376
H04L41/22comprising specially adapted graphical user interfaces [GUI]0.376
H04L41/0233Object-oriented techniques  for representation of network management data  e.g. common object request broker architecture [CORBA]0.376
G06F11/0784Routing of error reports  e.g. with a specific transmission path or data flow0.376
G06F11/32with visual | or acoustical|  indication of the functioning of the machine0.376
G06Q30/0635Processing of requisition or of purchase orders0.376
H04L41/5067Customer-centric QoS measurements0.376
H04L43/00Arrangements for monitoring or testing data switching networks0.376
H04L41/142using statistical or mathematical methods0.376
H04L65/80Responding to QoS0.376
H04L41/5074Handling of user complaints or trouble tickets0.376
H04L41/5022by giving priorities  e.g. assigning classes of service0.376
H04L41/0879Manual configuration through operator0.376
H04L43/0829Packet loss0.376
H04L43/091Measuring contribution of individual network components to actual service level0.376
H04M15/83Notification aspects0.376
H04L41/0803Configuration setting0.376
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL0.376
H04L43/0817by checking functioning0.376
H04L43/024by adaptive sampling0.376
H04L41/18Delegation of network management function  e.g. customer network management [CNM]0.376
H04L63/162at the data link layer0.376
G06F11/0775Content or structure details of the error report  e.g. specific table structure  specific error fields0.376
H04M15/00Arrangements for metering  time-control or time indication | | Metering  charging or billing arrangements for voice wireline or wireless communications  e.g. VoIP0.376
H04L43/06Generation of reports0.376
H04M15/8044Least cost routing0.376
G06F11/324Display of status information0.376
H04M15/721using the Internet0.376
G06F11/327Alarm or error message display0.376
H04M15/705Account settings  e.g. limits or numbers or payment0.376
H04L41/5083wherein the managed service relates to web hosting0.376
H04L41/024using relational databases for representation of network management data  e.g. managing via structured query language [SQL]0.376
H04L41/5096wherein the managed service relates to distributed or central networked applications0.376
H04L41/0253using browsers or web-pages for accessing management information0.376
H04M15/49Connection to several service providers0.376
H04L12/1428Invoice generation  e.g. customization  lay-out  database processing  algorithms for calculating the bill or formatting invoices as WWW pages | invoicing in general | (ref: G06Q30/04)0.376
H04L41/5061characterised by the interaction between service providers and their network customers  e.g. customer relationship management0.376
H04M15/84Types of notifications0.376
H04M15/8351before establishing a communication0.376
H04L41/5064Customer relationship management0.376
G06F11/0781Error filtering or prioritizing based on a policy defined by the user or on a policy defined by a hardware/software module  e.g. according to a severity level0.376
G06Q99/00Subject matter not provided for in other groups of this subclass0.376
H04M15/51for resellers  retailers or service providers0.376
G06F11/3495for systems0.376
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones0.376
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner0.376
G06F21/72in cryptographic circuits0.376
G06Q20/201Price look-up processing  e.g. updating0.376
H04M3/5141Details of processing calls and other types of contacts in an unified manner | unified messaging in packet-switching networks | (ref: H04L51/56)0.376
H04W4/20Services signaling| Auxiliary data signalling  i.e. transmitting data via a non-traffic channel0.376
H04M7/0027Collaboration services where a computer is used for data transfer and the telephone is used for telephonic communication0.376
H04M3/5166in combination with interactive voice response systems or voice portals  e.g. as front-ends0.376
G06Q10/063112Skill-based matching of a person or a group to a task0.375
G07B17/00733Cryptography or similar special procedures in a franking system0.375
H04L12/1881with schedule organisation  e.g. priority  sequence management0.375
G06Q20/24Credit schemes  i.e. "pay after"0.375
G07F9/002Vending machines being part of a centrally controlled network of vending machines0.375
G06Q20/04Payment circuits0.375
G07F5/18specially adapted for controlling several coin-freed apparatus from one place0.375
H04M15/7655shared by technologies0.375
H04M15/75Account location specifications0.375
H04M15/773per technology  e.g. PSTN or wireless0.375
H04M17/00Prepayment | of wireline communication systems  wireless communication systems or|  telephone systems | using a coded card to authorise calls from a telephone set | (ref: H04M1/675)0.375
H04M15/772per service  e.g. prepay or post-pay0.375
G06F16/4387by the use of playlists0.375
H04N21/4334Recording operations | recording of a television signal | (ref: H04N5/76)| | arrangements for recording or accumulating broadcast information or broadcast-related information | (ref: H04H60/27)0.375
H04N21/4316for displaying supplemental content in a region of the screen  e.g. an advertisement in a separate window0.375
H04N21/8133specifically related to the content  e.g. biography of the actors in a movie  detailed information about an article seen in a video program0.375
H04L65/612for unicast0.375
H04N21/25891being end-user preferences | retrieval of video data in a video database based on user preferences | (ref: G06F16/739)| | arrangements for recognizing users' preferences | (ref: H04H60/46)| | user profiles in network data switching protocols | (ref: H04L67/306)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)0.375
H04N21/44218Detecting physical presence or behaviour of the user  e.g. using sensors to detect if the user is leaving the room or changes his face expression during a TV program | methods or arrangements for recognising human body or animal bodies or body parts | (ref: G06V40/10)| | methods or arrangements for acquiring or recognising human faces  facial parts  facial sketches  facial expressions | (ref: G06V40/16)| | methods or arrangements for recognising movements or behaviour | (ref: G06V40/20)| | arrangements for identifying users in broadcast systems | (ref: H04H60/45)0.375
H04N21/632using a connection between clients on a wide area network  e.g. setting up a peer-to-peer communication via Internet for retrieving video segments from the hard-disk of other client devices | broadcast-related systems characterised by transmission among terminal devices | (ref: H04H60/80)| | distributed application using peer-to-peer [P2P] networks | (ref: H04L67/104)0.375
H04N21/4821using a grid  e.g. sorted out by channel and broadcast time0.375
H04N21/44226on social networks0.375
H04N21/23Processing of content or additional data| Elementary server operations| Server middleware0.375
H04N21/23418involving operations for analysing video streams  e.g. detecting features or characteristics | television picture signal circuitry for scene change detection | (ref: H04N5/147)| | filtering for image enhancement | (ref: G06T5/00)| | methods or arrangements for recognising scenes | (ref: G06V20/00)| | arrangements characterised by components specially adapted for monitoring  identification or recognition of video in broadcast systems | (ref: H04H60/59)0.375
H04N21/258Client or end-user data management  e.g. managing client capabilities  user preferences or demographics  processing of multiple end-users preferences to derive collaborative data | arrangements for services using the result on the distributing side of broadcast systems | (ref: H04H60/66)| | profiles in network data switching protocols | (ref: H04L67/30)0.375
H04N21/235Processing of additional data  e.g. scrambling of additional data or processing content descriptors0.375
H04N21/4394involving operations for analysing the audio stream  e.g. detecting features or characteristics in audio streams | arrangements characterised by components specially adapted for monitoring  identification or recognition of audio in broadcast systems | (ref: H04H60/58)0.375
H04L65/75Media network packet handling0.375
H04N21/84Generation or processing of descriptive data  e.g. content descriptors | systems specially adapted for using meta-information in broadcast systems | (ref: H04H60/73)0.375
G06F16/532Query formulation  e.g. graphical querying0.375
H04N21/47214for content reservation or setting reminders| for requesting event notification  e.g. of sport results or stock market | stock exchange data over packet-switching network | (ref: H04L12/1804)| | push services over packet-switching network | (ref: H04L12/1859)| | notification of incoming messages in packet switching networks | (ref: H04L51/224)0.375
H04N21/44008involving operations for analysing video streams  e.g. detecting features or characteristics in the video stream | arrangements characterised by components specially adapted for monitoring  identification or recognition of video in broadcast systems | (ref: H04H60/59)0.375
H04L65/1089by adding media| by removing media0.375
H04N21/4227Providing|  Remote input by a user located remotely from the client device  e.g. at work0.375
H04L65/60Network streaming of media packets0.375
H04L65/613for the control of the source by the destination | control signals issued by the client directed to the server or network components specially adapted for selective content distribution | (ref: H04N21/637)0.375
H04N21/8547involving timestamps for synchronizing content0.375
H04N21/458Scheduling content for creating a personalised stream  e.g. by combining a locally stored advertisement with an incoming stream| Updating operations  e.g. for OS modules | | time-related management operations | arrangements for replacing or switching information during the broadcast or during the distribution | (ref: H04H20/10)0.375
H04N21/23424involving splicing one content stream with another content stream  e.g. for inserting or substituting an advertisement0.375
H04N21/6334for authorisation  e.g. by transmitting a key | wireless communications network key management | (ref: H04W12/04)| | wireless communications network access security | (ref: H04W12/08)0.375
H04N21/478Supplemental services  e.g. displaying phone caller identification  shopping application0.375
H04N21/4532involving end-user characteristics  e.g. viewer profile  preferences | monitoring of user activities for profile generation for accessing a video database | (ref: G06F16/739)| | user profiles in network data switching protocols | (ref: H04L67/306)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)0.375
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance0.375
H04N21/4344Remultiplexing of multiplex streams  e.g. by modifying time stamps or remapping the packet identifiers0.375
H04N21/278Content descriptor database or directory service for end-user access | details of content or meta data based information retrieval of video data in video databases | (ref: G06F16/739)0.375
H04N21/812involving advertisement data | advertising | per se|  | (ref: G06Q30/02)0.375
H04N21/4147PVR [Personal Video Recorder] | (ref: H04N5/76)|  takes precedence | | arrangements for broadcast with accumulation-type receivers | (ref: H04H20/40)0.375
H04N21/2668Creating a channel for a dedicated end-user group  e.g. insertion of targeted commercials based on end-user profiles | information retrieval from the Internet by querying with filtering and personalisation | (ref: G06F16/9535)| | arrangements for replacing or switching information during the broadcast | (ref: H04H20/10)| | push services over packet-switching network | (ref: H04L12/1859)| | adaptation of message content in packet-switching networks | (ref: H04L51/063)0.375
H04N21/43635HDMI0.375
H04N21/4402involving reformatting operations of video signals for household redistribution  storage or real-time display | details of conversion of video standards at pixel level | (ref: H04N7/01)| | video transcoding | (ref: H04N19/40)| | adapting incoming signals to the display format of the display terminal | (ref: G09G5/005)| | media handling at the source in data packet switching networks | (ref: H04L65/764)0.375
H04N21/4884for displaying subtitles0.375
G06F11/2048where the redundant components share neither address space nor persistent storage0.374
H04M3/565relating to time schedule aspects0.374
G06F11/2007using redundant communication media0.374
H04M3/563User guidance or feature selection0.374
H04M3/12Marking faulty circuits "busy"| Enabling equipment to disengage itself from faulty circuits | | Using redundant circuits| Response of a circuit  apparatus or system to an error0.374
H04M3/562where the conference facilities are distributed0.374
G06F11/2035without idle spare hardware0.374
H04N21/4405involving video stream decryption0.374
H04N21/2347involving video stream encryption0.374
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)0.374
G16H40/20for the management or administration of healthcare resources or facilities  e.g. managing hospital staff or surgery rooms0.374
G06N5/04Inference methods or devices0.374
H04L12/185with management of multicast group membership0.374
G06Q20/204comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit0.374
G06Q20/325using wireless networks0.374
G06Q20/223based on the use of peer-to-peer networks0.373
H04N21/2396characterized by admission policies | admission control  resource allocation in open networks | (ref: H04L12/5692)| | arrangements for network security using user profiles for access control | (ref: H04L63/102)| | access security in wireless networks | (ref: H04W12/08)0.373
G06F3/0486Drag-and-drop0.373
G06F3/04847Interaction techniques to control parameter settings  e.g. interaction with sliders or dials0.373
G06F3/04845for image manipulation  e.g. dragging  rotation  expansion or change of colour0.373
H04L43/0876Network utilisation  e.g. volume of load or congestion level0.373
H04L41/0853by actively collecting configuration information or by backing up configuration information0.373
G06Q20/4018using the card verification value [CVV] associated with the card0.373
G06F3/016Input arrangements with force or tactile feedback as computer generated output to the user0.373
H04N21/6582Data stored in the client  e.g. viewing habits  hardware capabilities  credit card number | arrangements where receivers interact with the broadcast | (ref: H04H20/38)0.373
H04N21/472End-user interface for requesting content  additional data or services| End-user interface for interacting with content  e.g. for content reservation or setting reminders  for requesting event notification  for manipulating displayed content | end-user interfaces for retrieving video data from a database | (ref: G06F16/739)| | network services for supporting unicast streaming | (ref: H04L65/612)0.373
H04N21/63345by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | network support of key management | (ref: H04L63/06)0.373
H04N21/44204Monitoring of content usage  e.g. the number of times a movie has been viewed  copied or the amount which has been watched | monitoring of user activities for profile generation for accessing a video database | (ref: G06F16/739)| | protecting generic digital content where the protection is independent of the precise nature of the content | (ref: G06F21/10)| | arrangements for monitoring the use made of the broadcast services in broadcast systems | (ref: H04H60/31)0.373
H04N21/8113comprising music  e.g. song in MP3 format0.373
H04N21/2541Rights Management | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security in data switching network management | (ref: H04L41/28)| | security management or policies for network security | (ref: H04L63/20)| | access security in wireless networks | (ref: H04W12/08)0.373
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.373
H04N21/4828for searching program descriptors | retrieval of video data | (ref: G06F16/739)0.373
H04N21/4143embedded in a|  Personal Computer [PC]0.373
G06F16/248Presentation of query results0.373
G06F16/2457with adaptation to user needs0.373
H04L65/4015where at least one of the additional parallel sessions is real time or time sensitive  e.g. white board sharing  collaboration or spawning of a subconference0.373
G06Q20/127Shopping or accessing services according to a time-limitation0.373
H04M7/0036where the data service is an information service0.373
H04M3/4931Directory assistance systems0.373
H05K7/20509Cold plates  e.g. multi-component heat spreader  support plates  non closed structures0.373
H01L23/367Cooling facilitated by shape of device | (ref: H01L23/38)|   | (ref: H01L23/40)|   | (ref: H01L23/42)|   | (ref: H01L23/44)|   | (ref: H01L23/46)|  take precedence0.373
H05K7/20409Outer radiating structures on heat dissipating housings  e.g. fins integrated with the housing0.373
H04M3/2254in networks0.373
H04M3/2263Network management0.373
G06F16/27Replication  distribution or synchronisation of data between databases or within a distributed database system| Distributed database system architectures therefor0.373
G06Q30/0279Fundraising management0.373
G06F16/245Query processing0.373
H04L65/4061Push-to services  e.g. push-to-talk or push-to-video0.373
H04M3/5133Operator terminal details0.373
G06F16/986Document structures and storage  e.g. HTML extensions0.372
G06V40/18Eye characteristics  e.g. of the iris0.372
H04N7/152Multipoint control units therefor0.372
G06F40/58Use of machine translation  e.g. for multi-lingual retrieval  for server-side translation for client devices or for real-time translation0.372
H04L12/1827Network arrangements for conference optimisation or adaptation0.372
G06Q10/1095Meeting or appointment0.372
H04Q3/0045involving hybrid  i.e. a mixture of public and private  or multi-vendor systems0.372
A63F13/35Details of game servers0.372
G06F16/907Retrieval characterised by using metadata  e.g. metadata not derived from the content or metadata generated manually0.372
H04L41/046comprising network management agents or mobile agents therefor0.372
H04L41/0896Bandwidth or capacity management  i.e. automatically increasing or decreasing capacities | flow or congestion control using dynamic resource allocation  e.g. in-call renegotiation  | (ref: H04L47/76)0.372
H04L41/069using logs of notifications| Post-processing of notifications0.372
H04M7/1205where the types of switching equipement comprises PSTN/ISDN equipment and switching equipment of networks other than PSTN/ISDN  e.g. Internet Protocol networks0.372
G06F21/575Secure boot0.372
G06Q30/0273Fees for advertisement0.372
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow0.372
H04M3/54Arrangements for diverting calls for one subscriber to another predetermined subscriber | based on the calling party profile | (ref: H04M3/42059)| | based on location | (ref: H04M3/42348)| | based on presence | (ref: H04M3/42365)| | to voice mail | (ref: H04M3/53308)0.371
H04M3/42229Personal communication services  i.e. services related to one subscriber independent of his terminal and/or location | diverting calls from one subscriber to another subscriber  i.e. two different subscriptions | (ref: H04M3/54)| | selecting arrangements in intelligent networks | (ref: H04Q3/005)0.371
H04M3/5307for recording messages comprising any combination of audio and non-audio components0.371
H04L65/765intermediate0.371
H04M3/42272whereby the subscriber registers to the terminals for personalised service provision0.371
H04M3/533Voice mail systems0.371
H04Q3/005Personal communication services  e.g. provisions for portability of subscriber numbers0.371
H04L65/104in the network0.371
H04L65/103in the network0.371
H04N7/163by receiver means only0.371
H04N21/835Generation of protective data  e.g. certificates | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)0.371
H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card0.371
H04N21/4135external recorder | interface circuits between an apparatus for recording television signals and a television receiver | (ref: H04N5/775)0.371
H04M3/42314in private branch exchanges0.371
H04M1/72448with means for adapting the functionality of the device according to specific conditions0.371
H04M1/663Preventing unauthorised calls to a telephone set0.371
H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set | at the operator set in a manual exchange | (ref: H04M5/20)0.371
H04L51/216Handling conversation history  e.g. grouping of messages in sessions or threads0.371
H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence  e.g. one-time-pad [OTP] or Vernam's cipher0.371
G06F2221/2149Restricted operating environment0.156
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.156
G06F2221/2103Challenge-response0.156
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.079
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.071
G06F2221/2117User registration0.071
H04M2203/40related to call centers0.071
H04M2203/6045Identity confirmation0.071
G06F2221/2119Authenticating web pages  e.g. with suspicious links0.070
G06V40/20Movements or behaviour  e.g. gesture recognition | recognition of facial expressions | (ref: G06V40/16)0.070
H04W12/65Environment-dependent  e.g. using captured environmental data0.070
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.070
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.070
G06F2221/2153Using hardware token as a secondary aspect0.070
G06F2221/2101Auditing as a secondary aspect0.069
H04W80/00Wireless network protocols or protocol adaptations to wireless operation0.069
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.068
H04W12/71Hardware identity0.068
H04W84/12WLAN [Wireless Local Area Networks]0.068
H04L2209/16Obfuscation or hiding  e.g. involving white box0.068
H04L2209/42Anonymization  e.g. involving pseudonyms0.068
H04M1/72421with automatic activation of emergency service functions  e.g. upon sensing an alarm0.068
G06F2221/2105Dual mode as a secondary aspect0.068
H04L2209/60Digital content management  e.g. content distribution0.068
G06V30/412Layout analysis of documents structured with printed lines or input boxes  e.g. business forms or tables0.068
G06F2221/2115Third party0.068
H04M1/72451according to schedules  e.g. using calendar applications0.068
H04M1/72454according to context-related or environment-related conditions0.068
H04M2250/10including a GPS signal receiver0.068
H04M2207/18wireless networks0.068
H04L2209/463Electronic voting0.068
G06F2221/032Protect output to user by software means0.068
H04M2203/609Secret communication0.067
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.067
H04M2203/655Combination of telephone service and social networking | messaging within social networks | (ref: H04L51/52)0.067
H04M2203/306Prerecordings to be used during a voice call0.067
H04M2242/30Determination of the location of a subscriber0.067
H04M2242/04for emergency applications0.067
H04M2201/50Telephonic communication in combination with video communication0.067
G06F2221/2113Multi-level security  e.g. mandatory access control0.067
H04W74/00Wireless channel access  e.g. scheduled or random access0.067
H04W8/26Network addressing or numbering for mobility support0.067
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)0.067
G06F2221/2139Recurrent verification0.067
G06F2221/2151Time stamp0.067
G06F2221/2129Authenticate client device independently of the user0.067
G06F2221/2133Verifying human interaction  e.g.  Captcha0.067
H04M2203/1058Shopping and product ordering0.066
G06F2221/2131Lost password  e.g. recovery of lost or forgotten passwords0.066
H04M2203/105Financial transactions and auctions  e.g. bidding | auctioneering devices in packet switching networks | (ref: H04L12/1804)0.066
H04M2203/4536Voicemail combined with text-based messaging0.066
G06F2211/007Encryption  En-/decode  En-/decipher  En-/decypher  Scramble  (De-)compress0.066
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.066
G06F2221/2137Time limited access  e.g. to a computer or data0.066
H04M3/53316Messaging centre selected by message originator0.066
H04M3/42365Presence services providing information on the willingness to communicate or the ability to communicate in terms of media capability or network connectivity0.066
H04M3/42093Notifying the calling party of information on the called or connected party0.066
H04M7/12for working between exchanges having different types of switching equipment  e.g. power-driven and step by step or decimal and non-decimal0.066
H04L12/1895for short real-time information  e.g. alarms  notifications  alerts  updates0.066
Y10S379/90Internet  e.g. Internet phone  webphone  internet-based telephony0.066
H04M7/006Networks other than PSTN/ISDN providing telephone service  e.g. Voice over Internet Protocol (VoIP)   including next generation networks with a packet-switched transport layer | (ref: H04L65/00)|  takes precedence| aspects not specific to the type of network | (ref: H04M3/00)| | special services in those networks | (ref: H04M3/42)0.066
H04M7/0048where the text-based messaging service is a Short Message Service0.066
H04M3/42059Making use of the calling party identifier0.066
H04M2207/20hybrid systems0.066
H04L67/10015Access to distributed or replicated servers  e.g. using brokers0.066
H04M2203/2044Group features  e.g. closed user group0.066
H04L69/16Implementation or adaptation of Internet protocol [IP]  of transmission control protocol [TCP] or of user datagram protocol [UDP]0.066
Y10S379/901Virtual networks or virtual private networks0.065
H04L2101/39Globally routable user-agent uniform resource identifier [GRUU] for the session initiation protocol [SIP]0.065
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.065
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]0.065
G06F2221/2107File encryption0.065
G07C9/38with central registration0.065
H04W12/64using geofenced areas0.065
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.065
H04W12/72Subscriber identity0.065
H04L2101/604Address structures or formats0.065
H04L61/301Name conversion0.065
H04M3/4234Remote access to features of PBX or home telephone systems-teleworking in a PBX0.065
H04M3/5125with remote located operators0.065
G01S13/08Systems for measuring distance only | indirect measurement | (ref: G01S13/46)0.065
G01S2013/468by Triangulation  i.e. two antennas or two sensors determine separately the bearing  direction or angle to a target  whereby with the knowledge of the baseline length  the position data of the target is determined0.065
G06F21/128involving web programs  i.e. using technology especially used in internet  generally interacting with a web browser  e.g. hypertext markup language [HTML]  applets  java0.065
G06F2221/2135Metering0.065
H04L12/2856Access arrangements  e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W)0.064
G06F2221/0771Revocation0.064
H04L2463/103applying security measure for protecting copy right | protecting software against unauthorised usage in a vending or licensing environment  e.g. protection the software providers copyright | (ref: G06F21/10)| | data processing systems or methods  specially adapted for payment schemes  architectures or protocols | (ref: G06Q20/00)| | secrecy systems or subscription systems | (ref: H04N7/16)0.064
G06F2009/45575Starting  stopping  suspending or resuming virtual machine instances0.064
G06F2009/45562Creating  deleting  cloning virtual machine instances0.064
Y04S40/20Information technology specific aspects  e.g. CAD  simulation  modelling  system security0.064
H04L63/308retaining data  e.g. retaining successful  unsuccessful communication attempts  internet access  or e-mail  internet telephony  intercept related information or call content0.064
G06F2211/008Public Key  Asymmetric Key  Asymmetric Encryption0.064
A63F2300/8082Virtual reality0.064
A63F13/213comprising photodetecting means  e.g. cameras  photodiodes or infrared cells | (ref: A63F13/219)|   | (ref: A63F13/655)|  take precedence0.064
A63F13/215comprising means for detecting acoustic signals  e.g. using a microphone0.064
A61B2560/0223of calibration  e.g. protocols for calibrating sensors0.064
A61B5/1118Determining activity level0.064
H04M2250/62user interface aspects of conference calls0.064
G07B11/00Apparatus for validating or cancelling issued tickets0.064
G07B15/00Arrangements or apparatus for collecting fares  tolls or entrance fees at one or more control points | handling coins or valuable papers  e.g. banknotes  | (ref: G07D)| | apparatus for vending or hiring articles or services activated by coins  credit cards  paper currency or the like | (ref: G07F7/00)|   | (ref: G07F17/00)0.064
G06F2221/2147Locking files0.064
H04W76/20Manipulation of established connections0.064
H04W36/0011for data session or connection0.064
G06F2201/87Monitoring of transactions0.064
H04M2203/6009Personal information  e.g. profiles or personal directories being only provided to authorised persons0.064
H04M2203/551Call history | recording a computer conference | (ref: H04L12/1831)0.064
G06V40/13Sensors therefor0.064
G06F2221/0704Device0.063
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.063
H04M2203/358Digital rights management0.063
G06K7/10722Photodetector array or CCD scanning0.063
H04M7/0063where the network is a peer-to-peer network0.063
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.063
H04W24/00Supervisory  monitoring or testing arrangements0.063
G06F2009/45595Network integration| Enabling network access in virtual machine instances0.063
G06F2212/1052Security improvement0.063
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.063
H04M2203/303Marking0.063
H04M2203/301Management of recordings0.063
H04L2209/608Watermarking0.063
H04L65/1016IP multimedia subsystem [IMS]0.063
H04W88/16Gateway arrangements0.063
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.063
H04L2209/68Special signature format  e.g. XML format0.063
G06Q2220/123involving third party for collecting or distributing payments  e.g. clearinghouse0.063
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.063
H04W12/75Temporary identity0.063
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.063
G07B2017/00427Special accounting procedures  e.g. storing special information0.063
G07B2017/00145via the Internet0.063
G07B17/00435Details specific to central  non-customer apparatus  e.g. servers at post office or vendor0.063
G07B2017/00298Visual  e.g. screens and their layouts0.063
G07B2017/00161from a central  non-user location  e.g. for updating rates or software  or for refilling funds0.063
G07B2017/00201Open franking system  i.e. the printer is not dedicated to franking only  e.g. PC (Personal Computer)0.063
H04L2209/30Compression  e.g. Merkle-Damgard construction0.063
H04M3/436Arrangements for screening incoming calls |   i.e. evaluating the characteristics of a call before deciding whether to answer it | based on the calling party profile | (ref: H04M3/42059)| | based on location | (ref: H04M3/42348)| | based on presence | (ref: H04M3/42365)| | diversion | (ref: H04M3/54)0.063
A63F2300/5586for enforcing rights or rules  e.g. to prevent foul play0.063
A63F2300/5593involving scheduling aspects0.063
A63F2300/807Role playing or strategy games0.063
A63F2300/5546using player registration data  e.g. identification  account  preferences  game history0.063
A63F2300/401Secure communication  e.g. using encryption or authentication0.063
A63F13/822Strategy games| Role-playing games  | (ref: A63F13/825)|   | (ref: A63F13/828)|  take precedence0.063
G06F2221/0706Domain0.063
H04M2215/0152General billing plans  rate plans  e.g. charge rates  numbering plans  rate centers  customer accounts0.063
H04M2215/7045Using Internet or WAP0.063
H04M2215/42Least cost routing  i.e. provision for selecting the lowest cost tariff0.063
H04L43/16Threshold monitoring0.063
Y10S707/99937Sorting0.063
H04M2215/82Advice-of-Charge [AOC]  i.e. notify subscriber of charges/cumulative charge| meter at the substation0.063
H04L43/0888Throughput0.063
Y10S707/99931Database or file accessing0.063
H04L41/0681Configuration of triggering conditions0.063
Y10S707/99944Object-oriented database structure0.063
Y10S715/969Network layout and operation interface0.063
Y10S707/99938Concurrency  e.g. lock management in shared database0.063
H04L43/067using time frame reporting0.063
H04M2215/018On-line real-time billing  able to see billing information while in communication  e.g. via the internet0.063
H04L43/062related to network traffic0.063
H04M2215/745Least cost routing  e.g. Automatic or manual  call by call or by preselection0.063
H04L43/0894Packet rate0.063
G06F11/202where processing functionality is redundant | redundant communication control functionality | (ref: G06F11/2005)|   redundant storage control functionality | (ref: G06F11/2089)0.063
H04L41/06Management of faults  events  alarms or notifications0.063
H04L41/5029Service quality level-based billing  e.g. dependent on measured service level customer is charged more or less0.063
Y10S707/99939Privileged access0.063
G06F11/328Computer systems status display | (ref: G06F11/327)|  takes precedence0.063
H04L43/0805by checking availability0.063
G06F2201/81Threshold0.063
H04L43/0811by checking connectivity0.063
H04L41/122of virtualised topologies  e.g. software-defined networks [SDN] or network function virtualisation [NFV]0.063
H04L41/08Configuration management of networks or network elements | address allocation | (ref: H04L61/50)0.063
H04L41/0895Configuration of virtualised networks or elements  e.g. virtualised network function or OpenFlow elements0.063
H04M2215/8108before establishing a communication0.063
H04M2215/54Resellers-retail or service providers billing  e.g. agreements with telephone service operator  activation  charging/recharging of accounts0.063
H04M2215/0168On line or real-time flexible customization or negotiation according to wishes of subscriber0.063
H04L43/106using time related information in packets  e.g. by adding timestamps0.063
H04M2215/0176Billing arrangements using internet0.063
G06F2201/875Monitoring of systems including the internet0.063
H04M2215/7009Account settings  e.g. users  terminals  limits  numbers or payment0.063
H04M2215/0104Augmented  consolidated or itemised billing statement  e.g. additional billing information  bill presentation  layout  format  e-mail  fax  printout  itemised bill per service or per account  cumulative billing  consolidated billing0.063
H04M2215/8129Type of notification0.063
G06F11/0757by exceeding a time limit  i.e. time-out  e.g. watchdogs0.063
G06F2201/86Event-based monitoring0.063
H04M2215/0164Billing record  e.g. Call Data Record [CDR]  Toll Ticket[TT]  Automatic Message Accounting [AMA]  Call Line Identifier [CLI]  details  i.e. parameters  identifiers  structure0.063
H04M2215/0188Network monitoring| statistics on usage on called/calling number0.063
H04M2215/0108Customization according to wishes of subscriber  e.g. customer preferences  friends and family  selecting services or billing options  Personal Communication Systems [PCS]0.063
H04M2215/81Notifying aspects  e.g. notifications or displays to the user0.063
H04L41/5009Determining service level performance parameters or violations of service level contracts  e.g. violations of agreed response time or mean time between failures [MTBF]0.063
H04L43/065related to network devices0.063
H04L41/5032Generating service level reports0.063
H04L43/0847Transmission error0.063
H04M2215/46Connection to several service providers0.063
G06Q2220/10Usage protection of distributed data files0.063
H04M3/523with call distribution or queueing0.063
H04M2203/407Call center operated for multiple customers0.063
G07B2017/00048Software architecture0.063
G07B2017/00887using look-up tables  also called master tables with pointers0.063
G07B2017/00258Electronic hardware aspects  e.g. type of circuits used0.063
G07B2017/00604Printing of advert or logo0.063
G07B2017/00967PSD [Postal Security Device] as defined by the USPS [US Postal Service]0.063
G07B2017/0075Symmetric  secret-key algorithms  e.g. DES  RC2  RC4  IDEA  Skipjack  CAST  AES0.063
G07B2017/00169from a franking apparatus  e.g. for verifying accounting0.063
G07B2017/00056Client-server0.063
G07B2017/00935Passwords0.063
G07B2017/00064Virtual meter  online stamp| PSD functions or indicia creation not at user's location0.063
H04M2215/7268per technology  e.g. PSTN or wireless0.062
H04M2215/724Linked accounts0.062
H04M2215/72Account specifications0.062
H04M2215/725Shared by technologies  e.g. one account for different access technologies0.062
H04M2215/7263per service  e.g. prepay and post-pay0.062
H04M2215/7254Multiple accounts per user0.062
G05B2219/33004Manual control of manipulator  machine0.062
H04L2101/622Layer-2 addresses  e.g. medium access control [MAC] addresses0.062
H04M2201/42Graphical user interfaces0.062
H04M2201/38Displays0.062
H04M2203/5063Centrally initiated conference  i.e. Conference server dials participants | computer conference organisation arrangements | (ref: H04L12/1818)0.062
H04M2201/40using speech recognition | speech recognition | per se|  | (ref: G10L15/00)0.062
H04M15/47Fraud detection or prevention means0.062
H04M3/2281Call monitoring  e.g. for law enforcement purposes| Call tracing| Detection or prevention of malicious calls0.062
G06Q20/327Short range or proximity payments by means of M-devices0.062
G06F8/60Software deployment0.062
H04W80/10adapted for | application|  session management  e.g. SIP [Session Initiation Protocol] | connection management | (ref: H04W76/00)| | arrangements for session management | (ref: H04L67/14)0.062
H04W80/04Network layer protocols  e.g. mobile IP [Internet Protocol]0.062
G06Q2220/16Copy protection or prevention0.062
G06N20/00Machine learning0.062
H04M2203/2072Schedules  e.g. personal calendars0.062
H04M2203/652Call initiation triggered by text message0.062
H04M2203/404Collaboration among agents0.062
H04M2203/2061Language aspects0.062
H04Q2213/1324Conference call0.062
H04Q2213/13248Multimedia0.062
A63F2300/50characterized by details of game servers0.062
A63F2300/407Data transfer via internet0.062
H04L2209/603Digital right managament [DRM]0.062
H04L41/5087wherein the managed service relates to voice services | management of VoIP services | (ref: H04M7/0081)0.062
H04L41/5093wherein the managed service relates to messaging or chat services0.062
H04L41/5025by proactively reacting to service quality change  e.g. by reconfiguration after service quality degradation or upgrade0.062
H04L41/509wherein the managed service relates to media content delivery  e.g. audio  video or TV0.062
H04L41/5003Managing SLA| Interaction between SLA and QoS0.062
Y02P90/80Management or planning0.062
G06F16/00Information retrieval| Database structures therefor| File system structures therefor0.062
G06F2221/034Test or assess a computer or a system0.062
H04L63/1458Denial of Service0.062
H04Q2213/13093Personal computer  PC0.062
H04Q2213/13374Paging0.062
H04Q2213/13179Fax  still picture0.062
H04Q2213/13377Recorded announcement0.062
H04M2203/4509Unified messaging with single point of access to voicemail and other mail or messaging systems | unified messaging in packet switching networks | (ref: H04L51/56)0.062
H04M2203/1091Fixed mobile conversion0.062
H04Q2213/13097Numbering  addressing0.062
H04Q2213/13547subscriber  e.g. profile  database  database access0.062
H04Q2213/13196Connection circuit/link/trunk/junction  bridge  router  gateway0.062
H04W92/02Inter-networking arrangements0.062
H04W88/184Messaging devices  e.g. message centre0.062
H04Q2213/13532mobile networks0.062
H04Q2213/13375Electronic mail0.062
H04Q2213/13109Initializing  personal profile0.062
H04Q2213/13389LAN  internet0.062
H04Q2213/13103Memory0.062
H04Q2213/13345Intelligent networks  SCP0.062
H04Q2213/13098Mobile subscriber0.062
H04Q2213/13546Intelligent Peripheral0.062
H04M2201/60Medium conversion0.062
H04Q2213/135Service creation0.062
H04Q2213/13106Microprocessor  CPU0.062
G11B2020/10537Audio or video recording0.062
G11B20/00086Circuits for prevention of unauthorised reproduction or copying  e.g. piracy | indicating unauthorised use of record carriers in general | (ref: G11B23/28)| | scrambling for television signal recording | (ref: H04N5/913)| | network architectures or network protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)0.062
G11B20/0021involving encryption or decryption of contents recorded on or reproduced from a record carrier0.062
G11B20/00869wherein the remote server can deliver the content to a receiving device0.062
G11B20/00195using a device identifier associated with the player or recorder  e.g. serial numbers of playback apparatuses or MAC addresses0.062
G11B20/0084wherein the usage restriction can be expressed as a specific time or date0.062
H04M1/64Automatic arrangements for answering calls| Automatic arrangements for recording messages for absent subscribers| Arrangements for recording conversations | centralised dictation systems | (ref: H04M11/10)0.062
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.