Validity Report
Full Report
US9678774B2 — Secure migration of virtual machines
Priority Date: 2012-03-08, Publication Date: 2017-06-13, Current Assignee: INVINCIBLE IP LLCReport Generated: 2021-07-23

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP2156310B11.151VIRTUAL MACHINE MIGRATIONGRANT2018-10-312007-04-2539888313GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8321862B21.116System for migrating a virtual machine and resource usage data to a chosen target host based on a migration policyGRANT2012-11-272009-03-2042738770GreatOracle America IncOracle America Inc
EP2724509B11.081METHOD OF DETECTION AND PROTECTION AGAINST ATTACKSGRANT2017-02-012011-06-2446456917GreatOrange SAOrange SA
US8413147B21.073Method  apparatus and system for making a decision about virtual machine migrationGRANT2013-04-022009-07-0143390704GreatHuawei Technologies Co LtdHuawei Technologies Co Ltd
US8954961B21.030Geophysical virtual machine policy allocation using a GPS  atomic clock source or regional peering hostGRANT2015-02-102011-06-3047392075GreatInternational Business Machines CorpInternational Business Machines Corp
EP2737668A11.024VIRTUAL MACHINE MIGRATION TO MINIMIZE PACKET LOSS IN VIRTUALIZED NETWORKGRANT2014-06-042011-07-2747598360GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US9176766B21.004Configurable planned virtual machinesGRANT2015-11-032011-07-0647439445GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2791817B10.992CRYPTOGRAPHIC CERTIFICATION OF SECURE HOSTED EXECUTION ENVIRONMENTSGRANT2018-07-252011-12-1248063959GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9286099B20.980Balancing virtual machine loadsGRANT2016-03-152011-11-2246220810GreatHangzhou H3C Technologies Co LtdHewlett Packard Enterprise Development LP
US10228959B10.979Virtual network for virtual machine communication and migrationGRANT2019-03-122011-06-0265633225GreatGoogle LLCGoogle LLC
EP2488986B10.964METHOD AND DEVICE FOR OPERATING A VIRTUAL MACHINE IN ACCORDANCE WITH AN ASSOCIATED INFORMATION ON ASSIGNMENT OF RIGHTSGRANT2018-03-282009-12-2943567733GreatSiemens AGSiemens AG
US8694638B20.960Selecting a host from a host cluster to run a virtual machineGRANT2014-04-082009-06-2943381955GreatRed Hat Israel LtdRed Hat Israel Ltd
EP2577539A10.953SECURING CUSTOMER VIRTUAL MACHINES IN A MULTI-TENANT CLOUDGRANT2013-04-102010-06-0243919920GreatVMware IncVMware Inc
EP2053509B10.952System for and method of migrating one or more virtual machinesGRANT2018-06-272007-09-3040433992GreatSymantec CorpNortonLifeLock Inc
US7900005B20.938Method and system for the transparent migration of virtual machines storageGRANT2011-03-012007-02-2138208431GreatZimory GmbHZimory GmbH
US9032397B20.936Virtual machine migration with direct physical access controlGRANT2015-05-122008-05-2841381460GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US7941623B20.930Selective exposure of configuration identification data in virtual machinesGRANT2011-05-102007-11-3040676940GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
US8826292B20.925Migrating virtual machines based on level of resource sharing and expected load per resource on candidate target host machinesGRANT2014-09-022010-08-0645557045GreatRed Hat Israel LtdRed Hat Israel Ltd
US7925923B10.923Migrating a virtual machine in response to failure of an instruction to executeGRANT2011-04-122008-01-3143837241GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8800009B10.921Virtual machine service accessGRANT2014-08-052011-12-3051229261GreatGoogle LLCGoogle LLC
EP2483778B10.920DYNAMIC REALLOCATION OF PHYSICAL MEMORY RESPONSIVE TO VIRTUAL MACHINE EVENTSGRANT2019-09-042009-09-3043447788GreatCitrix Systems IncCitrix Systems Inc
US20120173757A10.920ROUTING OPTIMIZATION FOR VIRTUAL MACHINE MIGRATION BETWEEN GEOGRAPHICALLY REMOTE DATA CENTERSAPPLICATION2012-07-052011-01-0546381809GreatInternational Business Machines CorpInternational Business Machines Corp
US9264220B20.920Secure virtual machine provisioningGRANT2016-02-162011-04-2647072596GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US9251349B20.913Virtual machine migrationGRANT2016-02-022010-12-1546236342GreatInternational Business Machines CorpInternational Business Machines Corp
EP2494435B10.909VIRTUALIZED MIGRATION CONTROLGRANT2019-09-112009-10-2243900585GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
EP1594052B10.909VEX - Virtual extension frameworkGRANT2019-01-092004-04-3034939277GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8612577B20.907Systems and methods for migrating software modules into one or more cloudsGRANT2013-12-172010-11-2346065426GreatRed Hat IncRed Hat Inc
EP1622014B10.907Systems and methods for inializing multiple virtual processors within a single virtual machineGRANT2016-08-242004-06-3035134601GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8984104B20.902Self-moving operating system installation in cloud-based networkGRANT2015-03-172011-05-3147262537GreatRed Hat IncRed Hat Inc
US20090064136A10.900UTILIZING SYSTEM CONFIGURATION INFORMATION TO DETERMINE A DATA MIGRATION ORDERAPPLICATION2009-03-052007-08-2740409557GreatInternational Business Machines CorpInternational Business Machines Corp
US20090063752A10.897UTILIZING DATA ACCESS PATTERNS TO DETERMINE A DATA MIGRATION ORDERAPPLICATION2009-03-052007-08-2740409282GreatInternational Business Machines CorpInternational Business Machines Corp
US20100332657A10.897SELECTING A HOST FROM A HOST CLUSTER FOR LIVE MIGRATION OF A VIRTUAL MACHINEAPPLICATION2010-12-302009-06-2943381954GreatRed Hat Israel LtdRed Hat Israel Ltd
US20130152076A10.892Network Access Control Policy for Virtual Machine MigrationAPPLICATION2013-06-132011-12-0748573274GreatCisco Technology IncCisco Technology Inc
US9703586B20.891Distribution control and tracking mechanism of virtual machine appliancesGRANT2017-07-112010-02-1744370530GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US10102018B20.889Introspective application reporting to facilitate virtual machine movement between cloud hostsGRANT2018-10-162011-05-2747220170GreatRed Hat IncRed Hat Inc
US20110119427A10.886SYMMETRIC LIVE MIGRATION OF VIRTUAL MACHINESAPPLICATION2011-05-192009-11-1643992137GreatInternational Business Machines CorpInternational Business Machines Corp
EP2442226B10.886Allocating virtual machines according to user-specific virtual machine metricsGRANT2013-08-072010-10-1244503493GreatCitrix Systems IncCitrix Systems Inc
US8977867B20.880Corralling virtual machines with encryption keysGRANT2015-03-102008-05-0841267850GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2140346B10.879VIRTUAL MACHINE CONTROLGRANT2018-11-212007-04-2639888586GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
EP2569698A20.878REDIRECTION OF INFORMATION FROM SECURE VIRTUAL MACHINES TO UNSECURE VIRTUAL MACHINESGRANT2013-03-202010-05-1044914918GreatCitrix Systems IncCitrix Systems Inc
EP2807599A10.876STORAGE ENCRYPTIONGRANT2014-12-032012-01-2347846121GreatCitrix Systems IncCitrix Systems Inc
US8949431B20.875Method for live migration of virtual machinesGRANT2015-02-032011-08-2447745297GreatRadware LtdRadware Ltd
US8782351B20.875Protecting memory of a virtual guestGRANT2014-07-152011-10-1348086778GreatInternational Business Machines CorpFinjan Blue Inc
US8850430B20.875Migration of virtual machinesGRANT2014-09-302011-01-2546545142GreatInternational Business Machines CorpInternational Business Machines Corp
EP2798492A10.875VIRTUAL MACHINE MIGRATION USING 3GPP MCIMGRANT2014-11-052011-12-2945440554GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
EP2548130B10.873SHAPING VIRTUAL MACHINE COMMUNICATION TRAFFICGRANT2018-12-122010-03-1644648118GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2476057A10.873HARDWARE TRUST ANCHORGRANT2012-07-182009-09-0943648582GreatFujitsu LtdFujitsu Ltd
US8589921B20.870Method and system for target host optimization based on resource sharing in a load balancing host and virtual machine adjustable selection algorithmGRANT2013-11-192009-11-3044069828GreatRed Hat Israel LtdRed Hat Israel Ltd
US8788763B20.866Protecting memory of a virtual guestGRANT2014-07-222011-10-1348081595GreatInternational Business Machines CorpFinjan Blue Inc
US20110321041A10.866METHOD AND SYSTEM FOR MIGRATING A VIRTUAL MACHINEAPPLICATION2011-12-292010-06-2945353849GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8954964B20.866System and method for isolated virtual image and appliance communication within a cloud environmentGRANT2015-02-102012-02-2749004743GreatCA IncCAI Software LLC
US8819113B20.862Remote provisioning of virtual machinesGRANT2014-08-262009-03-0242667732GreatKaseya International LtdKaseya Ltd
US10360122B20.859Tracking cloud installation information using cloud-aware kernel of operating systemGRANT2019-07-232011-05-3147262731GreatRed Hat IncRed Hat Inc
EP2378711B10.859Network policy implementation for a multi-virtual machine applianceGRANT2015-08-122010-03-2344512352GreatCitrix Systems IncCitrix Systems Inc
EP2513789B10.855A SECURE VIRTUALIZATION ENVIRONMENT BOOTABLE FROM AN EXTERNAL MEDIA DEVICEGRANT2019-10-232009-12-1444167925GreatCitrix Systems IncCitrix Systems Inc
EP2513810A20.855METHODS AND SYSTEMS FOR COMMUNICATING BETWEEN TRUSTED AND NON-TRUSTED VIRTUAL MACHINESGRANT2012-10-242009-12-1444142394GreatCitrix Systems IncCitrix Systems Inc
US8826272B20.854Planning a reliable migration in a limited stability virtualized environmentGRANT2014-09-022010-11-2946127512GreatInternational Business Machines CorpInternational Business Machines Corp
EP2663922B10.854PROCESSOR MODE LOCKINGGRANT2019-10-232011-01-1346491657GreatGoogle LLCGoogle LLC
US9720727B10.854Managing virtual machine migrationGRANT2017-08-012010-12-2849770156GreatAmazon Technologies IncAmazon Technologies Inc
US9201678B20.854Placing a virtual machine on a target hypervisorGRANT2015-12-012010-11-2946127517GreatInternational Business Machines CorpDaedalus Blue LLC
EP2690552A10.854METHOD AND DEVICE FOR MIGRATING VIRTUAL MACHINE PARAMETERS AND VIRTUAL MACHINE SERVERGRANT2014-01-292011-03-2446859964GreatHuawei Technologies Co LtdHuawei Technologies Co Ltd
US8694786B20.854Virtual machine images encryption using trusted computing group sealingGRANT2014-04-082011-10-0447993803GreatInternational Business Machines CorpFinjan Blue Inc
US8607054B20.852Remote access to hosted virtual machines by enterprise usersGRANT2013-12-102010-10-1545935148GreatMicrosoft CorpMicrosoft Technology Licensing LLC
EP2372519B10.852Storage optimization selection within a virtualization environmentGRANT2018-06-202010-03-3044202514GreatCitrix Systems IncCitrix Systems Inc
EP0866591B10.851Mechanism for embedding network based control systems in a local network interface deviceGRANT2008-10-081997-02-2625193810GreatSun Microsystems IncSun Microsystems Inc
EP2368182B10.851SYSTEMS AND METHODS FOR FACILITATING MIGRATION OF VIRTUAL MACHINES AMONG A PLURALITY OF PHYSICAL MACHINESGRANT2020-01-012008-12-1942109265GreatCitrix Systems IncCitrix Systems Inc
US8904005B20.850Indentifying service dependencies in a cloud deploymentGRANT2014-12-022010-11-2346065437GreatRed Hat IncRed Hat Inc
EP2318975B10.850PROTECTING A VIRTUAL GUEST MACHINE FROM ATTACKS BY AN INFECTED HOSTGRANT2018-08-222008-08-2841722206GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7203944B10.849Migrating virtual machines among computer systems to balance load caused by virtual machinesGRANT2007-04-102003-07-0937904354GreatVeritas Operating CorpVeritas Technologies LLC
EP2622460A20.849TECHNIQUES FOR STREAMING VIRTUAL MACHINES FROM A SERVER TO A HOSTGRANT2013-08-072010-09-3045826157GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US8175863B10.849Systems and methods for analyzing performance of virtual environmentsGRANT2012-05-082008-02-1346002155GreatQuest Software IncQuest Software Inc
EP2771783B10.848A ROUTER AND A VIRTUAL TRUSTED RUNTIME BIOSGRANT2020-08-052011-08-3054328041GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
US8601583B10.847Certification of virtual machine images in cloud computing environmentsGRANT2013-12-032011-04-1449640963GreatTrend Micro IncTrend Micro Inc
US8924541B20.846Migration of virtual resources over remotely connected networksGRANT2014-12-302011-05-2947220008GreatInternational Business Machines CorpInternational Business Machines Corp
EP1674987B10.846Systems and methods for exposing processor topology for virtual machinesGRANT2012-04-182004-12-2136406489GreatMicrosoft CorpMicrosoft Corp
US8832683B20.846Using memory-related metrics of host machine for triggering load balancing that migrate virtual machineGRANT2014-09-092009-11-3044069827GreatRed Hat Israel LtdRed Hat Israel Ltd
US9703598B20.845Managing virtual machine migrationGRANT2017-07-112010-12-2853718914GreatAmazon Technologies IncAmazon Technologies Inc
US20110314470A10.845Virtual Machine Infrastructure Capable Of Automatically Resuming Paused Virtual MachinesAPPLICATION2011-12-222010-06-2245329848GreatRed Hat Israel LtdRed Hat Israel Ltd
US9606831B20.843Migrating virtual machine operationsGRANT2017-03-282010-11-3046127373GreatRed Hat IncRed Hat Inc
EP2622459A20.839VIRTUAL DESKTOP CONFIGURATION AND OPERATION TECHNIQUESGRANT2013-08-072010-09-3045890749GreatMicrosoft CorpMicrosoft Corp, Microsoft Technology Licensing LLC
US9959132B20.838Managing virtual computing nodes using isolation and migration techniquesGRANT2018-05-012010-09-3053763231GreatAmazon Technologies IncAmazon Technologies Inc
US8140812B20.837Method and apparatus for two-phase storage-aware placement of virtual machinesGRANT2012-03-202009-07-0143413240GreatInternational Business Machines CorpDaedalus Blue LLC
US9250863B10.834Managing virtual machine migrationGRANT2016-02-022010-12-2855174927GreatAmazon Technologies IncAmazon Technologies Inc
EP2411915B10.833VIRTUAL NON-UNIFORM MEMORY ARCHITECTURE FOR VIRTUAL MACHINESGRANT2018-07-112009-03-2642781790GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8966084B20.833Virtual machine load balancingGRANT2015-02-242011-06-1747354641GreatInternational Business Machines CorpInternational Business Machines Corp
US8705513B20.831Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networksGRANT2014-04-222009-12-1544142840GreatAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US8261282B10.830System and method for virtual machine host load protectionGRANT2012-09-042008-09-3046726647GreatNetApp IncNetApp Inc
US9135189B20.829Delivering GPU resources across machine boundariesGRANT2015-09-152011-09-0747752796GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7257811B20.829System  method and program to migrate a virtual machineGRANT2007-08-142004-05-1135349639GreatInternational Business Machines CorpInternational Business Machines Corp
US8984269B20.828Migrating data among cloud-based storage networks via a data distribution serviceGRANT2015-03-172011-02-2846719819GreatRed Hat IncRed Hat Inc
EP1955516B10.826Network access control for many-core systemsGRANT2013-10-022005-11-2938016675GreatIntel CorpIntel Corp
US9122507B20.825VM migration based on matching the root bridge of the virtual network of the origination host and the destination hostGRANT2015-09-012012-02-1848983371GreatCisco Technology IncCisco Technology Inc
US8533343B10.822Virtual network pairsGRANT2013-09-102011-01-1349084247GreatGoogle LLCGoogle LLC
US8819678B20.822Live migration of a guest from a source hypervisor to a target hypervisorGRANT2014-08-262010-12-1546236236GreatRed Hat Israel LtdRed Hat Israel Ltd
US8839447B20.821System and method for virtual image security in a cloud environmentGRANT2014-09-162012-02-2749004813GreatCA IncCAI Software LLC
EP2513784A20.821VIRTUAL STORAGE TARGET OFFLOAD TECHNIQUESGRANT2012-10-242009-12-1744152997GreatMicrosoft CorpMicrosoft Corp, Microsoft Technology Licensing LLC
US20130097296A10.821SECURE CLOUD-BASED VIRTUAL MACHINE MIGRATIONAPPLICATION2013-04-182011-10-1847324235GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US8606897B20.821Systems and methods for exporting usage history data as input to a management platform of a target cloud-based networkGRANT2013-12-102010-05-2845023028GreatRed Hat IncRed Hat Inc
EP2150892A10.819APPARATUS AND METHOD FOR PROVIDING VIRTUALIZED HARDWARE RESOURCES WITHIN A VIRTUAL EXECUTION ENVIRONMENTGRANT2010-02-102007-04-0639592892GreatNetApp IncNetApp Inc
EP2411916B10.817VIRTUAL NON-UNIFORM MEMORY ARCHITECTURE FOR VIRTUAL MACHINESGRANT2020-08-192009-03-2642781792GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2258081A10.817EFFICIENT AND TRANSPARENT REMOTE WAKEUPGRANT2010-12-082008-02-1840956121GreatMicrosoft CorpMicrosoft Corp
US8856782B20.816On-demand disposable virtual work systemGRANT2014-10-072007-03-0140624966GreatGeorge Mason Research Foundation IncGeorge Mason University, George Mason Research Foundation Inc
US20130139155A10.815Adjustment During Migration to a Different Virtualization EnvironmentAPPLICATION2013-05-302011-11-3048468022Great
EP2823397B10.814MULTITENANT ACCESS TO MULTIPLE DESKTOPS ON HOST MACHINE PARTITIONS IN A SERVICE PROVIDER NETWORKGRANT2018-07-112012-03-0749003980GreatVMware IncVMware Inc
US8924560B20.813Optimized game server relocation environmentGRANT2014-12-302010-11-2946127514GreatAT&T Intellectual Property I LP, University of IllinoisAT&T Intellectual Property I LP, University of Illinois
US9672052B10.812Secure inter-process communicationGRANT2017-06-062012-02-1658776395GreatGoogle LLCGoogle LLC
US8904384B20.810Reducing data transfer overhead during live migration of a virtual machineGRANT2014-12-022011-06-1447354818GreatLenovo Enterprise Solutions Singapore Pte LtdLenovo International Ltd
EP2686804B10.809TECHNIQUES FOR SECURING A CHECKED-OUT VIRTUAL MACHINE IN A VIRTUAL DESKTOP INFRASTRUCTUREGRANT2018-08-082011-03-1646829545GreatSymantec CorpNortonLifeLock Inc
EP2394212B10.808METHODS AND SYSTEMS FOR PROVIDING TRANSLATIONS OF DATA RETRIEVED FROM A STORAGE SYSTEM IN A CLOUD COMPUTING ENVIRONMENTGRANT2018-05-232009-02-0441820735GreatCitrix Systems IncCitrix Systems Inc
EP2745474A10.808VIRTUALIZATION GATEWAY BETWEEN VIRTUALIZED AND NON-VIRTUALIZED NETWORKSGRANT2014-06-252011-08-1647713600GreatMicrosoft CorpMicrosoft Corp, Microsoft Technology Licensing LLC
US8522018B20.808Method and system for implementing a mobile trusted platform moduleGRANT2013-08-272006-08-1839102667GreatFujitsu LtdFujitsu Ltd
EP2550621A10.807SYSTEM AND METHOD FOR SECURE CLOUD COMPUTINGGRANT2013-01-302010-03-2544672401GreatEnomaly IncVirtustream IP Holding Co Inc
EP2815317B10.806CONNECTION LEASING FOR HOSTED SERVICESGRANT2020-04-012012-02-1647843386GreatCitrix Systems IncCitrix Systems Inc
US8924539B20.805Combinatorial optimization of multiple resources across a set of cloud-based networksGRANT2014-12-302010-11-2446065429GreatRed Hat IncRed Hat Inc
EP2223548B10.805MIGRATION OF COMPUTER SECRETSGRANT2020-12-232007-12-1740753308GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2820542A10.804ASSIGNING STATES TO CLOUD RESOURCESGRANT2015-01-072012-03-0147843444GreatCitrix Systems IncCitrix Systems Inc
US8375223B20.803Systems and methods for secure distributed storageGRANT2013-02-122009-10-3043926645GreatRed Hat IncRed Hat Inc
US8949428B20.803Virtual machine load balancingGRANT2015-02-032011-06-1747354654GreatInternational Business Machines CorpInternational Business Machines Corp
US10372490B20.802Migration of a virtual machine from a first cloud computing environment to a second cloud computing environment in response to a resource or services in the second cloud computing environment becoming availableGRANT2019-08-062008-05-3041381480GreatRed Hat IncRed Hat Inc
EP2812799A10.800TAGGING PHYSICAL RESOURCES IN A CLOUD COMPUTING ENVIRONMENTGRANT2014-12-172012-02-0947891912GreatCitrix Systems IncCitrix Systems Inc
US8527633B20.800Techniques for addressing geographical location issues in computing environmentsGRANT2013-09-032011-01-0646456110GreatInternational Business Machines CorpInternational Business Machines Corp
EP1917634A20.798DIGITAL LICENSE MIGRATION FROM FIRST PLATFORM TO SECOND PLATFORMGRANT2008-05-072005-08-2237768351GreatMicrosoft CorpMicrosoft Corp
US20070250833A10.797Managing virtual machines with system-wide policiesAPPLICATION2007-10-252006-04-1438620921GreatMicrosoft CorpServiceNow Inc
US10445124B20.796Managing virtual computing nodes using isolation and migration techniquesGRANT2019-10-152010-09-3056234905GreatAmazon Technologies IncAmazon Technologies Inc
US20120311568A10.796Mechanism for Inter-Cloud Live Migration of Virtualization SystemsAPPLICATION2012-12-062011-05-3147262729GreatRed Hat IncRed Hat Inc
US9979694B20.795Managing communications between virtual computing nodes in a substrate networkGRANT2018-05-222010-09-3054363456GreatAmazon Technologies IncAmazon Technologies Inc
EP2070249A10.795A PORTABLE DEVICE FOR USE IN ESTABLISHING TRUSTGRANT2009-06-172006-09-1139183260GreatCommonwealth Scientific and Industrial Research Organization CSIROCommonwealth Scientific and Industrial Research Organization CSIRO
US8863141B20.793Estimating migration costs for migrating logical partitions within a virtualized computing environment based on a migration cost historyGRANT2014-10-142011-12-1448611619GreatInternational Business Machines CorpInternational Business Machines Corp
US8875129B20.792Systems and methods for monitoring and alerting events that virtual machine software produces in a virtual infrastructureGRANT2014-10-282010-02-0544354672GreatTripwire IncTripwire Inc
US20090327781A10.791METHOD AND SYSTEM FOR POWER MANAGEMENT IN A VIRTUAL MACHINE ENVIRONMENT WITHOUT DISRUPTING NETWORK CONNECTIVITYAPPLICATION2009-12-312008-06-3040973127GreatSun Microsystems IncOracle America Inc
US8910152B10.788Migrating a virtual machine by using a hot-plug eventGRANT2014-12-092007-11-3052001835GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
EP2792104B10.788AUTOMATED ACCESS  KEY  CERTIFICATE  AND CREDENTIAL MANAGEMENTGRANT2021-06-302011-12-2148667820GreatSSH Communications Security OySSH Communications Security Oy
US20110202765A10.787SECURELY MOVE VIRTUAL MACHINES BETWEEN HOST SERVERSAPPLICATION2011-08-182010-02-1744370460GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US20100191845A10.786SPECULATIVE VIRTUAL MACHINE RESOURCE SCHEDULINGAPPLICATION2010-07-292009-01-2942355043GreatVMware IncVMware Inc
EP2810403B10.786REMOTE TRUST ATTESTATION AND GEO-LOCATION OF OF SERVERS AND CLIENTS IN CLOUD COMPUTING ENVIRONMENTSGRANT2019-09-252012-01-3048905635GreatIntel CorpIntel Corp
EP1297446B10.785METHOD AND APPARATUS FOR PROVIDING COMPUTER SERVICESGRANT2005-09-212000-07-0522806682GreatErnst and Young LLPErnst and Young LLP
US8751857B20.784Monitoring of highly available virtual machinesGRANT2014-06-102010-04-1344761796GreatRed Hat Israel LtdRed Hat Israel Ltd
US9442771B20.781Generating configurable subscription parametersGRANT2016-09-132010-11-2446065660GreatRed Hat IncRed Hat Inc
US8473557B20.781Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area networkGRANT2013-06-252010-08-2445698630GreatAT&T Intellectual Property I LPUniversity of Massachusetts UMass, AT&T Intellectual Property I LP
US8316125B20.781Methods and systems for automated migration of cloud processes to external cloudsGRANT2012-11-202009-08-3143626484GreatRed Hat IncRed Hat Inc
EP2810209B10.780REMOTE TRUST ATTESTATION AND GEO-LOCATION OF SERVERS AND CLIENTS IN CLOUD COMPUTING ENVIRONMENTSGRANT2019-07-172012-01-3048871526GreatIntel CorpIntel Corp
US8799997B20.779Secure network cloud architectureGRANT2014-08-052011-04-1847007293GreatBank of America CorpBank of America Corp
US8914546B20.778Control method for virtual machine and management computerGRANT2014-12-162011-04-0446928811GreatHitachi LtdHitachi Ltd
US8958293B10.778Transparent load-balancing for cloud computing servicesGRANT2015-02-172011-12-0652463659GreatGoogle LLCGoogle LLC
US8832686B20.774Inherited product activation for virtual machinesGRANT2014-09-092010-10-2945913764GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US10192246B20.773Generating multi-cloud incremental billing capture and administrationGRANT2019-01-292010-11-2446065255GreatRed Hat IncRed Hat Inc
EP2337307B10.773SECURE SUBSCRIBER IDENTITY MODULE SERVICEGRANT2017-05-242009-12-1743663505GreatIntel CorpIntel Corp
US9135037B10.772Virtual network protocolGRANT2015-09-152011-01-1354063510GreatGoogle LLCGoogle LLC
US9558026B20.771Multi-component consent-based virtual machine migrationGRANT2017-01-312011-01-1046545141GreatInternational Business Machines CorpInternational Business Machines Corp
US9063793B20.771Virtual server and virtual machine management method for supporting zero client by providing host interfaces from classified resource pools through emulation or direct connection modesGRANT2015-06-232011-05-1847175962GreatElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
EP2643788B10.771SECURE SOFTWARE LICENSING AND PROVISIONING USING HARDWARE BASED SECURITY ENGINEGRANT2018-09-192010-11-2246065516GreatIntel CorpIntel Corp
EP2569693B10.771METHODS AND SYSTEMS FOR FORCING AN APPLICATION TO STORE DATA IN A SECURE STORAGE LOCATIONGRANT2015-08-122010-05-0944902868GreatCitrix Systems IncCitrix Systems Inc
US9110728B20.769Elastic allocation of computing resources to software applicationsGRANT2015-08-182012-01-3147740803GreatVMware IncVMware Inc
US8621052B20.768Performance tuning for software as a performance level serviceGRANT2013-12-312010-08-2045594928GreatInternational Business Machines CorpInternational Business Machines Corp
US10380078B10.767Dynamic storage tiering in a virtual environmentGRANT2019-08-132011-12-1547520256GreatVeritas Technologies LLCVeritas Technologies LLC
US9323549B20.767Systems and methods for triggering scripts based upon an alert within a virtual infrastructureGRANT2016-04-262010-02-0544354662GreatTripwire IncTripwire Inc
US20090150529A10.766METHOD AND SYSTEM FOR ENFORCING RESOURCE CONSTRAINTS FOR VIRTUAL MACHINES ACROSS MIGRATIONAPPLICATION2009-06-112007-12-1040722798GreatSun Microsystems IncOracle America Inc
EP2761426B10.766IMPLEMENTATION OF SECURE COMMUNICATIONS IN A SUPPORT SYSTEMGRANT2019-01-232011-09-2947993497GreatAmazon Technologies IncAmazon Technologies Inc
US9842004B20.763Adjusting resource usage for cloud-based networksGRANT2017-12-122008-08-2241697514GreatRed Hat IncRed Hat Inc
US9680964B20.762Programming model for installing and distributing occasionally connected applicationsGRANT2017-06-132009-03-1142731757GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9569259B20.762Virtual machine migration toolGRANT2017-02-142011-06-2947391778GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9883008B20.762Virtualization of multiple distinct website hosting architecturesGRANT2018-01-302010-01-1550882190GreatEndurance International Group IncNewfold Digital Inc
US8782233B20.761Embedding a cloud-based resource request in a specification language wrapperGRANT2014-07-152008-11-2642197384GreatRed Hat IncRed Hat Inc
US8631253B20.761Manager and host-based integrated power saving policy in virtualization systemsGRANT2014-01-142010-08-1745595008GreatRed Hat Israel LtdRed Hat Israel Ltd
US20130086580A10.759MIGRATION OF VIRTUAL MACHINE POOLAPPLICATION2013-04-042011-09-3047993921GreatV3 SYSTEMS IncV3 SYSTEMS HOLDINGS Inc
US8935692B20.759Self-management of virtual machines in cloud-based networksGRANT2015-01-132008-05-2241343039GreatRed Hat IncRed Hat Inc
US8832459B20.758Securely terminating processes in a cloud computing environmentGRANT2014-09-092009-08-2843626589GreatRed Hat IncRed Hat Inc
EP1701268B10.757Method and system for a guest physical address virtualization in a virtual machine environmentGRANT2011-08-172005-03-0836579174GreatMicrosoft CorpMicrosoft Corp
US20050251802A10.757Dynamic migration of virtual machine computer programs upon satisfaction of conditionsAPPLICATION2005-11-102004-05-0834965401GreatInternational Business Machines CorpInternational Business Machines Corp
US9069730B20.756Coordinated reliability management of virtual machines in a virtualized systemGRANT2015-06-302009-06-2943382220GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9183046B20.756Network address retrieval for live migration of a guest system in a virtual machine systemGRANT2015-11-102010-10-2745997912GreatRed Hat Israel LtdRed Hat Israel Ltd
US8909784B20.755Migrating subscribed services from a set of clouds to a second set of cloudsGRANT2014-12-092010-11-2346127378GreatRed Hat IncRed Hat Inc
US9037692B20.755Multiple cloud marketplace aggregationGRANT2015-05-192008-11-2642197368GreatRed Hat IncRed Hat Inc
US9933843B20.750Systems and methods for reducing energy storage requirements in a data centerGRANT2018-04-032011-12-2248669146GreatSchneider Electric IT CorpSchneider Electric IT Corp
EP2495681A20.750Remote pre-boot authenticationGRANT2012-09-052011-01-1146456142GreatSafeNet IncSafeNet Inc
US8874742B20.750System and method for supporting virtual machine migration in a middleware machine environmentGRANT2014-10-282011-07-1146545922GreatOracle International CorpOracle International Corp
US8271653B20.749Methods and systems for cloud management using multiple cloud management schemes to allow communication between independently controlled cloudsGRANT2012-09-182009-08-3143626495GreatRed Hat IncRed Hat Inc
US9736252B20.748Migrating subscribed services in a cloud deploymentGRANT2017-08-152010-11-2346127376GreatRed Hat IncRed Hat Inc
US9450783B20.748Abstracting cloud managementGRANT2016-09-202009-05-2843221758GreatRed Hat IncRed Hat Inc
US20090210527A10.747Virtual Machine Management Apparatus  and Virtual Machine Management Method and ProgramAPPLICATION2009-08-202006-05-2438723333GreatNEC CorpNEC Corp
EP2524321A20.747UNAFFILIATED WEB DOMAIN HOSTING SERVICE BASED ON A COMMON SERVICE ARCHITECTUREGRANT2012-11-212010-01-1544278187GreatEndurance International Group IncNewfold Digital Inc
US20070266383A10.744METHOD AND SYSTEM FOR VIRTUAL MACHINE MIGRATIONAPPLICATION2007-11-152006-05-1538686558GreatEmbotics CorpEmbotics Corp
US8984507B20.743Cross architecture virtual machine migrationGRANT2015-03-172010-04-2644211966GreatInternational Business Machines CorpInternational Business Machines Corp
US9237087B10.742Virtual machine name resolutionGRANT2016-01-122011-03-1655026597GreatGoogle LLCGoogle LLC
US20120096459A10.742METHOD OF MIGRATING VIRTUAL MACHINEAPPLICATION2012-04-192010-10-1845935255GreatFujitsu LtdFujitsu Ltd
EP2622469B10.742EFFICIENT DATA MANAGEMENT IMPROVEMENTS  SUCH AS DOCKING LIMITED-FEATURE DATA MANAGEMENT MODULES TO A FULL-FEATURED DATA MANAGEMENT SYSTEMGRANT2019-11-132010-09-3045890683GreatCommvault Systems IncCommvault Systems Inc
US8259948B20.741Virtual TPM key migration using hardware keysGRANT2012-09-042007-12-2940798479GreatIntel CorpIntel Corp
EP2807792B10.741AUTHENTICATION FOR NETWORK ACCESS RELATED APPLICATIONSGRANT2018-07-042011-12-2848698197GreatIntel CorpIntel Corp
US9992024B20.741Establishing a chain of trust within a virtual machineGRANT2018-06-052012-01-2548798231GreatFujitsu LtdFujitsu Ltd
US9563479B20.740Brokering optimized resource supply costs in host cloud-based network using predictive workloadsGRANT2017-02-072010-11-3046127377GreatRed Hat IncRed Hat Inc
US8495629B20.740Virtual machine relocation system and associated methodsGRANT2013-07-232009-09-2443757739GreatInternational Business Machines CorpInternational Business Machines Corp
US9329886B20.739Virtual machine morphing for heterogeneous migration environmentsGRANT2016-05-032010-12-1046200811GreatAmazon Technologies IncAmazon Technologies Inc
US8423646B20.739Network-aware virtual machine migration in datacentersGRANT2013-04-162010-07-0945439380GreatInternational Business Machines CorpInternational Business Machines Corp
US8433802B20.738System and method for fair and economical resource partitioning using virtual hypervisorGRANT2013-04-302010-01-2644309812GreatInternational Business Machines CorpInternational Business Machines Corp
EP2562973A10.738VIRTUAL MACHINE MIGRATION METHOD  SWITCH  VIRTUAL MACHINE SYSTEMGRANT2013-02-272011-01-1346482869GreatHuawei Technologies Co LtdHuawei Technologies Co Ltd
US8806576B10.738Managing hardware reboot and reset in shared environmentsGRANT2014-08-122009-09-1047682996GreatAmazon Technologies IncAmazon Technologies Inc
US9037723B20.737Triggering workload movement based on policy stack having multiple selectable inputsGRANT2015-05-192011-05-3147262555GreatRed Hat IncRed Hat Inc
US8874888B10.736Managed boot in a cloud systemGRANT2014-10-282011-01-1351752889GreatGoogle LLCGoogle LLC
US9104407B20.735Flexible cloud management with power management supportGRANT2015-08-112009-05-2843221503GreatRed Hat IncRed Hat Inc
US8619971B20.735Local secure service partitions for operating system securityGRANT2013-12-312005-04-0137109956GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US8776057B20.735System and method for providing evidence of the physical presence of virtual machinesGRANT2014-07-082011-06-0247262733GreatFujitsu LtdFujitsu Ltd
US9424057B20.734Method and apparatus to improve efficiency in the use of resources in data centerGRANT2016-08-232011-08-1946149183GreatHitachi LtdHitachi Ltd
US9465636B20.734Controlling virtual machine in cloud computing systemGRANT2016-10-112011-08-2447745610GreatKT CorpKT Corp
US8984506B20.734Techniques for dynamically discovering and adapting resource and relationship information in virtualized computing environmentsGRANT2015-03-172011-01-0746456220GreatInternational Business Machines CorpInternational Business Machines Corp
US8849971B20.734Load balancing in cloud-based networksGRANT2014-09-302008-05-2841381184GreatRed Hat IncRed Hat Inc
US9942198B20.733Internet isolation for avoiding internet security threatsGRANT2018-04-102011-01-2746581200GreatL3 Technologies IncL3 Technologies Inc
US8930529B10.733Policy enforcement with dynamic address objectGRANT2015-01-062011-09-2752117420GreatPalo Alto Networks IncPalo Alto Networks Inc
EP2622461B10.731SHARED MEMORY BETWEEN CHILD AND PARENT PARTITIONSGRANT2021-01-202010-09-3045890822GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2207122B10.730System and method to provide added security to a platform using locality-based dataGRANT2018-05-162008-12-3142032238GreatIntel CorpIntel Corp
US9582319B20.729Migrating virtual machines across network separated data centersGRANT2017-02-282010-08-1345565574GreatInternational Business Machines CorpInternational Business Machines Corp
US8850026B20.726Methods and apparatus to allocate resources associated with a distributive computing networkGRANT2014-09-302009-11-1644012145GreatAT&T Intellectual Property I LPAT&T Intellectual Property I LP
EP2530591B10.725Control and management of virtual systemsGRANT2017-02-152006-10-1739344990GreatManageIQ IncRed Hat Inc
EP2357558B10.724Independent access to virtual machine desktop contentGRANT2016-08-242010-01-2743838117GreatVMware IncVMware Inc
US8549066B10.724Service provider interface for deploying and managing applications on a cloudGRANT2013-10-012010-08-2649229986GreatAdobe Systems IncAdobe Inc
US8868987B20.724Systems and methods for visual correlation of log events  configuration changes and conditions producing alerts in a virtual infrastructureGRANT2014-10-212010-02-0544354611GreatTripwire IncTripwire Inc
US8978030B20.722Elastic provisioning of resources via distributed virtualizationGRANT2015-03-102011-04-0746966997GreatInfosys LtdInfosys Ltd
US9311162B20.722Flexible cloud managementGRANT2016-04-122009-05-2743221517GreatRed Hat IncRed Hat Inc
US9529689B20.722Monitoring cloud computing environmentsGRANT2016-12-272009-11-3044069779GreatRed Hat IncRed Hat Inc
EP2710755B10.721SECURING ENCRYPTED VIRTUAL HARD DISKSGRANT2018-08-012011-05-2047175864GreatCitrix Systems IncCitrix Systems Inc
US8782128B20.721Global queue pair management in a point-to-point computer networkGRANT2014-07-152011-10-1848086875GreatInternational Business Machines CorpInternational Business Machines Corp
US20130073731A10.720SYSTEM AND METHOD FOR OPTIMIZING MIGRATION OF VIRTUAL MACHINES AMONG PHYSICAL MACHINESAPPLICATION2013-03-212011-09-2047881725GreatInfosys LtdInfosys Ltd
US8903992B20.720Trigger method of computational procedure for virtual machine migration and application program for the sameGRANT2014-12-022011-12-1248573073GreatDelta Electronics IncIngrasys Technology Inc
EP1977317A10.720METHODS AND SYSTEMS FOR PROVIDING ACCESS TO A COMPUTING ENVIRONMENTGRANT2008-10-082006-01-2438003083GreatCitrix Systems IncCitrix Systems Inc
US20090228589A10.719SERVER AND STORAGE-AWARE METHOD FOR SELECTING VIRTUAL MACHINE MIGRATION TARGETSAPPLICATION2009-09-102008-03-0441054750GreatInternational Business Machines CorpHuawei Technologies Co Ltd
US8983860B10.719Advertising auction systemGRANT2015-03-172012-01-3052632353GreatGoogle LLCGoogle LLC
EP2625645A20.718SECURE DEPLOYMENT OF PROVABLE IDENTITY FOR DYNAMIC APPLICATION ENVIRONMENTSGRANT2013-08-142010-10-0845885938GreatMicrosoft CorpMicrosoft Corp, Microsoft Technology Licensing LLC
US8505003B20.717System and method for upgrading kernels in cloud computing environmentsGRANT2013-08-062010-04-2844859358GreatMicro Focus Software IncSuse LLC
EP2705632B10.716SYSTEMS AND METHODS FOR CLOUD BRIDGING BETWEEN PUBLIC AND PRIVATE CLOUDSGRANT2018-07-182011-05-0646085239GreatCitrix Systems IncCitrix Systems Inc
US8862720B20.715Flexible cloud management including external cloudsGRANT2014-10-142009-08-3143626497GreatRed Hat IncRed Hat Inc
EP2462507B10.715METHODS AND APPARATUSES FOR USER-VERIFIABLE TRUSTED PATH IN THE PRESENCE OF MALWAREGRANT2019-07-242009-08-0443796427GreatCarnegie Mellon UniversityCarnegie Mellon University
US20110060832A10.715Fast Determination of Compatibility of Virtual Machines and HostsAPPLICATION2011-03-102009-09-0942937159GreatVMware IncVMware Inc
US10838775B20.714Load balancing by endpointsGRANT2020-11-172011-09-1447615248GreatMicrosoft Technology Licensing LLCMicrosoft Corp, Microsoft Technology Licensing LLC
US8468455B20.714System and method for providing virtual desktop extensions on a client desktopGRANT2013-06-182010-02-2444477511GreatMicro Focus Software IncMicro Focus Software Inc
EP2369479A20.713Methods and systems for providing access to a computing environmentGRANT2011-09-282006-01-2445092433GreatCitrix Systems IncCitrix Systems Inc
US8693485B20.712Virtualization aware network switchGRANT2014-04-082009-10-1443854811GreatDell Products LPDell Products LP
US8346934B20.710Method for executing migration between virtual servers and server system used for the sameGRANT2013-01-012010-01-0542139075GreatHitachi LtdHitachi Ltd
US9389980B20.710Detecting events in cloud computing environments and performing actions upon occurrence of the eventsGRANT2016-07-122009-11-3044069682GreatRed Hat IncRed Hat Inc
US8484639B20.709Fine-grained cloud management control using nested virtualizationGRANT2013-07-092011-04-0546967126GreatInternational Business Machines CorpInternational Business Machines Corp
EP2569902B10.709INTERCONNECTING MEMBERS OF A VIRTUAL NETWORKGRANT2019-06-262010-05-1444912728GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20100306381A10.707MECHANISM FOR MIGRATION OF CLIENT-SIDE VIRTUAL MACHINE SYSTEM RESOURCESAPPLICATION2010-12-022009-05-3143221520GreatRed Hat Israel LtdRed Hat Israel Ltd
US20080046960A10.707COMPUTER WORKLOAD MANAGEMENT WITH SECURITY POLICY ENFORCEMENTAPPLICATION2008-02-212006-08-1639102854GreatInternational Business Machines CorpInternational Business Machines Corp
US9749207B20.706Methods for measuring physical CPU utilization in a cloud computing infrastructureGRANT2017-08-292010-09-2345872024GreatAccenture Global Services LtdAccenture Global Services Ltd
EP2291759A10.706INTERCONNECTABLE PERSONAL COMPUTER ARCHITECTURES THAT PROVIDE SECURE  PORTABLE AND PERSISTENT COMPUTING ENVIRONMENTSGRANT2011-03-092008-06-2041432473GreatLockheed Corp, Lockheed Martin CorpLockheed Corp, Lockheed Martin Corp, GlassBridge Enterprises Inc
EP2141625B10.706System and method to secure boot UEFI firmware and UEFI-aware operating systems on a mobile internet device (mid)GRANT2015-10-072008-06-3041152223GreatIntel CorpIntel Corp
US20050132367A10.705Method  apparatus and system for proxying  aggregating and optimizing virtual machine information for network-based managementAPPLICATION2005-06-162003-12-1634654267GreatIntel CorpIntel Corp
EP2425341A10.705SYSTEMS AND METHODS FOR ESTABLISHING A CLOUD BRIDGE BETWEEN VIRTUAL STORAGE RESOURCESGRANT2012-03-072009-05-0142558586GreatCitrix Systems IncCitrix Systems Inc
US9202225B20.703Aggregate monitoring of utilization data for vendor products in cloud networksGRANT2015-12-012010-05-2845022874GreatRed Hat IncRed Hat Inc
US10025627B20.703On-demand cloud computing environmentsGRANT2018-07-172008-11-2642197569GreatRed Hat IncRed Hat Inc
US8458284B20.702Systems and methods for efficient live application migration within bandwidth constrained networksGRANT2013-06-042009-06-1243307302GreatInternational Business Machines CorpGlobalFoundries Inc
US8364819B20.702Systems and methods for cross-vendor mapping service in cloud networksGRANT2013-01-292010-05-2845023041GreatRed Hat IncRed Hat Inc
US8612615B20.702Systems and methods for identifying usage histories for producing optimized cloud utilizationGRANT2013-12-172010-11-2346065427GreatRed Hat IncRed Hat Inc
US8108912B20.702Systems and methods for management of secure data in cloud-based networkGRANT2012-01-312008-05-2941381528GreatRed Hat IncRed Hat Inc
US9565207B10.701Firmware updates from an external channelGRANT2017-02-072009-09-0457908844GreatAmazon Technologies IncAmazon Technologies Inc
US10033584B20.701Automatically reconfiguring physical switches to be in synchronization with changes made to associated virtual systemGRANT2018-07-242010-09-2245818911GreatJuniper Networks IncJuniper Networks Inc
US8239509B20.701Systems and methods for management of virtual appliances in cloud-based networkGRANT2012-08-072008-05-2841381155GreatRed Hat IncRed Hat Inc
US20060069761A10.701System and method for load balancing virtual machines in a computer networkAPPLICATION2006-03-302004-09-1436100481GreatDell Products LPDell Products LP
EP2332285B10.700METHODS AND SYSTEMS FOR SECURELY MANAGING VIRTUALIZATION PLATFORMGRANT2018-11-072008-09-1242005418GreatHytrust IncHytrust Inc
EP2446356B10.699MIGRATING FUNCTIONALITY IN VIRTUALIZED MOBILE DEVICESGRANT2021-05-052009-06-2642830045GreatVMware IncVMware Inc
EP2415207B10.699SYSTEM AND METHOD FOR ACCESS MANAGEMENT AND SECURITY PROTECTION FOR NETWORK ACCESSIBLE COMPUTER SERVICESGRANT2014-12-032009-03-3142785987Great
US8924723B20.699Managing security for computer servicesGRANT2014-12-302011-11-0448224559GreatInternational Business Machines CorpInternational Business Machines Corp
US7213246B10.699Failing over a virtual machineGRANT2007-05-012002-03-2837991571GreatVeritas Operating CorpVeritas Technologies LLC
US8843624B20.698Computer cluster and method for providing a disaster recovery functionality for a computer clusterGRANT2014-09-232009-12-1142048762GreatDeutsche Telekom AGDeutsche Telekom AG
US8533320B20.695Coalescing network notifications for live migrationGRANT2013-09-102010-12-1546235863GreatRed Hat Israel LtdRed Hat Israel Ltd
EP2248041B10.694EXTENDING SERVER-BASED DESKTOP VIRTUAL MACHINE ARCHITECTURE TO CLIENT MACHINESGRANT2015-04-292008-02-2640999459GreatVMware IncVMware Inc
US8943564B20.694Virtual computer and serviceGRANT2015-01-272011-07-2147556771GreatInternational Business Machines CorpInternational Business Machines Corp
US10268522B20.693Service aggregation using graduated service levels in a cloud networkGRANT2019-04-232009-11-3044069677GreatRed Hat IncRed Hat Inc
US20100223613A10.693PER PROCESS VIRTUAL MACHINESAPPLICATION2010-09-022009-02-2742667845GreatRed Hat IncRed Hat Inc
US7886038B20.692Methods and systems for user identity management in cloud-based networksGRANT2011-02-082008-05-2741381157GreatRed Hat IncRed Hat Inc
US9557980B20.691Seamless application integration apparatus and methodGRANT2017-01-312010-12-1745495639GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US8769083B20.691Metering software infrastructure in a cloud computing environmentGRANT2014-07-012009-08-3143626485GreatRed Hat IncRed Hat Inc
US9870541B20.691Service level backup using re-cloud networkGRANT2018-01-162008-11-2642197158GreatRed Hat IncRed Hat Inc
US20070153691A10.690SYSTEMS AND METHODS FOR AUTOMATED SERVICE MIGRATIONAPPLICATION2007-07-052002-02-2127767543GreatBEA Systems IncBEA Systems Inc
US10177934B10.690Firmware updates inaccessible to guestsGRANT2019-01-082009-09-0464815634GreatAmazon Technologies IncAmazon Technologies Inc
US8732699B10.690Migrating virtual machines between physical machines in a define groupGRANT2014-05-202006-10-2750692418GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9326001B20.690Scalable image distribution in virtualized server environmentsGRANT2016-04-262011-03-2246877417GoodInternational Business Machines CorpInternational Business Machines Corp
EP2577449B10.690METHOD AND APPARATUS FOR TRUSTED EXECUTION IN INFRASTRUCTURE AS A SERVICE CLOUD ENVIRONMENTSGRANT2019-08-072010-05-2745004732GoodCisco Technology IncCisco Technology Inc
US9210173B20.690Securing appliances for use in a cloud computing environmentGRANT2015-12-082008-11-2642197609GoodRed Hat IncRed Hat Inc
US9116735B20.689Offline provisioning of virtual machinesGRANT2015-08-252012-03-0749115236GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US10592262B10.689Managing shared computing environmentsGRANT2020-03-172011-06-2769779207GoodAmazon Technologies IncAmazon Technologies Inc
US8904008B20.688Assignment of resources in virtual machine poolsGRANT2014-12-022012-01-0948744742GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8825863B20.687Virtual machine placement within a server farmGRANT2014-09-022011-09-2047881724GoodInternational Business Machines CorpLenovo International Ltd
US9971880B20.687Verifying software license compliance in cloud computing environmentsGRANT2018-05-152009-11-3044069681GoodRed Hat IncRed Hat Inc
US8341625B20.687Systems and methods for identification and management of cloud-based virtual machinesGRANT2012-12-252008-05-2941381461GoodRed Hat IncRed Hat Inc
US8443077B10.687System and method for managing disk volumes in a hosting systemGRANT2013-05-142010-05-2048225574GoodGogrid LLCSERVEPATH LLC, Open Invention Network LLC
US9910708B20.687Promotion of calculations to cloud-based computation resourcesGRANT2018-03-062008-08-2841726898GoodRed Hat IncRed Hat Inc
US8677115B20.686Methods for verifying system integrityGRANT2014-03-182010-12-0946200630GoodRed Hat IncRed Hat Inc
US8364802B10.686System and method for monitoring a grid of hosting resources in order to facilitate management of the hosting resourcesGRANT2013-01-292008-09-2346396020GoodGogrid LLCOpen Invention Network LLC
US20130227710A10.686SYSTEM AND METHOD FOR SECURING LEASED IMAGES IN A CLOUD ENVIRONMENTAPPLICATION2013-08-292012-02-2749004821GoodComputer Associates Think IncComputer Associates Think Inc
WO2013053019A10.686DISASTER RECOVERY FAILOVER IN CLOUD COMPUTINGAPPLICATION2013-04-182011-10-1448081277Good
US9594581B20.686Modular virtual machine serverGRANT2017-03-142008-07-1441609666GoodDell Products LPDell Products LP
US8631099B20.685Systems and methods for cloud deployment engine for selective workload migration or federation based on workload conditionsGRANT2014-01-142011-05-2747220177GoodRed Hat IncRed Hat Inc
US8799894B20.685End-to-end mapping from operating system running on virtual machine to storage volume of storage-array network (SAN)GRANT2014-08-052009-04-2242993256GoodInternational Business Machines CorpInternational Business Machines Corp
EP1759261A10.685METHOD AND APPARATUS FOR PROVIDING SECURE VIRTUALIZATION OF A TRUSTED PLATFORM MODULEGRANT2007-03-072004-06-2434971848GoodIntel CorpIntel Corp
US8887144B10.684Firmware updates during limited time periodGRANT2014-11-112009-09-0451845953GoodAmazon Technologies IncAmazon Technologies Inc
US10013281B20.683Controlling network utilizationGRANT2018-07-032011-06-2947391801GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8214653B10.683Secured firmware updatesGRANT2012-07-032009-09-0446320291GoodAmazon Technologies IncAmazon Technologies Inc
US8984505B20.682Providing access control to user-controlled resources in a cloud computing environmentGRANT2015-03-172008-11-2642197570GoodRed Hat IncRed Hat Inc
EP2241084B10.682SYSTEMS AND METHODS FOR SECURE HANDLING OF SECURE ATTENTION SEQUENCESGRANT2021-03-312008-02-1540833436GoodCitrix Systems IncCitrix Systems Inc
US8135818B20.682Automatic virtual machine migration in mixed SBC/CBC environmentGRANT2012-03-132009-06-2243355253GoodRed Hat Israel LtdRed Hat Israel Ltd
US8732693B20.682Managing continuous software deploymentGRANT2014-05-202011-08-0447627740GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8910278B20.681Managing services in a cloud computing environmentGRANT2014-12-092010-05-1845818947GoodCLOUDNEXACLOUDNEXA
EP1975830A10.681Distributed computer systemGRANT2008-10-012007-03-3038480553GoodBritish Telecommunications PLCBritish Telecommunications PLC
US9201485B20.681Power management in managed network having hardware based and virtual resourcesGRANT2015-12-012009-05-2943221633GoodRed Hat IncRed Hat Inc
US20100269109A10.681Methods and Systems for Evaluating Historical Metrics in Selecting a Physical Host for Execution of a Virtual MachineAPPLICATION2010-10-212009-04-1742735673GoodCitrix Systems IncCitrix Systems Inc
US20100257269A10.680Method and System for Migrating Processes Between Virtual MachinesAPPLICATION2010-10-072009-04-0142827091GoodVMware IncVMware Inc
US20120311575A10.680SYSTEM AND METHOD FOR ENFORCING POLICIES FOR VIRTUAL MACHINESAPPLICATION2012-12-062011-06-0247262734GoodFujitsu LtdFujitsu Ltd
US9495181B20.679Creating a virtual applianceGRANT2016-11-152011-12-0747278313GoodInternational Business Machines CorpInternational Business Machines Corp
US8856303B20.678Server virtualizationGRANT2014-10-072012-01-0448695870GoodInternational Business Machines CorpInternational Business Machines Corp
EP2798868B10.677REMOTE PROVISIONING OF 3GPP DOWNLOADABLE SUBSCRIBER IDENTITY MODULE FOR VIRTUAL MACHINE APPLICATIONSGRANT2016-03-092011-12-2945443122GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US8924964B20.677Dynamic allocation and assignment of virtual environmentGRANT2014-12-302010-11-0145998110GoodMicrosoft CorpServiceNow Inc
US10601909B20.677Managing replication of computing nodes for provided computer networksGRANT2020-03-242010-05-2452473116GoodAmazon Technologies IncAmazon Technologies Inc
US8930542B20.677Dynamically building a set of compute nodes to host the user's workloadGRANT2015-01-062012-01-2348798168GoodInternational Business Machines CorpInternational Business Machines Corp
US9069616B20.677Bandwidth throttling of virtual disksGRANT2015-06-302011-09-2346981155GoodGoogle LLCGoogle LLC
US10657466B20.676Building custom appliances in a cloud-based networkGRANT2020-05-192008-05-2941380988GoodRed Hat IncRed Hat Inc
US10402544B20.675Generating a software license knowledge base for verifying software license compliance in cloud computing environmentsGRANT2019-09-032009-11-3044069569GoodRed Hat IncRed Hat Inc
US8341213B20.675Method for improving boot time of a client having a virtualized operating environmentGRANT2012-12-252009-06-2243355213GoodRed Hat Israel LtdRed Hat Israel Ltd
US8850429B20.674Load balancing in multi-server virtual workplace environmentsGRANT2014-09-302010-10-0545935257GoodCitrix Systems IncCitrix Systems Inc
EP1677190A20.674Systems and methods for virtualizing graphics subsystemsGRANT2006-07-052004-12-3036096423GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP2689324B10.673STRONG RIGHTS MANAGEMENT FOR COMPUTING APPLICATION FUNCTIONALITYGRANT2018-08-292011-03-2246878472GoodAmazon Technologies IncAmazon Technologies Inc
US8990899B20.673Using a local authorization extension to provide access authorization for a module to access a computing systemGRANT2015-03-242011-12-0148524993GoodInternational Business Machines CorpInternational Business Machines Corp
US8296434B10.673Providing dynamically scaling computing load balancingGRANT2012-10-232009-05-2847017539GoodAmazon Technologies IncAmazon Technologies Inc
US8402139B20.673Methods and systems for matching resource requests with cloud computing environmentsGRANT2013-03-192010-02-2644505895GoodRed Hat IncRed Hat Inc
US10783504B20.673Converting standard software licenses for use in cloud computing environmentsGRANT2020-09-222010-02-2644505825GoodRed Hat IncRed Hat Inc
US8738781B20.673Launching a virtual machine associated with a client during startupGRANT2014-05-272009-06-2243355252GoodRed Hat Israel LtdRed Hat Israel Ltd
US8327373B20.672System and method for structuring self-provisioning workloads deployed in virtualized data centersGRANT2012-12-042010-08-2445698904GoodMicro Focus Software IncSuse LLC
EP1989635A10.672MIGRATING A VIRTUAL MACHINE THAT OWNS A RESOURCE SUCH AS A HARDWARE DEVICEGRANT2008-11-122006-02-2838445496GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8977750B20.672Extending security platforms to cloud-based networksGRANT2015-03-102009-02-2442631859GoodRed Hat IncRed Hat Inc
US8255529B20.670Methods and systems for providing deployment architectures in cloud computing environmentsGRANT2012-08-282010-02-2644505891GoodRed Hat IncRed Hat Inc
US8949426B20.670Aggregation of marginal subscription offsets in set of multiple host cloudsGRANT2015-02-032010-11-2446065439GoodRed Hat IncRed Hat Inc
US20100306767A10.669METHODS AND SYSTEMS FOR AUTOMATED SCALING OF CLOUD COMPUTING SYSTEMSAPPLICATION2010-12-022009-05-2943221760GoodRed Hat IncRed Hat Inc
US8949654B20.669Parameterized dynamic model for cloud migrationGRANT2015-02-032012-01-2748872928GoodEmpire Technology Development LLCEmpire Technology Development LLC
US9354939B20.669Generating customized build options for cloud deployment matching usage profile against cloud infrastructure optionsGRANT2016-05-312010-05-2845023018GoodRed Hat IncRed Hat Inc
US20120054731A10.669Method  System and Computer Programs to Assist Migration to a Cloud Computing EnvironmentAPPLICATION2012-03-012010-08-2445698882GoodInternational Business Machines CorpInternational Business Machines Corp
US10264058B10.668Defining virtual application templatesGRANT2019-04-162011-06-3066098541GoodEMC CorpEMC Corp
US8108668B20.668Associating a multi-context trusted platform module with distributed platformsGRANT2012-01-312006-06-2638874804GoodIntel CorpIntel Corp
US9231933B10.668Providing application programs with access to secured resourcesGRANT2016-01-052011-03-1649084288GoodGoogle LLCGoogle LLC
US8539222B20.668System for securing virtual machine disks on a remote shared storage subsystemGRANT2013-09-172010-12-3146381861GoodInternational Business Machines CorpInternational Business Machines Corp
US8943497B20.668Managing subscriptions for cloud-based virtual machinesGRANT2015-01-272008-05-2941381462GoodRed Hat IncRed Hat Inc
US9323820B10.667Virtual datacenter redundancyGRANT2016-04-262011-06-3055754684GoodEMC CorpEMC Corp
US8799920B20.667Systems and methods of host-aware resource management involving cluster-based resource poolsGRANT2014-08-052011-08-2547745611GoodVirtustream IncVirtustream IP Holding Co Inc
US20120096149A10.666CLOUD FEDERATION IN A CLOUD COMPUTING ENVIRONMENTAPPLICATION2012-04-192010-10-1345935088GoodRACKWARE IncRACKWARE Inc
US8813065B20.665Microcloud platform delivery systemGRANT2014-08-192010-04-2645528025GoodVMware IncPivotal Software Inc
EP1906333B10.665Methods and arrangements to launch trusted  co-existing environmentsGRANT2014-10-222006-09-2638750411GoodIntel CorpIntel Corp
EP2766817A10.665DELIVERING A SINGLE END USER EXPERIENCE TO A CLIENT FROM MULTIPLE SERVERSGRANT2014-08-202011-10-1447729315GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20110119670A10.665METHOD FOR DYNAMIC LOAD BALANCING ON PARTITIONED SYSTEMSAPPLICATION2011-05-192006-12-2939585940GoodIntel CorpIntel Corp
US8448170B20.663System and method for providing annotated service blueprints in an intelligent workload management systemGRANT2013-05-212009-11-2544062913GoodMicro Focus Software IncMicro Focus Software Inc
US8832249B20.663Methods and apparatus to adjust resource allocation in a distributive computing networkGRANT2014-09-092011-11-3048467837GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US8527989B20.662Tracking loading and unloading of kernel extensions in isolated virtual spaceGRANT2013-09-032010-07-1245439494GoodInternational Business Machines CorpInternational Business Machines Corp
EP2517403B10.662METHODS AND SYSTEMS FOR CROSS SITE FORGERY PROTECTIONGRANT2015-08-052009-12-2344153116GoodCitrix Systems IncCitrix Systems Inc
EP1880339A20.662METHOD AND APPARATUS FOR PROVIDING SOFTWARE-BASED SECURITY COPROCESSORSGRANT2008-01-232005-05-1337418673GoodIntel CorpIntel Corp
US8296760B20.661Migrating a virtual machine from a first physical machine in response to receiving a command to lower a power mode of the first physical machineGRANT2012-10-232006-10-2739331921GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US10042657B10.661Provisioning virtual applciations from virtual application templatesGRANT2018-08-072011-06-3063014073GoodEMC CorpEMC Corp
US8194680B10.660Managing communications for modified computer networksGRANT2012-06-052009-03-1146148091GoodAmazon Technologies IncAmazon Technologies Inc
US20110099267A10.660Resource Optimization and Monitoring in Virtualized InfrastructureAPPLICATION2011-04-282009-10-2743899316GoodVMware IncVMware Inc
US20060129654A10.659File sharing device and inter-file sharing device data migration methodAPPLICATION2006-06-152003-09-0934225229GoodHitachi LtdHitachi Ltd
US8281018B20.659Method for automatically providing a client with access to an associated virtual machineGRANT2012-10-022009-06-2243355256GoodRed Hat Israel LtdRed Hat Israel Ltd
US8966198B10.658Providing snapshots of virtual storage devicesGRANT2015-02-242011-09-0152473138GoodGoogle LLCGoogle LLC
US20070204266A10.658Systems and methods for dynamically managing virtual machinesAPPLICATION2007-08-302006-02-2838445497GoodInternational Business Machines CorpInternational Business Machines Corp
US20100107162A10.658ROUTING ACROSS A VIRTUAL NETWORKAPPLICATION2010-04-292008-03-0739327697GoodHewlett Packard Development Co LPValtrus Innovations Ltd
US8713147B20.657Matching a usage history to a new cloudGRANT2014-04-292010-11-2446065418GoodRed Hat IncRed Hat Inc
EP2659624B10.657SYSTEMS AND METHODS FOR VLAN TAGGING VIA CLOUD BRIDGEGRANT2017-04-122010-12-2845529208GoodCitrix Systems IncCitrix Systems Inc
EP1224516B10.657TRUSTED COMPUTING PLATFORM FOR RESTRICTING USE OF DATAGRANT2008-12-171999-09-2510861565GoodHewlett Packard CoHP Inc
US8719804B20.657Managing runtime execution of applications on cloud computing systemsGRANT2014-05-062010-05-0544902836GoodMicrosoft CorpMicrosoft Corp, Microsoft Technology Licensing LLC
US9015325B20.656Performing maintenance operations on cloud computing node without requiring to stop all virtual machines in the nodeGRANT2015-04-212012-01-2348798179GoodInternational Business Machines CorpInternational Business Machines Corp
US7937438B10.656Using virtual networking devices to manage external connectionsGRANT2011-05-032009-12-0743903354GoodAmazon Technologies IncAmazon Technologies Inc
US20180095777A10.656VIRTUAL MACHINE PROVISIONING ENGINEAPPLICATION2018-04-052010-12-1746235883GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9559842B20.656Trusted key management for virtualized platformsGRANT2017-01-312008-09-3042058887GoodHewlett Packard Enterprise Development LPHewlett Packard Enterprise Development LP
US9459926B20.654System and method for managing a computing clusterGRANT2016-10-042010-06-2347022128GoodTwilio IncTwilio Inc
US8606667B20.654Systems and methods for managing a software subscription in a cloud networkGRANT2013-12-102010-02-2644505805GoodRed Hat IncRed Hat Inc
US8799895B20.653Virtualization-based resource management apparatus and method and computing system for virtualization-based resource managementGRANT2014-08-052008-12-2242268027GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US20100287548A10.653Long Distance Virtual Machine MigrationAPPLICATION2010-11-112009-05-0643063143GoodVMware IncVMware Inc
US8909734B20.652Migrating data between networked computing environmentsGRANT2014-12-092012-02-0748903879GoodInternational Business Machines CorpInternational Business Machines Corp
US20060195715A10.652System and method for migrating virtual machines on cluster systemsAPPLICATION2006-08-312005-02-2836848287GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9251033B20.652Automatic monitoring and just-in-time resource provisioning systemGRANT2016-02-022011-07-0746514833GoodVCE Co LLCEMC Corp
US9246985B20.651Techniques for prevent information disclosure via dynamic secure cloud resourcesGRANT2016-01-262011-06-2847392109GoodMicro Focus Software IncMicro Focus Software Inc
US8448169B20.651Managing unique electronic identification for kernel extensions in isolated virtual spaceGRANT2013-05-212010-07-1245439495GoodInternational Business Machines CorpInternational Business Machines Corp
US20070186025A10.651Method  apparatus  and computer usable program code for migrating virtual adapters from source physical adapters to destination physical adaptersAPPLICATION2007-08-092006-02-0937946669GoodInternational Business Machines CorpLenovo International Ltd
US9590849B20.651System and method for managing a computing clusterGRANT2017-03-072010-06-2347022129GoodTwilio IncTwilio Inc
US8954564B20.650Cross-cloud vendor mapping service in cloud marketplaceGRANT2015-02-102010-05-2845023026GoodRed Hat IncRed Hat Inc
US8909783B20.650Managing multi-level service level agreements in cloud-based networkGRANT2014-12-092010-05-2845023038GoodRed Hat IncRed Hat Inc
US20060101189A10.650System and method for hot cloning in a distributed networkAPPLICATION2006-05-112004-11-0936317672GoodDell Products LPDell Products LP
US9229749B20.649Compute and storage provisioning in a cloud environmentGRANT2016-01-052011-10-3148173833GoodCisco Technology IncCisco Technology Inc
US9015707B20.648Virtual machine rapid provisioning systemGRANT2015-04-212010-09-0245771592GoodInternational Business Machines CorpInternational Business Machines Corp
US8397245B20.648Managing loading and unloading of shared kernel extensions in isolated virtual spaceGRANT2013-03-122010-07-1245439496GoodInternational Business Machines CorpInternational Business Machines Corp
US7865893B10.647System and method for starting virtual machine monitor in common with already installed operating systemGRANT2011-01-042005-02-0741479588GoodParallels Holdings LtdParallels International GmbH
EP2577543B10.647SECURE VIRTUAL MACHINE BOOTSTRAP IN UNTRUSTED CLOUD INFRASTRUCTURESGRANT2019-02-202010-06-0744262894GoodCisco Technology IncCisco Technology Inc
US8387060B20.646Virtual machine resource allocation group policy based on workload profile  application utilization and resource utilizationGRANT2013-02-262009-10-0143824145GoodDell Products LPDell Products LP
US8156211B20.645Transitioning from dynamic cluster management to virtualized cluster managementGRANT2012-04-102008-02-2640999363GoodSAP SE SAP SE
US8473959B20.645Methods and apparatus related to migration of customer resources to virtual resources within a data center environmentGRANT2013-06-252010-02-2244477567GoodVirtustream IncVirtustream IP Holding Co Inc
US7680919B20.644Virtual machine migrationGRANT2010-03-162002-12-1240275519GoodVMware IncVMware Inc
EP2550768B10.644SYSTEM AND METHOD FOR REMOTE MAINTENANCE OF CLIENT SYSTEMS IN AN ELECTRONIC NETWORK USING SOFTWARE TESTING BY A VIRTUAL MACHINEGRANT2015-03-252010-03-2344657040GoodFujitsu LtdFujitsu Ltd
US7613921B20.643Method and apparatus for remotely provisioning software-based security coprocessorsGRANT2009-11-032005-05-1337418676GoodIntel CorpIntel Corp
US8812687B20.643Managing user state of cloud desktopsGRANT2014-08-192011-09-1547881707GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10447684B20.643Hosted application sandbox modelGRANT2019-10-152009-04-2442993099GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8413139B20.643Programming model for application and data access and synchronization within virtual environmentsGRANT2013-04-022009-03-1142731758GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8825791B20.643Managing subscribed resource in cloud network using variable or instantaneous consumption tracking periodsGRANT2014-09-022010-11-2446065438GoodRed Hat IncRed Hat Inc
US9286182B20.643Virtual machine snapshotting and analysisGRANT2016-03-152011-06-1747354529GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9712599B20.642Application peak load processingGRANT2017-07-182011-10-0347993666GoodInternational Business Machines CorpInternational Business Machines Corp
US7636442B20.642Method and apparatus for migrating software-based security coprocessorsGRANT2009-12-222005-05-1337418674GoodIntel CorpIntel Corp
US7979512B20.642Service delivery onlineGRANT2011-07-122008-11-0742166169GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9722866B10.641Resource allocation to reduce correlated failuresGRANT2017-08-012011-09-2359383211GoodAmazon Technologies IncAmazon Technologies Inc
US8074262B20.640Method and apparatus for migrating virtual trusted platform modulesGRANT2011-12-062005-05-1346325985GoodIntel CorpIntel Corp
US8627426B20.640Cloud platform architectureGRANT2014-01-072010-04-2644117587GoodVMware IncPivotal Software Inc
US8650299B10.638Scalable cloud computingGRANT2014-02-112010-02-0350032873GoodCitrix Systems IncCitrix Systems Inc
EP2348451B10.638Methods and apparatus for restoration of an anti-theft platformGRANT2015-11-252009-12-1843877124GoodIntel CorpIntel Corp
US20100023565A10.637Separate Swap Files Corresponding to Different Virtual Machines in a Host Computer SystemAPPLICATION2010-01-282006-10-1741327931GoodVMware IncVMware Inc
US8448168B20.637Recording medium having virtual machine managing program recorded therein and managing server deviceGRANT2013-05-212008-03-2841119119GoodFujitsu LtdFujitsu Ltd
US9710400B20.637Secure virtual machine memoryGRANT2017-07-182010-03-3044711006GoodMicro Focus Software IncMicro Focus Software Inc
EP2238535A20.637VIRTUAL COMPUTING MANAGEMENT SYSTEMS AND METHODSGRANT2010-10-132007-12-2040790219GoodVirtual Computer IncVirtual Computer Inc
US8914598B20.637Distributed storage resource scheduler and load balancerGRANT2014-12-162009-09-2443757606GoodVMware IncVMware Inc
US20120066677A10.636ON DEMAND VIRTUAL MACHINE IMAGE STREAMINGAPPLICATION2012-03-152010-09-1045807931GoodInternational Business Machines CorpInternational Business Machines Corp
EP2355447B10.635SECURE AND AUTOMATED CREDENTIAL INFORMATION TRANSFER MECHANISMGRANT2016-11-162010-02-0544063287GoodAccenture Global Services LtdAccenture Global Services Ltd
EP2335375B10.635TRUSTED AND CONFIDENTIAL REMOTE TPM INITIALIZATIONGRANT2017-07-262008-10-1042099965GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20130138764A10.634METHOD AND SYSTEM FOR VIRTUAL MACHINE DATA MIGRATIONAPPLICATION2013-05-302011-11-3048467810GoodNetApp IncNetApp Inc
EP2817733B10.634IDENTITY PROVIDER DISCOVERY SERVICE USING A PUBLISH-SUBSCRIBE MODELGRANT2016-09-212012-02-2349004512GoodInternational Business Machines CorpInternational Business Machines Corp
US8996887B20.633Log structured volume encryption for virtual machinesGRANT2015-03-312012-02-2447891961GoodGoogle LLCGoogle LLC
US9703609B20.632Matching resources associated with a virtual machine to offered resourcesGRANT2017-07-112009-05-2943221518GoodRed Hat IncRed Hat Inc
US8504443B20.632Methods and systems for pricing software infrastructure for a cloud computing environmentGRANT2013-08-062009-08-3143626246GoodRed Hat IncRed Hat Inc
US9436459B20.632Generating cross-mapping of vendor software in a cloud computing environmentGRANT2016-09-062010-05-2845023219GoodRed Hat IncRed Hat Inc
US9032160B10.631Continuous data replicationGRANT2015-05-122011-12-2953038327GoodEMC CorpEMC Corp
US9053472B20.629Offering additional license terms during conversion of standard software licenses for use in cloud computing environmentsGRANT2015-06-092010-02-2644505821GoodRed Hat IncRed Hat Inc
US20100169467A10.628METHOD AND APPARATUS FOR DETERMINING A NETWORK TOPOLOGY DURING NETWORK PROVISIONINGAPPLICATION2010-07-012008-12-3042286234GoodJuniper Networks IncJuniper Networks Inc
US7571312B20.628Methods and apparatus for generating endorsement credentials for software-based security coprocessorsGRANT2009-08-042005-05-1337418675GoodIntel CorpIntel Corp
US9459925B20.627System and method for managing a computing clusterGRANT2016-10-042010-06-2346637750GoodTwilio IncTwilio Inc
EP2502149A20.627MANAGING VIRTUAL HARD DRIVES AS BLOBSGRANT2012-09-262009-11-1643992327GoodMicrosoft CorpMicrosoft Corp, Microsoft Technology Licensing LLC
US9485117B20.626Providing user-controlled resources for cloud computing environmentsGRANT2016-11-012009-02-2342631865GoodRed Hat IncRed Hat Inc
US8832219B20.624Generating optimized resource consumption periods for multiple users on combined basisGRANT2014-09-092011-03-0146753994GoodRed Hat IncRed Hat Inc
US8789047B20.624Allowing world switches between virtual machines via hypervisor world switch security settingGRANT2014-07-222012-01-2648871501GoodEmpire Technology Development LLCEmpire Technology Development LLC
US20090007105A10.624Updating Offline Virtual Machines or VM ImagesAPPLICATION2009-01-012007-06-2940162364GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8438635B20.623Single sign-on for remote desktopsGRANT2013-05-072011-09-1547881948GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP2207121A10.623Protecting content on virtualized client platformsGRANT2010-07-142008-12-3042104503GoodIntel CorpIntel Corp
EP1494420B10.623Reducing network configuration complexity with transparent virtual private networksGRANT2010-07-282003-06-3033435444GoodMicrosoft CorpMicrosoft Corp
US9207963B20.623Preventing cloud cartographyGRANT2015-12-082012-02-0148871503GoodEmpire Technology Development LLCEmpire Technology Development LLC
EP1531596B10.623Secure dynamic credential distribution over a networkGRANT2014-03-262003-11-1434437365GoodMicrosoft CorpMicrosoft Corp
US10031783B20.621Execution of a distributed deployment plan for a multi-tier application in a cloud infrastructureGRANT2018-07-242012-03-0249043583GoodVMware IncVMware Inc
US9781205B20.620Coordination engine for cloud selectionGRANT2017-10-032011-09-1247613698GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8589481B20.619Multi tenant access to applicationsGRANT2013-11-192011-09-1447647102GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9098698B20.619Methods and apparatus for application isolationGRANT2015-08-042008-09-1242166401GoodGeorge Mason Research Foundation IncGeorge Mason Research Foundation Inc
US8549592B20.618Establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platformGRANT2013-10-012005-07-1237609531GoodInternational Business Machines CorpInternational Business Machines Corp
US9537891B10.618Policy enforcement based on dynamically attribute-based matched network objectsGRANT2017-01-032011-09-2757682511GoodPalo Alto Networks IncPalo Alto Networks Inc
US9210065B20.617Providing cloud-based services using dynamic network virtualizationGRANT2015-12-082009-06-2243354332GoodAlcatel Lucent SASAlcatel Lucent SAS
US8943220B20.617Continuous deployment of applicationsGRANT2015-01-272011-08-0447627696GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8990371B20.616Interconnecting data centers for migration of virtual machinesGRANT2015-03-242012-01-3148871286GoodInternational Business Machines CorpInternational Business Machines Corp
US9501322B20.616Systems and methods for path-based management of virtual servers in storage network environmentsGRANT2016-11-222003-10-2349321603GoodNetApp IncNetApp Inc
EP2396922B10.615TRUSTED CLOUD COMPUTING AND SERVICES FRAMEWORKGRANT2019-12-042009-02-1642560901GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20100318609A10.615BRIDGING ENTERPRISE NETWORKS INTO CLOUDAPPLICATION2010-12-162009-06-1543307303GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8856300B20.614End-to-end secure cloud computingGRANT2014-10-072010-05-1844973369GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
EP2805473B10.614SECURITY MANAGEMENT FOR CLOUD SERVICESGRANT2018-03-072012-01-1745814086GoodSecure Cloudlink LtdSECURE CLOUDLINK LIMITED, Secure Cloudlink Ltd
US8959221B20.613Metering cloud resource consumption using multiple hierarchical subscription periodsGRANT2015-02-172011-03-0146754003GoodRed Hat IncRed Hat Inc
US8635152B20.612Multi tenancy for single tenancy applicationsGRANT2014-01-212011-09-1447647101GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8856518B20.612Secure and efficient offloading of network policies to network interface cardsGRANT2014-10-072011-09-0747753149GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9342368B20.612Modular cloud computing systemGRANT2016-05-172010-08-3145698611GoodInternational Business Machines CorpInternational Business Machines Corp
US10824343B20.612Managing access of multiple executing programs to non-local block data storageGRANT2020-11-032008-08-0841653861GoodAmazon Technologies IncAmazon Technologies Inc
EP2812842B10.611SECURITY POLICY FOR DEVICE DATAGRANT2020-04-292012-02-0948946638GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8769622B20.610Authentication and authorization methods for cloud computing securityGRANT2014-07-012011-06-3047392112GoodInternational Business Machines CorpInternational Business Machines Corp
EP2593898A20.610DOMAIN-AUTHENTICATED CONTROL OF PLATFORM RESOURCESGRANT2013-05-222010-07-1445467912GoodIntel CorpIntel Corp
US8745233B20.609Management of service application migration in a networked computing environmentGRANT2014-06-032010-12-1446200541GoodInternational Business Machines CorpInternational Business Machines Corp
US8504689B20.608Methods and systems for cloud deployment analysis featuring relative cloud resource importanceGRANT2013-08-062010-05-2845023027GoodRed Hat IncRed Hat Inc
US9930138B20.605Communicating with third party resources in cloud computing environmentGRANT2018-03-272009-02-2342631864GoodRed Hat IncRed Hat Inc
US9225662B20.605Command management in a networked computing environmentGRANT2015-12-292012-02-1348946603GoodInternational Business Machines CorpInternational Business Machines Corp
US10051042B20.603System and method for hand-offs in cloud environmentsGRANT2018-08-142011-11-1848427978GoodCA IncCAI Software LLC
US9112769B10.602Programatically provisioning virtual networksGRANT2015-08-182010-12-2753786154GoodAmazon Technologies IncAmazon Technologies Inc
US9852011B10.602Managing resources in virtualization systemsGRANT2017-12-262009-06-2660674800GoodTurbonomic IncTurbonomic Inc
US20090112972A10.602Managing Device Models in a Virtual Machine Cluster EnvironmentAPPLICATION2009-04-302005-12-2338188265GoodIntel CorpIntel Corp
US6698017B10.601Software migration on an active processing elementGRANT2004-02-241999-07-1623399881GoodNortel Networks LtdNortel Networks Ltd
US10970758B20.601Electronic marketplace for hosted service imagesGRANT2021-04-062011-09-2947993509GoodAmazon Technologies IncAmazon Technologies Inc
US8271974B20.600Cloud computing lifecycle management for N-tier applicationsGRANT2012-09-182008-10-0842076496GoodKaavo IncKaavo Inc
US9384116B20.600Graphically representing load balance in a computing clusterGRANT2016-07-052011-05-1647175914GoodVMware IncVMware Inc
EP1498800B10.600Security link management in dynamic networksGRANT2008-07-022000-04-2427071571GoodMicrosoft CorpMicrosoft Corp
EP2798559B10.599METHODS AND APPARATUS FOR TRUSTED BOOT OPTIMIZATIONGRANT2019-03-132011-12-2948698317GoodIntel CorpIntel Corp
US9338064B20.598System and method for managing a computing clusterGRANT2016-05-102010-06-2348428019GoodTwilio IncTwilio Inc
EP2333663A20.598Method and device for providing access to physical resources in a virtual machine environmentGRANT2011-06-152009-12-1043778269GoodEmpire Technology Development LLCEmpire Technology Development LLC
US20090077552A10.598METHOD OF CHECKING A POSSIBILITY OF EXECUTING A VIRTUAL MACHINEAPPLICATION2009-03-192007-09-1340455950GoodHitachi LtdHitachi Ltd
US9052961B20.598System to generate a deployment plan for a cloud infrastructure according to logical  multi-tier application blueprintGRANT2015-06-092012-03-0249043584GoodVMware IncVMware Inc
US20110153715A10.598LIGHTWEIGHT SERVICE MIGRATIONAPPLICATION2011-06-232009-12-1744152606GoodMicrosoft CorpMicrosoft Technology Licensing LLC
WO2013039844A20.597AUTOMATED DESKTOP SERVICES PROVISIONINGAPPLICATION2013-03-212011-09-1447484089Good
US8739169B20.597Method for monitoring operating experiences of images to improve workload optimization in cloud computing environmentsGRANT2014-05-272010-04-2044789193GoodInternational Business Machines CorpInternational Business Machines Corp
US20080184229A10.597METHOD AND APPARATUS FOR USING VIRTUAL MACHINE TECHNOLOGY FOR MANAGING PARALLEL COMMUNICATING APPLICATIONSAPPLICATION2008-07-312005-04-0737084528GoodInternational Business Machines CorpInternational Business Machines Corp
US9772831B20.596Droplet execution engine for dynamic server application deploymentGRANT2017-09-262010-04-2644816882GoodPivotal Software IncPivotal Software Inc
US20060070066A10.596Enabling platform network stack control in a virtualization platformAPPLICATION2006-03-302004-09-3036100678GoodIntel CorpIntel Corp
US8402127B20.595System and method for offering virtual private clouds within a public cloud environmentGRANT2013-03-192010-06-2845353584GoodBMC Software IncBMC Software Inc
US8209687B20.595Method and system for evaluating virtualized environmentsGRANT2012-06-262007-08-3140386619GoodCirba IncCirba Inc
US9223561B20.594Method for providing an on-demand software execution serviceGRANT2015-12-292011-06-2746317284GoodOrange SAOrange SA
US10057113B20.594Techniques for workload coordinationGRANT2018-08-212011-03-1146797241GoodMicro Focus Software IncMicro Focus Software Inc
US8972555B20.593IPsec connection to private networksGRANT2015-03-032011-03-0446753993GoodUnisys CorpUnisys Corp
US20140137214A10.593PROVIDING SECURITY IN A CLOUD STORAGE ENVIRONMENTAPPLICATION2014-05-152010-11-2246065256GoodNetApp IncNetApp Inc
US20060010176A10.592Systems and methods for migrating a server from one physical platform to a different physical platformAPPLICATION2006-01-122004-06-1635542617GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20100076933A10.592TECHNIQUES FOR RESOURCE LOCATION AND MIGRATION ACROSS DATA CENTERSAPPLICATION2010-03-252008-09-1142005699GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9235477B10.591Virtualized backup solutionGRANT2016-01-122006-04-2455026459GoodEMC CorpEMC Corp
US8856294B20.590System and method for converting a Java application into a virtual server image for cloud deploymentGRANT2014-10-072009-06-0143034442GoodOracle International CorpOracle International Corp
US20090300601A10.589METHODS AND SYSTEMS FOR PROVIDING A HOSTED APPLIANCE AND MIGRATING THE APPLIANCE TO AN ON-PREMISE ENVIRONMENTAPPLICATION2009-12-032008-05-3041381457GoodRed Hat IncRed Hat Inc
US8694644B20.589Network-aware coordination of virtual machine migrations in enterprise data centers and cloudsGRANT2014-04-082011-09-2947993741GoodNEC Laboratories America IncNEC Corp
US9110727B20.589Automatic replication of virtual machinesGRANT2015-08-182010-10-0545890763GoodUnisys CorpUnisys Corp
US8799477B20.589Hypervisor selection for hosting a virtual machine imageGRANT2014-08-052010-06-3044546112GoodInternational Business Machines CorpInternational Business Machines Corp
US9047133B20.588Single  logical  multi-tier application blueprint used for deployment and management of multiple physical applications in a cloud environmentGRANT2015-06-022012-03-0249043577GoodVMware IncVMware Inc
EP2383956B10.588CLOUD-BASED BILLING  CREDENTIAL  AND DATA SHARING MANAGEMENT SYSTEMGRANT2017-09-062010-04-2744117629GoodAccenture Global Services LtdAccenture Global Services Ltd
US8972988B20.588Remote virtual machine migration port management device and systemGRANT2015-03-032011-07-2947787053GoodHitachi LtdHitachi Ltd
US20080244579A10.588Method and system for managing virtual and real machinesAPPLICATION2008-10-022007-03-2639788862GoodDynamicOps IncDynamicOps Inc
US8661120B20.587Methods and systems for dynamically managing requests for computing capacityGRANT2014-02-252010-09-2144504214GoodAmazon Technologies IncAmazon Technologies Inc
EP2555135B10.587Method and system for obtaining identification information on a mobile deviceGRANT2016-04-272011-08-0146583388GoodGoogle LLCGoogle LLC
WO2013085281A10.586METHOD AND DEVICE FOR SECURITY IN CLOUDING COMPUTING SERVICEAPPLICATION2013-06-132011-12-0548574568Good
US8839263B20.586Apparatus to manage virtual machine migration to a best fit server based on reserve capacityGRANT2014-09-162010-03-2444657831GoodFujitsu LtdFujitsu Ltd
US20100070725A10.586SYSTEMS AND METHODS FOR MANAGEMENT OF VIRTUALIZATION DATAAPPLICATION2010-03-182008-09-0542008260GoodCommvault Systems IncCommvault Systems Inc
US10003514B20.586Method and system for determining a deployment of applicationsGRANT2018-06-192010-06-2245371704GoodHewlett Packard Enterprise Development LPHewlett Packard Enterprise Development LP
US8839422B20.586Virtual browsing environmentGRANT2014-09-162009-06-3044225498GoodGeorge Mason Research Foundation IncGeorge Mason Research Foundation Inc
US20120198076A10.585Migrating Logical PartitionsAPPLICATION2012-08-022009-11-2543301987GoodInternational Business Machines CorpInternational Business Machines Corp
US20110161952A10.584Porting Virtual Images Between PlatformsAPPLICATION2011-06-302009-12-3143734823GoodInternational Business Machines CorpInternational Business Machines Corp
US9245096B20.584Software license management in a networked computing environmentGRANT2016-01-262012-01-2448798371GoodInternational Business Machines CorpInternational Business Machines Corp
US9858068B20.584Methods and systems for planning application deploymentGRANT2018-01-022010-06-2245371702GoodHewlett Packard Enterprise Development LPHewlett Packard Enterprise Development LP
US8631217B20.583Apparatus  system  and method for virtual machine backupGRANT2014-01-142008-02-2640999456GoodInternational Business Machines CorpInternational Business Machines Corp
US8949415B20.583Activity-based virtual machine availability in a networked computing environmentGRANT2015-02-032012-01-0448695875GoodInternational Business Machines CorpInternational Business Machines Corp
US9170798B20.583System and method for customizing a deployment plan for a multi-tier application in a cloud infrastructureGRANT2015-10-272012-03-0249043569GoodVMware IncVMware Inc
US9122537B20.583Balancing server load according to availability of physical resources based on the detection of out-of-sequence packetsGRANT2015-09-012009-10-3043416224GoodCisco Technology IncCisco Technology Inc
US9424094B20.583Server consolidation using virtual machine resource tradeoffsGRANT2016-08-232009-06-0143221521GoodInternational Business Machines CorpInternational Business Machines Corp
US8667138B20.582Distributed hierarchical rendering and provisioning of cloud servicesGRANT2014-03-042010-10-2945997914GoodCisco Technology IncCisco Technology Inc
US8621462B20.581Autonomic customization of properties of a virtual appliance in a computer systemGRANT2013-12-312011-03-0746797232GoodInternational Business Machines CorpServiceNow Inc
US20080104608A10.581Starting up at least one virtual machine in a physical machine by a load balancerAPPLICATION2008-05-012006-10-2739331937GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8676981B20.581Routing service requests based on lowest actual cost within a federated virtual service cloudGRANT2014-03-182011-05-1247142494GoodInternational Business Machines CorpInternational Business Machines Corp
US9223610B20.581Management of virtual machine snapshotsGRANT2015-12-292010-11-2446065588GoodInternational Business Machines CorpDaedalus Blue LLC
US9916147B20.581Deployment of a tool for testing migrated applicationsGRANT2018-03-132010-08-1745595074GoodInternational Business Machines CorpInternational Business Machines Corp
US9053053B20.579Efficiently determining identical pieces of memory used by virtual machinesGRANT2015-06-092010-11-2946127397GoodInternational Business Machines CorpInternational Business Machines Corp
US9207993B20.578Dynamic application placement based on cost and availability of energy in datacentersGRANT2015-12-082010-05-1344912714GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20100257523A10.578MANAGING VIRTUAL MACHINE IMAGESAPPLICATION2010-10-072009-04-0642827221GoodRed Hat Israel LtdRed Hat Israel Ltd
US9003014B20.578Modular cloud dynamic application assignmentGRANT2015-04-072010-08-3145698603GoodInternational Business Machines CorpInternational Business Machines Corp
US9027017B20.577Methods and apparatus for movement of virtual resources within a data center environmentGRANT2015-05-052010-02-2244477561GoodVirtustream IncVirtustream IP Holding Co Inc
US8862941B20.577Methods and apparatus for remediation executionGRANT2014-10-142011-09-1647881800GoodTripwire IncTripwire Inc
US8327350B20.576Virtual resource templatesGRANT2012-12-042007-01-0239102066GoodInternational Business Machines CorpInternational Business Machines Corp
US9069599B20.574System and method for a cloud computing abstraction layer with security zone facilitiesGRANT2015-06-302008-06-1946491761GoodServiceMesh IncCSC Agility Platform Inc
US8782192B20.574Detecting resource consumption events over sliding intervals in cloud-based networkGRANT2014-07-152011-05-3147262554GoodRed Hat IncRed Hat Inc
US20120005724A10.573METHOD AND SYSTEM FOR PROTECTING PRIVATE ENTERPRISE RESOURCES IN A CLOUD COMPUTING ENVIRONMENTAPPLICATION2012-01-052009-02-0945400791GoodIMERA SYSTEMS IncIMERA SYSTEMS Inc
US20100332820A10.573INFORMATION SECURITY DEVICE AND INFORMATION SECURITY SYSTEMAPPLICATION2010-12-302008-02-2541015758GoodPanasonic CorpPanasonic Corp
US8291159B20.573Monitoring and updating mapping of physical storage allocation of virtual machine without changing identifier of the storage volume assigned to virtual machineGRANT2012-10-162009-03-1242731760GoodVMware IncVMware Inc
US20080256530A10.573System and Method for Determining Firmware Compatibility for Migrating Logical PartitionsAPPLICATION2008-10-162007-04-1639854945GoodInternational Business Machines CorpInternational Business Machines Corp
US8219769B10.572Discovering cluster resources to efficiently perform cluster backups and restoresGRANT2012-07-102010-05-0446396027GoodSymantec CorpVeritas Technologies LLC
US9122538B20.571Methods and apparatus related to management of unit-based virtual resources within a data center environmentGRANT2015-09-012010-02-2244477562GoodVirtustream IncVirtustream IP Holding Co Inc
US9069473B20.571Wait-free stream oriented migration based storageGRANT2015-06-302011-01-2746578306GoodInternational Business Machines CorpInternational Business Machines Corp
EP2625643B10.571METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS BETWEEN A SECURE VIRTUAL TERMINAL AND A REMOTE SYSTEMGRANT2016-08-102010-10-0445890836GoodUnisys CorpUnisys Corp
US9448790B20.570Rapid updating of cloud applicationsGRANT2016-09-202010-04-2644816879GoodPivotal Software IncPivotal Software Inc
US9135031B10.570System and method for determining storage resources of a virtual machine in a virtual server environmentGRANT2015-09-152010-04-2854063508GoodNetApp IncNetApp Inc
US10970121B20.569Workload-to-cloud migration analysis based on cloud aspectsGRANT2021-04-062011-05-2447220173GoodInternational Business Machines CorpInternational Business Machines Corp
EP2795522B10.567TECHNIQUES TO STORE SECRET INFORMATION FOR GLOBAL DATA CENTERSGRANT2018-08-082011-12-2247969136GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20100262794A10.566Data backup for virtual machinesAPPLICATION2010-10-142009-04-1442935263GoodMicro Focus Software IncMicro Focus Software Inc
US8589919B20.566Traffic forwarding for virtual machinesGRANT2013-11-192009-04-2842357402GoodCisco Technology IncCisco Technology Inc
US9253100B20.566Asynchronous virtual machine replicationGRANT2016-02-022010-12-1045218884GoodAlcatel Lucent SASAlcatel Lucent SAS
US9774489B10.566Allocating computing resources according to reserved capacityGRANT2017-09-262010-09-2959886454GoodAmazon Technologies IncAmazon Technologies Inc
US20080098392A10.566VERIFIABLE VIRTUALIZED STORAGE PORT ASSIGNMENTS FOR VIRTUAL MACHINESAPPLICATION2008-04-242006-10-1939874036GoodMicro Focus Software IncMicro Focus Software Inc
US9026646B20.566Methods and apparatus for remediating policy test failures  including correlating changes to remediation processesGRANT2015-05-052011-09-1647881717GoodTripwire IncTripwire Inc
US8806488B20.566System for managing personalization information of virtual machine based on cloud computing and method thereofGRANT2014-08-122010-12-0946200815GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US20100205302A10.565PROVIDING CUSTOMER-SELECTED SOLUTIONS FOR MULTIPLE DATACENTER WEBSITE HOSTINGAPPLICATION2010-08-122009-02-0942541293GoodGo Daddy Group IncGo Daddy Operating Co LLC
US8572623B20.565Determining an optimal computing environment for running an image based on performance of similar imagesGRANT2013-10-292011-01-1146456224GoodInternational Business Machines CorpServiceNow Inc
US9729488B20.565On-demand mailbox synchronization and migration systemGRANT2017-08-082010-04-2644816720GoodBitTitan IncBitTitan Inc
US20070271560A10.564Deploying virtual machine to host based on workload characterizationsAPPLICATION2007-11-222006-05-1838713348GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20130117744A10.563METHODS AND APPARATUS FOR PROVIDING HYPERVISOR-LEVEL ACCELERATION AND VIRTUALIZATION SERVICESAPPLICATION2013-05-092011-11-0348224647GoodOCZ Tech GROUP IncOCZ Storage Solutions Inc
US20120311577A10.563SYSTEM AND METHOD FOR MONITORING VIRTUAL MACHINEAPPLICATION2012-12-062011-06-0147262736GoodHon Hai Precision Industry Co LtdHon Hai Precision Industry Co Ltd
US10861081B20.563Aggregation of operational data for merchandizing of network accessible servicesGRANT2020-12-082011-09-2958771956GoodAmazon Technologies IncAmazon Technologies Inc
US9229777B20.563Dynamically relocating workloads in a networked computing environmentGRANT2016-01-052011-08-0847678239GoodInternational Business Machines CorpInternational Business Machines Corp
US8396807B10.563Managing resources in virtualization systemsGRANT2013-03-122009-06-2647780534GoodVMTurbo IncTurbonomic Inc
US20070112999A10.562Efficient power management of a system with virtual machinesAPPLICATION2007-05-172005-11-1546325509GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8108855B20.562Method and apparatus for deploying a set of virtual software resource templates to a set of nodesGRANT2012-01-312007-01-0239585907GoodInternational Business Machines CorpInternational Business Machines Corp
US9170849B20.561Migration of task to different pool of resources based on task retry count during task leaseGRANT2015-10-272012-01-0948744879GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US10108347B20.561Measuring performance of data storage systemsGRANT2018-10-232012-01-1854252661GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US20090241108A10.561VIRTUAL COMPUTING INFRASTRUCTUREAPPLICATION2009-09-242004-10-2933515827GoodHewlett Packard Development Co LPGoogle LLC
US20130074064A10.561AUTOMATED INFRASTRUCTURE PROVISIONINGAPPLICATION2013-03-212011-09-1547644495GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8607242B20.561Selecting cloud service providers to perform data processing jobs based on a plan for a cloud pipeline including processing stagesGRANT2013-12-102010-09-0245771600GoodInternational Business Machines CorpInternational Business Machines Corp
US9052919B20.560Specialized network fileserverGRANT2015-06-092010-01-1544278330GoodApple IncApple Inc
US20120167085A10.559SHARING MULTIPLE VIRTUAL FUNCTIONS TO A HOST USING A PSEUDO PHYSICAL FUNCTIONAPPLICATION2012-06-282010-12-2846318647GoodPLX Technology IncAvago Technologies International Sales Pte Ltd
US9372735B20.559Auto-scaling of pool of virtual machines based on auto-scaling rules of user associated with the poolGRANT2016-06-212012-01-0948744884GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20120089972A10.559Image Based Servicing Of A Virtual MachineAPPLICATION2012-04-122010-10-0845926127GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080270515A10.558METHOD AND APPARATUS FOR MIGRATING THE SYSTEM ENVIRONMENT ON WHICH THE APPLICATIONS DEPENDAPPLICATION2008-10-302007-04-0439888281GoodInternational Business Machines CorpInternational Business Machines Corp
US10817929B10.558Customizable uniform control user interface for hosted service imagesGRANT2020-10-272011-09-2947993513GoodAmazon Technologies IncAmazon Technologies Inc
US8977754B20.558Composite public cloud  method and systemGRANT2015-03-102011-05-0947139632GoodMetacloud LLCCisco Technology Inc
US9766947B20.558Methods and apparatus to monitor server loadsGRANT2017-09-192011-06-2447362901GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US9489647B20.558System and method for a cloud computing abstraction with self-service portal for publishing resourcesGRANT2016-11-082008-06-1951531983GoodCSC Agility Platform IncCSC Agility Platform Inc
US20090300605A10.558VIRTUAL COMPUTING INFRASTRUCTUREAPPLICATION2009-12-032004-10-2933515874GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9959131B20.557Systems and methods for providing a file system viewing of a storeage environmentGRANT2018-05-012009-08-0343528210GoodQuantum CorpQuantum Corp
EP1679632B10.557SYSTEMS AND METHODS FOR SECURELY BOOTING A COMPUTER WITH A TRUSTED PROCESSING MODULEGRANT2017-11-082005-01-0736569935GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8904382B20.556Creating instances of cloud computing environmentsGRANT2014-12-022010-06-1745329846GoodInternational Business Machines CorpInternational Business Machines Corp
US8468230B20.555Method  apparatus and recording medium for migrating a virtual machineGRANT2013-06-182007-10-1840564605GoodFujitsu LtdFujitsu Ltd
US20100131636A10.555APPLICATION DELIVERY CONTROL MODULE FOR VIRTUAL NETWORK SWITCHAPPLICATION2010-05-272008-11-2442197377GoodVMware IncVMware Inc
US10284437B20.554Cloud-based virtual machines and officesGRANT2019-05-072010-09-3058257406GoodEfolder IncAxci (an Abc) LLC, Efolder Inc
US20110023048A10.553INTELLIGENT DATA PLACEMENT AND MANAGEMENT IN VIRTUAL COMPUTING ENVIRONMENTSAPPLICATION2011-01-272009-07-2343498408GoodMicro Focus Software IncSuse LLC
US8514868B20.552Cloud computing gateway  cloud computing hypervisor  and methods for implementing sameGRANT2013-08-202008-06-1941434473GoodServiceMesh IncCSC Agility Platform Inc
US20090199177A10.551VIRTUAL COMPUTING INFRASTRUCTUREAPPLICATION2009-08-062004-10-2933515850GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US9019123B20.550Health check services for web-based collaboration environmentsGRANT2015-04-282011-12-2248653975GoodBox IncBox Inc
US20120216194A10.550HYPERVISOR APPLICATION OF SERVICE TAGS IN A VIRTUAL NETWORKING ENVIRONMENTAPPLICATION2012-08-232011-01-1446490721GoodInternational Business Machines CorpInternational Business Machines Corp
WO2011126902A20.549SYSTEMS AND METHODS FOR SELECTING AN ALTERNATIVE COMPUTING INFRASTRUCTURE AND FACILITATING THE MIGRATION AND ADOPTION THERETOAPPLICATION2011-10-132010-03-3044763505Good
US8793616B20.549Look ahead of links/alter linksGRANT2014-07-292007-12-2150149204GoodInvention Science Fund I LLCInvention Science Fund I LLC
US9235482B20.548Consistent data retrieval in a multi-site computing infrastructureGRANT2016-01-122011-04-2947068745GoodInternational Business Machines CorpInternational Business Machines Corp
US20100115098A10.547Dynamic and automatic colocation and combining of service providers and service clients in a grid of resourcesAPPLICATION2010-05-062008-11-0442132835GoodMicro Focus Software IncMicro Focus Software Inc
US20080134176A10.547ENFORCEMENT OF COMPLIANCE POLICIES IN MANAGED VIRTUAL SYSTEMSAPPLICATION2008-06-052006-10-1740956672GoodManagelQ IncRed Hat Inc, ManagelQ Inc
US20100186010A10.547Dynamic Checking of Hardware Resources for Virtual EnvironmentsAPPLICATION2010-07-222009-01-1642337978GoodInternational Business Machines CorpInternational Business Machines Corp
US9071522B20.547Policy engine for cloud platformGRANT2015-06-302010-04-2644816921GoodPivotal Software IncPivotal Software Inc
US9692732B20.546Network connection automationGRANT2017-06-272011-11-2952690022GoodAmazon Technologies IncAmazon Technologies Inc
US8681973B20.546Methods  systems  and computer program products for performing homomorphic encryption and decryption on individual operationsGRANT2014-03-252010-09-1545807823GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US8639787B20.545System and method for creating or reconfiguring a virtual server image for cloud deploymentGRANT2014-01-282009-06-0147007378GoodOracle International CorpOracle International Corp
US20110214124A10.545SYSTEMS AND METHODS FOR GENERATING CROSS-CLOUD COMPUTING APPLIANCESAPPLICATION2011-09-012010-02-2644506008GoodRed Hat IncRed Hat Inc
EP2021938B10.544POLICY DRIVEN  CREDENTIAL DELEGATION FOR SINGLE SIGN ON AND SECURE ACCESS TO NETWORK RESOURCESGRANT2014-01-012006-05-2638750973GoodMicrosoft CorpMicrosoft Corp
US9027151B20.544Inhibiting denial-of-service attacks using group controlsGRANT2015-05-052011-02-1746653855GoodRed Hat IncRed Hat Inc
US8346854B20.544Method and system of operating system independenceGRANT2013-01-012010-06-3045400531GoodDeskstream IncDeskstream Inc
US8725891B20.543Aggregation across cloud providersGRANT2014-05-132010-07-0145400582GoodRed Hat IncRed Hat Inc
US8266192B20.543File-sharing system and method for processing files  and programGRANT2012-09-112010-03-1942784684GoodHitachi LtdHitachi Ltd
US20110213687A10.543SYSTEMS AND METHODS FOR OR A USAGE MANAGER FOR CROSS-CLOUD APPLIANCESAPPLICATION2011-09-012010-02-2644505806GoodRed Hat IncRed Hat Inc
US7155462B10.543Method and apparatus enabling migration of clients to a specific version of a server-hosted application  where multiple software versions of the server-hosted application are installed on a networkGRANT2006-12-262002-02-0137569578GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9984079B10.542Managing data storage using storage policy specificationsGRANT2018-05-292012-01-1362165819GoodAmazon Technologies IncAmazon Technologies Inc
US9081617B10.542Provisioning of virtual machines using an N-ARY tree of clusters of nodesGRANT2015-07-142011-12-1553506749GoodSymantec CorpVeritas Technologies LLC
US8667495B10.541Virtual resource provider with virtual control planesGRANT2014-03-042010-12-2950158942GoodAmazon Technologies IncAmazon Technologies Inc
US9160609B20.541Virtual Layer 2 and mechanism to make it scalableGRANT2015-10-132010-05-2844509582GoodFutureWei Technologies IncFutureWei Technologies Inc
US8640187B20.540Systems and methods for providing an fully functional isolated execution environment for accessing contentGRANT2014-01-282010-05-2845023290GoodRed Hat IncRed Hat Inc
US20090249284A10.540AUTOMATION FOR VIRTUALIZED IT ENVIRONMENTSAPPLICATION2009-10-012008-02-2941016755GoodDoyenz IncDoyenz Inc
US8775507B20.539Rest interface for job submissionGRANT2014-07-082012-01-0548744704GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20120287931A10.538TECHNIQUES FOR SECURING A VIRTUALIZED COMPUTING ENVIRONMENT USING A PHYSICAL NETWORK SWITCHAPPLICATION2012-11-152011-05-1347141846GoodInternational Business Machines CorpInternational Business Machines Corp
US8880657B10.538System and method for configuring and managing virtual gridsGRANT2014-11-042011-06-2851798340GoodGogrid LLCOpen Invention Network LLC
US20110075674A10.538SCALABLE ARCHITECTURE FOR ENTERPRISE EXTENSION IN A CLOUD TOPOLOGYAPPLICATION2011-03-312009-09-3043242623GoodNokia of America CorpAlcatel Lucent SAS
WO2013016584A10.537SYSTEMS AND METHODS FOR IMPLEMENTING CLOUD COMPUTINGAPPLICATION2013-01-312011-07-2647601545Good
US9317222B10.537Centralized content addressed storageGRANT2016-04-192006-04-2455700009GoodEMC CorpEMC Corp
US20110283277A10.537VIRTUALIZATION AND DYNAMIC RESOURCE ALLOCATION AWARE STORAGE LEVEL REORDERINGAPPLICATION2011-11-172010-05-1144912866GoodInternational Business Machines CorpInternational Business Machines Corp
US8935397B20.537Dividing cloud resourcesGRANT2015-01-132010-07-0145400573GoodRed Hat IncRed Hat Inc
US8627152B10.536Simultaneous error detection during VM importGRANT2014-01-072011-11-1449841023GoodAmazon Technologies IncAmazon Technologies Inc
US8650326B20.536Smart client routingGRANT2014-02-112009-11-1143974982GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9059933B20.536Provisioning virtual private data centersGRANT2015-06-162009-12-2344582396GoodCenturyLink Intellectual Property LLCCenturyLink Intellectual Property LLC
US8819491B20.535Methods and apparatus for remediation workflowGRANT2014-08-262011-09-1647881801GoodTripwire IncTripwire Inc
US9038055B20.534Using virtual machines to manage software buildsGRANT2015-05-192011-08-0547627781GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20100325381A10.533AUTOMATICALLY ADJUSTING MEMORY OF A VM ON A POWER CLIENTAPPLICATION2010-12-232009-06-2243355298GoodRed Hat Israel LtdRed Hat Israel Ltd
US8850528B20.533Organizing permission associated with a cloud customer in a virtual computing infrastructureGRANT2014-09-302010-06-1545348852GoodOracle International CorpOracle International Corp
US20070239979A10.533Method and apparatus to protect policy state information during the life-time of virtual machinesAPPLICATION2007-10-112006-03-2938576948GoodInternational Business Machines CorpWrp Ip Management LLC
US20080134175A10.533REGISTERING AND ACCESSING VIRTUAL SYSTEMS FOR USE IN A MANAGED SYSTEMAPPLICATION2008-06-052006-10-1740679110GoodManagelQ IncRed Hat Inc, ManagelQ Inc
US8639793B20.533Disaster recovery and automatic relocation of cloud servicesGRANT2014-01-282010-10-2945997915GoodCisco Technology IncCisco Technology Inc
US9304798B20.533Scalable multi-tenant network architecture for virtualized datacentersGRANT2016-04-052011-06-0747296325GoodHewlett Packard Enterprise Development LPHewlett Packard Enterprise Development LP
US20080184225A10.533AUTOMATIC OPTIMIZATION FOR VIRTUAL SYSTEMSAPPLICATION2008-07-312006-10-1740678973GoodManageIQ IncRed Hat Inc
US8713096B20.531State control of remote hosts for management of distributed applicationsGRANT2014-04-292011-05-1047142646GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8996444B20.531Device  method  and program for selecting OS imageGRANT2015-03-312010-09-2245818633GoodInternational Business Machines CorpInternational Business Machines Corp
US9612803B20.531System and method for use of a virtual assembly builderGRANT2017-04-042011-04-1547678346GoodOracle International CorpOracle International Corp
US9098345B20.531System and method for portable and flexible deployment of serversGRANT2015-08-042012-02-0148871288GoodSoftLayer Technologies IncInternational Business Machines Corp, SoftLayer Technologies Inc
US20110131330A10.530COLLOCATING DESKTOP VIRTUAL MACHINES TO PROXIMITY OF THE USERAPPLICATION2011-06-022009-12-0244069690GoodInternational Business Machines CorpInternational Business Machines Corp
US8473836B20.530Look ahead of links/alter linksGRANT2013-06-252007-12-2140790167GoodInvention Science Fund I LLCInvention Science Fund I LLC
US8639746B20.529Architecture  system and method for mediating communications between a client computer system and a cloud computing system with a driver frameworkGRANT2014-01-282010-07-0145400539GoodRed Hat IncRed Hat Inc
US9450838B20.529Resource management for cloud computing platformsGRANT2016-09-202011-06-2747362894GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8667399B10.528Cost tracking for virtual control planesGRANT2014-03-042010-12-2950158920GoodAmazon Technologies IncAmazon Technologies Inc
US8954978B10.527Reputation-based mediation of virtual control planesGRANT2015-02-102010-12-2952443794GoodAmazon Technologies IncAmazon Technologies Inc
US8937950B20.527Asymmetric network address encapsulationGRANT2015-01-202010-06-2945352521GoodFutureWei Technologies IncFutureWei Technologies Inc
US8639747B20.527System and method for providing a cloud computing graphical user interfaceGRANT2014-01-282010-07-0144645741GoodRed Hat IncRed Hat Inc
US8661448B20.527Logical partition load manager and balancerGRANT2014-02-252011-08-2647745620GoodInternational Business Machines CorpInternational Business Machines Corp
US9165137B20.527Systems and methods for securing virtual machine computing environmentsGRANT2015-10-202010-08-1844584659GoodSecurity First CorpSecurity First Corp
US20090265756A10.527SAFETY AND MANAGEMENT OF COMPUTING ENVIRONMENTS THAT MAY SUPPORT UNSAFE COMPONENTSAPPLICATION2009-10-222008-04-1841202224GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US9652265B10.527Architecture for managing I/O and storage for a virtualization environment with multiple hypervisor typesGRANT2017-05-162011-08-1058670439GoodNutanix IncNutanix Inc
US9606819B20.526Wireless network  implementation method thereof  and terminalGRANT2017-03-282011-09-0747831538GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US8615584B20.526Reserving services within a cloud computing environmentGRANT2013-12-242009-12-0344083108GoodInternational Business Machines CorpInternational Business Machines Corp
US8776053B20.526System and method to reconfigure a virtual machine image suitable for cloud deploymentGRANT2014-07-082009-09-2543781760GoodOracle International CorpOracle International Corp
US8631067B20.526Architecture  system and method for providing a neutral application programming interface for accessing different cloud computing systemsGRANT2014-01-142010-07-0145400537GoodRed Hat IncRed Hat Inc
US6868444B10.525Server configuration management and trackingGRANT2005-03-152000-05-0534273120GoodInterland IncWeb com Group Inc
US8489981B20.525Look ahead of links/alter linksGRANT2013-07-162007-12-2140790217GoodInvention Science Fund I LLCInvention Science Fund I LLC
US20120266163A10.525Virtual Machine MigrationAPPLICATION2012-10-182011-04-1347007374GoodInternational Business Machines CorpLenovo Enterprise Solutions Singapore Pte Ltd
US8897303B20.525Delegate gateways and proxy for target hosts in large layer 2 and address resolution with duplicated internet protocol addressesGRANT2014-11-252010-06-2945441530GoodFutureWei Technologies IncFutureWei Technologies Inc
US20110004708A10.525COMPUTER APPARATUS AND PATH MANAGEMENT METHODAPPLICATION2011-01-062009-07-0643413227GoodHitachi LtdHitachi Ltd
US9185053B20.524Virtual fault tolerant ethernet appliance and method of operationGRANT2015-11-102011-11-0948223647GoodHoneywell International IncHoneywell International Inc
US9946578B20.524Managing the persistent data of a pre-installed application in an elastic virtual machine instanceGRANT2018-04-172011-09-3047993923GoodInternational Business Machines CorpInternational Business Machines Corp
US8639745B20.523Providing a neutral interface to multiple cloud computing systemsGRANT2014-01-282010-07-0145400538GoodRed Hat IncRed Hat Inc
US20100235831A10.523Method for dynamic configuration of virtual machineAPPLICATION2010-09-162009-03-1242731759Good
US9560166B20.522Provisioning high performance computing clustersGRANT2017-01-312011-12-1548611294GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9667515B10.522Service image notificationsGRANT2017-05-302011-09-2951031981GoodAmazon Technologies IncAmazon Technologies Inc
US20080134178A10.522CONTROL AND MANAGEMENT OF VIRTUAL SYSTEMSAPPLICATION2008-06-052006-10-1740679079GoodManageIQ IncRed Hat Inc
US7752313B20.522Partner web site to assist in offering applications to a web hosting communityGRANT2010-07-062007-02-2139707608GoodGo Daddy Group IncGo Daddy Operating Co LLC
US20100251255A10.522SERVER DEVICE  COMPUTER SYSTEM  RECORDING MEDIUM AND VIRTUAL COMPUTER MOVING METHODAPPLICATION2010-09-302009-03-3042228070GoodFujitsu LtdFujitsu Ltd
US10248398B20.521Method for virtualizing software applicationsGRANT2019-04-022008-04-0741134231GoodBlackBerry LtdBlackBerry Ltd
US20120017211A10.520VIRTUAL COMPUTER SYSTEM  INFORMATION PROCESSING DEVICE  STORAGE MEDIUM STORING COMPUTER PROGRAM  AND CONNECTION CONTROL METHODAPPLICATION2012-01-192009-03-3142827580GoodFujitsu LtdFujitsu Ltd
US20100214949A10.520Distributed data center access switchAPPLICATION2010-08-262009-02-2342091502GoodCisco Technology IncCisco Technology Inc
US8495197B10.520Resource pooling and subletting from user to another userGRANT2013-07-232011-09-2948792464GoodAmazon Technologies IncAmazon Technologies Inc
US20080134177A10.520COMPLIANCE-BASED ADAPTATIONS IN MANAGED VIRTUAL SYSTEMSAPPLICATION2008-06-052006-10-1740679063GoodManageIQ IncRed Hat Inc
US8548863B20.520System and method for selecting services from multiple cloud vendorsGRANT2013-10-012010-03-2644657441GoodCA IncCAI Software LLC
US9087322B10.520Adapting service provider products for multi-tenancy using tenant-specific service composition functionsGRANT2015-07-212011-12-2253540174GoodEMC CorpEMC Corp
US20120179778A10.518APPLYING NETWORKING PROTOCOLS TO IMAGE FILE MANAGEMENTAPPLICATION2012-07-122010-01-2246456093GoodBruteSoft IncBruteSoft Inc
US8997097B10.517System for implementing a virtual disk in a virtualization environmentGRANT2015-03-312011-08-1049640947GoodNutanix IncNutanix Inc
US20130074068A10.517Method  System  and Computer Program for Implementing a Customizable Virtual ApplianceAPPLICATION2013-03-212011-09-1645955483GoodInternational Business Machines CorpInternational Business Machines Corp
US8645529B20.517Automated service level management of applications in cloud computing environmentGRANT2014-02-042010-10-0645925993GoodInfosys LtdInfosys Ltd
US20090222816A10.517Data processing apparatus and method for controlling access to secure memory by virtual machines executing on processing circuirtyAPPLICATION2009-09-032008-02-2939315772GoodARM LtdARM Ltd
US9092260B10.516Sync point coordination providing high throughput job processing across distributed virtual infrastructureGRANT2015-07-282010-06-3050289021GoodEMC CorpEMC Corp
US9398082B20.515Software appliance management using broadcast techniqueGRANT2016-07-192008-05-2941381164GoodRed Hat IncRed Hat Inc
US20070011209A10.515Technique for the migration of a host environment to a new system platformAPPLICATION2007-01-112005-07-0635686553GoodUBS AGUBS Business Solutions AG
US8352609B20.515Dynamically modifying program execution capacityGRANT2013-01-082009-09-2943781596GoodAmazon Technologies IncAmazon Technologies Inc
US10013662B20.514Virtual resource cost tracking with dedicated implementation resourcesGRANT2018-07-032010-09-3045890585GoodAmazon Technologies IncAmazon Technologies Inc
US8370802B20.513Specifying an order for changing an operational state of software application componentsGRANT2013-02-052007-09-1840455690GoodInternational Business Machines CorpInternational Business Machines Corp
US10326708B20.513Cloud computing services frameworkGRANT2019-06-182012-02-1048948016GoodOracle International CorpOracle International Corp
US20110307716A10.513GLOBAL CONTROL POLICY MANAGERAPPLICATION2011-12-152010-06-1044486870GoodBroadcom CorpAvago Technologies General IP Singapore Pte Ltd
US8839241B20.513Virtual appliance deploymentGRANT2014-09-162010-12-3146381981GoodEMC CorpEMC Corp
US20110213691A10.511SYSTEMS AND METHODS FOR CLOUD-BASED BROKERAGE EXCHANGE OF SOFTWARE ENTITLEMENTSAPPLICATION2011-09-012010-02-2644505808GoodRed Hat IncRed Hat Inc
US20100191854A10.511PROCESS DEMAND PREDICTION FOR DISTRIBUTED POWER AND RESOURCE MANAGEMENTAPPLICATION2010-07-292009-01-2642355046GoodVMware IncVMware Inc
US9595054B20.510Resource management for cloud computing platformsGRANT2017-03-142011-06-2747362696GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8769131B20.510Cloud connector keyGRANT2014-07-012010-04-1644789055GoodOracle America IncOracle America Inc
US8627451B20.510Systems and methods for providing an isolated execution environment for accessing untrusted contentGRANT2014-01-072009-08-2143606359GoodRed Hat IncRed Hat Inc
US8639595B10.510Statistically cost-following accounting model for dedicated resourcesGRANT2014-01-282011-03-1049958034GoodAmazon Technologies IncAmazon Technologies Inc
US7146431B20.510Virtual network environmentGRANT2006-12-051999-10-0527538545GoodVeritas Operating CorpNortonLifeLock Inc
US8863124B10.510Architecture for managing I/O and storage for a virtualization environmentGRANT2014-10-142011-08-1051661297GoodNutanix IncNutanix Inc
US9916184B20.509Data relocation in global storage cloud environmentsGRANT2018-03-132011-12-0248524816GoodInternational Business Machines CorpInternational Business Machines Corp
US10044757B20.509Secure execution of enterprise applications on mobile devicesGRANT2018-08-072011-10-1149779221GoodCitrix Systems IncCitrix Systems Inc
US20120324442A10.509System and Method for an In-Server Virtual SwitchAPPLICATION2012-12-202011-06-1447354817GoodFutureWei Technologies IncFutureWei Technologies Inc
US8392575B10.506Clustered device dispersion in a multi-tenant environmentGRANT2013-03-052011-03-3147749153GoodAmazon Technologies IncAmazon Technologies Inc
US8799322B20.506Policy driven cloud storage management and cloud storage policy routerGRANT2014-08-052009-07-2443498209GoodCisco Technology IncCisco Technology Inc
US8689225B20.505Attributing causality to program execution capacity modificationsGRANT2014-04-012009-09-2943781778GoodAmazon Technologies IncAmazon Technologies Inc
WO2008062864A10.505VIRTUAL MACHINE LOCATING SYSTEM  VIRTUAL MACHINE LOCATING METHOD  PROGRAM  VIRTUAL MACHINE MANAGEMENT DEVICE AND SERVERAPPLICATION2008-05-292006-11-2439429793Good
US9424439B20.505Secure data synchronizationGRANT2016-08-232011-09-1247830928GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9075979B10.505Authentication based on proximity to mobile deviceGRANT2015-07-072011-08-1153492013GoodGoogle LLCGoogle LLC
US20110010691A10.504Distributed Software Testing Using Cloud Computing ResourcesAPPLICATION2011-01-132009-07-0843428425GoodVMware IncVMware Inc
US20070061465A10.502Host migration systemAPPLICATION2007-03-152005-09-1537889132GoodHostway CorpHostway Corp
US8606919B20.502Resource management toolGRANT2013-12-102008-12-2542286248GoodInternational Business Machines CorpInternational Business Machines Corp
US9038063B20.502Determining virtual machine image pattern distributions in a networked computing environmentGRANT2015-05-192011-09-0746605715GoodInternational Business Machines CorpInternational Business Machines Corp
US20070074208A10.502Apparatus and method for expedited virtual machine (VM) launch in VM cluster environmentAPPLICATION2007-03-292005-09-2937895715GoodIntel CorpIntel Corp
US9210098B20.502Enhanced command selection in a networked computing environmentGRANT2015-12-082012-02-1351842122GoodInternational Business Machines CorpInternational Business Machines Corp
US8997078B20.501Release lifecycle management system for a multi-node applicationGRANT2015-03-312011-04-1247007371GoodPivotal Software IncPivotal Software Inc
US8495611B20.501Systems and methods for private cloud computingGRANT2013-07-232010-07-0945441578GoodState Street CorpState Street Corp
US9225608B10.501Evaluating configuration changes based on aggregate activity levelGRANT2015-12-292011-12-2154932537GoodAmazon Technologies IncAmazon Technologies Inc
US9332005B20.500System and method for providing switch based subnet management packet (SMP) traffic protection in a middleware machine environmentGRANT2016-05-032011-07-1147519735GoodOracle International CorpOracle International Corp
US8924559B20.500Provisioning services using a cloud services catalogGRANT2014-12-302009-12-0343661819GoodInternational Business Machines CorpInternational Business Machines Corp
US9300532B20.500Automating deployment of service applications by exposing hosting environment constraintsGRANT2016-03-292008-10-2442118542GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8909744B20.499System and method for transitioning to cloud computing environmentGRANT2014-12-092010-10-2045973927GoodHCL Technologies LtdHCL Technologies Ltd
US20060085668A10.498Method and apparatus for configuring  monitoring and/or managing resource groupsAPPLICATION2006-04-202004-10-1535744803GoodEMC CorpEMC Corp
US20050138620A10.498Virtual network interfaceAPPLICATION2005-06-232003-12-1834677992GoodIntel CorpIntel Corp
US8495624B20.496Provisioning a suitable operating system environmentGRANT2013-07-232008-10-2342118763GoodInternational Business Machines CorpInternational Business Machines Corp
US8938733B20.496Generating a customized set of tasks for migration of a deployed software solutionGRANT2015-01-202010-11-3046127509GoodInternational Business Machines CorpInternational Business Machines Corp
US20110145199A10.495SYSTEM AND METHOD OF STORING BACKUP IMAGE CATALOGAPPLICATION2011-06-162009-12-1144144015GoodComputer Associates Think IncGoogle LLC
US9037505B20.495Mechanisms for executing a process in a cloud computing environmentGRANT2015-05-192009-05-2943222568GoodInternational Business Machines CorpInternational Business Machines Corp
US8594467B20.495Interactive virtual display system for ubiquitous devicesGRANT2013-11-262008-12-1944369347GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8495486B20.495Look ahead of links/alter linksGRANT2013-07-232007-12-2140790218GoodInvention Science Fund I LLCInvention Science Fund I LLC
US20110225277A10.495PLACEMENT OF VIRTUAL MACHINES BASED ON SERVER COST AND NETWORK COSTAPPLICATION2011-09-152010-03-1144560981GoodInternational Business Machines CorpInternational Business Machines Corp
US10162726B20.494Managing computing resourcesGRANT2018-12-252011-01-1846491556GoodAccenture Global Services LtdAccenture Global Services Ltd
US8578375B20.494Virtual machine administration for data center resource managersGRANT2013-11-052009-12-2344153002GoodInternational Business Machines CorpLenovo International Ltd
US9578088B20.494Globally distributed utility computing cloudGRANT2017-02-212005-09-1541257988GoodCA IncNihon Yamamura Glass Co Ltd, CAI Software LLC
US6557036B10.494Methods and apparatus for site wide monitoring of electronic mail systemsGRANT2003-04-291999-07-2024074370GoodSun Microsystems IncOracle America Inc
US9235856B20.493Providing overlay networks via elastic cloud networkingGRANT2016-01-122011-11-1048280560GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US9495651B20.493Cohort manipulation and optimizationGRANT2016-11-152011-06-2947391566GoodInternational Business Machines CorpUniversity College Dublin, International Business Machines Corp
US8641528B20.493Game execution environmentsGRANT2014-02-042009-06-0143220868GoodSony Interactive Entertainment America LLCSony Interactive Entertainment LLC
US9137213B20.492On-demand feature server activation in the cloudGRANT2015-09-152010-03-2644657778GoodAvaya IncAvaya Inc
US9591074B20.491Monitoring resources in a cloud-computing environmentGRANT2017-03-072011-06-3044898762GoodInternational Business Machines CorpAirbnb Inc
US8799915B10.491Decommissioning virtual appliancesGRANT2014-08-052010-12-3151229251GoodEMC CorpEMC Corp
US9270523B20.491Reconfiguring interrelationships between components of virtual computing networksGRANT2016-02-232012-02-2849004628GoodInternational Business Machines CorpInternational Business Machines Corp
US9740507B20.491Interacting with remote applications displayed within a virtual desktop of a tablet computing deviceGRANT2017-08-222010-04-0144711082GoodCitrix Systems IncCitrix Systems Inc
US9479394B20.490System and method for customer provisioning in a utility computing platformGRANT2016-10-252008-05-2048701539GoodVerizon Patent and Licensing IncAtlassian Inc
US9288117B10.490System and method for managing virtual and dedicated serversGRANT2016-03-152011-02-0855450283GoodGogrid LLCOpen Invention Network LLC
US8909769B20.488Determining optimal component location in a networked computing environmentGRANT2014-12-092012-02-2949004526GoodInternational Business Machines CorpInternational Business Machines Corp
US20040267866A10.488Virtual machine connection to a tangible networkAPPLICATION2004-12-302003-06-2433539535GoodInternational Business Machines CorpInternational Business Machines Corp
US8775590B20.488Reactive monitoring of guests in a hypervisor environmentGRANT2014-07-082010-09-0245771470GoodInternational Business Machines CorpInternational Business Machines Corp
US10164896B20.488Cloud-based content management systemGRANT2018-12-252012-01-1847553076GoodInternational Business Machines CorpInternational Business Machines Corp
US9185513B10.487Method and system for compilation with profiling feedback from clientGRANT2015-11-102011-12-0254363635GoodGoogle LLCGoogle LLC
US9886360B20.487Server clustering in a computing-on-demand systemGRANT2018-02-062010-11-0546020695GoodSalesforce com IncSalesforce com Inc
US8812586B10.486Correlating status information generated in a computer networkGRANT2014-08-192011-02-1551301818GoodGoogle LLCGoogle LLC
US20120166619A10.486LICENSING AND METERING OF VIRTUALIZED APPLICATIONSAPPLICATION2012-06-282010-12-2346314917GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080098457A10.486Identity controlled data centerAPPLICATION2008-04-242006-10-1939031178GoodMicro Focus Software IncOracle International Corp
US10043025B20.485Persistent key access to a resources in a collectionGRANT2018-08-072011-06-2746489480GoodGoogle LLCGoogle LLC
US8601472B10.485Instantiating virtual appliancesGRANT2013-12-032010-12-3149640946GoodEMC CorpEMC Corp
US9311160B20.485Elastic cloud networkingGRANT2016-04-122011-11-1048281725GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US10700932B20.484Automated standalone bootstrapping of hardware inventoryGRANT2020-06-302012-01-3052133568GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20050262504A10.484Method and apparatus for dynamic CPU resource managementAPPLICATION2005-11-242004-05-2134967211GoodComputer Associates Think IncComputer Associates Think Inc
US8620820B20.481Management of dynamic assembly and licensing of appliancesGRANT2013-12-312011-11-1548281547GoodInternational Business Machines CorpInternational Business Machines Corp
US8776188B20.481Remote desktop accessGRANT2014-07-082008-03-1341064465GoodMicrosoft CorpZhigu Holdings Ltd
US8635308B20.481Performance optimization of business processes by stochastic environmental changesGRANT2014-01-212008-02-2640999385GoodSAP SE SAP SE
US8924273B20.481Simplifying migration from one financial consolidation application to anotherGRANT2014-12-302010-10-2845997741GoodOracle International CorpOracle International Corp
US20090165134A10.481Look ahead of links/alter linksAPPLICATION2009-06-252007-12-2140790328GoodSearete LLCSearete LLC
US7945652B20.481Display multi-layers list item in web-browser with supporting of concurrent multi-usersGRANT2011-05-172002-08-0646324981GoodSTT WebOS IncSTT WebOS Inc
US20110019676A10.481Extended subnetsAPPLICATION2011-01-272009-07-2143497293GoodCisco Technology IncCisco Technology Inc
US8504400B20.480Dynamically optimized distributed cloud computing-based business process management (BPM) systemGRANT2013-08-062010-03-2444657402GoodInternational Business Machines CorpInternational Business Machines Corp
US10185594B20.480System and method for resource identificationGRANT2019-01-222009-10-2943926343GoodInternational Business Machines CorpInternational Business Machines Corp
US8745264B10.480Random next iteration for data update managementGRANT2014-06-032011-03-3150781408GoodAmazon Technologies IncAmazon Technologies Inc
US8918501B20.480Pattern-based computational health and configuration monitoringGRANT2014-12-232011-11-1048281726GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9773051B20.478Mobile platform file and folder selection functionalities for offline access and synchronizationGRANT2017-09-262011-11-2948467740GoodBox IncBox Inc
US8601498B20.478Accelerator system for use with secure data storageGRANT2013-12-032010-05-2844627505GoodSecurity First CorpSecurity First Corp
US8832775B20.477Techniques for workload spawningGRANT2014-09-092011-06-1747354860GoodMicro Focus Software IncMicro Focus Software Inc
US9684785B20.477Providing multiple isolated execution environments for securely accessing untrusted contentGRANT2017-06-202009-12-1744153086GoodRed Hat IncRed Hat Inc
US9411691B20.477Virtual machine disaster recoveryGRANT2016-08-092011-06-3052395889GoodEMC CorpEMC Corp
US8355901B20.477CPU emulation system  CPU emulation method  and recording medium having a CPU emulation program recorded thereonGRANT2013-01-152008-10-2842118345GoodNEC CorpNEC Corp
US7533385B10.476Virtualization and server imaging system for allocation of computer hardware and softwareGRANT2009-05-122004-07-0740601680GoodSprint Communications Co LPT Mobile Innovations LLC
US9171053B20.476Method and device for automatic migration of system configuration itemGRANT2015-10-272011-08-2945761468GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US8763140B20.476Secure workflow and data management facilityGRANT2014-06-242009-05-2043125453GoodEvizone IP Holdings LtdData Cloud Services LLC
US9210048B10.476Clustered dispersion of resource use in shared computing environmentsGRANT2015-12-082011-03-3154708443GoodAmazon Technologies IncAmazon Technologies Inc
US20110296429A10.476SYSTEM AND METHOD FOR MANAGEMENT OF LICENSE ENTITLEMENTS IN A VIRTUALIZED ENVIRONMENTAPPLICATION2011-12-012010-06-0145023263GoodInternational Business Machines CorpInternational Business Machines Corp
US8825862B20.476Optimization of resource provisioning in a networked computing environmentGRANT2014-09-022011-08-0147627688GoodInternational Business Machines CorpInternational Business Machines Corp
US8539094B10.475Ordered iteration for data update managementGRANT2013-09-172011-03-3149122514GoodAmazon Technologies IncAmazon Technologies Inc
US10831608B20.475Systems and methods for performing data management operations using snapshotsGRANT2020-11-102009-09-1444188690GoodCommvault Systems IncCommvault Systems Inc
US9772830B20.475System and method for modeling cloud rules for migration to the cloudGRANT2017-09-262012-01-1948946736GoodSyntel IncAtos Syntel Inc
US9189259B20.475Provisioning of virtual machine pools based on historical data in a networked computing environmentGRANT2015-11-172011-08-2247745591GoodInternational Business Machines CorpInternational Business Machines Corp
US9250944B20.475Selection of virtual machines from pools of pre-provisioned virtual machines in a networked computing environmentGRANT2016-02-022011-08-3047745603GoodInternational Business Machines CorpInternational Business Machines Corp
US6131163A0.474Network gateway mechanism having a protocol stack proxyGRANT2000-10-101998-02-1721823156GoodCisco Technology IncCisco Technology Inc
US8914469B20.474Negotiating agreements within a cloud computing environmentGRANT2014-12-162009-12-1144143993GoodInternational Business Machines CorpInternational Business Machines Corp
US8769270B20.474Systems and methods for secure data sharingGRANT2014-07-012010-09-2044681450GoodSecurity First CorpSecurity First Corp
US8862633B20.473System and method for efficiently building virtual appliances in a hosted environmentGRANT2014-10-142008-05-3049513560GoodMicro Focus Software IncSuse LLC
US8316139B20.472Systems and methods for integrating local systems with cloud computing resourcesGRANT2012-11-202008-12-3142286252GoodSAP SE SAP SE
US20120072307A10.472PROVIDING A MARKETPLACE FOR SOFTWARE SERVICESAPPLICATION2012-03-222010-09-2145818587GoodeBay IncPayPal Inc
US9137022B20.471Identifying a slice name information error in a dispersed storage networkGRANT2015-09-152010-06-2245328685GoodCleversafe IncPure Storage Inc
US10062123B20.471Metadata driven collaboration between applications and web servicesGRANT2018-08-282011-09-1247883591GoodIntel CorpIntel Corp
US9081959B20.470Methods and apparatus for control and detection of malicious content using a sandbox environmentGRANT2015-07-142011-12-0248525005GoodInvincea IncInvincea Inc
US9733960B20.470Communications network and a network terminalGRANT2017-08-152011-05-1344260506GoodEN Twyn LtdEN Twyn Ltd
US20100306772A10.469VIRTUAL SOLUTION COMPOSITION AND DEPLOYMENT SYSTEM AND METHODAPPLICATION2010-12-022009-06-0143221765GoodInternational Business Machines CorpInternational Business Machines Corp
US9092243B20.469Managing a software applianceGRANT2015-07-282008-05-2841381449GoodRed Hat IncRed Hat Inc
US9128803B20.468Application model for implementing composite applicationsGRANT2015-09-082010-12-1546236207GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8769531B20.468Optimizing the configuration of virtual machine instances in a networked computing environmentGRANT2014-07-012011-05-2546178537GoodInternational Business Machines CorpInternational Business Machines Corp
US20020052972A10.468Communication method among a plurality of virtual LANs in an IP subnetAPPLICATION2002-05-022000-08-2919685896GoodLG Electronics IncEricsson LG Co Ltd
US8528059B10.467Apparatuses  methods and systems for a secure resource access and placement platformGRANT2013-09-032008-10-0649034832GoodGoldman Sachs and Co LLCGoldman Sachs and Co LLC
US8826028B10.467Cryptography secure input deviceGRANT2014-09-022010-11-1251400174GoodGoogle LLCGoogle LLC
US20050091365A10.466Interposing a virtual machine monitor and devirtualizing computer hardwareAPPLICATION2005-04-282003-10-0134520507GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9009294B20.466Dynamic provisioning of resources within a cloud computing environmentGRANT2015-04-142009-12-1144144126GoodInternational Business Machines CorpInternational Business Machines Corp
US9760917B20.465Migrating computing environment entitlement contracts between a seller and a buyerGRANT2017-09-122011-06-2947391480GoodInternational Business Machines CorpInternational Business Machines Corp
US8145929B20.464Stochastic management of power consumption by computer systemsGRANT2012-03-272011-07-0144816799GoodIntel CorpIntel Corp
WO2012023050A20.464SECURE CLOUD COMPUTING SYSTEM AND METHODAPPLICATION2012-02-232010-08-2044993150Good
US20100153569A10.463System and Method for a Virtual Hosted Operating SystemAPPLICATION2010-06-172007-03-0939742531GoodGhost IncINFINITY IP BANK INTERNATIONAL (SUZHOU) Co Ltd
US20110072431A10.463SYSTEM AND METHOD FOR USAGE-BASED APPLICATION LICENSING IN A HYPERVISOR VIRTUAL EXECUTION ENVIRONMENTAPPLICATION2011-03-242009-09-2443048880GoodOracle International CorpOracle International Corp
US8024538B20.462High efficiency virtualized portable archiveGRANT2011-09-202006-03-2038523266GoodEMC CorpEMC Corp
US6138238A0.461Stack-based access control using code and executor identifiersGRANT2000-10-241997-12-1126722146GoodSun Microsystems IncOracle America Inc
US9965745B20.461System and method for promoting enterprise adoption of a web-based collaboration environmentGRANT2018-05-082012-02-2449004469GoodBox IncBox Inc
US20070078988A10.461Apparatus  method and system for rapid delivery of distributed applicationsAPPLICATION2007-04-052005-09-1537889378Good3Tera LLCCAI Software LLC
US9112812B20.460Distributed virtual applianceGRANT2015-08-182011-09-2247912504GoodEmbrane LLCCisco Technology Inc
US8898318B20.460Distributed services authorization managementGRANT2014-11-252010-06-0345065359GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9015601B20.460Batch uploading of content to a web-based collaboration environmentGRANT2015-04-212011-06-2147363034GoodBox IncBox Inc
US8630979B20.459Non-blocking input output based storageGRANT2014-01-142010-02-2644505843GoodRed Hat IncRed Hat Inc
US8904386B20.458Running a plurality of instances of an applicationGRANT2014-12-022011-03-3146929070GoodInternational Business Machines CorpInternational Business Machines Corp
US9277022B20.458Guided workflows for establishing a web presenceGRANT2016-03-012010-01-1548903881GoodEndurance International Group IncNewfold Digital Inc
US8291036B20.457Datacenter synchronizationGRANT2012-10-162009-03-1642731547GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20110041126A10.457MANAGING WORKLOADS IN A VIRTUAL COMPUTING ENVIRONMENTAPPLICATION2011-02-172009-08-1343589354GoodMicro Focus Software IncMicro Focus Software Inc
US20060165030A10.456Method of and system for transmitting a mobile agent for instruction executionAPPLICATION2006-07-272004-12-0736696657GoodRoaming Messenger IncRoaming Messenger Inc
US8812679B20.456Managing computing environment entitlement contracts and associated resources using cohortingGRANT2014-08-192011-06-2947392087GoodInternational Business Machines CorpInternational Business Machines Corp
US9558441B20.456Legacy application migration to real time  parallel performance cloudGRANT2017-01-312009-08-2846969588GoodPneuron CorpUST Global Singapore Pte Ltd
US8775601B20.456Managing organizational computing resources in accordance with computing environment entitlement contractsGRANT2014-07-082011-06-2947392086GoodInternational Business Machines CorpInternational Business Machines Corp
US20120221820A10.456SWITCHING VISIBILITY BETWEEN VIRTUAL DATA STORAGE ENTITIESAPPLICATION2012-08-302010-08-2045594984GoodInternational Business Machines CorpInternational Business Machines Corp
US20090222558A10.456Managing Network Data Transfers in a Virtual Computer SystemAPPLICATION2009-09-032003-09-1941014031GoodVMware IncVMware Inc
US20110173405A10.456SYSTEM AND METHOD FOR REDUCING LATENCY TIME WITH CLOUD SERVICESAPPLICATION2011-07-142010-01-1344259410GoodInternational Business Machines CorpInternational Business Machines Corp
US9407514B20.455Virtual machine placementGRANT2016-08-022011-07-1147506331GoodHewlett Packard Enterprise Development LPMicro Focus LLC
US20130212340A10.455PARTITION AWARE QUALITY OF SERVICE FEATUREAPPLICATION2013-08-152012-02-1548946625GoodInternational Business Machines CorpInternational Business Machines Corp
US20060045089A10.454Method and apparatus for providing network virtualizationAPPLICATION2006-03-022004-08-2735942953GoodInternational Business Machines CorpInternational Business Machines Corp
US8654971B20.454Systems and methods for securing data in the cloudGRANT2014-02-182009-05-1942732656GoodSecurity First CorpSecurity First Corp
US9503549B20.454Real-time data analysis for resource provisioning among systems in a networked computing environmentGRANT2016-11-222011-04-2047022135GoodInternational Business Machines CorpInternational Business Machines Corp
US10310824B20.454Distributed ledger platform for computing applicationsGRANT2019-06-042011-09-0764096151GoodImagine Communications CorpImagine Communications Corp
US9648006B20.453System and method for communicating with a client applicationGRANT2017-05-092011-05-2347519733GoodTwilio IncTwilio Inc
US20120084443A10.452VIRTUAL PROVISIONING WITH IMPLEMENTATION RESOURCE BOUNDARY AWARENESSAPPLICATION2012-04-052010-09-3045890779GoodAmazon Technologies IncAmazon Technologies Inc
US20080263553A10.452Dynamic Service Level Manager for Image PoolsAPPLICATION2008-10-232007-04-1939873520GoodInternational Business Machines CorpInternational Business Machines Corp
US8775626B20.451Using templates to configure cloud resourcesGRANT2014-07-082010-09-1745818736GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8370416B20.451Compatibility enforcement in clustered computing systemsGRANT2013-02-052006-04-2638170759GoodHewlett Packard Development Co LPValtrus Innovations Ltd, Hewlett Packard Development Co LP, Hewlett Packard Enterprise Development LP
US20120216052A10.451EFFICIENT VOLUME ENCRYPTIONAPPLICATION2012-08-232011-01-1145558506GoodSafeNet IncSafeNet Inc
US20030191810A10.449Method and apparatus for allocating resources among virtual filers on a filerAPPLICATION2003-10-092001-12-2821884042GoodNETWORK APLICANCE IncNetApp Inc
US9152470B20.449Systems and methods for computing applicationsGRANT2015-10-062011-09-0747832658GoodImagine Communications CorpImagine Communications Corp
US20080256535A10.448Tessellated virtual machines for common computing goalsAPPLICATION2008-10-162007-04-1039638953GoodMicro Focus Software IncMicro Focus Software Inc
US10678602B20.448Apparatus  systems and methods for dynamic adaptive metrics based application deployment on distributed infrastructuresGRANT2020-06-092011-02-0946829349GoodCisco Technology IncCisco Technology Inc
US20130054426A10.447System and Method for Customer Provisioning in a Utility Computing PlatformAPPLICATION2013-02-282008-05-2047745018GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US9317407B20.447Techniques for validating services for deployment in an intelligent workload management systemGRANT2016-04-192010-03-1944648238GoodMicro Focus Software IncMicro Focus Software Inc
US8290998B20.447Systems and methods for generating cloud computing landscapesGRANT2012-10-162009-05-2043125280GoodSAP SE SAP SE
US9462056B10.447Policy-based meta-data driven co-location of computation and datasets in the cloudGRANT2016-10-042007-10-3156995170GoodEMC CorpEMC Corp
US9185069B20.447Handling reverse NAT in logical L3 routingGRANT2015-11-102011-08-1747712585GoodNicira IncNicira Inc
EP2517117A10.446SYSTEMS AND METHODS FOR AUTOMATIC PROVISIONING OF A USER DESIGNED VIRTUAL PRIVATE DATA CENTER IN A MULTI-TENANT SYSTEMGRANT2012-10-312009-12-2344152585GoodSavvis IncSavvis Inc
US8176094B20.446System and method for efficiently building virtual appliances in a hosted environmentGRANT2012-05-082008-05-3041381091GoodMicro Focus Software IncSuse LLC
US20070094367A10.446Object-based virtual infrastructure managementAPPLICATION2007-04-262005-10-1937622015GoodComputer Associates Think IncCAI Software LLC
US20120023222A10.445MOVING DEPLOYMENT OF IMAGES BETWEEN COMPUTERSAPPLICATION2012-01-262010-07-2245494474GoodInternational Business Machines CorpInternational Business Machines Corp
US9489243B20.445Federating computing resources across the webGRANT2016-11-082012-01-2648871303GoodComputenext IncClictell LLC
US20100290473A10.444Port grouping for association with virtual interfacesAPPLICATION2010-11-182009-05-1543068466GoodCisco Technology IncCisco Technology Inc
US20170300024A10.444METHODS AND APPARATUS TO VIRTUALIZE A PROCESS CONTROL SYSTEMAPPLICATION2017-10-192010-09-2744764235GoodFisher Rosemount Systems IncFisher Rosemount Systems Inc
US20100250718A10.444METHOD AND APPARATUS FOR LIVE REPLICATIONAPPLICATION2010-09-302009-03-2542781861GoodNTT Docomo IncNTT Docomo Inc
US8812451B20.444Programming model for synchronizing browser caches across devices and web servicesGRANT2014-08-192009-03-1142729006GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20130019015A10.443Application Resource Manager over a CloudAPPLICATION2013-01-172011-07-1247506432GoodInternational Business Machines CorpInternational Business Machines Corp
US8010485B10.443Background movement of data between nodes in a storage clusterGRANT2011-08-302005-10-2044486356GoodAmerican Megatrends Inc USAAmzetta Technologies LLC
US8473531B20.442Presenting a file system for a file containing itemsGRANT2013-06-252009-09-0343626434GoodQuantum CorpQuantum Corp
US10021179B10.442Local resource delivery networkGRANT2018-07-102012-02-2162749689GoodAmazon Technologies IncAmazon Technologies Inc
US20110246669A10.442METHOD AND SYSTEM OF VIRTUAL MACHINE MIGRATIONAPPLICATION2011-10-062010-03-3044697693GoodHitachi LtdHitachi Ltd
US8650434B20.442Systems and methods for securing data in motionGRANT2014-02-112010-03-3144065668GoodSecurity First CorpSecurity First Corp
US6105053A0.441Operating system for a non-uniform memory access multiprocessor systemGRANT2000-08-151995-06-2323964148GoodEMC CorpEMC Corp
US20040103339A10.441Policy enabled grid architectureAPPLICATION2004-05-272002-11-2146299098GoodInternational Business Machines CorpDaedalus Blue LLC
US20130254868A10.440SYSTEM AND METHOD FOR MULTIMEDIA MULTI-PARTY PEERING (M2P2)APPLICATION2013-09-262010-10-1345938973GoodZTE USA IncZTE USA Inc
US9609460B20.440Cloud based mobile device security and policy enforcementGRANT2017-03-282011-03-1846829546GoodZscaler IncZscaler Inc
US8621058B20.440Providing cloud-based computing servicesGRANT2013-12-312010-10-2845998044GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8589475B20.440Modeling a cloud computing systemGRANT2013-11-192010-01-2844309785GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US10715457B20.440Coordination of processes in cloud computing environmentsGRANT2020-07-142010-06-1552996761GoodOracle International CorpOracle International Corp
US8554917B20.439Performance isolation for storage cloudsGRANT2013-10-082010-08-2045594938GoodInternational Business Machines CorpInternational Business Machines Corp
US8510747B20.438Method and device for implementing load balance of data center resourcesGRANT2013-08-132010-10-2944562853GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US9641677B20.438System and method for determining and communicating presence informationGRANT2017-05-022011-09-2147881114GoodTwilio IncTwilio Inc
US9912740B20.437Latency measurement in resource requestsGRANT2018-03-062008-06-3057129063GoodAmazon Technologies IncAmazon Technologies Inc
US8913611B20.437Connection identifier assignment and source network address translationGRANT2014-12-162011-11-1548280562GoodNicira IncNicira Inc
US20100106764A10.436DATACENTER HOSTING MULTIPLE ONLINE DATA MANAGEMENT SOLUTIONSAPPLICATION2010-04-292008-10-2942118521GoodGo Daddy Group IncGo Daddy Operating Co LLC
US20130111336A10.436PLATFORM AND APPLICATION INDEPENDENT SYSTEM AND METHOD FOR NETWORKED FILE ACCESS AND EDITINGAPPLICATION2013-05-022011-11-0148173751GoodBox IncBox Inc
US20080072287A10.436TRUST EVALUATION FOR A MOBILE SOFTWARE AGENT ON A TRUSTED COMPUTING PLATFORMAPPLICATION2008-03-202006-09-1439190193GoodInterDigital Technology CorpInterDigital Technology Corp
US8751627B20.436Method and system for application migration in a cloudGRANT2014-06-102009-05-0542358410GoodAccenture Global Services LtdAccenture Global Services Ltd
US20120197624A10.435SYSTEM AND METHOD FOR MANAGING A STORAGE ARRAY USING SIMULATIONAPPLICATION2012-08-022011-01-2846578087GoodLSI CorpLSI Corp
US20120054762A10.434SCHEDULING APPARATUS AND METHOD FOR A MULTICORE DEVICEAPPLICATION2012-03-012010-08-2545698903GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20070067396A10.434Outsourcing of instant messaging hosting servicesAPPLICATION2007-03-222005-09-1637885476GoodMicrosoft CorpServiceNow Inc
US9043706B20.433System and method for using state replication between application instances to provide a collaborative desktop environmentGRANT2015-05-262010-08-3145698814GoodMOSAIQQ IncDatapath Ltd
US9519517B20.432Data center controlGRANT2016-12-132009-02-1342194687GoodSchneider Electric IT CorpSchneider Electric IT Corp
US8458658B20.432Methods and systems for dynamically building a software applianceGRANT2013-06-042008-02-2941014194GoodRed Hat IncRed Hat Inc
US20090024713A10.431MAINTAINING AVAILABILITY OF A DATA CENTERAPPLICATION2009-01-222007-07-1839885209GoodMetroSource CorpMetroSource Corp
US20120084769A10.430SEMANTICALLY RICH COMPOSABLE SOFTWARE IMAGE BUNDLESAPPLICATION2012-04-052010-09-3045889388GoodInternational Business Machines CorpInternational Business Machines Corp
US7689733B20.430Method and apparatus for policy-based direct memory access controlGRANT2010-03-302007-03-0939742964GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10015083B20.429Interfaces to manage inter-region connectivity for direct network peeringsGRANT2018-07-032011-12-2248655655GoodAmazon Technologies IncAmazon Technologies Inc
US10114678B20.429Techniques for managing service definitions in an intelligent workload management systemGRANT2018-10-302010-03-1944648252GoodMicro Focus Software IncMicro Focus Software Inc
US8788668B20.429Information processing apparatus  information processing system  setting program transmission method and server setting programGRANT2014-07-222008-02-2240985288GoodNEC CorpNEC Corp
US10079742B10.428Latency measurement in resource requestsGRANT2018-09-182010-09-2856507326GoodAmazon Technologies IncAmazon Technologies Inc
US9888089B20.428Client side cache managementGRANT2018-02-062008-03-3149084240GoodAmazon Technologies IncAmazon Technologies Inc
US9451046B20.427Managing CDN registration by a storage providerGRANT2016-09-202008-11-1744907077GoodAmazon Technologies IncAmazon Technologies Inc
US20110173319A10.427APPARATUS AND METHOD FOR OPERATING SERVER USING VIRTUALIZATION TECHNIQUEAPPLICATION2011-07-142010-01-1344259370GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US9354912B10.426Method and system for implementing a maintenance service for managing I/O and storage for a virtualization environmentGRANT2016-05-312011-08-1049230025GoodNutanix IncNutanix Inc
US10187491B20.426Request-response processing an a content delivery networkGRANT2019-01-222011-12-1448611345GoodLevel 3 Communications LLCLevel 3 Communications LLC
US9122640B20.426Handling of data transfer in a LAN-free environmentGRANT2015-09-012009-12-1844152619GoodInternational Business Machines CorpInternational Business Machines Corp
US8724642B20.426Interfaces to manage direct network peeringsGRANT2014-05-132011-11-2948466842GoodAmazon Technologies IncAmazon Technologies Inc
US6658473B10.426Method and apparatus for distributing load in a computer environmentGRANT2003-12-022000-02-2524044154GoodSun Microsystems IncOracle America Inc
US9436515B20.425Tenant virtualization controller for exporting tenant without shifting location of tenant data in a multi-tenancy environmentGRANT2016-09-062010-12-2946381989GoodSAP SE SAP SE
US8489939B20.423Dynamically allocating multitier applications based upon application requirements and performance and reliability of resourcesGRANT2013-07-162010-10-2545974013GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US6985956B20.421Switching systemGRANT2006-01-102000-11-0232681882GoodSun Microsystems IncOracle America Inc
US20070282572A10.421Virtual machine for operating N-core application on M-core processorAPPLICATION2007-12-062006-06-0138791387GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8805953B20.421Differential file and system restores from peers and the cloudGRANT2014-08-122009-04-0342827026GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20100115049A10.418Storage Management Method and Management ServerAPPLICATION2010-05-062008-10-3142132816GoodHitachi LtdHitachi Ltd
US9106469B10.418Interfaces to manage last-mile connectivity for direct network peeringsGRANT2015-08-112011-11-2953763369GoodAmazon Technologies IncAmazon Technologies Inc
US9268778B20.418Efficient backup of virtual dataGRANT2016-02-232011-06-3051541660GoodEMC CorpEMC Corp
US10601767B20.418DNS query processing based on application informationGRANT2020-03-242009-03-2748999878GoodAmazon Technologies IncAmazon Technologies Inc
US8521655B20.417Engine  system and method for providing cloud-based business intelligenceGRANT2013-08-272011-06-0647262412GoodBizEquity LLCBizEquity LLC
US8046534B20.417Managing snapshots in storage systemsGRANT2011-10-252006-10-2639331633GoodHewlett Packard Development Co LPSnowflake Inc
US8850525B10.417Access control center auto configurationGRANT2014-09-302008-09-1751588358GoodUnited Services Automobile Association USAAUnited Services Automobile Association USAA
US9286331B20.417Verifying and balancing server resources via stored usage dataGRANT2016-03-152010-05-0644902619GoodGo Daddy Operating Co LLCGo Daddy Operating Co LLC
US9904435B20.416System and method for actionable event generation for task delegation and management via a discussion forum in a web-based collaboration environmentGRANT2018-02-272012-01-0648744839GoodBox IncBox Inc
US6549930B10.416Method for scheduling threads in a multithreaded processorGRANT2003-04-151997-11-2625527391GoodCompaq Computer CorpHTC Corp
US8341464B20.415Diagnostic dashboard for web pagesGRANT2012-12-252010-04-2844859272GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9930131B20.415Request routing processingGRANT2018-03-272010-11-2245048315GoodAmazon Technologies IncAmazon Technologies Inc
US7953889B20.414Systems and methods for routing VPN traffic around network disruptionGRANT2011-05-312006-08-0339030600GoodCitrix Systems IncCitrix Systems Inc
US9413649B20.414Virtual network device architectureGRANT2016-08-092010-03-1244560940GoodForce10 Networks IncDell Marketing Corp
US8978104B10.414Access control center workflow and approvalGRANT2015-03-102008-07-2352597982GoodUnited Services Automobile Association USAAUnited Services Automobile Association USAA
US8280790B20.414System and method for billing for hosted servicesGRANT2012-10-022007-08-0644801485GoodGogrid LLCOpen Invention Network LLC
US8595353B20.413Automated recommendations for cloud-computing optionsGRANT2013-11-262011-06-0646125521GoodInternational Business Machines CorpInternational Business Machines Corp
US9104484B20.413Methods and systems for evaluating bytecode in an on-demand service environment including translation of apex to bytecodeGRANT2015-08-112010-04-2144816766GoodSalesforce com IncSalesforce com Inc
US20120158819A10.413POLICY-BASED APPLICATION DELIVERYAPPLICATION2012-06-212010-12-2146235826GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20060253596A10.413Methods and apparatus for simultaneously hosting multiple service providers on a networkAPPLICATION2006-11-092005-05-0537395282GoodQualcomm IncQualcomm Inc
US10554426B20.413Real time notification of activities that occur in a web-based collaboration environmentGRANT2020-02-042011-01-2044584601GoodBox IncBox Inc
US8910153B20.412Managing virtualized accelerators using admission control  load balancing and schedulingGRANT2014-12-092009-07-1343428446GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US10454849B20.412Methods and apparatus related to a flexible data center security architectureGRANT2019-10-222008-09-1141799191GoodJuniper Networks IncJuniper Networks Inc
US20130204746A10.412AUTOMATIC WEB PRESENCE FEATURE DEPLOYMENTAPPLICATION2013-08-082012-01-1148781941GoodEndurance International Group IncNewfold Digital Inc
US8862744B20.411Optimizing traffic load in a communications networkGRANT2014-10-142012-02-1447681800GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US20110083122A10.411METHOD AND SYSTEM FOR MASSIVE LARGE SCALE TEST INFRASTRUCTUREAPPLICATION2011-04-072009-10-0543824136GoodSalesforce com IncSalesforce com Inc
US9794216B20.411Request routing in a networked environmentGRANT2017-10-172010-09-2844764228GoodAmazon Technologies IncAmazon Technologies Inc
US6070219A0.411Hierarchical interrupt structure for event notification on multi-virtual circuit network interface controllerGRANT2000-05-301996-10-0924927164GoodIntel CorpIntel Corp
US8495199B20.411Interfaces to manage service marketplaces accessible via direct network peeringsGRANT2013-07-232011-12-2248655656GoodAmazon Technologies IncAmazon Technologies Inc
US8082313B20.409Efficient utilization of read-ahead buffer by partitioning read-ahead buffer in correspondence with selectorsGRANT2011-12-202009-10-2643899299GoodInternational Business Machines CorpInternational Business Machines Corp
US10165015B20.409System and method for real-time communication by using a client application communication protocolGRANT2018-12-252011-05-2350066155GoodTwilio IncTwilio Inc
US20110274108A10.407METHOD AND SYSTEM FOR OFFLOADING TUNNEL PACKET PROCESSING IN CLOUD COMPUTINGAPPLICATION2011-11-102010-05-0744276292GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US7143307B10.407Remote disaster recovery and data migration using virtual appliance migrationGRANT2006-11-282002-03-1537450048GoodNetApp IncNetApp Inc
US9628554B20.406Dynamic content deliveryGRANT2017-04-182012-02-1051948525GoodAmazon Technologies IncAmazon Technologies Inc
US8769055B20.406Distributed backup and versioningGRANT2014-07-012009-04-2442993021GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9652741B20.406Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereofGRANT2017-05-162011-07-0844908143GoodBox IncBox Inc
US9197718B20.405Central management and control of user-contributed content in a web-based collaboration environment and management console thereofGRANT2015-11-242011-09-2347912660GoodBox IncBox Inc
US8677007B20.405Systems and methods for bypassing an applianceGRANT2014-03-182006-08-0339030576GoodCitrix Systems IncCitrix Systems Inc
US6049789A0.405Software pay per use licensing systemGRANT2000-04-111998-06-2422300593GoodMentor Graphics CorpMentor Graphics Corp
US10678666B10.404Method and system for implementing automated test and retest procedures in a virtual test environmentGRANT2020-06-092011-09-0770973089GoodInnovative Defense Technologies LLCInnovative Defense Technologies LLC
US20100076863A10.404HOSTING PLATFORMAPPLICATION2010-03-252008-09-2242038619Good
US9866559B20.404Method for opening a session of a machine belonging to a machine setGRANT2018-01-092010-05-0342945875GoodEvidian SA, EVIDANEVIDAN
US8645546B20.404Cloud service control and management architecture expanded to interface the network stratumGRANT2014-02-042011-06-1746331739GoodFutureWei Technologies IncFutureWei Technologies Inc
US9110693B10.404VM mobility over distanceGRANT2015-08-182011-02-1753785999GoodEMC CorpEMC Corp
US8904377B20.403Reconfiguration of computer system to allow application installationGRANT2014-12-022011-01-1946491731GoodInternational Business Machines CorpInternational Business Machines Corp
US20060235986A10.403Web service processing apparatus and methodAPPLICATION2006-10-192005-04-1537109864GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US8370828B20.403Techniques to perform gradual upgradesGRANT2013-02-052006-05-0538662606GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080147856A10.402SYSTEMS AND METHODS FOR RECOMMENDING WEBSITE HOSTING APPLICATIONSAPPLICATION2008-06-192008-02-1139528941GoodGo Daddy Group IncGo Daddy Operating Co LLC
US8407669B20.401Device based software authorizations for software asset managementGRANT2013-03-262007-07-2540296481GoodOracle International CorpOracle International Corp
US10257042B20.399System and method for managing site-to-site VPNs of a cloud managed networkGRANT2019-04-092012-01-1348779927GoodCisco Technology IncCisco Technology Inc
US8161126B20.399System and method for RDMA QP state split between RNIC and host softwareGRANT2012-04-172003-12-1934680773GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US11025622B20.399System and method for linking pre-installed software to a user account on an online storeGRANT2021-06-012011-07-1247519706GoodApple IncApple Inc
US8850130B10.396Metadata for managing I/O and storage for a virtualizationGRANT2014-09-302011-08-1051588312GoodNutanix IncNutanix Inc
US10506029B20.395Content distribution networkGRANT2019-12-102010-01-2857235047GoodAmazon Technologies IncAmazon Technologies Inc
US9778718B20.395Power supply and data center controlGRANT2017-10-032009-02-1342110922GoodSchneider Electric IT CorpSchneider Electric IT Corp
US8707397B10.395Access control center auto launchGRANT2014-04-222008-09-1050482035GoodUnited Services Automobile Association USAAUnited Services Automobile Association USAA
US9063738B20.395Dynamically placing computing jobsGRANT2015-06-232010-11-2246065084GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8516054B20.395Message handlingGRANT2013-08-202000-12-2026945886GoodAurea Software IncAurea Software Inc
US7844513B20.394Method and system for operating a commissioned e-commerce service proverGRANT2010-11-302000-07-1746204201GoodGalactic Computing Corp BVI/IBCGALACTIC COMPUTING Corp (FORMERLY KNOWN AS GALACTIC REVENUE Ltd, GALACTIC COMPUTING Corp BV (FORMERLY KNOWN AS GALACTIC REVENUE Ltd, NEUTILITY Corp, RPX Corp
US9760587B20.394Tool for managing computer resources and infrastructures and networksGRANT2017-09-122010-04-1643607915GoodF5 Networks IncF5 Networks Inc
US8849469B20.394Data center system that accommodates episodic computationGRANT2014-09-302010-10-2845997678GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20030110242A10.393Method and apparatus for dynamic reconfiguration of web services infrastructureAPPLICATION2003-06-122001-12-1121763572GoodInternational Business Machines CorpLinkedIn Corp
US8886777B20.393Moving enterprise software applications to a cloud domainGRANT2014-11-112010-08-2047598163GoodUnisys CorpUnisys Corp
US9288333B20.393Voice port utilization monitorGRANT2016-03-152008-12-0142222755GoodAT&T Intellectual Property I LPAT&T Intellectual Property I LP
US7596615B20.392Multi-server automated redundant service configurationGRANT2009-09-292006-02-2238429683GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8572229B20.392Distributed computingGRANT2013-10-292010-05-2845023159GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20100306773A10.392Instant on PlatformAPPLICATION2010-12-022006-11-0639512373GoodSplashtop IncSplashtop Inc
US20120072903A10.391MULTI-IMAGE MIGRATION SYSTEM AND METHODAPPLICATION2012-03-222010-09-2045818906GoodInternational Business Machines CorpInternational Business Machines Corp
US7127713B20.391Java application framework for use in a content delivery network (CDN)GRANT2006-10-242002-01-1123363875GoodAkamai Technologies IncAkamai Technologies Inc
US9268615B20.391Distributed computing using communitiesGRANT2016-02-232010-05-2845023003GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20120016778A10.390CONTROLLING CLOUD SERVICESAPPLICATION2012-01-192009-07-2843529583GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US10721282B20.389Media acceleration for virtual computing servicesGRANT2020-07-212008-04-1545990877GoodVMware IncVMware Inc
US8285864B20.389Service delivery system using intermediary application management subsystem for managing setup provisioning delivery and updating of servicesGRANT2012-10-092009-12-2144152665GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US9747287B10.389Method and system for managing metadata for a virtualization environmentGRANT2017-08-292011-08-1059653426GoodNutanix IncNutanix Inc
US8656167B20.389Systems and methods for secure workgroup management and communicationGRANT2014-02-182008-02-2240683120GoodSecurity First CorpSecurity First Corp
US20090106264A10.389STATUS PROCESSOR AND STATUS DISPLAY METHODAPPLICATION2009-04-232007-10-1840564524GoodBrother Industries LtdBrother Industries Ltd
US20130142201A10.389CONNECTING ON-PREMISE NETWORKS WITH PUBLIC CLOUDSAPPLICATION2013-06-062011-12-0248523968GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8769699B20.389Secure data parser method and systemGRANT2014-07-012004-10-2535912925GoodSecurity First CorpSecurity First Corp
US9009143B20.389Use of off-page content to enhance captions with additional relevant informationGRANT2015-04-142011-10-0347993606GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20110276490A10.388SECURITY SERVICE LEVEL AGREEMENTS WITH PUBLICLY VERIFIABLE PROOFS OF COMPLIANCEAPPLICATION2011-11-102010-05-0744902593GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20090083272A10.388Role-based user tracking in service usageAPPLICATION2009-03-262007-09-2040472808GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8010829B10.387Distributed hot-spare storage in a storage clusterGRANT2011-08-302005-10-2044486389GoodAmerican Megatrends Inc USAAmzetta Technologies LLC
US8428986B20.387Return on investment analysis tool for storage systemsGRANT2013-04-232010-07-3045527652GoodInternational Business Machines CorpInternational Business Machines Corp
US20070130305A10.387Maintaining session states within virtual machine environmentsAPPLICATION2007-06-072005-12-0237831691GoodInternational Business Machines CorpDaedalus Blue LLC
US20130219386A10.387DYNAMIC ALLOCATION OF COMPUTE RESOURCESAPPLICATION2013-08-222012-02-2148983373GoodDisney Enterprises IncDisney Enterprises Inc
US10536400B20.386Methods and apparatus related to virtualization of data center resourcesGRANT2020-01-142008-09-1141799243GoodJuniper Networks IncJuniper Networks Inc
US9122536B20.386Automating application provisioning for heterogeneous datacenter environmentsGRANT2015-09-012009-12-3044505896GoodBMC Software IncBMC Software Inc
US8953199B20.386Method and system to recommend an applicationGRANT2015-02-102011-01-3146577138GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20040205772A10.386Intelligent software agent system architectureAPPLICATION2004-10-142001-03-2133132198GoodIn2Gr8 IncIn2Gr8 Inc, Bot Inc, Tribridge Holdings LLC
US8204799B10.385System and method for combining fulfillment of customer orders from merchants in computer-facilitated marketplacesGRANT2012-06-192007-09-0746209610GoodAmazon Technologies IncAmazon Technologies Inc
US10235439B20.384Systems and methods for data warehousing in private cloud environmentGRANT2019-03-192010-07-0954702026GoodState Street CorpState Street Corp
US8638674B20.384System and method for cloud computingGRANT2014-01-282008-09-0841799195Good
US6003066A0.384System for distributing a plurality of threads associated with a process initiating by one data processing station among data processing stationsGRANT1999-12-141997-08-1425430206GoodInternational Business Machines CorpInternational Business Machines Corp
US8528100B20.384Software license reconciliation within a cloud computing infrastructureGRANT2013-09-032011-09-1747881956GoodInternational Business Machines CorpServiceNow Inc
US8560677B20.383Data center controlGRANT2013-10-152009-02-1344898158GoodSchneider Electric IT CorpSchneider Electric IT Corp
US9083652B20.383Crowd based content deliveryGRANT2015-07-142009-06-2548136749GoodFortinet IncFortinet Inc
US9712325B20.383Managing secure content in a content delivery networkGRANT2017-07-182009-09-0447780563GoodAmazon Technologies IncAmazon Technologies Inc
US8930896B10.382Data anonymity and separation for user computationGRANT2015-01-062010-07-2352117455GoodAmazon Technologies IncAmazon Technologies Inc
US20060174324A10.382Method and system for mitigating denial of service in a communication networkAPPLICATION2006-08-032005-01-2836570995GoodBroadcom CorpAvago Technologies General IP Singapore Pte Ltd
US10671628B20.381Systems and methods for data warehousingGRANT2020-06-022010-07-0967985276GoodState Street Bank and Trust Co NAState Street Bank and Trust Co NA
US9348633B20.381Multi-environment operating systemGRANT2016-05-242009-07-2043466064GoodGoogle Technology Holdings LLCGoogle Technology Holdings LLC
US8199911B10.381Secure encryption algorithm for data deduplication on untrusted storageGRANT2012-06-122008-03-3146177846GoodSymantec Operating CorpVeritas Technologies LLC
US9755988B20.381Method and system for arbitraging computer resources in a cloud computing environmentGRANT2017-09-052010-05-3045067253GoodSonian IncBarracuda Networks Inc
US9235447B20.380Extensible attribute summarizationGRANT2016-01-122011-03-0346753991GoodCisco Technology IncCisco Technology Inc
US8775946B20.380Resolving information in a multitenant database environmentGRANT2014-07-082010-05-0744902680GoodSalesforce com IncSalesforce com Inc
US8832156B20.380Distributed computing managementGRANT2014-09-092009-06-1543307271GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9699138B20.379Directing clients based on communication formatGRANT2017-07-042011-07-2948136927GoodFortinet IncFortinet Inc
US9519526B20.379File management system and collaboration service and integration capabilities with third party applicationsGRANT2016-12-132007-12-0540722725GoodBox IncBox Inc
US7949992B20.379Development of information technology systemGRANT2011-05-242006-06-2738874892GoodInternational Business Machines CorpRakuten Group Inc
US9978040B20.377Collaboration sessions in a workspace on a cloud-based content management systemGRANT2018-05-222011-07-0844534675GoodBox IncBox Inc
US8799888B10.377Updating an applicationGRANT2014-08-052011-05-2051229247GoodAmazon Technologies IncAmazon Technologies Inc
US10122787B20.377Method for the remote sharing of computer desktop(s)GRANT2018-11-062009-03-2541510453GoodSagemcom Broadband SASSagemcom Broadband SAS
US5197130A0.377CLUSTER ARCHITECTURE FOR A HIGHLY PARALLEL SCALAR/VECTOR MULTIPROCESSOR SYSTEMGRANT1993-03-231989-12-2923823339GoodSupercomputer Systems LPMorgan Stanley and Co LLC, Hewlett Packard Enterprise Development LP, IBM Holdings Inc
US8745372B20.376Systems and methods for securing data in motionGRANT2014-06-032009-11-2544115463GoodSecurity First CorpSecurity First Corp
US20110055859A10.375Systems and Methods for Providing Content To A Subscriber Through a Foreign Service Provider and For Facilitating The Subscriber Incurring a Fee For Viewing The ContentAPPLICATION2011-03-032009-09-0243302063GoodEricsson Television IncEricsson Television Inc
US8522147B20.374Methods for verifying person's identity through person's social circle using person's photographGRANT2013-08-272011-09-2047881843GoodGo Daddy Operating Co LLCGo Daddy Operating Co LLC
US8538065B20.374Systems for verifying person's identity through person's social circle using person's photographGRANT2013-09-172011-09-2047881844GoodGo Daddy Operating Co LLCGo Daddy Operating Co LLC
US8776036B20.374Determining support criteria for shared libraries based on their priority levelsGRANT2014-07-082010-11-2346065623GoodRed Hat IncRed Hat Inc
US20050060567A10.374Embedded system administrationAPPLICATION2005-03-172003-07-2134069921GoodSymbium Corp1229377 BC Ltd, Snow Software Inc
US9712484B10.373Managing request routing information utilizing client identifiersGRANT2017-07-182010-09-2859296410GoodAmazon Technologies IncAmazon Technologies Inc
US20080243634A10.373PROVIDING WEBSITE HOSTING OVERAGE PROTECTION BY TRANSFERENCE TO AN OVERFLOW SERVERAPPLICATION2008-10-022008-06-1039795937GoodGo Daddy Group IncGo Daddy Operating Co LLC
US9608957B20.373Request routing using network computing componentsGRANT2017-03-282008-06-3041448878GoodAmazon Technologies IncAmazon Technologies Inc
US6026475A0.373Method for dynamically remapping a virtual address to a physical address to maintain an even distribution of cache page addresses in a virtual address spaceGRANT2000-02-151997-11-2625526537GoodDigital Equipment CorpSamsung Electronics Co Ltd
US7177311B10.373System and method for routing traffic through a virtual router-based network switchGRANT2007-02-132002-06-0437719724GoodFortinet IncGoogle LLC
US10554748B20.372Content managementGRANT2020-02-042008-03-3141118746GoodAmazon Technologies IncAmazon Technologies Inc
US10402277B20.372Using a snapshot as a data sourceGRANT2019-09-032004-11-1542008261GoodCommvault Systems IncCommvault Systems Inc
US8751567B20.372Quantify and measure micro-blogging for enterprise resources planning (ERP)GRANT2014-06-102012-02-0948946555GoodOracle International CorpOracle International Corp
US8271757B10.371Container space management in a data storage systemGRANT2012-09-182007-04-1746800838GoodAmerican Megatrends Inc USAAmzetta Technologies LLC
US9544394B20.371Network resource identificationGRANT2017-01-102008-03-3149640895GoodAmazon Technologies IncAmazon Technologies Inc
US7925554B10.370Using configured application pricing to determine end user fees for use of invocable servicesGRANT2011-04-122006-12-2943837196GoodAmazon Technologies IncAmazon Technologies Inc
US8321551B20.369Using aggregated DNS information originating from multiple sources to detect anomalous DNS name resolutionsGRANT2012-11-272010-02-0244342591GoodSymantec CorpCAI Software LLC
US8775562B20.369Mapping file fragments to file information and tagging in a segmented file sharing systemGRANT2014-07-082006-12-0546328872GoodInternational Business Machines CorpDropbox Inc
US9621660B20.369Locality based content distributionGRANT2017-04-112008-03-3144169493GoodAmazon Technologies IncAmazon Technologies Inc
US6859841B20.369Programmable system for processing a partitioned network infrastructureGRANT2005-02-221998-06-1522265473GoodIntel CorpIntel Corp
US8595334B20.369Incrementally managing distributed configuration dataGRANT2013-11-262010-02-2244477418GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20130091183A10.368Volume ManagementAPPLICATION2013-04-112010-06-1545348466GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8990307B20.367Resource effective incremental updating of a remote client with events which occurred via a cloud-enabled platformGRANT2015-03-242011-11-1648281596GoodBox IncBox Inc
US8281143B10.367Protecting against chosen plaintext attacks in untrusted storage environments that support data deduplicationGRANT2012-10-022008-09-2946924879GoodSymantec Operating CorpVeritas Technologies LLC
US10853780B10.367Providing configurable pricing for use of invocable services by applicationsGRANT2020-12-012006-12-2973554538GoodAmazon Technologies IncAmazon Technologies Inc
US8935773B20.366Malware detectorGRANT2015-01-132009-04-0943899532GoodGeorge Mason Research Foundation IncGeorge Mason Research Foundation Inc
US20110167221A10.365System and method for efficiently creating off-site data volume back-upsAPPLICATION2011-07-072010-01-0644225384GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8560639B20.365Dynamic placement of replica dataGRANT2013-10-152009-04-2442993019GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9380127B20.364Distributed caching and cache analysisGRANT2016-06-282011-05-1847175775GoodAlibaba Group Holding LtdAlibaba Group Holding Ltd
US9141887B20.364Rendering permissions for rendering contentGRANT2015-09-222011-10-3148191471GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US10379957B20.363Systems and methods for analyzing snapshotsGRANT2019-08-132009-12-3144188688GoodCommvault Systems IncCommvault Systems Inc
US9396482B20.363Data usage plan associated with user deviceGRANT2016-07-192011-08-3147744984GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US9935836B20.362Exclusive IP zone support systems and methodGRANT2018-04-032011-04-0746966974GoodVeritas Technologies LLCVeritas Technologies LLC
US8869135B10.362Deploying updates to an application during periods of off-peak demandGRANT2014-10-212011-05-2051702481GoodAmazon Technologies IncAmazon Technologies Inc
US8850419B10.362Descaling computing resourcesGRANT2014-09-302011-05-2051588347GoodAmazon Technologies IncAmazon Technologies Inc
US20070088815A10.362Automated setup and test confirmation of dynamic DNS serviceAPPLICATION2007-04-192005-10-1337949382GoodBroadcom CorpAvago Technologies General IP Singapore Pte Ltd
US8316305B20.362Configuring a service based on manipulations of graphical representations of abstractions of resourcesGRANT2012-11-202009-07-3143528043GoodeBay IncPayPal Inc
US9129000B20.362Method and system for centralized control of database applicationsGRANT2015-09-082010-04-3044310317GoodInternational Business Machines CorpInternational Business Machines Corp
US8898178B20.360Solution monitoring systemGRANT2014-11-252011-12-1548611260GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10958501B10.359Request routing information based on client IP groupingsGRANT2021-03-232010-09-2874882690GoodAmazon Technologies IncAmazon Technologies Inc
US20030172145A10.359System and method for designing  developing and implementing internet service provider architecturesAPPLICATION2003-09-112002-03-1129553306GoodSun Microsystems IncSun Microsystems Inc
US8938706B20.358Providing customized visualization of application binary interface/application programming interface-related informationGRANT2015-01-202010-11-2346065639GoodRed Hat IncRed Hat Inc
US6675261B20.358Request based caching of data store dataGRANT2004-01-062000-12-2227401104GoodOblix IncOracle International Corp
US9009106B10.358Method and system for implementing writable snapshots in a virtualized storage environmentGRANT2015-04-142011-08-1052782354GoodNutanix IncNutanix Inc
US8621550B10.358Information technology resource compliance templatesGRANT2013-12-312007-09-2849776251GoodEMC CorpEMC Corp
US6275900B10.358Hybrid NUMA/S-COMA system and methodGRANT2001-08-141999-01-2722896910GoodInternational Business Machines CorpInternational Business Machines Corp
US9800539B20.357Request routing management based on network componentsGRANT2017-10-242010-09-2849487992GoodAmazon Technologies IncAmazon Technologies Inc
US9367331B20.357Multi-environment operating systemGRANT2016-06-142009-07-2043880188GoodGoogle Technology Holdings LLCGoogle Technology Holdings LLC
US10491534B20.357Managing resources and entries in tracking information in resource cache componentsGRANT2019-11-262009-03-2747989918GoodAmazon Technologies IncAmazon Technologies Inc
US9063818B10.356Automated software updating based on prior activityGRANT2015-06-232011-03-1653397123GoodGoogle LLCGoogle LLC
US9985927B20.356Managing content delivery network service providers by a content brokerGRANT2018-05-292008-11-1745572112GoodAmazon Technologies IncAmazon Technologies Inc
US9331979B20.356Facilitating content accessibility via different communication formatsGRANT2016-05-032011-07-2948136909GoodFortinet IncFortinet Inc
US20040030822A10.354Storage virtualization by layering virtual disk objects on a file systemAPPLICATION2004-02-122002-08-0931495057GoodNetApp IncNetApp Inc
US10951488B20.353Rule-based performance class access management for storage cluster performance guaranteesGRANT2021-03-162011-12-2749004521GoodNetApp IncNetApp Inc
US8261125B20.353Global write-log device for managing write logs of nodes of a cluster storage systemGRANT2012-09-042009-04-2944994425GoodNetApp IncNetApp Inc
US8849916B20.353Infrastructure management operational workflowsGRANT2014-09-302011-06-2647362912GoodInternational Business Machines CorpInternational Business Machines Corp
US9336500B20.353System and method for authorizing and connecting application developers and usersGRANT2016-05-102011-09-2147881120GoodTwilio IncTwilio Inc
US8086544B20.352Analysis of energy-related factors for selecting computational job locationsGRANT2011-12-272008-09-0341726768GoodInternational Business Machines CorpInternational Business Machines Corp
US20080282030A10.352DYNAMIC INPUT/OUTPUT OPTIMIZATION WITHIN A STORAGE CONTROLLERAPPLICATION2008-11-132007-05-1039587022GoodSeagate Cloud Systems CorpSeagate Cloud Systems Corp
US8639878B10.351Providing redundancy in a storage systemGRANT2014-01-282005-10-2044351605GoodAmerican Megatrends Inc USAAmzetta Technologies LLC
US8407335B10.351Log message archiving and processing using a remote internet infrastructureGRANT2013-03-262008-06-1847892426GoodAlert Logic IncAlert Logic Inc
US6516304B10.351System component charging and accounting systemGRANT2003-02-041998-03-0412897621GoodRicoh Co LtdRicoh Co Ltd
US9225610B20.350User interface providing information system topology presentationGRANT2015-12-292008-03-3140551493GoodHitachi LtdHitachi Ltd
US5802291A0.350System and method to control and administer distributed object servers using first class distributed objectsGRANT1998-09-011995-03-3023637082GoodSun Microsystems IncSun Microsystems Inc
US20110296001A10.350Privileged Activity Monitoring through Privileged User Password Management and Log Management SystemsAPPLICATION2011-12-012010-05-2845023029GoodCA IncCAI Software LLC
US10089190B20.350Efficient file browsing using key value databases for virtual backupsGRANT2018-10-022011-06-3054252674GoodEMC IP Holding Co LLCEMC Corp
US10911328B20.348Quality of service policy based load adaptionGRANT2021-02-022011-12-2749043487GoodNetApp IncNetApp Inc
US10539787B20.347Head-worn adaptive displayGRANT2020-01-212010-02-2846926738GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9341843B20.347See-through near-eye display glasses with a small scale image sourceGRANT2016-05-172010-02-2846828038GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9389877B20.347Multi-environment operating systemGRANT2016-07-122009-07-2043880258GoodGoogle Technology Holdings LLCGoogle Technology Holdings LLC
US9097890B20.347Grating in a light transmissive illumination system for see-through near-eye display glassesGRANT2015-08-042010-02-2846828037GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9223134B20.347Optical imperfections in a light transmissive illumination system for see-through near-eye display glassesGRANT2015-12-292010-02-2846828036GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20100228996A10.347Systems and Methods for Secure Transaction Management and Electronic Rights ProtectionAPPLICATION2010-09-091995-02-1323532729GoodIntertrust Technologies CorpIntertrust Technologies Corp
US8806520B20.347Method of collecting usage informationGRANT2014-08-122009-09-2643795268GoodMimik Technology IncMimik Technology Inc
US9128281B20.347Eyepiece with uniformly illuminated reflective displayGRANT2015-09-082010-09-1445870107GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9097891B20.346See-through near-eye display glasses including an auto-brightness control for the display brightness based on the brightness in the environmentGRANT2015-08-042010-02-2846876972GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9229227B20.346See-through near-eye display glasses with a light transmissive wedge shaped illumination systemGRANT2016-01-052010-02-2846828035GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9009239B10.346System  method  and computer program for providing access to a plurality of services through a unified applicationGRANT2015-04-142011-01-2752782370GoodAmdocs Software Systems LtdAmdocs Development Ltd, Amdocs Software Systems Ltd
US9182596B20.346See-through near-eye display glasses with the optical assembly including absorptive polarizers or anti-reflective coatings to reduce stray lightGRANT2015-11-102010-02-2846876984GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US10230819B20.346Translation of resource identifiers using popularity information upon client requestGRANT2019-03-122009-03-2748538513GoodAmazon Technologies IncAmazon Technologies Inc
US9134534B20.346See-through near-eye display glasses including a modular image sourceGRANT2015-09-152010-02-2846828091GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8805893B20.346Dynamic generation of a configuration fileGRANT2014-08-122012-02-0948946541GoodAdobe Systems IncAdobe Inc
US8055586B10.346Providing configurable use by applications of sequences of invocable servicesGRANT2011-11-082006-12-2944882592GoodAmazon Technologies IncAmazon Technologies Inc
US20020143945A10.346System for optimal resource allocation and planning for hosting computing servicesAPPLICATION2002-10-032001-01-2925094433GoodInternational Business Machines CorpInternational Business Machines Corp
US9129295B20.345See-through near-eye display glasses with a fast response photochromic film system for quick transition from dark to clearGRANT2015-09-082010-02-2846828047GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7614050B20.345Machine and method for deployment of OS imageGRANT2009-11-032004-03-3135055743GoodHitachi LtdHitachi Ltd
US9582776B20.345Methods and systems for providing a comprehensive view of it assets as self service inquiry/update transactionsGRANT2017-02-282009-10-0943855602GoodOracle International CorpOracle International Corp
US9366862B20.345System and method for delivering content to a group of see-through near eye display eyepiecesGRANT2016-06-142010-02-2846828092GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20110153751A10.345CONTENT MANAGEMENT SYSTEMS AND METHODSAPPLICATION2011-06-232009-12-1843836991GoodOmacro IncOmacro Inc
US10180572B20.345AR glasses with event and user action control of external applicationsGRANT2019-01-152010-02-2846576930GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9759917B20.344AR glasses with event and sensor triggered AR eyepiece interface to external devicesGRANT2017-09-122010-02-2846636487GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9285589B20.344AR glasses with event and sensor triggered control of AR eyepiece applicationsGRANT2016-03-152010-02-2846652312GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7574471B20.344System and method for exchanging information with a relationship management systemGRANT2009-08-112004-09-0236036902GoodGryphon Networks CorpGryphon Networks, Gryphon Networks Corp
US10264062B20.343Request routing using a popularity identifier to identify a cache componentGRANT2019-04-162009-03-2750896923GoodAmazon Technologies IncAmazon Technologies Inc
US20030061404A10.343Web services gatewayAPPLICATION2003-03-272001-09-2123262495GoodCorel CorpCorel Corp, JPMorgan Chase Bank NA
US9372711B20.343System and method for initiating a multi-environment operating systemGRANT2016-06-212009-07-2043466066GoodGoogle Technology Holdings LLCGoogle Technology Holdings LLC
US20090288082A10.342SYSTEM AND METHOD FOR PERFORMING DESIGNATED SERVICE IMAGE PROCESSING FUNCTIONS IN A SERVICE IMAGE WAREHOUSEAPPLICATION2009-11-192008-05-1941317375GoodMicro Focus Software IncMicro Focus Software Inc
US8010725B20.342Access right managing method for accessing multiple programsGRANT2011-08-302006-10-1039275860GoodHitachi LtdHitachi Ltd
US8983966B20.342Method and system to monitor a diverse heterogeneous application environmentGRANT2015-03-172004-02-2744973340GoodeBay InceBay Inc
US8875149B20.341Product-specific system resource allocation within a single operating system instanceGRANT2014-10-282011-06-1447354829GoodInternational Business Machines CorpInternational Business Machines Corp
US20120011077A10.340Cloud Computing Governance  Cyber Security  Risk  and Compliance Business Rules System and MethodAPPLICATION2012-01-122010-07-1245439297Good
US9893957B20.340Forward-based resource delivery network management techniquesGRANT2018-02-132009-10-0248146163GoodAmazon Technologies IncAmazon Technologies Inc
US20110235592A10.339NETWORK RESOURCE LEASINGAPPLICATION2011-09-292010-03-2644170187GoodQualcomm IncQualcomm Inc
US8479304B10.339Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data deduplicationGRANT2013-07-022009-03-3148671376GoodSymantec CorpVeritas Technologies LLC
US9787775B10.339Point of presence management in request routingGRANT2017-10-102010-09-2859981477GoodAmazon Technologies IncAmazon Technologies Inc
US9590946B20.338Managing content delivery network service providersGRANT2017-03-072008-11-1748999881GoodAmazon Technologies IncAmazon Technologies Inc
US10860100B20.338AR glasses with predictive control of external device based on event inputGRANT2020-12-082010-02-2854334627GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9311327B10.338Updating key value databases for virtual backupsGRANT2016-04-122011-06-3055525843GoodEMC CorpEMC Corp
US9491309B20.338System and method for running a multi-module telephony applicationGRANT2016-11-082009-10-0750187627GoodTwilio IncTwilio Inc
US20040098302A10.337Method and system for offering advertising servicesAPPLICATION2004-05-202002-11-1432296909GoodKanoodle com Inc680 Media Inc
US8327186B20.337Takeover of a failed node of a cluster storage system on a per aggregate basisGRANT2012-12-042009-03-1042730624GoodNetApp IncNetApp Inc
US9141947B10.336Differential bandwidth metering for networks with direct peeringsGRANT2015-09-222011-12-1954107099GoodAmazon Technologies IncAmazon Technologies Inc
US9229951B10.336Key value databases for virtual backupsGRANT2016-01-052011-06-3054939193GoodEMC CorpEMC Corp
US9456008B20.336System and method for processing telephony sessionsGRANT2016-09-272008-04-0248426883GoodTwilio IncTwilio Inc
US8260924B20.335User load balancing systems and methods thereofGRANT2012-09-042006-05-0338662399GoodBlueTie IncBlueTie Inc
US10157135B20.335Cache optimizationGRANT2018-12-182008-03-3141118678GoodAmazon Technologies IncAmazon Technologies Inc
US6944168B20.334System and method for providing transformation of multi-protocol packets in a data streamGRANT2005-09-132001-05-0425306562GoodSLT Logic LLCRPX Corp
US8814691B20.334System and method for social networking gaming with an augmented realityGRANT2014-08-262010-02-2844505790GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20050193093A10.334Profile and consent accrualAPPLICATION2005-09-012004-02-2334886636GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8498967B10.334Two-node high availability cluster storage solution using an intelligent initiator to avoid split brain syndromeGRANT2013-07-302007-01-3048808742GoodAmerican Megatrends Inc USAAmzetta Technologies LLC
US10225322B20.334Point of presence management in request routingGRANT2019-03-052010-09-2848578240GoodAmazon Technologies IncAmazon Technologies Inc
US20020077986A10.333Controlling and managing digital assetsAPPLICATION2002-06-202000-07-1427499104GoodAtabok Japan IncAtabok Japan Inc
US10015237B20.333Point of presence management in request routingGRANT2018-07-032010-09-2852745271GoodAmazon Technologies IncAmazon Technologies Inc
US8825861B20.333System management operational workflow templatesGRANT2014-09-022011-06-2647362913GoodInternational Business Machines CorpInternational Business Machines Corp
US10790058B20.333User installed applications in a physiological parameter display deviceGRANT2020-09-292010-08-1745605368GoodWelch Allyn IncWelch Allyn Inc
US20080133578A10.331SYSTEM  METHOD  AND COMPUTER PROGRAM PRODUCT FOR TRANSFERRING REMOTE DEVICE SUPPORT DATA TO A MONITOR USING E-MAILAPPLICATION2008-06-052001-09-1725493867Good
US8065273B20.330Automated priority restoresGRANT2011-11-222006-05-1038832601GoodEMC CorpEMC Corp
US8893113B10.330Simultaneous operation of a networked device using multiptle disparate networksGRANT2014-11-182010-06-1451870313GoodOpen Invention Network LLCOpen Invention Network LLC
US9571389B20.330Request routing based on classGRANT2017-02-142008-03-3141118745GoodAmazon Technologies IncAmazon Technologies Inc
US9455949B20.329Method for processing telephony sessions of a networkGRANT2016-09-272011-02-0446600595GoodTwilio IncTwilio Inc
US9954934B20.328Content delivery reconciliationGRANT2018-04-242008-03-3148365435GoodAmazon Technologies IncAmazon Technologies Inc
US7966266B20.327Methods and systems for cost estimation based on templatesGRANT2011-06-212006-05-0538713123GoodSAP SE SAP SE
US8549113B20.327Transactional independent persister cloning systemGRANT2013-10-012011-01-2746578307GoodInternational Business Machines CorpInternational Business Machines Corp
US5692192A0.327Load distribution method and system for distributed threaded task operation in network information processing apparatuses with virtual shared memoryGRANT1997-11-251994-07-1915838352GoodCanon IncCanon Inc
US20080082769A10.327Mass storage system and methodAPPLICATION2008-04-032006-10-0337963435GoodBull SA, LES CLAYES SOUS BOIS FRANCEBull SA, LES CLAYES SOUS BOIS FRANCE
US20100191936A10.327Method and system for operating-system-independent power management using performance verificationsAPPLICATION2010-07-292009-01-2342355094GoodDell Products LPDell Products LP
US10027582B20.325Updating routing information based on client locationGRANT2018-07-172007-06-2942172850GoodAmazon Technologies IncAmazon Technologies Inc
US20110099095A10.325PROCESSING INTERNAL USE OF DATA-CENTER RESOURCESAPPLICATION2011-04-282009-10-2843899210GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9398622B20.325System and method for connecting a communication to a clientGRANT2016-07-192011-05-2347217709GoodTwilio IncTwilio Inc
US9992303B20.324Request routing utilizing client location informationGRANT2018-06-052007-06-2942172849GoodAmazon Technologies IncAmazon Technologies Inc
US7558843B20.324Phased rollout of version upgrades in web-based business information systemsGRANT2009-07-072004-07-1235542476GoodNetSuite IncNetSuite Inc
US20100115490A10.324Automated Lifecycle Management of a Computer Implemented ServiceAPPLICATION2010-05-062008-10-3042133041GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8380736B20.324De-duplication in billing systemGRANT2013-02-192010-05-2144973345GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7792991B20.324Method and apparatus for advertising a link cost in a data communications networkGRANT2010-09-072002-12-1732507313GoodCisco Technology IncCisco Technology Inc
US20110087604A10.324MICRO-BLOGGING FOR ENTERPRISE RESOURCES PLANNING (ERP)APPLICATION2011-04-142009-10-0943855605GoodOracle International CorpOracle International Corp
US9787599B20.323Managing content delivery network service providersGRANT2017-10-102008-11-1745034504GoodAmazon Technologies IncAmazon Technologies Inc
US9082091B20.323Unified user login for co-location facilitiesGRANT2015-07-142009-12-1044144071GoodEquinix IncEquinix Inc
US8725997B20.323Self-provisioning of configuration for a specific-purpose client having a windows-based embedded image with a write-filterGRANT2014-05-132011-01-2746578391GoodWyse Technology LLCWyse Technology LLC
US20060123195A10.323Optionally pushing I/O data into a processor's cacheAPPLICATION2006-06-082004-12-0636575728GoodIntel CorpIntel Corp
US20050228984A10.322Web service gateway filteringAPPLICATION2005-10-132004-04-0735061903GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20120203882A10.322MANAGEMENT APPARATUS AND MANAGEMENT METHODAPPLICATION2012-08-092011-02-0346601429GoodCanon IncCanon Inc
US8938524B20.322Comparing and provisioning configurations for a client having a windows-based embedded imageGRANT2015-01-202011-01-2746578445GoodWyse Technology LLCWyse Technology LLC
US8898078B20.322Scalable billing with de-duplication in aggregatorGRANT2014-11-252010-05-2144973273GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20070288526A10.322Method and apparatus for processing a database replicaAPPLICATION2007-12-132006-06-0838823174GoodEMC CorpEMC Corp
US7085897B20.322Memory management for a symmetric multiprocessor computer systemGRANT2006-08-012003-05-1233417174GoodInternational Business Machines CorpInternational Business Machines Corp
US8825990B20.320Configuring and customizing a specific-purpose client having a windows-based embedded image using extensible markup language (XML) configurationGRANT2014-09-022011-01-2746578395GoodWyse Technology LLCWyse Technology LLC
US9292533B20.320Systems and methods for improving storage efficiency in an information handling systemGRANT2016-03-222010-06-0845065272GoodDell Products LPDell Products LP
US20130232254A10.320CLOUD RESOURCE UTILIZATION MANAGEMENTAPPLICATION2013-09-052012-03-0249043484GoodComputenext IncClictell LLC
US8595455B20.320Maintaining data consistency in mirrored cluster storage systems using bitmap write-intent loggingGRANT2013-11-262007-01-3044801475GoodAmerican Megatrends Inc USAAmzetta Technologies LLC
US8863108B20.320Finding out if software will run on an operating system without installing that softwareGRANT2014-10-142010-11-2346065640GoodRed Hat IncRed Hat Inc
US7085890B20.319Memory mapping to reduce cache conflicts in multiprocessor systemsGRANT2006-08-012004-02-1934861014GoodInternational Business Machines CorpInternational Business Machines Corp
US8176114B20.319Distributed cross-application server deploymentGRANT2012-05-082008-02-2841013996GoodOracle International CorpOracle International Corp
US7313142B20.319Packet processing deviceGRANT2007-12-252002-06-0729706780GoodFujitsu LtdFujitsu Ltd
US8140681B20.319Decentralized application placement for web application middlewareGRANT2012-03-202006-01-3138323417GoodInternational Business Machines CorpInternational Business Machines Corp
US10162753B20.318Managing resources using resource expiration dataGRANT2018-12-252009-06-1649181585GoodAmazon Technologies IncAmazon Technologies Inc
US9037633B20.318Transferring configuration data from a public cloud server and applying onto a mobile clientGRANT2015-05-192011-01-2746578275GoodWyse Technology LLCWyse Technology LLC
US20090132698A10.318System and Method for Automatic Configuration and Management of Home Network DevicesAPPLICATION2009-05-212007-10-1240549632GoodPie Digital IncPie Digital Inc
US20130318152A10.317METHOD AND SYSTEM FOR EXCHANGING INFORMATION BETWEEN BACK-END AND FRONT-END SYSTEMSAPPLICATION2013-11-282011-05-0449622429GoodAPPSFREEDOM IncAPPSFREEDOM Inc
US8751778B20.317Generating  validating and applying custom extensible markup language (XML) configuration on a client having a windows-based embedded imageGRANT2014-06-102011-01-2746578392GoodWyse Technology LLCWyse Technology LLC
US6947982B10.317Distributed session servicesGRANT2005-09-201999-10-1126855334GoodI2 Technologies IncBlue Yonder Group Inc
US20020120554A10.317Auction  imagery and retaining engine systems for services and service providersAPPLICATION2002-08-292001-02-2825167875Good
US8954557B20.316Assigning server categories to server nodes in a heterogeneous clusterGRANT2015-02-102012-02-2148983204GoodOracle International CorpOracle International Corp
US9734472B20.316Request routing utilizing cost informationGRANT2017-08-152008-11-1750692373GoodAmazon Technologies IncAmazon Technologies Inc
US20060184741A10.316Method  apparatus  and computer program product for sharing data in a cache among threads in an SMT processorAPPLICATION2006-08-172005-02-1136816971GoodInternational Business Machines CorpGoogle LLC
US6219654B10.316Method  system and program product for performing cost analysis of an information technology implementationGRANT2001-04-171998-11-0222675026GoodInternational Business Machines CorpServiceNow Inc
US9306982B20.316System and method for processing media requests during telephony sessionsGRANT2016-04-052008-04-0241133221GoodTwilio IncTwilio Inc
US20110258317A10.315APPLICATION SLA BASED DYNAMIC  ELASTIC  AND ADAPTIVE PROVISIONING OF NETWORK CAPACITYAPPLICATION2011-10-202010-04-1944789052GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9354900B20.314Method and apparatus for presenting a window in a system having two operating system environmentsGRANT2016-05-312011-04-2846086045GoodGoogle Technology Holdings LLCGoogle Technology Holdings LLC
US8935366B20.314Hybrid distributed and cloud backup architectureGRANT2015-01-132009-04-2442993140GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20060101116A10.314Multifunctional telephone  walkie talkie  instant messenger  video-phone computer  based on WiFi (Wireless Fidelity) and WiMax technology  for establishing global wireless communication  network and video conferencing via the internetAPPLICATION2006-05-112004-10-2836317629Good
US20070294319A10.314Method and apparatus for processing a database replicaAPPLICATION2007-12-202006-06-0838862765GoodEMC CorpEMC Corp
US8495183B20.314State-based provisioning of a client having a windows-based embedded imageGRANT2013-07-232011-01-2746578274GoodWyse Technology LLCWyse Technology LLC
US6831893B10.313Apparatus and method for wire-speed classification and pre-processing of data packets in a full duplex networkGRANT2004-12-142000-04-0333490802GoodP Cube LtdCisco Systems Israel Ltd
US8560818B20.313Automatic retrieval  parsing and application of configuration for a specific-purpose client having a windows-based embedded image with a write-filterGRANT2013-10-152011-01-2746578396GoodWyse Technology LLCWyse Technology LLC
US8549125B20.313Environmentally sustainable computing in a distributed computer networkGRANT2013-10-012010-03-1144560980GoodInternational Business Machines CorpInternational Business Machines Corp
US20130282737A10.313METHOD AND APPARATUS FOR INTELLIGENTLY DEPLOYING AN APPLICATION  METHOD AND APPARATUS FOR PROCESSING APPLICATION ACCESS  SYSTEM FOR INTELLIGENTLY DEPLOYING AND SCHEDULING AN APPLICATIONAPPLICATION2013-10-242010-12-2045066138GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US9684739B10.312View generator for managing data storageGRANT2017-06-202006-05-1159034390GoodEMC IP Holding Co LLCEMC Corp
US6021492A0.311Software metering management of remote computing devicesGRANT2000-02-011996-10-0924925055GoodHewlett Packard CoHewlett Packard Enterprise Development LP
US20110047040A10.311ALIAS IDENTITY AND REPUTATION VALIDATION ENGINEAPPLICATION2011-02-242009-08-2443606053GoodVisa International Service AssociationVisa International Service Association
US20100094999A10.311LIMITING SIMULTANEOUS DATA TRANSFERS AND EFFICIENT THROTTLE MANAGEMENTAPPLICATION2010-04-152008-10-1042099906GoodNetApp IncNetApp Inc
US7991764B20.310Method and system for communication  publishing  searching  sharing and dynamically providing a journal feedGRANT2011-08-022005-07-2238006298GoodOnepatont Software LtdOnepatont Software Ltd
US20020166117A10.310Method system and apparatus for providing pay-per-use distributed computing resourcesAPPLICATION2002-11-072000-09-1226925642GoodEjasent IncClouding Corp
US20110265009A10.309TERMINAL SERVICES VIEW TOOLBOXAPPLICATION2011-10-272010-04-2744816836GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20110321117A10.309Policy Creation Using Dynamic Access ControlsAPPLICATION2011-12-292010-06-2344117943GoodITT Manufacturing Enterprises LLCExelis Inc
US8910151B20.309Managing remote install of software componentsGRANT2014-12-092007-06-1140983550GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US10394758B20.308File deletion detection in key value databases for virtual backupsGRANT2019-08-272011-06-3051588269GoodEMC IP Holding Co LLCEMC Corp
US20030037154A10.308Protocol processorAPPLICATION2003-02-202001-08-1625460831GoodSun Microsystems IncSun Microsystems Inc
US20130007402A10.308SYSTEMS AND METHODS FOR STORAGE MODELING AND COSTINGAPPLICATION2013-01-032004-04-3035320870GoodCommvault Systems IncCommvault Systems Inc
US8706881B20.308Automatic registration of enterprise resources in a dynamic module system services registryGRANT2014-04-222011-03-2246878262GoodOracle International CorpOracle International Corp
US20120136966A10.308Background File Sharing in a Segmented Peer-to-Peer Sharing NetworkAPPLICATION2012-05-312006-12-0539529813GoodInternational Business Machines CorpDropbox Inc
US20080034193A10.307System and Method for Providing a Mediated External Exception Extension for a MicroprocessorAPPLICATION2008-02-072006-08-0439030647GoodInternational Business Machines CorpInternational Business Machines Corp
US20130246600A10.305COMMUNICATION SERVICE PROVIDING SYSTEM  METHOD OF PROVIDING COMMUNICATION SERVICE AND DATA CENTER MANAGEMENT SYSTEMAPPLICATION2013-09-192010-12-0846206815GoodNEC CorpNEC Corp
US7716275B10.304Method and system for implementing shared quotasGRANT2010-05-112004-08-3142139447GoodSymantec Operating CorpVeritas Technologies LLC
US20060288115A10.304A System and Method for transferring a website from one web host to anotherAPPLICATION2006-12-212005-06-0137574683Good
US8656350B20.303Event-based process configurationGRANT2014-02-182007-02-0639682367GoodSoftware AGSoftware AG
US6880157B10.303System and method of providing a virtual applianceGRANT2005-04-121999-04-0547221606GoodGateway IncGateway Inc
US20110072073A10.303SYSTEMS AND METHODS FOR FORMATTING MEDIA CONTENT FOR DISTRIBUTIONAPPLICATION2011-03-242009-09-2143757544GoodSling Media LLCSling Media LLC
US20050228856A10.302Distributed on-demand computing systemAPPLICATION2005-10-131999-11-2237532758GoodSpeedera Networks IncAkamai Technologies Inc
US8839254B20.301Precomputation for data center load balancingGRANT2014-09-162009-06-2643382233GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8521777B20.300Methods and apparatus for presentation of software as a service applicationsGRANT2013-08-272010-06-1645329616GoodRicoh Co LtdRicoh Co Ltd
US20120240096A10.299OPEN SOURCE MANAGEMENT SYSTEM AND METHODAPPLICATION2012-09-202011-03-2046829516GoodWHITE SOURCE LtdWHITE SOURCE Ltd
US20030126200A10.298Dynamic load balancing of a network of client and server computerAPPLICATION2003-07-031996-08-0246280600GoodHewlett Packard Enterprise Development LPHewlett Packard Enterprise Development LP
US9424540B20.297Identifying service oriented architecture shared service opportunitiesGRANT2016-08-232009-04-2943031072GoodInternational Business Machines CorpInternational Business Machines Corp
US20060165040A10.296System  method  computer program products  standards  SOA infrastructure  search algorithm and a business method thereof for AI enabled information communication and computation (ICC) framework (NetAlter) operated by NetAlter Operating System (NOS) in terms of NetAlter Service Browser (NSB) to device alternative to internet and enterprise & social communication framework engrossing universally distributed grid supercomputing and peer to peer frameworkAPPLICATION2006-07-272004-11-3036696662GoodNETALTER SOFTWARE LtdNETALTER SOFTWARE Ltd
US20060020525A10.295System and method for providing access to network servicesAPPLICATION2006-01-262001-11-1935658431GoodCSG Systems IncCSG Systems Inc
US20050086197A10.295System and method securing web servicesAPPLICATION2005-04-212003-09-3034421549GoodLayer 7 Technologies IncCAI Software LLC
US10212074B20.294Level of hierarchy in MST for traffic localization and load balancingGRANT2019-02-192011-06-2447361755GoodCisco Technology IncCisco Technology Inc
US20130046894A10.294MODEL-DRIVEN REST CONSUMPTION FRAMEWORKAPPLICATION2013-02-212011-08-1847713466GoodSAP SE SAP SE
US9047282B20.294Document management systems  apparatuses and methods configured to provide user interface customized for specific userGRANT2015-06-022010-03-1144561104GoodRicoh Co LtdRicoh Co Ltd
US20030033344A10.294Method and apparatus for suspending a software virtual machineAPPLICATION2003-02-132001-08-069919829GoodInternational Business Machines CorpInternational Business Machines Corp
US20110208843A10.293Method and Arrangement for Improved Configuration of a Network DeviceAPPLICATION2011-08-252008-11-0542153077GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US10796368B20.293Electronic data insurance management system and methodGRANT2020-10-062011-12-0745418807GoodCyber Indemnity Solutions LtdData Insurance Holdings Ltd, Cyber Indemnity Solutions Ltd
US9548904B20.293Visualization for managing multiple IP address management systemsGRANT2017-01-172011-12-2250635775GoodInfoblox IncInfoblox Inc
US9009786B10.293Systems and methods for providing a persistent stateGRANT2015-04-142010-10-1352782421GoodUnited Services Automobile Association USAAUnited Services Automobile Association USAA
US20090016215A10.292SYSTEM AND METHOD FOR BALANCING IP GATEWAY SERVICESAPPLICATION2009-01-152007-07-1040101129GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6477643B10.292Process for automatic dynamic reloading of data flow processors (dfps) and units with two-or-three-dimensional programmable cell architectures (fpgas  dpgas  and the like)GRANT2002-11-051996-12-2726032900GoodPACT GmbHScientia Sol Mentis AG
US20090307166A10.290METHOD AND SYSTEM FOR AUTOMATED INTEGRATED SERVER-NETWORK-STORAGE DISASTER RECOVERY PLANNINGAPPLICATION2009-12-102008-06-0541401193GoodInternational Business Machines CorpDaedalus Blue LLC
US8244999B10.290Maintaining data consistency in mirrored cluster storage systems with write-back cacheGRANT2012-08-142007-01-3043708229GoodAmerican Megatrends Inc USAAmzetta Technologies LLC
US20030105884A10.290System and method for using Web services with an enterprise systemAPPLICATION2003-06-052001-10-1826995469GoodBEA Systems IncOracle International Corp
US6199165B10.289Method and apparatus for secure data communicationGRANT2001-03-061997-04-018230115GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6757731B10.289Apparatus and method for interfacing multiple protocol stacks in a communication networkGRANT2004-06-291999-02-2526819656GoodNortel Networks LtdRPX Clearinghouse LLC
US20130159867A10.288APPROACH FOR MANAGING PACKAGE-BASED SUBSCRIPTIONS FOR SERVICE PROVIDERSAPPLICATION2013-06-202011-12-1648611542GoodRicoh Co LtdRicoh Co Ltd
US20070150480A10.288Service delivery platformAPPLICATION2007-06-282005-04-1137450628GoodAccenture Global Services GmbHAccenture Global Services Ltd
US20080065677A10.288ANALYZING WEB SITE TRAFFICAPPLICATION2008-03-132006-09-1239171047GoodInternational Business Machines CorpInternational Business Machines Corp
US20040220952A10.287Web service gateway generationAPPLICATION2004-11-042002-08-2931981110GoodBEA Systems IncBEA Systems Inc
US20100146119A10.287GENERATING DOMAIN NAMES RELEVANT TO CURRENT EVENTSAPPLICATION2010-06-102008-12-0442232307GoodGo Daddy Group IncGo Daddy Operating Co LLC
US20100281095A10.287Mobile grid computingAPPLICATION2010-11-042009-04-2143011390GoodECOFLOPS LLCECOFLOPS LLC
US8015423B10.286Temporally normalized processor utilizationGRANT2011-09-062008-10-3044513673GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20060265706A10.285System for creating a customized software installation on demandAPPLICATION2006-11-232005-05-1936976828GoodMicro Focus Software IncOracle International Corp
US8661410B20.285Managed enterprise software components as dynamic servicesGRANT2014-02-252011-03-1146797222GoodOracle International CorpOracle International Corp
US8407685B20.285Systems and methods for generating ordered download selections based on usage informationGRANT2013-03-262008-02-1540956357GoodRed Hat IncRed Hat Inc
US9357047B20.284Method and system for a multitenancy telephone networkGRANT2016-05-312009-03-0242709985GoodTwilio IncTwilio Inc
US20080082569A10.283Smart Integration Engine And Metadata-Oriented Architecture For Automatic EII And Business IntegrationAPPLICATION2008-04-032006-08-1139033388GoodBizwheel LtdBizwheel Ltd
US8856734B20.283Type-safe dependency injection of services into enterprise componentsGRANT2014-10-072011-03-1146797220GoodOracle International CorpOracle International Corp
US20100290422A10.282VIRTUALIZED APPLICATION ACCELERATION INFRASTRUCTUREAPPLICATION2010-11-182007-10-0340523186GoodVirtela Communications IncNTT Global Networks Inc
US8239622B20.281Data storage array scaling method and system with minimal data movementGRANT2012-08-072007-05-0139940392GoodInternational Business Machines CorpWestern Digital Technologies Inc
US20040030740A10.281Method and system for automating generation of web services from existing service componentsAPPLICATION2004-02-122002-08-0931494894GoodSun Microsystems IncOracle America Inc
US9069881B20.281Adaptation of probing frequency for resource consumptionGRANT2015-06-302012-01-0947602385GoodInternational Business Machines CorpInternational Business Machines Corp
US20070038516A10.281Systems  methods  and computer program products for enabling an advertiser to measure user viewing of and response to an advertisementAPPLICATION2007-02-152005-08-1337743685GoodAdstreams ROI IncAdstreams ROI Inc
US9590915B20.281Transmission of Map/Reduce data in a data centerGRANT2017-03-072010-03-3143927896GoodInternational Business Machines CorpInternational Business Machines Corp
US9535563B20.281Internet appliance system and methodGRANT2017-01-031999-02-0146323947GoodBlanding Hovenweep LLCHOFFBERG FAMILY TRUST 1, STEVEN M HOFFBERG 2004-1 GRAT, Blanding Hovenweep LLC
US20090150995A10.279METHODS AND SYSTEMS FOR PROVIDING WEBSITE HOSTING SECURITYAPPLICATION2009-06-112007-12-1040723103GoodMastercard International IncMastercard International Inc
US20080147812A10.279Communications SystemAPPLICATION2008-06-192006-12-0639528914GoodVERTICAL BUSINESS SOLUTIONS Pty LtdVERTICAL BUSINESS SOLUTIONS Pty Ltd
US20130232191A10.279Multi-Application Cloud Storage Platform and Cloud Storage TerminalAPPLICATION2013-09-052012-03-0246622808GoodNetac Technology Co LtdNetac Technology Co Ltd
US6038651A0.278SMP clusters with remote resource managers for distributing work to other clusters while reducing bus traffic to a minimumGRANT2000-03-141998-03-2321943414GoodInternational Business Machines CorpInternational Business Machines Corp
US9009234B20.278Complex event processing system having multiple redundant event processing enginesGRANT2015-04-142007-02-0639677081GoodSoftware AGSoftware AG
US8918221B20.277Analytics for consumer power consumptionGRANT2014-12-232010-01-2542212235GoodAccenture Global Services LtdAccenture Global Services Ltd
US9407597B20.277Telephony web event system and methodGRANT2016-08-022008-10-0142073896GoodTwilio IncTwilio Inc
US20060253365A10.276System facilitating communications and financial contributions involving facilities and residents thereofAPPLICATION2006-11-092003-04-0333299703GoodTL CONTACT IncCAREPAGES Inc
US20120124204A10.276APPLICATION INFRASTRUCTURE PLATFORM (AIP)APPLICATION2012-05-172001-12-2026825913GoodVerizon Corporate Services Group IncVerizon Corporate Services Group Inc, Verizon Patent and Licensing Inc
US9747128B10.276Worldwide distributed file system modelGRANT2017-08-292011-12-2159653550GoodEMC IP Holding Co LLCEMC Corp
US20050076132A10.275Command center and interface for web based business merchandising and serviceAPPLICATION2005-04-072003-09-1934396211GoodYahoo IncVerizon Media Inc
US20110161723A10.275DISASTER RECOVERY USING LOCAL AND CLOUD SPANNING DEDUPLICATED STORAGE SYSTEMAPPLICATION2011-06-302009-12-2844188686GoodRiverbed Technology IncRiverbed Technology Inc
US9495227B20.272System and method for managing concurrent eventsGRANT2016-11-152012-02-1048946758GoodTwilio IncTwilio Inc
US20020049749A10.271Method and apparatus for a business applications server management system platformAPPLICATION2002-04-252000-01-1422643206GoodSaba Software IncSaba Software Inc
US8276115B20.270Automated construction and deployment of complex event processing applications and business activity monitoring dashboardsGRANT2012-09-252007-02-0639717213GoodProgress Software CorpSoftware AG
US5283899A0.270First-in/first-out buffer queue management for multiple processesGRANT1994-02-011990-02-1323906965GoodInternational Business Machines CorpInternational Business Machines Corp
US20060282825A10.270System  method and program for estimating a requisite amount of server resourcesAPPLICATION2006-12-142005-06-1037525521GoodInternational Business Machines CorpLinkedIn Corp
US20060265702A10.270System for creating a customized software distribution based on user requirementsAPPLICATION2006-11-232005-05-1936499049GoodMicro Focus Software IncMicro Focus Software Inc
US20120004925A10.268HEALTH CARE POLICY DEVELOPMENT AND EXECUTIONAPPLICATION2012-01-052010-06-3045400348GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7664712B10.268Method and system for impact analysis using a data modelGRANT2010-02-162005-08-0541665886GoodTroux TechnologySquare 1 Bank
US20060143401A10.267Method and apparatus for prefetching based on cache fill buffer hitsAPPLICATION2006-06-292004-12-2736613137GoodIntel CorpIntel Corp
US6996674B20.266Method and apparatus for a global cache directory in a storage clusterGRANT2006-02-072001-05-0725310796GoodInternational Business Machines CorpInternational Business Machines Corp
US20070094375A10.266Dynamic Server Consolidation and Rationalization Modeling ToolAPPLICATION2007-04-262005-10-2437491754GoodACCENTURE, Accenture Global Services GmbHAccenture Global Services Ltd
US20060268741A10.265System and method for providing automatic load balancing and redundancy in access port adoptionAPPLICATION2006-11-302005-05-2637054546GoodSymbol Technologies LLCExtreme Networks Inc
US7849202B20.264System and method for tracking unique visitors to a websiteGRANT2010-12-072002-05-0629273129GoodUrchin Software CorpGoogle LLC
US20120278747A10.264METHOD AND APPARATUS FOR USER INTERFACE IN A SYSTEM HAVING TWO OPERATING SYSTEM ENVIRONMENTSAPPLICATION2012-11-012011-04-2846085176GoodMotorola Mobility LLCGoogle Technology Holdings LLC
US20040260628A10.263Hosted audit serviceAPPLICATION2004-12-232003-06-1733517348GoodOracle International CorpOracle International Corp
US20060235859A10.262Prescriptive architecutre recommendationsAPPLICATION2006-10-192005-04-1537109779GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6714960B10.261Earnings-based time-share schedulingGRANT2004-03-301996-11-2031994638GoodSilicon Graphics IncLG Electronics Inc, Morgan Stanley and Co LLC
US9128981B10.260Phone assisted ‘photographic memory’GRANT2015-09-082008-07-2954012582GoodMimzi LLCMimzi LLC
US20150040238A10.259METHOD AND DEVICE FOR IMPROVING SUBSCRIBERS PRIVACY IN IP COMMUNICATIONS NETWORKSAPPLICATION2015-02-052012-03-0547683779GoodAlcatel Lucent SASProvenance Asset Group LLC, Nokia USA Inc
US9967224B20.259System and method for enabling real-time eventingGRANT2018-05-082010-06-2545353563GoodTwilio IncTwilio Inc
US8966110B20.258Dynamic bandwidth throttlingGRANT2015-02-242009-09-1443731574GoodInternational Business Machines CorpInternational Business Machines Corp
US20030074286A10.257Intelligent network charging edgeAPPLICATION2003-04-172001-10-1225524579GoodNokia OyjProvenance Asset Group LLC, Nokia USA Inc
US8789062B20.257Workload management of a concurrently accessed database serverGRANT2014-07-222011-04-0546967132GoodTeradata US IncTeradata US Inc, Aster Data Systems Inc
US20080281654A10.256Data center life cycle managementAPPLICATION2008-11-132007-05-0939970363GoodMicro Focus Software IncMicro Focus Software Inc
US20110191163A10.256DISTRIBUTION OF CONTENTAPPLICATION2011-08-042005-08-1237743722GoodBrightcove IncBrightcove Inc
US20070142059A10.256User plane location architecture with mobile server for location based servicesAPPLICATION2007-06-212005-12-1538174325GoodNokia of America CorpNokia of America Corp
US20020069079A10.255Method and system for facilitating service transactionsAPPLICATION2002-06-062001-07-1325418342Good
US20110231818A10.254Method and device for operating software-controlled devicesAPPLICATION2011-09-222010-03-1844168870GoodSafebridge UGhbSafebridge UGhb
US8892495B20.253Adaptive pattern recognition based controller apparatus and method and human-interface thereforeGRANT2014-11-181991-12-2346332596GoodBlanding Hovenweep LLCHOFFBERG FAMILY TRUST 1, STEVEN M HOFFBERG 2004-1 GRAT, Blanding Hovenweep LLC
US20040194098A10.252Application-based control of hardware resource allocationAPPLICATION2004-09-302003-03-3132989862GoodInternational Business Machines CorpInternational Business Machines Corp
US7340686B20.252Operating system program launch menu searchGRANT2008-03-042005-03-2237024250GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20050138422A10.252System and method for metering the performance of a data processing systemAPPLICATION2005-06-232003-12-2334678934GoodUnisys CorpUnisys Corp
US6990667B20.251Server-independent object positioning for load balancing drives and serversGRANT2006-01-242001-01-2927578267GoodAdaptec IncOverland Storage Inc
US8910145B20.251Method and device for installing/uninstalling software modules  with centralized resolution of constraints  in aircraft equipment itemsGRANT2014-12-092011-03-1844514794GoodAirbus Operations SASAirbus Operations SAS
US6016503A0.248Methods  systems and computer program products for preemptive avoidance of constraints for shared resourcesGRANT2000-01-181997-08-2925444726GoodInternational Business Machines CorpInternational Business Machines Corp
US20140114922A10.243SYSTEM AND METHOD FOR GENERATING AND MANAGING QUICK RECOVERY VOLUMESAPPLICATION2014-04-242001-09-2823270488GoodCommvault Systems IncCommvault Systems Inc
US8504876B20.239Anomaly detection for database systemsGRANT2013-08-062010-04-3044859270GoodMitre CorpMitre Corp
US6742080B10.238Disk block allocation optimization methodology and applicationGRANT2004-05-251996-09-0632314895GoodIntel CorpIntel Corp
US20050027616A10.237On-line distribution of per-use media with flexible purchase optionsAPPLICATION2005-02-032003-08-0134108066GoodGPLAY IncGPLAY Inc
US20120254215A10.234DISTRIBUTED FILE SYSTEM  DATA SELECTION METHOD THEREOF  AND PROGRAMAPPLICATION2012-10-042009-12-1044145649GoodNEC CorpNEC Corp
US20070100739A10.234Method and system for implementing a target group for integrated auction services on a seller's e-commerce siteAPPLICATION2007-05-032005-10-3137997720GoodSAP SE SAP SE
US20020073208A10.232Contact centerAPPLICATION2002-06-132000-10-179901479GoodHewlett Packard CoHewlett Packard Enterprise Development LP
US8832580B20.229Software with improved view of a business processGRANT2014-09-092008-11-0542133016GoodAurea Software IncAurea Software Inc
US20030224781A10.228System and method for establishing and controlling access to network resourcesAPPLICATION2003-12-042002-05-0329586923GoodLeapstone Systems IncACCEL INTERNET FUND IV LP, ACCEL INVESTORS 2003 LLC, ACCEL VIII LP, BURN3 LLC, HOMESTAKE PARTNERS LP, NEW ENTERPRISE ASSOCIATES 9 LP, SWARTZ FOUNDATION, Google Technology Holdings LLC
US20020073210A10.227Establishment of a deferred network communication sessionAPPLICATION2002-06-132000-10-179901470GoodHewlett Packard CoHewlett Packard Enterprise Development LP
US20020052782A10.227Buyer-driven targeting of purchasing entitiesAPPLICATION2002-05-022000-10-3027500139GoodBuyerLeverageBuyerLeverage
US20020055974A10.226Content provider entity for communication sessionAPPLICATION2002-05-092000-10-179901472GoodHewlett Packard CoHewlett Packard Enterprise Development LP
US20080147457A10.226Systems and methods for handling attributes used for assignment generation in a value flow environmentAPPLICATION2008-06-192006-12-1539528652GoodSAP SE SAP SE
US20020147570A10.225System and method for monitoring the interaction of randomly selected users with a web domainAPPLICATION2002-10-102001-04-1025261637GoodKEYLIME SOFTWARE IncOath Inc
US6901377B10.224Methods and systems for aviation parts  information and servicesGRANT2005-05-312000-01-0726870963GoodGeneral Electric CoGeneral Electric Co
US20070043672A10.219Per unit basis software licensing modelAPPLICATION2007-02-222005-08-1637768346GoodBEA Systems IncBEA Systems Inc
US20050132062A10.218Data transmission control methodAPPLICATION2005-06-162000-07-248558813GoodStonesoft CorpForcepoint LLC, Forcepoint Federal Holdings LLC
US20050111455A10.216VLAN serverAPPLICATION2005-05-262003-11-2034587439GoodHitachi Communication Technologies LtdHitachi Ltd
US6041053A0.214Technique for efficiently classifying packets using a trie-indexed hierarchy forest that accommodates wildcardsGRANT2000-03-211997-09-1825464040GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20070226155A10.214Extended attribute-based pricing system and methodAPPLICATION2007-09-272002-03-2938534763GoodSiebel Systems IncSiebel Systems Inc
US20030135380A10.214Hardware pay-per-useAPPLICATION2003-07-172002-01-1521936258GoodHewlett Packard CoHewlett Packard Enterprise Development LP
US7046665B10.210Provisional IP-aware virtual paths over networksGRANT2006-05-161999-10-2636318194GoodExtreme Networks IncRPX Corp
US20120297130A10.209STACK PROCESSOR USING A FERROELECTRIC RANDOM ACCESS MEMORY (F-RAM) FOR BOTH CODE AND DATA SPACEAPPLICATION2012-11-222011-05-1647175831GoodRamtron International CorpCypress Semiconductor Corp
US20020082811A10.209Optimization apparatus  system  and method of use and doing businessAPPLICATION2002-06-272000-03-1722700836Good
US20080010487A10.207SYNCHRONIZING AN ACTIVE FEED ADAPTER AND A BACKUP FEED ADAPTER IN A HIGH SPEED  LOW LATENCY DATA COMMUNICATIONS ENVIRONMENTAPPLICATION2008-01-102006-06-2738457706GoodInternational Business Machines CorpInternational Business Machines Corp
US20090192879A10.205Lead Rating SystemsAPPLICATION2009-07-302008-01-2140900174Good
US20120005148A10.204INTEGRATING SPECIALIZED KNOWLEDGE SOURCES INTO A GENERAL SEARCH SERVICEAPPLICATION2012-01-052010-06-3045400469GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20070226064A10.203Dynamic pricing system and methodAPPLICATION2007-09-272002-03-2938534703GoodSiebel Systems IncOracle America Inc
US20110107294A10.201WEB PORTAL APPLICATION CUSTOMIZATION METHOD AND SYSTEM USING PROFILESAPPLICATION2011-05-052009-11-0242237376GoodAccenture Global Services LtdAccenture Global Services Ltd
US20020042733A10.198Enhancements to business research over internetAPPLICATION2002-04-112000-10-1126932486GoodThomson Licensing SASThomson Licensing SAS
US20100125531A10.195SYSTEM AND METHOD FOR THE AUTOMATED FILTERING OF REVIEWS FOR MARKETABILITYAPPLICATION2010-05-202008-11-1944060770GoodPaperG IncPaperG Inc
US20030084343A10.194One protocol web access to usage data in a data structure of a usage based licensing serverAPPLICATION2003-05-012001-11-0121703104GoodComstock Systems CorpComstock Systems Corp
US6163539A0.193Firmware controlled transmit datapath for high-speed packet switchesGRANT2000-12-191998-04-2833030393GoodMicrosemi Storage Solutions LtdMicrosemi Storage Solutions Ltd
US20060248010A10.192Revenue management systems and methodsAPPLICATION2006-11-022005-04-3037235626GoodPortal Software IncOracle International Corp
US20150026277A10.190METHOD AND SYSTEM FOR MESSAGE PROCESSINGAPPLICATION2015-01-222008-09-0241726920GoodAlibaba Group Holding LtdAlibaba Group Holding Ltd
WO2011083966A20.189ABNORMAL ACCESS BLOCKING SYSTEM USING SUPER-GRIDSAPPLICATION2011-07-142010-01-0544305935Good
US20090049314A10.188Method and System for Dynamic Voltage and Frequency Scaling (DVFS)APPLICATION2009-02-192007-08-1340363925GoodBroadcom CorpAvago Technologies General IP Singapore Pte Ltd
US10107263B20.179Method of managing computing tasks in a wind farmGRANT2018-10-232010-12-0845373638GoodVestas Wind Systems ASVestas Wind Systems AS
US8069452B20.172Method and management agent for event notifications correlationGRANT2011-11-292005-12-0138092643GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US20060041667A10.171Method and apparatus for protecting legitimate traffic from dos and ddos attacksAPPLICATION2006-02-232002-11-1932322251GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US20030083995A10.167Process for usage based suite licensing of resources from one or more vendorsAPPLICATION2003-05-012001-11-0121711583GoodComstock Systems CorpComstock Systems Corp
US20030177027A10.163Multi-purpose talent management and career management system for attracting  developing and retaining critical business talent through the visualization and analysis of informal career pathsAPPLICATION2003-09-182002-03-0828045276Good
US20020198933A10.161Method of lowering labor and marketing cost of a commercial websiteAPPLICATION2002-12-262001-06-2025383614Good
US6600721B20.160End node pacing for QOS and bandwidth managementGRANT2003-07-291998-12-3127613056GoodNortel Networks LtdNortel Networks Ltd
US20070276755A10.157Systems and methods for assignment generation in a value flow environmentAPPLICATION2007-11-292006-05-2936689471GoodSAP SE SAP SE
US20030135474A10.150Software pay-per-use pricingAPPLICATION2003-07-172002-01-1521936248GoodHewlett Packard CoHewlett Packard Enterprise Development LP
US20050135243A10.148System and method for guaranteeing quality of service in IP networksAPPLICATION2005-06-232003-12-1834675838GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US20140020050A10.144Method for Determining Integrity in an Evolutionary Collaborative Information SystemAPPLICATION2014-01-162011-03-2544067397GoodEADS Deutschland GmbHAirbus Defence and Space GmbH
US7260102B20.132Traffic switching using multi-dimensional packet classificationGRANT2007-08-212002-02-2227752764GoodNortel Networks LtdCiena Corp
US20060095309A10.127Method for application and infrastructure rationalizationAPPLICATION2006-05-042004-09-2836263214GoodElectronic Data Systems LLCHewlett Packard Enterprise Development LP
US20100114654A10.117LEARNING USER PURCHASE INTENT FROM USER-CENTRIC DATAAPPLICATION2010-05-062008-10-3142132566GoodHewlett Packard Development Co LPMicro Focus LLC
US20130141585A10.109CHECKOUT SYSTEM AND METHOD FOR OPERATING CHECKOUT SYSTEMAPPLICATION2013-06-062011-12-0248523736GoodToshiba TEC CorpToshiba TEC Corp
US20160154659A9NRMega Data Center Using Mini-cloud Host in Residential EnvironmentAPPLICATION2016-06-022010-11-2255067646GoodXencare Software IncXencare Software Inc
KR101008927B1NRCLOUD TYPE DISK SHARING SYSTEM AND THE METHODGRANT2011-01-182010-07-1543616432Good
JP2012524946ANRNo titleAPPLICATION2012-10-182009-04-2442993141Good
GB2502484ANRSharing internet capability of a mobile computing device with a client computing device using a virtual machineGRANT2013-11-272011-03-1846879638GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
GB2492006ANRSystem and method for assisting virtual machine instantiation and migrationGRANT2012-12-192010-03-0544532386GoodInternational Business Machines CorpInternational Business Machines Corp
CN103858118ANRDynamically acquiring computing resources in a networked computing environmentGRANT2014-06-112011-08-0847667820Good
CN103827823ANRMigrating virtual machinesGRANT2014-05-282011-07-2947629537Good
CN103582867ANRHigh-level language for specifying configurations of cloud-based deploymentsGRANT2014-02-122011-03-1646726649Good
CN103493038ANRClient configuration history for self-provisioning of configuration and obviating reinstallation of embedded imageGRANT2014-01-012011-01-2746578394Good
CN103443762ANRMethod and apparatus for moving a software objectGRANT2013-12-112011-04-0746969478Good
CN103023960ANRGeo-migration of user stateGRANT2013-04-032011-09-1547881690Good
CN102903042ANRBilling management system and billing management methodGRANT2013-01-302011-07-2547575260Good
US7996484B20.859Non-disruptive  reliable live migration of virtual machines with network data reception directly into virtual machines' memoryGRANT2011-08-092008-12-1142241854FairMicrosoft CorpMicrosoft Technology Licensing LLC
US8996506B20.745Duplicate search optimizationGRANT2015-03-312011-03-2846928626FairRed Hat Israel LtdRed Hat Israel Ltd
US8442955B20.695Virtual machine image co-migrationGRANT2013-05-142011-03-3046928613FairInternational Business Machines CorpMaplebear Inc
US9852154B20.623Methods for transferring reserves when moving virtual machines across systemsGRANT2017-12-262010-11-1046020677FairInternational Business Machines CorpInternational Business Machines Corp
US8005890B20.598System and method for obtaining and executing instructions from a private networkGRANT2011-08-232006-10-0239262288FairNeustar IncNeustar Inc
US9135342B20.585Comprehensive  relevant  and dynamic data searching in a virtualization environmentGRANT2015-09-152010-02-2644490647FairVMware IncVMware Inc
US20090300423A10.575SYSTEMS AND METHODS FOR SOFTWARE TEST MANAGEMENT IN CLOUD-BASED NETWORKAPPLICATION2009-12-032008-05-2841381326FairRed Hat IncRed Hat Inc
US9087066B20.555Virtual disk from network shares and file serversGRANT2015-07-212009-04-2442993032FairSWISH DATA CORPSWISH DATA CORP
US7111303B20.541Virtual machine operating system LANGRANT2006-09-192002-07-1630442924FairInternational Business Machines CorpInternational Business Machines Corp
US8468440B20.539Look ahead of links/alter linksGRANT2013-06-182007-12-2140789877FairInvention Science Fund I LLCInvention Science Fund I LLC
US9239840B10.534Backup media conversion via intelligent virtual appliance adapterGRANT2016-01-192009-04-2455071428FairSWISH DATA CORPSWISH DATA CORP
US9311328B20.532Reference volume for initial synchronization of a replicated volume groupGRANT2016-04-122011-04-2247022085FairVeritas US IP Holdings LLCVeritas Technologies LLC
US9195636B20.517Universal file type preview for mobile devicesGRANT2015-11-242012-03-0748189510FairBox IncBox Inc
US20050015409A10.511Techniques for performing operations on migrated files without recalling dataAPPLICATION2005-01-202003-05-3033511599FairArkivio IncArkivio Inc
US8949977B20.504Look ahead of links/alter linksGRANT2015-02-032007-12-2140790142FairInvention Science Fund I LLCInvention Science Fund I LLC
US10375455B20.480System and method for presenting during a programming event an invitation to follow content on a social media siteGRANT2019-08-062009-10-1443855857FairTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US20110238775A10.459Virtualized Data Storage Applications and OptimizationsAPPLICATION2011-09-292010-03-2344657588FairRiverbed Technology IncRiverbed Technology Inc
US8484161B20.456Live file system migrationGRANT2013-07-092011-08-2947745095FairOracle International CorpOracle International Corp
US8990151B20.454Automatic and semi-automatic tagging features of work items in a shared workspace for metadata tracking in a cloud-based content management system with selective or optional user contributionGRANT2015-03-242011-10-1448086662FairBox IncBox Inc
US9063912B20.453Multimedia content preview rendering in a cloud content management systemGRANT2015-06-232011-06-2247361940FairBox IncBox Inc
US7698360B20.451System and method for distance learningGRANT2010-04-132002-02-2632963079FairMicro Focus Software IncMicro Focus Software Inc
US8370300B20.445Method and apparatus of data protectionGRANT2013-02-052011-05-0547090943FairHitachi LtdHitachi Ltd
US9098474B20.444Preview pre-generation based on heuristics and algorithmic prediction/assessment of predicted user behavior for enhancement of user experienceGRANT2015-08-042011-10-2648173488FairBox IncBox Inc
US8234372B20.436Writing a file to a cloud storage solutionGRANT2012-07-312010-05-0544902670FairGo Daddy Operating Co LLCGo Daddy Operating Co LLC
US8065327B20.436Management of collections of websitesGRANT2011-11-222008-03-1541064168FairMicrosoft CorpMicrosoft Technology Licensing LLC
US8264702B20.432Method and system for determining root cause of problems in members of a fleet of multi-function devicesGRANT2012-09-112009-12-0444081737FairXerox CorpXerox Corp
US8301693B20.429Content managementGRANT2012-10-302009-11-2444062887FairInternational Business Machines CorpInternational Business Machines Corp
US20100017513A10.398MULTIPLE OVERLAPPING BLOCK TRANSFERSAPPLICATION2010-01-212008-07-1641531251FairCray IncIntel Corp
US8589406B20.365Deduplication while rebuilding indexesGRANT2013-11-192011-03-0346753949FairHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8959203B10.333Dynamic bandwidth management using routing signals in networks with direct peeringsGRANT2015-02-172011-12-1952463723FairAmazon Technologies IncAmazon Technologies Inc
US20070162420A10.331Techniques for automatically discovering a database device on a networkAPPLICATION2007-07-122004-01-2138233891FairOracle International CorpOracle International Corp
US20060107314A10.329Content management system and methodAPPLICATION2006-05-182004-11-1236387998Fair
US20060031691A10.328Systems and methods to determine processor utilizationAPPLICATION2006-02-092004-08-0435758886FairHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8660991B20.327Systems and methods for management of subscriber databases within mobile communications networksGRANT2014-02-252011-01-1146456045FairBridgewater Systems CorpAmdocs Canadian Managed Services Inc, Amdocs Development Ltd
US20040098383A10.323Method and system for intelligent storage managementAPPLICATION2004-05-202002-05-3129715335FairFujitsu IT Holdings Inc, Softek Storage Solutions CorpFujitsu IT Holdings Inc, ServiceNow Inc
US20100125826A10.309WORKFLOW ENGINE FOR EXECUTION OF WEB MASHUPSAPPLICATION2010-05-202008-11-1842172966FairMicrosoft CorpMicrosoft Technology Licensing LLC
US8887122B20.307Find and track information of interface usage of software libraries by other softwareGRANT2014-11-112010-11-2346065624FairRed Hat IncRed Hat Inc
US20130110811A10.301COMPUTER AND METHOD FOR MAKING SEARCH ENGINE SEARCH RESOURCE OF COMPUTER SYSTEM INCLUDING STORAGE SYSTEM AND FOR DISPLAYING RESULT OF THE SEARCHAPPLICATION2013-05-022011-10-2845607330FairHitachi LtdHitachi Ltd
US20070162462A10.301Wide Area Networked File SystemAPPLICATION2007-07-122006-01-0338233922FairNEC Laboratories America IncNEC Corp
US8108406B20.299Pangenetic web user behavior prediction systemGRANT2012-01-312008-12-3042286155FairExpanse Networks IncExpanse Bioinformatics Inc
US20110010612A10.296System for speeding up web site use using task workflow templates for filtration and extractionAPPLICATION2011-01-132009-07-1343428387FairVM-ROBOT IncVM-ROBOT Inc
US9830410B20.296System and method for prediction of temperature values in an electronics systemGRANT2017-11-282011-12-2248669136FairSchneider Electric IT CorpSchneider Electric IT Corp
US8768949B20.282Document management user interface with user customized application functionalitiesGRANT2014-07-012010-03-1144561098FairRicoh Co LtdRicoh Co Ltd
US9792361B10.277Photographic memoryGRANT2017-10-172008-07-2941609345FairMimzi LLCMimzi LLC
US9952103B20.266Analysis of effect of transient events on temperature in a data centerGRANT2018-04-242011-12-2248669157FairSchneider Electric IT CorpSchneider Electric IT Corp
US20100070448A10.265SYSTEM AND METHOD FOR KNOWLEDGE RETRIEVAL  MANAGEMENT  DELIVERY AND PRESENTATIONAPPLICATION2010-03-182002-06-2432850042Fair
US20130151558A10.235METHODS AND APPARATUS FOR IMPLEMENTING A DISTRIBUTED DATABASEAPPLICATION2013-06-132011-12-1245440160FairTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US20100283637A10.230Cloud Image Replacement for Terrain DisplayAPPLICATION2010-11-112006-12-0639497442FairBoeing CoBoeing Co
US8244037B20.226Image-based data management method and systemGRANT2012-08-142007-11-1540643091FairMaster Wave International Co LtdMaster Wave International Co Ltd
US20120084643A10.223COMPONENT-SPECIFIC AND SOURCE-AGNOSTIC LOCALIZATIONAPPLICATION2012-04-052010-09-3045890887FairBusiness Objects Software LtdBusiness Objects Software Ltd
US20100095067A10.218Caching Web Page Elements In Accordance With Display Locations Of The ElementsAPPLICATION2010-04-152008-10-1442099937FairInternational Business Machines CorpInternational Business Machines Corp
US20120011433A10.211SYSTEM AND METHOD FOR PRESENTING CATEGORIZED CONTENT ON A SITE USING PROGRAMMATIC AND MANUAL SELECTION OF CONTENT ITEMSAPPLICATION2012-01-122003-12-1742831007Fair
US7872627B20.209Display unitGRANT2011-01-182004-11-2936566893FairNEC Electronics CorpRenesas Electronics Corp
US20080234919A10.185PERFORMING APPLICATION REVIEW VALIDATION TESTING FOR AN ENGINE AS INSTALLED IN AN APPLICATIONAPPLICATION2008-09-252007-03-1639651272FairDeere and CoDeere and Co
US20110167035A10.178MULTIPLE-CLIENT CENTRALLY-HOSTED DATA WAREHOUSE AND TREND SYSTEMAPPLICATION2011-07-072010-01-0544225316Fair
US7716226B20.176Method and system for probabilistically quantifying and visualizing relevance between two or more citationally or contextually related data objectsGRANT2010-05-112005-09-2737895408FairPatentRatings LLCPatentRatings LLC
US20070073689A10.163Automated intelligent discovery engine for classifying computer data filesAPPLICATION2007-03-292005-09-2937895365FairApptimum Inc, Eisenworld IncMicrosoft Technology Licensing LLC, Apptimum Inc
US8424336B20.160Modular ice storage for uninterruptible chilled waterGRANT2013-04-232006-12-1839525504FairSchneider Electric IT CorpSchneider Electric IT Corp
US4582434A0.151Time corrected  continuously updated clockGRANT1986-04-151984-04-2324413025FairHeath CoHEATHKIT COMPANY Inc
US8425287B20.138In-row air containment and cooling system and methodGRANT2013-04-232007-01-2339667720FairSchneider Electric IT CorpSchneider Electric IT Corp
US9568206B20.137Method and apparatus for coolingGRANT2017-02-142006-08-1541726562FairSchneider Electric IT CorpSchneider Electric IT Corp
US8322155B20.132Method and apparatus for coolingGRANT2012-12-042006-08-1541268415FairAmerican Power Conversion CorpSchneider Electric IT Corp
US8327656B20.129Method and apparatus for coolingGRANT2012-12-112006-08-1539100052FairAmerican Power Conversion CorpSchneider Electric IT Corp
US9091851B20.060Light control in head mounted displaysGRANT2015-07-282010-02-2846047287FairMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US6696017B20.022Ni-base brazing alloyGRANT2004-02-242000-11-1518821109FairFukuda Metal Foil and Powder Co LtdFukuda Metal Foil and Powder Co Ltd
TWI478088BNRNo titleGRANT2015-03-212011-03-0247223233Fair

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeHIGH
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
862
Recommended Classes
216
Government Assigned Classes
11
CPC
Title
Score
G06F9/45533Hypervisors| Virtual machine monitors1.897
G06F12/08in hierarchically structured memory systems  e.g. virtual memory systems1.294
G06F9/45558Hypervisor-specific management and integration aspects1.294
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)1.285
G06F21/602Providing cryptographic facilities or services1.247
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.241
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities1.218
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)1.211
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.209
H04L41/0866Checking configuration1.197
G06F21/575Secure boot1.193
G06F21/72in cryptographic circuits1.190
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines1.186
G06F8/60Software deployment1.186
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine1.164
G06F9/544Buffers| Shared memory| Pipes1.157
H04L41/0816due to adaptation  e.g. in response to network events1.154
G06F9/45545Guest-host  i.e. hypervisor is an application program itself  e.g. VirtualBox1.148
H04L9/3247involving digital signatures1.147
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself1.140
G06F9/45537Provision of facilities of other operating environments  e.g. WINE | I/O emulation | (ref: G06F13/105)1.134
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy1.129
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals1.128
H04L41/0806for initial configuration or provisioning1.118
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.113
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.112
G06F9/4856resumption being on a different machine  e.g. task migration  virtual machine migration | (ref: G06F9/5088)|  takes precedence1.109
H04L9/0822using key encryption key1.109
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)1.107
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.104
H04L63/102Entity profiles1.104
H04L63/168above the transport layer1.103
G06F9/5077Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455)1.100
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.099
G06F11/0793Remedial or corrective actions | by retry | (ref: G06F11/1402)| | recovery from an exception in an instruction pipeline | (ref: G06F9/3861)| | in a network context | (ref: H04L29/14)1.097
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals1.096
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]1.093
H04L63/1425Traffic logging  e.g. anomaly detection1.093
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)1.093
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.093
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB1.092
G06F9/5072Grid computing1.092
G06F9/5044considering hardware capabilities1.092
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)1.088
G06F11/1484involving virtual machines1.085
G06F8/63Image based installation| Cloning| Build to order1.084
G06F21/71to assure secure computing or processing of information1.084
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity1.084
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key1.083
H04L41/0813Changing of configuration1.082
H04L63/0815providing single-sign-on or federations1.082
G06F21/567using dedicated hardware1.081
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)1.077
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint1.076
G06F9/4416Network booting| Remote initial program loading [RIPL]1.074
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)1.072
H04L67/327whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status  payload or application type1.071
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords1.062
H04L63/105Multiple levels of security1.060
H04W12/08Access security1.060
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements1.060
G06F21/121Restricting unauthorised execution of programs1.057
H04L61/2596Non - internet protocol [IP] address translation1.056
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)1.056
H04L67/101based on network conditions1.056
H04W4/02Services making use of location information1.056
G06F9/5088involving task migration1.055
H04L63/0272Virtual private networks1.054
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)1.053
G06F11/1415at system level1.051
G06F9/4555Para-virtualisation  i.e. guest operating system has to be modified1.050
G06F21/554involving event detection and direct action1.050
G06F9/547Remote procedure calls [RPC]| Web services1.049
H04L63/101Access control lists [ACL]1.049
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)1.049
H04L65/1069Setup | computer conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources or notifying involved parties | (ref: H04L12/1818)| | admission control or resource reservation in packet switching networks | (ref: H04L47/70)| | arrangements for peer-to-peer networking in network applications | (ref: H04L67/104)| | session management in network applications | (ref: H04L67/14)| | negotiation of communication capabilities | (ref: H04L69/24)1.049
H04L49/555Error detection1.048
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage1.048
G06F21/55Detecting local intrusion or implementing counter-measures1.046
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.046
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules1.043
H04L41/0893Assignment of logical groupings to network elements| Policy based network management or configuration1.043
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding1.042
H04L63/1416Event detection  e.g. attack signature detection1.040
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling1.038
H04L45/586Virtual routers1.038
G06F21/31User authentication1.038
G06F21/79in semiconductor storage media  e.g. directly-addressable memories1.036
H04L61/1511using domain name system [DNS]1.036
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities1.035
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)1.034
G09G5/003Details of a display terminal  the details relating to the control arrangement of the display terminal and to the interfaces thereto | specific for a CRT | (ref: G09G1/165)| | for a flat panel | (ref: G09G3/2092)1.032
H04L45/66Layer 2 routing  e.g. in Ethernet based MAN's1.032
H04L41/082due to updating or upgrading of network functionality  e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02)1.031
G06F3/0619in relation to data integrity  e.g. data losses  bit errors1.031
G06F21/552involving long-term monitoring or reporting1.030
H04L12/46Interconnection of networks1.030
H04L63/1433Vulnerability analysis1.030
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)1.030
H04L61/2007internet protocol [IP] addresses1.030
G06F9/46Multiprogramming arrangements1.028
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks1.026
H04W76/14Direct-mode setup1.026
G06F21/564by virus signature recognition1.025
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM] | network arrangements or protocols for real-time communications | (ref: H04L65/00)1.024
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]1.023
H04L9/321involving a third party or a trusted authority1.023
G06Q40/12Accounting1.023
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems1.023
H04W12/06Authentication1.022
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)1.022
H04L63/0254Stateful filtering1.022
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)1.021
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer1.021
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)1.021
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability1.021
G06F9/4406Loading of operating system1.020
G06F8/656while running1.019
H04L67/1023based on other criteria  e.g. hash applied to IP address  specific algorithms or cost1.019
H04L67/28for the provision of proxy services  e.g. intermediate processing or storage in the network | network management provisions | (ref: H04L41/00)| | network monitoring provisions | (ref: H04L43/00)| | proxies for network security | (ref: H04L63/0281)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)1.019
H04L67/18in which the network application is adapted for the location of the user terminal | wireless application services making use of the location of users or terminals | (ref: H04W4/02)|  takes precedence| location based Web retrieval | (ref: G06F17/3087)1.018
H04L67/38Protocols for telewriting| Protocols for networked simulations  virtual reality or games | games using an electronically generated display | (ref: A63F13/00)| | remote windowing or X-Windows | (ref: G06F9/452)1.017
G06F21/445by mutual authentication  e.g. between devices or programs1.016
H04W12/04Key management1.014
H04W8/183Processing at user equipment or user record carrier1.014
G06F11/203using migration1.014
G06F21/606by securing the transmission between two devices or processes1.014
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)1.013
G05B13/042in which a parameter or coefficient is automatically adjusted to optimise the performance1.013
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]1.013
H04L67/1031Controlling of the operation of servers by a load balancer  e.g. adding or removing servers that serve requests1.012
G06F9/45541Bare-metal  i.e. hypervisor runs directly on hardware1.012
H04L63/166at the transport layer1.012
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying1.012
H04L61/6045Fibre channel identifiers1.012
H04L63/0281Proxies1.012
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)1.012
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files1.012
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates1.011
G06F9/4401Bootstrapping | security arrangements therefor | (ref: G06F21/57)1.011
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)1.011
G06F15/00Digital computers in general | details | (ref: G06F1/00)|  â€“ | (ref: G06F13/00)| Data processing equipment in general1.011
G06F8/61Installation1.010
H04L41/12network topology discovery or management | topology discovery for routing | (ref: H04L45/02)1.010
H04L41/069involving storage or log of alarms or notifications or post-processing thereof1.008
G06F21/35communicating wirelessly1.007
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow1.007
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)1.006
H04L9/3271using challenge-response1.006
G06F3/0665at area level  e.g. provisioning of virtual or logical volumes1.006
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards1.005
H04L63/0838using one-time-passwords1.005
H04L61/6022Layer 2 addresses  e.g. medium access control [MAC] addresses1.005
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)1.005
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance1.004
G06F21/33using certificates1.004
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)1.003
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits1.003
H04L47/821Prioritising resource allocation or reservation requests1.002
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones1.001
H04L67/2842for storing data temporarily at an intermediate stage  e.g. caching | distributed storage of data in a network | (ref: H04L67/1097)| | browsing optimization of access to content by caching | (ref: G06F17/30902)| | addressing of a cache within a hierarchically structured memory system | (ref: G06F12/0802)| | disk caching | (ref: G06F12/0866)0.999
H04L67/2852involving policies or rules for updating  deleting or replacing the stored data based on network characteristics | replacement control in memory systems | (ref: G06F12/12)0.999
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence0.998
G06F11/1417Boot up procedures0.997
G06F9/45504Abstract machines for programme code execution  e.g. Java virtual machine [JVM]  interpreters  emulators0.996
G06F21/60Protecting data0.996
G06F21/629to features or functions of an application0.995
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database0.995
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)0.995
H04L67/42Protocols for client-server architectures | access to replicated servers | (ref: H04L67/1002)0.995
H04L41/5054Automatic provisioning of the service triggered by the service manager  e.g. concrete service implementation by automatic configuration of network components | for initializing configuration  i.e. provisioning of network or devices | (ref: H04L41/0806)0.994
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC0.994
G06F8/30Creation or generation of source code0.994
G06F3/0484for the control of specific functions or operations  e.g. selecting or manipulating an object or an image  setting a parameter value or selecting a range0.993
H04L41/0853by actively collecting or retrieving configuration information0.993
H04L67/148provided for migration or transfer of sessions | in-session procedures in real-time communications | (ref: H04L65/1083)| | control or signalling for completing the hand-off in wireless networks | (ref: H04W36/0005)0.992
H04L9/3073involving pairings  e.g. identity based encryption [IBE]  bilinear mappings or bilinear pairings  e.g. Weil or Tate pairing0.992
H04L47/22Traffic shaping0.991
H04L9/0827involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.990
G06T11/001Texturing| Colouring| Generation of texture or colour0.990
H04L67/16Service discovery or service management  e.g. service location protocol [SLP] or Web services | network service management for ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | address allocation to terminals or nodes connected to a network | (ref: H04L61/30)| | mobile application services specially adapted for wireless communication networks | (ref: H04W4/00)0.990
G06F11/2033switching over of hardware resources0.989
G06F21/335for accessing specific resources  e.g. using Kerberos tickets0.989
G06F9/452Remote windowing  e.g. X-Window System  desktop virtualisation | protocols for telewriting | (ref: H04L67/38)0.988
G06F21/44Program or device authentication0.988
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)0.988
G06F9/4411Configuring for operating with peripheral devices| Loading of device drivers0.987
H04L47/808User-type aware0.986
H04L49/70Virtual switches0.985
H04L41/046Aspects of network management agents0.985
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)0.985
G06F9/3877using a slave processor  e.g. coprocessor | peripheral processor | (ref: G06F13/12)| | vector processor | (ref: G06F15/8053)0.985
H04L41/0672by re-configuring the faulty entity0.984
G06F9/5005to service a request0.984
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics0.984
G06F21/88Detecting or preventing theft or loss0.983
H04L67/40Protocols for remote procedure calls [RPC] | remote procedure calls | (ref: G06F9/547)0.983
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL0.982
H04L63/02for separating internal from external traffic  e.g. firewalls0.982
H04L9/0662with particular pseudorandom sequence generator0.982
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour0.981
H04L9/0819Key transport or distribution  i.e. key establishment techniques where one party creates or otherwise obtains a secret value  and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062)0.981
H04L63/104Grouping of entities0.980
H04L41/5051Service on demand  i.e. services are defined and provided in real time as requested by the user0.980
G06F9/4818Priority circuits therefor0.979
H04W4/10Push-to-Talk [PTT] or Push-On-Call services0.978
H04L41/0226Mapping or translation of multiple network management protocols0.977
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD0.977
H04L63/0245Filtering by information in the payload0.976
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords0.976
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.976
G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored0.976
G06F9/4408Boot device selection0.975
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)0.975
G06F1/10Distribution of clock signals |   e.g. skew0.975
H04L41/04Architectural aspects of network management arrangements0.975
G06F3/1236Connection management0.974
H04L43/16using threshold monitoring0.974
G06F8/52Binary to binary0.973
G06F9/54Interprogram communication0.972
G06F3/0483interaction with page-structured environments  e.g. book metaphor0.972
H04L41/00Arrangements for maintenance or administration or management of packet switching networks0.971
H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof0.971
H04L9/3236using cryptographic hash functions0.971
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC0.971
G06F3/0622in relation to access0.970
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)0.970
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)0.970
G06F13/28using burst mode transfer  e.g. direct memory access | DMA|   cycle steal | (ref: G06F13/32)|  takes precedence0.970
H04L47/787Bandwidth trade among domains0.969
H04L47/781Centralized allocation of resource0.969
G06F21/604Tools and structures for managing or administering access control systems0.969
G06F21/84output devices  e.g. displays or monitors0.969
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)0.968
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms0.968
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks0.967
G06F12/0284Multiple user address space allocation  e.g. using different base addresses | interprocessor communication | (ref: G06F15/163)0.967
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]0.967
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation0.967
G06F9/06using stored programs  i.e. using an internal store of processing equipment to receive or retain programs0.966
H04L12/40032Details regarding a bus interface enhancer0.965
G06F11/301where the computing system is a virtual computing platform  e.g. logically partitioned systems | virtual machines | (ref: G06F9/45533)| | logical partitioning of resources | (ref: G06F9/5077)0.965
G06F11/1464for networked environments0.965
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level0.965
G06F9/5033considering data affinity0.964
H04L61/1547for personal communications  i.e. using a personal identifier0.964
G06F11/362Software debugging0.964
H04L63/126the source of the received data0.964
G06F21/6254by anonymising data  e.g. decorrelating personal data from the owner's identification0.964
H04L9/06the encryption apparatus using shift registers or memories for block-wise | or stream|  coding  e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators0.963
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.961
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks0.961
H04L9/3221interactive zero-knowledge proofs0.961
H04L67/22Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)| | e-commerce | (ref: G06Q30/00)0.960
H04L67/2804for adding application control or application functional data  e.g. adding metadata0.960
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode0.960
H04L61/1582containing identifiers of data entities on a computer  e.g. file names0.960
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints0.959
G06F13/107Terminal emulation0.959
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment0.959
H04L67/2809for brokering | negotiation of communication capabilities | (ref: H04L69/24)| | e-commerce | (ref: G06Q30/00)0.959
H04L51/30with reliability check  e.g. acknowledgments or fault reporting0.958
G06F9/4418Suspend and resume| Hibernate and awake0.958
G06F9/541via adapters  e.g. between incompatible applications0.957
H04L12/28characterised by path configuration  e.g. local area networks [LAN]  wide area networks [WAN]0.957
G06F21/305by remotely controlling device operation0.956
G06F21/85interconnection devices  e.g. bus-connected or in-line devices0.956
G06F21/561Virus type analysis0.955
G06F21/87by means of encapsulation  e.g. for integrated circuits0.955
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys0.955
G06F12/1036for multiple virtual address spaces  e.g. segmentation | (ref: G06F12/1045)|  takes precedence0.955
G06F11/3438monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22)0.955
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)0.955
G06F9/5083Techniques for rebalancing the load in a distributed system0.711
H04L29/08099for remote control or remote monitoring | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)0.711
H04L63/14for detecting or protecting against malicious traffic0.711
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)0.711
H04W12/10Integrity0.485
G06F21/6281at program execution time  where the protection is within the operating system0.485
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)0.485
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)0.485
H04L63/064Hierarchical key distribution  e.g. by multi-tier trusted parties0.482
G06F3/0647Migration mechanisms0.465
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)0.457
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.449
G06F12/145the protection being virtual  e.g. for virtual blocks or segments before a translation mechanism0.445
G06F12/14Protection against unauthorised use of memory | or access to memory0.445
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity0.445
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.445
H04L29/08072Application layer  i.e. layer seven | not used0.445
G06F9/4843by program  e.g. task dispatcher  supervisor  operating system0.445
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)0.437
G06F15/177Initialisation or configuration control | processor initialisation | (ref: G06F9/4405)0.433
H04L67/303Terminal profiles0.433
G06F3/0608Saving storage space on storage systems0.431
G06F3/067Distributed or networked storage systems  e.g. storage area networks [SAN]  network attached storage [NAS]0.431
G06F3/0644Management of space entities  e.g. partitions  extents  pools0.431
H04L63/0218Distributed architectures  e.g. distributed firewalls0.430
G06F11/16Error detection or correction of the data by redundancy in hardware0.427
G06F11/3006where the computing system is distributed  e.g. networked systems  clusters  multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50)0.427
G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component  e.g. monitoring the presence of processing resources  peripherals  I/O links  software programs | verification or detection of system hardware configuration | (ref: G06F11/2247)0.427
G06F9/5055considering software capabilities  i.e. software resources associated or available to the machine0.425
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.424
H04L41/5096wherein the managed service relates to distributed or central networked applications | management of file systems | (ref: G06F17/30067)| | management of structured data stores | (ref: G06F17/30286)0.419
G06F11/3452Performance evaluation by statistical analysis0.418
G06F11/34Recording or statistical evaluation of computer activity  e.g. of down time  of input/output operation | | Recording or statistical evaluation of user activity  e.g. usability assessment0.418
G06F21/556involving covert channels  i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755)0.418
G06F21/83input devices  e.g. keyboards  mice or controllers thereof0.418
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)0.418
H04W4/50Service provisioning or reconfiguring0.417
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.416
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)0.414
G06F21/76in application-specific integrated circuits [ASICs] or field-programmable devices  e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs]0.413
G06F21/12Protecting executable software0.413
G06F21/6245Protecting personal data  e.g. for financial or medical purposes0.413
G06F11/0772Means for error signaling  e.g. using interrupts  exception flags  dedicated error registers0.411
G06F11/1469Backup restoration techniques0.411
G06F11/079Root cause analysis  i.e. error or fault diagnosis | in a hardware test environment | (ref: G06F11/22)| | in a software test environment | (ref: G06F11/36)0.411
G06F11/0712in a virtual computing platform  e.g. logically partitioned systems0.411
G06F11/0709in a distributed system consisting of a plurality of standalone computer nodes  e.g. clusters  client-server systems0.411
G06F11/0751Error or fault detection not based on redundancy | power supply failures | (ref: G06F1/30)| | network fault management | (ref: H04L41/06)0.411
H04L67/30involving profiles0.411
G16H10/60for patient-specific data  e.g. for electronic patient records0.410
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)0.410
H04L43/067for time frame related reporting0.410
H04L43/0876Network utilization0.410
G06F21/645using a third party0.410
G06F3/065Replication mechanisms0.409
H04L29/06965at the transport layer  e.g. SSL  TLS0.409
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]0.408
H04L67/2857involving storage of data provided by user terminals  i.e. reverse caching0.408
G06F3/1454involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays  e.g. teledisplay0.408
G06Q30/0601Electronic shopping0.406
H04L67/1002for accessing one among a plurality of replicated servers  e.g. load balancing | arrangements or protocols for peer-to-peer networking | (ref: H04L67/104)| | protocols for client-server architectures | (ref: H04L67/42)| | allocation of processing resources to service requests in a distributed system | (ref: G06F9/5027)| | rebalancing the processing load in a distributed system | (ref: G06F9/5083)| | wireless network traffic load balancing | (ref: H04W28/08)| | network load balancing  traffic engineering | (ref: H04L47/125)| | video servers using load balancing strategies | (ref: H04N21/23103)|0.406
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols0.406
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model0.405
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)0.405
H04L67/20involving third party service providers | e-commerce | (ref: G06Q30/00)0.403
H04L67/04adapted for terminals or networks with limited resources or for terminal portability  e.g. wireless application protocol [WAP] | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)0.403
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)0.403
H04L63/123received data contents  e.g. message integrity0.403
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)0.403
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.402
G06F21/36by graphic or iconic representation0.402
G06F21/577Assessing vulnerabilities and evaluating computer system security0.401
G06Q20/145Payments according to the detected use or quantity0.400
G06F21/41where a single sign-on provides access to a plurality of computers0.400
G06F21/6272by registering files or documents with a third party0.400
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.400
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)0.400
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences0.399
G06F21/54by adding security routines or objects to programs0.397
G06F21/563by source code analysis0.397
H04W12/12Fraud detection0.397
G06F8/70Software maintenance or management0.397
H04L1/0025Transmission of mode-switching indication0.397
G06F9/543User-generated data transfer  e.g. clipboards  dynamic data exchange [DDE]  object linking and embedding [OLE]0.397
H04L67/32for scheduling or organising the servicing of application requests  e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources | computer conference arrangements | (ref: H04L12/1813)| | broadcast or conference with schedule organisation | (ref: H04L12/1881)| | network service management  ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | intermediate grouping or aggregating of service requests | (ref: H04L67/2833)0.397
H04L67/104for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer  upload  download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r0.397
H04L67/2838for integrating service provisioning from a plurality of service providers | web site content organization and management | (ref: G06F17/3089)0.397
H04L61/2539for hiding addresses or keeping them anonymous0.397
H04L29/12characterised by the data terminal | contains provisionally no documents0.397
H04L61/2557Translation policies and rules0.397
H04L61/2575using address mapping retrieval  e.g. simple traversal of user datagram protocol through NAT [STUN]0.397
H04L61/2503Internet protocol [IP] address translation0.396
H04L65/102Gateways | arrangements for connecting between networks having differing types of switching systems  e.g. gateways | (ref: H04L12/66)0.396
H04L45/74Address processing for routing0.396
H04L12/4604LAN interconnection over a backbone network  e.g. Internet  Frame Relay0.396
H04L69/08Protocols for interworking or protocol conversion | arrangements for connecting between networks having differing types of switching systems  e.g. gateways  | (ref: H04L12/66)| | network management protocols conversion | (ref: H04L41/0226)0.396
H04L67/1021based on client or server locations0.396
H04L43/0852Delays0.396
H04L7/0008Synchronisation information channels  e.g. clock distribution lines0.396
G06F9/50Allocation of resources  e.g. of the central processing unit [CPU]0.396
G06F9/505considering the load0.396
G06F9/48Program initiating| Program switching  e.g. by interrupt0.396
G06F9/4806Task transfer initiation or dispatching0.396
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence0.396
G06F9/4875with migration policy  e.g. auction  contract negotiation0.396
H04L63/164at the network layer0.395
G06F3/0605by facilitating the interaction with a user or administrator0.395
H04L41/147for prediction of network behaviour0.395
G06F3/0664at device level  e.g. emulation of a storage device or system0.395
G06F11/2041with more than one idle spare processing component0.394
G06F11/2028eliminating a faulty processor or activating a spare0.394
H04L67/2814for data redirection | load balancing of replicated servers | (ref: H04L67/1002)| | access network selection | (ref: H04L12/5691)| | routing or path finding of packets | (ref: H04L45/00)| | content or context based routing | (ref: H04L67/327)| | network addressing or naming provisions | (ref: H04L61/00)0.393
H04L49/356Storage area network switches0.393
H04L12/6418Hybrid transport0.393
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)0.393
H04W4/029Location-based management or tracking services0.393
H04L9/0872using geo-location information  e.g. location data  time  relative position or proximity to other entities0.393
G06F9/5038considering the execution order of a plurality of tasks  e.g. taking priority or time dependency constraints into consideration | scheduling strategies | (ref: G06F9/4881)|  and subgroups0.392
G06F21/80in storage media based on magnetic or optical technology  e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00)0.392
H04N1/444to a particular document or image or part thereof0.391
H04N1/00875Inhibiting reproduction  e.g. by disabling reading or reproduction apparatus0.391
H04N1/00859Issuing an alarm or the like0.391
G06K9/00469Document understanding by extracting the logical structure  e.g. chapters  sections  columns  titles  paragraphs  captions  page number  and identifying its elements  e.g. author  keywords  ZIP code  money amount0.391
H04N1/00846based on detection of a dedicated indication  e.g. marks or the like0.391
G06K9/00456Classification of image contents  e.g. text  photographs  tables | discrimination based on image tones | (ref: H04N1/40062)0.391
H04W12/02Protecting privacy or anonymity0.391
G06F21/45Structures or tools for the administration of authentication0.390
H04L29/08Transmission control procedure  e.g. data link level control procedure0.390
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals0.389
H04L49/354Support for virtual LAN  VLAN tagging or multiple registration  e.g. according to IEEE 802.1q0.389
H04L45/54Organization of routing tables0.389
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes0.389
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme0.388
G06F12/1009using page tables  e.g. page table structures0.388
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)0.387
H04L41/0809Plug-and-play configuration0.387
G06T1/20Processor architectures| Processor configuration  e.g. pipelining0.387
G09G5/001Arbitration of resources in a display system  e.g. control of access to frame buffer by video controller and/or main processor0.387
G09G5/363Graphics controllers0.387
G06F13/14Handling requests for interconnection or transfer0.387
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.387
G06F15/167using a common memory  e.g. mailbox0.387
G06F3/0689Disk arrays  e.g. RAID  JBOD0.386
H04L12/462LAN interconnection over a bridge based backbone0.386
H04L63/0263Rule management0.386
H04L63/108when the policy decisions are valid for a limited amount of time0.386
H04L61/30Arrangements for managing names  e.g. use of aliases or nicknames | retrieval from the Internet by using information identifiers  e.g. uniform resource locators [URLs] | (ref: G06F17/30876)| | name-to-address mapping | (ref: H04L61/15)0.386
H04L65/4084Content on demand | analog television systems using two way working | (ref: H04N7/173)| | end-user applications for requesting content  additional data or services | (ref: H04N21/472)0.385
H04L69/03Protocol definition or specification | protocol conformance testing | (ref: H04L1/244)| | specification techniques | (ref: G06F8/10)0.385
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.385
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]0.384
G06F3/0632by initialisation or re-initialisation of storage systems0.384
H04L51/16including conversation history  e.g. threads0.384
G06Q10/107Computer aided management of electronic mail | electronic mail protocols | (ref: H04L29/06)| | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)0.384
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.384
G06Q20/322Aspects of commerce using mobile devices [M-devices]0.384
G06Q20/12specially adapted for electronic shopping systems0.384
G06Q20/3278RFID or NFC payments by means of M-devices0.383
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.383
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities0.383
G06Q20/3224Transactions dependent on location of M-devices0.383
G06Q20/40145Biometric identity checks0.383
G06F9/542Event management| Broadcasting| Multicasting| Notifications0.383
G06F21/568eliminating virus  restoring damaged files0.383
H04L67/306User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867)0.383
G06F9/4451User profiles  roaming | user profiles for network-specific applications | (ref: H04L67/306)0.383
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]0.383
G06F9/5066Algorithms for mapping a plurality of inter-dependent sub-tasks onto a plurality of physical CPUs | mappping at compile time  | see|  | (ref: G06F8/451)0.383
H04L69/40Techniques for recovering from a failure of a protocol instance or entity  e.g. failover routines  service redundancy protocols  protocol state redundancy or protocol service redirection in case of a failure or disaster recovery | network fault management | (ref: H04L41/06)| | route fault recovery in network routing | (ref: H04L45/28)| | fault recovery in packet switches | (ref: H04L49/557)| | reactions to failures of replicated servers by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | intermediate processing of oper0.382
H04L67/2823for conversion or adaptation of application content or format | message adaptation based on network or terminal capabilities | (ref: H04L51/06)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)| | optimising visualization of content for web browsing | (ref: G06F17/30905)0.382
H04L41/06involving management of faults or events or alarms0.382
H04L65/105Proxies  e.g. SIP proxies0.382
H04L45/34Source routing0.382
H04L29/06characterised by a protocol0.381
G06F9/546Message passing systems or structures  e.g. queues0.381
H04L12/465wherein a single frame includes a plurality of VLAN tags0.381
H04L63/0478applying multiple layers of encryption  e.g. nested tunnels or encrypting the content with a first key and then with at least a second key | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.380
H04W8/205Transfer to or from user equipment or user record carrier0.380
G06F11/2023Failover techniques0.380
G06F11/1433during software upgrading0.380
G06F11/20using active fault-masking  e.g. by switching out faulty elements or by switching in spare elements0.380
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)0.380
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)0.380
G06F3/0631by allocating resources to storage systems0.379
G06F3/0604Improving or facilitating administration  e.g. storage management0.379
G06F9/5011the resources being hardware resources other than CPUs  Servers and Terminals0.379
G06F3/0661Format or protocol conversion arrangements0.379
G06F9/5016the resource being the memory0.379
H04L69/18Multi-protocol handler  e.g. single device capable of handling multiple protocols | multilayer or multiprotocol switches | (ref: H04L49/602)0.379
H04L43/08Monitoring based on specific metrics0.379
H04L41/22using GUI [Graphical User Interface]0.379
H04L12/1813for computer conferences  e.g. chat rooms | protocols for multimedia communication | (ref: H04L29/06027)| | signaling and real-time protocols for multimedia conference | (ref: H04L29/06414)| | instant messaging | (ref: H04L51/04)| | telephonic conference arrangements | (ref: H04M3/56)| | television conference systems | (ref: H04N7/15)0.378
G06Q10/101Collaborative creation of products or services0.378
G06F9/441Multiboot arrangements  i.e. selecting an operating system to be loaded0.378
H04L43/50Testing arrangements0.377
H04L67/08adapted for terminal emulation  e.g. telnet | protocols for telewriting or protocols for networked simulations  virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455)0.377
G06F3/0641De-duplication techniques0.377
G06F9/468Specific access rights for resources  e.g. using capability register0.377
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]0.377
G06Q20/3821Electronic credentials0.377
G06Q20/351Virtual cards0.377
G06F11/3495for systems0.377
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)0.376
G06F21/6236between heterogeneous systems0.376
G06F21/42using separate channels for security data0.376
G06F13/1663Access to shared memory0.376
H04W76/10Connection setup0.376
G06F21/73by creating or determining hardware identification  e.g. serial numbers0.376
H04M3/42178by downloading data to substation equipment0.376
H04W4/20Services signaling| Auxiliary data signalling  i.e. transmitting data via a non-traffic channel0.376
H04M3/42272whereby the subscriber registers to the terminals for personalised service provision0.376
H04W4/16Communication-related supplementary services  e.g. call-transfer or call-hold0.376
G06F9/5022Mechanisms to release resources0.376
G06F9/5061Partitioning or combining of resources0.376
G06F17/303Database migration support0.376
H04L51/12with filtering and selective blocking capabilities0.375
H04L41/5025by proactively reacting to service quality change  e.g. degradation or upgrade  by reconfiguration | mere recovery after a network faults | (ref: H04L41/0654)0.375
H04L41/5009Determining service level performance  e.g. measuring SLA quality parameters  determining contract or guarantee violations  response time or mean time between failure [MTBF] | monitoring performance metrics on a simple network level | (ref: H04L43/08)0.375
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)0.375
G06F15/7871Reconfiguration support  e.g. configuration loading  configuration switching  or hardware OS0.375
G06F12/12Replacement control0.375
G06F12/084with a shared cache0.375
G06F11/0784Routing of error reports  e.g. with a specific transmission path or data flow0.374
G06F9/4862the task being a mobile agent  i.e. specifically designed to migrate0.374
H04L9/003for power analysis  e.g. differential power analysis [DPA] or simple power analysis [SPA]0.373
H04L61/20Address allocation | configuration management of network or network elements | (ref: H04L41/08)0.373
H04L61/609involving geographic information  e.g. room number0.373
H04L61/2061involving aspects of pools of addresses  e.g. assignment of different pools of addresses to different dynamic host configuration protocol [DHCP] servers0.373
H04L41/0896Bandwidth or capacity management  i.e. automatically increasing or decreasing capacities  e.g. bandwidth on demand | reallocation of resources  renegotiation of resources  e.g. in-call | (ref: H04L47/76)0.373
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)0.373
G06F9/44521Dynamic linking or loading| Link editing at or after load time  e.g. Java class loading0.373
H04L41/0883Semiautomatic configuration  e.g. proposals from system0.372
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)0.372
H04L41/5022by giving priorities  e.g. assigning classes of service0.372
G06F12/1027using associative or pseudo-associative address translation means  e.g. translation look-aside buffer [TLB]0.372
G06F12/1475in a virtual system  e.g. with translation means0.372
G06F12/109for multiple virtual address spaces  e.g. segmentation | (ref: G06F12/1036)|  takes precedence0.372
G06Q20/32using wireless devices0.372
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)0.372
G06Q20/3823combining multiple encryption tools for a transaction0.372
G06Q20/3829involving key management0.372
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)0.372
G06F11/3442for planning or managing the needed capacity0.372
G06F12/1441for a range0.372
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)0.372
G06F9/4893taking into account power or heat criteria | power management in computers in general | (ref: G06F1/3203)| | thermal management in computers in general | (ref: G06F1/206)0.372
G06F9/5094where the allocation takes into account power or heat criteria | power management in computers in general | (ref: G06F1/3203)| | thermal management in computers in general | (ref: G06F1/206)0.372
G06F9/4881Scheduling strategies for dispatcher  e.g. round robin  multi-level priority queues0.372
H04L29/0863provided for signalling methods or particular messages providing extensions to IETF  ITU  ETSI or 3GPP protocols  e.g. additional proprietary messages  standard messages enhanced by additional header fields or standard messages being used for purposes other than originally intended0.372
H04L47/12Congestion avoidance or recovery0.372
H04L67/147provided for signalling methods or particular messages providing extensions to IETF  ITU  ETSI or 3GPP protocols  e.g.  additional proprietary messages  standard messages enhanced by additional header fields or standard messages being used for purposes other than originally intended0.372
G06F1/3209Monitoring remote activity  e.g. over telephone line  network connection0.371
G06F12/023Free address space management0.371
G06F12/1416by checking the object accessibility  e.g. type of access defined by the memory independently of subject rights | (ref: G06F12/1458)|  takes precedence0.371
H04L9/3297involving time stamps  e.g. generation of time stamps0.370
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.370
G06F12/1072Decentralised address translation  e.g. in distributed shared memory systems0.370
H04L45/302Route determination based on requested QoS0.370
G06F9/545where tasks reside in different layers  e.g. user- and kernel-space0.370
G06F9/3017Runtime instruction translation  e.g. macros0.370
H04L41/044Arrangements involving a hierarchical management structure0.370
H04L61/2592involving tunneling or encapsulation | providing a confidential data exchange among entities communicating through data packet networks | (ref: H04L63/04)0.370
H04L61/6059Internet protocol version 6 [IPv6] addresses0.370
H04L47/827Aggregation of resource allocation or reservation requests0.370
H04L41/0846based on copy from other elements0.369
H04L41/5058Service discovery by the service manager | automatically determining the actual topology of a network | (ref: H04L41/12)| | topology discovery for routing | (ref: H04L45/02)| | arrangements for service discovery  e.g. service location protocol | (ref: H04L67/16)0.369
H04L12/14Metering |  charging | or billing|  arrangements | specially adapted for data wireline or wireless communications | payment schemes  architectures or protocols | per se|  | (ref: G06Q20/00)0.369
G06F11/1471involving logging of persistent data for recovery0.369
G06F13/42Bus transfer protocol  e.g. handshake| Synchronisation0.369
G06K9/6256Obtaining sets of training patterns| Bootstrap methods  e.g. bagging  boosting0.369
H04L41/0863by rolling back to previous configuration versions0.369
H04L49/65Fast packet switch re-configuration0.369
H04L49/557Error correction  e.g. fault recovery or fault tolerance0.369
H04L41/0859by keeping history of different configuration generations or versions0.369
G06F13/4068Electrical coupling0.369
G06F9/00Arrangements for program control  e.g. control units | program control for peripheral devices | (ref: G06F13/10)0.369
H04L29/08144Network arrangements or communication protocol arrangements for accessing one among a plurality of replicated servers  e.g. load balancing | rebalancing the processing load in a distributed system | (ref: G06F9/5083)| | arrangements for peer-to-peer networking | (ref: H04L29/08306)| | wireless network traffic load balancing | (ref: H04W28/08)| | network load balancing  traffic engineering | (ref: H04L47/125)| | video servers using load balancing strategies | (ref: H04N21/23103)0.369
H04L45/64using an overlay routing layer | Peer-to-Peer networks | (ref: H04L67/104)0.368
H04L49/3009Header conversion  routing tables or routing tags0.368
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner0.368
H04L43/04Processing of captured monitoring data0.368
G06F9/4405Initialisation of multiprocessor systems0.368
H04L9/302involving the integer factorization problem  e.g. RSA or quadratic sieve [QS] schemes0.368
G06F3/0683Plurality of storage devices0.368
G06Q20/367involving intelligent token  e.g. electronic purse0.368
G06F13/1668Details of memory controller0.368
G06F11/14Error detection or correction of the data by redundancy in operation | (ref: G06F11/16)|  takes precedence0.368
G06F11/2038with a single idle spare processing component0.368
G06F11/2097maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)|  and subgroups0.368
G06F11/1451by selection of backup contents0.368
G06F11/1658Data re-synchronization of a redundant component  or initial sync of replacement  additional or spare unit0.368
H04L41/08Configuration management of network or network elements | proprietary application protocols for remote control of end-devices in special networking environments | (ref: H04L67/125)| | automatic configuration specially adapted for wireless networks | (ref: H04W24/02)0.368
G06F11/2048where the redundant components share neither address space nor persistent storage0.368
H04L9/0836using tree structure or hierarchical structure0.368
G06F13/385for adaptation of a particular data processing system to different peripheral devices0.368
G06F9/4812by interrupt  e.g. masked0.367
G06Q99/00Subject matter not provided for in other groups of this subclass0.367
G06F9/4403Processor initialisation0.367
G06F12/1491in a hierarchical protection system  e.g. privilege levels  memory rings0.367
G06F12/1458by checking the subject access rights0.367
H04L65/4061"Push-to-X" services | push-to-talk services in wireless networks | (ref: H04W4/10)| | connection management  e.g. connection set-up  manipulation or release for push-to-talk or push-on-call services in wireless communication networks | (ref: H04W76/45)0.367
H04L67/1017based on a round robin mechanism0.367
H04M7/006Networks other than PSTN/ISDN providing telephone service  e.g. Voice over Internet Protocol (VoIP)   including next generation networks with a packet-switched transport layer | (ref: H04L65/00)|  takes precedence| aspects not specific to the type of network | (ref: H04M3/00)| | special services in those networks | (ref: H04M3/42)0.367
H04W4/08User group management0.367
H04L41/5041Service implementation0.367
H04L65/1073Registration | arrangements for addressing or naming in data networks | (ref: H04L61/00)0.367
H04L41/0826for network cost reduction0.366
G06Q10/0631Resource planning  allocation or scheduling for a business operation0.366
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)0.366
G06F12/1433for a module or a part of a module0.366
H04L61/1523using lightweight directory access protocol [LDAP]0.366
H04L9/0841involving Diffie-Hellman or related key agreement protocols0.366
G06F21/725operating on a secure reference time value0.365
G06F1/08Clock generators with changeable or programmable clock frequency0.365
H04L67/142provided for managing session state for stateless protocols| Signalling a session state| State transitions| Keeping-state mechanisms0.365
H04W64/003locating network equipment0.365
G06F3/1225Software update  e.g. print driver  modules  plug-ins  fonts0.365
G06F3/1226Discovery of devices having required properties0.365
G06F3/1285Remote printer device  e.g. being remote from client or server0.365
G06F3/1292Mobile client  e.g. wireless printing0.365
H04W8/005Discovery of network devices  e.g. terminals0.365
G06F3/1204resulting in reduced user or operator actions  e.g. presetting  automatic actions  using hardware token storing data0.365
G06F3/1205resulting in increased flexibility in print job configuration  e.g. job settings  print requirements  job tickets0.365
G06Q30/04Billing or invoicing |   e.g. tax processing in connection with a sale0.365
G06F15/76Architectures of general purpose stored program computers | with program plugboard | (ref: G06F15/08)| | multicomputers | (ref: G06F15/16)0.365
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.365
G06F8/71Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management0.365
G06F21/565by checking file integrity0.364
G06F21/86Secure or tamper-resistant housings0.364
G06F11/3664Environments for testing or debugging software0.364
H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence  e.g. one-time-pad [OTP] or Vernam's cipher0.364
H04L12/2825Reporting to a device located outside the home and the home network | access arrangements | (ref: H04L12/2856)| | protocols for network applications involving the use of web-based technology for remote control or remote monitoring | (ref: H04L29/08099)| | telephonic communication systems adapted for combination with telemetering systems | (ref: H04M11/002)0.364
G06F11/3652in-circuit-emulation [ICE] arrangements0.364
G06T15/005General purpose rendering architectures0.364
G06F13/4027using bus bridges | (ref: G06F13/4022)|  takes precedence0.364
G06F15/7892Reconfigurable logic embedded in CPU  e.g. reconfigurable unit0.364
G06F9/30Arrangements for executing machine instructions  e.g. instruction decode | for executing microinstructions | (ref: G06F9/22)0.363
G06F11/3409for performance assessment0.363
H04L41/022Multivendor or multistandard integration0.363
H04L61/6013Proxying of addresses0.363
H04L63/1458Denial of Service0.363
G06F15/161Computing infrastructure  e.g. computer clusters  blade chassis or hardware partitioning | casings  cabinets  racks or drawers for data centers | (ref: H05K5/00)0.363
G06F12/0623for memory modules0.363
H04W60/00Registration  e.g. affiliation to network| De-registration  e.g. terminating affiliation0.363
H04W28/16Central resource management| Negotiation of resources | or communication parameters|   e.g. negotiating bandwidth or QoS [Quality of Service]0.363
H04W8/26Network addressing or numbering for mobility support0.363
G06Q10/00Administration| Management0.363
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.363
G06F8/654using techniques specially adapted for alterable solid state memories  e.g. for EEPROM or flash memories0.363
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.362
H04L45/02Topology update or discovery | topology discovery for network management | (ref: H04L41/12)| | LAN interconnection over a backbone network | (ref: H04L12/4604)| | node-based peer discovery mechanisms in peer-to-peer networks | (ref: H04L67/1061)0.362
G06F11/1448Management of the data involved in backup or backup restore0.362
G06F9/442Shutdown0.362
H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP  | (ref: H04W80/04)0.362
H04L69/12Protocol engines  e.g. VLSIs or transputers0.362
H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture| Specification of modified or new header fields | protocols engines in general | (ref: H04L69/12)| | OSI stack based layering aspects | (ref: H04L69/32)| | protocol header analysis in general | (ref: H04L69/22)| | addressing aspects in multiple interfaces involving dual-stack hosts | (ref: H04L61/6086)0.362
H04L69/324in the data link layer  i.e. layer two  e.g. HDLC | arrangements for detecting or preventing errors in the information received | (ref: H04L1/00)| | bus networks | (ref: H04L12/40)0.362
G06Q50/184Intellectual property management0.362
G06F13/4282on a serial bus  e.g. I2C bus  SPI bus | on daisy chain buses | (ref: G06F13/4247)0.361
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries0.361
H04L43/10using active monitoring  e.g. heartbeat protocols  polling  ping  trace-route0.361
H04L41/145involving simulating  designing  planning or modelling of a network0.361
G06F17/3053using ranking0.361
G06F17/30489Aggregation and duplicate elimination0.361
G06N5/00Computer systems utilising knowledge based models0.361
G06F9/4887involving deadlines  e.g. rate based  periodic0.361
G06F11/008Reliability or availability analysis0.361
G06F11/30Monitoring0.361
G06F11/3433for load management | allocation of a server based on load conditions | (ref: G06F9/505)| | load rebalancing | (ref: G06F9/5083)| | redistributing the load in a network by a load balancer | (ref: H04L67/1029)0.361
G06F9/461Saving or restoring of program or task context0.361
G06F21/70Protecting specific internal or peripheral components  in which the protection of a component leads to protection of the entire computer0.361
H04L41/5003Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]0.360
G06F11/3048where the topology of the computing system or computing system component explicitly influences the monitoring activity  e.g. serial  hierarchical systems0.360
G06F11/3072where the reporting involves data filtering  e.g. pattern matching  time or event triggered  adaptive or policy-based reporting0.360
H04L41/5038Testing of service level quality  e.g. simulating service usage0.360
G09C1/00Apparatus or methods whereby a given sequence of signs  e.g. an intelligible text  is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00)0.360
H04L67/325whereby a time schedule is established for servicing the requests0.360
H04W4/21for social networking applications0.360
G06F21/6263during internet communication  e.g. revealing personal data from cookies0.360
H04L67/1025dynamic adaptation of the criteria on which the server selection is based0.360
G06F9/4552Involving translation to a different instruction set architecture  e.g. just-in-time translation in a JVM0.360
G06F12/0842for multiprocessing or multitasking0.360
G06F21/82Protecting input  output or interconnection devices0.360
H04L65/60Media handling  encoding  streaming or conversion0.359
G06F8/658Incremental updates| Differential updates0.359
H04L45/566Routing instructions carried by the data packet  e.g. active networks0.359
H04L67/2871Implementation details of a single intermediate entity0.359
H04W12/00Security arrangements  e.g. access security or fraud detection| Authentication  e.g. verifying user identity or authorisation| Protecting privacy or anonymity0.359
H04L9/0833involving conference or group key | network architectures or network communication protocols for key management in group communication in a packet data network | (ref: H04L63/065)0.359
H04L69/164Adaptation or special uses of UDP protocol0.359
H04L9/3218using proof of knowledge  e.g. Fiat-Shamir  GQ  Schnorr  ornon-interactive zero-knowledge proofs0.359
H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation | means for verifying the identity or the authority of a user of a secure or secret communication system | (ref: H04L9/32)0.359
H04L41/14involving network analysis or design  e.g. simulation  network model or planning | network monitoring | (ref: H04L43/00)0.359
H04L63/16Implementing security features at a particular protocol layer0.359
H04W28/12using signalling between network elements0.358
H04L41/18Arrangements involving CNM [Customer Network Management]0.358
H04L43/0888Throughput0.358
H04L41/0663involving offline failover planning0.358
G06F9/24Loading of the microprogram0.358
H04L67/36involving the display of network or application conditions affecting the network application to the application user | graphical user interfaces for network management | (ref: H04L41/22)0.358
H04L47/125Load balancing  e.g. traffic engineering | load balancing among servers | (ref: H04L67/1002)0.358
H04W16/06Hybrid resource partitioning  e.g. channel borrowing0.358
H04L41/20Network management software packages0.358
H04L67/26Push based network services | broadcast or multicast push services | (ref: H04L12/1859)0.358
H04W28/08Load balancing or load distribution0.358
G06F2209/5021Priority0.119
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.119
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.119
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.081
H04L2209/72Signcrypting  i.e. digital signing and encrypting simultaneously0.081
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.081
G06F2212/652Page size control0.081
H04L2209/24Key scheduling  i.e. generating round keys or sub-keys for block encryption0.081
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.081
H04L2209/127Trusted platform modules [TPM]0.081
G06F2221/2153Using hardware token as a secondary aspect0.078
G06F2009/45562Creating  deleting  cloning virtual machine instances0.078
G06F2221/2149Restricted operating environment0.076
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.076
G06F2221/2115Third party0.076
G06F2221/033Test or assess software0.076
G06F2221/2107File encryption0.076
G06F2212/1052Security improvement0.074
G06F2221/2101Auditing as a secondary aspect0.072
G06F2221/2117User registration0.072
G06F2221/2129Authenticate client device independently of the user0.072
G06F2221/2103Challenge-response0.072
G06F9/44Arrangements for executing specific programs0.072
G06F2009/45575Starting  stopping  suspending  resuming virtual machine instances | program initiating | (ref: G06F9/445)| | task life-cycle in general | (ref: G06F9/485)0.071
G06F2221/034Test or assess a computer or a system0.071
G06F2209/5015Service provider selection0.071
G06F2221/2105Dual mode as a secondary aspect0.070
H04L61/2015using the dynamic host configuration protocol [DHCP] or variants0.070
H04L61/2507translating between special types of IP addresses0.070
G06F2009/45591Monitoring or debugging support | monitoring and debugging in general in | (ref: G06F11/30)|   | (ref: G06F11/36)0.070
G06F2201/815Virtual | middleware or OS functionality using virtual machines to implement generic software techniques for error detection or fault masking | (ref: G06F11/1484)0.070
G06F2221/2147Locking files0.070
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.070
G06F2009/45579I/O management (device drivers  storage access) | internal functioning of device drivers | (ref: G06F13/102)|   loading of device drivers | (ref: G06F9/4411)0.070
G06F3/062Securing storage systems0.069
G06F9/3891organised in groups of units sharing resources  e.g. clusters0.069
G06F2221/2137Time limited access  e.g. to a computer or data0.069
H04L2463/041using an encryption or decryption engine integrated in transmitted data0.069
G06F2209/549Remote execution0.069
G16H40/20for the management or administration of healthcare resources or facilities  e.g. managing hospital staff or surgery rooms0.068
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.068
G09G2358/00Arrangements for display data security0.068
G09G2370/022Centralised management of display operation  e.g. in a server instead of locally0.068
G09G2360/121using a cache memory0.068
G09G2370/025LAN communication management0.068
G06F2212/402Encrypted data0.068
G06F2209/5011Pool0.068
Y02D10/00Energy efficient computing0.067
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.067
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.067
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.067
G06F2221/2125Just-in-time application of countermeasures  e.g.  on-the-fly decryption  just-in-time obfuscation or de-obfuscation0.067
H04L12/2856Access arrangements  e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W)0.066
G06F11/2071using a plurality of controllers0.066
G06F2209/502Proximity0.066
H04L45/28Route fault recovery | network fault recovery | (ref: H04L41/0654)0.066
H04W88/02Terminal devices0.065
G06F2221/07Indexing scheme relating to | (ref: G06F21/10)|   protecting distributed programs or content0.065
G06Q20/00Payment architectures  schemes or protocols | apparatus for performing or posting payment transactions | (ref: G07F7/08)|   | (ref: G07F19/00)| | electronic cash registers | (ref: G07G1/12)0.065
H04L61/2084involving portability aspects | network addressing or numbering for mobility support | (ref: H04W8/26)| | wireless network layer protocols  e.g. mobile IP | (ref: H04W80/04)0.065
H04L12/00Data switching networks | interconnection of  or transfer of information or other signals between  memories  input/output devices or central processing units | (ref: G06F13/00)0.065
G06F3/0623in relation to content0.065
G06F2212/154Networked environment0.065
G06Q30/06Buying  selling or leasing transactions0.065
Y02D10/22Resource allocation0.065
Y02D10/36Resource sharing0.065
H04L2209/122Hardware reduction or efficient architectures0.064
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.064
H04W88/04adapted for relaying to or from another terminal or user0.064
H04W88/06adapted for operation in multiple networks | or having at least two operational modes|   e.g. multi-mode terminals0.064
H04L2209/38Chaining  e.g. hash chain or certificate chain0.064
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.064
H04L45/126minimizing geographical or physical path length0.064
G06F2201/84Using snapshots  i.e. a logical point-in-time copy of the data0.063
G05B2219/33004Manual control of manipulator  machine0.063
G06F3/041Digitisers  e.g. for touch screens or touch pads  characterised by the transducing means0.063
G06F11/1446Point-in-time backing up or restoration of persistent data0.063
H04L41/5064Customer relationship management | arrangements involving customer network management  i.e. giving the customer access to network management functions | (ref: H04L41/18)0.063
H04L41/0856by archiving or backing up configuration information0.063
G06F21/40by quorum  i.e. whereby two or more security principals are required0.063
G06F2212/151Emulated environment  e.g. virtual machine0.063
G06F2201/865Monitoring of software0.063
H04L47/825Involving tunnels  e.g. MPLS0.063
G06F2221/2119Authenticating web pages  e.g. with suspicious links0.063
G06F2221/2133Verifying human interaction  e.g.  Captcha0.063
H04W4/18Information format or content conversion  e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals0.063
H04L2209/463Electronic voting0.063
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.063
H04M2203/554Data synchronization0.063
H04W76/12Setup of transport tunnels0.063
H04M2203/557Portable profiles0.063
G06F2009/45566Nested virtual machines0.063
H04L51/08Messages including annexed information  e.g. attachments0.063
H04L43/106by adding timestamps to packets0.062
Y02D30/30by signaling and coordination  e.g. signaling reduction  link layer discovery protocol [LLDP]  control policies  green TCP0.062
Y02D30/00High level techniques for reducing energy consumption in communication networks0.062
G06F2212/651Multi-level translation tables0.062
G06F12/1483using an access-table  e.g. matrix or list0.062
G06F2212/657Virtual address space management0.062
H04L2209/64Self-signed certificates0.062
G06F2221/2113Multi-level security  e.g. mandatory access control0.062
G06F2221/2131Lost password  e.g. recovery of lost or forgotten passwords0.062
G06F1/3231Monitoring user presence or absence0.062
G06F2212/152Virtualized environment  e.g. logically partitioned system0.062
G06F11/2046where the redundant components share persistent storage | (ref: G06F11/2043)|  takes precedence0.062
G06F11/1662the resynchronized component or unit being a persistent storage device | re-synchronization of failed mirror storage | (ref: G06F11/2082)| | rebuild or reconstruction of parity RAID storage | (ref: G06F11/1008)0.062
G06F2221/2151Time stamp0.062
H04L2209/60Digital content management  e.g. content distribution0.062
G06F2212/1016Performance improvement0.062
H04L65/80QoS aspects | monitoring of the downstream path of a video distribution network | (ref: H04N21/2402)|   | (ref: H04N21/44209)| | network service management  ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer | (ref: H04L41/50)| | monitoring arrangements  testing arrangements  with monitoring of QoS metrics | (ref: H04L43/08)| | traffic-type related flow control in packet switching networks  e.g. priorities or QoS | (ref: H04L47/24)| | admission control/resource reservation in packet switching networks based 0.062
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.062
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.062
H04L61/6068Internet protocol [IP] addresses subnets0.062
H04L2012/5617Virtual LANs| Emulation of LANs0.062
H04L12/4625Single bridge functionality  e.g. connection of two networks over a single bridge0.062
G06F2213/0038System on Chip0.062
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.061
G06F11/1458Management of the backup or restore process0.061
H04L2212/00Encapsulation of packets0.061
G06F2212/2542Non-uniform memory access [NUMA] architecture0.061
G06Q50/26Government or public services0.061
G06Q20/3674involving authentication0.061
H04L67/1034Reaction to server failures by a load balancer | network fault restoration | (ref: H04L41/0654)| | departure or maintenance mechanisms in Peer-to-Peer networks | (ref: H04L67/1048)| | intermediate processing providing operational support to end devices by emulation or by off-loading in the network | (ref: H04L67/2861)| | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)| | error detection or correction of the data by redundancy in hardware | (ref: G06F11/16)| | failing over workload from one server to another one | (ref: G06F11/202)0.061
G06F11/2094Redundant storage or storage space | (ref: G06F11/2056)|  takes precedence0.061
H04L61/2582through control of the NAT server  e.g. using universal plug and play [UPnP]0.061
G06F2201/805Real-time0.061
H04L61/2076involving update or notification mechanisms  e.g. update of a domain name server with dynamic host configuration protocol [DHCP] assigned addresses0.061
G06Q2220/18Licensing0.061
H04L9/0869involving random numbers or seeds0.061
H04L29/06755Authentication mechanisms0.061
H04L29/06823Access control0.061
G06F2209/5022Workload threshold0.061
H04L2209/30Compression  e.g. Merkle-Damgard construction0.061
G06F11/3688for test execution  e.g. scheduling of test suites0.061
G06F11/3672Test management0.061
G06F2201/875Monitoring of systems including the internet0.061
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.061
G06F2209/509Offload0.061
G06F2209/545Gui0.061
G06F2221/03Indexing scheme relating to | (ref: G06F21/50)|   monitoring users  programs or devices to maintain the integrity of platforms0.061
H04L9/008involving homomorphic encryption0.061
G06F2211/009Trust0.061
G06F9/45554Instruction set architectures of guest OS and hypervisor or native processor differ  e.g. Bochs or VirtualPC on PowerPC MacOS0.061
H04L67/1014based on the content of a request0.061
H04L67/1012based on compliance of requirements or conditions with available server resources0.061
H04L61/6009Caching of addresses | caching data temporarily at an intermediate stage in general | (ref: H04L67/2842)0.060
G06F2212/1041Resource optimization0.060
G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component  e.g. monitoring if the computing system is on  off  available  not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16)0.060
G06F2201/86Event-based monitoring0.060
G06F2221/0775Logging0.060
H04L61/1541for service discovery | network applications for service discovery | (ref: H04L67/16)| | discovery of network devices in wireless communication networks | (ref: H04W8/005)0.060
H04L61/10Mapping of addresses of different types| Address resolution0.060
H04L41/5083wherein the managed service relates to web hosting | web-based network application protocols | (ref: H04L67/02)| | web site content organization and management | (ref: G06F17/3089)| | video-hosting | (ref: H04N21/2743)0.060
H04L61/303Name structure0.060
H04L41/50Network service management  i.e. ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer0.060
H04L2209/46Secure multiparty computation  e.g. millionaire problem0.060
G06F2221/2139Recurrent verification0.060
G06F2221/2135Metering0.060
G06F11/3419by assessing time0.060
H04L63/162at the data link layer0.060
G06F2209/541Client-server0.060
G06F2207/7219Countermeasures against side channel or fault attacks0.060
G06F2221/0704Device0.060
Y04S40/00Communication or information technology specific aspects supporting electrical power generation  transmission  distribution or end-user application management0.060
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication0.060
G06F2221/0797using dedicated hardware at the client0.060
G06F2201/81Threshold0.060
G06F2212/1024Latency reduction0.060
G06F2213/0028Serial attached SCSI [SAS]0.060
G06F2213/0032Serial ATA [SATA]0.060
G06F2213/0008High speed serial bus  e.g. Fiber channel0.060
G06F2213/0042Universal serial bus [USB]0.060
G06F2213/0024Peripheral component interconnect [PCI]0.060
G06F2213/0036Small computer system interface [SCSI]0.060
Y04S40/20Information technology specific aspects0.060
H04L45/46Cluster building0.060
H04L45/42Centralized routing0.060
H04L45/04Interdomain routing  e.g. hierarchical routing0.060
H04L2209/42Anonymization  e.g. involving pseudonyms0.060
G06F2209/508Monitor0.060
G06F2209/501Performance criteria0.060
H04L2209/12Details relating to cryptographic hardware or logic circuitry0.060
G06F2212/656Address space sharing0.060
G06F12/0261using reference counting0.060
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.