Validity Report
Full Report
US7233664B2 — Dynamic security authentication for wireless communication networks
Priority Date: 2003-03-13, Publication Date: 2007-06-19, Current Assignee: MOXCHANGE LLCReport Generated: 2022-04-15

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP1414262A11.468Authentication method for fast handover in a wireless local area networkGRANT2004-04-282002-10-1532064960GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US6799270B11.355System and method for secure distribution of digital information to a chain of computer system nodes in a networkGRANT2004-09-281998-10-3026803601GreatCitrix Systems IncCitrix Systems Inc
US20040049676A11.351Methods and protocols for intrusion-tolerant management of collaborative network groupsAPPLICATION2004-03-112001-04-2631990043GreatSRI International IncSRI International Inc, Cisco Systems Inc
US7272381B21.212Mobile authentication system with reduced authentication delayGRANT2007-09-182002-03-0427753999GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US20050152305A11.197Apparatus  method  and medium for self-organizing multi-hop wireless access networksAPPLICATION2005-07-142002-11-2546205335GreatFujitsu LtdFujitsu Ltd
US7409543B11.111Method and apparatus for using a third party authentication serverGRANT2008-08-052000-03-3039670877GreatDigitalPersona IncHID Global Corp
US7107620B21.107Authentication in a packet data networkGRANT2006-09-122000-03-318558085GreatNokia OyjNokia Technologies Oy
US7046992B21.107Authentication of termination messages in telecommunications systemGRANT2006-05-162001-05-1126811656GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US7370350B11.095Method and apparatus for re-authenticating computing devicesGRANT2008-05-062002-06-2739332500GreatCisco Technology IncCisco Technology Inc
US7193985B11.082System and method for managing foreign agent selections in a mobile internet protocol networkGRANT2007-03-202001-06-1425378910GreatUTStarcom IncCHINOOK LICENSING LLC
US6151679A1.080System and method for preventing a first node from being emulated by another nodeGRANT2000-11-211995-09-1824110154GreatFortress Technologies IncBroadband Capital Corp
US5455865A1.076Robust packet routing over a distributed network containing malicious failuresGRANT1995-10-031989-05-0927359929GreatDigital Equipment CorpEnterasys Networks Inc
US6275859B11.053Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authorityGRANT2001-08-141999-10-2823702194GreatSun Microsystems IncOracle America Inc
US20020114469A11.051Method and system for delegation of security procedures to a visited domainAPPLICATION2002-08-222001-02-2126953994GreatNokia OyjNokia Technologies Oy
US20050025091A11.038Methods and apparatus for dynamic session key generation and rekeying in mobile IPAPPLICATION2005-02-032002-11-2232397124GreatCisco Technology IncCisco Technology Inc
US6148405A1.019Method and system for secure lightweight transactions in wireless data networksGRANT2000-11-141997-11-1025512160GreatPhone Com IncUnwired Planet LLC, Unwired Planet IP Manager LLC
US7298847B21.007Secure key distribution protocol in AAA for mobile IPGRANT2007-11-202002-02-0727659526GreatNokia IncNokia Inc
US20040103282A10.971802.11 Using a compressed reassociation exchange to facilitate fast handoffAPPLICATION2004-05-272002-11-2632329838GreatCisco Technology IncCisco Technology Inc
US7441269B20.965Method and system for session accounting in wireless networksGRANT2008-10-212001-09-284170143GreatBridgewater Systems CorpAmdocs Canadian Managed Services Inc, Amdocs Development Ltd
US6092191A0.964Packet authentication and packet encryption/decryption scheme for security gatewayGRANT2000-07-181995-11-3027337958GreatToshiba CorpToshiba Corp
US7499443B20.962Wireless adhoc communication system  terminal  authentication method for use in terminal  encryption method  terminal management method  and program for enabling terminal to perform those methodsGRANT2009-03-032003-02-0332954512GreatSony CorpSony Corp
US20060189298A10.957Method and software program product for mutual authentication in a communications networkAPPLICATION2006-08-242003-03-0629765694GreatTim Italia SpATim Italia SpA
US20060030326A10.947Methods and apparatus for the utilization of core based nodes for state transferAPPLICATION2006-02-092003-01-3132853113GreatQualcomm Flarion Technologies IncQualcomm Inc
US20020178358A10.944System and method for strong authentication achieved in a single round tripAPPLICATION2002-11-282001-02-2323034373GreatNokia IncWSOU Investments LLC
US7350076B10.924Scheme for device and user authentication with key distribution in a wireless networkGRANT2008-03-252001-05-1626688763Great3Com CorpValtrus Innovations Ltd, HP Inc, Hewlett Packard Enterprise Development LP
US7496952B20.923Methods for authenticating a user's credentials against multiple sets of credentialsGRANT2009-02-242002-03-2831990068GreatInternational Business Machines CorpInternational Business Machines Corp
EP0982958A20.916Method for protecting mobile anonymityGRANT2000-03-011998-08-2822496311GreatLucent Technologies IncNokia of America Corp
US7325246B10.910Enhanced trust relationship in an IEEE 802.1x networkGRANT2008-01-292002-01-0738974050GreatCisco Technology IncCisco Technology Inc
US6073237A0.906Tamper resistant method and apparatusGRANT2000-06-061997-11-0625510198GreatCyberCash IncPayPal International Ltd, PayPal Inc
US6986046B10.895Method and apparatus for managing secure collaborative transactionsGRANT2006-01-102000-05-1224285327GreatGroove Networks IncMicrosoft Technology Licensing LLC
US7367055B20.889Communication systems automated security detection based on protocol cause codesGRANT2008-04-292002-06-1129710859GreatMotorola IncGoogle Technology Holdings LLC
US20030145198A10.887Communication system and network control apparatus with encryption processing function  and communication control methodAPPLICATION2003-07-312002-01-0927605943GreatNEC CorpNEC Corp
US6229894B10.879Method and apparatus for access to user-specific encryption informationGRANT2001-05-081997-07-1425399195GreatEntrust LtdEntrust Ltd
US7395427B20.878Authenticated key exchange based on pairwise master keyGRANT2008-07-012003-01-1034273435GreatIntel CorpIntel Corp
US7539866B20.872Method of cryptographing wireless data and apparatus using the methodGRANT2009-05-262002-10-1132064930GreatElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US6851049B10.868Method and apparatus for facilitating secure anonymous email recipientsGRANT2005-02-012000-10-0234080804GreatPGP CorpCA Inc
US7424116B20.862Method and apparatus for providing authentication in a communication systemGRANT2008-09-092001-02-1625136423GreatMotorola IncMotorola Solutions Inc
US6424718B10.846Data communications system using public key cryptography in a web environmentGRANT2002-07-231996-10-1610801537GreatInternational Business Machines CorpInternational Business Machines Corp
US7392375B20.839Peer-to-peer authentication for real-time collaborationGRANT2008-06-242002-09-1831992087GreatColligo Networks IncCallahan Cellular LLC
US20020080752A10.830Route optimization technique for mobile IPAPPLICATION2002-06-272000-12-2224984862GreatInteractive People Unplugged ABNytell Software LLC
US6483921B10.823Method and apparatus for regenerating secret keys in Diffie-Hellman communication sessionsGRANT2002-11-191997-12-0425530950GreatCisco Technology IncCisco Technology Inc
US8200966B20.819Secure network accessGRANT2012-06-122001-02-153710493GreatEWISE SYSTEMS Pty LtdEWISE SYSTEMS Pty Ltd
US20040102181A10.819Method and apparatus to counter the rogue shell threat by means of local key derivationAPPLICATION2004-05-272000-11-278170493GreatSiemens AGNokia Solutions and Networks GmbH and Co KG
US20050210251A10.813Linked authentication protocolsAPPLICATION2005-09-222002-09-189944323GreatNokia OyjNokia Technologies Oy
WO2002067486A20.803METHOD AND APPARATUS FOR STORING AND DISTRIBUTING ENCRYPTION KEYSAPPLICATION2002-08-292001-02-1625136810Great
US6853988B10.802Cryptographic server with provisions for interoperability between cryptographic systemsGRANT2005-02-081999-09-2034108686GreatSecurity First CorpSecurity First Corp
US20020032853A10.802Secure dynamic link allocation system for mobile data communicationAPPLICATION2002-03-142000-04-1727393833GreatAirbiquity IncAirbiquity Inc
US6584310B10.801Method and apparatus for performing authentication in communication systemsGRANT2003-06-241998-05-0722116304GreatLucent Technologies IncWSOU Investments LLC
US7865938B20.800Enterprise-wide security system for computer devicesGRANT2011-01-042002-08-2731978258GreatMcAfee LLCMcAfee LLC
US7698565B10.788Crypto-proxy server and method of using the sameGRANT2010-04-132000-03-3042078320GreatDigitalPersona IncDigitalPersona Inc
US5596641A0.786Authentication method for mobile communicationsGRANT1997-01-211994-03-1727300600GreatKokusai Denshin Denwa KKKDDI Corp
US5537474A0.786Method and apparatus for authentication in a communication systemGRANT1996-07-161994-07-2923083321GreatMotorola IncMotorola Solutions Inc
US7251635B20.784Method and apparatus for managing a key management systemGRANT2007-07-312002-02-2527753169GreatSchlumberger Omnes IncDexa Systems Inc
US7219226B20.781Method and apparatus for encrypting dataGRANT2007-05-152001-10-159923831GreatHewlett Packard CoHewlett Packard Enterprise Development LP
US7853985B20.779Method for verifying the authentication of a manager application in a telecommunications management network operating system by means of a network element and network element suitable thereforGRANT2010-12-141999-03-197901710GreatSiemens AGSiemens AG
US6246767B10.777Source authentication of download information in a conditional access systemGRANT2001-06-121995-04-0327556700GreatScientific Atlanta LLCCisco Technology Inc
US9544297B20.776Method for secured data processingGRANT2017-01-102002-03-0832045049GreatAlgorithmic Research LtdAlgorithmic Research Ltd
US6965674B20.773System and method for providing WLAN security through synchronized update and rotation of WEP keysGRANT2005-11-152002-05-2129554167GreatWavelink CorpIvanti Inc, Ivanti Software Inc
US20060101510A10.766Negotiating secure connections through a proxy serverAPPLICATION2006-05-112001-04-1925277941GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US6240183B10.762Security apparatus for data transmission with dynamic random encryptionGRANT2001-05-291997-06-1927367684Great
US20020083317A10.761Security communication packet processing apparatus and the method thereofAPPLICATION2002-06-272000-12-2518858006GreatMatsushita Electric Industrial Co LtdPanasonic Corp
US7395429B20.757Mutual authentication method  program  recording medium  signal processing system  reproduction device  and information processing deviceGRANT2008-07-012003-01-1532709093GreatSony CorpSony Corp
US7590861B20.754Methods for secure enrollment and backup of personal identity credentials into electronic devicesGRANT2009-09-152002-08-0631495960GoodPrivaris IncApple Inc
US7330969B20.752Method and apparatus for data validationGRANT2008-02-122001-10-159923821GoodHewlett Packard Development Co LPGoogle LLC
US6219793B10.746Method of using fingerprints to authenticate wireless communicationsGRANT2001-04-171996-09-1127362654GoodHUSH IncHUSH Inc
US7260836B20.741System and method for distributed authentication serviceGRANT2007-08-212002-02-2627753792GoodAOL IncMeta Platforms Inc
US7434063B20.733Authentication method  apparatus  and systemGRANT2008-10-072001-10-2419142987GoodToshiba CorpToshiba Corp
US6920561B10.731Method and system for enabling free seating using biometrics through a centralized authenticationGRANT2005-07-192000-03-3134738891GoodInternational Business Machines CorpLenovo PC International Ltd
US20040225534A10.729Policy management during handoverAPPLICATION2004-11-112003-03-0633422796GoodNokia OyjNokia Oyj
US20070127495A10.727Single sign-on for users of a packet radio network roaming in a multinational operator networkAPPLICATION2007-06-072003-01-1032710034GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
WO2004021153A10.724METHOD AND APPARATUS FOR SECURE DATA TRANSMISSION IN A MOBILE COMMUNICATION SYSTEMAPPLICATION2004-03-112002-08-2831977175Good
US5642401A0.723System and method of authenticating a service request in a mobile communication systemGRANT1997-06-241993-06-2916113830GoodNEC CorpNEC Corp
US7515569B20.715Access control for wireless systemsGRANT2009-04-072002-11-2732325515GoodAgere Systems LLCAvago Technologies International Sales Pte Ltd
US6373949B10.715Method for user identity protectionGRANT2002-04-161997-04-168548649GoodNokia Networks OyWSOU Investments LLC
US20040181603A10.712Device  method and system for enhanced routing in mobile ip networkingAPPLICATION2004-09-162001-08-168164550GoodNokia OyjNokia Oyj
US6671377B10.702System and method for downloading network information to mobile stations for location calculationGRANT2003-12-301999-03-1829735682GoodEricsson IncEricsson Inc
US7516483B20.701System and method for accomplishing two-factor user authentication using the internetGRANT2009-04-072001-08-2426728629GoodSecure Computing LLCMcAfee LLC
US7406594B20.701Method and apparatus for certification and authentication of users and computers over networksGRANT2008-07-292001-10-3126624267GoodYamaha CorpYamaha Corp
US20070101139A10.694System for protecting information over the internetAPPLICATION2007-05-031999-08-0237682013GoodHarris Interactive IncS Aqua Semiconductor LLC
US20020002678A10.692INTERNET AUTHENTICATION TECHNOLOGYAPPLICATION2002-01-031998-08-1422464732GoodCloakware CorpCloakware Corp
US7103359B10.690Method and system for access point roamingGRANT2006-09-052002-05-2329582069GoodNokia OyjNokia Oyj
US7210037B20.687Method and apparatus for delegating digital signatures to a signature serverGRANT2007-04-242000-12-1524981762GoodOracle International CorpOracle International Corp
US9613483B20.685Personal digital key and receiver/decoder circuit system and methodGRANT2017-04-042000-12-2736597587GoodProxense LLCProxense LLC
US20030093485A10.685Method and system for scheduled streaming of best effort dataAPPLICATION2003-05-152001-09-1226844499GoodSkystream Networks IncMk Systems Usa Inc
US7606242B20.682Managed roaming for WLANSGRANT2009-10-202002-08-0231494304GoodWavelink CorpIvanti Inc, Ivanti Software Inc
US6912582B20.679Service routing and web integration in a distributed multi-site user authentication systemGRANT2005-06-282001-03-3025238435GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6587680B10.678Transfer of security association during a mobile terminal handoverGRANT2003-07-011999-11-2323777644GoodNokia OyjNokia Technologies Oy
US5987134A0.676Device and method for authenticating user's access rights to resourcesGRANT1999-11-161996-02-2327274460GoodFuji Xerox Co LtdFujifilm Business Innovation Corp
US20060101273A10.675Identification information protection method in wlan inter-workingAPPLICATION2006-05-112002-10-1132089344GoodMatsushita Electric Industrial Co LtdApple Inc
US20060210084A10.674METHOD AND SYSTEM TO SECURELY STORE AND DISTRIBUTE CONTENT ENCRYPTION KEYSAPPLICATION2006-09-212000-06-1627760146GoodEntriq IncMih Technology Holdings Bv
US7522906B20.674Mobile unit configuration management for WLANsGRANT2009-04-212002-08-0933096479GoodWavelink CorpIvanti Inc, Ivanti Software Inc
US7263357B20.672Method for fast roaming in a wireless networkGRANT2007-08-282003-01-1432595351GoodSamsung Electronics Co Ltd, University of Maryland at BaltimoreSamsung Electronics Co Ltd, University of Maryland at Baltimore, University of Maryland at College Park
US20030237004A10.668Certificate validation method and apparatus thereofAPPLICATION2003-12-252002-06-2529728370GoodNEC CorpNEC Corp
US8107951B20.664Collective notification of node reset to subset of connections in radio access networkGRANT2012-01-312002-11-0532312686GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US20020078352A10.662Secure communication by modification of security codesAPPLICATION2002-06-202000-12-1524964626GoodInternational Business Machines CorpInternational Business Machines Corp
US20020025045A10.661Encryption processing for streaming mediaAPPLICATION2002-02-282000-07-2627353929GoodRPK New Zealand LtdArris Technology Inc, Google Technology Holdings LLC
US7835324B20.661Resource optimization in a wireless IP networkGRANT2010-11-162002-04-1128794433GoodNortel Networks LtdApple Inc
US6915426B10.659System and method for enabling authentication at different authentication strength-performance levelsGRANT2005-07-051999-07-2334703832GoodNetworks Associates Technology IncMcAfee LLC
US6092201A0.657Method and apparatus for extending secure communication operations via a shared listGRANT2000-07-181997-10-2446254729GoodEntrust LtdEntrust Ltd
US8713641B10.653Systems and methods for authorizing  authenticating and accounting users having transparent computer access to a network using a gateway deviceGRANT2014-04-291998-12-0845528060GoodNomadix IncGate Worldwide Holdings LLC
US6336186B10.652Cryptographic system and methodology for creating and managing crypto policy on certificate serversGRANT2002-01-011998-07-0226784186GoodNetworks Associates Technology IncNetworks Associates Technology Inc, CA Inc
US7835519B20.649Mini time key creation memory medium and systemGRANT2010-11-161998-03-2313524552GoodInternational Business Machines CorpInternational Business Machines Corp
WO2004030394A10.649IDENTIFICATION OF A TERMINAL WITH A SERVERAPPLICATION2004-04-082002-09-2631985270Good
US6338139B10.643Information reproducing apparatus  authenticating apparatus  and information processing systemGRANT2002-01-081997-07-2416394546GoodToshiba CorpToshiba Corp
US5717758A0.642Witness-based certificate revocation systemGRANT1998-02-101995-11-0232601027GoodCorestreet Security LtdNOVOMODO Inc, Assa Abloy AB
US20030028493A10.642Personal information management system  personal information management method  and information processing serverAPPLICATION2003-02-062001-08-0319067943GoodNEC CorpNEC Corp
EP0862301A20.639An encryption communication system using an agent and a storage medium for storing that agentGRANT1998-09-021996-11-2818088990GoodFujitsu LtdFujitsu Ltd
US6701435B10.638Cryptographic key generation systemGRANT2004-03-021998-08-2016972709GoodInternational Business Machines CorpInternational Business Machines Corp
US6966004B10.638Method for providing single step log-on access to a differentiated computer networkGRANT2005-11-151998-08-0335276313GoodCisco Technology IncCisco Technology Inc
US7941669B20.633Method and apparatus for enabling a user to select an authentication methodGRANT2011-05-102001-01-0326711718GoodAmerican Express Travel Related Services Co IncLiberty Peak Ventures LLC
US8090663B10.632Automated banking machine system and methodGRANT2012-01-032001-04-2336974619GoodDiebold IncDiebold Nixdorf Inc
US5794139A0.629Automatic generation of private authentication key for wireless communication systemsGRANT1998-08-111994-08-2923144005GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
WO2001080591A20.628OPTIMIZED PACKET-RESOURCE MANAGEMENTAPPLICATION2001-10-252000-04-0726890937Good
US6311275B10.627Method for providing single step log-on access to a differentiated computer networkGRANT2001-10-301998-08-0322437963GoodCisco Technology IncCisco Technology Inc
US7263191B20.625Method and apparatus for encrypting dataGRANT2007-08-282001-10-159923835GoodHewlett Packard Development Co LPGoogle LLC
US7328344B20.622Authority-neutral certification for multiple-authority PKI environmentsGRANT2008-02-052001-09-2826922675GoodImagitas IncGula Consulting LLC
US8019084B10.619Automated banking machine remote key load system and methodGRANT2011-09-132001-04-2337592417GoodDiebold IncDiebold Nixdorf Inc
US5953420A0.618Method and apparatus for establishing an authenticated shared secret value between a pair of usersGRANT1999-09-141996-10-2524961259GoodInternational Business Machines CorpInternational Business Machines Corp
US20030126433A10.618Method and system for performing on-line status checking of digital certificatesAPPLICATION2003-07-032001-12-2721870539GoodSun Microsystems IncSun Microsystems Inc
US5889861A0.617Identity confidentiality method in radio communication systemGRANT1999-03-301995-01-1211982183GoodKokusai Denshin Denwa KKKDDI Corp
US7474751B20.616Method of selecting encrypting arithmetric for realizing communication of secrecyGRANT2009-01-062001-12-134677400GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US6009177A0.614Enhanced cryptographic system and method with key escrow featureGRANT1999-12-281994-01-1326877578GoodCertco LLCCERTCO Inc A Corp OF DELAWARE
US7281132B20.613Using token-based signing to install unsigned binariesGRANT2007-10-092001-10-1921934824GoodSun Microsystems IncOracle America Inc
US7363376B20.613Method and apparatus for generating an identifier to facilitate delivery of enhanced data services in a mobile computing environmentGRANT2008-04-222001-07-3125442636GoodArraycomm LLCIntel Corp
US7418592B10.606Automated banking machine system and methodGRANT2008-08-262001-04-2339687356GoodDiebold IncDiebold Nixdorf Inc
US7526644B20.606Apparatus and method for demonstrating and confirming the status of digital certificates and other dataGRANT2009-04-281996-05-1426800706GoodAxway IncAxway Inc
US20030236991A10.605Allowing an electronic device accessing a service to be authenticatedAPPLICATION2003-12-252002-06-2029733922GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20030154376A10.603Optical storage medium for storing  a public key infrastructure (pki)-based private key and certificate  a method and system for issuing the same and a method for usingAPPLICATION2003-08-142001-02-0519705352GoodASIAN-SIGN Co LtdASIAN-SIGN Co Ltd
US5838790A0.599Advertisement authentication system in which advertisements are downloaded for off-line displayGRANT1998-11-171996-04-1924547140GoodJuno Online Services IncJuno Online Services Inc
US6580906B20.598Authentication and security in wireless communication systemGRANT2003-06-171997-12-1025534194GoodIntel CorpIntel Corp, Xircom Wireless Inc
US7325058B10.597Method and system for controlling subscriber access in a network capable of establishing connections with a plurality of domain sitesGRANT2008-01-292000-11-1338974019GoodCisco Technology IncCisco Technology Inc
US20040146158A10.592Cryptographic systems and methods supporting multiple modesAPPLICATION2004-07-292003-01-2432737762GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US5412723A0.589Mechanism for keeping a key secret from mobile eavesdroppersGRANT1995-05-021994-03-0122756057GoodInternational Business Machines CorpInternational Business Machines Corp
US7499888B10.588Transaction authentication system and methodGRANT2009-03-032001-03-1640385453GoodFusionOne IncIMMERSON MEDICAL Inc, Synchronoss Technologies Inc
US6453301B10.584Method of using personal device with internal biometric in conducting transactions over a networkGRANT2002-09-172000-02-2324032299GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US7356837B20.583Centralized identification and authentication system and methodGRANT2008-04-082001-08-2925475185GoodAmeritech Solutions IncAmeritech Solutions Inc
US6094485A0.578SSL step-upGRANT2000-07-251997-09-1825463419GoodNetscape Communications CorpMeta Platforms Inc
US7519824B10.575Time stamping method employing multiple receipts linked by a nonceGRANT2009-04-141999-12-1040525243GoodInternational Business Machines CorpInternational Business Machines Corp
US7526654B20.573Method and system for detecting a secure state of a computer systemGRANT2009-04-282001-10-1625524927GoodActivCard Ireland LtdAssa Abloy AB
US6526509B10.572Method for interchange of cryptographic codes between a first computer unit and a second computer unitGRANT2003-02-251995-05-1927215136GoodSiemens AGNokia Solutions and Networks GmbH and Co KG
US6256737B10.568System  method and computer program product for allowing access to enterprise resources using biometric devicesGRANT2001-07-031999-03-0923007336GoodBioNetrix Systems CorpCitibank NA, BioNetrix Systems Corp
US8818903B20.568Transaction coordinator for digital certificate validation and other servicesGRANT2014-08-261999-09-1027538450Good
US7362862B20.566Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using couponsGRANT2008-04-221995-11-2228678892GoodWalker Digital LLCInventor Holdings LLC
US20010032232A10.562Messaging method and apparatus including a protocol stack that corresponds substantially to an open system interconnection (OSI) model and incorporates a simple network transport layerAPPLICATION2001-10-182000-01-3123964940GoodAether Systems IncTeleCommunication Systems Inc, TSYS Acquisition Corp
US7401356B20.562Method and system for e-mail message transmissionGRANT2008-07-151997-07-2425390892GoodTumbleweed Communications CorpAxway Inc
US7583953B20.560Method and device for subdividing data service charges in a networkGRANT2009-09-012003-02-1133095533GoodKT CorpKT Corp
US20040203590A10.560Set-up of wireless consumer electronics device using a learning remote controlAPPLICATION2004-10-142002-09-1131991318GoodKoninklijke Philips Electronics NVKoninklijke Philips NV
US5625692A0.558Method and system for a public key cryptosystem having proactive  robust  and recoverable distributed threshold secret sharingGRANT1997-04-291995-01-2323485585GoodInternational Business Machines CorpInternational Business Machines Corp
US20030014368A10.551Systems  methods and apparatus for secure printing of negotiable instrumentsAPPLICATION2003-01-162001-07-0926887696GoodTravelers Express Co IncMONEYGRAM PAYMENT SYSTEMS Inc
US20030214922A10.551System for context transfer for wireless internet devicesAPPLICATION2003-11-202001-12-1423333267GoodInterDigital Technology CorpInterDigital Technology Corp
US7194623B10.549Data event logging in computing platformGRANT2007-03-201999-05-288241419GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20040059941A10.548Systems and methods for identifying users and providing access to information in a network environmentAPPLICATION2004-03-252002-09-1931992566GoodMyfamily com IncGenerations Network Inc
US20040073512A10.547Unique session storage designAPPLICATION2004-04-152001-02-2332070272GoodSENSCOM IncSENSCOM Inc
EP0708571A20.544Method and system for distributed control in wireless cellular and personal communication systemsGRANT1996-04-241994-10-1723263532GoodAT&T CorpAT&T Corp
US6510513B10.544Security services and policy enforcement for electronic dataGRANT2003-01-211999-01-1322861205GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5737523A0.543Methods and apparatus for providing dynamic network file system client authenticationGRANT1998-04-071996-03-0424446092GoodSun Microsystems IncOracle America Inc
US8650103B20.541Verification of a person identifier received onlineGRANT2014-02-112001-10-1726986834GoodeBay IncPayPal Israel Ltd, eBay Inc
US6026163A0.540Distributed split-key cryptosystem and applicationsGRANT2000-02-151995-12-1326678315Good
US6144949A0.540Radio frequency communication system with subscribers arranged to authenticate a received messageGRANT2000-11-071998-02-1221813351GoodMotorola IncMotorola Solutions Inc
US20040203781A10.539Context block leasing for fast handoffsAPPLICATION2004-10-142002-03-1427767490GoodTexas Instruments IncTexas Instruments Inc
US20030105812A10.537Hybrid system architecture for secure peer-to-peer-communicationsAPPLICATION2003-06-052001-08-0927575378GoodGigamedia Access CorpGigamedia Access Corp
US20060069926A10.536Systems and methods for secure transaction management and electronic rights protectionAPPLICATION2006-03-301995-02-1332686239GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6674860B10.534Method and arrangement for managing a service in a mobile communications systemGRANT2004-01-061998-07-178552214GoodNokia Mobile Phones LtdMicrosoft Technology Licensing LLC, 2011 Intellectual Property Asset Trust
USRE43302E10.527E-mail firewall with stored key encryption/decryptionGRANT2012-04-031997-07-2421985777GoodAxway IncAxway Inc
US20050066057A10.522Method and arrangement in a communications networkAPPLICATION2005-03-242001-10-1920285699GoodSMART-TRUST SYSTEM OySMART-TRUST SYSTEM Oy
US6055638A0.520Process and authentication device for secured authentication between two terminalsGRANT2000-04-251996-02-1526232541Good
US5754657A0.510Authentication of a message sourceGRANT1998-05-191995-08-3124077610GoodTrimble Navigation LtdTrimble Inc
US20030101348A10.508Method and system for determining confidence in a digital transactionAPPLICATION2003-05-292001-07-1227378853GoodI-CONTROL SECURITY IncAtrua Technologies Inc
US20020037736A10.505Closed group communication method and communication terminal equipmentAPPLICATION2002-03-282000-09-2818782213GoodHitachi LtdHitachi Ltd
US6615347B10.502Digital certificate cross-referencingGRANT2003-09-021998-06-3027765473GoodVerisign IncDigicert Inc
US20030033375A10.495Method for identifying internet usersAPPLICATION2003-02-132000-09-058169756GoodSiemens AGSiemens AG
US7423993B20.494Connection release in communication networkGRANT2008-09-092003-02-1032829726GoodNokia OyjNokia Technologies Oy
US7904360B20.490System and method for verification  authentication  and notification of a transactionGRANT2011-03-082002-02-0432095752GoodST ISIDORE RESEARCH LLCST ISIDORE RESEARCH LLC
US7965842B20.485System and method for detecting unauthorized wireless access pointsGRANT2011-06-212002-06-2829779443GoodWavelink CorpIvanti Inc, Ivanti Software Inc
US7707406B20.481Certificate renewal in a certificate authority infrastructureGRANT2010-04-272002-11-0832314562GoodGeneral Instrument CorpGoogle Technology Holdings LLC
US7457951B10.474Data integrity monitoring in trusted computing entityGRANT2008-11-251999-05-288241420GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US7080255B10.470Secret key generation method  encryption method  and cryptographic communications method and systemGRANT2006-07-181999-05-1936659259GoodMurata Machinery LtdMurata Machinery Ltd
US5953399A0.470PBX selective caller identification authenticationGRANT1999-09-141997-03-1325221917GoodBell Atlantic Network Services IncVerizon Patent and Licensing Inc
EP1111861A10.467Methods and devices providing wireless access to computer networksGRANT2001-06-271999-12-2426235194GoodCanon Europa NVCanon Europa NV
US20020143939A10.462Method for automatically classifying traffic with enhanced hierarchy in a packet communications networkAPPLICATION2002-10-031997-11-2527371053GoodPacketeer IncCA Inc
US20030145204A10.459Method and apparatus for simultaneously establishing user identity and group membershipAPPLICATION2003-07-312002-01-2922026321GoodAvaya Technology LLCAvaya Technology LLC
WO2000076243A10.458RELEASING A CONNECTION IN A WIRELESS COMMUNICATION NETWORKAPPLICATION2000-12-141999-06-0410854792Good
US7004382B20.454Payment validation networkGRANT2006-02-282002-08-0231495771GoodADVANCED SOFTWARE DESIGN CorpADVANCED SOFTWARE DESIGN Corp
US6134550A0.453Method and apparatus for use in determining validity of a certificate in a communication system employing trusted pathsGRANT2000-10-171998-03-1821912697GoodEntrust LtdEntrust Ltd
US6230271B10.445Dynamic policy-based apparatus for wide-range configurable network service authentication and access control using a fixed-path hardware configurationGRANT2001-05-081998-01-2021740514GoodPilot Network Services IncHanger Solutions LLC
US6430170B10.445Method and apparatus for generating random numbers from a communication signalGRANT2002-08-061999-05-2723249953GoodQualcomm IncQualcomm Inc
US20040037269A10.444Network requested packet data protocol context activationAPPLICATION2004-02-262000-11-1420281828GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6772336B10.440Computer access authentication methodGRANT2004-08-031998-10-1632775416GoodCallahan Cellular LLCCallahan Cellular LLC
US20040143554A10.438Method and apparatus for generating a value bearing instrumentAPPLICATION2004-07-222001-03-2832710609GoodCMA BUSINESS CREDIT SERVICESCMA BUSINESS CREDIT SERVICES
US5666414A0.428Guaranteed partial key-escrowGRANT1997-09-091996-03-2124484491Good
US20020188871A10.422System and method for managing security packet processingAPPLICATION2002-12-122001-06-1226856800GoodCorrent CorpCorrent Corp
US9236051B20.419Bio-phonetic multi-phrase speaker identity verificationGRANT2016-01-122003-02-1332850017GoodAT&T Intellectual Property I LPNuance Communications Inc
US20060126844A10.416Method and apparatus for achieving crypto-syncronization in a packet data communication systemAPPLICATION2006-06-152000-01-2023942791Good
US20030009580A10.414Providing quality of service in a telecommunications system such as a UMTS of other third generation systemAPPLICATION2003-01-092001-04-0926077114GoodLucent Technologies IncNokia of America Corp
US6424657B10.413Traffic queueing for remote terminal DSLAMsGRANT2002-07-232000-08-1027417572GoodVerizon Communications IncRakuten Group Inc
US8718283B20.405System and method for processing a shared secretGRANT2014-05-062001-04-2711042774GoodVerizon Ireland LtdCybertrust Ireland Ltd, Verizon Ireland Ltd
US8218765B20.405Information systemGRANT2012-07-102001-02-239909412GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US6389462B10.404Method and apparatus for transparently directing requests for web objects to proxy cachesGRANT2002-05-141998-12-1622793236GoodLucent Technologies IncAlcatel Lucent SAS, Sound View Innovations LLC
US20020138308A10.403Insurance task processing method  insurance task processing program  computer-readable storage medium recorded with insurance task processing program  and insurance task processing systemAPPLICATION2002-09-262001-03-2218939388GoodFujitsu LtdFujitsu Ltd
US5933504A0.398Strengthened public key protocolGRANT1999-08-031995-05-1810774642GoodCerticom CorpCerticom Corp
US20030041125A10.394Internet-deployed wireless systemAPPLICATION2003-02-272001-08-1625460765GoodWavelink CorpIvanti Software Inc
US6301659B10.392Tree-based certificate revocation systemGRANT2001-10-091995-11-0244622979GoodCorestreet Security LtdNOVOMODO Inc, Assa Abloy AB
US5724346A0.389Means for maintaining connectable access points owing to movement of a mobile station between cells in a wireless LAN systemGRANT1998-03-031995-01-1111530544GoodFujitsu LtdFujitsu Ltd
EP1102431A10.388Method and system for data broadcastingGRANT2001-05-231999-11-189552248GoodAlcatel CIT SA, Alcatel SAAlcatel CIT SA, Alcatel Lucent SAS
US20020116611A10.388Secure distributed on-line certification authorityAPPLICATION2002-08-222000-10-3126669232GoodCornell Research Foundation IncCornell Research Foundation Inc
US7316029B10.385Network security services architectureGRANT2008-01-012001-10-2538870581GoodSprint Communications Co LPT Mobile Innovations LLC
US7260727B20.385Method for secure storage of sensitive data in a memory of an embedded microchip system  particularly a smart card  and embedded system implementing the methodGRANT2007-08-212000-06-088851070GoodCP8 Technologies SACP8 Technologies SA
US7085925B20.384Trust ratings in group credentialsGRANT2006-08-012001-04-0325243105GoodSun Microsystems IncOracle America Inc
US7512807B20.384Method and apparatus for biometric verification with data packet transmission prioritizationGRANT2009-03-312003-02-2532824712GoodActivCard Ireland LtdActivCard Ireland Ltd
US20040205247A10.383Apparatus and method for performing traffic flow template packet filtering according to internet protocol versions in a mobile communication systemAPPLICATION2004-10-142003-02-2132041031GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US5666416A0.382Certificate revocation systemGRANT1997-09-091995-10-2424233955GoodCorestreet Security LtdNOVOMODO Inc, Assa Abloy AB
US20030172155A10.375Cracker tracing system and method  and authentification system and method of using the sameAPPLICATION2003-09-112001-05-0919709684GoodTRIOPS CORPTRIOPS CORP
US7492928B20.372Method and apparatus for biometric verification with data packet transmission prioritizationGRANT2009-02-172003-02-2532771422GoodActivCard Ireland LtdActivCard Ireland Ltd
US5599231A0.368Security systems and methods for a videographics and authentication game/program fabricating deviceGRANT1997-02-041994-10-3123299955GoodNintendo Co LtdNintendo Co Ltd
US7734924B20.367System and method for transparently providing certificate validation and other services within an electronic transactionGRANT2010-06-082000-09-0822868713GoodIdentrust IncIdentrust Inc
US8892475B20.361Provision of authorization and other servicesGRANT2014-11-182000-09-0827398175GoodIdentrust IncIdentrust Inc
US20040193922A10.361Method and system for filtering communicationAPPLICATION2004-09-301997-07-2432995717GoodTumbleweed Communications CorpAxway Inc
US7058817B10.360System and method for single sign on process for websites with multiple applications and servicesGRANT2006-06-061999-07-0236569087GoodChase Manhattan Bank NAJPMorgan Chase Bank NA
US8219496B20.351Method of and apparatus for ascertaining the status of a data processing environmentGRANT2012-07-102001-02-239909494GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US5615269A0.345Ideal electronic negotiationsGRANT1997-03-251996-02-2224421392Good
US20020133579A10.342Methods  systems and computer program products for rule based delegation of administration powersAPPLICATION2002-09-192001-01-1625059404GoodNetIQ CorpNetIQ Corp
US20030236847A10.332Technology enhanced communication authorization systemAPPLICATION2003-12-252002-06-1930000554Good
US20030167408A10.330Randomized bit dispersal of sensitive data setsAPPLICATION2003-09-042002-03-0127803788GoodInternational Business Machines CorpInternational Business Machines Corp
US7796752B20.328Cipher implementationGRANT2010-09-142002-11-0432680657GoodMarvell International LtdMarvell Asia Pte Ltd
US7162059B20.323Method for implementing a navigation key function in a mobile communication terminal based on fingerprint recognitionGRANT2007-01-092002-06-2634191978GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US7765161B20.322System and method for providing payment services in electronic commerceGRANT2010-07-271999-09-2422557004GoodIdentrust IncIdentrus LLC, Identrust Inc
US7317823B10.316Lockbox imaging systemGRANT2008-01-081999-05-1136600573GoodJPMorgan Chase Bank NAJPMorgan Chase Bank NA
US4795890A0.313Device authentication system for on and off line useGRANT1989-01-031987-02-0221740184GoodLight Signatures IncPERCEPTION PARTNERS Inc
US20030229705A10.311Computer networking system  method of document retrieval in document management system  document management program and media for document managementAPPLICATION2003-12-112002-05-3129706527GoodRicoh Co LtdRicoh Co Ltd
US20020120863A10.305Method of and apparatus for investigating transactions in a data processing environmentAPPLICATION2002-08-292001-02-239909408GoodHewlett Packard CoHewlett Packard Development Co LP
US9684889B20.301System and method for providing certification-related and other servicesGRANT2017-06-201999-02-1227537564GoodIdentrust IncIdentrus LLC, Identrust Inc
US7263506B20.295Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sitesGRANT2007-08-282000-04-0626890746GoodFair Isaac CorpFair Isaac Corp
US20020113995A10.280System and method for asynchronous tracking and quantifying of printing eventsAPPLICATION2002-08-222001-01-1726730269Good
US7353531B20.275Trusted computing environmentGRANT2008-04-012001-02-239909492GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20030169771A10.275Apparatus and method for reordering traffic flow templates in a mobile communication systemAPPLICATION2003-09-112002-01-2419718816GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US5765197A0.272Method and system for authentication of a memory unit for a computer systemGRANT1998-06-091993-12-1622612467GoodInternational Business Machines CorpInternational Business Machines Corp
US7251624B10.265Score based decisioningGRANT2007-07-311992-09-0838290386GoodFair Isaac CorpFair Isaac Corp
WO1995015665A10.254COMMUNICATION ACROSS REGIONAL ENTITIESAPPLICATION1995-06-081993-12-0222580614Good
US8200835B20.244Method for transmitting data from an emitter to a plurality of receiversGRANT2012-06-122001-08-078183654GoodSiemens AGSiemens AG
US20040176947A10.229Transmission control method and systemAPPLICATION2004-09-092002-12-2732501155GoodNTT Docomo IncNTT Docomo Inc
US6012045A0.224Computer-based electronic bid  auction and sale system  and a system to teach new/non-registered customers how bidding  auction purchasing worksGRANT2000-01-041997-07-0125389122Good
US20030041255A10.219Method and apparatus for locking an application within a trusted environmentAPPLICATION2003-02-272001-07-319919479GoodHewlett Packard CoHewlett Packard Development Co LP
US6899269B10.213Magnetic stripe authentication and verification systemGRANT2005-05-311998-07-2223264901GoodMag Tek IncMag Tek Inc
US6208869B10.201Mobile radio communicating system including both a public system and at least one private systemGRANT2001-03-271998-05-129526267GoodAlcatel SAAlcatel Lucent SAS
US10861098B20.177Actuary-manipulable rating model systemGRANT2020-12-082001-02-0146465562GoodVersata Development Group IncVersata Development Group Inc
US20030023872A10.174Trusted platform evaluationAPPLICATION2003-01-302001-07-308182156GoodHewlett Packard CoHewlett Packard Development Co LP
US20060149501A10.167Apparatus and method for determining a level of confidence in a risk assessment and/or determining a level of acceptability of an event occuringAPPLICATION2006-07-062002-11-2028796162GoodMetatheme Pty LtdMetatheme Pty Ltd
US4984290A0.160Method of controlling communications in a cellular radiotelephone systemGRANT1991-01-081988-08-0422855656GoodMotorola IncMotorola Solutions Inc
US5235616A0.116BIDIRECTIONAL DATA TRANSMISSION SYSTEMGRANT1993-08-101991-09-119416829GoodSociete Nationale dEtude et de Construction de Moteurs dAviation SNECMASafran Aircraft Engines SAS
US5268926A0.096Method and apparatus for the simultaneous transmission of separate data signalsGRANT1993-12-071991-09-119416828GoodSociete Nationale dEtude et de Construction de Moteurs dAviation SNECMASafran Aircraft Engines SAS
JPH10112883ANRRADIO COMMUNICATION EXCHANGE SYSTEM  EXCHANGE  PUBLIC KEY MANAGEMENT DEVICE  MOBILE TERMINAL AND MOBILE TERMINAL RECOGNIZING METHODGRANT1998-04-281996-10-0717426392Good
FR2724796A1NRPredetermined criterion verification method for cellular telephone networkGRANT1996-03-221994-09-159466974GoodInstitut EurecomInstitut Eurecom
CN1653743ANRMethod and system in a digital wireless data communication network for arranging data encryption and corresponding serverGRANT2005-08-102002-05-178565194Good
CN1505312ANRCommon key encryption communication systemGRANT2004-06-162002-11-2932290508Good
US6173173B10.443Invalid mobile telephone call terminating system and methodGRANT2001-01-091998-07-0222324074FairLucent Technologies IncNokia of America Corp
US5839063A0.436Authentication system and method for preventing wireless communication fraudGRANT1998-11-171995-09-0124082831FairLucent Technologies IncNokia of America Corp
US20040181598A10.395Managing state information across communication sessions between a client and a server via a stateless protocolAPPLICATION2004-09-162003-03-1232775840FairMicrosoft CorpMicrosoft Technology Licensing LLC
US4761807A0.375Electronic audio communications system with voice authentication featuresGRANT1988-08-021982-09-2927027650FairVMX IncAvaya Technology LLC
US7814212B10.311Data delivery system using local and remote communicationsGRANT2010-10-122000-04-2842831021Fair
US20010006892A10.233Apparatus and method for automatically programming frequency scanning radio receiversAPPLICATION2001-07-051997-07-2946257526FairGray Electronics IncGRAY ELECTROMICS LLC
US5105435A0.184Method and apparatus for cancelling spread-spectrum noiseGRANT1992-04-141990-12-2124535584FairMotorola IncMotorola Solutions Inc
US20020004875A10.052Memory deviceAPPLICATION2002-01-102000-05-319892712FairSeiko Epson CorpSeiko Epson Corp
EP0651710A10.020BICYCLE COOLER AND MOUNTING APPARATUSGRANT1995-05-101992-07-3125448048FairJanko USA IncJanko USA Inc
US6817134B20.014Device for loading bullets into firearm magazinesGRANT2004-11-162003-02-1346299277FairRainbow Precision Manufacturing CorpGANGI ROBERT J
JPH104586ANRMOBILE TERMINAL IDENTIFICATION SYSTEMGRANT1998-01-061996-06-1415582292Fair
JP2002300152ANRCOMMUNICATION SECURITY KEEPING METHOD  ITS EXECUTION DEVICE  AND ITS PROCESSING PROGRAMAPPLICATION2002-10-112001-03-2918949160Fair

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeLOW
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
1,682
Recommended Classes
421
Government Assigned Classes
5
CPC
Title
Score
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]3.194
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner2.906
H04L9/321involving a third party or a trusted authority2.582
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys2.179
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)2.008
H04L9/0841involving Diffie-Hellman or related key agreement protocols1.988
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]1.974
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD1.974
H04W12/06Authentication1.950
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)1.950
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates1.936
H04W36/0038of security context information1.929
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)1.927
G06Q20/3829involving key management1.927
G06Q20/3678e-cash details  e.g. blinded  divisible or detecting double spending1.914
H04L9/085Secret sharing or secret splitting  e.g. threshold schemes1.914
G07F7/0893the card reader reading the card in a contactless manner1.906
H04L9/3271using challenge-response1.906
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.906
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC1.906
G06K5/04Verifying the alignment of markings1.906
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)1.906
H04W12/12Fraud detection1.906
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords1.906
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)1.902
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics1.902
H04L9/0833involving conference or group key | network architectures or network communication protocols for key management in group communication in a packet data network | (ref: H04L63/065)1.902
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)1.881
G06Q20/38215Use of certificates or encrypted proofs of transaction rights1.871
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding1.871
G06F21/44Program or device authentication1.864
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)1.859
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)1.848
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage1.842
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards1.842
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)1.839
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key1.818
G06Q20/352Contactless payments by cards1.817
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.813
H04W12/02Protecting privacy or anonymity1.805
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)1.804
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity1.804
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)1.800
H04L63/1416Event detection  e.g. attack signature detection1.800
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)1.800
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)1.797
G06Q20/401Transaction verification1.797
G06K7/10297arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs  e.g. ISO/IEC 14443 and 18092 | protocols for data communication in general  | see|  | (ref: H04L29/06)1.790
G06F13/385for adaptation of a particular data processing system to different peripheral devices1.790
G06Q20/354Card activation or deactivation1.780
H04W12/08Access security1.768
H04L67/08adapted for terminal emulation  e.g. telnet | protocols for telewriting or protocols for networked simulations  virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455)1.757
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)1.754
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication1.737
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)1.734
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy1.734
G06Q20/3823combining multiple encryption tools for a transaction1.731
G06Q20/12specially adapted for electronic shopping systems1.731
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)1.730
H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence  e.g. one-time-pad [OTP] or Vernam's cipher1.727
H04L63/0485Networking architectures for enhanced packet encryption processing  e.g. offloading of IPsec packet processing or efficient security association look-up1.720
H04L9/0822using key encryption key1.716
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine1.711
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)1.711
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols1.704
H04W12/04Key management1.699
G06F21/33using certificates1.697
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database1.686
G06F21/645using a third party1.686
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model1.682
G06F21/335for accessing specific resources  e.g. using Kerberos tickets1.682
G06F21/6245Protecting personal data  e.g. for financial or medical purposes1.681
G06Q20/223based on the use of peer-to-peer networks1.679
G06F21/45Structures or tools for the administration of authentication1.666
G06F21/602Providing cryptographic facilities or services1.666
H04L63/166at the transport layer1.665
H04L9/0847involving identity based encryption [IBE] schemes1.664
H04L9/3247involving digital signatures1.660
H04L9/3255using group based signatures  e.g. ring or threshold signatures1.659
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities1.657
G06F21/85interconnection devices  e.g. bus-connected or in-line devices1.657
B60R25/24using electronic identifiers containing a code not memorised by the user1.655
H04L9/0875based on channel impulse response [CIR]1.641
A63F13/35Details of game servers1.641
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.640
H04W48/16Discovering  processing access restriction or access information1.637
H04W48/08Access restriction or access information delivery  e.g. discovery data delivery1.637
H04W48/02Access restriction performed under specific conditions1.637
H04L63/0281Proxies1.636
H04L67/28for the provision of proxy services  e.g. intermediate processing or storage in the network | network management provisions | (ref: H04L41/00)| | network monitoring provisions | (ref: H04L43/00)| | proxies for network security | (ref: H04L63/0281)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)1.634
H04R25/55using an external connection  either wireless or wired1.628
G06F21/76in application-specific integrated circuits [ASICs] or field-programmable devices  e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs]1.627
H04W8/04Registration at HLR or HSS [Home Subscriber Server]1.625
H04L41/0806for initial configuration or provisioning1.625
G06Q20/4012Verifying personal identification number [PIN]1.624
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it1.624
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)1.622
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)1.620
H04L69/165involving combined use or selection criteria between TCP and UDP protocols | multi-protocol arrangements in general | (ref: H04L69/18)| | multilink protocols in general | (ref: H04L69/14)1.620
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]1.611
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint1.602
H04W4/029Location-based management or tracking services1.601
G06F21/606by securing the transmission between two devices or processes1.600
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms1.600
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)1.599
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries1.596
G06F21/41where a single sign-on provides access to a plurality of computers1.596
G06F21/42using separate channels for security data1.596
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)1.596
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)1.595
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]1.595
H04L9/3066involving algebraic varieties  e.g. elliptic or hyper-elliptic curves1.595
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity1.588
H04L63/105Multiple levels of security1.587
H04W60/00Registration  e.g. affiliation to network| De-registration  e.g. terminating affiliation1.584
H04W56/001Synchronization between nodes1.583
G01S13/76wherein pulse-type signals are transmitted1.580
B60R25/246characterised by the challenge triggering1.580
H04L9/0827involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18)1.580
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.579
G06F9/54Interprogram communication1.579
H04L12/4675Dynamic sharing of VLAN information amongst network nodes | configuration of the network or of network elements | (ref: H04L41/08)1.577
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)1.577
H04L12/46Interconnection of networks1.577
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)1.569
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)1.566
H04L61/1511using domain name system [DNS]1.562
H04L63/104Grouping of entities1.562
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)1.562
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying1.558
H04L45/50using label swapping  e.g. multi-protocol label switch [MPLS]1.550
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself1.547
G06Q20/36using electronic wallets or electronic money safes1.545
G06Q20/3674involving authentication1.545
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)1.543
G06Q40/12Accounting1.543
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)1.542
H04L63/0815providing single-sign-on or federations1.541
G06F21/73by creating or determining hardware identification  e.g. serial numbers1.540
H04L9/3278using physically unclonable functions [PUF]1.540
G06F21/12Protecting executable software1.539
G06F21/6272by registering files or documents with a third party1.538
G06Q10/101Collaborative creation of products or services1.538
H04L9/3006underlying computational problems or public-key parameters1.534
H04L63/0272Virtual private networks1.533
G06Q20/1235with control of digital rights management [DRM]1.532
H04L9/3252using DSA or related signature schemes  e.g. elliptic based signatures  ElGamal or Schnorr schemes1.532
G06Q20/123Shopping for digital content1.532
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)1.532
H04L67/327whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status  payload or application type1.532
H04L45/44Distributed routing1.532
G06Q20/3825Use of electronic signatures1.532
H04W76/10Connection setup1.530
H04L69/324in the data link layer  i.e. layer two  e.g. HDLC | arrangements for detecting or preventing errors in the information received | (ref: H04L1/00)| | bus networks | (ref: H04L12/40)1.527
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)1.526
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)1.526
G09C1/00Apparatus or methods whereby a given sequence of signs  e.g. an intelligible text  is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00)1.526
H04L9/0869involving random numbers or seeds1.526
H04L9/008involving homomorphic encryption1.526
H04L9/3221interactive zero-knowledge proofs1.525
G06F21/71to assure secure computing or processing of information1.525
H04N21/2347involving video stream encryption | arrangements for secret or secure communication | (ref: H04L9/00)|   analogue secrecy systems | (ref: H04N7/16)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)| | arrangements for preventing the taking of data from a data transmission channel without authorisation | (ref: H04L12/22)| | security arrangements in wireless networks | (ref: H04W12/00)1.522
G06Q50/18Legal services| Handling legal documents1.522
H04W36/08Reselecting an access point1.520
H04W36/02Buffering or recovering information during reselection | | Modification of the traffic flow during hand-off1.520
H04L63/123received data contents  e.g. message integrity1.519
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)1.519
H04L9/0819Key transport or distribution  i.e. key establishment techniques where one party creates or otherwise obtains a secret value  and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062)1.518
G06F8/658Incremental updates| Differential updates1.516
H04W8/183Processing at user equipment or user record carrier1.515
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits1.515
G06Q20/3276using a pictured code  e.g. barcode or QR-code  being read by the M-device1.512
H04L63/102Entity profiles1.512
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]1.512
H04L9/3257using blind signatures1.511
H04L9/3297involving time stamps  e.g. generation of time stamps1.509
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]1.508
G06F9/465Distributed object oriented systems | remote method invocation [RMI] | (ref: G06F9/548)1.502
H04L67/16Service discovery or service management  e.g. service location protocol [SLP] or Web services | network service management for ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | address allocation to terminals or nodes connected to a network | (ref: H04L61/30)| | mobile application services specially adapted for wireless communication networks | (ref: H04W4/00)1.502
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)1.502
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints1.502
H04W76/19Connection re-establishment1.502
H04W28/10Flow control | between communication endpoints1.501
H04W12/10Integrity1.499
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)1.497
H04L63/101Access control lists [ACL]1.496
G06F7/582Pseudo-random number generators1.494
H04L63/108when the policy decisions are valid for a limited amount of time1.493
G06F21/445by mutual authentication  e.g. between devices or programs1.489
H04W24/02Arrangements for optimising operational condition1.488
H04W76/11Allocation or use of connection identifiers1.488
G01S1/68Marker  boundary  call-sign  or like beacons transmitting signals not carrying directional information1.487
H04L49/252Store and forward routing1.486
H04L45/16Multipoint routing | arrangements for multicast or broadcast in data networks | (ref: H04L12/18)1.486
G06Q20/3226Use of secure elements separate from M-devices1.482
H04W76/15Setup of multiple wireless link connections1.480
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)1.479
G06F3/0483interaction with page-structured environments  e.g. book metaphor1.477
G06F9/451Execution arrangements for user interfaces1.477
G06Q40/04Exchange  e.g. stocks  commodities  derivatives or currency exchange1.476
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)1.475
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules1.475
H04W36/0044of quality context information1.474
H04W36/30by measured or perceived connection quality data1.474
H04W4/06Selective distribution of broadcast services  e.g. multimedia broadcast multicast service [MBMS]| Services to user groups| One-way selective calling services1.474
H04W48/20Selecting an access point1.472
H04M15/00Arrangements for metering  time-control or time indication | | Metering  charging or billing arrangements for voice wireline or wireless communications  e.g. VoIP1.469
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation1.467
H04L67/148provided for migration or transfer of sessions | in-session procedures in real-time communications | (ref: H04L65/1083)| | control or signalling for completing the hand-off in wireless networks | (ref: H04W36/0005)1.466
G06F21/128involving web programs  i.e. using technology especially used in internet  generally interacting with a web browser  e.g. hypertext markup language [HTML]  applets  java1.464
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication1.463
G06Q10/107Computer aided management of electronic mail | electronic mail protocols | (ref: H04L29/06)| | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)1.462
H04L67/147provided for signalling methods or particular messages providing extensions to IETF  ITU  ETSI or 3GPP protocols  e.g.  additional proprietary messages  standard messages enhanced by additional header fields or standard messages being used for purposes other than originally intended1.462
H04L45/02Topology update or discovery | topology discovery for network management | (ref: H04L41/12)| | LAN interconnection over a backbone network | (ref: H04L12/4604)| | node-based peer discovery mechanisms in peer-to-peer networks | (ref: H04L67/1061)1.462
G06F21/608Secure printing1.462
G06F3/1238Secure printing  e.g. user identification  user rights for device usage  unallowed content  blanking portions or fields of a page  releasing held jobs1.462
G06F21/6254by anonymising data  e.g. decorrelating personal data from the owner's identification1.460
H04L67/2847involving pre-fetching or pre-delivering data based on network characteristics | cache prefetching within a hierarchical structured memory system | (ref: G06F12/0862)1.460
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)1.460
H04L12/189in combination with wireless systems | selective distribution or broadcast in wireless communication networks | (ref: H04W4/06)1.459
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)1.458
H04L63/064Hierarchical key distribution  e.g. by multi-tier trusted parties1.458
H04L63/126the source of the received data1.458
H04L63/1425Traffic logging  e.g. anomaly detection1.458
G06F21/121Restricting unauthorised execution of programs1.457
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.455
H04L9/0836using tree structure or hierarchical structure1.455
H04L12/1407Policy-and-charging control [PCC] architecture1.450
G06Q20/40145Biometric identity checks1.450
H04L67/18in which the network application is adapted for the location of the user terminal | wireless application services making use of the location of users or terminals | (ref: H04W4/02)|  takes precedence| location based Web retrieval | (ref: G06F17/3087)1.450
H04W36/023Buffering or recovering information during reselection1.448
G06F21/86Secure or tamper-resistant housings1.448
H04L12/1818Conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources  notifying involved parties1.446
G06Q30/0255based on user history1.445
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.444
H04L41/5051Service on demand  i.e. services are defined and provided in real time as requested by the user1.440
H04L65/1073Registration | arrangements for addressing or naming in data networks | (ref: H04L61/00)1.440
H04L67/1082involving incentive schemes1.438
G06Q30/0623Item investigation1.435
H04W40/24Connectivity information management  e.g. connectivity discovery or connectivity update1.433
H04W40/30for proactive routing1.433
G06Q50/26Government or public services1.433
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)1.433
G06Q20/4018using the card verification value [CVV] associated with the card1.432
H04L1/1845Combining techniques  e.g. code combining1.432
H04L63/0478applying multiple layers of encryption  e.g. nested tunnels or encrypting the content with a first key and then with at least a second key | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)1.432
H04L67/26Push based network services | broadcast or multicast push services | (ref: H04L12/1859)1.431
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.431
G06F3/0619in relation to data integrity  e.g. data losses  bit errors1.430
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour1.430
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)1.430
H04L67/1002for accessing one among a plurality of replicated servers  e.g. load balancing | arrangements or protocols for peer-to-peer networking | (ref: H04L67/104)| | protocols for client-server architectures | (ref: H04L67/42)| | allocation of processing resources to service requests in a distributed system | (ref: G06F9/5027)| | rebalancing the processing load in a distributed system | (ref: G06F9/5083)| | wireless network traffic load balancing | (ref: H04W28/08)| | network load balancing  traffic engineering | (ref: H04L47/125)| | video servers using load balancing strategies | (ref: H04N21/23103)|1.428
H04L67/143provided for session termination  e.g.  event controlled end of session1.427
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence1.427
H04W76/14Direct-mode setup1.426
H04L12/413with random access  e.g. carrier-sense multiple-access with collision detection (CSMA-CD)1.426
G06F21/575Secure boot1.425
G06Q30/0609Buyer or seller confidence or verification1.424
G06Q20/02involving a neutral party  e.g. certification authority  notary or trusted third party [TTP]1.422
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)1.421
H04L43/14using software  i.e. software packages | network security related monitoring | (ref: H04L63/1408)1.421
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB1.421
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)1.420
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds1.420
H04L45/20Hop count for routing purposes  e.g. TTL1.420
H04W40/246Connectivity information discovery1.420
H04L67/104for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer  upload  download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r1.420
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL1.419
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways1.419
G06F3/0482interaction with lists of selectable items  e.g. menus1.416
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems1.416
G06F21/36by graphic or iconic representation1.415
G06F21/31User authentication1.415
G06F9/541via adapters  e.g. between incompatible applications1.414
H04W48/14using user query | or user detection1.413
H04W4/50Service provisioning or reconfiguring1.413
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms1.410
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)1.407
G06F8/656while running1.407
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC1.407
G05B19/4155characterised by programme execution  i.e. part programme or machine function execution  e.g. selection of a programme1.406
G06Q40/08Insurance  e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10)1.406
G06Q20/405Establishing or using transaction specific rules1.405
H04W48/18Selecting a network or a communication service1.405
H04L63/1458Denial of Service1.405
H04L9/06the encryption apparatus using shift registers or memories for block-wise | or stream|  coding  e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators1.403
H04L61/301Name conversion1.402
H04M15/51for resellers  retailers or service providers1.402
G06Q20/3567Software being in the reader1.401
H04L67/1051Group master selection mechanisms1.399
G06Q20/065using e-cash1.399
G06Q20/20Point-of-sale [POS] network systems | POS | per se|  | (ref: G07F)|  or | (ref: G07G)1.398
H04R25/558Remote control  e.g. of amplification  frequency | remote control of amplifications  tone  or bandwidth | (ref: H03G1/02)| | remote control  e.g. for Hi-Fi systems or audio/video combinations | (ref: H04B1/202)| | remote control in general | (ref: G05F)1.397
H04R25/50Customised settings for obtaining desired overall acoustical characteristics1.397
H04W4/08User group management1.397
H04W40/12based on transmission quality or channel quality1.395
H04W8/26Network addressing or numbering for mobility support1.394
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.394
H04W16/10Dynamic resource partitioning1.392
H04W36/0072of resource information of target access point1.392
G05B23/0213Modular or universal configuration of the monitoring system  e.g. monitoring system having modules that may be combined to build monitoring program| monitoring system that can be applied to legacy systems| adaptable monitoring system| using different communication protocols1.392
G05B19/042using digital processors | (ref: G05B19/05)|  takes precedence1.392
H04L9/0872using geo-location information  e.g. location data  time  relative position or proximity to other entities1.391
H04L45/308Route determination based on user's profile  e.g. premium users1.391
H04W40/34Modification of an existing route1.391
G06F9/452Remote windowing  e.g. X-Window System  desktop virtualisation | protocols for telewriting | (ref: H04L67/38)1.389
H04L67/2823for conversion or adaptation of application content or format | message adaptation based on network or terminal capabilities | (ref: H04L51/06)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)| | optimising visualization of content for web browsing | (ref: G06F17/30905)1.389
H04L41/0893Assignment of logical groupings to network elements| Policy based network management or configuration1.389
G06Q20/4014Identity check for transaction1.385
G06Q20/363with the personal data files for a user1.385
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)1.385
H04L67/42Protocols for client-server architectures | access to replicated servers | (ref: H04L67/1002)1.385
H04L69/24Negotiation of communication capabilities1.384
H04W36/00837Determination of triggering parameters for hand-off1.383
H04W40/22using selective relaying for reaching a BTS [Base Transceiver Station] or an access point1.383
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]1.382
H04W76/50for emergency connections1.382
H04W40/248Connectivity information update1.380
G05B15/02electric1.376
H04W16/28using beam steering1.374
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)1.373
G06F11/0796Safety measures  i.e. ensuring safe condition in the event of error  e.g. for controlling element1.372
H04L69/40Techniques for recovering from a failure of a protocol instance or entity  e.g. failover routines  service redundancy protocols  protocol state redundancy or protocol service redirection in case of a failure or disaster recovery | network fault management | (ref: H04L41/06)| | route fault recovery in network routing | (ref: H04L45/28)| | fault recovery in packet switches | (ref: H04L49/557)| | reactions to failures of replicated servers by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | intermediate processing of oper1.372
H04L45/42Centralized routing1.370
H04W40/16based on interference1.369
H04W40/125using a measured number of retransmissions as a link metric1.369
H04W16/02Resource partitioning among network components  e.g. reuse partitioning1.369
G16H10/60for patient-specific data  e.g. for electronic patient records1.368
G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data | for medical reports | (ref: G16H15/00)| | for therapies or health-improving plans | (ref: G16H20/00)| | for the handling or processing of medical images | (ref: G16H30/00)1.368
H04W8/18Processing of user or subscriber data  e.g. subscribed services  user preferences or user profiles| Transfer of user or subscriber data1.368
H04W4/38for collecting sensor information1.366
H04W56/0015one node acting as a reference for the others1.366
H04L45/24Multipath1.366
H04W28/08Load balancing or load distribution1.365
G06F21/6263during internet communication  e.g. revealing personal data from cookies1.365
G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction1.365
H04L45/22Alternate routing1.365
G06Q30/0207Discounts or incentives  e.g. coupons  rebates  offers or upsales1.364
G06Q20/3827Use of message hashing1.364
H04L47/825Involving tunnels  e.g. MPLS1.364
H04B7/026Co-operative diversity  e.g. using fixed or mobile stations as relays1.362
H04L25/0224using sounding signals1.362
H04L9/0855involving additional nodes  e.g. quantum relays  repeaters  intermediate nodes or remote nodes1.361
H04W28/06Optimizing | the usage of the radio link|   e.g. header compression  information sizing |   discarding information | system modifying transmission characteristic according to link quality by modifying frame length | (ref: H04L1/0007)| | dynamic adaptation of the packet size for flow control or congestion control | (ref: H04L47/365)1.361
H04L43/0888Throughput1.359
H04W8/22Processing or transfer of terminal data  e.g. status or physical capabilities1.356
H04W8/24Transfer of terminal data1.356
G06F21/604Tools and structures for managing or administering access control systems1.355
H04L9/3236using cryptographic hash functions1.355
H04L41/14involving network analysis or design  e.g. simulation  network model or planning | network monitoring | (ref: H04L43/00)1.354
H04L41/142using statistical or mathematical methods1.354
G06F9/5072Grid computing1.353
H04W76/12Setup of transport tunnels1.352
G06F21/305by remotely controlling device operation1.352
H04W24/00Supervisory  monitoring or testing arrangements1.351
H04W76/18Management of setup rejection or failure1.351
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences1.350
H04W72/0426between access points1.347
H04W72/048where an allocation plan is defined based on terminal or device properties1.347
H04L69/327in the session layer  i.e. layer five | session initiation protocol | (ref: H04L65/1006)| | session control in real time communications | (ref: H04L65/1066)| | arrangements for session management | (ref: H04L67/14)1.345
H04W36/0077of access information of target access point1.345
G06F21/552involving long-term monitoring or reporting1.343
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes1.343
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones1.343
H04B7/024Co-operative use of antennas of several sites  e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems1.343
G06Q20/3224Transactions dependent on location of M-devices1.342
H04L9/0858Details about key distillation or coding  e.g. reconciliation  error correction  privacy amplification  polarisation coding or phase coding1.342
H04L43/087Jitter1.342
H04L43/0876Network utilization1.342
G06F21/16Program or content traceability  e.g. by watermarking | digital watermarking on images | (ref: H04N1/32)1.342
G09C5/00Ciphering apparatus or methods not provided for in the preceding groups  e.g. involving the concealment or deformation of graphic data such as designs  written or printed messages1.342
G06F8/61Installation1.340
G06F9/5055considering software capabilities  i.e. software resources associated or available to the machine1.340
H04L47/193at transport layer  e.g. TCP related1.339
H04L43/04Processing of captured monitoring data1.337
G10L17/00Speaker identification or verification1.337
G10L17/04Training  enrolment or model building1.337
H04W76/27Transitions between radio resource control [RRC] states1.334
H04L63/0263Rule management1.332
H04W36/32by location or mobility data  e.g. speed data1.332
H04W60/005Multiple registrations  e.g. multihoming1.331
H04W8/02Processing of mobility data  e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]| Transfer of mobility data  e.g. between HLR  VLR or external networks1.331
H04N21/4307Synchronizing display of multiple content streams  e.g. synchronisation of audio and video output or enabling or disabling interactive icons for a given period of time1.331
H04L9/3218using proof of knowledge  e.g. Fiat-Shamir  GQ  Schnorr  ornon-interactive zero-knowledge proofs1.329
H04L43/0811Connectivity1.329
G06F9/4856resumption being on a different machine  e.g. task migration  virtual machine migration | (ref: G06F9/5088)|  takes precedence1.328
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)1.327
H04L67/32for scheduling or organising the servicing of application requests  e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources | computer conference arrangements | (ref: H04L12/1813)| | broadcast or conference with schedule organisation | (ref: H04L12/1881)| | network service management  ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | intermediate grouping or aggregating of service requests | (ref: H04L67/2833)1.326
H04W40/02Communication route or path selection  e.g. power-based or shortest path routing1.325
G06Q20/4016involving fraud or risk level assessment in transaction processing1.325
H04W36/0016for hand-off preparation1.325
G06Q20/1085involving automatic teller machines [ATMs]1.322
H04L63/14for detecting or protecting against malicious traffic1.320
H04L41/082due to updating or upgrading of network functionality  e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02)1.320
H04W72/0453the resource being a frequency  carrier or frequency band1.318
H04L5/0091Signaling for the administration of the divided path1.318
H04N21/4181for conditional access1.318
H04N21/63345by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | arrangements for network security key management | (ref: H04L29/06707)1.318
H04L9/003for power analysis  e.g. differential power analysis [DPA] or simple power analysis [SPA]1.316
G06F9/5061Partitioning or combining of resources1.316
G06F9/5005to service a request1.316
H04W4/12Messaging| Mailboxes| Announcements1.315
H04W4/16Communication-related supplementary services  e.g. call-transfer or call-hold1.315
H04L47/10Flow control or congestion control1.315
H04L5/0032Distributed allocation  i.e. involving a plurality of allocating devices  each making partial allocation1.314
G07C9/00174Electronically operated locks| Circuits therefor| Nonmechanical keys therefor  e.g. passive or active electrical keys or other data carriers without mechanical keys | mechanical locks with electric permutation | (ref: E05B49/00)| | arrangements for sensing or reading record carriers | (ref: G06K7/00)|   | (ref: G06K9/00)| | electronic switching | (ref: H03K17/00)1.314
H04W88/16Gateway arrangements1.314
H04W92/02Inter-networking arrangements1.314
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)1.314
H04L65/4076Multicast or broadcast | data switching systems for broadcast or conference | (ref: H04L12/18)| | analog television systems in general | (ref: H04N7/00)| | creating video channels for a dedicated end-user group | (ref: H04N21/2668)| | arrangements for broadcast or distribution combined with broadcast | (ref: H04H20/00)| | arrangements for broadcast applications with a direct linkage of broadcast information | (ref: H04H60/00)| | arrangements for push based network services | (ref: H04L67/26)1.312
H04K3/42characterized by the control of the jamming frequency or wavelength1.311
H04W8/12between location registers or mobility servers1.310
B60R25/307using data concerning maintenance or configuration1.310
H04W56/002Mutual synchronization1.309
H04L7/005Correction by an elastic buffer1.309
H04N7/147Communication arrangements  e.g. identifying the communication as a video-communication  intermediate storage of the signals | selecting | (ref: H04Q)1.309
H04L65/403Arrangements for multiparty communication  e.g. conference | television conferencing systems | (ref: H04N7/15)| | telephonic conference systems | (ref: H04M3/56)| | data switching systems for computer conference | (ref: H04L12/1813)1.309
H04M3/382using authorisation codes or passwords1.309
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks1.309
H04N21/441Acquiring end-user identification | authentication in wireless communication networks | (ref: H04W12/06)| e.g. using personal code sent by the remote control or by inserting a card | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)1.309
H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card | arrangements for secret or secure communication | (ref: H04L9/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)|  | | security arrangements in wireless networks | (ref: H04W12/00)1.309
H04W36/12Reselecting a serving backbone network switching or routing node1.308
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals1.307
H04L65/4084Content on demand | analog television systems using two way working | (ref: H04N7/173)| | end-user applications for requesting content  additional data or services | (ref: H04N21/472)1.307
H04W88/04adapted for relaying to or from another terminal or user1.306
H04B7/15507Relay station based processing for cell extension or control of coverage area  | network planning with network coordinated processing with regard to cell extension | (ref: H04W16/26)| | network topologies using dedicated repeater stations | (ref: H04W84/047)| | terminal devices adapted for relaying to or from an other terminal | (ref: H04W88/04)1.306
H04W36/0069in case of dual connectivity  e.g. CoMP  decoupled uplink/downlink or carrier aggregation | allocation of physical resources in CoMP or in carrier aggregation | (ref: H04L5/0035)1.305
H04L5/0073Allocation arrangements that take into account other cell interferences | for intercell interference mitigation or co-ordination in orthogonal multiplex systems | (ref: H04J11/005)1.305
H04W76/22Manipulation of transport tunnels1.305
H04M15/66Policy and charging system1.305
H04W36/0033with transfer of context information1.305
H04W36/0055Transmission and use of information for re-establishing the radio link1.302
H04W28/0268using specific QoS parameters for wireless networks  e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR] | negotiating SLA or negotiating QoS | (ref: H04W28/24)1.302
B60R25/25using biometry1.301
B60R25/252Fingerprint recognition1.301
G06Q30/0246Traffic1.301
H04J13/0022PN  e.g. Kronecker1.301
H04B15/00Suppression or limitation of noise or interference | by means associated with receiver | (ref: H04B1/10)1.301
H04W74/006in the downlink  i.e. towards the terminal1.301
G06F21/72in cryptographic circuits1.301
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment1.299
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode1.297
H04L41/0866Checking configuration1.297
H04W28/0263involving mapping traffic to individual bearers or channels  e.g. traffic flow template [TFT]1.296
H04W72/0406involving control information exchange between nodes1.296
H04W36/0079in case of hand-off failure or rejection1.296
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use1.296
H04L41/0659by isolating the faulty entity1.294
G06F9/542Event management| Broadcasting| Multicasting| Notifications1.294
H04L45/742Route cache and its operation1.293
H04L45/745Address table lookup or address filtering1.293
H04L29/12839Layer 2 addresses  e.g. Medium Access Control [MAC] addresses1.293
H04W68/02Arrangements for increasing efficiency of notification or paging channel1.293
H04W68/005Transmission of information for alerting of incoming communication1.293
H04L47/808User-type aware1.292
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)1.291
H04L41/22using GUI [Graphical User Interface]1.290
H04L12/283Processing of data at an internetworking point of a home automation network1.290
G06F3/04817using icons | graphical programming languages using iconic symbols | (ref: G06F8/34)1.289
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance1.289
H04W76/16Involving different core network technologies  e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer1.289
H04L1/22using redundant apparatus to increase reliability | see|  | (ref: G06F11/08)|  - | (ref: G06F11/20)1.289
H04W24/04Arrangements for maintaining operational condition1.289
G06F21/35communicating wirelessly1.289
G06F21/81by operating on the power supply  e.g. enabling or disabling power-on  sleep or resume operations1.287
H04L12/2834Switching of information between an external network and a home network | access arrangements | (ref: H04L12/2856)1.286
H04L49/70Virtual switches1.284
H04W4/14Short messaging services  e.g. short message services [SMS] or unstructured supplementary service data [USSD]1.284
G06Q20/0655e-cash managed centrally1.284
H04L45/48Routing tree calculation1.283
G06Q10/02Reservations  e.g. for tickets  services or events1.283
G06Q50/14Travel agencies1.283
H04W36/0027for a plurality of sessions or connections  e.g. multi-call  multi-bearer connections1.282
H04N1/00307with a mobile telephone apparatus | constructional features of portable telephone sets | (ref: H04M1/0202)| | mobile radio systems | (ref: H04W84/00)1.282
H04L63/168above the transport layer1.282
H04L45/18Loop free1.281
H04B7/15528Control of operation parameters of a relay station to exploit the physical medium1.280
H04L47/12Congestion avoidance or recovery1.280
H04W24/10Scheduling measurement reports | | Arrangements for measurement reports1.280
H04W40/32for defining a routing cluster membership1.280
H04W28/0278using buffer status reports | dynamic wireless traffic scheduling definition | (ref: H04W72/1205)1.280
H04W72/1284in the uplink  i.e. from terminal to network1.280
H04W72/0446the resource being a slot  sub-slot or frame1.278
D21H23/04Addition to the pulp| After-treatment of added substances in the pulp1.278
H04L29/12264involving the solving of address allocation conflicts| involving testing of addresses1.278
H04L65/1069Setup | computer conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources or notifying involved parties | (ref: H04L12/1818)| | admission control or resource reservation in packet switching networks | (ref: H04L47/70)| | arrangements for peer-to-peer networking in network applications | (ref: H04L67/104)| | session management in network applications | (ref: H04L67/14)| | negotiation of communication capabilities | (ref: H04L69/24)1.277
H04L65/1006SIP1.277
H04W36/0022for transferring sessions between adjacent core network technologies1.276
H04W64/003locating network equipment1.276
H04W64/00Locating users or terminals | or network equipment|  for network management purposes  e.g. mobility management1.276
H04W64/006with additional information processing  e.g. for direction or speed determination1.273
H04B17/29Performance testing1.272
H04L45/34Source routing1.271
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)1.271
G11C16/0483comprising cells having several storage transistors connected in series1.270
G06F21/79in semiconductor storage media  e.g. directly-addressable memories1.270
G06F13/4282on a serial bus  e.g. I2C bus  SPI bus | on daisy chain buses | (ref: G06F13/4247)1.269
B42D25/24Passports1.269
H04W60/04using triggered events1.269
H04W72/04Wireless resource allocation1.268
H04B7/088using beam selection1.268
H04B7/15592Adapting at the relay station communication parameters for supporting cooperative relaying  i.e. transmission of the same data via direct - and relayed path | cooperative diversity | (ref: H04B7/024)1.268
H04B7/155Ground-based stations | (ref: H04B7/204)|  takes precedence | | for satellite systems | (ref: H04B7/18517)1.268
H04W74/04Scheduled | or contention-free|  access1.268
H04W68/00Notification of users  e.g. alerting for incoming communication or change of service1.268
H04W72/1242based on precedence or priority of the traffic information1.268
G06Q30/018Business or product certification or verification1.267
G06F12/023Free address space management1.266
G06F9/30036Instructions to perform operations on packed data  e.g. vector operations1.266
G06Q30/06Buying  selling or leasing transactions1.264
G06F9/5077Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455)1.264
G06T11/002D [Two Dimensional] image generation1.263
H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom1.262
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks1.262
H04W88/085Access point devices with remote components1.261
G06F3/0622in relation to access1.261
G06N3/08Learning methods1.259
G06N3/10Simulation on general purpose computers1.259
H04W36/18for allowing seamless reselection  e.g. soft reselection1.259
H04W36/0005Control or signalling for completing the hand-off1.257
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks1.257
H04W92/14between access point controllers and backbone network device1.257
H04W28/26Resource reservation1.257
H04L5/0092Indication of how the channel is divided1.256
H04L67/22Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)| | e-commerce | (ref: G06Q30/00)1.256
H04W56/0045compensating for timing error by altering transmission time1.255
H04L7/033using the transitions of the received signal to control the phase of the synchronising-signal-generating means  e.g. using a phase-locked loop1.255
G16H10/20for electronic clinical trials or questionnaires1.254
G16H30/40for processing medical images  e.g. editing1.254
H04W74/0808using carrier sensing  e.g. as in CSMA1.254
H04L45/122Minimizing distance  e.g. ? number of hops1.254
H04L45/38Flow based routing1.254
H04L41/0816due to adaptation  e.g. in response to network events1.254
H04W76/23Manipulation of direct-mode connections1.253
H04B17/318Received signal strength1.252
H04W36/10Reselecting an access point controller1.252
H04W8/30Network data restoration| | Network data reliability| Network data fault tolerance1.252
H04L65/105Proxies  e.g. SIP proxies1.252
H04L5/0007the frequencies being orthogonal  e.g. OFDM(A)  DMT1.252
H04W72/1273of downlink data flows1.252
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements1.251
H04L9/3073involving pairings  e.g. identity based encryption [IBE]  bilinear mappings or bilinear pairings  e.g. Weil or Tate pairing1.251
H04L9/3093involving Lattices or polynomial equations  e.g. NTRU scheme1.251
H04N21/6334for authorisation  e.g. by transmitting a key | arrangements for secret or secure communication | (ref: H04L9/00)|  | | wireless communications network key management | (ref: H04W12/04)| | wireless communications network access security | (ref: H04W12/08)1.251
H04N21/85406involving a specific file format  e.g. MP4 format1.251
H04W36/0011for data session or connection1.250
H04L41/0813Changing of configuration1.250
H04W8/16selectively restricting mobility | data|  tracking1.250
H04L65/80QoS aspects | monitoring of the downstream path of a video distribution network | (ref: H04N21/2402)|   | (ref: H04N21/44209)| | network service management  ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer | (ref: H04L41/50)| | monitoring arrangements  testing arrangements  with monitoring of QoS metrics | (ref: H04L43/08)| | traffic-type related flow control in packet switching networks  e.g. priorities or QoS | (ref: H04L47/24)| | admission control/resource reservation in packet switching networks based 1.249
H04L9/0618Block ciphers  i.e. encrypting groups of characters of a plain text message using fixed encryption transformation1.248
H04W84/12WLAN [Wireless Local Area Networks]1.248
H04W28/16Central resource management| Negotiation of resources | or communication parameters|   e.g. negotiating bandwidth or QoS [Quality of Service]1.248
H04W72/1278Transmission of control information for scheduling1.248
G06Q10/087Inventory or stock management  e.g. order filling  procurement  balancing against orders1.248
H04W52/243taking into account interferences1.247
H04L5/005of common pilots  i.e. pilots destined for multiple users or terminals1.247
G02B27/017Head mounted1.246
G02B27/0093with means for monitoring data relating to the user  e.g. head-tracking  eye-tracking1.246
H04W4/025using location based information parameters1.246
H04L43/10using active monitoring  e.g. heartbeat protocols  polling  ping  trace-route1.245
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)1.245
G06Q20/3274using a pictured code  e.g. barcode or QR-code  being displayed on the M-device1.245
H04L51/24with notification on incoming messages1.244
H04L51/14with selective forwarding1.244
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor1.244
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling1.243
H04W4/24Accounting or billing1.243
H04W52/0238where the received signal is an unwanted signal  e.g. interference or idle signal1.243
G01S13/56for presence detection | presence detection using near field arrangements | (ref: G01V3/00)|   e.g. | (ref: G01V3/08)|   | (ref: G01V3/12)| | burglar  theft or intruder alarms with electrical actuation | (ref: G08B13/22)|  - | (ref: G08B13/26)1.243
G06F11/3684for test design  e.g. generating new test cases1.242
G06F3/0238Programmable keyboards | key guide holders | (ref: G06F3/0224)1.242
H04L12/185with management of multicast group membership1.241
H04L61/2015using the dynamic host configuration protocol [DHCP] or variants1.241
H04L61/2053involving timing or renewal aspects1.241
H04W36/305Reselection due to radio link failure | control signalling for hand-off failure | (ref: H04W36/0079)1.241
H04W76/40for selective distribution or broadcast1.241
H04L67/1021based on client or server locations1.240
G06F21/561Virus type analysis1.240
H04L65/1016IMS | wireless communication networks | (ref: H04W)1.240
H04W28/0289Congestion control | performing reselection for handling the traffic | (ref: H04W36/22)| | load shedding arrangements in network planning | (ref: H04W16/08)| | dynamic wireless traffic scheduling | (ref: H04W72/12)1.239
H04W48/12using downlink control channel1.239
H04W8/06Registration at serving network Location Register  VLR or user mobility server1.239
H04L1/1887Scheduling and prioritising arrangements1.239
H04L1/1867Arrangements specific to the transmitter end1.239
B60R25/2018Central base unlocks or authorises unlocking1.239
H04W72/042in downlink direction of a wireless link  i.e. towards terminal1.239
H04N7/15Conference systems | video terminal details | (ref: H04N7/141)|  | telephonic conference arrangements | (ref: H04M3/56)| | | computer conferencing | (ref: H04L12/1813)1.237
H04L67/303Terminal profiles1.237
H04L9/0852Quantum cryptography | transmission systems employing electromagnetic waves other than radio waves  e.g. light  infra-red | (ref: H04B10/00)| | wavelength-division multiplex systems | (ref: H04J14/02)1.236
H04W8/205Transfer to or from user equipment or user record carrier1.235
H04W8/20Transfer of user or subscriber data1.235
H04L41/12network topology discovery or management | topology discovery for routing | (ref: H04L45/02)1.235
H04L12/4604LAN interconnection over a backbone network  e.g. Internet  Frame Relay1.235
G06F3/062Securing storage systems1.235
G06F21/55Detecting local intrusion or implementing counter-measures1.235
H04L47/80Actions related to the nature of the flow or the user1.235
H04W28/24Negotiating SLA [Service Level Agreement]| Negotiating QoS [Quality of Service]1.234
H04L41/0886Fully automatic configuration1.234
H04B17/11for calibration1.234
G08B13/187by interference of a radiation field1.234
H04W74/085collision avoidance1.234
G06Q20/10specially adapted for electronic funds transfer [EFT] systems| specially adapted for home banking systems1.234
H04W8/005Discovery of network devices  e.g. terminals1.234
H04L12/14Metering |  charging | or billing|  arrangements | specially adapted for data wireline or wireless communications | payment schemes  architectures or protocols | per se|  | (ref: G06Q20/00)1.234
H04L49/9057Arrangements for supporting packet reassembly or resequencing1.233
A61B17/7064Devices acting on  attached to  or simulating the effect of  vertebral facets| Tools therefor1.233
H04L25/4908using mBnB codes1.233
H02J50/80involving the exchange of data  concerning supply or distribution of electric power  between transmitting devices and receiving devices1.233
H04B5/0037for power transfer1.233
G06F9/546Message passing systems or structures  e.g. queues1.232
H04L9/065Encryption by serially and continuously modifying data stream elements  e.g. stream cipher systems  RC4  SEAL or A5/31.231
H04L5/0044allocation of payload1.231
H04L43/50Testing arrangements1.230
H04L41/5009Determining service level performance  e.g. measuring SLA quality parameters  determining contract or guarantee violations  response time or mean time between failure [MTBF] | monitoring performance metrics on a simple network level | (ref: H04L43/08)1.230
H04L67/101based on network conditions1.230
H04L45/121Minimizing delay1.230
H04L67/322whereby quality of service [QoS] or priority requirements are taken into account | monitoring of QoS metrics | (ref: H04L43/08)| | QoS aspects in real-time communications | (ref: H04L65/80)1.230
H04W74/08Non-scheduled | or contention based|  access  e.g. random access  ALOHA  CSMA [Carrier Sense Multiple Access]1.229
H04W74/0841with collision treatment1.229
G06F21/629to features or functions of an application1.228
H04W72/1268of uplink data flows1.226
H04W72/14using a grant | or specific|  channel1.225
H04W76/38triggered by timers1.225
H04B7/18541for handover of resources1.224
H04W56/006using known positions of transmitter and receiver1.224
H04B7/2606Arrangements for base station coverage control  e.g. by using relays in tunnels1.224
H04N19/467characterised by the embedded information being invisible  e.g. watermarking1.224
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme1.224
H04L47/34Sequence integrity  e.g. sequence numbers1.223
H04L1/1671the supervisory signal being transmitted together with control information1.223
H04L63/162at the data link layer1.223
H04L47/782Hierarchical allocation of resource  e.g. involving a hierarchy of local and centralized entities1.222
H04L12/18for broadcast or conference |   e.g. multicast | multicast or broadcast switches | (ref: H04L49/201)1.221
H04L45/741Routing in networks with a plurality of addressing schemes  e.g. IPv4 and IPv61.221
H04W72/1205Schedule definition  set-up or creation1.220
G06F3/017Gesture based interaction  e.g. based on a set of recognized hand gestures | interaction based on gestures traced on a digitiser | (ref: G06F3/04883)1.220
G06F3/0346with detection of the device orientation or free movement in a 3D space  e.g. 3D mice  6-DOF [six degrees of freedom] pointers using gyroscopes  accelerometers or tilt-sensors1.220
G06Q20/42Confirmation  e.g. check or permission by the legal debtor of payment1.220
H04L45/74Address processing for routing1.219
H04L41/0823Configuration optimization1.219
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)1.217
G06Q20/3278RFID or NFC payments by means of M-devices1.217
G06Q20/351Virtual cards1.217
G06Q30/0215Including financial accounts1.216
H04W72/0413in uplink direction of a wireless link  i.e. towards network1.216
H04L5/0053Allocation of signaling  i.e. of overhead other than pilot signals1.216
H04L67/24Presence management | use and manipulation of presence information in instant messaging | (ref: H04L51/043)1.216
H04L43/022using sampling of monitoring data  i.e. storing only a selection of packets1.215
G06F21/554involving event detection and direct action1.215
H04W28/22Negotiating communication rate1.215
H04L9/16the keys or algorithms being changed during operation1.198
G06Q20/3227Use of a security embedded in M-devices0.753
H04L41/0809Plug-and-play configuration0.745
H04L9/3013involving the discrete logarithm problem  e.g. ElGamal or Diffie-Hellman systems0.745
H04B1/3816Mechanical arrangements for accommodating identification devices  e.g. cards or chips| with connectors for programming identification devices0.731
G08B13/196using television cameras | recognition of scenes under surveillance | (ref: G06K9/00771)| | image analysis | per se|  | (ref: G06T7/00)| | television cameras | (ref: H04N5/225)| | CCTV systems | (ref: H04N7/18)0.726
G08B13/19667Details realated to data compression  encryption or encoding  e.g. resolution modes for reducing data volume to lower transmission bandwidth or memory requirements0.726
H04B10/116Visible light communication0.723
G06Q20/4097Mutual authentication between card and transaction partners0.723
G06Q20/40975Use of encryption for mutual authentication0.723
G06Q20/38Payment protocols| Details thereof0.718
H04B5/0075using inductive coupling | transformers or inductances adapted for inductive coupling | (ref: H01F38/14)0.715
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.715
G06Q20/409Card specific authentication in transaction processing0.715
G07F7/122Online card verification0.715
G06F21/77in smart cards0.715
G06Q20/32using wireless devices0.715
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists0.715
G06Q20/3563Software being resident on card0.715
G06Q20/227characterized in that multiple accounts are available to the payer0.715
H04B5/0056for use in interrogation  identification or read/write systems | record carriers | (ref: G06K7/00)|   | (ref: G06K19/00)| | for railways | (ref: B61L3/12)0.715
G06Q20/108Remote banking  e.g. home banking0.715
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)0.715
G06Q20/204comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit0.715
G06Q20/382insuring higher security of transaction0.715
G06Q20/3552Downloading or loading of personalisation data0.715
H04L9/0625with splitting of the data block into left and right halves  e.g. Feistel based algorithms  DES  FEAL  IDEA or KASUMI0.715
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.699
H04L29/06802using an additional device  e.g. smartcard  SIM0.691
H04L29/06782Passwords0.691
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)0.683
G07F17/3244Payment aspects of a gaming system  e.g. payment schemes  setting payout ratio  bonus or consolation prizes0.681
G07F17/3225Data transfer within a gaming system  e.g. data sent between gaming machines and users0.681
G07F17/3241Security aspects of a gaming system  e.g. detecting cheating  device integrity  surveillance | computer security | (ref: G06F21/00)0.681
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals0.681
G06Q20/3415Cards acting autonomously as pay-media0.681
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system0.681
H04W12/00Security arrangements  e.g. access security or fraud detection| Authentication  e.g. verifying user identity or authorisation| Protecting privacy or anonymity0.681
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords0.675
H04L63/0838using one-time-passwords0.675
G06Q20/356Aspects of software for card payments0.671
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip0.671
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)0.665
G01S13/765with exchange of information between interrogator and responder0.665
G01S13/0209Systems with very large relative bandwidth  i.e. larger than 10 %  e.g. baseband  pulse  carrier-free  ultrawideband0.665
H04W24/08Testing  | supervising or monitoring|  using real traffic0.663
H04L45/72Routing based on the source address0.659
H04L9/0662with particular pseudorandom sequence generator0.650
G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer  e.g. network details  transfer of information from host to ECR or from ECR to ECR0.649
G06Q20/3821Electronic credentials0.649
G06Q20/385Use of an alias or a single-use code0.649
G07F7/1091Use of an encrypted form of the PIN0.649
G06Q20/206comprising security or user identification provision  e.g. password entry0.649
G06Q20/027involving a payment switch or gateway0.649
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer0.648
H04L47/24depending on the type of traffic  e.g. priority or quality of service [QoS] | network arrangements for networked applications for scheduling or organising the servicing of application requests whereby quality of service or priority requirements are taken into account | (ref: H04L67/322)0.645
H04L9/302involving the integer factorization problem  e.g. RSA or quadratic sieve [QS] schemes0.644
H04L29/08702involving intermediate processing or storage in the network  e.g. proxy | billing provisions | (ref: H04L12/14)| | multimedia network architectures  gateways and control entities | (ref: H04L29/0621)| | multimedia handling  encoding and conversion | (ref: H04L29/06476)| | security provisions | (ref: H04L29/06551)| | addressing provisions | (ref: H04L29/12009)| | network management provisions | (ref: H04L41/00)| | monitoring provisions | (ref: H04L43/00)0.631
G06Q20/367involving intelligent token  e.g. electronic purse0.630
H04L29/08Transmission control procedure  e.g. data link level control procedure0.627
G06Q50/10Services0.627
H04L67/1076Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network0.627
G06F21/60Protecting data0.625
H04W48/10using broadcasted information0.623
H04W4/40for vehicles  e.g. vehicle-to-pedestrians [V2P]0.621
A63F13/355Performing operations on behalf of clients with restricted processing capabilities  e.g. servers transform changing game scene into an MPEG-stream for transmitting to a mobile phone or a thin client0.615
A63F13/87Communicating with other players during game play  e.g. by e-mail or chat0.615
A63F13/79involving player-related data  e.g. identities  accounts  preferences or play histories0.615
A63F13/71using secure communication between game devices and game servers  e.g. by encrypting game data or authenticating players0.615
H04L67/2842for storing data temporarily at an intermediate stage  e.g. caching | distributed storage of data in a network | (ref: H04L67/1097)| | browsing optimization of access to content by caching | (ref: G06F17/30902)| | addressing of a cache within a hierarchically structured memory system | (ref: G06F12/0802)| | disk caching | (ref: G06F12/0866)0.613
H04R25/70Adaptation of deaf aid to hearing loss  e.g. initial electronic fitting0.610
H03K19/177arranged in matrix form0.610
H04L1/0003by switching between different modulation schemes0.610
H04L1/1614using bitmaps0.610
H04L5/0055Physical resource allocation for ACK/NACK | for physical mapping arrangements in ARQ protocols | (ref: H04L1/1861)0.610
H04L61/6054International mobile subscriber identity [IMSI] numbers0.609
H04L41/00Arrangements for maintenance or administration or management of packet switching networks0.609
H04L69/03Protocol definition or specification | protocol conformance testing | (ref: H04L1/244)| | specification techniques | (ref: G06F8/10)0.609
H04L41/0654Network fault recovery | backup route selection | (ref: H04L45/22)| | route fault recovery | (ref: H04L45/28)| | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)0.609
G07F19/211Software architecture within ATMs or in relation to the ATM network0.609
G06Q20/353Payments by additional cards plugged into M-devices0.609
G06Q20/322Aspects of commerce using mobile devices [M-devices]0.609
G07F7/1041PIN input keyboard gets new key allocation at each use0.609
H04W88/02Terminal devices0.607
H04L43/065for device related reporting | reporting of sensed information of home appliances | (ref: H04L12/2803)0.607
H04L49/254Centralized controller  i.e. arbitration or scheduling0.607
H04L61/00Network arrangements or network protocols for addressing or naming0.607
H04W52/0212managed by the network  e.g. network or access point is master and terminal is slave0.607
H04L12/28characterised by path configuration  e.g. local area networks [LAN]  wide area networks [WAN]0.607
H04W52/383power control in peer-to-peer links0.607
G08B21/0415detecting absence of activity | per se0.607
H04L12/2814Exchanging control software or macros for controlling appliance services in a home automation network | arrangements for maintenance or administration involving configuration of the network and network elements | (ref: H04L41/08)0.607
H04L12/2803Home automation networks0.607
H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network | device-related reporting | (ref: H04L43/065)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom | (ref: H04Q9/00)0.607
H04L12/2827Reporting to a device within the home network| wherein the reception of the information reported automatically triggers the execution of a home appliance functionality0.607
H04W72/0493where an allocation plan is defined based on a resource usage policy0.607
H04L61/6059Internet protocol version 6 [IPv6] addresses0.607
G06F1/3287Power saving by switching off individual functional units in a computer system  i.e. selective power distribution0.602
G06F1/3209Monitoring remote activity  e.g. over telephone line  network connection0.602
G06Q20/388Mutual authentication without cards0.601
H04J3/0658Clock or time synchronisation among packet nodes0.600
G01S11/06using intensity measurements0.600
G01S5/14Determining absolute distances from a plurality of spaced points of known location0.600
G06Q20/00Payment architectures  schemes or protocols | apparatus for performing or posting payment transactions | (ref: G07F7/08)|   | (ref: G07F19/00)| | electronic cash registers | (ref: G07G1/12)0.600
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.600
G06Q20/29characterised by micropayments0.598
H04L9/3033details relating to pseudo-prime or prime number generation  e.g. primality test0.598
H04W76/25Maintenance of established connections0.594
G07F7/0833Card having specific functional components0.592
G06F21/755with measures against power attack0.592
H04L12/4666Operational details on the addition or the stripping of a tag in a frame  e.g. at a provider edge node0.591
H04L45/66Layer 2 routing  e.g. in Ethernet based MAN's0.591
H04L12/4645Details on frame tagging | routing of packets | (ref: H04L45/00)| | support for virtual LAN | (ref: H04L49/354)0.591
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)0.591
H04R25/00Deaf-aid sets | providing an auditory perception| Electric tinnitus maskers providing an auditory perception| constructions of transducers | per se|  | (ref: H04R9/00)|  - | (ref: H04R23/00)| | | non-electric hearing aids | (ref: A61F11/008)| | replacing direct auditory perception by another kind of perception | (ref: A61F11/04)| | electrical stimulation of auditory nerves to promote the auditory function | (ref: A61N1/36036)| | structural combination with spectacle frames | (ref: G02C11/06)| | processing of speech signals | (ref: G10L21/00)0.591
H04L49/3018Input queuing0.588
H04L47/22Traffic shaping0.588
H04L47/365Dynamic adaptation of the packet size0.588
H04L63/164at the network layer0.587
H04L61/6013Proxying of addresses0.586
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level0.586
G07F7/127in which both online and offline card verification can take place0.585
H04J3/0667Bidirectional timestamps  e.g. NTP or PTP for compensation of clock drift and for compensation of propagation delays | arrangements for monitoring round trip delays in packet switching networks | (ref: H04L43/0864)0.584
H04L67/40Protocols for remote procedure calls [RPC] | remote procedure calls | (ref: G06F9/547)0.582
G06F21/6281at program execution time  where the protection is within the operating system0.580
G06Q20/023characterized in that the neutral party is a clearing house0.580
G06Q20/3676Balancing accounts0.578
H04L61/2007internet protocol [IP] addresses0.575
G06F9/45558Hypervisor-specific management and integration aspects0.575
G06F11/2023Failover techniques0.575
G06Q20/0658e-cash managed locally0.575
H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP  | (ref: H04W80/04)0.574
H04L1/16in which the return channel carries supervisory signals  e.g. repetition request signals0.574
G06Q10/0631Resource planning  allocation or scheduling for a business operation0.574
H04N21/4408involving video stream encryption  e.g. re-encrypting a decrypted video stream for redistribution in a home network | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.574
H04N21/4331Caching operations  e.g. of an advertisement for later insertion during playback0.574
H04N21/8456by decomposing the content in the time domain  e.g. in time segments0.574
H04N21/436Interfacing a local distribution network  e.g. communicating with another STB  inside the home | | Interfacing an external card to be used in combination with the client device| arrangements specially adapted plural spots in a confined site in broadcast systems | (ref: H04H20/63)0.574
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.573
H04L61/1517using open systems interconnection [OSI] directories  i.e. X.5000.572
H04N21/26613for generating or managing keys in general | key distribution for secret or secure communication involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP] | (ref: H04L9/083)| | key management for security in wireless networks | (ref: H04L29/06707)| | key management for network security in communication control or processing | (ref: H04W12/04)0.571
H04N21/4623Processing of entitlement messages  e.g. Entitlement Control Message [ECM]  Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14)0.571
H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible | secret communication in general | (ref: H04K1/00)0.571
H04N21/26606for generating or managing entitlement messages  e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14)0.571
H04N21/4405involving video stream decryption | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.571
H04L67/2814for data redirection | load balancing of replicated servers | (ref: H04L67/1002)| | access network selection | (ref: H04L12/5691)| | routing or path finding of packets | (ref: H04L45/00)| | content or context based routing | (ref: H04L67/327)| | network addressing or naming provisions | (ref: H04L61/00)0.571
H04L67/1065Discovery involving distributed pre-established resource-based relationships among peers  e.g. based on distributed hash tables [DHT] | pre-configuration of logical or physical connections | (ref: H04L67/1053)0.570
H04L67/1019based on random server selection0.569
H04L67/1004Server selection in load balancing0.569
H04L67/1023based on other criteria  e.g. hash applied to IP address  specific algorithms or cost0.569
H04L67/1027Persistence of sessions during load balancing0.569
H04W88/06adapted for operation in multiple networks | or having at least two operational modes|   e.g. multi-mode terminals0.568
G06K7/1095the scanner comprising adaptations for scanning a record carrier that is displayed on a display-screen or the like0.567
G06T11/60Editing figures and text| Combining figures or text0.567
G06K7/14172D bar codes0.567
G06K19/06112the marking being simulated using a light source  e.g. a barcode shown on a display or a laser beam with time-varying intensity profile0.567
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)0.567
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals0.567
G07C9/00857where the code of the data carrier can be programmed0.566
G07C9/00309operated with bidirectional data transmission between data carrier and locks0.566
H04M15/8214Data or packet based0.566
H04M15/8055Selecting cheaper transport technology for a given service0.566
H04M15/8044Least cost routing0.566
H04M15/8228Session based0.566
H04M15/8038Roaming or handoff0.566
H04L67/2861for providing operational support to end devices by emulation  e.g. when they are unavailable  or by off-loading in the network | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)| | reactions to server failures by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | terminal emulation | (ref: H04L67/08)| | disconnected operation in file systems | (ref: G06F17/30067)| | emulation or software simulation | (ref: G06F9/455)| | input/output emulation function for peripheral devices | 0.564
H04L43/08Monitoring based on specific metrics0.563
H04W40/244using a network of reference devices  e.g. beaconing0.563
H04L41/0856by archiving or backing up configuration information0.563
H04L41/0663involving offline failover planning0.563
H04L12/2856Access arrangements  e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W)0.558
G01S19/10providing dedicated supplementary positioning signals0.558
H04W4/02Services making use of location information0.558
G01S5/02using radio waves | (ref: G01S19/00)|  takes precedence0.558
G01S19/48by combining or switching between position solutions derived from the satellite radio beacon positioning system and position solutions derived from a further system0.558
H04L69/14Multichannel or multilink protocols0.557
H04L49/25Routing or path finding through a switch fabric0.557
H04L49/356Storage area network switches0.557
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]0.557
H04L69/163Adaptation of TCP data exchange control procedures | generic OSI layer 4 protocols  e.g. SCTP | (ref: H04L69/326)| | TCP or UDP flow control procedures | (ref: H04L47/19)| | error control procedures in general | (ref: H04L1/18)0.556
H04W72/0433between access point and access point controlling device0.556
H04W72/10where an allocation plan is defined|  based on priority criteria0.556
G06Q20/327Short range or proximity payments by means of M-devices0.556
H04W76/34Selective release of ongoing connections0.555
H04L65/1063Application servers | systems providing special services to telephonic subscribers | (ref: H04M3/42)0.554
G06F21/75by inhibiting the analysis of circuitry or operation0.553
G06F21/54by adding security routines or objects to programs0.553
H04L49/351LAN switches  e.g. ethernet switches0.553
H04W72/085using measured or perceived quality0.553
H04W36/0094Definition of hand-off measurement parameters0.553
H04B7/1853Satellite systems for providing telephony service to a mobile station  i.e. mobile satellite service | for selecting | (ref: H04W)0.552
H04W36/245by historical data0.552
H04W84/06Airborne or Satellite Networks0.552
H04B7/18519Operations control  administration or maintenance0.552
H04M15/8083involving reduced rates or discounts  e.g. time-of-day reductions or volume discounts0.551
H04L67/142provided for managing session state for stateless protocols| Signalling a session state| State transitions| Keeping-state mechanisms0.550
H04L12/2807Exchanging configuration information on appliance services in a home automation network | adress allocation | (ref: H04L29/12207)| | arrangements for maintenance or administration involving network analysis for automatically determining the actual topology of a network | (ref: H04L41/12)| | hardware or software tools for network management using graphical user interfaces | (ref: H04L41/22)0.548
H04L49/20Support for services or operations0.548
H04L29/06characterised by a protocol0.548
H04L49/15Interconnection of switching modules0.548
H04L12/4625Single bridge functionality  e.g. connection of two networks over a single bridge0.548
H04L49/355Application aware switches  e.g. HTTP0.548
H04L61/2069for group-  multicast- and broadcast-communication | broadcast or conference | (ref: H04L12/18)0.548
H04L43/0805Availability0.548
H04L67/30involving profiles0.548
B41J29/38Drives  motors  controls or automatic cut-off devices for the entire printing mechanism0.548
B41J3/4075Tape printers| Label printers | tape cartridges | (ref: B41J15/044)0.548
G06F3/1222Increasing security of the print job0.548
G06F3/1288in client-server-printer device configuration0.548
G06F12/1458by checking the subject access rights0.548
H04L65/601Media manipulation  adaptation or conversion | computer conferences  network arrangements for conference optimisation or adaptation | (ref: H04L12/1827)| | flow control or congestion control in packet switching networks | (ref: H04L47/10)| | message switching systems  e.g. electronic mail systems  with message adaptation based on network or terminal capabilities | (ref: H04L51/06)| | adaptation for terminals or networks with limited resources or for terminal portability | (ref: H04L67/04)| | network application being adapted for the location of the user terminal | (ref: H04L67/18)| | involving0.548
H04W4/20Services signaling| Auxiliary data signalling  i.e. transmitting data via a non-traffic channel0.547
H04W72/005Resource management for broadcast services0.547
H04L67/2809for brokering | negotiation of communication capabilities | (ref: H04L69/24)| | e-commerce | (ref: G06Q30/00)0.547
G06N3/02using neural network models | for adaptive control | (ref: G05B13/00)| | for image pattern matching | (ref: G06K9/00)| | for image data processing | (ref: G06T1/20)| | for phonetic pattern matching | (ref: G10L15/16)0.547
G06F9/547Remote procedure calls [RPC]| Web services0.546
G06F9/4418Suspend and resume| Hibernate and awake0.546
G06F7/588Random number generators  i.e. based on natural stochastic processes0.546
G06F9/30029Logical and Boolean instructions  e.g. XOR  NOT0.546
H04M15/8016based on quality of service [QoS]0.544
H04L63/0245Filtering by information in the payload0.544
H04L41/50Network service management  i.e. ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer0.544
H04L12/1435volume-based0.544
H04L47/20Policing0.544
H04L63/0254Stateful filtering0.544
H04L12/1492negotiation of tariff0.544
G06K19/06037multi-dimensional coding0.544
H04W74/0833using a random access procedure0.543
H04W16/32Hierarchical cell structures0.542
H04W84/045using private Base Stations  e.g. femto Base Stations  home Node B0.542
G06Q30/0269based on user profile or attribute0.542
G06Q30/0251Targeted advertisement0.542
G06Q30/0201Market data gathering  market analysis or market modelling0.542
G06Q50/265Personal security  identity or safety0.542
G06Q30/0261based on user location0.542
G06F21/6236between heterogeneous systems0.542
G06Q20/4033Local solvency checks0.541
G06F9/543User-generated data transfer  e.g. clipboards  dynamic data exchange [DDE]  object linking and embedding [OLE]0.541
H04L41/0896Bandwidth or capacity management  i.e. automatically increasing or decreasing capacities  e.g. bandwidth on demand | reallocation of resources  renegotiation of resources  e.g. in-call | (ref: H04L47/76)0.540
H04L12/1428Invoice generation  e.g. customization  lay-out  database processing  algorithms for calculating the bill or formatting invoices as WWW pages | invoicing in general | (ref: G06Q30/04)0.539
G06Q30/0185Product  service or business identity fraud0.538
H04L12/1881with schedule organisation  e.g. priority  sequence management0.538
H04W8/265for initial activation of new user0.538
H04L45/28Route fault recovery | network fault recovery | (ref: H04L41/0654)0.537
G06Q10/083Shipping0.537
G06Q10/0831Overseas transactions0.537
G06F11/1004to protect a block of data words  e.g. CRC or checksum | (ref: G06F11/1076)|  takes precedence| security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.537
H04L1/0061Error detection codes0.537
H04L41/5096wherein the managed service relates to distributed or central networked applications | management of file systems | (ref: G06F17/30067)| | management of structured data stores | (ref: G06F17/30286)0.537
G06F12/1009using page tables  e.g. page table structures0.536
G06F3/0653Monitoring storage devices or systems0.536
G06F3/0679Non-volatile semiconductor memory device  e.g. flash memory  one time programmable memory [OTP]0.536
H04L67/145provided for avoiding end of session  e.g. keep-alive  heartbeats  resumption message  wake-up for inactive or interrupted session0.535
H04L67/306User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867)0.535
H04L12/42Loop networks0.535
H04L41/147for prediction of network behaviour0.535
H04L61/2038for local use  e.g. on local area networks [LAN] or on universal serial bus [USB] networks | bus addresses inside a computer | (ref: G06F13/42)0.535
H04L45/64using an overlay routing layer | Peer-to-Peer networks | (ref: H04L67/104)0.534
H04L51/28Details regarding addressing issues | arrangements and protocols for addressing and naming | (ref: H04L61/00)0.534
H04L51/30with reliability check  e.g. acknowledgments or fault reporting0.534
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)0.533
G08B13/19663Surveillance related processing done local to the camera0.533
G08B13/19686Interfaces masking personal details for privacy  e.g. blurring faces  vehicle license plates0.533
G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion0.533
H04L69/18Multi-protocol handler  e.g. single device capable of handling multiple protocols | multilayer or multiprotocol switches | (ref: H04L49/602)0.533
H04L51/38in combination with wireless systems | mobile application service signalling using messaging  e.g. SMS  | (ref: H04W4/12)0.533
H04W4/026using orientation information  e.g. compass0.533
G01S13/08Systems for measuring distance only | indirect measurement | (ref: G01S13/46)0.533
H04L67/1042involving topology management mechanisms0.533
H04L12/44Star or tree networks0.533
H04L61/6022Layer 2 addresses  e.g. medium access control [MAC] addresses0.532
H04L12/40006Architecture of a communication node | current supply arrangements | (ref: H04L12/10)| | intermediate storage or scheduling | (ref: H04L49/90)0.532
H04W88/18Service support| Network management devices0.532
H04L69/28Timer mechanisms used in protocols0.532
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)0.532
H04L67/20involving third party service providers | e-commerce | (ref: G06Q30/00)0.531
G06F3/0484for the control of specific functions or operations  e.g. selecting or manipulating an object or an image  setting a parameter value or selecting a range0.531
G06Q50/28Logistics  e.g. warehousing  loading  distribution or shipping0.530
G06Q30/0635Processing of requisition or of purchase orders0.530
G07F19/20Automatic teller machines [ATMs]0.530
G06F3/0485Scrolling or panning0.528
H04L69/321Aspects of inter-layer communication protocols or service data unit [SDU] definitions| Interfaces between layers0.528
G05B19/058Safety  monitoring0.528
G05B19/056Programming the PLC0.528
H04L41/5003Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]0.527
G06Q10/0838Historical data0.527
G06Q20/0855involving a third party0.527
G06Q30/0615Anonymizing0.527
H04L43/12using dedicated network monitoring probes0.527
H04L61/305containing special prefixes0.526
G06F8/60Software deployment0.526
H04W4/46for vehicle-to-vehicle communication [V2V]0.525
G06Q20/06Private payment circuits  e.g. involving electronic currency used among participants of a common payment scheme0.525
H04L67/1093Some peer nodes performing special functions0.525
H04L67/04adapted for terminals or networks with limited resources or for terminal portability  e.g. wireless application protocol [WAP] | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)0.525
G07F7/0886the card reader being portable for interacting with a POS or ECR in realizing a payment transaction0.524
H04R25/554using a wireless connection  e.g. between microphone and amplifier or using T-coils | near-field transmission in general | (ref: H04B5/00)0.524
H04R25/505using digital signal processing0.524
H04W40/10based on available power or energy0.523
H04W74/0858collision detection0.523
H04W74/002Transmission of channel access control information0.523
H04W76/20Manipulation of established connections0.523
G06F9/45533Hypervisors| Virtual machine monitors0.523
G06F9/4416Network booting| Remote initial program loading [RIPL]0.523
H04W36/00Hand-off or reselection arrangements0.522
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files0.522
H04L45/56Routing software0.521
G06F9/44526Plug-ins| Add-ons0.521
H04L61/2076involving update or notification mechanisms  e.g. update of a domain name server with dynamic host configuration protocol [DHCP] assigned addresses0.521
G06F21/88Detecting or preventing theft or loss0.520
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities0.520
G07F7/0866by active credit-cards adapted therefor | (ref: G07F7/1008)|  takes precedence0.520
G07F7/08by coded identity card or credit card | or other personal identification means | without personal verification means | (ref: G07F7/02)0.520
G07F7/0846On-card display means0.520
G07F7/10together with a coded signal |   e.g. in the form of personal identification information  like personal identification number [PIN] or biometric data0.520
H04L47/36Evaluation of the packet size  e.g. maximum transfer unit [MTU]0.519
H04W36/0058Transmission of hand-off measurement information  e.g. measurement reports0.519
H04L1/1896ARQ related signaling0.519
G07C9/00571operated by interacting with a central unit0.519
G07C9/00896specially adapted for particular uses0.519
G06F3/1423controlling a plurality of local displays  e.g. CRT and flat panel display0.519
H04L29/06401where at least one of the additional parallel sessions is real time or time sensitive  e.g. white board sharing  collaboration  spawning of a subconference | telewriting  virtual reality or network gaming | (ref: H04L29/06034)0.519
H04L12/1822Conducting the conference  e.g. admission  detection  selection or grouping of participants  correlating users to one or more conference sessions  prioritising transmission0.519
G06F3/1454involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays  e.g. teledisplay0.519
G06F9/453Help systems0.518
H04W80/02Data link layer protocols0.518
H04L41/0826for network cost reduction0.517
H04L9/0668producing a non-linear pseudorandom sequence0.517
H04W80/08Upper layer protocols | network arrangements or communication protocols for networked applications | (ref: H04L67/00)0.517
G06F12/123with age lists  e.g. queue  most recently used [MRU] list or least recently used [LRU] list0.516
H04L43/028using filtering | alarm or event filtering | (ref: H04L41/0604)0.516
H04W84/047using dedicated repeater stations0.516
H04W92/10between terminal device and access point  i.e. wireless air interface0.516
H04L69/326in the transport layer  i.e. layer four | TCP/IP | (ref: H04L69/16)| | streaming protocols  e.g. RTP  | (ref: H04L65/608)0.516
H04L29/08045Transport layer  i.e. layer four0.516
G06Q50/06Electricity  gas or water supply0.516
G01K17/06Measuring quantity of heat conveyed by flowing media  e.g. in heating systems | (ref: G01K17/02)|   | (ref: G01K17/04)|  take precedence| e.g. the quantity of heat in a transporting medium  delivered to or consumed in an expenditure device0.516
H04W84/042Public Land Mobile systems  e.g. cellular systems0.516
H04W60/02by periodical registration0.516
G11B20/00282the key being stored in the content area  e.g. program area  data area or user area | key stored in a management area | (ref: G11B20/00297)0.515
H04W72/046the resource being in the space domain  e.g. beams0.515
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]0.515
G06Q30/00Commerce  e.g. shopping or e-commerce0.514
G06F11/1425by reconfiguration of node membership0.514
G06F9/30134Register stacks| shift registers0.514
H04L45/306Route determination based on the nature of the carried application | communications protocols whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status | (ref: H04L67/327)0.514
H04L1/1607Details of the supervisory signal0.514
H04W72/087using requested quality0.514
A61B5/002Monitoring the patient using a local or closed circuit  e.g. in a room or building | (ref: A61B5/0017)|  takes precedence0.513
A61B5/1176Recognition of faces0.513
A61B5/0022Monitoring a patient using a global network  e.g. telephone networks  internet0.513
A61B5/6898Portable consumer electronic devices  e.g. music players  telephones  tablet computers0.513
A61B5/1172using fingerprinting0.513
G16H80/00ICT specially adapted for facilitating communication between medical practitioners or patients  e.g. for collaborative diagnosis  therapy or health monitoring0.513
G16H40/60for the operation of medical equipment or devices0.513
G16H10/65stored on portable record carriers  e.g. on smartcards  RFID tags or CD0.513
H04J3/0682by delay compensation  e.g. by compensation of propagation delay or variations thereof  by ranging0.512
H04L1/0072Error control for data other than payload data  e.g. control data0.512
H04L61/35involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address or functional addressing  i.e. assigning an address to a function0.512
G06F21/40by quorum  i.e. whereby two or more security principals are required0.512
H04L12/2854Wide area networks  e.g. public data networks0.512
H04W28/0247based on conditions of the access network or the infrastructure network | central resource management | (ref: H04W28/16)0.512
H04W76/00Connection management0.512
H04N21/2351involving encryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.512
H04N21/63775for uploading keys  e.g. for a client to communicate its public key to the server | arrangements for network security key management | (ref: H04L29/06707)0.512
G06Q30/0241Advertisement0.512
H04N21/2547Third Party Billing  e.g. billing of advertiser0.512
H04N21/812involving advertisement data | advertising | per se|  | (ref: G06Q30/02)0.512
G06Q40/02Banking  e.g. interest calculation  credit approval  mortgages  home banking or on-line banking0.512
H04L41/0668selecting new candidate element0.512
H04L41/0681involving configuration of triggering conditions0.512
H04L41/5019Ensuring SLA | flow or congestion control at network level | (ref: H04L47/10)0.512
H04L61/2503Internet protocol [IP] address translation0.511
H04B7/0626Channel coefficients  e.g. channel state information [CSI]0.511
H04B7/0617for beam forming0.511
H04L69/04Protocols for data compression | compression in general | (ref: H03M7/30)| | reduction of the amount or size of exchanged application data at an intermediate network processing stage | (ref: H04L67/2828)| | optimizing  e.g. header compression  information sizing in wireless communication networks | (ref: H04W28/06)0.510
H04L61/20Address allocation | configuration management of network or network elements | (ref: H04L41/08)0.510
H04L51/08Messages including annexed information  e.g. attachments0.510
H04L43/16using threshold monitoring0.510
G06F11/3409for performance assessment0.510
G06F11/3006where the computing system is distributed  e.g. networked systems  clusters  multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50)0.510
G06F11/3414Workload generation  e.g. scripts  playback0.510
H04L43/0864Round trip delays0.510
G06Q20/22Payment schemes or models0.508
G06Q20/3223Realising banking transactions through M-devices0.508
H04L41/20Network management software packages0.508
H04W4/30Services specially adapted for particular environments  situations or purposes0.507
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.507
H04W88/14Backbone network devices0.507
H04L1/1664the supervisory signal being transmitted together with payload signals| piggybacking0.506
H04B7/10Polarisation diversity| Directional diversity0.505
H04W16/26Cell enhancers | or enhancement|   e.g. for tunnels  building shadow0.505
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability0.504
G06F21/565by checking file integrity0.504
H04L65/102Gateways | arrangements for connecting between networks having differing types of switching systems  e.g. gateways | (ref: H04L12/66)0.504
H04L25/0226sounding signals | per se0.504
G01S19/13Receivers0.503
G01N21/47Scattering  i.e. diffuse reflection | (ref: G01N21/25)|   | (ref: G01N21/41)|  take precedence | (ref: G01N21/55)|  takes precedence0.503
G02B6/4293hybrid electrical and optical connections for transmitting electrical and optical signals0.503
H04L43/0829Packet loss0.503
H04L43/026using flow generation0.503
B42D25/333Watermarks0.503
H04N1/4486using digital data encryption0.503
G06T1/0021Image watermarking0.503
H04M15/12Discriminative metering |   charging or billing0.502
H04W40/28for reactive routing0.502
H04W52/0216using a pre-established activity schedule  e.g. traffic indication frame0.502
H04W52/0219where the power saving management affects multiple terminals0.502
H04L63/02for separating internal from external traffic  e.g. firewalls0.501
H04L43/0894Packet rate0.501
G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates0.501
G10L17/22Interactive procedures| Man-machine interfaces0.501
G10L15/06Creation of reference templates| Training of speech recognition systems  e.g. adaptation to the characteristics of the speaker's voice | (ref: G10L15/14)|  takes precedence0.501
G10L15/22Procedures used during a speech recognition process  e.g. man-machine dialogue0.501
H04M3/493Interactive information services  e.g. directory enquiries | | Arrangements therefor  e.g. interactive voice response [IVR] systems or voice portals0.500
H04W60/06De-registration or detaching0.499
H04L41/085Keeping track of network configuration0.499
H04N21/43615Interfacing a Home Network  e.g. for connecting the client to a plurality of peripherals | home Audio Video Interoperability [HAVI] data switching networks | (ref: H04L12/2805)0.499
H04N21/242Synchronization processes  e.g. processing of Program Clock References [PCR] | synchronisation arrangements in time-division multiplex systems | (ref: H04J3/06)| | arrangements for synchronising broadcast or distribution via plural systems in broadcast distribution systems | (ref: H04H20/18)| | arrangements for synchronising receiver with transmitter | (ref: H04L7/00)| | synchronising circuits with arrangements for extending range of synchronisation at the transmitter end | (ref: H04N5/067)0.499
H04N21/6332directed to client0.499
G06Q20/18involving self- service terminals [SSTs]  vending machines  kiosks or multimedia terminals0.498
G06F9/5088involving task migration0.498
H04W36/14Reselecting a network or an air interface0.497
G06Q20/4093Monitoring of card authentication0.497
G06Q20/16Payments settled via telecommunication systems0.497
H04W16/14Spectrum sharing arrangements | between different networks0.497
H04B17/336Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]0.497
G11C11/2259Cell access0.497
H04W4/33for indoor environments  e.g. buildings0.497
H04L1/0018based on latency requirement0.497
G01V3/12operating with electromagnetic waves | operating with millimetre waves | (ref: G01V8/005)0.497
H04L5/006Quality of the received signal  e.g. BER  SNR  water filling0.497
H04B17/27for locating or positioning the transmitter0.497
G11C11/2273Reading or sensing circuits or methods0.497
G11C11/2257Word-line or row circuits0.497
H04B17/373Predicting channel quality parameters0.497
G11C11/2293Timing circuits or methods0.497
G11C11/2297Power supply circuits0.497
H04L61/6063Transport layer addresses  e.g. aspects of transmission control protocol [TCP] or user datagram protocol [UDP] ports | TCP/IP or UDP protocol aspects or techniques | (ref: H04L69/16)0.496
H04L61/6009Caching of addresses | caching data temporarily at an intermediate stage in general | (ref: H04L67/2842)0.496
G06Q20/425using two different networks  one for transaction and one for security confirmation0.495
G06F21/577Assessing vulnerabilities and evaluating computer system security0.495
H04L61/106across networks  e.g. mapping telephone numbers to data network addresses0.495
G06F11/3096wherein the means or processing minimize the use of computing system or of computing system component resources  e.g. non-intrusive monitoring which minimizes the probe effect: sniffing  intercepting  indirectly deriving the monitored data from other directly available data0.495
G06F11/1464for networked environments0.495
H04W88/10adapted for operation in multiple networks  e.g. multi-mode access points0.494
H04N21/8358involving watermark | protecting executable software by watermarking | (ref: G06F21/16)| | image watermarking in general | (ref: G06T1/0021)| | watermarks inserted in still images for transmission purposes | (ref: H04N1/32144)| | inserting watermarks during video coding | (ref: H04N19/467)0.494
H04N21/4627Rights management | associated to the content | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)0.494
H04N21/4126portable device  e.g. remote control with a display  PDA  mobile phone | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)0.494
H04N21/23892involving embedding information at multiplex stream level  e.g. embedding a watermark at packet level0.494
H04N21/23895involving multiplex stream encryption0.494
H04M11/00Telephonic communication systems adapted for combination with other electrical systems0.494
H04L9/004for fault attacks0.494
G06F11/302where the computing system component is a software system0.494
G06F11/3495for systems0.494
G06F11/3419by assessing time0.494
G06F11/301where the computing system is a virtual computing platform  e.g. logically partitioned systems | virtual machines | (ref: G06F9/45533)| | logical partitioning of resources | (ref: G06F9/5077)0.494
G06F9/52Program synchronisation| Mutual exclusion  e.g. by means of semaphores0.494
H04W76/28Discontinuous transmission [DTX]| Discontinuous reception [DRX]0.493
H04L61/1541for service discovery | network applications for service discovery | (ref: H04L67/16)| | discovery of network devices in wireless communication networks | (ref: H04W8/005)0.493
H04L5/0048Allocation of pilot signals  i.e. of signals known to the receiver0.493
H04W36/0066of control information between different types of networks in order to establish a new radio link in the target network0.493
H04W80/06Transport layer protocols  e.g. TCP [Transport Control Protocol] over wireless | transmission control protocol/Internet protocol [TCP/IP] or user datagram protocol [UDP] | (ref: H04L69/16)0.492
H04L69/162involving adaptations of sockets based mechanisms | secure socket layer | (ref: H04L63/168)0.492
H04L69/164Adaptation or special uses of UDP protocol0.492
H04W8/08Mobility data transfer0.492
H04N21/6181involving transmission via a mobile phone network | arrangements for providing broadcast or conference services to substation in data switching networks in combination with wireless systems | (ref: H04L12/189)| | wireless uplink channel access | (ref: H04W74/004)0.492
H04N21/6131involving transmission via a mobile phone network | wireless downlink channel access | (ref: H04W74/006)0.492
H04B1/38Transceivers  i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving0.492
G06Q30/02Marketing  e.g. market research and analysis  surveying  promotions  advertising  buyer profiling  customer management or rewards| Price estimation or determination0.492
H04K3/41characterized by the control of the jamming activation or deactivation time | control of jamming activation and deactivation time only for the purpose of alternating between jamming mode and target monitoring mode | (ref: H04K3/45)0.492
H04K3/28with jamming and anti-jamming mechanisms both included in a same device or system  e.g. wherein anti-jamming includes prevention of undesired self-jamming resulting from jamming0.492
H04L45/26Route discovery packet0.491
H04L45/123Evaluation of link metrics | techniques for monitoring network metrics | (ref: H04L43/08)0.491
H04W84/20Master-slave | selection or change|  arrangements0.491
H04L65/4007Services involving a main real-time session and one or more additional parallel sessions | real time messaging  e.g. instant messaging  interacting with other applications or services | (ref: H04L51/046)| | multichannel or multilink protocols | (ref: H04L69/14)| | services and arrangements where telephone services are combined with data services | (ref: H04M7/0024)0.491
H04N7/152Multipoint control units therefor0.491
H04L51/10Messages including multimedia information | network arrangements or protocols for real-time communication | (ref: H04L65/00)| | voice messaging in telephonic communication using automatic or semi-automatic exchanges with non-audio components | (ref: H04M3/5307)0.491
H04N21/6437Real-time Transport Protocol [RTP]0.491
H04N7/141between two video terminals  e.g. videophone | telephonic communication systems combined with television receiver for reception of entertainment or information matter | (ref: H04M11/085)0.491
H04N21/4788communicating with other users  e.g. chatting | arrangements for providing for computer conferences  e.g. chat rooms  to substation in data switching networks | (ref: H04L12/1813)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)0.491
H04N21/632using a connection between clients on a wide area network  e.g. setting up a peer-to-peer communication via Internet for retrieving video segments from the hard-disk of other client devices | broadcast-related systems characterised by transmission among terminal devices | (ref: H04H60/80)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)0.491
H04L51/046interacting with other applications or services0.491
H04L65/608Streaming protocols  e.g. RTP or RTCP0.491
H04L51/32Messaging within social networks0.491
H04L65/1083In-session procedures | computer conferences  network arrangements for conference optimisation or adaptation | (ref: H04L12/1827)| | reactions to resource unavailability in packet switching networks | (ref: H04L47/74)| | reallocation or renegotiation of resources in packet switching networks | (ref: H04L47/76)0.491
H04M3/2281Call monitoring  e.g. for law enforcement purposes| Call tracing| Detection or prevention of malicious calls0.491
H04M3/2272Subscriber line supervision circuits  e.g. call detection circuits0.491
H04M3/42059Making use of the calling party identifier0.491
H04L65/1079of unsolicited session attempts  e.g. SPIT | message switching systems  e.g. electronic mail systems  with filtering and selective blocking capabilities | (ref: H04L51/12)0.491
H04N21/43856by partial decryption  e.g. decrypting a multiplex stream that has been partially encrypted0.491
H04N21/235Processing of additional data  e.g. scrambling of additional data  processing content descriptors | arrangements for simultaneous broadcast of plural pieces of information | (ref: H04H20/28)0.491
H04W56/0005synchronizing of arrival of multiple uplinks0.491
H04W56/005compensating for timing error by adjustment in the receiver0.491
H04L12/40Bus networks0.491
H04L12/5601Transfer mode dependent  e.g. ATM0.490
H04L43/067for time frame related reporting0.490
H04W52/0209in terminal devices | terminal devices | per se|  | (ref: H04W88/02)0.490
H04W74/0816carrier sensing with collision avoidance0.490
H04W52/245taking into account received signal strength0.490
H04W52/46in multi hop networks  e.g. wireless relay networks0.490
H04L5/0057Physical resource allocation for CQI0.490
H04L5/0035Resource allocation in a cooperative multipoint environment0.489
H04W72/082using the level of interference0.489
H04L47/283Network and process delay  e.g. jitter or round trip time [RTT]0.489
H04W40/36due to handover0.489
H04W28/0236radio quality  e.g. interference  losses or delay0.489
H04W28/02Traffic management  e.g. flow control or congestion control0.489
G06Q50/30Transportation| Communications0.488
B60R25/255Eye recognition0.488
G08G1/202Dispatching vehicles on the basis of a location  e.g. taxi dispatching0.488
B60R25/257Voice recognition0.488
G08G1/005including pedestrian guidance indicator0.488
H04L43/062for traffic related reporting0.488
H04B1/69Spread spectrum techniques0.488
H04B7/24for communication between two or more posts | wireless communication networks | (ref: H04W)0.488
H04J11/0056Inter-base station aspects0.488
H04L67/2804for adding application control or application functional data  e.g. adding metadata0.487
H04L67/2819Enhancement of application control based on intercepted application data0.487
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.486
H04W48/06based on traffic conditions0.486
G06Q50/01Social networking0.486
H04L45/026Details of "hello" or keep-alive messages0.485
G06F15/173using an interconnection network  e.g. matrix  shuffle  pyramid  star  snowflake0.485
G06N3/04Architectures  e.g. interconnection topology0.485
G06F7/02Comparing digital values | (ref: G06F7/06)|   | (ref: G06F7/22)|   |  | (ref: G06F7/38)|  take precedence| information retrieval | (ref: G06F17/30)| | comparing pulses | (ref: H03K5/22)0.485
G06F7/5443Sum of products | for applications thereof  | see|  the relevant places  e.g. | (ref: G06F17/10)|   | (ref: H03H17/00)0.485
H04W72/044where an allocation plan is defined based on the type of the allocated resource0.484
H04L69/166IP fragmentation or TCP segmentation aspects | evaluation of maximum transfer unit [MTU] | (ref: H04L47/36)| | assembly or disassembly of packets in wireless networks | (ref: H04W28/065)0.484
G06F3/04842Selection of a displayed object | (ref: G06F3/0482)|  takes precedence0.484
H04L12/2809indicating that an appliance service is present in a home automation network | arrangements for service discovery | (ref: H04L29/08648)| | monitoring functionality | (ref: H04L43/0817)0.484
H04L12/281indicating a format for calling an appliance service function in a home automation network | protocols for network applications involving the use of web-based technology | (ref: H04L29/08099)0.484
H04L12/2836Protocol conversion between an external network and a home network | protocol conversion | (ref: H04L29/06068)| | adaptation of digital video signals for transport over a specific home network | (ref: H04N7/24)| | controlling appliance services of a home automation network from a device located outside the home and the home network | (ref: H04L12/2818)0.484
G06F3/0486Drag-and-drop0.484
H04W36/0061of neighbor cell information0.483
G06F21/43wireless channels0.483
G06T7/00Image analysis0.483
G06F13/4068Electrical coupling0.483
H04L47/28using time considerations0.482
H04L41/5054Automatic provisioning of the service triggered by the service manager  e.g. concrete service implementation by automatic configuration of network components | for initializing configuration  i.e. provisioning of network or devices | (ref: H04L41/0806)0.482
H04L49/253Connections establishment or release between ports0.482
H04L69/08Protocols for interworking or protocol conversion | arrangements for connecting between networks having differing types of switching systems  e.g. gateways  | (ref: H04L12/66)| | network management protocols conversion | (ref: H04L41/0226)0.481
H04L61/6004Structures or formats of addresses0.481
H04L61/2092by self assignment  e.g. pick address randomly and test if already in use0.481
G06Q10/025Coordination of plural reservations  e.g. plural trip segments  transportation combined with accommodation0.481
G06Q20/407Cancellation of a transaction0.481
G06Q20/24Credit schemes  i.e. "pay after"0.481
H04W36/00835Determination of the neighbour cell list0.481
H04W36/22for handling the traffic0.481
G06Q10/103Workflow collaboration or project management0.481
H04N1/00225details of image data generation  e.g. scan-to-email or network scanners | using an image reading device as a local input to a computer | (ref: H04N1/00241)0.481
H04N1/00949Combining applications  e.g. to create workflows | allocation of computer machine resources considering the execution order of a plurality of tasks | (ref: G06F9/5038)0.481
H04L45/12Shortest path evaluation0.480
H04W40/04based on wireless node resources0.480
H04W40/005Routing actions in the presence of nodes in sleep or doze mode0.480
H04W28/18Negotiating wireless communication parameters0.480
H04W72/1263Schedule usage  i.e. actual mapping of traffic onto schedule| Multiplexing of flows into one or several streams| Mapping aspects| Scheduled allocation0.480
H04B7/15Active relay systems0.480
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence0.480
G06F11/3438monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22)0.480
H04L5/26combined with the use of different frequencies0.479
H04W52/14Separate analysis of uplink or downlink0.479
H04W72/1289in the downlink  i.e. towards the terminal0.479
H04B7/15542Selecting at relay station its transmit and receive resources | selection of wireless resources by user or terminal | (ref: H04W72/02)| | arrangements affording multiple use of the transmission path by two-dimensional division of the resources | (ref: H04L5/0003)|   or by allocating sub-channels | (ref: H04L5/003)0.479
G06F21/80in storage media based on magnetic or optical technology  e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00)0.479
D21H17/70forming new compounds | in situ|   e.g. within the pulp or paper  by chemical reaction with other substances added separately0.479
D21H17/675Oxides  hydroxides or carbonates0.479
H04L61/6072Short addresses0.479
H04M1/72505Radio link set-up procedure0.479
H04L61/2046involving the solving of address allocation conflicts or involving testing of addresses0.479
H04L65/1003Signalling or session protocols0.479
H04L65/103in the network0.479
H04W56/0065using measurement of signal travel time0.478
G01S5/0289of multiple transceivers  e.g. in ad hoc networks0.478
G01S13/74Systems using reradiation of radio waves  e.g. secondary radar systems| Analogous systems0.478
G01S5/021Calibration  monitoring or correction | (ref: G01S5/0252)|  takes precedence0.478
G01S5/0242locating transmitters to be used for positioning | (ref: G01S5/0289)|  takes precedence0.478
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)0.478
H04L63/1433Vulnerability analysis0.478
H04L9/007involving hierarchical structures0.477
H04B7/14Relay systems0.477
H04W36/04Reselecting a cell layer in multi-layered cells0.477
H04W76/32Release of transport tunnels0.477
H04W76/30Connection release0.477
H04B17/15Performance testing0.477
H04L47/125Load balancing  e.g. traffic engineering | load balancing among servers | (ref: H04L67/1002)0.477
H04L1/1861Physical mapping arrangements | for ACK signaling | see|  also | (ref: H04L5/0053)0.477
H04L47/17Hop by hop0.477
G06N5/003Dynamic search techniques  heuristics  branch-and-bound | (ref: G06N5/046)|  take precedence| for optimisation | (ref: G06Q10/04)0.477
H04W28/12using signalling between network elements0.476
H04L47/746Reaction triggered by a failure0.476
G06F21/805using a security table for the storage sub-system0.476
G06F12/0238Memory management in non-volatile memory  e.g. resistive RAM or ferroelectric memory0.476
G06F12/1483using an access-table  e.g. matrix or list0.476
G06F12/0246in block erasable memory  e.g. flash memory0.476
G06F13/4221being an input/output bus  e.g. ISA bus  EISA bus  PCI bus  SCSI bus0.476
B42D25/305Associated digital information | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.476
H04B7/0695using beam selection0.476
H04B7/0426Power distribution0.476
G06F8/71Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management0.475
H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions0.475
G06F9/30021Compare instructions  e.g. Greater-Than  Equal-To  MINMAX0.475
G06F9/3887controlled by a single instruction  e.g. SIMD0.475
H04W36/38by fixed network equipment0.474
H04L67/1078Resource delivery mechanisms0.474
H04W36/026Multicasting of data during hand-off0.474
H04W36/36by user or terminal equipment0.474
G06K9/00496Recognising patterns in signals and combinations thereof | signature verification | (ref: G06K9/00154)| | analysing specific medical signals  e.g. bioelectric signals  blood pressure | (ref: A61B5/00)| | processing radar and similar signals | (ref: G01S)| | analysis of chromatographic signals | (ref: G01N30/86)| | processing seismic signals | (ref: G01V1/28)|   | (ref: G01V1/46)| | acoustic speech processing | (ref: G10L)| | transmission systems | (ref: H04B1/00)0.474
H04L65/4015where at least one of the additional parallel sessions is real time or time sensitive  e.g. white board sharing  collaboration or spawning of a subconference | telewriting  virtual reality or network gaming | (ref: H04L67/38)0.473
H04W52/0254detecting a user operation or a tactile contact or a motion of the device0.473
H04W84/02Hierarchically pre-organised networks  e.g. paging networks  cellular networks  WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]0.473
H04W88/08Access point devices0.473
H04W36/28involving a plurality of connections  e.g. multi-call  multi-bearer connections0.473
H04W92/12between access points and access point controllers0.473
G06F3/0655Vertical data movement  i.e. input-output transfer| data movement between one or more hosts and one or more storage devices0.473
H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture| Specification of modified or new header fields | protocols engines in general | (ref: H04L69/12)| | OSI stack based layering aspects | (ref: H04L69/32)| | protocol header analysis in general | (ref: H04L69/22)| | addressing aspects in multiple interfaces involving dual-stack hosts | (ref: H04L61/6086)0.472
G06Q20/08Payment architectures0.472
G16H40/67for remote operation0.472
G16H20/00ICT specially adapted for therapies or health-improving plans  e.g. for handling prescriptions  for steering therapy or for monitoring patient compliance0.472
G16H10/40for data related to laboratory analysis  e.g. patient specimen analysis0.472
H04L63/16Implementing security features at a particular protocol layer0.472
H04W92/20between access points0.472
G06Q30/08Auctions |   matching or brokerage | matching or brokerage for stock exchange | (ref: G06Q40/04)0.471
H04L41/145involving simulating  designing  planning or modelling of a network0.471
H04L5/16Half-duplex systems| Simplex-duplex switching| Transmission of break signals | non automatically inverting the direction of transmission0.471
H04L27/0006Assessment of spectral gaps suitable for allocating digitally modulated signals  e.g. for carrier allocation in cognitive radio | for spectrum sharing between different networks | (ref: H04W16/14)0.471
H04L5/1469using time-sharing0.471
G06N3/084Back-propagation0.471
H04L1/0082fields explicitly indicating existence of error in data being transmitted  e.g. so that downstream stations can avoid decoding erroneous packet| relays0.471
G16H30/20for handling medical images  e.g. DICOM  HL7 or PACS0.470
G16H50/20for computer-aided diagnosis  e.g. based on medical expert systems0.470
H04W74/004in the uplink  i.e. towards network0.470
H04L47/821Prioritising resource allocation or reservation requests0.470
H04L45/58Association of routers0.470
H04L47/781Centralized allocation of resource0.470
H04L47/826Involving periods of time0.470
H04L41/0836to enhance reliability  e.g. reduce downtime0.470
H04L45/028Dynamic adaptation of the update interval  e.g. event-triggered update0.470
H04L45/04Interdomain routing  e.g. hierarchical routing0.470
H04W72/1215for collaboration of different radio technologies0.470
H04L5/0051of dedicated pilots  i.e. pilots destined for a single user or terminal0.470
H04B7/0456Selection of precoding matrices or codebooks  e.g. using matrices antenna weighting0.469
H04L5/0025Spatial division following the spatial signature of the channel0.469
H04B7/0639Using selective indices  e.g. of a codebook  e.g. pre-distortion matrix index [PMI] or for beam selection0.469
H04N21/266Channel or content management  e.g. generation and management of keys and entitlement messages in a conditional access system  merging a VOD unicast channel into a multicast channel0.469
H04L41/5006Defining or negotiating SLA contracts  guarantees or penalties | SLA negotiation in wireless networks | (ref: H04W28/24)0.469
H04L41/5041Service implementation0.469
H04W36/06Reselecting a communication resource in the serving access point0.469
G06F11/1402Saving  restoring  recovering or retrying0.468
G07F9/023for display  data presentation or advertising arrangements in payment activated and coin-freed apparatus0.468
G06Q10/0833Tracking0.468
G06K19/0723the record carrier comprising an arrangement for non-contact communication  e.g. wireless communication circuits on transponder cards  non-contact smart cards or RFIDs0.468
H04L61/609involving geographic information  e.g. room number0.468
H04W52/367Power values between minimum and maximum limits  e.g. dynamic range0.467
H04W52/146Uplink power control0.467
G06F1/163Wearable computers  e.g. on a belt0.467
G10L17/24the user being prompted to utter a password or a predefined phrase0.467
H04M1/6066including a wireless connection0.467
G06F3/011Arrangements for interaction with the human body  e.g. for user immersion in virtual reality | for handicapped people in general | (ref: A61F4/00)| | robot control | (ref: B25J)| | tactile signalling | (ref: G08B)| | blind teaching | (ref: G09B21/00)| | for electrophonic musical instruments | (ref: G10H1/344)| | electronic switches characterised by the way in which the control signals are generated | (ref: H03K17/94)0.467
H04L67/1061involving node-based peer discovery mechanisms | access to replicated servers | (ref: H04L67/1002)| | service discovery | (ref: H04L67/16)| | topology discovery for routing | (ref: H04L45/02)| | information retrieval in distributed file systems | (ref: G06F17/30067)| | information retrieval in structured data stores  indexing  querying | (ref: G06F17/30286)0.467
H04W28/14using intermediate storage0.467
H04L5/14Two-way operation using the same type of signal  i.e. duplex | duplex repeaters | (ref: H04L25/22)|  | conditioning for two-way transmission in general | (ref: H04B3/20)| | | for interconnection between telephone switching centres | (ref: H04Q3/00)0.467
G06Q20/208Input by product or record sensing  e.g. weighing or scanner processing0.467
G07G1/0054with control of supplementary check-parameters  e.g. weight or number of articles0.467
G07G1/0036Checkout procedures0.467
H04L12/1859adapted to provide push services  e.g. data channels0.467
H04W4/027using movement velocity  acceleration information0.467
H04W4/44for communication between vehicles and infrastructures  e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]0.467
H04W36/0007for multicast or broadcast services  e.g. MBMS | multicast or broadcast application services | (ref: H04W4/06)| | resource management for broadcast services | (ref: H04W72/005)| | connection management for selective distribution or broadcast | (ref: H04W76/40)0.467
H04L1/20using signal quality detector0.466
H04L61/2592involving tunneling or encapsulation | providing a confidential data exchange among entities communicating through data packet networks | (ref: H04L63/04)0.466
H04L47/41Actions on aggregated flows or links0.466
H04L12/1403Architecture for metering  charging or billing0.466
H04L69/169Special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | protocols for interworking in general | (ref: H04L69/08)0.466
H04M15/56for VoIP communications0.466
H04M15/8033location-dependent  e.g. business or home0.466
H04L45/245Link aggregation  e.g. trunking0.466
G08B13/2494by interference with electro-magnetic field distribution combined with other electrical sensor means  e.g. microwave detectors combined with other sensor means0.466
G01S11/00Systems for determining distance or velocity not using reflection or reradiation | direction-finders | (ref: G01S3/00)| | position-fixing by co-ordinating two or more distance determinations | (ref: G01S5/00)0.466
G01S13/003Bistatic radar systems| Multistatic radar systems0.466
H04L43/0852Delays0.466
H04L47/82Miscellaneous aspects0.466
G06F11/3457Performance evaluation by simulation0.466
G06F11/3688for test execution  e.g. scheduling of test suites0.466
G06F11/3664Environments for testing or debugging software0.466
H04W28/065using assembly or disassembly of packets0.466
H04W8/186Processing of subscriber group data0.465
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities0.465
H04L5/001the frequencies being arranged in component carriers0.465
G07F17/0057for the hiring or rent of vehicles  e.g. cars  bicycles or wheelchairs | car rental | (ref: G07B15/00)0.465
H04W76/36for reassigning the resources associated with the released connections0.465
H04B17/21for calibration| for correcting measurements0.464
H04B17/345Interference values | (ref: H04B17/336)|  takes precedence0.464
H04B17/3912Simulation models0.464
H04L41/0843based on generic templates0.464
G06F9/4401Bootstrapping | security arrangements therefor | (ref: G06F21/57)0.464
H04L41/046Aspects of network management agents0.464
G06F9/4411Configuring for operating with peripheral devices| Loading of device drivers0.464
G06F11/1068in sector programmable memories  e.g. flash disk | (ref: G06F11/1072)|  takes precedence0.464
H04L47/2441Flow classification0.463
H04L47/2483Flow identification0.463
H04L47/2408Different services  e.g. type of service [ToS]0.463
H04B17/309Measuring or estimating channel quality parameters0.463
G01S1/042Transmitters0.463
G01S5/0036of measured values  i.e. measurement on mobile and position calculation on base station0.463
H04W8/245from a network towards a terminal0.463
G06F12/0864using pseudo-associative means  e.g. set-associative or hashing0.463
G06F12/1045associated with a data cache0.463
G06F12/1425the protection being physical  e.g. cell  word  block0.463
G06F3/0646Horizontal data movement in storage systems  i.e. moving data in between storage devices or systems0.463
G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means  e.g. caches0.463
G06F12/1491in a hierarchical protection system  e.g. privilege levels  memory rings0.463
G06F12/0895of parts of caches  e.g. directory or tag array0.463
G08B13/2491Intrusion detection systems  i.e. where the body of an intruder causes the interference with the electromagnetic field0.463
H04M15/41Billing record details  i.e. parameters  identifiers  structure of call data record [CDR]0.463
A61B17/7074Tools specially adapted for spinal fixation operations other than for bone removal or filler handling | (ref: A61B17/7062)|   | (ref: A61B17/808)|   | (ref: A61B17/8858)|  take precedence| for spinal image producing devices | (ref: A61B90/36)|   | (ref: A61B34/20)| | markers | (ref: A61B90/39)0.462
H04L49/901Storage descriptor  e.g. read or write pointers0.462
A61B17/7002Longitudinal elements  e.g. rods0.462
A61B17/8685comprising multiple separate parts0.462
H04B5/0081with antenna coils | loop aerials | (ref: H01Q7/00)0.462
H04B5/00Near-field transmission systems  e.g. inductive loop type0.462
H04L47/627policing0.462
H04L49/90Queuing arrangements0.462
H04L27/2636with FFT/DFT  e.g. standard SC-FDMA transmitter or DFT-SOFDM0.462
H04L5/02Channels characterised by the type of signal0.462
B60R25/01operating on vehicle systems or fittings  e.g. on doors  seats or windscreens0.461
B60R25/04operating on the propulsion system  e.g. engine or drive motor0.461
H04L67/1012based on compliance of requirements or conditions with available server resources0.461
H04L67/288Distributed intermediate devices  i.e. intermediate device interaction with other intermediate devices on the same level0.461
H04L47/32Packet discarding or delaying0.461
H04W80/04Network layer protocols  e.g. mobile IP [Internet Protocol]0.461
H04W80/10adapted for | application|  session management  e.g. SIP [Session Initiation Protocol] | connection management | (ref: H04W76/00)| | arrangements for session management | (ref: H04L67/14)0.461
H04W74/008with additional processing of random access related information at receiving side0.461
H04W28/0284detecting congestion or overload during communication | monitoring arrangements | (ref: H04L43/00)0.460
H04B17/382for resource allocation  admission control or handover0.460
H04L41/083for network speed increase0.460
H04L47/122Diverting traffic away from congested spots0.460
H04J3/0661using timestamps0.459
H04W28/0205at the air interface | dynamic wireless traffic scheduling | (ref: H04W72/12)0.459
G06T1/0028Adaptive watermarking  e.g. Human Visual System [HVS]-based watermarking0.459
H04N19/176the region being a block  e.g. a macroblock0.459
G06T1/0057Compression invariant watermarking0.459
H04N19/18the unit being a set of transform coefficients0.459
H04L47/25Rate modification upon detection by the source of changing network conditions0.459
H04L1/18Automatic repetition systems  e.g. van Duuren system | | ARQ protocols0.459
H04L1/1874Buffer management0.459
H04L47/27Window size evaluation or update  e.g. using information derived from ACK packets0.459
H04L47/196Integration of transport layer protocols  e.g. TCP and UDP0.459
H04L47/26Explicit feedback to the source  e.g. choke packet0.459
H04L41/0672by re-configuring the faulty entity0.458
H04L41/0631Alarm or event or notifications correlation| Root cause analysis0.458
H04W72/1257based on resource usage policy0.458
H04W72/1252based on load0.458
H04L45/32Flooding | denial of service attacks | (ref: H04L63/1458)0.458
H04L47/806Broadcast or multicast traffic0.458
G06F3/04883for entering handwritten data  e.g. gestures  text0.457
H04L29/12characterised by the data terminal | contains provisionally no documents0.457
H02J7/0047with indicating devices | (ref: H02J7/0021)|  takes precedence0.457
H02J50/10using inductive coupling0.457
H04L41/08Configuration management of network or network elements | proprietary application protocols for remote control of end-devices in special networking environments | (ref: H04L67/125)| | automatic configuration specially adapted for wireless networks | (ref: H04W24/02)0.457
H04L63/308retaining data  e.g. retaining successful  unsuccessful communication attempts  internet access  or e-mail  internet telephony  intercept related information or call content0.456
H04B1/713using frequency hopping0.456
H04L1/1812Hybrid protocols0.456
G06N3/0472using probabilistic elements  e.g. p-rams  stochastic processors0.456
G10L17/06Decision making techniques| Pattern matching strategies0.456
G06N3/0454using a combination of multiple neural nets0.456
G06N3/082modifying the architecture  e.g. adding or deleting nodes or connections  pruning0.456
G06Q20/3672Intelligent token initializing or reloading0.456
H04L43/106by adding timestamps to packets0.456
G06F11/3466Performance evaluation by tracing or monitoring0.456
H04L41/16Network management using artificial intelligence0.456
H04L41/064involving time analysis0.456
G06F11/3013where the computing system is an embedded system  i.e. a combination of hardware and software dedicated to perform a certain function in mobile devices  printers  automotive or aircraft systems | testing or monitoring of control systems or parts thereof | (ref: G05B23/02)0.456
H04L12/1877Measures taken prior to transmission0.456
H04L65/607Stream encoding details | interfacing the downstream path of a video distribution network | (ref: H04N21/238)|   | (ref: H04N21/438)| | controlling the complexity of a video stream | (ref: H04N21/2662)|   | (ref: H04N21/4621)|   | (ref: H04N21/64792)| | protocols for data compression | (ref: H04L69/04)| | header parsing or analysis | (ref: H04L69/22)0.456
H04W36/165for improving the overall network performance | (ref: H04W36/18)|  - | (ref: H04W36/22)|  take precedence0.456
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.200
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.136
H04L2209/04Masking or blinding0.125
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.125
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.124
H04L2209/16Obfuscation or hiding  e.g. involving white box0.123
H04L2209/38Chaining  e.g. hash chain or certificate chain0.123
H04L2209/601Broadcast encryption0.121
H04L2209/60Digital content management  e.g. content distribution0.121
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.120
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.120
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.119
G06F2221/2115Third party0.115
G06F2221/2131Lost password  e.g. recovery of lost or forgotten passwords0.115
G06F2221/2129Authenticate client device independently of the user0.115
H04L2209/46Secure multiparty computation  e.g. millionaire problem0.115
H04L2209/50Oblivious transfer0.115
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.114
G06Q20/045characterized in that the payment protocol involves at least one ticket0.114
G06Q50/34Betting or bookmaking  e.g. Internet betting0.114
G06F2221/2103Challenge-response0.113
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.113
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.113
H04L2209/42Anonymization  e.g. involving pseudonyms0.112
H04L2209/24Key scheduling  i.e. generating round keys or sub-keys for block encryption0.111
H04L2209/08Randomization  e.g. dummy operations or using noise0.108
H04L63/0218Distributed architectures  e.g. distributed firewalls0.108
H04L45/302Route determination based on requested QoS0.107
H04L45/7453using hashing0.107
H04L2209/127Trusted platform modules [TPM]0.107
G06F8/36Software reuse0.105
G06F2221/2107File encryption0.105
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.105
G06F2221/2149Restricted operating environment0.105
G06F2221/2117User registration0.105
B60R2325/108Encryption0.103
B60R2325/101Bluetooth0.103
H04L2209/84Vehicles0.103
A63F2300/572Communication between players during game play of non game information  e.g. e-mail  chat  file transfer  streaming of audio and streaming of video0.103
A63F2300/401Secure communication  e.g. using encryption or authentication0.103
H04L61/1588containing mobile subscriber information  e.g. home subscriber server [HSS]0.102
H04R2225/55Communication between hearing aids and external devices via a network for data exchange0.102
H04L2209/12Details relating to cryptographic hardware or logic circuitry0.102
H04L1/0041Arrangements at the transmitter end0.102
H04L1/0045Arrangements at the receiver end0.102
H04W88/12Access point controller devices0.102
H04L12/56Packet switching systems0.101
H04L51/00Arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages0.101
Y04S40/18Network protocols supporting networked applications  e.g. including control of end-device applications over a network0.101
Y04S40/20Information technology specific aspects0.101
H04W80/045involving different protocol versions  e.g. MIPv4 and MIPv60.101
Y02D10/00Energy efficient computing0.100
H04L2209/046of operations  operands or results of the operations0.100
G06Q2220/10Usage protection of distributed data files0.100
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.099
B60R2325/205Mobile phones0.099
G06F21/123by using dedicated hardware  e.g. dongles  smart cards  cryptographic processors  global positioning systems [GPS] devices0.099
G06F2221/2137Time limited access  e.g. to a computer or data0.098
H04L2209/463Electronic voting0.096
H04W4/18Information format or content conversion  e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals0.096
H04L61/30Arrangements for managing names  e.g. use of aliases or nicknames | retrieval from the Internet by using information identifiers  e.g. uniform resource locators [URLs] | (ref: G06F17/30876)| | name-to-address mapping | (ref: H04L61/15)0.096
G06F11/2097maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)|  and subgroups0.096
G06F11/2038with a single idle spare processing component0.096
G06F2201/805Real-time0.096
G06F11/2048where the redundant components share neither address space nor persistent storage0.096
G06F11/2041with more than one idle spare processing component0.096
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.096
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.096
G06F2201/815Virtual | middleware or OS functionality using virtual machines to implement generic software techniques for error detection or fault masking | (ref: G06F11/1484)0.096
H04L2209/603Digital right managament [DRM]0.096
G06F2009/45562Creating  deleting  cloning virtual machine instances0.096
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.096
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.096
Y02T10/7072Electromobility specific charging systems or methods for batteries  ultracapacitors  supercapacitors or double-layer capacitors | efficient charging systems for batteries  ultracapacitors  supercapacitors or double-layer capacitors in road transportation in general | (ref: Y02T10/92)0.095
Y04S30/14Details associated with the interoperability  e.g. vehicle recognition  authentication  identification or billing0.095
Y02T10/70Energy storage for electromobility | hydrogen internal combustion engines | (ref: Y02T90/42)| | fuel cell powered electric vehicles | (ref: Y02T90/34)0.095
Y02T90/16Information or communication technologies improving the operation of electric vehicles0.095
Y02T90/12Electric charging stations0.095
Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles  i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV] | power aggregation of EV or HEV | (ref: Y02E60/721)0.095
G06Q2220/18Licensing0.095
H04W88/182Network node acting on behalf of an other network entity  e.g. proxy0.095
G06F2221/2101Auditing as a secondary aspect0.095
G06F2221/2147Locking files0.095
G07C2009/00865remotely by wireless communication0.094
G07C2009/00388code verification carried out according to the challenge/response method0.094
G07C2009/00412the transmitted data signal being encrypted0.094
H04L2209/20Manipulating the length of blocks of bits  e.g. padding or block truncation0.093
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.093
H04W84/04Large scale networks| Deep hierarchical networks0.093
H04W84/22with access to wired networks0.093
G07C2209/63Comprising locating means for detecting the position of the data carrier  i.e. within the vehicle or within a certain distance from the vehicle0.093
G01S5/0205Details0.093
H04L1/188Time-out mechanisms0.093
G06F2221/0751Key | not used0.092
G06F2212/1052Security improvement0.092
G06F2221/0797using dedicated hardware at the client0.092
H04L2463/103applying security measure for protecting copy right | protecting software against unauthorised usage in a vending or licensing environment  e.g. protection the software providers copyright | (ref: G06F21/10)| | data processing systems or methods  specially adapted for payment schemes  architectures or protocols | (ref: G06Q20/00)| | secrecy systems or subscription systems | (ref: H04N7/16)0.092
H04W4/48for in-vehicle communication0.091
H04L61/6068Internet protocol [IP] addresses subnets0.091
H04L61/6018Address types0.091
G06F2209/544Remote0.091
H04W92/045between access point and backbone network device0.091
H04M3/567Multimedia conference systems0.090
G06K19/07309Means for preventing undesired reading or writing from or onto record carriers0.090
G06K7/0013by galvanic contacts  e.g. card connectors for ISO-7816 compliant smart cards or memory cards  e.g. SD card readers | connectors in general | (ref: H01R13/00)| | connectors for SIM cards used in mobile phones or the like | (ref: H04B1/3816)0.090
G06F2221/033Test or assess software0.090
G06F2221/0713User0.090
H04W84/005Moving wireless networks0.090
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.089
G06F2221/0724Editing0.089
G06F2209/5015Service provider selection0.089
H04L67/289where the intermediate processing is functionally located closer to the data consumer application  e.g. in same machine  in same home or in same subnetwork0.089
G08B29/186Fuzzy logic| neural networks0.089
H04N7/18Closed circuit television systems  i.e. systems in which the signal is not broadcast | television transmission of measured quantities | (ref: G01D5/39)| | intruder alarm or detection by television surveillance | (ref: G08B13/196)0.089
H04L45/1287with disjoint nodes0.089
H04L45/1283with disjoint links0.089
H04L2209/122Hardware reduction or efficient architectures0.089
H04L2012/40273the transportation system being a vehicle0.089
H04L2012/4026Bus for use in automation systems0.089
G06F2221/2133Verifying human interaction  e.g.  Captcha0.088
H04L61/3065Application layer names  e.g. buddy name  unstructured name chosen by a user or home appliance name0.088
G06F2221/034Test or assess a computer or a system0.088
G06F2212/402Encrypted data0.088
G05B2219/34274Connect pc card to industrial bus  with additional timing and adapting logic0.088
H04L2463/142Denial of service attacks against network infrastructure0.088
H04R2225/43Signal processing in hearing aids to enhance the speech intelligibility0.087
H04W40/023Limited or focused flooding to selected areas of a network0.087
G07C2205/02using a vehicle scan tool0.087
H04L2012/40215Controller Area Network CAN0.087
G05B2219/24065Real time diagnostics0.087
G05B2219/25205Encrypt communication0.087
G07C5/008communicating information to a remotely located station | transmission systems for measured values | (ref: G08C)0.087
G05B2219/2637Vehicle  car  auto  wheelchair0.087
H04W4/185by embedding added-value information into content  e.g. geo-tagging0.087
H04L47/19at layers above network layer | general aspects of TCP | (ref: H04L69/16)| | network arrangements for networked applications for scheduling or organising the servicing of application requests | (ref: H04L67/32)0.087
G07C2009/005whereby the code is a random code0.086
G07C2009/00555comprising means to detect or avoid relay attacks0.086
G09G2370/022Centralised management of display operation  e.g. in a server instead of locally0.086
G06F3/1446display composed of modules  e.g. video walls0.086
H04L2209/88Medical equipments0.086
G04R20/02the radio signal being sent by a satellite  e.g. GPS0.086
Y04S20/30Smart metering0.086
G01D4/002Remote reading of utility meters0.086
G05B2219/2642Domotique  domestic  home control  automation  smart house0.086
G06F2201/82Solving problems relating to consistency | ensuring consistency in mirrored systems | (ref: G06F11/2064)0.086
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.086
G06F2221/2151Time stamp0.085
H04W28/085among bearers or channels0.085
G06Q30/0275Auctions0.085
H04L49/354Support for virtual LAN  VLAN tagging or multiple registration  e.g. according to IEEE 802.1q0.085
G06Q2220/165Having origin or program ID0.084
G10L2015/223Execution procedure of a spoken command0.084
H04L41/0213using standardized network management protocols  e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]0.083
H04L67/1038Load balancing arrangements to avoid a single path through a load balancer0.083
H04W48/00Access restriction| Network selection| Access point selection0.083
H04L41/0869by validating configuration within one network element0.083
G06F2009/45575Starting  stopping  suspending  resuming virtual machine instances | program initiating | (ref: G06F9/445)| | task life-cycle in general | (ref: G06F9/485)0.083
G01V1/001Acoustic presence detection | measurement of sonic vibrations | (ref: G01H)| | alarm systems | (ref: G08B)0.083
G11C11/221using ferroelectric capacitors0.083
B60R16/0315using multiplexing techniques | multiplexing for transmission of signals | (ref: G08C15/00)| | multiplexing for electrical communication in general | (ref: H04J)0.083
H04L41/0859by keeping history of different configuration generations or versions0.082
G06F11/3082the data filtering being achieved by aggregating or compressing the monitored data0.082
G06F11/3079the data filtering being achieved by reporting only the changes of the monitored data0.082
G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component  e.g. monitoring of power  currents  temperature  humidity  position  vibrations | thermal management in cooling arrangements of a computing system | (ref: G06F1/206)0.082
G06F2009/45591Monitoring or debugging support | monitoring and debugging in general in | (ref: G06F11/30)|   | (ref: G06F11/36)0.082
G06F2221/2153Using hardware token as a secondary aspect0.082
G06F2201/865Monitoring of software0.082
G06F2201/875Monitoring of systems including the internet0.082
G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component  e.g. monitoring if the computing system is on  off  available  not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16)0.082
G06F2209/521Atomic0.082
G06F2209/502Proximity0.082
G06F2201/88Monitoring involving counting0.082
H04L7/0037Delay of clock signal0.082
H04L2209/125Parallelization or pipelining  e.g. for accelerating processing of cryptographic operations0.082
H04L2012/5635Backpressure  e.g. for ABR0.082
H04W28/021in wireless networks with changing topologies  e.g. ad-hoc networks | self-organizing networks | (ref: H04W84/18)0.082
H04W52/343taking into account loading or congestion level0.082
G06F17/00Digital computing or data processing equipment or methods  specially adapted for specific functions0.081
H04L12/407with decentralised control0.081
G05D1/021specially adapted to land vehicles0.081
G05D2201/0213Road vehicle  e.g. car or truck0.081
H04B2001/6904using code hopping0.081
G01R22/00Arrangements for measuring time integral of electric power or current  e.g. by electricity meters | electromechanical arrangements therefor | (ref: G01R11/00)| | monitoring electric consumption of electrically-propelled vehicles | (ref: B60L3/00)| | coin freed devices | (ref: G07F15/00)0.081
G06F2207/4824Neural networks0.081
H04L2012/2841Wireless0.081
H04W40/14based on stability0.080
H04L45/124using a combination of metrics0.080
G07C9/00Individual entry or exit registers0.080
H04L5/0023Time-frequency-space0.080
H04W48/04based on user or terminal location or mobility data  e.g. moving direction  speed0.080
H04L2463/144Detection or countermeasures against botnets0.080
H04M2207/187combining circuit and packet-switched  e.g. GPRS0.080
H04L2001/0097Relays0.079
H04L2463/081applying self-generating credentials  e.g. instead of receiving credentials from an authority or from another peer  the credentials are generated at the entity itself | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.079
G06F2212/7207management of metadata or control data0.079
G06F2213/0026PCI express0.079
H04B7/063Parameters other than those covered in groups | (ref: H04B7/0623)|  - | (ref: H04B7/0634)|   e.g. channel matrix rank or transmit mode selection0.079
G06F7/24Sorting  i.e. extracting data from one or more carriers  rearranging the data in numerical or other ordered sequence  and rerecording the sorted data on the original carrier or on a different carrier or set of carriers | sorting methods in general| (ref: G06F7/36)|  takes precedence0.079
H04W36/0009for a plurality of users or terminals  e.g. group communication or moving wireless networks | user group management | (ref: H04W4/08)| | processing of subscriber group data | (ref: H04W8/186)0.079
G06F2221/0748Hiding0.079
G06F2221/0708Location0.079
G06F2221/2113Multi-level security  e.g. mandatory access control0.079
H04Q2209/43using wireless personal area networks [WPAN]  e.g. 802.15  802.15.1  802.15.4  Bluetooth or ZigBee0.079
H04Q2209/823where the data is sent when the measured values exceed a threshold  e.g. sending an alarm0.079
H04W88/005Data network PoA devices0.079
H04L2001/0092Error control systems characterised by the topology of the transmission link0.078
H04L1/004by using forward error control | (ref: H04L1/0618)|  takes precedence| coding  decoding or code conversion  for error detection or correction | (ref: H03M13/00)0.078
H04L2001/0096Channel splitting in point-to-point links0.078
H04L2001/0094Bus0.078
H04L7/044using a single bit  e.g. start stop bit0.078
G06F11/1687at event level  e.g. by interrupt or result of polling0.078
G06F11/1474in transactions | (ref: G06F17/30286)|  takes precedence0.078
H04B2001/3866carried on the head0.078
G02B2027/0125Field-of-view increase by wavefront division0.078
G02B2027/0138comprising image capture systems  e.g. camera0.078
G02B6/0016Grooves  prisms  gratings  scattering particles or rough surfaces0.078
G02B2027/0178Eyeglass type  eyeglass details | (ref: G02C)0.078
G02B2027/0181Adaptation to the pilot/driver0.078
G02B2027/014comprising information/image processing systems0.078
G02B6/34utilising prism or grating | (ref: G02B6/293)|  takes precedence0.078
G02B2027/0127comprising devices increasing the depth of field0.078
Y04S40/00Communication or information technology specific aspects supporting electrical power generation  transmission  distribution or end-user application management0.078
H04L41/044Arrangements involving a hierarchical management structure0.078
H04W8/065involving selection of the user mobility server0.077
G07C2009/00825remotely by lines or wireless communication0.077
H04L2212/00Encapsulation of packets0.077
G06F2212/653Page colouring0.077
G06F2207/7219Countermeasures against side channel or fault attacks0.077
A61B2017/564Methods for bone or joint treatment0.077
H02J50/50using additional energy repeaters between transmitting devices and receiving devices0.077
H02J50/12of the resonant type0.077
H02J50/40using two or more transmitting or receiving devices | (ref: H02J50/50)|  takes precedence0.077
H04B5/0031for data transfer0.077
H02J50/60responsive to the presence of foreign objects  e.g. detection of living beings0.077
H04W36/0085Hand-off measurements0.077
H04W52/02Power saving arrangements | in wired systems | (ref: H04L12/12)| | signaling of mobile application services  e.g. low battery notifications | (ref: H04W4/20)0.077
H04L12/1845broadcast or multicast in a specific location  e.g. geocast | protocols for adapting network applications to user terminal location | (ref: H04L29/08657)| | services specially adapted for wireless communication networks making use of the location of users or terminals | (ref: H04W4/02)0.077
H04W74/02Hybrid access techniques0.077
G06F2206/1012Load balancing0.077
B60R2325/103Near field communication [NFC]0.077
G07C2009/00793by Hertzian waves0.077
H04L67/2838for integrating service provisioning from a plurality of service providers | web site content organization and management | (ref: G06F17/3089)0.077
H04B17/327Received signal code power [RSCP]0.077
H04B17/24with feedback of measurements to the transmitter0.077
H04W92/24between backbone network devices0.077
G06T2201/0051Embedding of the watermark in the spatial domain0.076
H04L2209/34Encoding or coding  e.g. Huffman coding or error correction0.076
G06T2201/0061Embedding of the watermark in each block of the image  e.g. segmented watermarking0.076
G06T2201/0083whereby only watermarked image required at decoder  e.g. source-based  blind  oblivious0.076
H04L2209/608Watermarking0.076
H04L41/048mobile agents0.076
G06N3/006based on simulated virtual individual or collective life forms  e.g. single "avatar"  social simulations  virtual worlds | computer games | (ref: A63F13/00)| | medical simulations | (ref: G06F19/00)| | information retrieval | (ref: G06F17/30873)| | image processing | (ref: G06T)| | telecommunication protocols | (ref: H04L29/06034)0.076
G06N7/005Probabilistic networks0.076
G06N3/088Non-supervised learning  e.g. competitive learning0.076
G06N3/0445Feedback networks  e.g. hopfield nets  associative networks0.076
G06F11/3452Performance evaluation by statistical analysis0.076
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.