Validity Report
Full Report
US7137140B2 — Transaction verification
Priority Date: 2000-07-18, Publication Date: 2006-11-14, Current Assignee: Simplex Patents CorpReport Generated: 2020-08-01

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP0793170B11.288System and methods for automatic configuration of home network computersGRANT2002-12-181996-02-2924457290GreatSun Microsystems IncSun Microsystems Inc
US6944773B11.238Method and apparatus for fingerprint authentication during on-line transactionsGRANT2005-09-132000-05-1934911044GreatSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
EP1157344B11.201PROXY SERVER AUGMENTING A CLIENT REQUEST WITH USER PROFILE DATAGRANT2002-11-201999-02-2622979704GreatAOL IncAOL Inc
EP1200940B11.191A SYSTEM AND METHOD FOR SECURE NETWORK PURCHASINGGRANT2007-10-101999-07-3027538275GreatSafewww IncEGI Internet Ltd, Safewww Inc, EGI Internet Ltd
US6041411A1.190Method for defining and verifying user access rights to a computer informationGRANT2000-03-211997-03-2825249498GreatSELFSERVE USA IncSELFSERVE USA Inc
US6018739A1.135Biometric personnel identification systemGRANT2000-01-251997-05-1525325216GreatRaytheon CoRaytheon Co
US6636620B11.120Personal identification authenticating with fingerprint identificationGRANT2003-10-211997-11-2818211496GreatNEC CorpNEC Corp
EP0981885B11.094APPARATUS AND METHOD FOR IDENTIFYING CLIENTS ACCESSING NETWORK SITESGRANT2005-12-141997-06-2521957298GreatInforonics IncInforonics Inc
EP1236185B11.092ELECTRONIC PAYMENT SYSTEM THROUGH A TELECOMMUNICATION NETWORKGRANT2005-04-271999-12-099553147GreatFrance Telecom SAOrange SA
EP0944980B11.056METHOD AND SYSTEM FOR IMPROVING SECURITY IN NETWORK APPLICATIONSGRANT2003-03-261996-12-0426708297GreatActivCard Ireland LtdActivCard Ireland Ltd
US5838790A1.051Advertisement authentication system in which advertisements are downloaded for off-line displayGRANT1998-11-171996-04-1924547140GreatJuno Online Services IncJuno Online Services Inc
EP1311961B11.041SYSTEM FOR SECURELY COMMUNICATING AMONGST CLIENT COMPUTER SYSTEMSGRANT2010-04-282000-06-0724359642GreatCyberFone Technologies IncCyberFone Technologies Inc
EP0978023B11.039SYSTEM AND METHOD FOR DISTRIBUTING SOFTWARE OVER A NETWORKGRANT2003-12-031996-08-1324769826GreatAngel Secure Networks IncAngel Secure Networks Inc
US6122737A1.038Method for using fingerprints to distribute information over a networkGRANT2000-09-191997-11-1425517993GreatDigital Persona IncDigital Persona Inc
EP0849921B11.036Apparatus and method for dispatching client method calls within a server computer systemGRANT2005-10-261996-12-2010804825GreatInternational Business Machines CorpInternational Business Machines Corp
EP1197032B11.035SERVER-ASSISTED REGENERATION OF A STRONG SECRET FROM A WEAK SECRETGRANT2007-08-221999-06-2927495484GreatVerisign IncVerisign Inc
EP1128627B11.024Apparatus and method for establishing communication in a computer networkGRANT2006-08-022000-02-218172721GreatSiemens AG, International Business Machines CorpSiemens AG, International Business Machines Corp
US6035403A1.023Biometric based method for software distributionGRANT2000-03-071996-09-1126700460GreatHUSH IncHUSH Inc
US6980970B21.022Secure networked transaction systemGRANT2005-12-271999-12-1622623016GreatDebit Net IncKioba Processing LLC
EP1018095B11.007STAND-ALONE BIOMETRIC IDENTIFICATION SYSTEMGRANT2005-03-231997-09-2525470632GreatRaytheon CoRaytheon Co
US7366702B21.005System and method for secure network purchasingGRANT2008-04-291999-07-3046277715GreatiPass IncIpass Ip LLC
EP1251653B10.998A method and apparatus for using network address information for network transactionsGRANT2005-04-061996-06-0324635134GreatWebTV Networks IncWebTV Networks Inc
US5903721A0.997Method and system for secure online transaction processingGRANT1999-05-111997-03-1325220513Greatcha Tech Services IncCHA! TECHNOLOGIES SERVICES Inc, cha Tech Services Inc
EP0960500B10.993METHOD FOR PROVIDING SECURE REMOTE COMMAND EXECUTIONGRANT2006-08-021997-02-1225175817GreatVerizon Laboratories IncVerizon Laboratories Inc
EP1177654B10.992METHOD AND SYSTEM FOR AUTHENTICATING USERSGRANT2012-06-201999-05-1123197812GreatOracle America IncOracle America Inc
EP1116367B10.990METHOD AND SYSTEM FOR MANAGING SECURE CLIENT-SERVER TRANSACTIONSGRANT2010-02-241999-06-3023355585GreatIntel CorpIntel Corp
US7359869B10.990Method and system for facilitating secure electronic transactions with multiple merchantsGRANT2008-04-152000-07-1439281681GreatStamps com IncStamps com Inc
EP0803105B10.984NETWORK SALES SYSTEMGRANT2002-02-061994-10-2423279668GreatOpen Market IncENIVID INC. LIQUIDATION TRUST, Soverain Software LLC, Data Return LLC
EP1046107B10.973AN APPARATUS  METHOD AND COMPUTER PROGRAM PRODUCT FOR CLIENT/SERVER COMPUTING WITH INTELLIGENT LOCATION OF TRANSACTION OBJECTSGRANT2002-06-121998-01-1610825335GreatInternational Business Machines CorpInternational Business Machines Corp
US6134593A0.959Automated method for electronic software distributionGRANT2000-10-171997-09-3025476822GreatCCComplete IncCCComplete Inc
US6523745B10.959Electronic transaction system including a fingerprint identification encodingGRANT2003-02-251997-08-0514180935GreatEnix CorpBMF Corp
EP0920664B10.959Methods to achieve minimum cost on-line accessGRANT2006-03-221996-07-0924720612GreatWebTV Networks IncWebTV Networks Inc
EP0820620B10.954ELECTRONIC PAYMENT METHOD FOR PURCHASE-RELATED TRANSACTIONS OVER A COMPUTER NETWORKGRANT1999-03-171995-04-149478147GreatG C TechGLOBE ID SOFTWARE
EP0924655B10.940Controlled access to doors and machines using fingerprint matchingGRANT2003-06-041997-12-2225541665GreatTRW IncNorthrop Grumman Space and Mission Systems Corp
EP1232482B10.938SECURE AND RECOVERABLE DATABASE FOR ON-LINE VALUE-BEARING ITEM SYSTEMGRANT2016-07-061999-10-1827496410GreatStamps com IncStamps com Inc
EP1033854B10.937System and method for anonymous access to the internetGRANT2005-12-141999-03-0422991966GreatPitney Bowes IncPitney Bowes Inc
EP1057097B10.936VERIFICATION OF SOFTWARE AGENTS AND AGENT ACTIVITIESGRANT2004-10-271998-12-2122810978GreatKoninklijke Philips NVKoninklijke Philips NV
EP1074949B10.935Integrated circuit board with fingerprint verification capabilityGRANT2003-06-041999-08-0225625979Great
EP0915590B10.930Method and system for secure lightweight transactions in wireless data networksGRANT2004-09-291997-11-1025512160GreatGreat Elm Capital Group IncGreat Elm Capital Group Inc
US8443200B20.929Biometric verification for electronic transactions over the webGRANT2013-05-142000-06-2919749464GreatKarsof Systems LLCSURESHWARA Inc
EP1047336B10.928DEVICE FOR AUTHENTICATING A PERSON ON THE BASIS OF HIS FINGERPRINTSGRANT2004-06-091998-01-169521831Great
EP1282887B10.926A BILLING SERVICE SYSTEM AND METHODGRANT2009-11-042000-05-1924295600Great
US6968458B10.925Apparatus and method for providing secure communication on a networkGRANT2005-11-222000-04-2835345089GreatEtsy IncEtsy Inc
EP1264259B10.924A NETWORK-BASED SYSTEMGRANT2007-02-282000-02-1111042562GreatInternet Payments LtdInternet Payments Patents Ltd
WO2001046917A20.918IDENTITY AUTHENTICATION USING TRANSACTION HISTORYAPPLICATION2001-06-281999-12-2023854765Great
EP1218838B10.917METHOD OF AND SYSTEM FOR AUTHORIZING PURCHASES MADE OVER A COMPUTER NETWORKGRANT2017-05-031999-09-0723546020GreatMastercard International IncMastercard International Inc
EP1147493B10.916METHOD AND APPARATUS FOR SECURELY TRANSMITTING AND AUTHENTICATING BIOMETRIC DATA OVER A NETWORKGRANT2013-10-091999-01-1822873537GreatIridian Technologies IncIridian Technologies Inc
EP0872097B10.912SECURED GATEWAY INTERFACEGRANT2002-02-061995-10-3124200519GreatInternational Business Machines CorpInternational Business Machines Corp
EP1072143B10.909SYSTEM FOR KEYING PROTECTED ELECTRONIC DATA TO PARTICULAR MEDIA TO PREVENT UNAUTHORIZED COPYINGGRANT2004-06-231998-04-1722036149GreatIomega CorpIomega Corp
WO1996018169A10.909TRANSACTION VERIFICATION APPARATUS & METHODAPPLICATION1996-06-131994-12-0626996343Great
EP1068571B10.906AN APPARATUS  METHOD AND COMPUTER PROGRAM PRODUCT FOR CLIENT/SERVER COMPUTING WITH CLIENT SELECTABLE LOCATION OF TRANSACTION OBJECTSGRANT2003-05-141998-03-3110829527GreatInternational Business Machines CorpInternational Business Machines Corp
EP0674260B10.899Transaction processing systemGRANT2002-08-281994-03-2122802986GreatInternational Business Machines CorpInternational Business Machines Corp
US6948168B10.891Licensed application installerGRANT2005-09-202000-03-3024152956GreatInternational Business Machines CorpActivision Publishing Inc
WO2001067202A20.891AUTHENTICATION TECHNIQUE FOR ELECTRONIC TRANSACTIONSAPPLICATION2001-09-132000-03-0622688628Great
US5793028A0.889Electronic transaction security systemGRANT1998-08-111996-06-2424684946GreatGRATZON FRED (N)SAFECLICK LLC
US6453301B10.887Method of using personal device with internal biometric in conducting transactions over a networkGRANT2002-09-172000-02-2324032299GreatSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US5748765A0.882Modifying a database using a fingerprint formGRANT1998-05-051992-10-2725512388GreatJasper Consulting Inc123 ID Inc
EP0796480B10.881METHOD AND APPARATUS FOR CONDUCTING COMPUTERIZED COMMERCEGRANT2002-05-021995-07-1023987782GreatCompaq Computer CorpCompaq Computer Corp
US6591249B20.878Touch scan internet credit card verification purchase processGRANT2003-07-082000-03-2624136731Great
EP0927958B10.876Postage metering network system with virtual meter modeGRANT2010-08-111997-12-1825539375GreatPitney Bowes IncPitney Bowes Inc
US7290288B20.875Method and system for controlling access  by an authentication server  to protected computer resources provided via an internet protocol networkGRANT2007-10-301997-06-1141118015GreatPrism Technologies LLCPrism Technologies LLC
US20010053239A10.871Credit card fraud elimination systemAPPLICATION2001-12-201997-11-1226834329GreatJasper Consulting Inc123 ID Inc
WO1999008242A10.870PROVIDING A TRANSACTION RECORDAPPLICATION1999-02-181997-08-058229457Great
EP1212732B10.864METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONSGRANT2004-01-211999-08-3127495993GreatAmerican Express Travel Related Services Co IncAmerican Express Travel Related Services Co Inc
EP1003139B10.864System and method for loading a stored-value card.GRANT2008-07-161997-04-3027239826GreatVisa International Service AssociationVisa International Service Association
WO2001022373A10.863METHOD AND SYSTEM FOR PERFORMING A TRANSACTION BETWEEN A CLIENT AND A SERVER OVER A NETWORKAPPLICATION2001-03-291999-09-2219866614Great
EP0931430B10.859METHOD OF USING FINGERPRINTS TO AUTHENTICATE WIRELESS COMMUNICATIONSGRANT2006-06-281996-09-1126700505Great
US5835911A0.849Software distribution and maintenance system and methodGRANT1998-11-101994-02-0827456262GreatFujitsu LtdFujitsu Ltd
US6721716B10.846Payment certification string and related electronic payment system and methodGRANT2004-04-131999-06-1723309252GreatMobius Management Systems IncMobius Management Systems Inc
US6189146B10.845System and method for software licensingGRANT2001-02-131998-03-1821913104GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US6233567B10.844Method and apparatus for software licensing electronically distributed programsGRANT2001-05-151997-08-2925444202GreatIntel CorpIntel Corp
US7302574B20.844Content identifiers triggering corresponding responses through collaborative processingGRANT2007-11-271999-05-1938819771GreatDigimarc CorpDigimarc Corp
EP0907935B10.835A SYSTEM AND METHOD FOR SECURE NETWORK ELECTRONIC PAYMENT AND CREDIT COLLECTIONGRANT2005-08-241996-04-2624566073GreatHP IncHP Inc
US7694345B20.833Authorising use of a computer programGRANT2010-04-062000-03-283820640GreatOptimiser Pty LtdFlexera Software LLC
US6270011B10.832Remote credit card authentication systemGRANT2001-08-071998-05-2826776559GreatTal BenensonElie Mimoun
US5899980A0.832Retail method over a wide area networkGRANT1999-05-041997-08-1125425110GreatTrivnet LtdTrivnet Ltd
EP0734556B10.830NETWORK BASED PAYMENT SYSTEM AND METHOD FOR USING SUCH SYSTEMGRANT2002-09-041993-12-1622611825GreatOpen Market IncENIVID INC. LIQUIDATION TRUST, Soverain Software LLC, Data Return LLC, Divine Tech Ventures
US20040133803A10.830Methods and apparatus for protecting informationAPPLICATION2004-07-081999-05-0523181353GreatRPX CorpRPX Corp
EP1030495B10.828Pre-navigate bean (including testing for download speed in determining whether to access HTTP records)GRANT2008-09-101998-05-2727536140GreatDiebold IncDiebold Nixdorf Inc
US7010697B20.828System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment softwareGRANT2006-03-071996-06-2826707371GreatProtexis IncIII Holdings 12 LLC
WO2000030051A10.827A METHOD AND APPARATUS FOR FACILITATING BUSINESS TRANSACTIONS OVER A NETWORK BY PROVIDING A RELIABLE VERIFICATION SOURCEAPPLICATION2000-05-251998-11-1822720362Great
US7885899B10.827System and method for secure network purchasingGRANT2011-02-082000-02-0843532017GreatiPass IncIpass Ip LLC
EP0961251B10.826Automated banking machine with accessing data based on customer inputs including biometric customer identification and producing selected displays based on customer identity (profile bean)GRANT2008-10-011998-05-2727536134GreatDiebold IncDiebold Nixdorf Inc
EP0961245B10.820Automated banking machine with a print URL featureGRANT2008-10-081998-05-2727536137GreatDiebold IncDiebold Nixdorf Inc
EP0961249B10.820System configuration where certain transaction devices are run through browser interface to HTTP and other devices are run responsive to messages in ATM legacy systemGRANT2008-10-081998-05-2727536136GreatDiebold IncDiebold Nixdorf Inc
EP0961247B10.818Automated transaction machine which operates responsive to HTML documents accessed with a browserGRANT2008-09-101998-05-2727536144GreatDiebold IncDiebold Nixdorf Inc
EP0961246B10.816Methods by which an ATM selectively accesses documents based on the transaction function devices present in the machineGRANT2008-10-081998-05-2727536133GreatDiebold IncDiebold Nixdorf Inc
US6148407A0.812Method and apparatus for producing computer platform fingerprintsGRANT2000-11-141997-09-3025476000GreatIntel CorpIntel Corp
WO2001013289A20.811A RETAIL METHOD OVER A WIDE AREA NETWORKAPPLICATION2001-02-221999-08-1623474704Great
WO2000004515A10.809A METHOD AND APPARATUS FOR FACILITATING BUSINESS TRANSACTIONS BETWEEN BUYERS NODES AND VENDORS NODES OVER A NETWORK BY PROVIDING A VERIFICATION NODEAPPLICATION2000-01-271998-07-1422359665Great
US6266640B10.803Data network with voice verification meansGRANT2001-07-241996-08-0624781326GreatDialogic CorpIntel Corp
US7711564B20.799Connected audio and other media objectsGRANT2010-05-041995-07-2727578053GreatDigimarc CorpDigimarc Corp
WO2001061603A10.797METHOD AND APPARATUS FOR PROVIDING FINANCIAL TRANSACTION DATA VIA THE INTERNETAPPLICATION2001-08-232000-02-1722672195Great
EP1301910B10.796METHOD FOR MAKING SECURE A TRANSACTION VIA A TELECOMMUNICATION NETWORK  AND SYSTEM THEREFORGRANT2009-03-182000-07-178852592Great
US7231068B20.793Electronic transaction verification systemGRANT2007-06-121998-06-1935125749GreatSolidus Networks IncBiometric Payment Solutions LLP
EP1198754B10.793ENHANCED SERVICE PLATFORM WITH SECURE SYSTEM AND METHOD FOR SUBSCRIBER PROFILE CUSTOMIZATIONGRANT2017-10-251999-07-2723423017GreatIntellectual Ventures I LLCIntellectual Ventures I LLC
US6056786A0.793Technique for monitoring for license compliance for client-server softwareGRANT2000-05-021997-07-1125401665GreatInternational Business Machines CorpInternational Business Machines Corp
US5903878A0.789Method and apparatus for electronic commerceGRANT1999-05-111997-08-2032074397GreatAppage CorpAppage Corp
WO2001013297A20.783METHOD FOR CONDUCTING FINANCIAL TRANSACTIONS OVER A WIDE AREA NETWORKAPPLICATION2001-02-221999-08-1423478404Great
WO1999066436A10.782VERIFIED PAYMENT SYSTEMAPPLICATION1999-12-231998-06-1922219761Great
EP0996895B10.782DATA TRANSACTION ASSEMBLY SERVERGRANT2005-11-161997-06-2025370386GreatCyberFone Technologies IncCYBERFONE TECHNOLOGIES INC.
WO2001041093A10.780A SYSTEM AND METHOD FOR CONDUCTING A FINANCIAL TRANSACTIONAPPLICATION2001-06-071999-12-0325588027Great
US5841888A0.776Method for fingerprint indexing and searchingGRANT1998-11-241996-01-2324356453GreatHarris CorpApple Inc
US7356847B20.769System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment softwareGRANT2008-04-081996-06-2846280518GreatProtexis IncIII Holdings 12 LLC
US6389541B10.769Regulating access to digital contentGRANT2002-05-141998-05-1522151232GreatFirst Union National BankDigital Reg of Texas LLC
US7308426B10.767System and methods for servicing electronic transactionsGRANT2007-12-111999-08-1123467828GreatMastercard Mobile Transaction Solutions IncMastercard Mobile Transaction Solutions Inc
US7349557B20.766Electronic transaction verification systemGRANT2008-03-251998-06-1936498481GreatSolidus Networks IncBiometric Payment Solutions LLP
US5708709A0.766System and method for managing try-and-buy usage of application programsGRANT1998-01-131995-12-0824276928GreatSun Microsystems IncOracle America Inc
WO2001054003A10.764SECURE INTERNET PAYMENT METHODAPPLICATION2001-07-262000-01-183700782Great
US7330871B20.762Online machine data collection and archiving processGRANT2008-02-122000-06-0722780938GreatTelecheck Services IncKount Inc
US6282522B10.761Internet payment system using smart cardGRANT2001-08-281997-04-3026723304GreatVisa International Service AssociationVisa International Service Association
EP1245008B10.761METHOD AND SYSTEM FOR SECURE AUTHENTICATED PAYMENT ON A COMPUTER NETWORKGRANT2010-12-291999-11-0923734921GreatArcot Systems LLCArcot Systems LLC
EP1240632B10.759PAYMENT TRANSACTION METHOD AND PAYMENT TRANSACTION SYSTEMGRANT2003-06-041999-12-234551757GreatSwisscom Mobile AGSwisscom Schweiz AG, Swisscom Fixnet AG
WO2000014648A10.758ELECTRONIC COMMERCE WITH ANONYMOUS SHOPPING AND ANONYMOUS VENDOR SHIPPINGAPPLICATION2000-03-161998-09-0422273237Great
US9037510B20.757Money-transfer techniquesGRANT2015-05-192000-01-0533422525GreatUniTeller Financial Services IncUniTeller Financial Services Inc
EP1240631B10.755PAYMENT TRANSACTION METHOD AND PAYMENT TRANSACTION SYSTEMGRANT2003-06-041999-12-234551756GreatSwisscom Mobile AGSwisscom Schweiz AG
WO2000067143A20.753TRANSACTION METHOD AND SYSTEM FOR DATA NETWORKSAPPLICATION2000-11-091999-04-2826153311Great
US5778173A0.753Mechanism for enabling secure electronic transactions on the open internetGRANT1998-07-071996-06-1224664172GreatAT&T CorpAT&T Corp
US7827115B20.752Online payer authentication serviceGRANT2010-11-022000-04-2422738768GreatVisa International Service AssociationVisa International Service Association
US5920628A0.750Method and apparatus for fingerprinting and authenticating various magnetic mediaGRANT1999-07-061997-01-0925120650GreatWashington University in St LouisWashington University in St Louis
EP1145200B10.748METHOD AND SYSTEM FOR TRANSACTING PAYMENTSGRANT2003-02-051999-10-254551728GreatSwisscom Mobile AGSwisscom Schweiz AG
EP0886954B10.748TELEPHONE/TRANSACTION ENTRY DEVICE AND SYSTEM FOR ENTERING TRANSACTION DATA INTO DATABASESGRANT2006-05-101995-05-1923772991GreatCyberFone Technologies IncCYBERFONE TECHNOLOGIES INC.
WO2002006933A20.746A SYSTEM AND METHOD OF MAKING ON-LINE PURCHASES WITH ENHANCED SECURITYAPPLICATION2002-01-242000-07-1822818341Great
EP0919048B10.745A SYSTEM  METHOD AND ARTICLE OF MANUFACTURE FOR MULTIPLE-ENTRY POINT VIRTUAL POINT OF SALE ARCHITECTUREGRANT2004-08-251996-06-1727099066GreatHP IncHP Inc
US8090657B20.744Method and apparatus for authenticating financial transactionsGRANT2012-01-032000-01-0527353915GreatElectronic Finger Print Tech LtdElectronic Finger Print Tech Ltd
US7523055B20.743Financial information access systemGRANT2009-04-211995-10-1124157971GreatBlock Financial LLCBlock Financial LLC
EP0986275B10.742Method for purchasing goods or services with a mobile telephoneGRANT2009-09-091998-09-104220115GreatSwisscom Schweiz AGSwisscom Schweiz AG
WO1999064995A10.741SECURE TRANSACTION SYSTEMAPPLICATION1999-12-161998-06-1010833527Great
US7526785B10.737Trusted computing platform for restricting use of dataGRANT2009-04-281999-09-2510861565GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
US5005122A0.734Arrangement with cooperating management server node and network service nodeGRANT1991-04-021987-09-0822243567GreatDigital Equipment CorpHewlett Packard Development Co LP
EP1301912B10.734TRANSACTION PROCESSING SYSTEMGRANT2009-09-162000-07-109895363GreatVETT LtdVETT Ltd
US6493871B10.732Method and system for downloading updates for software installationGRANT2002-12-101999-09-1623571587GreatMicrosoft CorpMicrosoft Technology Licensing LLC
EP1264484B10.730CABLE TELEVISION PAYMENT AND LOAD SYSTEM USING SMART CARDGRANT2006-10-112000-03-1024084729GreatVisa International Service AssociationVisa International Service Association
US5903762A0.729Application execution method and system thereforGRANT1999-05-111996-05-0914646604GreatHitachi LtdHitachi Ltd
US5919247A0.728Method for the distribution of code and data updatesGRANT1999-07-061996-07-2424771752GreatMarimba IncBMC Software Inc
US6898707B10.726Integrating a digital signature service into a databaseGRANT2005-05-241999-11-3023792780GreatAccela IncAccela Inc
US6889325B10.725Transaction method and system for data networks  like internetGRANT2005-05-031999-04-2834486603GreatUnicate BVUnicate BV
EP1203357B10.724SHORT MESSAGE SERVICE (SMS) E-COMMERCEGRANT2004-01-021999-08-127918153GreatVodafone Holding GmbHVodafone Holding GmbH
EP1218865B10.723APPARATUS FOR AND METHOD OF SECURE ATM DEBIT CARD AND CREDIT CARD PAYMENT TRANSACTIONS VIA THE INTERNETGRANT2003-07-231999-09-2426846527Great
US5815709A0.931System and method for generating identifiers for uniquely identifying object types for objects used in processing of object-oriented programs and the likeGRANT1998-09-291996-04-2324553016GoodOracle America IncOracle America Inc, Sun Microsystems Inc
US7171567B10.723System for protecting information over the internetGRANT2007-01-301999-08-0237682013GoodHarris Interactive IncS Aqua Semiconductor LLC
US6223288B10.718System for persistently encrypting critical software file to prevent installation of software program on unauthorized computersGRANT2001-04-241998-05-2222176669GoodProtexis IncIII Holdings 12 LLC
EP1259947B10.717METHOD FOR MANAGING A USER ONLINE FINANCIAL TRANSACTIONGRANT2004-10-202000-03-0127392074GoodPassGate CorpPassGate Corp
US10282714B20.714Online electronic transaction and funds transfer method and systemGRANT2019-05-072000-06-1249181554GoodE E System CorpE E System Corp
US5337357A0.712Method of software distribution protectionGRANT1994-08-091993-06-1722264740GoodSoftware Security IncSafeNet Inc
US7398253B10.709System and method for performing an on-line transaction using a single-use payment instrumentGRANT2008-07-081999-08-1922532162GoodCiticorp Development Center IncCiticorp Credit Services Inc USA
WO2001080100A10.708ELECTRONIC COMMERCE PAYMENT SYSTEMAPPLICATION2001-10-252000-04-173821057Good
US7197144B10.708Method and apparatus to authenticate a user's system to prevent unauthorized use of software products distributed to usersGRANT2007-03-271999-06-0837886137GoodEthos Tech IncETHOS TECHNOLOGIES Inc, Ethos Tech Inc, Uniloc 2017 LLC
WO2001063567A20.704SECURE TRANSACTION SYSTEMAPPLICATION2001-08-302000-02-2522678992Good
US7069249B20.701Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing partyGRANT2006-06-271999-07-2623419497GoodiPrivacy LLCiPrivacy LLC
US5984508A0.698System  method and article of manufacture for product return of software and other informationGRANT1999-11-161997-06-1825372051GoodAveo IncAlset Inc, Sherwood Partners Inc
US5889860A0.698Encryption system with transaction coded decryption keyGRANT1999-03-301996-11-0824992697GoodSunhawk Corp IncSUNHAWK CORPORTION Inc A WASHINGTON Corp, Sunhawk Corp Inc
EP0992025B10.693Transaction method using a mobile identification elementGRANT2002-07-171997-06-274213382GoodSwisscom Mobile AGSwisscom Schweiz AG
US7130831B20.692Limited-use browser and security systemGRANT2006-10-311999-02-0826817216GoodCopyright Clearance Center IncCdn Innovations LLC
EP0845125B10.689INTERNET BILLING METHODGRANT2003-05-071995-07-0723985643GoodNetcraft CorpNetcraft Corp
US5881236A0.689System for installation of software on a remote computer system over a network using checksums and password protectionGRANT1999-03-091996-04-2624562979GoodHP IncHP Inc
US6169976B10.684Method and apparatus for regulating the use of licensed productsGRANT2001-01-021998-07-0222328586GoodEncommerce IncEntrust Ltd
US8538801B20.682System and method for processing financial transactionsGRANT2013-09-171999-02-1927494334GoodExxonMobil Research and Engineering CoExxonMobil Research and Engineering Co
US7127515B20.681Delivering electronic contentGRANT2006-10-241999-01-1522870376GoodDRM Tech LLCDigital Reg of Texas LLC
WO2001035570A10.679PAYMENT METHOD AND SYSTEM FOR ONLINE COMMERCEAPPLICATION2001-05-171999-11-0523724542Good
US20020052885A10.676Using embedded data with file sharingAPPLICATION2002-05-022000-05-0239198167GoodDigimarc CorpDigimarc Corp
US6941285B20.675Method and system for a virtual safeGRANT2005-09-062000-04-144165898Good
EP0836160B10.675Method and means for limiting adverse use of counterfeit credit cards  access badges  electronic accounts or the likeGRANT2007-11-071996-10-0824930241GoodInternational Business Machines CorpInternational Business Machines Corp
WO2001029637A20.675SYSTEM AND METHOD FOR SECURE ELECTRONIC TRANSACTIONSAPPLICATION2001-04-261999-10-2226857367Good
US6073124A0.674Method and system for securely incorporating electronic information into an online purchasing applicationGRANT2000-06-061997-01-2926727602GoodShopNow com IncHanger Solutions LLC
US6366967B10.668OPEN NETWORK SYSTEM FOR I/O OPERATION INCLUDING A COMMON GATEWAY INTERFACE AND AN EXTENDED OPEN NETWORK PROTOCOL WITH NON-STANDARD I/O DEVICES UTILIZING DEVICE AND IDENTIFIER FOR OPERATION TO BE PERFORMED WITH DEVICEGRANT2002-04-021995-06-2223961644GoodDatascape IncWiLAN Technologies Inc
EP1163646B10.667SYSTEM AND METHOD FOR MANAGING A TRANSACTION IN A MOBILE SITE  AND EQUIPMENT USED IN SAID SYSTEMGRANT2002-11-061999-03-2326234874GoodVirgileVirgile
WO2000075758A10.665PROTECTION AGAINST UNAUTHORIZED USE OF SOFTWARE PRODUCTSAPPLICATION2000-12-141999-06-0822480219Good
US8099366B20.665Software distribution method and apparatusGRANT2012-01-172000-03-0336939600GoodMicron Technology IncMicron Technology Inc
US6959382B10.664Digital signature serviceGRANT2005-10-251999-08-1623481037GoodAccela IncOPEN DATA SYSTEMS, Accela Inc
WO2001052205A10.663A PROCESSING METHOD AND APPARATUSAPPLICATION2001-07-192000-01-1226073714Good
EP0501697B10.662Mediation of transactions by a communications systemGRANT1999-04-141991-02-2724654784GoodAT&T CorpAT&T Corp
WO1998044402A10.662COPY PROTECTION OF DATAAPPLICATION1998-10-081997-03-2726147374Good
WO2001054015A10.660ELECTRONIC TRANSACTIONS AND PAYMENTS SYSTEMAPPLICATION2001-07-262000-01-1820430514Good
WO2001069353A10.659A METHOD AND A SYSTEM FOR PREVENTING UNAUTHORISED USE OF COMPUTER PROGRAMS IN ELECTRONIC COMMERCEAPPLICATION2001-09-202000-03-1320278829Good
US5638513A0.658Secure software rental system using continuous asynchronous password verificationGRANT1997-06-101993-12-2222652402GoodStamps com IncStamps com Inc
US9996826B20.654System and methods for facilitating value exchanges using mobile devicesGRANT2018-06-121999-04-3027384198GoodPayPal IncPayPal Inc
US6463534B10.651Secure wireless electronic-commerce system with wireless network domainGRANT2002-10-081999-03-2623058927GoodMotorola Solutions IncGoogle Technology Holdings LLC
WO2000025246A10.651METHOD AND APPARATUS FOR ESTABLISHING ELECTRONIC TRANSACTIONSAPPLICATION2000-05-041998-10-2726802933Good
US6567793B10.649Remote authorization for unlocking electronic data system and methodGRANT2003-05-201997-12-2231498792GoodGreater Boston Authentication Solutions LLCGreater Boston Authentication Solutions LLC
US6460140B10.648System for controlling the use of licensed softwareGRANT2002-10-011999-12-3023889904GoodStarnet Communications CorpStarnet Communications Corp
US7533064B10.648E-mail invoked electronic commerceGRANT2009-05-121998-10-0740601638GoodPayPal International Ltd, PayPal IncPayPal Inc
US5905860A0.648Fault tolerant electronic licensing systemGRANT1999-05-181996-03-1546253299GoodMicro Focus Software IncRPX Corp
US5235642A0.645Access control subsystem and method for distributed computer system using locally cached authentication credentialsGRANT1993-08-101992-07-2125439287GoodDigital Equipment CorpGoogle LLC
US5828773A0.645Fingerprint sensing method with finger position indicationGRANT1998-10-271996-01-2624362736GoodHarris CorpApple Inc
US7958214B10.643Method for secure transactions utilizing physically separated computersGRANT2011-06-072000-06-0939828383GoodBlackbird Tech LLCBlackbird Tech LLC
US5878143A0.642Secure transmission of sensitive information over a public/insecure communications mediumGRANT1999-03-021996-08-1624807951GoodNet 1 IncNet 1 Inc
US6456984B10.640Method and system for providing temporary credit authorizationsGRANT2002-09-241999-05-2823252692GoodQwest Communications International IncQwest Communications International Inc
EP1297502B10.638PROCESS TO CARRY OUT ON-LINE PURCHASING TRANSACTIONSGRANT2007-09-122000-07-0411133533GoodSIPO SrlSIPO Srl
WO1998038759A20.638GENERIC USER AUTHENTICATION FOR NETWORK COMPUTERSAPPLICATION1998-09-031997-02-1425178518Good
US6131162A0.638Digital data authentication methodGRANT2000-10-101997-06-0526478410GoodHitachi LtdHitachi Ltd
WO2001042945A10.637MONETARY FUNDS TRANSFER SYSTEMAPPLICATION2001-06-141999-12-1023820247Good
US5802275A0.635Isolation of non-secure software from secure software to limit virus infectionGRANT1998-09-011994-06-2223003500GoodNokia of America CorpAT&T Corp, Nokia of America Corp
US5872848A0.632Method and apparatus for witnessed authentication of electronic documentsGRANT1999-02-161997-02-1825178718GoodArcanvsHanger Solutions LLC
US5982892A0.624System and method for remote authorization for unlocking electronic dataGRANT1999-11-091997-12-2225541944GoodGreater Boston Authentication Solutions LLCGreater Boston Authentication Solutions LLC
EP1153375B10.623CREDIT CARD SYSTEM AND METHODGRANT2003-01-151999-02-1827537583GoodOrbis Patents LtdOrbis Patents Ltd
WO2001084454A10.622SECURE ELECTRONIC PAYMENT METHOD FOR FRAUD REDUCTION AND REDUCED TRANSACTION COSTSAPPLICATION2001-11-082000-05-0224252543Good
US8818903B20.620Transaction coordinator for digital certificate validation and other servicesGRANT2014-08-261999-09-1027538450Good
EP1287505B10.620A UTILITY METERING SYSTEM INCORPORATING A TRANSACTION AUTHORISATION SYSTEMGRANT2012-08-292000-05-229892114GoodSECURE ELECTRANS LtdVANCLARE SE LLC
WO2001011447A10.615METHOD FOR PROTECTING AND TRANSMITTING DIGITAL DATAAPPLICATION2001-02-151999-08-097917771Good
US7124094B10.614Print system  service system  data server  master server  print client system and printerGRANT2006-10-171999-10-2727341176GoodKonica Minolta IncKonica Minolta Inc
US5544255A0.614Method and system for the capture  storage  transport and authentication of handwritten signaturesGRANT1996-08-061994-08-3123152882GoodPeripheral Vision LtdCIC ACQUISTION CORP
US8332478B20.614Context sensitive connected contentGRANT2012-12-111998-10-0127581096GoodDigimarc CorpRovi Technologies Corp
US6411981B10.612Method and apparatus for conducting a transaction between homogeneous and/or heterogeneous transaction processing systems using asynchronous pull of a transaction transferGRANT2002-06-251999-03-1223018726GoodCompaq Computer CorpMotorola Solutions Inc, Hewlett Packard Development Co LP
US7461249B10.610Computer platforms and their methods of operationGRANT2008-12-021999-08-138241575GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US6681212B10.608Internet-based automated system and a method for software copyright protection and salesGRANT2004-01-201999-04-2330002560Good
US7783898B20.605Encryption/decryption of stored data using non-accessible  unique encryption keyGRANT2010-08-241999-10-2623694091GoodInternational Business Machines CorpInternational Business Machines Corp
US6629092B10.602Search engineGRANT2003-09-301999-10-1323651237Good
US6611830B20.601Information search method and system for registering and searching for associated multimedia data using embedded informationGRANT2003-08-261998-02-1212281223GoodHitachi LtdHitachi Ltd
US6289452B10.601Method and system for delivering digital products electronicallyGRANT2001-09-111997-11-0725510572GoodCyberSource CorpCyberSource Corp
US6173402B10.600Technique for localizing keyphrase-based data encryption and decryptionGRANT2001-01-091998-03-0421875522GoodInternational Business Machines CorpInternational Business Machines Corp
US6915124B10.599Method and apparatus for executing secure data transfer in a wireless networkGRANT2005-07-051999-10-0120417232GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
USRE42762E10.597Device and method for authenticating user's access rights to resourcesGRANT2011-09-271996-02-2326333401GoodFuji Xerox Co LtdFuji Xerox Co Ltd
US5953532A0.596Installation and deinstallation of application programsGRANT1999-09-141997-01-0325117779GoodNCR CorpNCR Corp
US6091835A0.593Method and system for transcribing electronic affirmationsGRANT2000-07-181994-08-3146254760GoodPenOp LtdPenOp Ltd
US20080082446A10.593Remote Authorization for Unlocking Electronic Data System and MethodAPPLICATION2008-04-031999-10-0139262160GoodGreater Boston Authentication Solutions LLCGreater Boston Authentication Solutions LLC
US6745328B10.592Encryption using a user-known and personally valuable key to deter key sharingGRANT2004-06-011999-10-2323688343GoodLockStream CorpLockStream Corp
WO1998004974A10.590A METHOD AND APPARATUS FOR ENABLING THE OPERATION OF SOFTWAREAPPLICATION1998-02-051996-07-243795546Good
EP0745961B10.588Transaction authorization and alert systemGRANT2001-11-211995-05-3123810820GoodAT&T CorpAT&T Corp
US8126200B20.586Methods and systems employing digital contentGRANT2012-02-281999-05-1946327871GoodDigimarc CorpDigimarc Corp
US7430537B20.583System and method for verifying a financial instrumentGRANT2008-09-302000-07-1026911712GoodPayPal IncPayPal Inc
US5809145A0.582System for distributing digital informationGRANT1998-09-151996-06-2824692132GoodParadata Systems IncArvato Digital Services LLC
EP0766852B10.581UNIVERSAL ELECTRONIC TRANSACTION CARD AND SYSTEM AND METHODS OF CONDUCTING ELECTRONIC TRANSACTIONSGRANT2004-08-181994-06-2022996979Good
US7206803B10.580Method and apparatus for controlling access to the contents of web pages by using a mobile security moduleGRANT2007-04-171999-08-197918875GoodInternational Business Machines CorpInternational Business Machines Corp
US6236981B10.577Transaction systemGRANT2001-05-221996-11-2010803228GoodBritish Telecommunications PLCBritish Telecommunications PLC
WO2002001331A20.577SECURED INTERNET DEVICEAPPLICATION2002-01-032000-06-2722799172Good
US8190513B20.575Method of billing a purchase made over a computer networkGRANT2012-05-291996-06-0540793590GoodFraud Control Systems com CorpFraud Control Systems com Corp
US9843447B10.574Authenticating electronic contentGRANT2017-12-121999-09-0960516392GoodSecure Axcess LLCSecure Axcess LLC, American Express Travel Related Services Co Inc
US8489598B20.574Methods and devices employing content identifiersGRANT2013-07-161999-05-1946327198GoodDigimarc CorpDigimarc Corp
US6134659A0.569Controlled usage softwareGRANT2000-10-171998-01-0721709381Good
US8229844B20.566Method of billing a purchase made over a computer networkGRANT2012-07-241996-06-0548095431GoodFraud Control Systems com CorpFraud Control Systems com Corp
US6980668B10.566Information processing apparatus enabling electronic watermarking  and communication network connectable to such information processing apparatusGRANT2005-12-271998-10-0617674424GoodCanon IncCanon Inc
WO1995035533A10.565METHOD FOR PREVENTING USE OF SOFTWARE ON AN UNAUTHORIZED COMPUTERAPPLICATION1995-12-281994-06-1722993565Good
US5758068A0.565Method and apparatus for software license managementGRANT1998-05-261995-09-1924112239GoodInternational Business Machines CorpInternational Business Machines Corp
US7706838B20.561Physical presence digital authentication systemGRANT2010-04-271998-09-1626876408GoodBEEPCARD LtdSonixio Inc
US8630942B20.559Method of billing a purchase made over a computer networkGRANT2014-01-141996-06-0546282273GoodFraud Control Systems com CorpFraud Control Systems com Corp
US6016476A0.559Portable information and transaction processing system and method utilizing biometric authorization and digital certificate securityGRANT2000-01-181997-08-1126677823GoodInternational Business Machines CorpToshiba Global Commerce Solutions Holdings Corp
US8312168B20.558Methods for linking from objects to remote resourcesGRANT2012-11-132000-03-1839499537GoodDigimarc CorpDigimarc Corp
US9300921B20.558Video security systems and methodsGRANT2016-03-291999-07-2051350884GoodComcast Cable Communications LLCComcast Cable Communications LLC
US6751670B10.558Tracking electronic componentGRANT2004-06-151998-11-2432392298GoodDRM Tech LLCDigital Reg of Texas LLC
US6966002B10.557Methods and apparatus for secure distribution of softwareGRANT2005-11-151999-04-3026829777GoodTrymedia Systems IncFlexera Software LLC
US6683954B10.555Key encryption using a client-unique additional key for fraud preventionGRANT2004-01-271999-10-2323688338GoodLockStream CorpIrdeto USA Inc
US5754761A0.555Universal sofeware key processGRANT1998-05-191995-03-0623577365Good
US9817650B20.553Scheduling of a file download and search for updatesGRANT2017-11-141998-12-0428794893GoodDigital River IncDigital River Inc
US7237114B10.552Method and system for signing and authenticating electronic documentsGRANT2007-06-262000-04-2624233518GoodProNvest IncSIGNIX Inc
US6636966B10.551Digital rights management within an embedded storage deviceGRANT2003-10-212000-04-0324164125GoodDPHI Acquisitions IncDataPlay Inc, Hanger Solutions LLC
US6970849B10.550Inter-server communication using request with encrypted parameterGRANT2005-11-291999-12-1727390116GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5337360A0.550Method and apparatus for creating  supporting  and using travelling programsGRANT1994-08-091992-04-0625341285Good
US20050021477A10.549Method and system for securely incorporating electronic information into an online purchasing applicationAPPLICATION2005-01-271997-01-2934084799GoodCRS LLCHanger Solutions LLC
US4796220A0.549Method of controlling the copying of softwareGRANT1989-01-031986-12-1525476423GoodPRIDE SOFTWARE DEV CORPPRIDE SOFTWARE DEVELOPMENT Corp A CORP OF FL, PRIDE SOFTWARE DEV CORP
US5983207A0.546Electronic cash eliminating payment riskGRANT1999-11-091993-02-1026687593GoodGM Network LtdBitgold (bvi) Inc, GM Network Ltd
US8613110B20.545Software piracy prevention through remote enforcement of an activation thresholdGRANT2013-12-172000-06-1436102181GoodUniloc Luxembourg SAUniloc 2017 LLC
US6968388B10.545Methods in transmission of files in a data communication networkGRANT2005-11-221999-03-2219903120GoodFileFlow ASFileFlow AS
US7379919B20.542Method and system for conducting secure payments over a computer networkGRANT2008-05-272000-04-1126891523GoodMastercard International IncMastercard International Inc
US7360252B10.542Method and apparatus for secure distribution of softwareGRANT2008-04-151999-04-3039281750GoodMacrovision CorpFlexera Software LLC
US7043456B20.541Mobile electronic transaction personal proxyGRANT2006-05-092000-06-0527395381GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
EP1046144B10.540SYSTEM AND METHOD FOR CONTROLLING FINANCIAL TRANSACTIONS OVER A WIRELESS NETWORKGRANT2004-02-251997-12-2325544086GoodGreat Elm Capital Group IncGreat Elm Capital Group Inc
US7134021B20.539Method and system for recovering the validity of cryptographically signed digital dataGRANT2006-11-071999-10-2225221577GoodHitachi LtdHitachi Ltd
WO1997050207A10.538IMPROVEMENTS IN  OR RELATING TO  INTERNET COMMUNICATION SYSTEMSAPPLICATION1997-12-311996-06-2620403169Good
US8468089B10.536Method of improving security in electronic transactionsGRANT2013-06-181998-09-218232663GoodInternational Business Machines CorpSinoeast Concept Ltd
US7861306B20.536Method and system for limiting the use of user-specific software featuresGRANT2010-12-282000-06-2724418707GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7171692B10.535Asynchronous communication within a server arrangementGRANT2007-01-302000-06-2737682032GoodMicrosoft CorpMicrosoft Technology Licensing LLC
WO2001069549A10.535PAYMENT AUTHORISATION METHOD AND APPARATUSAPPLICATION2001-09-202000-03-1726073040Good
US6023509A0.533Digital signature purpose encodingGRANT2000-02-081996-09-3024894051GoodIntel CorpIntel Corp
US7647278B10.533Method for facilitating a transaction between a merchant and a buyerGRANT2010-01-121999-12-2923883027GoodPitney Bowes IncPitney Bowes Inc
US5428745A0.533Secure communication system for re-establishing time limited communication between first and second computers before communication time period expiration using new random numberGRANT1995-06-271992-06-1225410232GoodDow Benelux BV, Dow Chemical CoDow Benelux BV, Dow Chemical Co
US5563946A0.530Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systemsGRANT1996-10-081994-04-2522897809GoodInternational Business Machines CorpActivision Publishing Inc
US6668375B10.528Method and system for providing build-to-order software applicationsGRANT2003-12-231999-12-1523834189GoodPitney Bowes IncPitney Bowes Inc
US6324525B10.528Settlement of aggregated electronic transactions over a networkGRANT2001-11-271996-06-1746256034GoodHP IncHewlett Packard Enterprise Development LP
US6950948B20.527Verifiable  secret shuffles of encrypted data  such as elgamal encrypted data for secure multi-authority electionsGRANT2005-09-272000-03-2427392950GoodVoteHere IncDemoxi Inc
US6891953B10.526Method and system for binding enhanced software features to a personaGRANT2005-05-102000-06-2724420005GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8527407B10.525Process and device for conducting electronic transactions using wireless and cellular devicesGRANT2013-09-031999-11-2941138074GoodPurple Leaf LLCPURPLE LEAF A DELAWARE LLC LLC
US7047411B10.525Server for an electronic distribution system and method of operating sameGRANT2006-05-161999-12-1727390115GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7457951B10.524Data integrity monitoring in trusted computing entityGRANT2008-11-251999-05-288241420GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US7146498B10.524Computer and program recording mediumGRANT2006-12-051999-02-2212675746GoodPanasonic CorpGodo Kaisha IP Bridge 1
US7266528B20.523Method for computer network operation basis for usage feesGRANT2007-09-041998-04-0321995371GoodMacrovision CorpMacrovision Corp
US20010029496A10.522Systems and methods for providing anonymous financial transactionsAPPLICATION2001-10-112000-02-2322676424Good
US8538011B20.521Systems  methods and devices for trusted transactionsGRANT2013-09-171999-12-0727389630GoodBlue Spike IncWistaria Trading Ltd
US7877299B20.520Payment service capable of being invoked from merchant sitesGRANT2011-01-251999-12-0923818261GoodAmazon com IncAmazon Technologies Inc
US5805802A0.520Module for the protection of softwareGRANT1998-09-081994-12-156917456Good
US7058611B20.519Method and system for conducting secure electronic commerce transactions with authorization request data loop-backGRANT2006-06-062000-07-1022809783GoodMastercard International IncMastercard International Inc
US5757907A0.519Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identificationGRANT1998-05-261994-04-2522883791GoodInternational Business Machines CorpInternational Business Machines Corp
US7096003B20.519Transaction security apparatusGRANT2006-08-221996-08-0827105328GoodJOAO BOCK TRANSACTION SYSTEMS LLCJOAO BOCK TRANSACTION SYSTEMS LLC
WO2001022324A10.517METHOD AND APPARATUS FOR BOOKING PERSONAL SERVICES USING A COMPUTERAPPLICATION2001-03-291999-09-2123580492Good
US6078902A0.517System for transaction over communication networkGRANT2000-06-201997-04-1511070039GoodNush Marketing Management and ConsultanceNUSH-MARKETING MANAGEMENT and CONSULTANCE, Nush Marketing Management and Consultance
US8271396B20.516Electronic commerce system and method for detecting fraudGRANT2012-09-181998-12-0434742610GoodDigital River IncDigital River Inc
US4953209A0.516Self-verifying receipt and acceptance system for electronically delivered data objectsGRANT1990-08-281988-10-3123007028GoodInternational Business Machines CorpInternational Business Machines Corp
US6223168B10.515Automatic remittance delivery systemGRANT2001-04-241995-07-2522835069GoodBottomline Tech IncBottomline Tech Inc
US7047416B20.515Account-based digital signature (ABDS) systemGRANT2006-05-161998-11-0927392531GoodFirst Data CorpFirst Data Corp
US6115735A0.515Message guaranty systemGRANT2000-09-051993-10-2726388612GoodHitachi LtdHitachi Ltd
US20040185830A10.514Apparatus and method for providing account securityAPPLICATION2004-09-231996-08-0846300776GoodJOAO BOCK TRANSACTION SYSTEMS LLCJOAO BOCK TRANSACTION SYSTEMS LLC
US6098053A0.511System and method for performing an electronic financial transactionGRANT2000-08-011998-01-2826753857GoodCitibank NACitibank NA
US20010037314A10.511System  method and apparatus for authenticating the distribution of dataAPPLICATION2001-11-012000-03-3026889215Good
US7032240B10.511Portable authorization device for authorizing use of protected information and associated methodGRANT2006-04-181999-12-0724003463GoodPACE Anti Piracy IncPACE ANTI-PIRACY Inc, PACE Anti Piracy Inc
US8544753B20.510Card for interaction with a computerGRANT2013-10-011998-10-0227571373GoodDialware IncSonixio Inc
US20010034724A10.508System and method for facilitating secure payment with privacy over a computer network including the internetAPPLICATION2001-10-252000-01-2022647370Good
US6032257A0.507Hardware theft-protection architectureGRANT2000-02-291997-08-2925454201GoodCompaq Computer CorpHewlett Packard Development Co LP
US6842863B10.506Certificate reissuance for checking the status of a certificate in financial transactionsGRANT2005-01-111999-11-2333551249GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7051004B20.505System and methods providing secure delivery of licenses and contentGRANT2006-05-231998-04-0321918976GoodMacrovision CorpRovi Solutions Corp
US7194623B10.504Data event logging in computing platformGRANT2007-03-201999-05-288241419GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US8296237B20.504Recording system  fee calculation device  and content distribution methodGRANT2012-10-231998-10-2127332402GoodFuji Xerox Co LtdFuji Xerox Co Ltd
US6938022B10.502Method and apparatus for facilitating an anonymous information system and anonymous service transactionsGRANT2005-08-301999-06-1234865085Good
US6796491B20.502Electronic payment system  payment apparatus and terminal thereofGRANT2004-09-281999-09-2214236797GoodSoftbank BB CorpIntellectual Ventures Holding 81 LLC
US8019609B20.501Sonic/ultrasonic authentication methodGRANT2011-09-131999-10-0439189743GoodDialware IncSonixio Inc
US6415271B10.499Electronic cash eliminating payment riskGRANT2002-07-021993-02-1046276366GoodGM Network LtdBitgold (bvi) Inc
US6973444B10.498Method for interdependently validating a digital content package and a corresponding digital licenseGRANT2005-12-061999-03-2727383451GoodMicrosoft CorpMicrosoft Technology Licensing LLC
WO2002003290A10.498SYSTEM AND METHOD FOR ANONYMOUS RECHARGING OF STORED VALUE ACCOUNTSAPPLICATION2002-01-102000-06-2224397735Good
US6052780A0.496Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital informationGRANT2000-04-181996-09-1226700571GoodOpen Security Solutions LLCRPX Corp, Open Security Solutions LLC
US6266416B10.496Protection of software against use without permitGRANT2001-07-241995-07-1319898393GoodSospita ASSospita AS
US7051200B10.493System and method for interfacing a software process to secure repositoriesGRANT2006-05-232000-06-2724419919GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7933834B20.492Interactive bill payment centerGRANT2011-04-261998-12-0825137062GoodYodlee com IncYodlee Inc
US7430542B20.491System and method for activating a rendering device in a multi-level rights-management architectureGRANT2008-09-302000-06-2724420122GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7539875B10.489Secure repository with layers of tamper resistance and system and method for providing sameGRANT2009-05-262000-06-2724418492GoodMicrosoft CorpMicrosoft Technology Licensing LLC
WO2000031644A10.488HIGH ASSURANCE DIGITAL SIGNATURESAPPLICATION2000-06-021998-11-253811491Good
US6865551B10.487Removable content repositoriesGRANT2005-03-081994-11-2327407652GoodContentguard Holdings IncContentguard Holdings Inc
US6304861B10.487Asynchronous network collaboration method and apparatusGRANT2001-10-161996-06-0424639430GoodRecipio IncAPEX INVESTMENT FUND V LP, NEW ENTERPRISE ASSOCIATES VIII LP, NEW ENTERRISE ASSOCIATES 8A LP, NOKIA VENTURES LP, STAR BAY ASSOCIATES FUND LP, STAR BAY PARTNERS LP, STAR BAY TECHNOLOGY VENTURES IV LP
US7117180B10.486System for controlling the use of digital works using removable content repositoriesGRANT2006-10-031994-11-2346400482GoodContentguard Holdings IncContentguard Holdings Inc
US5893080A0.485Disbursement system and methodGRANT1999-04-061995-07-2524015195GoodBottomline Tech IncBottomline Tech DE Inc
US6920436B20.485Digital work structureGRANT2005-07-191994-11-2326994084GoodContentguard Holdings IncContentguard Holdings Inc
US6708157B20.482System for controlling the distribution and use of digital works using digital ticketsGRANT2004-03-161994-11-2323351914GoodContentguard Holdings IncContentguard Holdings Inc
US6981262B10.481System and method for client interaction in a multi-level rights-management architectureGRANT2005-12-272000-06-2724420395GoodMicrosoft CorpMicrosoft Technology Licensing LLC
WO2000077642A10.481METHOD AND APPARATUS FOR FACILITATING AN ANONYMOUS INFORMATION SYSTEM AND ANONYMOUS SERVICE TRANSACTIONSAPPLICATION2000-12-211999-06-1227495354Good
US8055913B20.480Systems and methods for secure transaction management and electronic rights protectionGRANT2011-11-081995-02-1324836636GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6986063B20.480Method for monitoring software using encryption including digital signatures/certificatesGRANT2006-01-101998-06-0446281942GoodZ4 Technologies IncZ4 Technologies Inc
US8639625B10.479Systems and methods for secure transaction management and electronic rights protectionGRANT2014-01-281995-02-1349958042GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6996720B10.477System and method for accessing protected content in a rights-management architectureGRANT2006-02-071999-12-1727390117GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5712914A0.473Digital certificates containing multimedia data extensionsGRANT1998-01-271995-09-2926792697GoodIntel CorpIntel Corp
US6175626B10.473Digital certificates containing multimedia data extensionsGRANT2001-01-161995-09-2927065077GoodIntel CorpIntel Corp
US5056140A0.473Communication security accessing system and processGRANT1991-10-081990-02-2223920046GoodMICROCOMM IncMICROCOMM Inc
US7660772B20.473Authentication in a telecommunications networkGRANT2010-02-091998-07-078552156GoodNokia OyjConversant Wireless Licensing SARL
US6286099B10.472Determining point of interaction device security properties and ensuring secure transactions in an open networking environmentGRANT2001-09-041998-07-2322398851GoodHP IncEnt Services Development Corp LP
US7225159B20.470Method for authenticating and securing integrated bookstore entriesGRANT2007-05-292000-06-3026909938GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5661799A0.469Apparatus and storage medium for decrypting informationGRANT1997-08-261994-02-1822734636GoodInfosafe Systems IncHARMONY LOGIC SYSTEMS LLC
US20040199431A10.468Technique for conducting secure transactions over a networkAPPLICATION2004-10-071998-12-1122776920GoodFiserv IncFiserv Inc
US7099471B20.468Detecting compromised ballotsGRANT2006-08-292000-03-2446278638GoodDategrity CorpDemoxi Inc
US7844835B20.468Systems and methods for secure transaction management and electronic rights protectionGRANT2010-11-301995-02-1332686239GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6587842B10.468Software-based protection system for software products distributed on copyable media  or downloaded over a communications linkGRANT2003-07-011999-10-0123621266Good
US6209095B10.467Method and system for processing electronic documentsGRANT2001-03-271996-12-2021873091GoodFinancial Services Technology ConsortiumTelcordia Technologies Inc, International Business Machines Corp, Financial Services Technology Consortium, FleetBoston Financial Corp, Sun Microsystems Inc
US7917749B20.466Systems and methods for secure transaction management and electronic rights protectionGRANT2011-03-291995-02-1323532729GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7302585B10.466System for providing a trustworthy user interfaceGRANT2007-11-271999-05-288241417GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US6820202B10.466Account authority digital signature (AADS) systemGRANT2004-11-161998-11-0922696181GoodFirst Data CorpFirst Data Corp, Boston Scientific Scimed Inc
US7099490B10.465Information providing system and identification information adding deviceGRANT2006-08-291999-10-2156290000GoodVisionarts Inc, Sony CorpSony Corp
US5652838A0.464Smart disc cd-romGRANT1997-07-291996-05-2024609097GoodBenhov GmbH LLCBenhov GmbH LLC
US7587369B20.464Trusted and secure techniques  systems and methods for item delivery and executionGRANT2009-09-081995-02-1334841925GoodIntertrust Technologies CorpIntertrust Technologies Corp
US8171561B20.464Secure personal content serverGRANT2012-05-011999-08-0426844619GoodBlue Spike IncWistaria Trading Ltd
WO1998053384A10.463METHOD AND APPARATUS FOR ACTIVATING PROGRAMS/FEATURES IN A COMPUTERAPPLICATION1998-11-261997-05-2120407024Good
US8024260B10.462Method for transmitting a codeGRANT2011-09-201999-06-107910792GoodPayPal IncPayPal Inc
US5509071A0.462Electronic proof of receiptGRANT1996-04-161994-04-0122829660GoodMicroelectronics and Computer Technology CorpMicroelectronics and Computer Technology Corp, Cyberguard Corp
US6925439B10.462Device  system and methods of conducting paperless transactionsGRANT2005-08-021994-06-2034798468GoodMastercard Mobile Transaction Solutions IncMastercard Mobile Transaction Solutions Inc
US6401206B10.459Method and apparatus for binding electronic impressions made by digital identities to documentsGRANT2002-06-041997-03-0621898000GoodSkylight Software IncSkylight Software Inc, Hanger Solutions LLC
US5933498A0.459System for controlling access and distribution of digital propertyGRANT1999-08-031996-01-1124337542GoodMRJ IncHanger Solutions LLC
US20050246549A10.456Methods and apparatus for secure distribution of softwareAPPLICATION2005-11-031999-06-0935188449GoodFlexera Software LLCFlexera Software LLC
US7814009B10.454Anonymous on-line cash management systemGRANT2010-10-121999-05-1426832233GoodVaultet LLCVaultet LLC
US7490062B20.453Method of payment by means of an electronic communication deviceGRANT2009-02-101999-12-308239760GoodInternational Business Machines CorpPayPal Inc
US5734819A0.453Method and apparatus for validating system operationGRANT1998-03-311994-10-1223254037GoodInternational Business Machines CorpInternational Business Machines Corp
US5490216A0.453System for software registrationGRANT1996-02-061992-09-2125644335GoodUniloc Singapore Pvt LtdUniloc Luxembourg SA
US8255693B20.453Methods and devices responsive to ambient audioGRANT2012-08-281999-05-1940846388GoodDigimarc CorpDigimarc Corp
US20010056389A10.452Network chat with integrated billingAPPLICATION2001-12-272000-03-2726887837GoodTFHC IncTFHC Inc
US20070271191A10.452METHOD AND APPARATUS FOR SECURE DISTRIBUTION OF SOFTWAREAPPLICATION2007-11-222000-03-0938713115GoodMacrovision CorpFlexera Software LLC
US7069291B20.451Systems and processes for call and call feature administration on a telecommunications networkGRANT2006-06-271999-03-0627382938GoodCopperCom IncCopperCom Inc
US8290202B20.450Methods utilizing steganographyGRANT2012-10-161998-11-0338323529GoodDigimarc CorpDigimarc Corp
US6507904B10.449Executing isolated mode instructions in a secure system running in privilege ringsGRANT2003-01-142000-03-3124159746GoodIntel CorpIntel Corp
US20060167815A10.448Digital license and method for obtaining/providing a digital licenseAPPLICATION2006-07-271999-03-2727383448GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5892904A0.448Code certification for network transmissionGRANT1999-04-061996-12-0625062342GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6539282B20.447Vending machine for vending age-restricted products using a credit card and associated methodsGRANT2003-03-252000-05-0822749845GoodDetsky Group LPChesterfield Holdings LLC
US4264782A0.445Method and apparatus for transaction and identity verificationGRANT1981-04-281979-06-2921985284GoodInternational Business Machines CorpInternational Business Machines Corp
US7031471B20.445System for controlling the distribution and use of rendered digital works through watermarkingGRANT2006-04-181997-02-2826715973GoodContentguard Holdings IncContentguard Holdings Inc
US7246234B10.444Transmitter device  transmitting method  receiver device  receiving method  communication system  and program storage mediumGRANT2007-07-171999-08-2617041309GoodSony CorpSony Corp
WO2001001361A10.442SECURE TRANSACTION SYSTEMAPPLICATION2001-01-041999-06-2810846753Good
US20100228668A10.441Method and System for Conducting a Transaction Using a Proximity Device and an IdentifierAPPLICATION2010-09-092000-04-1142679092GoodMastercard International IncMastercard International Inc
US5497422A0.440Message protection mechanism and graphical user interface thereforGRANT1996-03-051993-09-3022442320GoodApple Computer IncApple Inc
US20060129833A10.440System and method for single sign on process for websites with multiples applications and servicesAPPLICATION2006-06-151999-07-0236569087Good
US20100223186A10.440Method and System for Conducting Secure PaymentsAPPLICATION2010-09-022000-04-1142667658GoodMastercard International IncMastercard International Inc
US7802098B20.440Cryptography method and smart cards microcircuitGRANT2010-09-212000-05-318850871GoodFrance Telecom SAOrange SA
US5406628A0.438Public key authentication and key agreement for low-cost terminalsGRANT1995-04-111993-03-0421833192GoodTelcordia Technologies IncTTI Inventions C LLC
US7383297B10.437Method to use acoustic signals for computer communicationsGRANT2008-06-031998-10-0227271889GoodBEEPCARD LtdDialware Communication LLC, BEEPCARD Ltd
US20020169608A10.437Sonic/ultrasonic authentication deviceAPPLICATION2002-11-141999-10-0433419034GoodComsense Tech LtdComsense Tech Ltd
US5164988A0.437Method to establish and enforce a network cryptographic security policy in a public key cryptosystemGRANT1992-11-171991-10-3125137973GoodInternational Business Machines CorpInternational Business Machines Corp
US6771597B20.435Method and apparatus for transmitting messagesGRANT2004-08-031998-07-3122428988GoodInternational Business Machines CorpInternational Business Machines Corp
US7941666B20.435Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacksGRANT2011-05-101998-07-0222228888GoodCryptography Research IncCryptography Research Inc
WO1999003031A10.433A METHOD AND SYSTEM FOR PROTECTING INTELLECTUAL PROPERTY PRODUCTS DISTRIBUTED IN MASS MARKETAPPLICATION1999-01-211997-07-0720429693Good
US6782190B10.432Copy protection apparatus and methodGRANT2004-08-241998-09-028235036GoodHitachi LtdMaxell Ltd
US5651064A0.430System for preventing piracy of recorded mediaGRANT1997-07-221995-03-0823585963Good544483 Alberta Ltd544483 Alberta Ltd
US5864620A0.430Method and system for controlling distribution of software in a multitiered distribution chainGRANT1999-01-261996-04-2424562118GoodCyberSource CorpInternet Commerce Services Corp
US20030028423A10.428Detecting compromised ballotsAPPLICATION2003-02-062000-03-2427500992GoodVoteHere IncDemoxi Inc
US6003765A0.426Electronic cash implementing method with a surveillance institution  and user apparatus and surveillance institution apparatus for implementing the sameGRANT1999-12-211996-05-1614817421GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US9165135B20.426Systems and methods using cryptography to protect secure computing environmentsGRANT2015-10-201995-02-1338823320GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7765161B20.425System and method for providing payment services in electronic commerceGRANT2010-07-271999-09-2422557004GoodIdentrust IncIdentrust Inc
US7117197B10.425Selectively auditing accesses to rows within a relational database at a database serverGRANT2006-10-032000-04-2624232561GoodOracle International CorpOracle International Corp
US5933516A0.424Fingerprint matching by estimation of a maximum cliqueGRANT1999-08-031997-08-0726733691GoodLockheed Martin CorpLeidos Innovations Technology Inc.
US5937393A0.424Order processing method in a distributed processing system with local validation and dynamic control of the order request through a configuration matrixGRANT1999-08-101995-12-2126319869GoodPortspring LtdPortspring Ltd
US5774651A0.424False statement detection systemGRANT1998-06-301995-09-2017084694GoodFujitsu LtdFujitsu Ltd
US5812669A0.423Method and system for providing secure EDI over an open networkGRANT1998-09-221995-07-1924004363GoodPREMINOS CorpCLASSIFIELD INFORMATION Inc, HARBINGER
US5599231A0.422Security systems and methods for a videographics and authentication game/program fabricating deviceGRANT1997-02-041994-10-3123299955GoodNintendo Co LtdNintendo Co Ltd
US20050149450A10.420System  method  and device for controlling distribution and use of digital works based on a usage rights grammarAPPLICATION2005-07-071994-11-2334714557GoodContentguard Holdings IncContentguard Holdings Inc
US6678825B10.420Controlling access to multiple isolated memories in an isolated execution environmentGRANT2004-01-132000-03-3129782280GoodIntel CorpIntel Corp
US6339766B10.420Electronic payment system employing limited-use account numberGRANT2002-01-151998-12-0222762102GoodTransactionSecure LLCHanger Solutions LLC
US6795905B10.420Controlling accesses to isolated memory using a memory controller for isolated executionGRANT2004-09-212000-03-3124156188GoodIntel CorpIntel Corp
WO2001033318A10.419DEVICE AND METHOD FOR THE PROTECTED OUTPUT OF AN ELECTRONIC DOCUMENT THROUGH A DATA TRANSMISSION NETWORKAPPLICATION2001-05-101999-11-037927884Good
US5455407A0.418Electronic-monetary systemGRANT1995-10-031991-11-1525161747GoodCitibank NACitibank NA
US6915272B10.418System and method of secure payment and delivery of goods and servicesGRANT2005-07-052000-02-2324034035GoodNokia OyjNokia Technologies Oy
US5913203A0.417System and method for pseudo cash transactionsGRANT1999-06-151996-10-0324895274GoodJaesent IncJaesent Inc
US5930362A0.415Generation of encryption keyGRANT1999-07-271996-10-0924938083GoodAT&T Wireless Services IncAT&T Mobility II LLC, AT&T Wireless Services Inc
US5559887A0.414Collection of value from stored value systemsGRANT1996-09-241994-09-3023228476GoodElectronic Payment ServiceTouch Tech Inc
US6516414B10.414Secure communication over a linkGRANT2003-02-041999-02-2622980233GoodIntel CorpIntel Corp
US20060085647A10.414Detecting compromised ballotsAPPLICATION2006-04-202000-03-2436182186GoodDemoxi IncDemoxi Inc
US7096365B10.413Digital signatureGRANT2006-08-221999-01-298237475GoodInternational Business Machines CorpInternational Business Machines Corp
US6859795B10.412Method for carrying out transactions and device for realizing the sameGRANT2005-02-221998-11-2520212475GoodCyphermint IncSEITRAN INCORPORATED Inc, Cyphermint Inc, Harbinger Medical Inc
US6550008B10.411Protection of information transmitted over communications channelsGRANT2003-04-151999-02-2622981668GoodIntel CorpIntel Corp
US6199054B10.411Automated software metering of digital payloadsGRANT2001-03-061997-03-0621898010GoodSkylight Software IncZarbana Digital Fund LLC, Hanger Solutions LLC
US7110984B10.411Updating usage conditions in lieu of download digital rights management protected contentGRANT2006-09-191998-08-1336974618GoodInternational Business Machines CorpLevel 3 Communications LLC
US9672515B20.410Method and system for secure payments over a computer networkGRANT2017-06-062000-03-1522698221GoodMastercard International IncMastercard International Inc
US5208858A0.408METHOD FOR ALLOCATING USEFUL DATA TO A SPECIFIC ORIGINATORGRANT1993-05-041990-02-056399467GoodSiemens AGSiemens AG
US20080141033A10.407Trusted and secure techniques  systems and methods for item delivery and executionAPPLICATION2008-06-121995-02-1339499731GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6237096B10.407System and method for electronic transmission storage and retrieval of authenticated documentsGRANT2001-05-221995-01-1722105428GoodeOriginal IncDocument Authentication Systems Inc, eOriginal Inc
US9684889B20.406System and method for providing certification-related and other servicesGRANT2017-06-201999-02-1227537564GoodIdentrust IncIdentrust Inc
US5475757A0.406Secure data transmission methodGRANT1995-12-121994-06-0722967311GoodAT&T CorpAT&T Corp, Union Carbide Chemicals and Plastics Technology LLC
US7133792B20.405Method and apparatus for calibration over time of histological and physiological biometric markers for authenticationGRANT2006-11-072000-06-0825218186GoodEnsign Holdings LLCHALO WEARABLES LLC
US7664264B20.404Utilizing data reduction in steganographic and cryptographic systemsGRANT2010-02-161999-03-2437884133GoodBlue Spike IncWistaria Trading Ltd
US7506809B20.404Systems and methods for configuring a point-of-sale systemGRANT2009-03-241999-08-0946150097GoodFirst Data Corp, Western Union CoFirst Data Corp, Western Union Co
WO1998002815A10.403APPARATUS AND METHODS FOR TRANSMISSION SECURITY IN A COMPUTER NETWORKAPPLICATION1998-01-221996-07-1227361679Good
US6005935A0.403Method and system of using personal information as a key when distributing informationGRANT1999-12-211996-11-2025024960GoodAT&T CorpAT&T Corp
US10361802B10.403Adaptive pattern recognition based control system and methodGRANT2019-07-231999-02-0167300558GoodBlanding Hovenweep LLCHOFFBERG FAMILY TRUST 1, STEVEN M HOFFBERG 2004-1 GRAT, Blanding Hovenweep LLC
US5418854A0.403Method and apparatus for protecting the confidentiality of passwords in a distributed data processing systemGRANT1995-05-231992-04-2825365115GoodDigital Equipment CorpHewlett Packard Development Co LP
US4614861A0.402Unitary  self-contained card verification and validation system and methodGRANT1986-09-301984-11-1524695726GoodINTELLICARD INTERNATIONAL IncINTELLICARD INTERNATIONAL Inc
US7734553B20.400Systems and methods using cryptography to protect secure computing environmentsGRANT2010-06-081996-08-1224769786GoodIntertrust Technologies CorpIntertrust Technologies Corp
WO2001077790A10.398SYSTEM AND PROCESS FOR STORING SECURELY SECRET INFORMATION  APPARATUS AND SERVER TO BE USED IN SUCH A SYSTEM AND METHOD FOR DISTRIBUTION OF A DIGITAL CONTENTAPPLICATION2001-10-182000-04-118173645Good
US6986052B10.398Method and apparatus for secure execution using a secure memory partitionGRANT2006-01-102000-06-3024436506GoodIntel CorpIntel Corp
US5646992A0.398Assembly  distribution  and use of digital informationGRANT1997-07-081993-09-2322423643GoodDigital Delivery IncMicrosemi Frequency and Time Corp, Digital Delivery Inc
US6507907B10.395Protecting information in a systemGRANT2003-01-141999-02-2622984898GoodIntel CorpIntel Corp
US8690055B20.394Electronic cardGRANT2014-04-082000-05-1534427183GoodPrivaSys IncPrivaSys Inc
US7068787B10.394System and method for protection of digital worksGRANT2006-06-271998-10-2336600565GoodContentguard Holdings IncContentguard Holdings Inc, Xerox Corp
US6161179A0.393Key-based protection method for light-readable discsGRANT2000-12-121997-09-0526711522GoodWea Manufacturing IncWea Manufacturing Inc
US5018196A0.393Method for electronic transaction with digital signatureGRANT1991-05-211985-09-0427308187GoodHitachi LtdHitachi Ltd
US20020078358A10.392Electronic voting systemAPPLICATION2002-06-201999-08-1627495878GoodVoteHere IncDategrity Corp
US20020129255A10.391Digital signature or electronic seal authentication system and recognized mark management programAPPLICATION2002-09-121998-08-3127477976Good
US7231133B20.391Image processing system and method  memory card  and storage mediumGRANT2007-06-121999-12-2718499295GoodCanon IncCanon Inc
US5604801A0.391Public key data communications system under control of a portable security deviceGRANT1997-02-181995-02-0323511855GoodInternational Business Machines CorpInternational Business Machines Corp
US5864829A0.390Network charge method and systemGRANT1999-01-261995-09-1417010266GoodHitachi Software Engineering Co LtdHitachi Software Engineering Co Ltd
US5668878A0.389Secure cryptographic methods for electronic transfer of informationGRANT1997-09-161994-02-2824078071GoodMicrosoft Technology Licensing LLCRadialpoint Inc
WO2001095125A10.388PROCESSING ELECTRONIC DOCUMENTS WITH EMBEDDED DIGITAL SIGNATURESAPPLICATION2001-12-132000-06-0626904906Good
US5146500A0.388PUBLIC KEY CRYPTOGRAPHIC SYSTEM USING ELLIPTIC CURVES OVER RINGSGRANT1992-09-081991-03-148206517GoodOmnisecOmnisec
US6885748B10.388System and method for protection of digital worksGRANT2005-04-261999-10-2324137095GoodContentguard Holdings IncContentguard Holdings Inc
US5475758A0.388User authenticating system and method in wide area distributed environmentGRANT1995-12-121993-01-2211703371GoodFujitsu LtdFujitsu Ltd
US20040021549A10.387System and method of providing and autheticating works and authorship based on watermark techniqueAPPLICATION2004-02-052000-06-1019671617GoodMarkany IncMarkany Inc
US5475753A0.383Apparatus and method for certifying the delivery of informationGRANT1995-12-121993-11-1222537361GoodPanasonic Corp of North AmericaPanasonic Corp of North America
US6131090A0.382Method and system for providing controlled access to information stored on a portable recording mediumGRANT2000-10-101997-03-0425204604GoodPitney Bowes IncPitney Bowes Inc
US7543148B10.381Audio watermarking with covert channel and permutationsGRANT2009-06-021999-07-1322504054GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5680534A0.381Video game/videographics program fabricating system and method with superimpose controlGRANT1997-10-211994-10-3123299960GoodNintendo Co LtdNintendo Co Ltd
US5742756A0.381System and method of using smart cards to perform security-critical operations requiring user authorizationGRANT1998-04-211996-02-1224403080GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5606609A0.380Electronic document verification system and methodGRANT1997-02-251994-09-1923185324GoodScientific Atlanta LLCSilanis Technology Inc
WO1997008665A10.379SYSTEM AND METHOD FOR COMMERCIAL PAYMENTS USING TRUSTED AGENTSAPPLICATION1997-03-061995-08-3024076052Good
US4393269A0.379Method and apparatus incorporating a one-way sequence for transaction and identity verificationGRANT1983-07-121981-01-2922861475GoodInternational Business Machines CorpInternational Business Machines Corp
US20010021979A10.379Image processing apparatus  image processing method  image processing system and storage mediumAPPLICATION2001-09-132000-02-1626585461GoodCanon IncCanon Inc
US7162635B20.378System and method for electronic transmission  storage  and retrieval of authenticated electronic original documentsGRANT2007-01-091995-01-1727490957GoodeOriginal InceOriginal Inc
US5872846A0.376System and method for providing security in data communication systemsGRANT1999-02-161996-11-0724990173GoodMCI Communications CorpVerizon Patent and Licensing Inc
US6789199B10.374Tamper resistance with pseudo-random binary sequence program interlocksGRANT2004-09-072000-02-0823989003GoodInternational Business Machines CorpInternational Business Machines Corp
US8185473B20.374Trusted infrastructure support systems  methods and techniques for secure electronic commerce  electronic transactions  commerce process control and automation  distributed computing  and rights managementGRANT2012-05-221995-02-1337036736GoodIntertrust Technologies CorpIntertrust Technologies Corp
US20070043675A10.371SOFTWARE LICENSE MANAGERAPPLICATION2007-02-222000-05-1537768348GoodSiemens AGSiemens AG
US20020147922A10.370Software protection mechanismAPPLICATION2002-10-102000-05-1526005689GoodSiemens AGSiemens AG
US6104995A0.370Speaker identification system for authorizing a decision on an electronic documentGRANT2000-08-151996-08-3016898869GoodFujitsu LtdFujitsu Ltd
US6792334B20.369Vending machine for vending age-restricted products using an authorization card and associated methodsGRANT2004-09-142000-04-1822733015GoodChesterfield Holdings LLCChesterfield Holdings LLC
US8751793B20.369Trusted infrastructure support systems  methods and techniques for secure electronic commerce transaction and rights managementGRANT2014-06-101995-02-1332601076GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7069443B20.369Creating and verifying electronic documentsGRANT2006-06-272000-06-0622781866GoodIngeo Systems IncIngeo Systems Inc
US7343491B20.368Information processing apparatus and methodGRANT2008-03-112000-07-0626595540GoodSony CorpSony Corp
US5943426A0.366Method and apparatus for relaying digitally signed messagesGRANT1999-08-241995-09-2524124210GoodMotorola Solutions IncGoogle Technology Holdings LLC
WO2001046952A20.365DIGITAL CONTENT SECURITYAPPLICATION2001-06-281999-12-2123865259Good
US6629244B20.365Platform and method for assuring integrity of trusted agent communicationsGRANT2003-09-301999-04-2323150166GoodIntel CorpIntel Corp
US20040117663A10.364METHOD FOR AUTHENTICATION OF DIGITAL CONTENT USED OR ACCESSED WITH SECONDARY DEVICES TO REDUCE UNAUTHORIZED USE OR DISTRIBUTIONAPPLICATION2004-06-171998-06-0446299908GoodZ4 Technologies IncZ4 Technologies Inc
US5005200A0.363Public key/signature cryptosystem with enhanced digital signature certificationGRANT1991-04-021988-02-1223243621Good
US5768387A0.362Key authentication method and key authentication apparatusGRANT1998-06-161994-08-1016734288GoodFujitsu LtdFujitsu Ltd
US5835595A0.360Method and apparatus for crytographically protecting dataGRANT1998-11-101996-09-0424842756GoodAT&T CorpFraser Research Inc
US5214702A0.360Public key/signature cryptosystem with enhanced digital signature certificationGRANT1993-05-251988-02-1227387730Good
US5917908A0.360File protection system  software utilization system using the file protection system and storage medium used in the software utilization systemGRANT1999-06-291995-06-0715270011GoodFujitsu LtdFujitsu Ltd
US4771461A0.359Initialization of cryptographic variables in an EFT/POS network with a large number of terminalsGRANT1988-09-131986-06-2725374880GoodInternational Business Machines CorpInternational Business Machines Corp
US5228084A0.359Security apparatus and system for retail environmentsGRANT1993-07-131991-02-2824663033GoodGilbarco IncGilbarco Inc
US6347846B10.359Method and an apparatus to control copying from a data providing device to a data receiving deviceGRANT2002-02-191996-01-0811488902GoodToshiba CorpToshiba Corp
US6816843B10.358Method and apparatus for conducting purchases in private over a networkGRANT2004-11-092000-04-0633311045Good
US7389250B20.358Coercion-free voting schemeGRANT2008-06-172000-03-2427671375GoodDemoxi IncDemoxi Inc
US6338140B10.357Method and system for validating subscriber identities in a communications networkGRANT2002-01-081998-07-2726788563GoodIridium LLCIridium LLC
US6542500B10.356Network server platform (NSP) for a hybrid coaxial/twisted pair local loop network service architectureGRANT2003-04-011997-12-3121696809GoodAT&T CorpASHBOURNE TECHNOLOGIES LLC
US5748782A0.355Device for implementing a message signature system and chip card comprising such a deviceGRANT1998-05-051994-03-309461598GoodDe la Rue Cartes et Systemes SASDe la Rue Cartes et Systemes SAS
US6542610B20.355Content protection for digital transmission systemsGRANT2003-04-011997-01-3046276175GoodIntel CorpIntel Corp
US6778992B10.355Flexible and hierarchical user interfaces defined using a data definition languageGRANT2004-08-171999-12-2123860978GoodLockStream CorpMih Technology Holdings Bv
US7567909B10.354Electronic transactionsGRANT2009-07-281996-09-2610800522Good
US6684199B10.353METHOD FOR MINIMIZING PIRATING AND/OR UNAUTHORIZED COPYING AND/OR UNAUTHORIZED ACCESS OF/TO DATA ON/FROM DATA MEDIA INCLUDING COMPACT DISCS AND DIGITAL VERSATILE DISCS  AND SYSTEM AND DATA MEDIA FOR SAMEGRANT2004-01-271998-05-2030117679GoodRecording Industry Association of AmericaRecording Industry Association of America
US20040225894A10.353HARDWARE BASED METHOD FOR DIGITAL RIGHTS MANAGEMENT INCLUDING SELF ACTIVATING/SELF AUTHENTICATION SOFTWAREAPPLICATION2004-11-111998-06-0446299910GoodZ4 Technologies IncZ4 Technologies Inc
US20040133782A10.352Anonymous electronic transactions using auditable membership proofsAPPLICATION2004-07-081999-08-1132684528GoodInternational Computer Science InstInternational Computer Science Inst
US4529870A0.352Cryptographic identification  financial transaction  and credential deviceGRANT1985-07-161980-03-1026827309GoodInfoSpace IncInfoSpace Inc
US7058607B10.352Contents distribution method and systemGRANT2006-06-061998-10-2136569044GoodFuji Xerox Co LtdFuji Xerox Co Ltd
US7644273B10.351Modulation method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discsGRANT2010-01-051998-05-2022196487GoodRecording Industry Association of AmericaRecording Industry Association of America
US7743248B20.349System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting componentsGRANT2010-06-221995-01-1730772994GoodeOriginal InceOriginal Inc
US7512801B10.347Authentication system  authentication method  signing apparatus  signing method  certifying apparatus  certifying method  and a computer-readable recording medium with a program making a computer execute the method recording thereinGRANT2009-03-311999-03-3013937159GoodFujitsu LtdFujitsu Ltd
US6424717B10.347Encryption devices for use in a conditional access systemGRANT2002-07-231995-04-0327573932GoodScientific Atlanta LLCCisco Technology Inc
US7757088B20.347Methods of accessing and using web-pagesGRANT2010-07-132000-03-2027255605GoodCOMODO RESEARCH LAB LtdCOMODO RESEARCH LAB Ltd
US9198152B20.343Method for a secure detach procedure in a radio telecommunication networkGRANT2015-11-241998-12-108167151GoodNokia Technologies OyNokia Technologies Oy
US5903650A0.342Method and apparatus for electronic license distributionGRANT1999-05-111994-04-0422835013GoodApple IncApple Inc
US8548166B20.341Method for partially encrypting program dataGRANT2013-10-011995-04-0335375176GoodCisco Technology IncCisco Technology Inc
US6570974B10.341Cable connected network server platform for telephone white-yellow page services and emergency 911 location identificationGRANT2003-05-271998-12-3122840007GoodAT&T CorpAT&T Corp
US6510519B20.340Conditional access systemGRANT2003-01-211995-04-0327556700GoodScientific Atlanta LLCCisco Technology Inc
US5832089A0.340Off-line compatible electronic cash method and systemGRANT1998-11-031995-06-0723881939GoodNational Technology and Engineering Solutions of Sandia LLCNational Technology and Engineering Solutions of Sandia LLC
US6937729B20.339Representing entitlements to service in a conditional access systemGRANT2005-08-301995-04-0327577920GoodScientific Atlanta LLCCisco Technology Inc
US6560340B10.339Method and apparatus for geographically limiting service in a conditional access systemGRANT2003-05-061995-04-0327573933GoodScientific Atlanta LLCCisco Technology Inc
US6292568B10.339Representing entitlements to service in a conditional access systemGRANT2001-09-181966-12-1627573935GoodScientific Atlanta LLCCisco Technology Inc
US6411942B10.337Electronic transaction system and systems for issuing and examining electronic checkGRANT2002-06-251995-08-1816591316GoodFujitsu LtdFujitsu Ltd
US6058483A0.337Method for secure transfer of data by a communication networkGRANT2000-05-021996-12-249499107GoodGemplus SCAGemplus SCA
US6516412B20.337Authorization of services in a conditional access systemGRANT2003-02-041995-04-0327573934GoodScientific Atlanta LLCCisco Technology Inc
US6882987B20.336Methods and apparatus for transmitting and receiving a decoding key encoded with specific information to decode encrypted information of a record mediumGRANT2005-04-191995-06-3026490936GoodSony CorpSony Corp
US5915025A0.336Data processing apparatus with software protecting functionsGRANT1999-06-221996-01-1726339528GoodFuji Xerox Co LtdFuji Xerox Co Ltd
US6510152B10.334Coaxial cable/twisted pair fed  integrated residence gateway controlled  set-top boxGRANT2003-01-211997-12-3126669003GoodAT&T CorpAT&T Corp
US5422953A0.333Personal date/time notary deviceGRANT1995-06-061993-05-0522005125Good
US4868877A0.333Public key/signature cryptosystem with enhanced digital signature certificationGRANT1989-09-191988-02-1222555559Good
US5465299A0.331Electronic document processing system and method of forming digital signatureGRANT1995-11-071992-12-0318410654GoodHitachi Ltd, Hitachi Chubu Software LtdHitachi Ltd, Hitachi Chubu Software Ltd
US5604805A0.330Privacy-protected transfer of electronic informationGRANT1997-02-181994-02-2822753072GoodMicrosoft Technology Licensing LLCRadialpoint Inc
US7046778B20.330Telecommunications portal capable of interpreting messages from an external deviceGRANT2006-05-162000-03-3127498001GoodCopperCom IncCopperCom Inc
US5521980A0.329Privacy-protected transfer of electronic informationGRANT1996-05-281993-08-0227352448GoodMicrosoft Technology Licensing LLCRadialpoint Inc
US4885777A0.325Electronic transaction systemGRANT1989-12-051985-09-0426437879GoodHitachi LtdHitachi Ltd
US6148400A0.324Apparatus and method for establishing a crytographic link between elements of a systemGRANT2000-11-141994-02-2422745665GoodMerdan Group IncComcast Cable Communications LLC
US4386233A0.324Crytographic key notarization methods and apparatusGRANT1983-05-311980-09-2922708385GoodCOMMERCE United States, Secretary ofCOMMERCE United States, Secretary of
US7020285B10.324Stealthy audio watermarkingGRANT2006-03-281999-07-1333134563GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5666420A0.323Simultaneous electronic transactionsGRANT1997-09-091995-03-2122255563Good
US6141750A0.322Simultaneous electronic transactions with subscriber verificationGRANT2000-10-311995-03-2127487600Good
US6546016B10.321Coaxial cable/twisted pair cable telecommunications network architectureGRANT2003-04-081997-12-3121695649GoodAT&T CorpAT&T Corp
US7813506B20.321System and methods for permitting open access to data objects and for securing data within the data objectsGRANT2010-10-121999-12-0724937791GoodBlue Spike IncWistaria Trading Ltd
US6209100B10.318Moderated forums with anonymous but traceable contributionsGRANT2001-03-271998-03-2721961411GoodInternational Business Machines CorpInternational Business Machines Corp
US7818577B20.317Identifying material using a watermark and a signatureGRANT2010-10-192000-04-0526244052GoodSony Europe LtdSony Europe Ltd
US7685423B10.317Validation protocol and systemGRANT2010-03-232000-02-1524012546GoodSilverbrook Research Pty LtdMemjet Technology Ltd
US6055518A0.317Secure auction systemsGRANT2000-04-251996-02-0126681852GoodAT&T CorpAT&T Corp
US6134326A0.316Simultaneous electronic transactionsGRANT2000-10-171996-11-1825021010GoodBankers Trust CoBankers Trust Co
US5396624A0.315Account file for off-line transaction authorizationGRANT1995-03-071990-12-2024534462GoodVisa International Service AssociationVisa International Service Association
US7770017B20.313Method and system for digital watermarkingGRANT2010-08-031996-07-0239310215GoodWistaria Trading IncWistaria Trading Ltd
US6167136A0.313Method for preventing copying of digital video disksGRANT2000-12-261997-05-1625325550GoodSoftware Security IncSafeNet Inc, Software Security Inc
US5812670A0.313Traceable anonymous transactionsGRANT1998-09-221995-12-2826679354Good
US5483597A0.312Authentication process for at least one identification device using a verification device and a device embodying the processGRANT1996-01-091992-12-309437278Good
US5898779A0.312Photograhic system with selected area image authenticationGRANT1999-04-271997-04-1425273767GoodEastman Kodak CoMonument Peak Ventures LLC
US5901229A0.311Electronic cash implementing method using a trusteeGRANT1999-05-041995-11-0627296295GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US4578531A0.311Encryption system key distribution method and apparatusGRANT1986-03-251982-06-0923527123GoodNokia Bell LabsNokia Bell Labs
US5787172A0.310Apparatus and method for establishing a cryptographic link between elements of a systemGRANT1998-07-281994-02-2440600072GoodMerdan Group IncComcast Cable Communications LLC
US7222362B10.309Non-transferable anonymous credentialsGRANT2007-05-222000-05-1538049673GoodInternational Business Machines CorpRakuten Inc
US5923754A0.308Copy protection for recorded mediaGRANT1999-07-131997-05-0225308959GoodCompaq Computer CorpHewlett Packard Enterprise Development LP
US5878140A0.308Limited-traceability systemsGRANT1999-03-021994-02-0822713895GoodDigiCash IncVAN DETSAN NETWORKS LLC
US5218638A0.305ENCIPHER METHOD AND DECIPHER METHODGRANT1993-06-081990-12-0718510684GoodHitachi Ltd, Hitachi Chubu Software LtdHitachi Ltd, Hitachi Chubu Software Ltd
US4458109A0.303Method and apparatus providing registered mail features in an electronic communication systemGRANT1984-07-031982-02-0523358491GoodSiemens CorpSiemens Corp
WO1999049612A10.302IMPLICIT CERTIFICATE SCHEMEAPPLICATION1999-09-301998-03-2325680101Good
US4625076A0.300Signed document transmission systemGRANT1986-11-251984-03-1926381697GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US20030069748A10.299Methods for matching  selecting  narrowcasting  and/or classifying based on rights management and/or other informationAPPLICATION2003-04-101997-11-0627052814GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7987371B20.299Optimization methods for the insertion  protection  and detection of digital watermarks in digital dataGRANT2011-07-261996-07-0224718690GoodWistaria Trading IncWistaria Trading Ltd
US7761712B20.298Steganographic method and deviceGRANT2010-07-201995-06-0723942708GoodWistaria Trading IncWistaria Trading Ltd
US5276736A0.298Optionally moderated transaction systemsGRANT1994-01-041990-01-298204925GoodVAN DETSAN NETWORKS LLCVAN DETSAN NETWORKS LLC
US20010027520A10.297Authentication substitution system and Authentication substitution methodAPPLICATION2001-10-042000-03-2718602792GoodNEC CorpNEC Corp
US5130519A0.297Portable pin cardGRANT1992-07-141990-01-1623847965Good
US4926480A0.296Card-computer moderated systemsGRANT1990-05-151983-08-2222732871GoodVAN DETSAN NETWORKS LLCVAN DETSAN NETWORKS LLC
US7158652B20.294Method of using plural watermarks to prevent unauthorized image copyingGRANT2007-01-022000-02-2918574810GoodCanon IncCanon Inc
US5615269A0.292Ideal electronic negotiationsGRANT1997-03-251996-02-2224421392Good
US7203312B10.289Data reproduction apparatus and data reproduction moduleGRANT2007-04-101999-08-3026536330GoodFujitsu Ltd, Sanyo Electric Co LtdFujitsu Ltd, Sanyo Electric Co Ltd
US5442707A0.288Method for generating and verifying electronic signatures and privacy communication using elliptic curvesGRANT1995-08-151992-09-2826424008GoodPanasonic CorpPanasonic Corp
US4467139A0.286Process and system for transmission of signed messagesGRANT1984-08-211980-04-099240665GoodBull SABull SA
USRE34954E0.281Method for secure time-stamping of digital documentsGRANT1995-05-301990-08-0224243913GoodTelcordia Technologies IncTelcordia Technologies Inc
US5889862A0.281Method and apparatus for implementing traceable electronic cashGRANT1999-03-301995-07-1727324825GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US7424131B20.280Authentication of physical and electronic media objects using digital watermarksGRANT2008-09-091994-11-1627569210GoodDigimarc CorpDigimarc Corp
US6490355B10.280Method and apparatus for use of a time-dependent watermark for the purpose of copy protectionGRANT2002-12-031998-07-1426785980GoodKoninklijke Philips NVKoninklijke Philips NV
US7089417B20.278Cryptographic information and flow controlGRANT2006-08-081998-10-1630117706GoodTecSec IncTecSec Inc
US5479509A0.278Method for signature of an information processing file  and apparatus for implementing itGRANT1995-12-261993-04-069445811GoodBull CP8CP8 Technologies
US7515712B20.277Mechanism and apparatus for encapsulation of entitlement authorization in conditional access systemGRANT2009-04-071997-08-0146304205GoodCisco Technology IncCisco Technology Inc
US6192475B10.277System and method for cloaking softwareGRANT2001-02-201997-03-3126719040GoodCLOAKWORKS IncCLOAKWORKS Inc
US7664687B10.275System and method of determining collectability in a distributed negative fileGRANT2010-02-161999-12-2941665881GoodFirst Data CorpFirst Data Corp
US7822225B20.275Authentication of physical and electronic media objects using digital watermarksGRANT2010-10-262000-04-1726893502GoodDigimarc CorpDigimarc Corp
US8307212B20.272Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channelsGRANT2012-11-061996-08-1224769169GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5629982A0.272Simultaneous electronic transactions with visible trusted partiesGRANT1997-05-131995-03-2127378105GoodDocusign IncDocusign Inc
US6282650B10.271Secure public digital watermarkGRANT2001-08-281999-01-2522893252GoodIntel CorpIntel Corp
US3938091A0.271Personal verification systemGRANT1976-02-101972-03-1726929096GoodAtalla Technovations CorpAtalla Technovations Corp
US5434919A0.270Compact endorsement signature systemsGRANT1995-07-181994-01-1122658716GoodVAN DETSAN NETWORKS LLCVAN DETSAN NETWORKS LLC
US5200999A0.269PUBLIC KEY CRYPTOSYSTEM KEY MANAGEMENT BASED ON CONTROL VECTORSGRANT1993-04-061991-09-2725075907GoodInternational Business Machines CorpInternational Business Machines Corp
US7844074B20.269Optimization methods for the insertion  protection  and detection of digital watermarks in digitized dataGRANT2010-11-301996-07-0229552960GoodWistaria Trading IncWistaria Trading Ltd
US6707465B20.268Data processing apparatus and method  and storage mediumGRANT2004-03-162000-02-0926585121GoodCanon IncCanon Inc
US8879724B20.268Differential power analysis—resistant cryptographic processingGRANT2014-11-041998-01-0227578324GoodRambus IncRambus Inc, Cryptography Research Inc
US6137884A0.267Simultaneous electronic transactions with visible trusted partiesGRANT2000-10-241995-03-2127410765GoodBankers Trust CoDocusign Inc
US7664263B20.266Method for combining transfer functions with predetermined key creationGRANT2010-02-161998-03-2443858039GoodWistaria Trading LtdWistaria Trading Ltd
US7055034B10.265Method and apparatus for robust embedded dataGRANT2006-05-301998-09-2536462795GoodDigimarc CorpDigimarc Corp
US7268773B20.261Data entry user interfaceGRANT2007-09-112000-03-2222704319GoodSony Corp, Sony Electronics IncSony Corp, Ironworks Patents LLC
US6952774B10.261Audio watermarking with dual watermarksGRANT2005-10-041999-05-2223231199GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7668310B20.261Cryptographic computation using masking to prevent differential power analysis and other attacksGRANT2010-02-231998-06-0322207481GoodCryptography Research IncCryptography Research Inc
US5581616A0.261Method and apparatus for digital signature authenticationGRANT1996-12-031991-09-1727116957GoodNeXT Software IncNeXT Software Inc
US7028340B10.259Apparatus  a system and method for controlling access to contentsGRANT2006-04-111999-09-1717405815GoodFujitsu LtdFujitsu Ltd
US6937726B10.258System and method for protecting data files by periodically refreshing a decryption keyGRANT2005-08-301999-04-0634864172GoodContentguard Holdings IncContentguard Holdings Inc
US6148084A0.258Restrictedly blindable certificates on secret keysGRANT2000-11-141995-06-3019761255GoodMicrosoft Technology Licensing LLCRadialpoint Inc
US7775425B10.258System and method for approving a limit of check cashing over timeGRANT2010-08-171999-12-2942555729GoodFirst Data CorpFirst Data Corp
US7647503B20.258Optimization methods for the insertion  projection  and detection of digital watermarks in digital dataGRANT2010-01-121996-07-0246325829GoodWistaria Trading IncWistaria Trading Ltd
WO2002005071A20.257COMPUTER DEVICE FOR DECRYPTING ENCRYPTED DATAAPPLICATION2002-01-172000-07-078852245Good
US4977595A0.255Method and apparatus for implementing electronic cashGRANT1990-12-111989-04-0327303627GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US5307411A0.253Means for identification and exchange of encryption keysGRANT1994-04-261991-09-1220383706GoodTeleverketTelia Company AB
US5606617A0.252Secret-key certificatesGRANT1997-02-251994-10-1423252322GoodMicrosoft Technology Licensing LLCRadialpoint Inc
US6530021B10.252Method and system for preventing unauthorized playback of broadcasted digital data streamsGRANT2003-03-041998-07-2026787493GoodKoninklijke Philips NVKoninklijke Philips NV
US6052467A0.252System for ensuring that the blinding of secret-key certificates is restricted  even if the issuing protocol is performed in parallel modeGRANT2000-04-181995-03-2719865759GoodMicrosoft Technology Licensing LLCRadialpoint Inc
US6539364B20.251Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the methodGRANT2003-03-251997-12-2618462780GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US6173403B10.250Method and apparatus for distributing information productsGRANT2001-01-091997-04-3046256381GoodAchates Reference Publishing IncAchates Reference Publishing Inc
US5758317A0.249Method for voice-based affiliation of an operator identification code to a communication unitGRANT1998-05-261993-10-0422446545GoodMotorola Solutions IncMotorola Solutions Inc
US5396558A0.248Method and apparatus for settlement of accounts by IC cardsGRANT1995-03-071992-09-1827530191GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US7708198B20.244Wallet consolidator to facilitate a transactionGRANT2010-05-041998-05-2922203642GoodE Micro CorpStripe Inc
US5982889A0.243Method and apparatus for distributing information productsGRANT1999-11-091997-04-3025296120GoodAchates Reference Publishing IncAchates Reference Publishing Inc
US7286665B10.243System and method for transferring the right to decode messagesGRANT2007-10-231999-04-0638607094GoodContentguard Holdings IncContentguard Holdings Inc, Xerox Corp
US5515441A0.243Secure communication method and apparatusGRANT1996-05-071994-05-1222911089GoodAT&T CorpAT&T Corp
US4649233A0.242Method for establishing user authenication with composite session keys among cryptographically communicating nodesGRANT1987-03-101985-04-1124900472GoodInternational Business Machines CorpInternational Business Machines Corp
US5237609A0.239PORTABLE SECURE SEMICONDUCTOR MEMORY DEVICEGRANT1993-08-171989-03-3126419033GoodMitsubishi Electric CorpMitsubishi Electric Corp
US5029208A0.239Cipher-key distribution systemGRANT1991-07-021989-03-0327462763GoodNEC CorpNEC Corp
US7699220B20.239Automated transaction machineGRANT2010-04-201996-05-1034991844GoodTransaction Holdings Ltd LLCTransaction Holdings Ltd LLC
US4996711A0.236Selected-exponent signature systemsGRANT1991-02-261989-06-2123452273GoodVAN DETSAN NETWORKS LLCVAN DETSAN NETWORKS LLC
US5946397A0.236Method of cryptography with public key based on the discrete logarithmGRANT1999-08-311995-10-039483191GoodGemplus SCAThales DIS France SA
US6859533B10.233System and method for transferring the right to decode messages in a symmetric encoding schemeGRANT2005-02-221999-04-0634138153GoodContentguard Holdings IncContentguard Holdings Inc
US4949380A0.232Returned-value blind signature systemsGRANT1990-08-141988-10-2022987606GoodVAN DETSAN NETWORKS LLCVAN DETSAN NETWORKS LLC
US4876716A0.228Key distribution methodGRANT1989-10-241986-08-2226510465GoodNEC CorpNEC Corp
US5682430A0.228Secure anonymous message transfer and voting schemeGRANT1997-10-281995-01-2323485528GoodNEC Laboratories America IncNEC Corp
US7222108B20.228Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the methodGRANT2007-05-221998-12-2332106345GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US7356688B10.227System and method for document distributionGRANT2008-04-081999-04-0626826336GoodContentguard Holdings IncContentguard Holdings Inc, Xerox Corp
US6421070B10.223Smart images and image bookmarking for an internet browserGRANT2002-07-161996-11-1246276274GoodDigimarc CorpDigimarc Corp
US4759063A0.221Blind signature systemsGRANT1988-07-191983-08-2224091095GoodVAN DETSAN NETWORKS LLCVAN DETSAN NETWORKS LLC
US5150411A0.221CRYPTOGRAPHIC SYSTEM ALLOWING ENCRYPTED COMMUNICATION BETWEEN USERS WITH A SECURE MUTUAL CIPHER KEY DETERMINED WITHOUT USER INTERACTIONGRANT1992-09-221990-10-248204645GoodOmnisecOmnisec
US5144667A0.221METHOD OF SECURE REMOTE ACCESSGRANT1992-09-011990-12-2024527932GoodDelco Electronics LLCDelphi Technologies Inc
US4567600A0.219Method and apparatus for maintaining the privacy of digital messages conveyed by public transmissionGRANT1986-01-281982-02-028188855GoodOMNET ASSOCOMNET ASSOCIATES A CA PARTNERSHIP, OMNET ASSOC
US5966445A0.219Identification scheme single or multi-digital signature scheme giving message recovery single or multi-digital signature scheme with appendix key exchange scheme and blind digital signature schemeGRANT1999-10-121995-05-2619415517GoodKT CorpKT Corp
US5530759A0.216Color correct digital watermarking of imagesGRANT1996-06-251995-02-0123506452GoodInternational Business Machines CorpInternational Business Machines Corp
US6298137B10.211Ring-based public key cryptosystem methodGRANT2001-10-021996-08-1921819032GoodNTRU Cryptosystems IncOnboard Security Inc, SECURITY INNOVATION Inc
US4914698A0.209One-show blind signature systemsGRANT1990-04-031988-03-1626864464GoodVAN DETSAN NETWORKS LLCVAN DETSAN NETWORKS LLC
US7496198B20.202Partial dual encrypted stream utilizing program map tablesGRANT2009-02-241995-04-0333568640GoodCisco Technology IncCisco Technology Inc
US7738659B20.200Multiple transform utilization and application for secure digital watermarkingGRANT2010-06-151998-04-0221985536GoodWistaria Trading LtdWistaria Trading Ltd
US7058808B10.189Method for making a blind RSA-signature and apparatus thereforGRANT2006-06-061998-09-2920210748GoodCyphermint IncSCITRAN INEORHERATED Inc, Cyphermint Inc
US20040078576A10.186Pseudo-random number generatorAPPLICATION2004-04-222000-06-019892803Good
US5251258A0.177Key distribution system for distributing a cipher key between two subsystems by one-way communicationGRANT1993-10-051991-03-0514763933GoodNEC CorpNEC Corp
US7224798B20.172Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay systemGRANT2007-05-291995-04-0333568005GoodScientific Atlanta LLCCisco Technology Inc
US7730317B20.171Linear predictive coding implementation of digital watermarksGRANT2010-06-011996-12-2034681234GoodWistaria Trading IncWistaria Trading Ltd
US4759064A0.156Blind unanticipated signature systemsGRANT1988-07-191985-10-0725134183GoodVAN DETSAN NETWORKS LLCVAN DETSAN NETWORKS LLC
US5960081A0.148Embedding a digital signature in a video sequenceGRANT1999-09-281997-06-0525354275GoodCray Research LLCRPX Corp, Morgan Stanley and Co LLC
US6026163A0.141Distributed split-key cryptosystem and applicationsGRANT2000-02-151995-12-1326678315Good
US5861662A0.131Anti-tamper bond wire shield for an integrated circuitGRANT1999-01-191997-02-2425189846GoodArris Technology IncArris Technology Inc
SG96566A1NRTERMINAL APPARATUS AND RECORDING METHODGRANT2003-06-161999-09-1017301839Good
KR100844046B1NRAuthenticated paymentGRANT2008-07-042000-04-1726893486Good
JPS63301350ANRPREVENTING SYSTEM FOR WRONG ACCESS OF HOST COMPUTER INFORMATION GIVEN FROM TERMINAL EQUIPMENTGRANT1988-12-081987-06-0115139342Good
JPH10143357ANRSOFTWARE MANAGEMENT SYSTEMGRANT1998-05-291996-11-1117860077Good
JPH0969044ANRLICENSEE INFORMATION SYSTEMGRANT1997-03-111995-08-3116812194Good
JPH04100148ANRMETHOD FOR PREVENTING UNAUTHORIZED USE OF SOFTWARE INSIDE COMPUTER NETWORK SYSTEMGRANT1992-04-021989-10-0223648047Good
JP4772960B2NRCopy protection scheme for digital information playback devicesGRANT2011-09-141998-09-1022538527Good
GB2378794ANRGenerating a key hierarchy for use in an isolated execution environmentGRANT2003-02-192000-03-3124150840GoodIntel CorpIntel Corp
GB2355322ANRSystem and method for positive client identificationGRANT2001-04-181999-10-0523632215GoodAUTHORISZOR LtdAUTHORISZOR Ltd
GB2355157ANRSystem and method for authentication in a mobile communications systemGRANT2001-04-111998-07-078552157GoodNokia Networks OyNokia Networks Oy
GB2354102ANRSystem for communicating over a public networkGRANT2001-03-141999-09-0810860573GoodBARRON MCCANN LtdBARRON MCCANN Ltd
FR2800540A1NRSECURE TERMINAL PROVIDED WITH A CHIP CARD READER FOR COMMUNICATING WITH A SERVER VIA AN INTERNET-TYPE NETWORKGRANT2001-05-041999-10-289551482GoodBull CP8Bull CP8
FR2790629A1NRMETHOD FOR ACTIVATING LOCALIZED APPLICATIONS IN A CHIP CARD BY A BROWSER OF THE TYPE SAID "WEB"GRANT2000-09-081999-02-199542260GoodBull CP8Bull CP8
FR2779018A1NRSystem for undertaking secure electronic transactions via the internet using public telephone networksGRANT1999-11-261998-05-229526602GoodActivCard SAAssa Abloy AB
FR2660088A1NRDEVICE FOR CONDENSING DIGITAL DATA.GRANT1991-09-271990-03-269395110GoodCAMPANA MIREILLE LECINQCAMPANA MIREILLE LECINQ
EP1277300A1NRSYSTEM AND METHOD FOR CONTROLLING AND ENFORCING ACCESS RIGHTS TO ENCRYPTED MEDIAGRANT2003-01-222000-04-0622720289GoodMacrovision CorpMacrovision Corp
EP1253564A2NRMethod and apparatus for electronic paymentGRANT2002-10-302000-04-1927248649GoodMagicaxessMagicaxess
EP1203281A1NRSYSTEM FOR PROTECTING INFORMATION OVER THE INTERNETGRANT2002-05-081999-08-0222518552GoodHarris Interactive IncDot Assets No 2 LLC
EP1152381A1NRMethod of performing an electronic monetary transactionGRANT2001-11-072000-05-028175741GoodSoges-Mars SASoges-Mars SA
EP1091276A1NRAuthentication of hypertext kind of resources through signature handling protocolGRANT2001-04-111999-10-068242383GoodAlcatel CIT SA, Alcatel SAAlcatel CIT SA, Alcatel SA
EP1081912A2NRMethod and system for distributing multimedia data with management informationGRANT2001-03-071999-07-2816645299GoodHitachi LtdHitachi Ltd
EP1031910A1NRSoftware program protection mechanismGRANT2000-08-301998-12-2222815021GoodNETACTIVE IncNETACTIVE Inc
EP1001330A2NRMethod and system for copyright protection of digital images transmitted over networksGRANT2000-05-171998-11-1644675360GoodFinjan Software LtdFinjan Inc, CSAFE Ltd
EP0933765A1NROptical recording medium having secrecy of recorded information and erase method therefor and information recording/reading system using the sameGRANT1999-08-041998-02-0226357970GoodRicoh Co LtdRicoh Co Ltd
EP0859503A2NRElectronic watermark systemGRANT1998-08-191997-02-1212231473GoodNEC CorpNEC Corp
EP0854633A2NRImage data illegal use prevention systemGRANT1998-07-221997-01-1726339980GoodNEC CorpNEC Corp
EP0849657A1NRSecure data processing method and systemGRANT1998-06-241996-12-1810804616GoodNCR International IncNCR International Inc
EP0841615A2NRUpdating mechanism for softwareGRANT1998-05-131996-11-0810802657GoodFujitsu Services LtdFujitsu Services Ltd
EP0800312A1NRDATA TRANSMITTER  DATA TRANSMITTING METHOD  DATA RECEIVER  INFORMATION PROCESSOR  AND INFORMATION RECORDING MEDIUMGRANT1997-10-081995-10-0927457220GoodPanasonic CorpPanasonic Corp
EP0791899A2NRElectric field fingerprint sensor apparatus and related methodsGRANT1997-08-271996-01-2624370769GoodHarris CorpAuthenTec Inc
EP0786745A2NREnhanced security fingerprint sensor package and related methodsGRANT1997-07-301996-01-2624370781GoodHarris CorpAuthenTec Inc
EP0768595A1NRSystem and method for providing masquerade protection in a computer network using session keysGRANT1997-04-161995-10-1224162786GoodInternational Business Machines CorpInternational Business Machines Corp
EP0718761A1NRA platform independent object and object viewer loader and methodGRANT1996-06-261994-12-2023415694GoodSun Microsystems IncSun Microsystems Inc
EP0705025A2NRMethod and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval systemGRANT1996-04-031994-09-3023226030GoodEastman Kodak CoEastman Kodak Co
EP0089087A1NRCommunication system comprising a central data processing device  access stations and external stations  and incorporating a cryptographic check against falsification of an external station  and external stations for use in such a communication systemGRANT1983-09-211982-03-1619839419GoodKoninklijke Philips NVKoninklijke Philips NV
DE19610314A1NRIndividual access to use of computer programGRANT1997-09-181996-03-157788453Good
AU777631B2NRIdentification of computersGRANT2004-10-211999-07-1310857180GoodWaterleaf LtdFusion Holdings Ltd
AU695948B2NRApplication package and system for permitting a user to use distributed application package on the terms of the use thereofGRANT1998-08-271996-10-2917703193GoodPanasonic CorpPanasonic Corp
US5421009A0.698Method of remotely installing software directly from a central computerGRANT1995-05-301993-12-2222623958FairHP IncHP Inc
US6298443B10.612Method and system for supplying a custom software image to a computer systemGRANT2001-10-021998-04-2422067413FairDell USA LPDell USA LP
US7015806B20.556Distributed monitoring for a video security systemGRANT2006-03-211999-07-2027130360Fair@Security Broadband CorpComcast Cable Communications LLC
US8520068B20.549Video security systemGRANT2013-08-271999-07-2046278176FairComcast Cable Communications LLCComcast Cable Communications LLC
US5519603A0.542Intelligent process control communication system and method having capability to time align corresponding data setsGRANT1996-05-211992-06-1225408983FairDow Chemical CoDow Chemical Co
US6633963B10.441Controlling access to multiple memory zones in an isolated execution environmentGRANT2003-10-142000-03-3128794079FairIntel CorpIntel Corp
US5680533A0.418Videographics program/video game fabricating system and methodGRANT1997-10-211994-10-3123299951FairNintendo Co LtdNintendo Co Ltd
US6202209B10.412Personal information device and method for downloading reprogramming data from a computer to the personal information device via the PCMCIA port or through a docking station with baud rate conversion meansGRANT2001-03-131998-02-2423453136FairXircom IncKRONE DIGITAL COMMUNICATIONS Inc, Micron Technology Inc
US5592609A0.367Video game/videographics program fabricating system and method with unit based program processingGRANT1997-01-071994-10-3123298749FairNintendo Co LtdNintendo Co Ltd
US6115036A0.362Video game/videographics program editing apparatus with program halt and data transfer featuresGRANT2000-09-051994-10-3123298771FairNintendo Co LtdNintendo Co Ltd, Intelligent Systems Co Ltd
US5666501A0.356Method and apparatus for installing softwareGRANT1997-09-091995-03-3023636771FairInternational Business Machines CorpInternational Business Machines Corp
US9690747B20.341Configurable logic integrated circuit having a multidimensional structure of configurable elementsGRANT2017-06-271999-06-1027213558FairPACT XPP Tech AGScientia Sol Mentis AG
US5889864A0.312Data transmission systemsGRANT1999-03-301995-08-0110778578FairPlessey Semiconductors LtdMicrosemi Semiconductor Ltd
US6785814B10.281Information embedding method and apparatusGRANT2004-08-311998-07-2832912719FairFuji Photo Film Co LtdFujifilm Corp
US6690411B20.276Security systemGRANT2004-02-101999-07-2023404670Fair@Security Broadband CorpComcast Cable Communications LLC
US20060138226A10.246Precinct voting systemAPPLICATION2006-06-292000-03-0126881707FairHart InterCivic IncHart InterCivic Inc
US7685426B20.234Managing and indexing content on a network with image bookmarks and digital watermarksGRANT2010-03-231996-05-0746303830FairDigimarc CorpDigimarc Corp
US20050262829A10.073Exhaust gas purification device of internal combustion engineAPPLICATION2005-12-011998-06-2315999577Fair
US20050004672A10.024Bone graftsAPPLICATION2005-01-061995-10-1624974757FairDanek Medical IncDanek Medical Inc
US20050049082A10.012Golf ballAPPLICATION2005-03-031998-03-1834222532FairCallaway Golf CoCallaway Golf Co
JPS53148918ANRMATRIX DISPLAY UNITGRANT1978-12-261977-06-0113224771Fair
JPH1124918ANRSYSTEM AND METHOD FOR MANAGING LICENSE OF NON-GRATUITOUS SOFTWAREGRANT1999-01-291997-07-0416335514Fair
JPH11238038ANRNETWORK LICENSE MANAGEMENT SYSTEM AND RECORDING MEDIUMGRANT1999-08-311998-02-1912971430Fair
JPH11110209ANRSOFTWARE COPYING PREVENTION METHODGRANT1999-04-231997-09-3017446104Fair
JPH1040098ANRSOFTWARE MANAGEMENT SYSTEMGRANT1998-02-131996-07-1916267365Fair
JPH10283270ANRREPRODUCING PERMISSION METHOD  RECORDING METHOD  AND RECORDING MEDIUMGRANT1998-10-231997-04-0914017991Fair
JPH08190529ANRIDENTIFIER MANAGEMENT DEVICE AND METHOD FOR SOFTWARE CIRCULATION SYSTEMGRANT1996-07-231995-01-1011511596Fair
EP1094403A1NRControl content transmission method and storage-based broadcasting systemGRANT2001-04-251999-10-2117875490FairPanasonic CorpPanasonic Corp
EP0855829A2NRHiding an authentication code in an electric signalGRANT1998-07-291997-01-248547799FairNokia Technology GmbHNokia Technology GmbH
EP0590884A2NRImage forming method and apparatusGRANT1994-04-061992-09-2827478464FairCanon IncCanon Inc

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeMEDIUM
Tech ComplexityORDINARY
Priority DateEARLY
Tech DiversityBROAD
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
963
Recommended Classes
241
Government Assigned Classes
7
CPC
Title
Score
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system1.967
G06Q20/02involving a neutral party  e.g. certification authority  notary or trusted third party [TTP]1.282
G06Q20/12specially adapted for electronic shopping systems1.145
G06Q20/26Debit schemes  e.g. "pay now"1.122
G06Q20/00Payment architectures  schemes or protocols | apparatus for performing or posting payment transactions | (ref: G07F7/08)|   | (ref: G07F19/00)| | electronic cash registers | (ref: G07G1/12)1.116
G06Q20/3823combining multiple encryption tools for a transaction1.092
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)1.085
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.081
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.076
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists1.067
G06Q30/06Buying  selling or leasing transactions1.065
G06F21/121Restricting unauthorised execution of programs1.064
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints1.061
G06Q20/40145Biometric identity checks1.058
G06Q20/401Transaction verification1.051
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)1.045
G06F11/1453using de-duplication of the data1.043
G07F7/0866by active credit-cards adapted therefor | (ref: G07F7/1008)|  takes precedence1.043
G06Q30/0609Buyer or seller confidence or verification1.040
G06Q20/3226Use of secure elements separate from M-devices1.039
G06Q20/3227Use of a security embedded in M-devices1.038
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)1.037
G06F21/12Protecting executable software1.036
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)1.028
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks1.023
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)1.021
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level1.018
G06Q20/3829involving key management1.018
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)1.017
G06Q20/409Card specific authentication in transaction processing1.016
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.015
G06Q20/10specially adapted for electronic funds transfer [EFT] systems| specially adapted for home banking systems1.015
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy1.014
H04M1/2478Telephone terminals specially adapted for non-voice services  e.g. email  internet access | centralized arrangements where telephones services are combined | (ref: H04M7/0024)| | for recording text messages | (ref: H04M3/5322)| | for accessing Internet | (ref: H04M3/4938)1.006
G06Q20/04Payment circuits1.006
G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns  e.g. fingerprints | processing or analysis of tracks of nuclear particles | (ref: G01T5/02)|  | | information retrieval | (ref: G06F17/30)| | recognition of molecular sequences | (ref: G06F19/70)| | radio frequency identification | (ref: G06K7/00)| | recognition of barcodes and similar code images | (ref: G06K7/10)| | computer systems based on specific computational models | (ref: G06N)| | image analysis  inspection  positioning or tracking | (ref: G06T7/00)| | recognition of acoustic 1.006
G07C9/00087electronically1.006
G06F21/31User authentication1.003
G07B17/00733Cryptography or similar special procedures in a franking system1.001
G06Q30/0201Market data gathering  market analysis or market modelling0.998
G06Q20/4016involving fraud or risk level assessment in transaction processing0.997
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.997
G06Q30/04Billing or invoicing |   e.g. tax processing in connection with a sale0.994
G06F21/33using certificates0.994
G06Q20/355Personalisation of cards for use0.994
G06Q20/405Establishing or using transaction specific rules0.992
G06Q30/02Marketing  e.g. market research and analysis  surveying  promotions  advertising  buyer profiling  customer management or rewards| Price estimation or determination0.987
G06Q30/0214Referral award systems0.987
G06Q20/3825Use of electronic signatures0.984
H04W12/08Access security0.983
G06Q40/02Banking  e.g. interest calculation  credit approval  mortgages  home banking or on-line banking0.982
G06Q20/20Point-of-sale [POS] network systems | POS | per se|  | (ref: G07F)|  or | (ref: G07G)0.980
G06Q20/08Payment architectures0.980
H04L9/3247involving digital signatures0.977
G06F9/4416Network booting| Remote initial program loading [RIPL]0.975
H04L41/0866Checking configuration0.975
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)0.974
G06Q20/32using wireless devices0.971
G06F21/602Providing cryptographic facilities or services0.970
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload0.970
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.970
G06Q20/382insuring higher security of transaction0.970
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)0.968
G06Q20/204comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit0.968
G06Q20/24Credit schemes  i.e. "pay after"0.968
G06Q20/38215Use of certificates or encrypted proofs of transaction rights0.966
G06Q20/425using two different networks  one for transaction and one for security confirmation0.963
G06Q20/105involving programming of a portable memory device  e.g. IC cards  "electronic purses"0.962
G06Q40/00Finance| Insurance| Tax strategies| Processing of corporate or income taxes0.961
A61B5/00Detecting  measuring or recording for diagnostic purposes | radiation diagnosis | (ref: A61B6/00)| | diagnosis by ultrasonic  sonic or infrasonic waves | (ref: A61B8/00)| Identification of persons0.958
G06Q20/3274using a pictured code  e.g. barcode or QR-code  being displayed on the M-device0.957
G07F7/10together with a coded signal |   e.g. in the form of personal identification information  like personal identification number [PIN] or biometric data0.957
G06K9/00067Preprocessing| Feature extraction (minutiae)0.957
G06K9/00093Matching features related to minutiae and pores0.957
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)0.954
G06Q20/352Contactless payments by cards0.953
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)0.952
G06Q20/4014Identity check for transaction0.951
G06F21/305by remotely controlling device operation0.950
G07F7/08by coded identity card or credit card | or other personal identification means | without personal verification means | (ref: G07F7/02)0.949
G06F17/30156De-duplication implemented within the file system  e.g. based on file segments | de-duplication techniques in storage systems for the management of data blocks | (ref: G06F3/0641)0.949
H04M15/68Payment of value-added services0.949
G06F17/30321Indexing structures | indexing structures for unstructured textual data | (ref: G06F17/30619)0.948
G06Q30/0641Shopping interfaces0.948
G06F3/0608Saving storage space on storage systems0.946
H04N21/4415using biometric characteristics of the user  e.g. by voice recognition or fingerprint scanning | methods or arrangements for recognising patterns | (ref: G06K9/00)| | restricting access to computer systems by authenticating users using biometric data | (ref: G06F21/32)| | authentication mechanisms using biometrical features for network security | (ref: H04L29/06809)| | authentication in wireless network security | (ref: H04W12/06)0.946
G06K9/00006Acquiring or recognising fingerprints or palmprints | non-computerised biometric identification | (ref: A61B5/00)| | means for preventing unauthorised use of vehicles | (ref: B60R25/00)| | security in computer systems | (ref: G06F21/00)| | secure access to buildings | (ref: G07C9/00)| | secret or secure communication | (ref: H04L9/00)| | means for preventing unauthorised telephone calls | (ref: H04M1/667)0.945
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards0.944
H04L9/321involving a third party or a trusted authority0.941
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint0.941
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD0.939
G06Q30/0206Price or cost determination based on market factors0.938
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)0.938
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.938
G06F21/564by virus signature recognition0.938
G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction0.937
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]0.936
G06Q30/01Customer relationship  e.g. warranty0.935
H04W12/06Authentication0.933
H01L23/3735Laminates or multilayers  e.g. direct bond copper ceramic substrates0.932
G06K9/00087Matching| Classification0.931
H04L41/5051Service on demand  i.e. services are defined and provided in real time as requested by the user0.929
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)0.929
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)0.928
G06Q10/02Reservations  e.g. for tickets  services or events0.927
G06F9/466Transaction processing0.926
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements0.926
G06Q20/206comprising security or user identification provision  e.g. password entry0.926
H04L51/12with filtering and selective blocking capabilities0.924
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)0.924
G06Q30/0601Electronic shopping0.923
G06Q20/16Payments settled via telecommunication systems0.923
G06Q20/3224Transactions dependent on location of M-devices0.922
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)0.920
G06Q20/102Bill distribution or payments0.920
H04L51/18Messages including commands or codes to be executed either at an intermediate node or at the recipient to perform message-related actions | computer aided management of electronic mail | (ref: G06Q10/10)| | networked applications for remote control or remote monitoring of the application | (ref: H04L67/025)| | networked applications involving the movement of software or configuration parameters | (ref: H04L67/34)0.919
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour0.919
G06F11/1458Management of the backup or restore process0.918
G06Q20/3674involving authentication0.917
G06F21/41where a single sign-on provides access to a plurality of computers0.915
G07F7/082Features insuring the integrity of the data on or in the card0.914
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)0.914
G06Q20/3672Intelligent token initializing or reloading0.914
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys0.914
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities0.913
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)0.913
G06Q20/3221Access to banking information through M-devices0.912
G06Q20/06Private payment circuits  e.g. involving electronic currency used among participants of a common payment scheme0.912
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database0.911
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)0.911
G06Q20/385Use of an alias or a single-use code0.911
H04L63/126the source of the received data0.910
H04L63/123received data contents  e.g. message integrity0.910
H04L63/101Access control lists [ACL]0.908
G07F9/026for alarm  monitoring and auditing in vending machines or means for indication  e.g. when empty0.908
G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer  e.g. network details  transfer of information from host to ECR or from ECR to ECR0.908
G06F21/60Protecting data0.908
G06Q20/027involving a payment switch or gateway0.908
G06Q20/3278RFID or NFC payments by means of M-devices0.908
G06Q30/0233Method of redeeming a frequent usage reward0.907
H04L9/0841involving Diffie-Hellman or related key agreement protocols0.907
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding0.907
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)0.906
H04L9/3271using challenge-response0.906
G06Q30/0635Processing of requisition or of purchase orders0.905
G06Q20/322Aspects of commerce using mobile devices [M-devices]0.905
G06Q20/3821Electronic credentials0.904
H04L67/2823for conversion or adaptation of application content or format | message adaptation based on network or terminal capabilities | (ref: H04L51/06)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)| | optimising visualization of content for web browsing | (ref: G06F17/30905)0.902
G06Q10/087Inventory or stock management  e.g. order filling  procurement  balancing against orders0.902
G06K19/07739comprising a first part capable of functioning as a record carrier on its own and a second part being only functional as a form factor changing part  e.g. SIM cards type ID 0001  removably attached to a regular smart card form factor0.901
G06Q20/023characterized in that the neutral party is a clearing house0.901
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)0.900
G06Q20/4018using the card verification value [CVV] associated with the card0.900
G06Q20/1085involving automatic teller machines [ATMs]0.900
H04L67/18in which the network application is adapted for the location of the user terminal | wireless application services making use of the location of users or terminals | (ref: H04W4/02)|  takes precedence| location based Web retrieval | (ref: G06F17/3087)0.900
G06Q20/403Solvency checks0.899
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks0.898
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability0.897
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)0.896
G06Q20/407Cancellation of a transaction0.895
G07B15/063using wireless information transmission between the vehicle and a fixed station | identification of vehicles | (ref: G08G)0.894
G06F9/4862the task being a mobile agent  i.e. specifically designed to migrate0.893
G06Q20/42Confirmation  e.g. check or permission by the legal debtor of payment0.893
G06Q20/387Payment using discounts or coupons | relating to marketing | (ref: G06Q30/02)0.893
H04L67/306User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867)0.892
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)0.891
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules0.891
G06K9/00073Extracting features related to minutiae and pores0.891
H04W12/04Key management0.891
H04M15/00Arrangements for metering  time-control or time indication | | Metering  charging or billing arrangements for voice wireline or wireless communications  e.g. VoIP0.890
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures0.889
G06Q30/0185Product  service or business identity fraud0.889
G06F21/554involving event detection and direct action0.888
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)0.887
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)0.887
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)0.887
G07F7/122Online card verification0.887
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme0.886
G08B15/001Concealed systems  e.g. disguised alarm systems to make covert systems0.885
H04N21/4394involving operations for analysing the audio stream  e.g. detecting features or characteristics in audio streams | arrangements characterised by components specially adapted for monitoring  identification or recognition of audio in broadcast systems | (ref: H04H60/58)0.885
G06F17/30424Query processing0.885
G07F7/0813Specific details related to card security0.884
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)0.884
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)0.884
G09B7/02of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student0.884
G06F21/44Program or device authentication0.884
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key0.884
G06F21/6245Protecting personal data  e.g. for financial or medical purposes0.884
G07G5/00Receipt-giving machines | cash registers giving receipts | (ref: G07G1/00)0.884
G06Q20/3255using an SMS for payment0.883
H04W8/18Processing of user or subscriber data  e.g. subscribed services  user preferences or user profiles| Transfer of user or subscriber data0.883
H04W12/02Protecting privacy or anonymity0.883
G06F11/2097maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)|  and subgroups0.882
H04L67/22Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)| | e-commerce | (ref: G06Q30/00)0.882
G10L19/0018Speech coding using phonetic or linguistical decoding of the source| Reconstruction using text-to-speech synthesis0.881
G07F7/1091Use of an encrypted form of the PIN0.881
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip0.881
G06Q20/367involving intelligent token  e.g. electronic purse0.881
G06F11/1448Management of the data involved in backup or backup restore0.881
H04L63/0815providing single-sign-on or federations0.881
G06K9/0002by non-optical methods  e.g. by ultrasonic or capacitive sensing0.880
G06Q10/04Forecasting or optimisation  e.g. linear programming  "travelling salesman problem" or "cutting stock problem" | data collection specially adapted for marketing  price determination or demand forecasting | (ref: G06Q30/02)0.879
G06Q40/025Credit processing or loan processing  e.g. risk analysis for mortgages0.879
H04B1/3816Mechanical arrangements for accommodating identification devices  e.g. cards or chips| with connectors for programming identification devices0.879
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.879
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.879
G06K9/00013Image acquisition | materials for developing fingerprints  means for visual identification | (ref: A61B5/1172)0.879
G06Q20/3276using a pictured code  e.g. barcode or QR-code  being read by the M-device0.878
G06Q20/3223Realising banking transactions through M-devices0.878
G06Q20/38Payment protocols| Details thereof0.878
G06T1/005Robust watermarking  e.g. average attack or collusion attack resistant0.877
G06F11/1471involving logging of persistent data for recovery0.877
G06F21/42using separate channels for security data0.877
G06Q20/042characterized in that the payment protocol involves at least one cheque0.877
H04L29/06characterised by a protocol0.877
H04L67/1002for accessing one among a plurality of replicated servers  e.g. load balancing | arrangements or protocols for peer-to-peer networking | (ref: H04L67/104)| | protocols for client-server architectures | (ref: H04L67/42)| | allocation of processing resources to service requests in a distributed system | (ref: G06F9/5027)| | rebalancing the processing load in a distributed system | (ref: G06F9/5083)| | wireless network traffic load balancing | (ref: H04W28/08)| | network load balancing  traffic engineering | (ref: H04L47/125)| | video servers using load balancing strategies | (ref: H04N21/23103)|0.876
H04N21/8352involving content or source identification data  e.g. Unique Material Identifier [UMID]0.876
H04L67/2842for storing data temporarily at an intermediate stage  e.g. caching | distributed storage of data in a network | (ref: H04L67/1097)| | browsing optimization of access to content by caching | (ref: G06F17/30902)| | addressing of a cache within a hierarchically structured memory system | (ref: G06F12/0802)| | disk caching | (ref: G06F12/0866)0.875
G06Q40/04Exchange  e.g. stocks  commodities  derivatives or currency exchange0.875
G06T15/506Illumination models0.875
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)0.874
G06F9/5033considering data affinity0.874
G06Q30/00Commerce  e.g. shopping or e-commerce0.874
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation0.874
H04L63/1416Event detection  e.g. attack signature detection0.874
G06F11/2025using centralised failover control functionality0.871
G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups  e.g. automatic card files incorporating conveying and reading operations0.871
G06F11/1433during software upgrading0.870
G06F9/542Event management| Broadcasting| Multicasting| Notifications0.870
H04W36/245by historical data0.870
H04L9/3297involving time stamps  e.g. generation of time stamps0.870
H04L63/0281Proxies0.870
G06F21/43wireless channels0.869
G10L15/22Procedures used during a speech recognition process  e.g. man-machine dialogue0.869
G06Q30/0637Approvals0.869
H04L63/102Entity profiles0.868
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files0.867
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)0.866
G06Q30/0225Avoiding frauds0.865
H04L12/2856Access arrangements  e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W)0.865
G06F8/658Incremental updates| Differential updates0.865
G06F11/2079Bidirectional techniques0.864
G09F27/00Combined visual and audible advertising or displaying  e.g. for public address0.864
G06K7/10237the reader and the record carrier being capable of selectively switching between reader and record carrier appearance  e.g. in near field communication [NFC] devices where the NFC device may function as an RFID reader or as an RFID tag0.863
C07K14/47from mammals0.863
G07F19/20Automatic teller machines [ATMs]0.863
G06Q20/4012Verifying personal identification number [PIN]0.863
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates0.862
G06Q20/388Mutual authentication without cards0.862
G06Q30/0211Determining discount or incentive effectiveness0.862
G06Q20/347Passive cards0.861
G06Q20/108Remote banking  e.g. home banking0.861
G06F21/575Secure boot0.860
G06Q20/354Card activation or deactivation0.860
G06K9/00026by combining adjacent partial images (e.g. slices) to create a composite input or reference pattern| tracking a sweeping finger movement | for specific swipe sensing hardware the groups | (ref: G06K9/0002)|   | (ref: G06K9/00033)|   | (ref: G06K9/0004)|  and | (ref: G06K9/00046)|  take precedence0.860
H04L67/42Protocols for client-server architectures | access to replicated servers | (ref: H04L67/1002)0.860
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals0.860
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM] | network arrangements or protocols for real-time communications | (ref: H04L65/00)0.859
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics0.859
H04L41/065involving logical or physical relationship  e.g. grouping and hierarchies0.858
G06Q20/342Cards defining paid or billed services or quantities0.858
H04L67/2819Enhancement of application control based on intercepted application data0.858
A61B5/1172using fingerprinting0.857
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity0.856
G06F3/03545Pens or stylus0.856
G06Q40/12Accounting0.856
G06K5/00Methods or arrangements for verifying the correctness of markings on a record carrier| Column detection devices0.855
G06Q20/223based on the use of peer-to-peer networks0.855
G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending  hiring  coin or paper currency dispensing or refunding apparatus | handling coins or paper currencies apart from coin-freed or like apparatus | (ref: G07D)| | complete banking systems | (ref: G07F19/00)0.429
G07F7/025by means  e.g. cards  providing billing information at the time of purchase  e.g. identification of seller or purchaser  quantity of goods delivered or to be delivered0.421
G06Q30/0603Catalogue ordering0.409
G06Q20/0855involving a third party0.409
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.407
H04L9/0822using key encryption key0.407
G06Q20/085involving remote charge determination or related payment systems0.403
G06F21/629to features or functions of an application0.400
G06F21/35communicating wirelessly0.400
G06Q20/383Anonymous user system0.399
G10L17/00Speaker identification or verification0.397
H04M3/493Interactive information services  e.g. directory enquiries | | Arrangements therefor  e.g. interactive voice response [IVR] systems or voice portals0.397
G07G3/003Anti-theft control | theft alarms | (ref: G08B13/00)0.392
G06F11/1464for networked environments0.391
G06Q20/363with the personal data files for a user0.391
G06Q30/08Auctions |   matching or brokerage | matching or brokerage for stock exchange | (ref: G06Q40/04)0.391
G06F21/73by creating or determining hardware identification  e.g. serial numbers0.391
G06F3/04883for entering handwritten data  e.g. gestures  text0.390
G06F3/04817using icons | graphical programming languages using iconic symbols | (ref: G06F8/34)0.390
G06Q20/123Shopping for digital content0.382
G06Q20/22Payment schemes or models0.382
G06Q20/327Short range or proximity payments by means of M-devices0.381
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)0.377
H04L67/26Push based network services | broadcast or multicast push services | (ref: H04L12/1859)0.377
H04L67/16Service discovery or service management  e.g. service location protocol [SLP] or Web services | network service management for ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | address allocation to terminals or nodes connected to a network | (ref: H04L61/30)| | mobile application services specially adapted for wireless communication networks | (ref: H04W4/00)0.377
G06Q20/28Pre-payment schemes  e.g. "pay before"0.377
G06F21/83input devices  e.g. keyboards  mice or controllers thereof0.377
G06K9/00926Maintenance of references| Enrolment0.377
G06K7/10297arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs  e.g. ISO/IEC 14443 and 18092 | protocols for data communication in general  | see|  | (ref: H04L29/06)0.377
G07C9/00039by means of a pass-word | (ref: G07F7/00)|  takes precedence0.377
G07C9/00111the pass performing a presence indicating function  e.g. identification tag or transponder | identification by using radar means | (ref: G01S13/02)|   | (ref: G01S13/74)| | detecting presence by using magnetic or electric fields produced or modified by objects in general | (ref: G01V3/08)|   | (ref: G01V3/165)| | means for indicating the location of accidentally buried persons | (ref: A63B29/02)0.377
G07B17/0008Communication details outside or between apparatus | coin-freed apparatus for franking | per se|  | (ref: G07F17/26)0.376
G06Q30/014Product recall0.374
G06Q10/0837Return transactions0.374
G06Q30/016Customer service  i.e. after purchase service0.374
G06Q10/06375Prediction of business process outcome or impact based on a proposed change0.374
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms0.374
H04B5/0031for data transfer0.374
H04B5/02using transceiver0.374
G06Q20/3552Downloading or loading of personalisation data0.373
G06Q30/0218based on score0.370
G06Q30/0274Split fees0.370
G06Q30/0242Determination of advertisement effectiveness0.370
G06Q30/0247Calculate past  present or future revenues0.370
G06Q30/0246Traffic0.370
G06Q30/0203Market surveys or market polls0.370
G06Q30/0633Lists  e.g. purchase orders  compilation or processing0.370
G06Q30/0613Third-party assisted0.370
G06Q20/227characterized in that multiple accounts are available to the payer0.369
G06Q20/4093Monitoring of card authentication0.368
G07F19/211Software architecture within ATMs or in relation to the ATM network0.368
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer0.366
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.366
G06Q20/29characterised by micropayments0.364
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.364
G06F21/40by quorum  i.e. whereby two or more security principals are required0.364
H04L29/08072Application layer  i.e. layer seven | not used0.364
H04L63/0272Virtual private networks0.364
G06F21/6254by anonymising data  e.g. decorrelating personal data from the owner's identification0.363
G06F21/606by securing the transmission between two devices or processes0.363
G07F17/3262Player actions which determine the course of the game  e.g. selecting a prize to be won  outcome to be achieved  game to be played0.363
A63F13/12involving interaction between a plurality of game devices  e.g. transmisison or distribution systems | protocols for networked virtual reality  networked games | (ref: H04L29/06034)0.363
G07F17/32for games  toys  sports or amusements  | e.g. casino games  online gambling or betting | game play without financial reward | (ref: A63F)0.363
A63F13/792for payment purposes  e.g. monthly subscriptions0.363
G07F17/3223Architectural aspects of a gaming system  e.g. internal configuration  master/slave  wireless communication0.363
G06Q30/0251Targeted advertisement0.361
G06Q20/4097Mutual authentication between card and transaction partners0.361
H04L29/12367between local and global IP addresses0.361
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)0.361
H04L61/2514between local and global IP addresses0.361
H04L29/12009Arrangements for addressing and naming in data networks0.361
H04L63/0838using one-time-passwords0.361
H04L61/2517involving port numbers0.361
H04L29/12377involving port numbers0.361
G06F21/313using a call-back technique via a telephone network0.360
G06Q10/0635Risk analysis0.360
G06Q20/325using wireless networks0.360
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)0.360
G06Q30/0619Neutral agent0.360
A61B5/026Measuring blood flow | (ref: A61B3/1233)|   | (ref: A61B3/1241)|  take precedence0.359
A61B5/01Measuring temperature of body parts| | Diagnostic temperature sensing  e.g. for malignant or inflamed tissue| clinical thermometers | (ref: G01K5/22)| | thermometers for special purposes | (ref: G01K13/00)0.359
G06Q20/14specially adapted for billing systems0.359
G06K9/00973Hardware and software architectures for pattern recognition  e.g. modular organisation0.359
G06K9/6215Proximity measures  i.e. similarity or distance measures0.359
G06K9/001Matching features related to ridge properties or fingerprint texture0.359
G06K9/522Frequency domain transformation| Autocorrelation0.359
H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence | pseudo-random number generators in general | (ref: G06F7/58)0.358
H04L29/06027Protocols for multimedia communication0.358
H04L65/607Stream encoding details | interfacing the downstream path of a video distribution network | (ref: H04N21/238)|   | (ref: H04N21/438)| | controlling the complexity of a video stream | (ref: H04N21/2662)|   | (ref: H04N21/4621)|   | (ref: H04N21/64792)| | protocols for data compression | (ref: H04L69/04)| | header parsing or analysis | (ref: H04L69/22)0.358
H04N21/6587Control parameters  e.g. trick play commands  viewpoint selection0.358
H04N7/163by receiver means only0.358
H04N21/25866Management of end-user data | customer care in data networks | (ref: H04L41/5077)0.358
H04N7/17318Direct or substantially direct transmission and handling of requests0.358
H04N21/47202for requesting content on demand  e.g. video on demand0.358
H04L65/4084Content on demand | analog television systems using two way working | (ref: H04N7/173)| | end-user applications for requesting content  additional data or services | (ref: H04N21/472)0.358
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.358
H04N21/26606for generating or managing entitlement messages  e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14)0.358
H04N21/6125involving transmission via Internet | transmission by internet of broadcast information | (ref: H04H60/82)0.358
H04N21/2347involving video stream encryption | arrangements for secret or secure communication | (ref: H04L9/00)|   analogue secrecy systems | (ref: H04N7/16)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)| | arrangements for preventing the taking of data from a data transmission channel without authorisation | (ref: H04L12/22)| | security arrangements in wireless networks | (ref: H04W12/00)0.358
G06F3/021Arrangements integrating additional peripherals in a keyboard  e.g. card or barcode reader  optical scanner0.358
H04L63/168above the transport layer0.357
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)0.357
H04L67/2809for brokering | negotiation of communication capabilities | (ref: H04L69/24)| | e-commerce | (ref: G06Q30/00)0.357
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)0.357
G10L17/22Interactive procedures| Man-machine interfaces0.357
G06Q20/4037Remote solvency checks0.356
H04W4/24Accounting or billing0.356
G06Q20/3229Use of the SIM of a M-device as secure element0.356
G06F3/0488using a touch-screen or digitiser  e.g. input of commands through traced gestures0.356
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage0.356
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.356
G06F21/6272by registering files or documents with a third party0.356
G06F3/062Securing storage systems0.355
G06F3/067Distributed or networked storage systems  e.g. storage area networks [SAN]  network attached storage [NAS]0.355
G06F3/0641De-duplication techniques0.355
G06K9/00221Acquiring or recognising human faces  facial parts  facial sketches  facial expressions0.354
G06F17/30867with filtering and personalisation0.354
G06F17/30914Mapping or conversion0.354
G06Q20/3827Use of message hashing0.354
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)0.353
G06Q20/349Rechargeable cards0.353
G06Q20/045characterized in that the payment protocol involves at least one ticket0.353
G06Q20/18involving self- service terminals [SSTs]  vending machines  kiosks or multimedia terminals0.353
G06F21/645using a third party0.352
G06F21/577Assessing vulnerabilities and evaluating computer system security0.352
G06F17/30864by querying  e.g. search engines or meta-search engines  crawling techniques  push systems0.352
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)0.352
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)0.352
G06F17/30244in image databases0.351
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]0.351
H04L9/3255using group based signatures  e.g. ring or threshold signatures0.351
G06Q50/265Personal security  identity or safety0.351
G06Q20/381Currency conversion0.350
H05K7/20409Outer radiating structures on heat dissipating housings  e.g. fins integrated with the housing0.349
H05K7/20509Cold plates  e.g. multi-component heat spreader  support plates  non closed structures0.349
H01L23/367Cooling facilitated by shape of device | (ref: H01L23/38)|   | (ref: H01L23/40)|   | (ref: H01L23/42)|   | (ref: H01L23/44)|   | (ref: H01L23/46)|  take precedence0.349
G06Q20/3563Software being resident on card0.349
G06Q20/3574Multiple applications on card0.349
G06K19/0718the sensor being of the biometric kind  e.g. fingerprint sensors | fingerprint sensors in general  | see|  | (ref: G06K9/00)| | biometric access-control systems in general  | see|  | (ref: G07C9/00)0.349
H04L63/105Multiple levels of security0.349
H04M1/72577to restrict the functionality or the communication capability of the terminal | network access restriction | (ref: H04W48/02)0.349
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine0.349
H04L63/166at the transport layer0.349
H04L9/3236using cryptographic hash functions0.348
G06Q20/353Payments by additional cards plugged into M-devices0.348
H04M15/53using mediation0.348
H04M15/90using Intelligent Networks [IN] or Advanced Intelligent Networks [AIN]0.348
H04M3/4228in networks0.348
H04Q3/0029Provisions for intelligent networking0.348
H04M17/02Coin-freed or check-freed systems |   e.g. mobile- or card-operated phones  public telephones or booths0.348
G06K9/00154Reading or verifying signatures| Writer recognition0.348
G07F7/04by paper currency0.348
H04L51/14with selective forwarding0.348
G06Q10/063Operations research or analysis0.348
G07C9/00103with central registration and control  e.g. for swimming pools or hotel-rooms  generally in combination with a pass-dispensing system0.348
G06Q20/0457characterized in that the ticket is sent electronically0.348
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL0.347
G06F21/445by mutual authentication  e.g. between devices or programs0.347
H04L67/04adapted for terminals or networks with limited resources or for terminal portability  e.g. wireless application protocol [WAP] | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)0.346
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences0.346
H04W12/10Integrity0.346
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.346
H04W4/029Location-based management or tracking services0.346
H04W64/003locating network equipment0.346
H04W64/00Locating users or terminals | or network equipment|  for network management purposes  e.g. mobility management0.346
G06T1/0021Image watermarking0.345
G07F7/0886the card reader being portable for interacting with a POS or ECR in realizing a payment transaction0.345
H04L51/00Arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages0.345
H04W4/50Service provisioning or reconfiguring0.345
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.344
H04L67/2847involving pre-fetching or pre-delivering data based on network characteristics | cache prefetching within a hierarchical structured memory system | (ref: G06F12/0862)0.344
G07F17/0014for vending  access and use of specific services not covered anywhere else in | (ref: G07F17/00)|  | meter-controlled dispensing of liquid  gas or electricity | (ref: G07F15/00)0.343
G07F15/12in which metering is on a time basis0.343
G06Q20/127Shopping or accessing services according to a time-limitation0.343
G07F15/003for electricity0.343
H04M3/00Automatic or semi-automatic exchanges | constructional details of telephone exchanges | (ref: H04Q1/02)0.343
H04L12/28characterised by path configuration  e.g. local area networks [LAN]  wide area networks [WAN]0.343
H04N7/17309Transmission or handling of upstream communications0.342
H04N21/47815Electronic shopping | payment schemes  payment architectures or payment protocols for electronic shopping systems | (ref: G06Q20/12)0.342
H04N21/2542for selling goods  e.g. TV shopping | payment schemes  payment architectures or payment protocols for electronic shopping systems | (ref: G06Q20/12)0.342
H04N21/4185for payment | mechanisms actuated by coded identity card or credit card to free or to actuate vending  hiring  coin or paper currency dispensing or refunding apparatus | (ref: G07F7/08)| | payment schemes  architectures or protocols | (ref: G06Q20/00)| | e-commerce | (ref: G06Q30/00)| | charging arrangements in data networks | (ref: H04L12/14)0.342
H04N21/47805Electronic banking | banking in general | (ref: G06Q30/02)0.342
H04N21/4782Web browsing |   e.g. WebTV | information retrieval from the Internet | (ref: G06F17/30861)| | protocols for network applications involving the use of web-based technology | (ref: H04L29/0809)0.342
H04N21/4622Retrieving content or additional data from different sources  e.g. from a broadcast channel and the Internet | web site content organization and management for information retrieval from the Internet | (ref: G06F17/3089)| | transmission by internet of broadcast information | (ref: H04H60/82)| | stock exchange data over packet-switching network | (ref: H04L12/1804)| | push services including data channel over packet-switching network | (ref: H04L12/1859)0.342
H04N21/2543Billing |   e.g. for subscription services | payment schemes  architectures or protocols | (ref: G06Q20/00)| | e-commerce | (ref: G06Q30/00)| | arrangements for billing for the use of broadcast information or broadcast-related information | (ref: H04H60/21)| | charging arrangements in data networks | (ref: H04L12/14)0.342
G07F17/16for devices exhibiting advertisements  announcements  pictures or the like0.342
G06Q30/0269based on user profile or attribute0.342
G06Q10/00Administration| Management0.342
H04L67/303Terminal profiles0.342
G06Q30/0255based on user history0.342
G06F21/88Detecting or preventing theft or loss0.342
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication0.342
G06Q20/36using electronic wallets or electronic money safes0.342
G07F7/088the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself0.341
G06Q20/351Virtual cards0.341
G06F21/6263during internet communication  e.g. revealing personal data from cookies0.341
G06F17/30247based on features automatically derived from the image data | pattern recognition | (ref: G06K9/00)0.341
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity0.341
H04L63/1425Traffic logging  e.g. anomaly detection0.341
G06N7/005Probabilistic networks0.341
G07G3/006False operation0.341
G07G1/0009Details of the software in the checkout register  electronic cash register [ECR] or point of sale terminal [POS]0.341
G06Q30/0226Frequent usage incentive systems  e.g. frequent flyer miles programs or point systems0.341
G06Q40/06Investment  e.g. financial instruments  portfolio management or fund management0.341
G06Q30/0241Advertisement0.341
G06Q30/0234Rebate after completed purchase  i.e. post transaction awards0.341
G06F21/126Interacting with the operating system0.340
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow0.340
G07G1/12electronically operated | digital data processing aspects | (ref: G06Q20/00)0.340
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)0.340
G06F21/608Secure printing0.340
H04L63/0245Filtering by information in the payload0.340
G06F21/335for accessing specific resources  e.g. using Kerberos tickets0.340
H04L67/20involving third party service providers | e-commerce | (ref: G06Q30/00)0.339
G06F21/36by graphic or iconic representation0.339
G06Q20/30characterised by the use of specific devices0.339
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)0.339
H04W4/12Messaging| Mailboxes| Announcements0.338
G06F3/04895Guidance during keyboard input operation  e.g. prompting | help systems | (ref: G06F9/453)0.338
H04L67/2814for data redirection | load balancing of replicated servers | (ref: H04L67/1002)| | access network selection | (ref: H04L12/5691)| | routing or path finding of packets | (ref: H04L45/00)| | content or context based routing | (ref: H04L67/327)| | network addressing or naming provisions | (ref: H04L61/00)0.338
G07F19/201Accessories of ATMs0.338
G07F19/206Software aspects at ATMs0.338
G07G1/0036Checkout procedures0.338
G06Q20/209Specified transaction journal output feature  e.g. printed receipt or voice output0.338
G07G1/0081the reader being a portable scanner or data reader | (ref: G07G1/009)|  takes precedence0.338
G06F3/023Arrangements for converting discrete items of information into a coded form  e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes  operand codes or instruction codes | coding in connection with keyboards or like devices in general | (ref: H03M11/00)0.338
H04L67/28for the provision of proxy services  e.g. intermediate processing or storage in the network | network management provisions | (ref: H04L41/00)| | network monitoring provisions | (ref: H04L43/00)| | proxies for network security | (ref: H04L63/0281)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)0.338
H04W52/0254detecting a user operation or a tactile contact or a motion of the device0.338
H04M1/72575by connection of an exchangeable housing part0.338
H04M17/103using SIMs (USIMs) or calling cards0.338
H04M17/106using commercial credit or debit cards0.338
H04L41/32Specific management aspects for broadband networks0.338
G06K19/07707the visual interface being a display  e.g. LCD or electronic ink0.338
G06K19/07773Antenna details | antennas for wireless devices  e.g. RFID tags  in general | (ref: H01Q1/22)0.338
G06Q20/3576Multiple memory zones on card0.338
G06Q30/0277Online advertisement0.338
G06Q30/0253During e-commerce  i.e. online transactions0.338
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.337
G07F7/0826Embedded security module0.337
H04W48/16Discovering  processing access restriction or access information0.337
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals0.337
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC0.337
G06K7/14131D bar codes0.337
G06K7/14172D bar codes0.337
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)0.337
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.337
G06F21/79in semiconductor storage media  e.g. directly-addressable memories0.337
G06F21/85interconnection devices  e.g. bus-connected or in-line devices0.337
G06K9/00885Biometric patterns not provided for under | (ref: G06K9/00006)|   | (ref: G06K9/00154)|   | (ref: G06K9/00335)|   | (ref: G06K9/00362)|   | (ref: G06K9/00597)| | Biometric specific functions not specific to the kind of biometric0.337
G06Q20/356Aspects of software for card payments0.337
G06Q20/3272using an audio code0.337
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords0.337
G09C5/00Ciphering apparatus or methods not provided for in the preceding groups  e.g. involving the concealment or deformation of graphic data such as designs  written or printed messages0.337
H04L12/1467involving prepayment0.337
H04L12/14Metering |  charging | or billing|  arrangements | specially adapted for data wireline or wireless communications | payment schemes  architectures or protocols | per se|  | (ref: G06Q20/00)0.337
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols0.337
G06F21/565by checking file integrity0.337
G07B13/00Taximeters | measuring distance travelled | (ref: G01C)| | measuring time | (ref: G04)0.337
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.336
H04L67/08adapted for terminal emulation  e.g. telnet | protocols for telewriting or protocols for networked simulations  virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455)0.336
G06Q20/3676Balancing accounts0.336
G06K9/3258Scene text  e.g. street name0.335
G06K9/00798Recognition of lanes or road borders  e.g. of lane markings  or recognition of driver's driving pattern in relation to lanes perceived from the vehicle| Analysis of car trajectory relative to detected road | determination of trajectories | (ref: G06T7/20)0.335
G07B15/06Arrangements for road pricing or congestion charging of vehicles or vehicle users  e.g. automatic toll systems0.335
G06K9/00785Recognising traffic patterns acquired by static cameras | measuring or analysing of parameters relative to traffic conditions | (ref: G08G1/0104)| | analysing traffic situation by means of optical sensors | (ref: G08G1/04)0.335
G08G1/0175by photographing vehicles  e.g. when violating traffic rules0.335
G06K9/325Detection of text region in scene imagery  real life image or Web pages  e.g. licenses plates  captions on TV images0.335
G06K9/78Combination of image acquisition and recognition functions0.335
H04N7/188Capturing isolated or intermittent images triggered by the occurrence of a predetermined event  e.g. an object reaching a predetermined position | signal generation from motion picture films | (ref: H04N5/253)0.335
G06K9/00771Recognising scenes under surveillance  e.g. with Markovian modelling of scene activity | (ref: G06K9/00785)|  takes precedence| recognition of movements or behaviour | (ref: G06K9/00335)| | motion analysis using general image processing | (ref: G06T7/20)| | intruder alarms using image scanning and comparing systems | (ref: G08B13/194)| | circuitry for movement detection and estimation for pictorial communication | (ref: H04N5/144)| | closed circuit television systems | (ref: H04N7/18)0.335
G07B15/00Arrangements or apparatus for collecting fares  tolls or entrance fees at one or more control points | handling coins or paper currency | (ref: G07D)| | apparatus for vending or hiring articles or services activated by coins  credit cards  paper currency or the like | (ref: G07F7/00)|   | (ref: G07F17/00)0.335
H04W4/02Services making use of location information0.334
H04L61/00Network arrangements or network protocols for addressing or naming0.334
H04L69/06Notations for structuring of protocol data  e.g. abstract syntax notation one [ASN.1]0.334
G06K9/00979structured as a network0.334
G06F21/45Structures or tools for the administration of authentication0.334
H04M17/00Prepayment | of wireline communication systems  wireless communication systems or|  telephone systems | using a coded card to authorise calls from a telephone set | (ref: H04M1/675)0.334
G06Q20/40975Use of encryption for mutual authentication0.334
G06F9/54Interprogram communication0.334
G07C9/00174Electronically operated locks| Circuits therefor| Nonmechanical keys therefor  e.g. passive or active electrical keys or other data carriers without mechanical keys | mechanical locks with electric permutation | (ref: E05B49/00)| | arrangements for sensing or reading record carriers | (ref: G06K7/00)|   | (ref: G06K9/00)| | electronic switching | (ref: H03K17/00)0.334
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords0.334
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it0.333
H04L63/104Grouping of entities0.333
G06K9/685Involving plural approaches  e.g. verification by template match| resolving confusion among similar patterns  e.g. O & Q | (ref: G06K9/6807)|  takes precedence0.333
G06K9/033with the intervention of an operator0.333
G06F21/568eliminating virus  restoring damaged files0.333
H04L63/1433Vulnerability analysis0.333
H04W4/025using location based information parameters0.333
G06Q30/0212Chance discounts or incentives0.333
G06Q30/0238at point-of-sale [POS]0.333
G06Q30/0215Including financial accounts0.333
G06Q30/0207Discounts or incentives  e.g. coupons  rebates  offers or upsales0.333
G06Q30/0208Trade or exchange of a good or service for an incentive0.333
G07F17/3255Incentive  loyalty and/or promotion schemes  e.g. comps  gaming associated with a purchase  gaming funded by advertisements0.333
G06Q30/0237at kiosk0.333
G06Q30/0209Incentive being awarded or redeemed in connection with the playing of a video game0.333
G06Q30/0229Multi-merchant loyalty card systems0.333
A61B5/117Identification of persons | methods or arrangements for recognising patterns  e.g. fingerprints  | (ref: G06K9/00)| | identification of persons by analysing their voice or speech | (ref: G10L17/00)0.333
H04L63/108when the policy decisions are valid for a limited amount of time0.332
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]0.332
G06Q20/346Cards serving only as information carrier of service0.332
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself0.332
G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station  e.g. fire or police telegraphic systems | signalling systems in general | (ref: G08C)0.332
G08B25/14Central alarm receiver or annunciator arrangements0.332
G07F19/207Surveillance aspects at ATMs0.332
G08B25/08using communication transmission lines | (ref: G08B13/19658)|   | (ref: G08B21/0286)|   | (ref: G08B25/016)|  take precedence| specific aspects of telephone communication systems adapted for combination with alarm systems | (ref: H04M11/04)0.332
H04N21/8358involving watermark | protecting executable software by watermarking | (ref: G06F21/16)| | image watermarking in general | (ref: G06T1/0021)| | watermarks inserted in still images for transmission purposes | (ref: H04N1/32144)| | inserting watermarks during video coding | (ref: H04N19/467)0.332
H04L7/08the synchronisation signals recurring cyclically0.332
G06K9/00758Matching video sequences | aligning the image field | (ref: G06K9/32)| | image matching techniques | (ref: G06K9/00201)|   | (ref: G06K9/62)| | registration of image sequences | (ref: G06T7/38)0.332
G06K9/00744Extracting features from the video content  e.g. video "fingerprints"  or characteristics  e.g. by automatic extraction of representative shots or key frames | segmentation for general image processing | (ref: G06T7/10)| | use of extracted content features in video information retrieval | (ref: G06F17/30784)| | automated annotation of image based on image contents | (ref: G06K9/00671)| | determination of region of interest for recognition | (ref: G06K9/3233)| | extraction of image features or characteristics | (ref: G06K9/46)| | determining representative patterns | (ref: G06K9/6255)0.332
H04M15/705Account settings  e.g. limits or numbers or payment0.332
G07G1/0045with a code reader for reading of an identifying code of the article to be registered  e.g. barcode reader or radio-frequency identity [RFID] reader0.332
G11B20/00086Circuits for prevention of unauthorised reproduction or copying  e.g. piracy | indicating unauthorised use of record carriers in general | (ref: G11B23/28)| | scrambling for television signal recording | (ref: H04N5/913)| | network architectures or network protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)0.332
G07F7/12Card verification0.332
H04L67/2852involving policies or rules for updating  deleting or replacing the stored data based on network characteristics | replacement control in memory systems | (ref: G06F12/12)0.331
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.331
G06Q20/1235with control of digital rights management [DRM]0.331
H04M1/66with means for preventing unauthorised or fraudulent calling | verifying user identity or authority in secret or secure digital communications | (ref: H04L9/32)0.331
H04M1/274508Telephone number directory allowing to store a plurality of information regarding one subscriber0.331
G06F11/1637using additional compare functionality in one or some but not all of the redundant processing components0.331
G06F11/1662the resynchronized component or unit being a persistent storage device | re-synchronization of failed mirror storage | (ref: G06F11/2082)| | rebuild or reconstruction of parity RAID storage | (ref: G06F11/1008)0.331
G06F11/165with continued operation after detection of the error0.331
G06K7/10554Moving beam scanning0.331
G06F11/006Identification | (ref: G06F11/2289)|  takes precedence0.331
G06F11/3466Performance evaluation by tracing or monitoring0.331
G07F7/0806Details of the card | record carriers | per se|  | (ref: G06K)0.331
G06K19/07769the further communication means being a galvanic interface  e.g. hybrid or mixed smart cards having a contact and a non-contact interface0.331
G06K19/077Constructional details  e.g. mounting of circuits in the carrier0.331
G06K19/07with integrated circuit chips0.331
G06Q20/3572Multiple accounts on card0.331
G06K19/0772Physical layout of the record carrier0.331
G06Q50/01Social networking0.330
G06F17/30312Storage and indexing structures| Management thereof0.330
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)0.330
H04L51/22Mailbox-related details | computer aided management of electronic mail | (ref: G06Q10/10)0.330
G06Q30/0615Anonymizing0.330
G06F21/552involving long-term monitoring or reporting0.330
G07F7/1075PIN is checked remotely0.330
G06Q20/065using e-cash0.330
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]0.329
G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings | record carriers adapted for controlling specific machines  | see|  the appropriate subclass for the machine  e.g. | (ref: B23Q)|   | (ref: D03C)|   | (ref: G10F)|   | (ref: H04L)| | form printing | (ref: B41)| | file cards | (ref: B42F19/00)| | record carriers in general | (ref: G11)0.329
G06F9/5038considering the execution order of a plurality of tasks  e.g. taking priority or time dependency constraints into consideration | scheduling strategies | (ref: G06F9/4881)|  and subgroups0.329
G06F11/1474in transactions | (ref: G06F17/30286)|  takes precedence0.329
H04N7/147Communication arrangements  e.g. identifying the communication as a video-communication  intermediate storage of the signals | selecting | (ref: H04Q)0.329
G06Q20/305using a wired telephone network to facilitate payment0.329
H04M3/533Voice mail systems0.329
G06Q50/188Electronic negotiation0.329
G06F9/4881Scheduling strategies for dispatcher  e.g. round robin  multi-level priority queues0.328
H04N21/23418involving operations for analysing video streams  e.g. detecting features or characteristics | filtering for image enhancement | (ref: G06T5/00)| | methods or arrangements for recognising scenes | (ref: G06K9/00624)| | arrangements characterised by components specially adapted for monitoring  identification or recognition of video in broadcast systems | (ref: H04H60/59)| | television picture signal circuitry for scene change detection | (ref: H04N5/147)0.328
H04H60/375Commercial0.328
H04N21/4263involving specific tuning arrangements  e.g. two tuners0.328
H04H60/37for identifying segments of broadcast information  e.g. scenes or extracting programme ID0.328
H04H20/14for monitoring programmes0.328
H04H60/59of video | recognising characters or patterns in general | (ref: G06K9/00)0.328
H04H60/73using meta-information0.328
H04N21/278Content descriptor database or directory service for end-user access | details of content or meta data based information retrieval of video data in video databases | (ref: G06F17/30843)0.328
H04H60/31Arrangements for monitoring the use made of the broadcast services0.328
H04H60/66for using the result on distributors' side0.328
H04N21/6581Reference data  e.g. a movie identifier for ordering a movie or a product identifier in a home shopping application0.328
H04W28/06Optimizing | the usage of the radio link|   e.g. header compression  information sizing |   discarding information | system modifying transmission characteristic according to link quality by modifying frame length | (ref: H04L1/0007)| | dynamic adaptation of the packet size for flow control or congestion control | (ref: H04L47/365)0.328
G06F9/5072Grid computing0.328
G06Q10/107Computer aided management of electronic mail | electronic mail protocols | (ref: H04L29/06)| | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)0.328
G06K19/12the marking being sensed by magnetic means0.328
G06K19/07354by biometrically sensitive means  e.g. fingerprint sensitive | fingerprint sensors in general | (ref: G06K9/00006)| | biometrically activated access control | (ref: G07C9/00071)0.328
H04N21/43637involving a wireless protocol  e.g. Bluetooth or wireless LAN | IEEE 802.11| arrangements for wireless networking or broadcasting of information in indoor or near-field type systems | (ref: H04B10/114)| | wireless local area data switching networks | (ref: H04W)| | flow control in wireless networks | (ref: H04W28/10)0.328
H04N21/4126portable device  e.g. remote control with a display  PDA  mobile phone | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)0.328
H04L29/12783involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address  functional addressing  i.e. assigning an address to a function0.328
H04N21/254Management at additional data server  e.g. shopping server  rights management server | protocols involving third party service providers for network applications in communication control or processing | (ref: H04L29/08666)| | arrangements for maintenance or administration in data networks | (ref: H04L41/00)0.328
H04N21/4788communicating with other users  e.g. chatting | arrangements for providing for computer conferences  e.g. chat rooms  to substation in data switching networks | (ref: H04L12/1813)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)0.328
H04N21/42684Client identification by a unique number or address  e.g. serial number  MAC address  socket ID | addressing and naming in data networks | (ref: H04L29/12009)0.328
H04N21/6187involving transmission via a telephone network  e.g. POTS0.328
H04M7/006Networks other than PSTN/ISDN providing telephone service  e.g. Voice over Internet Protocol (VoIP)   including next generation networks with a packet-switched transport layer | (ref: H04L65/00)|  takes precedence| aspects not specific to the type of network | (ref: H04M3/00)| | special services in those networks | (ref: H04M3/42)0.328
H04N21/658Transmission by the client directed to the server0.328
H04N21/25816involving client authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.328
H04N21/64Addressing | multicast or broadcast in one way streaming for real-time multimedia communications | (ref: H04L29/06455)| | arrangements for addressing and naming in data networks | (ref: H04L29/12009)0.328
H04N21/654Transmission by server directed to the client0.328
H04L61/35involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address or functional addressing  i.e. assigning an address to a function0.328
H04N21/4786e-mailing | message switching systems  e.g. electronic mail systems | (ref: H04L51/00)0.328
G06F9/465Distributed object oriented systems | remote method invocation [RMI] | (ref: G06F9/548)0.328
H04W12/12Fraud detection0.328
G06F9/451Execution arrangements for user interfaces0.328
G07F19/203Dispensing operations within ATMs | dispensing in general | (ref: G07D11/00)0.327
G07F7/1025Identification of user by a PIN code0.327
G06Q20/3415Cards acting autonomously as pay-media0.327
G06Q10/20Product repair or maintenance administration0.327
H04L69/04Protocols for data compression | compression in general | (ref: H03M7/30)| | reduction of the amount or size of exchanged application data at an intermediate network processing stage | (ref: H04L67/2828)| | optimizing  e.g. header compression  information sizing in wireless communication networks | (ref: H04W28/06)0.327
G06Q20/208Input by product or record sensing  e.g. weighing or scanner processing0.327
H04M15/51for resellers  retailers or service providers0.327
H04M17/20with provision for recharging the prepaid account or card  or for credit establishment0.327
H04M15/46Real-time negotiation between users and providers or operators0.327
H04M15/47Fraud detection or prevention means0.327
H04M15/48Secure or trusted billing  e.g. trusted elements or encryption0.327
H04M15/88Provision for limiting connection  or expenditure0.327
H04M17/204on-line recharging  e.g. cashless0.327
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)0.327
H04L45/28Route fault recovery | network fault recovery | (ref: H04L41/0654)0.327
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)0.327
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.327
G06F8/62Uninstallation0.326
G06N5/025Extracting rules from data | learning in general | (ref: G06F15/18)0.326
G01S5/0252by comparing measured values with pre-stored measured or simulated values0.326
H04W36/30by measured or perceived connection quality data0.326
G01S5/02using radio waves | (ref: G01S19/00)|  takes precedence0.326
G06K7/10722Photodetector array or CCD scanning0.326
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]0.326
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes0.326
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]0.326
G01D4/004Remote reading of utility meters to a fixed location0.326
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC0.326
H04L51/38in combination with wireless systems | mobile application service signalling using messaging  e.g. SMS  | (ref: H04W4/12)0.326
G06F21/72in cryptographic circuits0.326
G10L15/30Distributed recognition  e.g. in client-server systems  for mobile phones or network applications0.326
G10L15/08Speech classification or search0.326
G10L25/51for comparison or discrimination0.326
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)0.326
H04L67/30involving profiles0.326
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]0.325
G06F11/1469Backup restoration techniques0.325
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities0.325
G06Q30/018Business or product certification or verification0.324
G07F17/42for ticket printing or like apparatus |   e.g. apparatus for dispensing of printed paper tickets or payment cards0.324
H04M15/49Connection to several service providers0.324
H04L12/2874Processing of data for distribution to the subscribers0.324
H04M15/8044Least cost routing0.324
H04Q11/0471Terminal access circuits0.324
H04L41/20Network management software packages0.324
H04L41/048mobile agents0.324
H04L41/0806for initial configuration or provisioning0.324
H04L41/082due to updating or upgrading of network functionality  e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02)0.324
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB0.324
H04L9/085Secret sharing or secret splitting  e.g. threshold schemes0.324
G06K9/00899Spoof detection | (ref: G06K9/00107)|  takes precedence0.324
G06F11/2071using a plurality of controllers0.324
G06F11/2069Management of state  configuration or failover0.324
G06K9/00536Classification| Matching | digital electric correlation | (ref: G06F17/15)| | electronic classification and matching | per se|  | (ref: G06K9/62)0.324
H01Q7/00Loop antennas with a substantially uniform current distribution around the loop and having a directional radiation pattern in a plane perpendicular to the plane of the loop0.324
G06K19/07749the record carrier being capable of non-contact communication  e.g. constructional details of the antenna of a non-contact smart card0.324
H01Q1/2208associated with components used in interrogation type services  i.e. in systems for information exchange between an interrogator/reader and a tag/transponder  e.g. in Radio Frequency Identification [RFID] systems | methods or arrangements for sensing record carriers  e.g. for reading patterns | (ref: G06K7/00)| | record carrier for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.324
G06K19/07732the record carrier having a housing or construction similar to well-known portable memory devices  such as SD cards  USB or memory sticks | housings for electrical equipment in general  | see|  | (ref: H05K5/02)0.324
G06K9/22using hand-held instruments0.324
G06K9/00228Detection| Localisation| Normalisation0.324
G06F3/04842Selection of a displayed object | (ref: G06F3/0482)|  takes precedence0.324
G07F7/1041PIN input keyboard gets new key allocation at each use0.324
G07F7/1016Devices or methods for securing the PIN and other transaction-data  e.g. by encryption | arrangements for secret communication  | see|  | (ref: H04L9/00)0.324
G07F7/084Additional components relating to data transfer and storing  e.g. error detection  self-diagnosis0.324
G06K9/0004by using electro-optical elements or layers  e.g. electroluminescent sensing0.323
H04W16/20for indoor coverage or short range network deployment0.323
H04L67/289where the intermediate processing is functionally located closer to the data consumer application  e.g. in same machine  in same home or in same subnetwork0.323
G06Q50/24Patient record management | processing of medical or biological data for scientific purposes | (ref: G06F19/00)0.323
H04L67/2833for grouping or aggregating service requests  e.g. for unified processing of service requests | networking arrangements or communication protocols for scheduling or organising the servicing of application requests | (ref: H04L67/32)0.323
G07C1/10together with the recording  indicating or registering of other data  e.g. of signs of identity | together with the recording of a continuously-varying variable | (ref: G01D)|  or the appropriate other subclass of | (ref: G01)|   dependent on the variable0.323
G07C9/00Individual entry or exit registers0.323
G07C9/00158by means of a personal physical data0.323
H04L67/32for scheduling or organising the servicing of application requests  e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources | computer conference arrangements | (ref: H04L12/1813)| | broadcast or conference with schedule organisation | (ref: H04L12/1881)| | network service management  ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | intermediate grouping or aggregating of service requests | (ref: H04L67/2833)0.323
G01S19/42Determining position0.323
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds0.323
G06K9/00033by direct reading  i.e. contactless acquisition0.323
G06Q20/4033Local solvency checks0.322
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)0.322
H04L51/063with adaptation of content0.322
H04L51/02with automatic reactions or user delegation  e.g. automatic replies or chatbot0.322
G06Q30/0271Personalized advertisement0.322
H04L51/10Messages including multimedia information | network arrangements or protocols for real-time communication | (ref: H04L65/00)| | voice messaging in telephonic communication using automatic or semi-automatic exchanges with non-audio components | (ref: H04M3/5307)0.322
G06F21/123by using dedicated hardware  e.g. dongles  smart cards  cryptographic processors  global positioning systems [GPS] devices0.322
G07F7/1033Details of the PIN pad0.322
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode0.322
H04L41/069involving storage or log of alarms or notifications or post-processing thereof0.322
G06Q30/0621Item configuration or customization0.322
H04M17/201automatic recharging with predetermined amount at threshold0.322
H04N21/4524involving the geographical location of the client | retrieval from the Internet by querying based on geographical locations | (ref: G06F17/3087)| | systems specially adapted for using geographical information in broadcast systems | (ref: H04H60/70)| | protocols in which the network application is adapted for the location of the user terminal in communication control or processing | (ref: H04L29/08657)| | services making use of the location of users or terminals in wireless networks | (ref: H04W4/02)| | locating users or terminals in wireless networks | (ref: H04W64/00)0.322
H04N21/4753for user identification  e.g. by entering a PIN or password | authentication mechanisms using passwords for network security | (ref: H04L29/06782)0.322
H04N21/25875involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.322
H04N21/25841involving the geographical location of the client | retrieval from the Internet by querying based on geographical locations | (ref: G06F17/3087)| | arrangements for identifying locations of receiving stations in broadcast systems | (ref: H04H60/51)| | protocols in which the network application is adapted for the location of the user terminal in communication control or processing | (ref: H04L29/08657)| | services making use of the location of users or terminals in wireless networks | (ref: H04W4/02)| | locating users or terminals in wireless networks | (ref: H04W64/00)0.322
H04W4/21for social networking applications0.322
H04L67/24Presence management | use and manipulation of presence information in instant messaging | (ref: H04L51/043)0.322
G06F3/03543Mice or pucks | (ref: G06F3/03541)|  takes precedence0.321
G06F13/28using burst mode transfer  e.g. direct memory access | DMA|   cycle steal | (ref: G06F13/32)|  takes precedence0.321
G06Q50/18Legal services| Handling legal documents0.321
G06F3/0383Signal control means within the pointing device0.321
G07C9/0015by means of a handwritten signature0.321
G06F3/017Gesture based interaction  e.g. based on a set of recognized hand gestures | interaction based on gestures traced on a digitiser | (ref: G06F3/04883)0.321
H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof0.321
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)0.321
G06F2221/2115Third party0.070
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.068
H04M7/12for working between exchanges having different types of switching equipment  e.g. power-driven and step by step  decimal and non-decimal  | circuit-switched and packet-switched  i.e. gateway arrangements0.067
G06F2221/2129Authenticate client device independently of the user0.067
G06F2221/2103Challenge-response0.067
H04M2201/40using speech recognition | speech recognition | per se|  | (ref: G10L15/00)0.066
H04M2201/41using speaker recognition | speaker recognition | per se|  | (ref: G10L17/00)0.066
H04M3/385using speech signals0.066
Y10S902/03Evaluates biometrics0.066
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.065
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.065
G06F2211/009Trust0.063
G06F2221/2117User registration0.063
H04M2242/30Determination of the location of a subscriber0.063
H04M1/271controlled by voice recognition0.063
G06F2221/2107File encryption0.063
G07C2209/02Access control comprising means for the enrolment of users0.063
H04L2209/38Chaining  e.g. hash chain or certificate chain0.063
G06F2221/2101Auditing as a secondary aspect0.063
G07B2017/00887using look-up tables  also called master tables with pointers0.063
G07B2017/00056Client-server0.063
G07B2017/00967PSD [Postal Security Device] as defined by the USPS [US Postal Service]0.063
G07B2017/00201Open franking system  i.e. the printer is not dedicated to franking only  e.g. PC (Personal Computer)0.063
G07B2017/00064Virtual meter  online stamp| PSD functions or indicia creation not at user's location0.063
G07B2017/00145via the Internet0.063
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.062
Y10S707/99948Application of database or data structure  e.g. distributed  multimedia  or image0.062
Y10S707/99945Object-oriented database structure processing0.062
H04L2209/72Signcrypting  i.e. digital signing and encrypting simultaneously0.061
H04L2209/42Anonymization  e.g. involving pseudonyms0.061
G06F2221/0704Device0.061
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.061
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.061
A63F2300/406Transmission via wireless network  e.g. pager or GSM0.060
A63F2300/409Data transfer via television network0.060
A63F2300/50characterized by details of game servers0.060
G06F2221/0742Enhanced product0.060
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.060
G06F2221/2137Time limited access  e.g. to a computer or data0.060
G06F9/00Arrangements for program control  e.g. control units | program control for peripheral devices | (ref: G06F13/10)0.060
G10L17/10Multimodal systems  i.e. based on the integration of multiple recognition engines or fusion of expert systems0.059
Y10S707/99936Pattern matching access0.059
H04M2215/0196Payment of value-added services  mainly when their charges are added on the telephone bill  e.g. payment of non-telecom services  e-commerce  on-line banking0.059
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.059
H04W8/26Network addressing or numbering for mobility support0.059
Y10S707/99943Generating database or data structure  e.g. via user interface0.059
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.059
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.059
G06F3/0482interaction with lists of selectable items  e.g. menus0.058
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.058
G06F2221/2113Multi-level security  e.g. mandatory access control0.058
H04M2203/6054Biometric subscriber identification0.058
H04Q2213/13566mediation0.058
H04Q2213/13515authentication  authorisation - fraud prevention0.058
H04M2215/016Billing using Intelligent Networks [IN] or Advanced Intelligent Networks [AIN]0.058
H04M2215/0172Mediation  i.e. device or program to reformat CDRS from one or more switches in order to adapt to one or more billing programs formats0.058
Y10S707/99944Object-oriented database structure0.058
G06F2221/2119Authenticating web pages  e.g. with suspicious links0.058
G06F2221/0737Traceability0.058
G06T2201/0064for copy protection or copy management  e.g. CGMS  copy only once  one-time copy0.058
G06F2201/81Threshold0.057
H04W8/005Discovery of network devices  e.g. terminals0.057
H04W88/08Access point devices0.057
H04L2463/081applying self-generating credentials  e.g. instead of receiving credentials from an authority or from another peer  the credentials are generated at the entity itself | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.057
G06K2009/00953Measures to keep reference information secret  e.g. cancellable biometrics0.057
G06K2009/00959Performing matching on a personal external card  e.g. to avoid submitting reference information0.057
H04M1/0274for an electrical connector module0.056
H04M2017/14using commercial credit/debit cards  e.g. VISA  AMEX0.056
Y02D70/168in Digital Video Broadcasting [DVB] networks0.056
Y02D70/1222in Global System for Mobile Communications [GSM] networks0.056
Y02D70/1244in High-Speed Downlink Packet Access [HSDPA] networks0.056
Y02D70/22in peer-to-peer [P2P]  ad hoc and mesh networks0.056
Y02D70/1242in Universal Mobile Telecommunications Systems [UMTS] networks0.056
H04W52/0274by switching on or off the equipment or parts thereof0.056
Y02D70/1262in Long-Term Evolution [LTE] networks0.056
Y02D70/142in Wireless Local Area Networks [WLAN]0.056
Y02D70/144in Bluetooth and Wireless Personal Area Networks [WPAN]0.056
Y02D70/146in Worldwide Interoperability for Microwave Access [WiMAX] networks0.056
Y02D70/23in Voice over IP [VoIP] networks0.056
Y02D70/00Techniques for reducing energy consumption in wireless communication networks0.056
Y02D70/40According to the transmission technology0.056
Y02D70/1224in General Packet Radio Service [GPRS] networks0.056
Y02D70/166in Radio Frequency Identification [RF-ID] transceivers0.056
Y02D70/162in Zigbee networks0.056
Y02D70/164in Satellite Navigation receivers0.056
H04W88/02Terminal devices0.056
H04M2017/12using calling  telephone credit/debit cards0.056
H04L2209/24Key scheduling  i.e. generating round keys or sub-keys for block encryption0.056
G06K19/06037multi-dimensional coding0.056
H04L2209/608Watermarking0.056
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.056
Y10S707/99954Version management0.056
Y10S707/99953Recoverability0.056
H04W74/00Wireless channel access  e.g. scheduled or random access0.056
G06Q2240/00Transportation facility access  e.g. fares  tolls or parking0.056
G06K2209/15Detection and recognition of car license plates0.056
G06Q50/30Transportation| Communications0.056
G06Q2250/05using cryptography0.056
H04L69/24Negotiation of communication capabilities0.056
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.056
G06K2009/00932Subcutaneous biometric features| Blood vessel patterns0.056
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.056
H04L61/1511using domain name system [DNS]0.055
G06F2221/2153Using hardware token as a secondary aspect0.055
H04L2209/60Digital content management  e.g. content distribution0.055
H04N21/84Generation or processing of descriptive data  e.g. content descriptors | systems specially adapted for using meta-information in broadcast systems | (ref: H04H60/73)0.055
H04M2215/7009Account settings  e.g. users  terminals  limits  numbers or payment0.055
H04M2215/2026Wireless network  e.g. GSM  PCS  TACS0.055
H04M2215/32Involving wireless systems0.055
G07B2017/00717Reading barcodes0.055
G07B2017/00588Barcode0.055
G07B2017/0004Determining the location of mailpieces outside apparatus0.055
G07B17/00024Physical or organizational aspects of franking systems0.055
G06F9/45558Hypervisor-specific management and integration aspects0.055
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)0.055
G06F2221/0713User0.055
H04M2250/22including a touch pad  a touch sensor or a touch detector | digitizers for touch screens | (ref: G06F3/041)0.055
G06F11/3495for systems0.055
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence0.055
G06F11/3438monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22)0.055
G06F2201/875Monitoring of systems including the internet0.055
G06F2201/83the solution involving signatures0.055
G06K19/072the record carrier comprising a plurality of integrated circuit chips0.055
G06F2221/2151Time stamp0.055
G06F2221/2139Recurrent verification0.055
H04W8/265for initial activation of new user0.055
H04W84/042Public Land Mobile systems  e.g. cellular systems0.055
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits0.055
G06F2201/80Database-specific techniques0.055
G06F2221/2149Restricted operating environment0.055
G06F2221/2135Metering0.055
Y02D10/36Resource sharing0.055
Y02D10/22Resource allocation0.055
H04M2242/22Automatic class or number identification arrangements0.055
H04M3/42059Making use of the calling party identifier0.055
H04Q3/72Finding out and indicating number of calling subscriber0.055
G06F2221/0711Token0.055
G06F2209/5016Session0.055
G06F2209/5018Thread allocation0.055
H04L63/308retaining data  e.g. retaining successful  unsuccessful communication attempts  internet access  or e-mail  internet telephony  intercept related information or call content0.055
G07B2017/00161from a central  non-user location  e.g. for updating rates or software  or for refilling funds0.055
G07B2017/00169from a franking apparatus  e.g. for verifying accounting0.055
G07B2017/00096via phone lines0.055
G07B2017/00766Digital signature  e.g. DSA  DSS  ECDSA  ESIGN0.055
G07B2017/00137In a LAN0.055
G07C2009/00801by acoustic waves0.055
H04M2017/24with on-line recharging of an account or card  e.g. cashless0.054
H04M2215/54Resellers-retail or service providers billing  e.g. agreements with telephone service operator  activation  charging/recharging of accounts0.054
H04M2215/0148Fraud detection or prevention means0.054
H04M3/51Centralised call answering arrangements requiring operator intervention |   e.g. call or contact centers for telemarketing0.054
H04M2215/0116Provision for limiting expenditure  e.g. limit on call expenses or account0.054
H04M2215/0156Secure and trusted billing  e.g. trusted elements  encryption  digital signature  codes or double check mechanisms to secure billing calculation and information0.054
H04M2215/56On line or real-time flexible agreements between service providers and telecoms operators0.054
G06F11/2038with a single idle spare processing component0.054
G06F11/2041with more than one idle spare processing component0.054
G06F2209/543Local0.054
H04W36/24Reselection being triggered by specific parameters | used to improve the performance of a single terminal0.054
G06F2211/007Encryption  En-/decode  En-/decipher  En-/decypher  Scramble  (De-)compress0.054
Y04S20/42Utility meters which are networked together  e.g. within a single building0.054
Y02B90/242from a fixed location0.054
F25D2500/06Stock management0.054
Y02B90/246Utility meters which are networked together  e.g. within a single building0.054
Y04S20/322from a fixed location0.054
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.054
G10L17/005Speaker recognisers specially adapted for particular applications | (ref: G07C9/00071)|  takes precedence0.054
G10L2015/223Execution procedure of a spoken command0.054
G10L2015/088Word spotting0.054
H04M2215/0176Billing arrangements using internet0.054
H04L67/1012based on compliance of requirements or conditions with available server resources0.054
H04W60/00Registration  e.g. affiliation to network| De-registration  e.g. terminating affiliation0.054
H04W88/16Gateway arrangements0.054
H04L2209/26Testing cryptographic entity  e.g. testing integrity of encryption key or encryption algorithm0.054
G06F2207/025String search  i.e. pattern matching  e.g. find identical word or best match in a string0.054
G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled0.054
H04Q2213/13091CLI  identification of calling line0.054
H04Q2213/13298Local loop systems  access network0.054
H04Q2213/13141Hunting for free outlet  circuit or channel0.054
H04Q2213/13175Graphical user interface [GUI]  WWW interface  visual indication0.054
H04Q2213/13097Numbering  addressing0.054
H04Q2213/13332Broadband  CATV  dynamic bandwidth allocation0.054
H04Q2213/13056Routines  finite state machines0.054
H04M2215/42Least cost routing  i.e. provision for selecting the lowest cost tariff0.054
H04M2215/745Least cost routing  e.g. Automatic or manual  call by call or by preselection0.054
H04Q2213/13209ISDN0.054
H04Q2213/13103Memory0.054
H04Q2213/13202Network termination [NT]0.054
H04Q2213/13389LAN  internet0.054
H04Q2213/13376Information service  downloading of information  0800/0900 services0.054
H04M2215/22Bandwidth or usage-sensitve billing0.054
H04M2215/46Connection to several service providers0.054
H04L2209/603Digital right managament [DRM]0.054
G06F2203/0336Mouse integrated fingerprint sensor0.054
G06F11/2058using more than 2 mirrored copies0.054
H04W4/14Short messaging services  e.g. short message services [SMS] or unstructured supplementary service data [USSD]0.054
H04W88/00Devices specially adapted for wireless communication networks  e.g. terminals  base stations or access point devices0.054
G06K9/00288Classification  e.g. identification0.054
H04M2215/00Metering arrangements| Time controlling arrangements| Time indicating arrangements0.054
A61K38/00Medicinal preparations containing peptides | peptides containing beta-lactam rings | (ref: A61K31/00)| | cyclic dipeptides not having in their molecule any other peptide link than those which form their ring  e.g. piperazine-2 5-diones  | (ref: A61K31/00)| | ergot alkaloids of the cyclic peptide type | (ref: A61K31/48)| | containing macromolecular compounds having statistically distributed amino acid units | (ref: A61K31/74)| | medicinal preparations containing antigens or antibodies | (ref: A61K39/00)| | medicinal preparations characterised by the non-active ingredients  e.g. peptides as drug0.054
A01K2217/05Animals comprising random inserted nucleic acids (transgenic)0.054
G06F3/041Digitisers  e.g. for touch screens or touch pads  characterised by the transducing means0.054
H04W24/08Testing  | supervising or monitoring|  using real traffic0.054
H04W84/12WLAN [Wireless Local Area Networks]0.054
G06Q2220/10Usage protection of distributed data files0.054
Y02A90/22for administrative  organizational or management aspects influenced by climate change adaptation0.054
G16H10/65stored on portable record carriers  e.g. on smartcards  RFID tags or CD0.054
Y02A90/26for diagnosis or treatment  for medical simulation or for handling medical devices0.054
H04L2209/127Trusted platform modules [TPM]0.054
H04M2017/2593code management0.054
H04M2017/22with automatic recharging of account/card  e.g. if limit is reached during connection the account is recharged automatically0.054
Y10S707/99931Database or file accessing0.054
Y02D50/40by operating in low-power or sleep mode0.054
H04W76/10Connection setup0.054
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.