Validity Report
Full Report
US6976248B2 — Application server facilitating with client's computer for applets along with various formats
Priority Date: 1998-03-18, Publication Date: 2005-12-13, Current Assignee: IMPLICIT LLCReport Generated: 2022-05-25

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
US5922044A1.450System and method for providing information to applets in a virtual machineGRANT1999-07-131996-12-1326717546Great3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
EP0878768B11.448Method and system for portably enabling awareness  touring  and conferencing over the world-wide web using proxies and shared-state serversGRANT2002-02-271997-05-1325320735GreatInternational Business Machines CorpInternational Business Machines Corp
US5805829A1.401Process for running applets over non-IP networksGRANT1998-09-081996-10-0124910493GreatInternational Business Machines CorpInternational Business Machines Corp
US5987523A1.368Applet redirection for controlled access to non-orginating hostsGRANT1999-11-161997-06-0425352006GreatInternational Business Machines CorpInternational Business Machines Corp
EP0817046A21.337CORBA and Java-based distributed object oriented systemGRANT1998-01-071996-07-0124705707GreatSun Microsystems IncOracle America Inc
EP0817031A21.290Using a distributed object system to find and download java-based applicationsGRANT1998-01-071996-07-0324711744GreatSun Microsystems IncSun Microsystems Inc
US6324574B11.261Relay server for unsigned appletsGRANT2001-11-271997-11-0725510990GreatInternational Business Machines CorpInternational Business Machines Corp
EP0895155B11.238Printer enclosing network computer and computer network system employing the sameGRANT2006-04-051997-08-0116552312GreatSharp CorpSharp Corp
US6032150A1.224Secure graphical objects in web documents with a program applet placed to present further information upon selected conditionsGRANT2000-02-291997-08-2525439795GreatPlanetweb IncTumbleweed Holdings LLC
EP0853279B11.199Method and apparatus for controlling software access to system resourcesGRANT2006-09-201997-01-0925120818GreatSun Microsystems IncSun Microsystems Inc
US5999941A1.176Database access using active server pagesGRANT1999-12-071997-11-2525525743GreatMicron Electronics IncWeb com Group Inc
US6874151B11.169Interprocess communication mechanism for heterogeneous computer processesGRANT2005-03-291997-07-1434136961GreatMicrosoft CorpMicrosoft Technology Licensing LLC
EP0834818B11.141System  method  apparatus and article of manufacture for identity based cachingGRANT2004-04-141996-07-0224709610GreatSun Microsystems IncSun Microsystems Inc
US5983348A1.128Computer network malicious code scannerGRANT1999-11-091997-09-1025453461GreatTrend Micro IncTrend Micro Inc, Jaco Inc
US5761421A1.125System and method for secure peer-to-peer communication between downloaded programsGRANT1998-06-021996-03-2524494257GreatSun Microsystems IncOracle America Inc
EP0824236A21.117Computer systemGRANT1998-02-181996-08-0810798197GreatInternational Business Machines CorpInternational Business Machines Corp
US6188400B11.092Remote scripting of local objectsGRANT2001-02-131997-03-3125251929GreatInternational Business Machines CorpInternational Business Machines Corp
US6542923B21.089Active electronic mailGRANT2003-04-011997-08-2125440790GreatPlanet Web IncTumbleweed Holdings LLC, Planet Web Inc
US6253228B11.045Method and apparatus for updating and synchronizing information between a client and a serverGRANT2001-06-261997-03-3125244265GreatApple Computer IncApple Inc
US6295551B11.039Call center system where users and representatives conduct simultaneous voice and joint browsing sessionsGRANT2001-09-251996-05-0721780317GreatCisco Technology IncCisco Technology Inc
US5802530A1.036Web document based graphical user interfaceGRANT1998-09-011996-07-0124709753GreatSun Microsystems IncOracle America Inc
US6343308B11.025Systems  methods and computer programs for mixing different versions of Java classesGRANT2002-01-291997-08-1425429817GreatInternational Business Machines CorpUster Technologies AG, International Business Machines Corp
US6131116A1.019System and method for globally accessing computer servicesGRANT2000-10-101996-12-1325076055GreatVisto CorpFB COMMERCIAL FINANCE Inc, Good Technology Corp
US6766454B11.012System and method for using an authentication applet to identify and authenticate a user in a computer networkGRANT2004-07-201997-04-0825410718GreatVisto CorpFB COMMERCIAL FINANCE Inc, Good Technology Corp
US5922050A0.986Method and apparatus for controlling a device on a networkGRANT1999-07-131996-07-0224722629GreatSun Microsystems IncOracle America Inc
US6643696B20.979Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource databaseGRANT2003-11-041997-03-2126818320GreatTHINKING MEDIA IncTNC US Holdings Inc
US5796952A0.978Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource databaseGRANT1998-08-181997-03-2125233632GreatDot Com Dev IncDOT COM DEVELOPMENT Inc, TNC US Holdings Inc
US6799195B10.970Method and apparatus for remote process control using appletsGRANT2004-09-281996-08-2024812561GreatInvensys Systems IncSchneider Electric Systems USA Inc
US6119165A0.936Controlled distribution of application programs in a computer networkGRANT2000-09-121997-11-1725519023GreatTrend Micro IncTrend Micro Inc
US5313635A0.927Compiling system for distributed computer system with multiple types of computersGRANT1994-05-171991-09-2617544023GreatMitsubishi Electric CorpMitsubishi Electric Corp
US6275938B10.919Security enhancement for untrusted executable codeGRANT2001-08-141997-08-2825442736GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US5870544A0.908Method and apparatus for creating a secure connection between a java applet and a web serverGRANT1999-02-091997-10-2025495688GreatInternational Business Machines CorpInternational Business Machines Corp
US7325077B10.878Miniclient for internet applianceGRANT2008-01-291997-08-2137574662GreatBeryl Technical Assays LLCIMPERIAL BANK, Intellectual Ventures I LLC
WO1998044424A10.876AUTOMATIC CONVERSION SYSTEMAPPLICATION1998-10-081997-03-2726323449Great
US5920725A0.871Run-time object-synthesis and transparent client/server updating of distributed objects using a meta server of all object descriptorsGRANT1999-07-061997-07-0225390969GreatAdaptivity IncAPEX INVESTMENT FUND V LP, NEW ENTERRISE ASSOCIATES 8A LP, NOKIA VENTURES LP, STAR BAY ASSOCIATES FUND LP, STAR BAY PARTNERS LP, STAR BAY TECHNOLOGY VENTURES IV LP, New Enterprise Associates VIII LP
US6073163A0.859Method and apparatus for enabling web-based execution of an applicationGRANT2000-06-061997-06-1025360273GreatOracle CorpOracle International Corp
US5923885A0.857Acquisition and operation of remotely loaded software using applet modification of browser softwareGRANT1999-07-131996-10-3124982941GreatSun Microsystems IncOracle America Inc
US7287271B10.856System and method for enabling secure access to services in a computer networkGRANT2007-10-231997-04-0832682906GreatVisto CorpFB COMMERCIAL FINANCE Inc, Good Technology Corp
US6014702A0.855Host information access via distributed programmed objectsGRANT2000-01-111997-06-0425352483GreatInternational Business Machines CorpInternational Business Machines Corp
US5706502A0.849Internet-enabled portfolio manager system and methodGRANT1998-01-061996-03-2524490754GreatSun Microsystems IncOracle America Inc
US6601108B10.842Automatic conversion systemGRANT2003-07-291997-03-2721917495GreatNetmask El Mar Internet Tech LtdGoogle LLC
US7039679B20.832System and method for globally and securely accessing unified information in a computer networkGRANT2006-05-021996-12-1331950873GreatVisto CorpGood Technology Corp
US5848246A0.828Object-oriented system  method and article of manufacture for a client-server session manager in an interprise computing framework systemGRANT1998-12-081996-07-0124709597GreatSun Microsystems IncOracle America Inc
US8117344B20.827Global server for authenticating access to remote servicesGRANT2012-02-141996-12-1336933085GreatVisto CorpGood Technology Holdings Ltd
US5649099A0.790Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server securityGRANT1997-07-151993-06-0422102692GreatXerox CorpXerox Corp
US5978834A0.789Platform independent computer interface software responsive to scripted commandsGRANT1999-11-021997-09-3025477319GreatUS Department of NavyUS Department of Navy
US6125387A0.787Operating methods for robust computer systems permitting autonomously switching between alternative/redundantGRANT2000-09-261997-09-3025476670GreatUS Department of NavyUS Department of Navy
US5944784A0.786Operating methods for a universal client device permittting a computer to receive and display information from several special applications simultaneouslyGRANT1999-08-311997-09-3025476669GreatUS Department of NavyNAVY SECRETARY OF AS REPRESENTED BY United States,, US Department of Navy
US6061727A0.781Robust computer systems permitting autonomously switching between alternative/redundant componentsGRANT2000-05-091997-09-3025476666GreatUS Department of NavyUS Department of Navy
US6209036B10.781Management of and access to information and other material via the world wide web in an LDAP environmentGRANT2001-03-271997-06-0625355965GreatInternational Business Machines CorpInternational Business Machines Corp
US6766366B10.778Method for loading a function provided by a first computer (server) onto a second computer (client)GRANT2004-07-201997-08-077838285GreatSiemens AGUnify GmbH and Co KG
US6061714A0.767Persistent cache synchronization and start up systemGRANT2000-05-091997-05-0725312866GreatInternational Business Machines CorpInternational Business Machines Corp
US5249293A0.760Computer network providing transparent operation on a compute server and associated methodGRANT1993-09-281989-06-2727005614GreatDigital Equipment CorpHewlett Packard Development Co LP
US5546583A0.754Method and system for providing a client/server interface in a programming languageGRANT1996-08-131994-04-0522835811GreatInternational Business Machines CorpInternational Business Machines Corp
US6865735B10.753Process for rewriting executable content on a network server or desktop machine in order to enforce site specific propertiesGRANT2005-03-081997-10-0734220923GreatUniversity of WashingtonUniversity of Washington
US6182129B10.752Apparatus  methods and computer program products for managing sessions with host-based application using session vectorsGRANT2001-01-301997-09-1125455483GreatInternational Business Machines CorpInternational Business Machines Corp
US6446070B10.751Method and apparatus for dynamic distributed computing over a networkGRANT2002-09-031998-02-2621856317GreatSun Microsystems IncOracle America Inc
US5944791A0.750Collaborative web browserGRANT1999-08-311996-10-0424918365GreatContigo Software LLCOpen Invention Network LLC, Intercall Inc US
US6018343A0.747Web calendar architecture and uses thereofGRANT2000-01-251996-09-2724898022GreatTimecruiser Computing CorpVivint Inc
US4949248A0.742System for shared remote access of multiple application programs executing in one or more computersGRANT1990-08-141988-07-1522821739GreatCANTOR FIRZGERALD SECURITIESCANTOR FIRZGERALD SECURITIES
US6065024A0.738Embedded HTML documents downloaded and displayed simultaneously with primary HTML documentGRANT2000-05-161996-07-1110796737GreatInternational Business Machines CorpInternational Business Machines Corp
US6438598B10.737System and method for transmitting data from a server application to more than one client nodeGRANT2002-08-201997-05-1425322753GreatCitrix Systems IncCitrix Systems Inc
US7418731B20.731Method and system for caching at secure gatewaysGRANT2008-08-261997-11-0646205207GreatFinjan Software LtdFinjan LLC
US5926631A0.730Network computer emulator systems  methods and computer program products for personal computersGRANT1999-07-201997-08-1525430922GreatInternational Business Machines CorpLenovo Singapore Pte Ltd
US6157944A0.730System and method for replicating a client/server data exchange to additional client notes connecting to the serverGRANT2000-12-051997-05-1425322553GreatCitrix Systems IncCitrix Systems Inc
US5586260A0.727Method and apparatus for authenticating a client to a server in computer systems which support different security mechanismsGRANT1996-12-171993-02-1221781468GreatDigital Equipment CorpHewlett Packard Development Co LP
US6718540B10.724Data processing system and method for storing data in a communication networkGRANT2004-04-061997-11-1732031260GreatInternational Business Machines CorpInternational Business Machines Corp
US5899990A0.721Java-to-Database Connectivity ServerGRANT1999-05-041997-03-3125259094GreatSun Microsystems IncOracle America Inc
US5235642A0.718Access control subsystem and method for distributed computer system using locally cached authentication credentialsGRANT1993-08-101992-07-2125439287GreatDigital Equipment CorpGoogle LLC
US6115040A0.718Graphical user interface for Web enabled applicationsGRANT2000-09-051997-09-2622030944GreatMCI Communications CorpVerizon Patent and Licensing Inc
US6292827B10.716Information transfer systems and method with dynamic distribution of data  control and management of informationGRANT2001-09-181997-06-2025375029GreatShore Tech 1999 IncGOLDEN SCREENS INTERACTIVE TECHNOLOGIES Inc, SHORE TECHNOLOGIES (1999) Inc, Shore Tech 1999 Inc
US5689638A0.714Method for providing access to independent network resources by establishing connection using an application programming interface function call without prompting the user for authentication dataGRANT1997-11-181994-12-1323397310GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US6370552B10.708Apparatus and method for displaying application output in an HTML documentGRANT2002-04-091997-05-1425322596GreatCitrix Systems IncCitrix Systems Inc
US6374305B10.707Web applications interface system in a mobile-based client-server systemGRANT2002-04-161997-07-2125408410GreatOracle CorpOracle International Corp
US6067575A0.707System and method for generating trusted  architecture specific  compiled versions of architecture neutral programsGRANT2000-05-231995-12-0824275282GreatSun Microsystems IncOracle America Inc
US6654793B10.706System and method for facilitating dynamic loading of stub information to enable a program operating in one address space to invoke processing of a remote method or procedure in another address spaceGRANT2003-11-251996-04-2324553013GreatSun Microsystems IncSun Microsystems Inc
US6728737B20.706Method and system for leasing storageGRANT2004-04-271996-10-1127366585GreatSun Microsystems IncSun Microsystems Inc
US6067623A0.704System and method for secure web server gateway access using credential transformGRANT2000-05-231997-11-2125524054GreatInternational Business Machines CorpInternational Business Machines Corp
US6263377B10.696Method for managing distributed applications and distributed application managerGRANT2001-07-171997-03-2825251622GreatInternational Business Machines CorpInternational Business Machines Corp
US6519615B10.695Method and system for leasing storageGRANT2003-02-111996-10-1124930946GreatSun Microsystems IncSun Microsystems Inc
US5671414A0.692Method and apparatus for providing simple secure management of remote serversGRANT1997-09-231994-12-1323397201GreatMicro Focus Software IncRPX Corp
US5996022A0.686Transcoding data in a proxy computer prior to transmitting the audio data to a clientGRANT1999-11-301996-06-0327097296GreatWebTV Networks IncRovi Technologies Corp
US6122666A0.684Method for collaborative transformation and caching of web objects in a proxy networkGRANT2000-09-191998-02-2321840028GreatInternational Business Machines CorpSnapchat Inc
US7490138B20.684System for distributed programmable controlGRANT2009-02-101996-05-3032045902GreatSchneider Automation IncSchneider Electric USA Inc
US5890158A0.683Method  apparatus  and program storage device for sharing objects with a network server and a database server using a common object modelGRANT1999-03-301997-03-3125251917GreatInternational Business Machines CorpInternational Business Machines Corp
US6078744A0.682Method and apparatus for improving compiler performance during subsequent compilations of a source programGRANT2000-06-201997-08-0125420583GreatSun Microsystems IncOracle America Inc
US6745229B10.681Web based integrated customer interface for invoice reportingGRANT2004-06-011997-09-2632328527GreatWorldcom IncVerizon Patent and Licensing Inc
US6163797A0.680Application dispatcher for seamless  server application support for network terminals and non-network terminalsGRANT2000-12-191996-08-0622395235GreatHewlett Packard CoHewlett Packard Enterprise Development LP
US5940074A0.678Remote upgrade of software over a networkGRANT1999-08-171996-06-0325038280GreatWebTV Networks IncRovi Technologies Corp
US6832223B10.673Method and system for facilitating access to a lookup serviceGRANT2004-12-141996-04-2333492623GreatSun Microsystems IncOracle America Inc
US6167441A0.668Customization of web pages based on requester typeGRANT2000-12-261997-11-2125524066GreatInternational Business Machines CorpPayPal Inc
US6708171B10.666Network proxyGRANT2004-03-161996-04-2323296420GreatSun Microsystems IncOracle America Inc
US6473099B10.660Automatically upgrading software over a satellite linkGRANT2002-10-291996-06-0346277091GreatWebTV Networks IncRovi Technologies Corp
US5692047A0.654System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sourcesGRANT1997-11-251995-12-0824275287GreatSun Microsystems IncOracle America Inc
US6223217B10.654Distributed object networking serviceGRANT2001-04-241994-02-0822713171GreatObject Technology Licensing CorpApple Inc
US6466328B10.652System and method for remote printing in a distributed network environmentGRANT2002-10-151997-01-0325113994GreatNCR CorpRPX Corp
US6286003B10.652Remote controlling method a network server remote controlled by a terminal and a memory storage medium for HTML filesGRANT2001-09-041997-04-2214395747GreatInternational Business Machines CorpInternational Business Machines Corp
US6085249A0.651Method and apparatuses for transferring data for multiple applications through a single communication link in response to authentication informationGRANT2000-07-041997-10-2446254667GreatPictra IncKDL Scan Designs LLC, Deep River Systems LLC, Hanger Solutions LLC
US5761507A0.650Client/server architecture supporting concurrent servers within a server with a transaction manager providing server/connection decouplingGRANT1998-06-021996-03-0524447022GreatInternational Business Machines CorpGlobalFoundries Inc
USRE41210E10.646Method and apparatuses for transferring data for multiple applications through a single communication link in response to authentication informationGRANT2010-04-061997-10-2425499252GreatFotoMedia Tech LLCHanger Solutions LLC
US7225249B10.642Integrated systems for providing communications network management services and interactive generating invoice documentsGRANT2007-05-291997-09-2638056857GreatMCI LLCVerizon Patent and Licensing Inc
US6085224A0.641Method and system for responding to hidden data and programs in a datastreamGRANT2000-07-041997-03-1125226415GreatIntracept IncIntracept Inc
US6385728B10.640SYSTEM  METHOD  AND PROGRAM FOR PROVIDING WILL-CALL CERTIFICATES FOR GUARANTEEING AUTHORIZATION FOR A PRINTER TO RETRIEVE A FILE DIRECTLY FROM A FILE SERVER UPON REQUEST FROM A CLIENT IN A NETWORK COMPUTER SYSTEM ENVIRONMENTGRANT2002-05-071997-11-2625526390GreatInternational Business Machines CorpRicoh Co Ltd
US5721908A0.637Computer network for WWW server data access over internetGRANT1998-02-241995-06-0723884121GreatInternational Business Machines CorpGoogle LLC
US5640564A0.636Method and apparatus for generating and using short operation identifiers in object oriented systemsGRANT1997-06-171994-05-2622945442GreatSun Microsystems IncSun Microsystems Inc
US5987256A0.635System and process for object rendering on thin client platformsGRANT1999-11-161997-09-0325447739GreatEnreach Technology IncHanger Solutions LLC
EP0913769A20.635Method and apparatus for pre-processing and packaging class filesGRANT1999-05-061997-10-3125505128GreatSun Microsystems IncSun Microsystems Inc
US6219787B10.631Method and apparatus for extending security model to native codeGRANT2001-04-171997-12-2225541995GreatTexas Instruments IncTexas Instruments Inc
US6473407B10.628Integrated proxy interface for web based alarm management toolsGRANT2002-10-291997-09-0526740188GreatWorldcom IncVerizon Patent and Licensing Inc
US7734747B20.628Dynamic lookup service in a distributed systemGRANT2010-06-081998-02-2621935114GreatOracle America IncOracle America Inc
US5875296A0.627Distributed file system web server user authentication with cookiesGRANT1999-02-231997-01-2825149470GreatInternational Business Machines CorpAlibaba Group Holding Ltd
US6393475B10.627Method of performing a network management transaction using a web-capable agentGRANT2002-05-211997-07-2825413737GreatNortel Networks LtdRPX Clearinghouse LLC
US5951648A0.623Reliable event delivery systemGRANT1999-09-141997-03-0325202751GreatMylex CorpSeagate Systems UK Ltd
US5991802A0.622Method and system for invoking methods of objects over the internetGRANT1999-11-231996-11-2725043214GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US6233584B10.622Technique for providing a universal query for multiple different databasesGRANT2001-05-151997-09-0925452689GreatInternational Business Machines CorpInternational Business Machines Corp
US6189032B10.620Client-server system for controlling access rights to certain services by a user of a client terminalGRANT2001-02-131997-02-2712672129GreatHitachi LtdHitachi Ltd
US7058600B10.614Integrated proxy interface for web based data management reportsGRANT2006-06-061997-09-2636569042GreatMCI LLCVerizon Business Global LLC, Verizon Patent and Licensing Inc
US6054983A0.790Methods for operating a universal client device permitting interoperation between any two computersGRANT2000-04-251997-09-3025476191GoodUS Department of NavyUS Department of Navy
US6005568A0.768Computer system providing platform independent universal client deviceGRANT1999-12-211997-09-3025476189GoodUS Department of NavyUS Department of Navy
US5815718A0.609Method and system for loading classes in read-only memoryGRANT1998-09-291996-05-3024629025GoodSun Microsystems IncOracle America Inc
US5696901A0.608Remote information service access system based on a client-server-service modelGRANT1997-12-091993-01-0821698695Good
US6487607B10.608Methods and apparatus for remote method invocationGRANT2002-11-261998-02-2626722184GoodSun Microsystems IncOracle America Inc
US6446081B10.607Data input and retrieval apparatusGRANT2002-09-031997-12-1710823759GoodBritish Telecommunications PLCBritish Telecommunications PLC
US6279151B10.604Method and apparatus for remote source code inclusionGRANT2001-08-211998-01-2021736767GoodInternational Business Machines CorpInternational Business Machines Corp
US6173290B10.604Method and apparatus for coupling object state and behavior in a database management systemGRANT2001-01-091996-09-2624893176GoodSun Microsystems IncSun Microsystems Inc
US6473609B10.603Method and architecture for interactive two-way communication devices to interact with a networkGRANT2002-10-291995-12-1122546713GoodOpenwave Systems IncUnwired Planet LLC, Unwired Planet IP Manager LLC
US5862339A0.603Client connects to an internet access provider using algorithm downloaded from a central server based upon client's desired criteria after disconnected from the serverGRANT1999-01-191996-07-0924720612GoodWebTV Networks IncMicrosoft Technology Licensing LLC
US5918013A0.601Method of transcoding documents in a network environment using a proxy serverGRANT1999-06-291996-06-0324635137GoodWebTV Networks IncRovi Technologies Corp
US6121970A0.601Method and system for HTML-driven interactive image clientGRANT2000-09-191997-11-2625526792GoodMGI Software CorpTumbleweed Holdings LLC
US6694511B10.599Data processing method and deviceGRANT2004-02-171995-07-1416051731GoodSony CorpSony Corp
US6456308B10.598Embedded web serverGRANT2002-09-241996-08-0827487207GoodAgranat Systems IncConexant Systems LLC
US6112250A0.597Recompression of files at an intermediate node in a network systemGRANT2000-08-291996-04-1124528800GoodAmerica Online IncMeta Platforms Inc
US5996010A0.596Method of performing a network management transaction using a web-capable agentGRANT1999-11-301996-08-2926698888GoodNortel Networks CorpRPX Clearinghouse LLC
US6763376B10.596Integrated customer interface system for communications network managementGRANT2004-07-131997-09-2632684430GoodMCI Communications CorpVerizon Patent and Licensing Inc
US5950008A0.593System and method for resolving symbolic references to externally located program filesGRANT1999-09-071995-12-0824276691GoodSun Microsystems IncOracle America Inc
US6347398B10.592Automatic software downloading from a computer networkGRANT2002-02-121996-12-1225069524GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7650407B20.592Content display monitorGRANT2010-01-191996-09-0324841079GoodNielsen Co US LLCNUWEB (AKA PACIFIC WEB) A CALIFORNIA Corp, comScore Inc
US5995756A0.592System for internet-based delivery of computer applicationsGRANT1999-11-301997-02-1425177156GoodBorland Software CorpBorland Software Corp
US5943496A0.591Methods for developing and instantiating object classes using a java virtual machine extensionGRANT1999-08-241997-05-1725327464GoodIntertop CorpIntertop Corp
US6629154B10.590Method and system for deterministic hashes to identify remote methodsGRANT2003-09-301998-02-2626723052GoodSun Microsystems IncSun Microsystems Inc
US6170083B10.590Method for performing dynamic optimization of computer codeGRANT2001-01-021997-11-1225514407GoodIntel CorpIntel Corp
US5872915A0.589Computer apparatus and method for providing security checking for software applications accessed via the World-Wide WebGRANT1999-02-161996-12-2325096070GoodInternational Business Machines CorpInternational Business Machines Corp
US5548723A0.588Object-oriented network protocol configuration system utilizing a dynamically configurable protocol stackGRANT1996-08-201993-12-1722617510GoodTaligent IncApple Inc
US4780821A0.587Method for multiple programs management within a network having a server computer and a plurality of remote computersGRANT1988-10-251986-07-2925396610GoodInternational Business Machines CorpInternational Business Machines Corp
US5973696A0.587Embedded web serverGRANT1999-10-261996-08-0821814714GoodAgranat Systems IncConexant Systems LLC
US6473768B10.587System and method for modifying an executing applicationGRANT2002-10-291996-11-1226706134GoodComputer Associates Think IncCA Inc
US6240450B10.585Network data visualization system and method for downloading visualization software to a user station after user authenticationGRANT2001-05-291995-10-1626140399GoodBritish Telecommunications PLCBritish Telecommunications PLC
US5889951A0.584Systems  methods  and computer program products for accessing  leasing  relocating  constructing and modifying internet sites within a multi-dimensional virtual reality environmentGRANT1999-03-301996-05-1324597568GoodViewpoint CorpVIOS Inc
WO1999026122A20.584PROCESSING REQUESTS FOR SERVICE OF A PHYSICAL FACILITYAPPLICATION1999-05-271997-11-1825520074Good
US5848274A0.583Incremental byte code compilation systemGRANT1998-12-081996-02-2924591135GoodSupercede IncOpen Invention Network LLC
US4953084A0.581Method and apparatus using variable ranges to support symbolic debugging of optimized codeGRANT1990-08-281987-11-1622395855GoodHewlett Packard CoHP Inc
US6295645B10.581Method and apparatus for providing downloadable functionality to an embedded coprocessorGRANT2001-09-251997-12-2225541986GoodTexas Instruments IncTexas Instruments Inc
US6230204B10.580Method and system for estimating usage of computer resourcesGRANT2001-05-081997-12-1925541119GoodMicron Electronics IncMei California Inc
US6247052B10.579Graphic user interface system for a telecommunications switch management systemGRANT2001-06-121997-12-2325543915GoodAlcatel USA Sourcing IncSound View Innovations LLC
US6370570B10.577Method and apparatus for making a hypermedium interactiveGRANT2002-04-091995-11-1324222134GoodCitrix Systems IncCitrix Systems Inc
US6901425B10.577Computer apparatus and method including a disconnect mechanism for communicating between software applications and computers on the world-wide webGRANT2005-05-311996-12-2334592658GoodInternational Business Machines CorpInternational Business Machines Corp
US5974256A0.575Method for translating graphical user interface (GUI) resource data into native java codeGRANT1999-10-261997-09-2925473997GoodInternational Business Machines CorpInternational Business Machines Corp
US5970249A0.574Method and apparatus for performing byte-code optimization during pausesGRANT1999-10-191997-10-0625481974GoodSun Microsystems IncOracle America Inc
US6125384A0.573Computer apparatus and method for communicating between software applications and computers on the world-wide webGRANT2000-09-261996-12-2325118290GoodInternational Business Machines CorpInternational Business Machines Corp
US6178440B10.570Distributed transaction processing system implementing concurrency control within the object request broker and locking all server objects involved in a transaction at its startGRANT2001-01-231997-01-2510806597GoodInternational Business Machines CorpInternational Business Machines Corp
US6859783B20.569Integrated interface for web based customer care and trouble managementGRANT2005-02-221995-12-2926740187GoodWorldcom IncVerizon Business Global LLC, Verizon Patent and Licensing Inc
US5995754A0.569Method and apparatus for dynamically optimizing byte-coded programsGRANT1999-11-301997-10-0625481212GoodSun Microsystems IncOracle America Inc
US6950991B20.567Interacting with software applications displayed in a web pageGRANT2005-09-271995-11-1327375491GoodCitrix Systems IncCitrix Systems Inc
US5991399A0.566Method for securely distributing a conditional use private key to a trusted entity on a remote systemGRANT1999-11-231997-12-1825539740GoodIntel CorpHoneyman Cipher Solutions LLC
US7613926B20.564Method and system for protecting a computer and a network from hostile downloadablesGRANT2009-11-031997-11-0646324011GoodFinjan Software LtdFinjan LLC
US5457797A0.562Flexible multi-platform partitioning for computer applicationsGRANT1995-10-101993-08-0322284511GoodForte Software IncSun Microsystems Inc
US6185609B10.561Method  apparatus and program to provide client access to a management information service residing on a server in a computer network systemGRANT2001-02-061997-10-2425499467GoodSun Microsystems IncMitsubishi Chemical Corp, Oracle America Inc
US6714979B10.560Data warehousing infrastructure for web based reporting toolGRANT2004-03-301997-09-2631996450GoodWorldcom IncVerizon Patent and Licensing Inc
US6515968B10.560Integrated interface for real time web based viewing of telecommunications network call trafficGRANT2003-02-041995-03-1727369878GoodWorldcom IncVerizon Patent and Licensing Inc
US6802061B10.558Automatic software downloading from a computer networkGRANT2004-10-051996-12-1233032661GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6212673B10.558Component-neutral builder interfaceGRANT2001-04-031997-03-3127584610GoodInternational Business Machines CorpInternational Business Machines Corp
US8079086B10.552Malicious mobile code runtime monitoring system and methodsGRANT2011-12-131997-11-0636642059GoodFinjan IncFinjan LLC
US6345291B20.552Multiplexing of clients and applications among multiple serversGRANT2002-02-051996-06-0326691880GoodInternational Business Machines CorpInternational Business Machines Corp
US6035323A0.550Methods and apparatuses for distributing a collection of digital media over a network with automatic generation of presentable mediaGRANT2000-03-071997-10-2425499263GoodPictra IncHanger Solutions LLC
US6151606A0.549System and method for using a workspace data manager to access  manipulate and synchronize network dataGRANT2000-11-211998-01-1621731160GoodVisto CorpFB COMMERCIAL FINANCE Inc, BlackBerry Ltd
US9219755B20.548Malicious mobile code runtime monitoring system and methodsGRANT2015-12-221996-11-0855018096GoodFinjan IncFinjan LLC
US6618854B10.548Remotely accessible integrated debug environmentGRANT2003-09-091997-02-1825183576GoodAdvanced Micro Devices IncAdvanced Micro Devices Inc
US6205469B10.543Method for client-server communications through a minimal interfaceGRANT2001-03-201997-05-2725341984GoodYahoo IncOath Inc
US6094679A0.543Distribution of software in a computer network environmentGRANT2000-07-251998-01-1621732072GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5784553A0.542Method and system for generating a computer program test suite using dynamic symbolic execution of JAVA programsGRANT1998-07-211996-01-1646252615GoodParasoft CorpParasoft Corp
US8898746B20.540Method for managing access to protected computer resourcesGRANT2014-11-251997-06-1141118015GoodPrism Technologies LLCPrism Technologies LLC
US5884078A0.540System  method and article of manufacture for creating an object oriented component having multiple bidirectional ports for use in association with a java application or appletGRANT1999-03-161997-01-3125156234GoodSun Microsystems IncOracle America Inc
US5822585A0.537System and method for cooperative processing using object-oriented frameworkGRANT1998-10-131995-02-2123545244GoodCompuware CorpBMC Software Inc
US6011905A0.534Using fontless structured document image representations to render displayed and printed documents at preferred resolutionsGRANT2000-01-041996-05-2324618504GoodXerox CorpXerox Corp
US5706427A0.534Authentication method for networksGRANT1998-01-061995-09-0826529726GoodCadix IncIDENTITY VERIFICATION SOLUTIONS LLC
US5500881A0.533Language scoping for modular  flexible  concise  configuration descriptionsGRANT1996-03-191993-07-1222224593GoodDigital Equipment CorpHewlett Packard Development Co LP
US5375239A0.533Use of build status indicators in connection with building of complex computer programs from source code partsGRANT1994-12-201992-02-174149269GoodInternational Business Machines CorpInternational Business Machines Corp
US5881287A0.533Method and apparatus for copy protection of images in a computer systemGRANT1999-03-091994-08-1223111929GoodIntellectual Ventures Fund 83 LLCIntellectual Ventures Fund 83 LLC
US6532465B20.532Operational system for operating on client defined rulesGRANT2003-03-111998-03-1226759612Good
US5440744A0.527Methods and apparatus for implementing server functions in a distributed heterogeneous environmentGRANT1995-08-081990-08-1424265845GoodDigital Equipment CorpHewlett Packard Development Co LP
US6226412B10.527Secure digital interactive system for unique product identification and salesGRANT2001-05-011995-03-2423624204GoodVOIT TECHNOLOGIES LLCVOIT TECHNOLOGIES LLC
US5341478A0.526Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environmentGRANT1994-08-231990-08-1424266957GoodDigital Equipment CorpOracle International Corp
US6002873A0.521Compiler-assisted or interpreter-assisted windowing solution to the year 2000 problem for computer programsGRANT1999-12-141997-07-2325410987GoodInternational Business Machines CorpElectronics and Telecommunications Research Institute ETRI, International Business Machines Corp
US6651109B10.515Inter-object messagingGRANT2003-11-181997-03-3129420882GoodIntel CorpBRIGHTTEAM SOFTWARE Inc, Intel Corp
US6083279A0.515Platform independent technique for transferring software programs over a networkGRANT2000-07-041996-10-1024925925GoodInternational Business Machines CorpInternational Business Machines Corp
US5136716A0.515SESSION CONTROL IN NETWORK FOR DIGITAL DATA PROCESSING SYSTEM WHICH SUPPORTS MULTIPLE TRANSFER PROTOCOLSGRANT1992-08-041987-09-0422244398GoodDigital Equipment CorpEnterasys Networks Inc
US6134597A0.514CRC hash compressed server object identifierGRANT2000-10-171997-05-2825342420GoodInternational Business Machines CorpInternational Business Machines Corp
US5165018A0.513SELF-CONFIGURATION OF NODES IN A DISTRIBUTED MESSAGE-BASED OPERATING SYSTEMGRANT1992-11-171987-01-0521692296GoodMotorola IncMotorola Solutions Inc
US5987608A0.510Java security mechanismGRANT1999-11-161997-05-1325323734GoodNetscape Communications CorpMeta Platforms Inc
US20020091874A10.509Deferred reconstruction of objects and remote loading for event notification in a distributed systemAPPLICATION2002-07-111997-10-1526722154GoodSun Microsystems IncSun Microsystems Inc
US6381644B20.507Integrated proxy interface for web based telecommunications network managementGRANT2002-04-301997-09-2626740181GoodMCI Worldcom IncVerizon Patent and Licensing Inc
EP0476667A20.507Generating symbolic debug information in a translator environmentGRANT1992-03-251990-09-2124346081GoodHewlett Packard CoHP Inc
US6151703A0.507Development system with methods for just-in-time compilation of programsGRANT2000-11-211996-05-2024609239GoodBorland Software CorpBorland Software Corp
US5953525A0.506Multi-tier view project windowGRANT1999-09-141997-03-3125251924GoodInternational Business Machines CorpInternational Business Machines Corp
US6604144B10.506Data format for multimedia object storage  retrieval and transferGRANT2003-08-051997-06-3027623450GoodMicrosoft CorpMicrosoft Technology Licensing LLC
WO1995000901A10.504INCREMENTAL BUILD SYSTEMAPPLICATION1995-01-051993-06-2822191926Good
US5946487A0.501Object-oriented multi-media architectureGRANT1999-08-311996-06-1024652550GoodLSI Logic CorpAvago Technologies International Sales Pte Ltd, EMC Corp
US6076092A0.496System and process for providing improved database interfacing using query objectsGRANT2000-06-131997-08-1925434309GoodSun Microsystems IncOracle America Inc
US5561797A0.496Method for synchronizing transaction processing in a distributed heterogeneous systemGRANT1996-10-011993-03-1521863045GoodInternational Business Machines CorpInternational Business Machines Corp
US6269403B10.492Browser and publisher for multimedia object storage  retrieval and transferGRANT2001-07-311997-06-3025386052GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5175856A0.487COMPUTER WITH INTEGRATED HIERARCHICAL REPRESENTATION (IHR) OF PROGRAM WHEREIN IHR FILE IS AVAILABLE FOR DEBUGGING AND OPTIMIZING DURING TARGET EXECUTIONGRANT1992-12-291990-06-1127065499GoodSupercomputer Systems LPSilicon Graphics International Corp, Morgan Stanley and Co LLC, IBM Holdings Inc
US5630066A0.487System and method for locating object view and platform independent objectGRANT1997-05-131994-12-2023415694GoodSun Microsystems IncOracle America Inc
US7925898B20.486Systems and methods using cryptography to protect secure computing environmentsGRANT2011-04-121996-08-1224769786GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6035121A0.486Method and system for localizing a computer programGRANT2000-03-071997-07-0725394049GoodNetscape Communications CorpMeta Platforms Inc
US6154844A0.484System and method for attaching a downloadable security profile to a downloadableGRANT2000-11-281996-11-0825542059GoodFinjan Software LtdFinjan LLC
US5920848A0.483Method and system for using intelligent agents for financial transactions  services  accounting  and adviceGRANT1999-07-061997-02-1221892269GoodCitibank NACitibank NA
US6801911B10.482Data processing system and method for accessing filesGRANT2004-10-051997-11-2133030340GoodInternational Business Machines CorpInternational Business Machines Corp
US6145119A0.481Programming development environment for intranet and internet applications employing unique project data structureGRANT2000-11-071997-03-3125252927GoodInternational Business Machines CorpInternational Business Machines Corp
US6092194A0.481System and method for protecting a computer and a network from hostile downloadablesGRANT2000-07-181996-11-0821855184GoodFinjan Software LtdFinjan LLC
US5961590A0.480System and method for synchronizing electronic mail between a client site and a central siteGRANT1999-10-051997-04-1125408591GoodRoamPage IncFB COMMERCIAL FINANCE Inc, Good Technology Corp
US6011537A0.480System for delivering and simultaneously displaying primary and secondary information  and for displaying only the secondary information during interstitial spaceGRANT2000-01-041997-01-2726713190GoodCxt Systems IncCxt Systems Inc
US5109486A0.478Distributed computer system with network and resource status monitoringGRANT1992-04-281989-01-0623131626GoodMotorola IncMotorola Solutions Inc
US5911776A0.475Automatic format conversion system and publishing methodology for multi-user networkGRANT1999-06-151996-12-1825082354GoodUnisys CorpUnisys Corp
US5801679A0.474Method and system for determining a cursor location with respect to a plurality of character locationsGRANT1998-09-011996-11-2625040854GoodMicro Focus Software IncRPX Corp
WO1998025373A20.473WEB SITE COPY PROTECTION SYSTEM AND METHODAPPLICATION1998-06-111996-11-2121859386Good
US5204960A0.472Incremental compilerGRANT1993-04-201990-01-0823836663GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US4809170A0.471Computer device for aiding in the development of software systemGRANT1989-02-281987-04-2221936439GoodApollo Computer IncHP Inc, Apollo Computer Inc
US7701606B20.471Java printer with a printer control interface in a form of a web pageGRANT2010-04-201996-05-1421782369GoodRicoh Co LtdRicoh Co Ltd
US6496870B10.471System  method and article of manufacture for collaboration with an applicationGRANT2002-12-171997-01-3125156230GoodSun Microsystems IncOracle America Inc
WO1995000904A10.469INCREMENTAL LINKER SYSTEMAPPLICATION1995-01-051993-06-2822191952Good
US6377978B10.468Dynamic downloading of hypertext electronic mail messagesGRANT2002-04-231996-09-1324878841GoodPlanetweb IncIntellectual Ventures I LLC
US8995316B20.467Mobile telephone for internet applicationsGRANT2015-03-311997-10-1526040846GoodNokia OyjNokia Technologies Oy
US5968119A0.467Method of accessing information of an SNA host computer from a client computer using a specific terminal emulationGRANT1999-10-191996-12-0925064558GoodWall Data IncMicro Focus US Inc
US5414855A0.467Language compilerGRANT1995-05-091992-08-128209908GoodInternational Business Machines CorpInternational Business Machines Corp
US6185733B10.467Method and apparatus for remote object code inclusionGRANT2001-02-061998-01-2021737688GoodInternational Business Machines CorpInternational Business Machines Corp
US6480959B10.465Software system and associated methods for controlling the use of computer programsGRANT2002-11-121997-12-0526748333GoodJamama LLCELECTRIC IMAGE Inc, Tumbleweed Holdings LLC
US5060150A0.465Process creation and termination monitors for use in a distributed message-based operating systemGRANT1991-10-221987-01-0527356698GoodMotorola IncMotorola Solutions Inc
US6249817B10.460Data-update monitoring in communications networkGRANT2001-06-191996-04-3026467298GoodSeiko Epson Corp, A I Soft CorpSeiko Epson Corp, A I Soft Corp
US6412107B10.457Method and system of providing dynamic optimization information in a code interpretive runtime environmentGRANT2002-06-251998-02-2722130401GoodTexas Instruments IncTexas Instruments Inc
US5835712A0.456Client-server system using embedded hypertext tags for application and database developmentGRANT1998-11-101996-05-0324576502GoodWebmate Tech IncOpen Invention Network LLC
US5490271A0.452Remote interrupt processing over a networkGRANT1996-02-061989-05-1523383699GoodInternational Business Machines CorpInternational Business Machines Corp
US6148346A0.451Dynamic device driverGRANT2000-11-141996-06-2024676505GoodPeerless Systems Imaging Products IncPeerless Systems Imaging Products Inc
US6389540B10.450Stack based access control using code and executor identifiersGRANT2002-05-141998-02-2626722146GoodSun Microsystems IncSun Microsystems Inc
US5761477A0.449Methods for safe and efficient implementations of virtual machinesGRANT1998-06-021995-12-0424263626GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6052780A0.449Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital informationGRANT2000-04-181996-09-1226700571GoodOpen Security Solutions LLCRPX Corp, Open Security Solutions LLC
US5715403A0.449System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammarGRANT1998-02-031994-11-2323348787GoodXerox CorpContentguard Holdings Inc
US5778372A0.448Remote retrieval and display management of electronic document with incorporated imagesGRANT1998-07-071996-04-1824543544GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7149789B20.445Distributing software via distribution filesGRANT2006-12-121996-04-1824543580GoodMicrosoft CorpZhigu Holdings Ltd
US5909580A0.444Development system and methods with direct compiler support for detecting invalid use and management of resources and memory at runtimeGRANT1999-06-011996-02-0824395054GoodBorland Software CorpCODEGEAR LLC
US5765152A0.442System and method for managing copyrighted electronic mediaGRANT1998-06-091995-10-1324166835GoodDartmouth CollegeDartmouth College, Digimarc Corp
US5347632A0.442Reception system for an interactive computer network and method of operationGRANT1994-09-131988-07-1526914408GoodProdigy Services CoPRIODGY SERVICES COMPANY A NY PARTNERSHIP, International Business Machines Corp
US5371747A0.442Debugger program which includes correlation of computer program source code with optimized object codeGRANT1994-12-061992-06-0525402045GoodConvex Computer CorpHP Inc
US6957427B10.441Remote object activation in a distributed systemGRANT2005-10-181997-10-1525490834GoodSun Microsystems IncOracle America Inc
US5446899A0.440Hint generation in smart recompilationGRANT1995-08-291992-06-2625422095GoodDigital Equipment CorpHewlett Packard Development Co LP
US5764947A0.439System and method for automatically interfacing call conventions between two dissimilar program unitsGRANT1998-06-091991-03-0724672537GoodDigital Equipment CorpHewlett Packard Development Co LP
US8412778B20.438Junk electronic mail detector and eliminatorGRANT2013-04-021997-11-2533488841Good
US5920721A0.437Compiler generating functionally-alike code sequences in an executable program intended for execution in different run-time environmentsGRANT1999-07-061997-06-1125361066GoodDigital Equipment CorpHewlett Packard Enterprise Development LP
US5968131A0.437System and method for securely synchronizing multiple copies of a workspace element in a networkGRANT1999-10-191997-04-1125270973GoodRoamPage IncFB COMMERCIAL FINANCE Inc, Good Technology Corp
US5459868A0.435Interpretive object-oriented facility which can access pre-compiled classesGRANT1995-10-171990-11-3026745620GoodST Computer Systems and ServicesST Computer Systems and Services, Singapore Computer Systems Ltd
US6463467B10.433Method and apparatus of secure server control of local media via a trigger through a network for instant local access of encrypted data on an internet webpageGRANT2002-10-081995-12-0727504875GoodHyperLOCK Tech IncApple Inc, HyperLOCK Tech Inc
US5307499A0.430Interpretive object-oriented facility which can access pre-compiled classesGRANT1994-04-261990-11-3024491467GoodSingapore Computer Systems LtdSingapore Computer Systems Ltd
US5325531A0.429Compiler using clean lines table with entries indicating unchanged text lines for incrementally compiling only changed source text linesGRANT1994-06-281989-06-3023480753GoodDigital Equipment CorpHewlett Packard Development Co LP
US5265254A0.429System of debugging software through use of code markers inserted into spaces in the source code during and after compilationGRANT1993-11-231991-08-1424994207GoodHewlett Packard CoAgilent Technologies Inc
US6115550A0.428Loader conditionally replacing a code sequence with a functionally-alike code sequence in an executable program intended for execution in different run-time environmentsGRANT2000-09-051997-06-1125361062GoodDigital Equipment CorpHewlett Packard Enterprise Development LP
US5193191A0.428Incremental linking in source-code development systemGRANT1993-03-091989-06-3023480739GoodDigital Equipment CorpHewlett Packard Development Co LP
US4891785A0.426Method for transferring data files between computers in a network response to generalized application program instructionsGRANT1990-01-021988-07-0822808442Good
US5842017A0.424Method and apparatus for forming a translation unitGRANT1998-11-241996-01-2924376032GoodDigital Equipment CorpHewlett Packard Enterprise Development LP
US5758068A0.424Method and apparatus for software license managementGRANT1998-05-261995-09-1924112239GoodInternational Business Machines CorpInternational Business Machines Corp
US5590331A0.423Method and apparatus for generating platform-standard object files containing machine-independent codeGRANT1996-12-311994-12-2323431532GoodSun Microsystems IncOracle America Inc
US5170465A0.423Incremental-scanning compiler for source-code development systemGRANT1992-12-081989-06-3023480674GoodDigital Equipment CorpHewlett Packard Development Co LP
WO1999031576A10.423COMBINING MULTIPLE CLASS FILES INTO RUN-TIME IMAGEAPPLICATION1999-06-241997-12-1625537278Good
US5182806A0.422Incremental compiler for source-code development systemGRANT1993-01-261989-06-3023480734GoodDigital Equipment CorpHewlett Packard Development Co LP
US6041356A0.421Method and apparatus for detecting network traffic and initiating a dial-up connection using separate upstream and downstream devicesGRANT2000-03-211997-03-3125254932GoodIntel CorpIntel Corp
US6202092B10.421Print system managing the security of a printer shared on a networkGRANT2001-03-131996-11-2718069210GoodNEC CorpNEC Corp
US6633861B20.420Automatic invocation of computational resources without user intervention across a networkGRANT2003-10-141993-03-1927488218GoodRicoh Co Ltd, Ricoh Americas CorpRicoh Co Ltd, Ricoh Americas Corp
US5937193A0.420Circuit arrangement for translating platform-independent instructions for execution on a hardware platform and method thereofGRANT1999-08-101996-11-2725047791GoodVLSI Technology IncIntellectual Ventures II LLC
US6032184A0.420Integrated interface for Web based customer care and trouble managementGRANT2000-02-291995-12-2946255174GoodMCI Worldcom IncVerizon Patent and Licensing Inc
US6085120A0.420Data system processing and method for creating application extensionGRANT2000-07-041997-11-1725518129GoodInternational Business Machines CorpInternational Business Machines Corp
US5535392A0.419Using hint generation to cause portions of object files to remain the sameGRANT1996-07-091992-06-2626916936GoodDigital Equipment CorpHewlett Packard Development Co LP
US5517622A0.418Method and apparatus for pacing communications in a distributed heterogeneous networkGRANT1996-05-141991-04-1124750674GoodGalileo International PartnershipGalileo International LLC
US6118940A0.417Method and apparatus for benchmarking byte code sequencesGRANT2000-09-121997-11-2525526165GoodInternational Business Machines CorpInternational Business Machines Corp
US5801689A0.417Hypertext based remote graphic user interface control systemGRANT1998-09-011996-01-2224399699GoodExtended Systems IncExtended Systems Inc
US5339422A0.417System and method for jacketing cross-domain calls in a multi-code execution and debugging system within a multi-architecture environmentGRANT1994-08-161991-03-0724671439GoodDigital Equipment CorpHewlett Packard Development Co LP
US5659753A0.416Interface for symbol table construction in a multilanguage optimizing compilerGRANT1997-08-191991-02-2726935975GoodDigital Equipment CorpHewlett Packard Development Co LP
US5014192A0.415System for locating a file in a logical ring by sequentially forwarding access request with file system name and file nameGRANT1991-05-071985-05-0627380888GoodMotorola Computer X IncMotorola Solutions Inc
US6023708A0.415System and method for using a global translator to synchronize workspace elements across a networkGRANT2000-02-081997-05-2926794314GoodVisto CorpFB COMMERCIAL FINANCE Inc, Good Technology Corp
US5201050A0.415Line-skip compiler for source-code development systemGRANT1993-04-061989-06-3023480760GoodDigital Equipment CorpHewlett Packard Development Co LP
US6115793A0.414Mapping logical cache indexes to physical cache indexes to reduce thrashing and increase cache sizeGRANT2000-09-051998-02-1121808614GoodATI Technologies ULCATI Technologies ULC
US5857101A0.414Program lunch accelerationGRANT1999-01-051997-04-1525280523GoodAcceleration Software International CorpEacceleration Corp
US5432795A0.413System for reporting errors of a translated program and using a boundry instruction bitmap to determine the corresponding instruction address in a source programGRANT1995-07-111991-03-0727099354GoodDigital Equipment CorpHewlett Packard Development Co LP
US6560656B10.413Apparatus and method for providing downloadable code for use in communicating with a device in a distributed systemGRANT2003-05-061998-02-2626722185GoodSun Microsystems IncOracle America Inc
US6513040B10.412Method and apparatus for a model data structure for accessing and manipulating java beansGRANT2003-01-281997-11-1225514667GoodInternational Business Machines CorpInternational Business Machines Corp
US6035303A0.411Object management system for digital librariesGRANT2000-03-071998-02-0221782380GoodInternational Business Machines CorpInternational Business Machines Corp
US6463446B10.410Method and apparatus for transporting behavior in an event-based distributed systemGRANT2002-10-081998-02-2626722176GoodSun Microsystems IncOracle America Inc
US20050114705A10.410Method and system for discriminating a human action from a computerized actionAPPLICATION2005-05-261997-12-1134594155GoodWatchfire CorpInternational Business Machines Corp
US5995100A0.410Method of automatically generating custom controls for selected modules in a libraryGRANT1999-11-301997-01-0725117035GoodNCR CorpTeradata US Inc
US5625793A0.409Automatic cache bypass for instructions exhibiting poor cache hit ratioGRANT1997-04-291991-04-1524752832GoodInternational Business Machines CorpInternational Business Machines Corp
US6295525B10.409Automatic invocation of computational resources without user intervention across a networkGRANT2001-09-251993-03-1925448978GoodRicoh Co Ltd, Ricoh Americas CorpRicoh Co Ltd, SuperMedia LLC, Ricoh Americas Corp
US5493675A0.406Compiler back end calling predetermined front end routines that use effect and dependency indicators to provide information to the compiler to determine the validity of an optimizationGRANT1996-02-201991-02-2724657809GoodDigital Equipment CorpHewlett Packard Development Co LP
US5361351A0.406System and method for supporting run-time data type identification of objects within a computer programGRANT1994-11-011990-09-2124347078GoodHewlett Packard CoHP Inc
US4694396A0.405Method of inter-process communication in a distributed data processing systemGRANT1987-09-151985-05-0624937218GoodComputer X IncMotorola Solutions Inc
EP0372835A20.404Translation techniqueGRANT1990-06-131988-12-0623074585GoodAmerican Telephone and Telegraph Co Inc, AT&T CorpAT&T Corp
EP0940751A10.404Method and architecture for transmitting objects in a distributed environment while preserving objectreferencesGRANT1999-09-081998-03-059523684GoodAlcatel CIT SA, Alcatel SAAlcatel CIT SA, Alcatel Lucent SAS
US4754395A0.404Network interface module with minimized data pathsGRANT1988-06-281985-05-0624936084GoodComputer X IncMotorola Solutions Inc
US5638513A0.404Secure software rental system using continuous asynchronous password verificationGRANT1997-06-101993-12-2222652402GoodStamps com IncStamps com Inc
US7975305B20.402Method and system for adaptive rule-based content scanners for desktop computersGRANT2011-07-051997-11-0635137983GoodFinjan IncFinjan LLC
US5548759A0.401System for storing executable code within a resource data section of an executable fileGRANT1996-08-201994-07-0523034022GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5901308A0.401Software mechanism for reducing exceptions generated by speculatively scheduled instructionsGRANT1999-05-041996-03-1824471936GoodDigital Equipment CorpHewlett Packard Enterprise Development LP
US5835914A0.401Method for preserving and reusing software objects associated with web pagesGRANT1998-11-101997-02-1825178674GoodWall Data IncBorland Software Corp
US5204961A0.398COMPUTER NETWORK OPERATING WITH MULTILEVEL HIERARCHICAL SECURITY WITH SELECTABLE COMMON TRUST REALMS AND CORRESPONDING SECURITY PROTOCOLSGRANT1993-04-201990-06-2524166849GoodDigital Equipment CorpDIGITAL Corp A MA CORP, Hewlett Packard Development Co LP
US5930792A0.398Monitoring and directing flow of HTML documents for security and accessGRANT1999-07-271996-11-0725003314GoodIntervoice LPIntervoice LP
US6195794B10.394Method and apparatus for distributing templates in a component systemGRANT2001-02-271997-08-1225428359GoodInternational Business Machines CorpInternational Business Machines Corp
US5524110A0.393Conferencing over multiple transportsGRANT1996-06-041993-11-2427388048GoodIntel CorpIntel Corp
US6009410A0.393Method and system for presenting customized advertising to a user on the world wide webGRANT1999-12-281997-10-1625491537GoodAT&T CorpAT&T Corp
US5050213A0.392Database usage metering and protection system and methodGRANT1991-09-171986-10-1427405482GoodElectronic Publishing Resources IncElectronic Publishing Resources Inc
US5204956A0.392METHOD AND APPARATUS FOR MONITORING THE EXECUTION TIME OF A COMPUTER PROGRAMGRANT1993-04-201988-11-094270941GoodAsea Brown Boveri AG SwitzerlandAlaric US LLC
US8275863B20.392Method of modifying a toolbarGRANT2012-09-251997-06-1926727980GoodMyMail LtdMyMail Ltd, MyMail Inc
US8726247B20.391Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled formGRANT2014-05-131996-10-2521846980GoodGemalto SAThales DIS France SA
US5892900A0.391Systems and methods for secure transaction management and electronic rights protectionGRANT1999-04-061996-08-3024836636GoodIntertrust Technologies CorpIntertrust Technologies Corp
US8516132B20.390Method of accessing a selected networkGRANT2013-08-201997-06-1946282241GoodMyMail LtdNETSAFE Inc, MyMail Ltd, MyMail Inc
US4914583A0.390Method of indicating processes resident within a cell of a data processing systemGRANT1990-04-031988-04-1322662584GoodMotorola IncMotorola Solutions Inc, Motorola Computer X Inc
US5355494A0.388Compiler for performing incremental live variable analysis for data-parallel programsGRANT1994-10-111991-12-1225193133GoodThinking Machines CorpThinking Machines Corp, TM Patents LP
US9935814B20.387Method of obtaining a network addressGRANT2018-04-031997-06-1922280672GoodMy Mail Ltd, MyMail Ltd, My Mail LtdNETSAFE Inc
US6125359A0.387Method and apparatus for identifying the coverage of a test sequence in a rules-based expert systemGRANT2000-09-261997-09-2325469825GoodUnisys CorpUnisys Corp
US6208986B10.385Web interface and method for accessing and displaying directory informationGRANT2001-03-271997-12-1525536732GoodInternational Business Machines CorpInternational Business Machines Corp
US6260039B10.382Web interface and method for accessing directory informationGRANT2001-07-101997-12-1525536514GoodInternational Business Machines CorpInternational Business Machines Corp
WO1997012508A20.382TRANSFORMING AND MANIPULATING PROGRAM OBJECT CODEAPPLICATION1997-04-101995-10-0424149169Good
US6438614B20.380Polymorphic token based controlGRANT2002-08-201998-02-2626722180GoodSun Microsystems IncOracle America Inc
US5511167A0.379Program processing method and apparatus for producing a data flow type programGRANT1996-04-231990-02-1526373548GoodHitachi LtdHitachi Ltd
US5761669A0.379Controlling access to objects on multiple operating systemsGRANT1998-06-021995-06-0646251629GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5339433A0.378Symbol browsing in an object-oriented development systemGRANT1994-08-161992-11-1925526975GoodBorland Software CorpBorland Software Corp
US6192362B10.378System and method for creating a search form for accessing directory informationGRANT2001-02-201997-12-1525536242GoodInternational Business Machines CorpInternational Business Machines Corp
US5727159A0.376System in which a Proxy-Server translates information received from the Internet into a form/format readily usable by low power portable computersGRANT1998-03-101996-04-1024523142GoodHanger Solutions LLCHanger Solutions LLC
US5734831A0.376System for configuring and remotely administering a unix computer over a networkGRANT1998-03-311996-04-2624562842GoodSun Microsystems IncSun Microsystems Inc
US4802165A0.374Method and apparatus of debugging computer programsGRANT1989-01-311986-10-0825437765GoodENTELEKI IncENTELEKI Inc A CORP OF WISCONSIN, ENTELEKI Inc
WO1993025964A10.374COMPUTER PROGRAM DEBUGGING IN THE PRESENCE OF COMPILER SYNTHESIZED VARIABLESAPPLICATION1993-12-231992-06-0525401877Good
US6260141B10.374Software license control system based on independent software registration serverGRANT2001-07-101997-09-1919494189Good
US6122638A0.373Object-oriented processor and method for caching intermediate data in an object-oriented processorGRANT2000-09-191997-11-2625527000GoodInternational Business Machines CorpInternational Business Machines Corp
US5559933A0.372Distributed enterprise print controllerGRANT1996-09-241994-04-2222869692GoodUnisys CorpUnisys Corp
US5453601A0.370Electronic-monetary systemGRANT1995-09-261991-11-1525161747GoodCitibank NACitibank NA
US5563648A0.369Method for controlling execution of an audio video interactive programGRANT1996-10-081994-04-2822880139GoodThomson Consumer Electronics IncOpenTV Inc
US6587127B10.369Content player method and server with user profileGRANT2003-07-011997-11-2525524685GoodMotorola IncGoogle Technology Holdings LLC
US6829595B20.364MicroTrac internet billing solutionsGRANT2004-12-071997-06-2733493989GoodValista IncIntel Corp, Comdisco Inc
US5357628A0.362Computer system having integrated source level debugging functions that provide hardware information using transparent system interruptGRANT1994-10-181992-03-2525327982GoodIntel CorpIntel Corp
US4882674A0.361Apparatus and method for control of one computer system by another computer systemGRANT1989-11-211985-03-0526862618GoodWang Laboratories IncWang Laboratories Inc, Intel Corp
US7502752B10.359System and method for delivering financial servicesGRANT2009-03-101997-08-0740417101GoodCiticorp Development Center IncCiticorp Credit Services Inc USA
US6026485A0.358Instruction folding for a stack-based machineGRANT2000-02-151996-01-2426681282GoodSun Microsystems IncOracle America Inc
US6195666B10.354Web interface and method for displaying directory informationGRANT2001-02-271997-12-1525535951GoodInternational Business Machines CorpInternational Business Machines Corp
US5937187A0.353Method and apparatus for execution and preemption control of computer process entitiesGRANT1999-08-101996-07-0124709608GoodSun Microsystems IncOracle America Inc
US5530852A0.352Method for extracting profiles and topics from a first file written in a first markup language and generating files in different markup languages containing the profiles and topics for use in accessing data described by the profiles and topicsGRANT1996-06-251994-12-2023424256GoodSun Microsystems IncSun Microsystems Inc
US5062060A0.352Computer human interface comprising user-adjustable window for displaying or printing informationGRANT1991-10-291987-01-0526667899GoodMotorola IncMotorola Solutions Inc
US20040054630A10.349Systems and methods for secure transaction management and electronic rights protectionAPPLICATION2004-03-181995-02-1331999095GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5613117A0.349Optimizing compiler using templates corresponding to portions of an intermediate language graph to determine an order of evaluation and to allocate lifetimes to temporary names for variablesGRANT1997-03-181991-02-2724657824GoodDigital Equipment CorpHewlett Packard Development Co LP
US4827508A0.348Database usage metering and protection system and methodGRANT1989-05-021986-10-1425439822GoodPersonal Library Software IncElectronic Publishing Resources Inc
US5335323A0.347Computer human interface with multiapplication displayGRANT1994-08-021987-01-0526667896GoodMotorola IncMotorola Solutions Inc
US5502839A0.346Object-oriented software architecture supporting input/output device independenceGRANT1996-03-261987-01-0521692288GoodMotorola IncGoogle Technology Holdings LLC
US6034689A0.345Web browser allowing navigation between hypertext objects using remote controlGRANT2000-03-071996-06-0324648090GoodWebTV Networks IncRovi Technologies Corp
US6367077B10.344Method of upgrading a software application in the presence of user modificationsGRANT2002-04-021997-02-2721905620GoodSiebel Systems IncOracle America Inc
US4977594A0.344Database usage metering and protection system and methodGRANT1990-12-111986-10-1426977654GoodElectronic Publishing Resources IncElectronic Publishing Resources Inc
US7249344B10.342Delivery of financial services to remote devicesGRANT2007-07-241996-10-3138267001GoodCiticorp Development Center IncCiticorp Credit Services Inc USA
US5561769A0.341Method and apparatus for executing a distributed algorithm or service on a simple network management protocol based computer networkGRANT1996-10-011994-05-1022910127GoodLucent Technologies IncNokia of America Corp
US7925718B20.338Method and system for identifying and obtaining computer software from a remote computerGRANT2011-04-121995-11-2724248391GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5226172A0.338Methods for configuring and performing 3-level password searching in a distributed computer systemGRANT1993-07-061989-06-1227002634GoodMotorola IncMotorola Solutions Inc
US5920720A0.336Efficient computer based virtual machine object structureGRANT1999-07-061997-02-2525187850GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5537548A0.336Method of computer conferencing by intercepting commands issued by application programs and redirecting to all stations for executionGRANT1996-07-161991-08-0816781686GoodInternational Business Machines CorpInternational Business Machines Corp
US5983227A0.336Dynamic page generatorGRANT1999-11-091997-06-1225362722GoodYahoo IncDIGI PORTAL LLC
US5533124A0.334Electronic trading card systemGRANT1996-07-021994-12-0723379276GoodSASLOW DIANE LSASLOW DIANE L
US5628016A0.333Systems and methods and implementing exception handling using exception registration records stored in stack memoryGRANT1997-05-061994-06-1522996044GoodBorland Software CorpCODEGEAR LLC
US8225408B20.332Method and system for adaptive rule-based content scannersGRANT2012-07-171997-11-0636000431GoodFinjan IncFinjan LLC
US4835685A0.331Virtual single machine with message-like hardware interrupts and processor exceptionsGRANT1989-05-301985-05-0624937349GoodComputer X IncMotorola Computer X Inc
US5339431A0.330Software compiler and linker with improved line-number tableGRANT1994-08-161989-10-1623673496GoodHewlett Packard CoHP Inc
US5923878A0.330System  method and apparatus of directly executing an architecture-independent binary programGRANT1999-07-131996-11-1325011529GoodSun Microsystems IncOracle America Inc
US5999622A0.329Method and apparatus for protecting widely distributed digital informationGRANT1999-12-071995-11-2224245505GoodMicrosoft CorpMicrosoft Technology Licensing LLC
WO1998022889A10.326USER INTERFACE FOR CONTROLLING AUDIO FUNCTIONS IN A WEB BROWSERAPPLICATION1998-05-281996-11-2225038277Good
US5426648A0.326Efficient program debugging systemGRANT1995-06-201992-04-2414399238GoodNEC CorpNEC Corp
US6724401B10.326Computer-based documentation and instructionGRANT2004-04-201997-07-0725394182GoodInternational Business Machines CorpAxure Software Solutions Inc
US6834388B10.325Process controlGRANT2004-12-211998-03-1333514602GoodIconics IncIconics Inc
US5634114A0.324Dynamic link library version negotiationGRANT1997-05-271993-11-1822550686GoodIntel CorpIntel Corp
US5920724A0.322Software pipelining a hyperblock loopGRANT1999-07-061996-03-2824528840GoodIntel CorpIntel Corp
US6094676A0.319Method and apparatus for peer-to-peer communicationGRANT2000-07-251997-05-3025346992GoodHilgraeve IncHIGRAEVE Inc, TAINOAPP Inc, Hilgraeve Inc
US5428786A0.319Branch resolution via backward symbolic executionGRANT1995-06-271991-03-0724672699GoodDigital Equipment CorpHewlett Packard Development Co LP
US5715460A0.318Template based facility for formatting compiler outputGRANT1998-02-031993-06-1422136725GoodInternational Business Machines CorpInternational Business Machines Corp
US5805795A0.318Method and computer program product for generating a computer program product test that includes an optimized set of computer program product test cases  and method for selecting sameGRANT1998-09-081996-01-0524334263GoodSun Microsystems IncSun Microsystems Inc
US6035339A0.315Network information delivery system for delivering information based on end user terminal requirementsGRANT2000-03-071997-03-1325220036GoodAT&T CorpAT&T Corp
US6077311A0.315Method and apparatus for extraction of program regionGRANT2000-06-201997-07-0925396323GoodSilicon Graphics IncRPX Corp, Morgan Stanley and Co LLC
US5524244A0.313System for dividing processing tasks into signal processor and decision-making microprocessor interfacing therewithGRANT1996-06-041988-07-1125106652GoodLogic Devices IncLogic Devices Inc
US8112330B10.312System and method for delivering financial servicesGRANT2012-02-071997-08-0745532292GoodCitibank Development Center IncCitibank Development Center Inc, Citicorp Credit Services Inc USA
US6240545B10.310Setting instance breakpoints in object oriented computer programsGRANT2001-05-291997-07-254161118GoodInternational Business Machines CorpInternational Business Machines Corp
US6480863B10.309Method and system for multi-entry and multi-template matching in a databaseGRANT2002-11-121997-11-1726722049GoodSun Microsystems IncSun Microsystems Inc
US6314409B20.309System for controlling access and distribution of digital propertyGRANT2001-11-061996-01-1124337542GoodVeridian Information Solutions IncHanger Solutions LLC
US5805895A0.308Method and apparatus for code translation optimizationGRANT1998-09-081996-06-0924849786GoodMotorola IncNXP USA Inc
US5434913A0.308Audio subsystem for computer-based conferencing systemGRANT1995-07-181993-11-2422567263GoodIntel CorpIntel Corp
US5047925A0.305Logical ring in a virtual single machineGRANT1991-09-101985-05-0626879155GoodMotorola IncArtesyn Embedded Computing Inc
US6578044B10.304Method and system for typesafe attribute matchingGRANT2003-06-101997-11-1746279393GoodSun Microsystems IncOracle America Inc
US6298422B10.301Method for reducing the memory requirements for an application program executing in a multi-tasking environmentGRANT2001-10-021996-06-1724666265GoodNetwork Associates IncMcAfee LLC
US5509070A0.301Method for encouraging purchase of executable and non-executable softwareGRANT1996-04-161992-12-1525536168GoodSoftLock Services IncST PATENT HOLDINGS LLC, SL Patent Holdings LLC
US5842040A0.301Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of related data unitsGRANT1998-11-241996-06-1824674843GoodStorage Technology CorpStorage Technology Corp
US8204830B20.298Global method and system for providing enhanced transactional functionality through a customer terminalGRANT2012-06-191996-10-3146330248GoodCiticorp Development Center IncCiticorp Credit Services Inc USA
US5410651A0.296Program loading method and system for distributed processing systemGRANT1995-04-251988-01-2911933527GoodHitachi LtdHitachi Ltd
US6081665A0.295Method for efficient soft real-time execution of portable byte code computer programsGRANT2000-06-271997-12-1925540626GoodNewmonics IncAONIX SA
US7089251B10.291Methods for processing condensed computer codeGRANT2006-08-081997-10-0121982977GoodHewlett Packard Development Co LPHTC Corp
US20080270290A10.288PROCESS AND APPARATUS FOR CONDUCTING AUCTIONS OVER ELECTRONIC NETWORKSAPPLICATION2008-10-301997-05-2926725547GoodMuniAuction IncMuniAuction Inc
US5175416A0.284Funds transfer systemGRANT1992-12-291989-10-0627140537Good
US5485617A0.284Method and system for dynamically generating object connectionsGRANT1996-01-161993-12-1322605432GoodMicrosoft CorpMicrosoft Technology Licensing LLC
WO1997031309A10.282A COMPUTER SYSTEM CONFIGURED TO TRANSLATE A COMPUTER PROGRAM INTO A SECOND COMPUTER PROGRAM PRIOR TO EXECUTING THE COMPUTER PROGRAMAPPLICATION1997-08-281996-02-2324425560Good
US5630127A0.280Program storage device and computer program product for managing an event driven management information system with rule-based application structure stored in a relational databaseGRANT1997-05-131992-05-1525382619GoodInternational Business Machines CorpInternational Business Machines Corp
US6134627A0.279Thread synchronization in a computer controlled by an object-based programGRANT2000-10-171996-11-0424988958GoodSun Microsystems IncOracle America Inc
US20020021807A10.278Method for controlling database copyrightsAPPLICATION2002-02-211994-04-0113271114GoodMitsubishi CorpPiracy Protection LLC
US5790117A0.278System and methods for improved program testingGRANT1998-08-041992-11-0225517404GoodBorland Software CorpBorland Software Corp
US5574918A0.278Method and apparatus for configuring computer program from available subprogramsGRANT1996-11-121993-08-2322331934GoodLucent Technologies IncNokia of America Corp
US5835722A0.277System to control content and prohibit certain interactive attempts by a person using a personal computerGRANT1998-11-101996-06-2724697168GoodLogon Data CorpTW SECURITY CORP, Trustwave Holdings Inc
US5448045A0.277System for protecting computers via intelligent tokens or smart cardsGRANT1995-09-051992-02-2625285753GoodF Poszat HU LLCF Poszat HU LLC
US5606609A0.276Electronic document verification system and methodGRANT1997-02-251994-09-1923185324GoodScientific Atlanta LLCSilanis Technology Inc
US5327562A0.272Method for implementing virtual function tables in a compiler for an object-oriented programming languageGRANT1994-07-051992-05-0625375642GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US3956615A0.267Transaction execution system with secure data storage and communicationsGRANT1976-05-111974-06-2523918589GoodInternational Business Machines CorpInternational Business Machines Corp
US5454067A0.264Method and apparatus for converting a conventional copier into an electronic printerGRANT1995-09-261989-11-1646247821Good
US5875336A0.263Method and system for translating a non-native bytecode to a set of codes native to a processor within a computer systemGRANT1999-02-231997-03-3125253325GoodInternational Business Machines CorpInternational Business Machines Corp
US5991299A0.262High speed header translation processingGRANT1999-11-231997-09-1125455043Good3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US5221838A0.262Electronic walletGRANT1993-06-221990-12-2427091704GoodMotorola IncMotorola Solutions Inc
US8229844B20.261Method of billing a purchase made over a computer networkGRANT2012-07-241996-06-0548095431GoodFraud Control Systems com CorpFraud Control Systems com Corp
US8630942B20.260Method of billing a purchase made over a computer networkGRANT2014-01-141996-06-0546282273GoodFraud Control Systems com CorpFraud Control Systems com Corp
US5388264A0.260Object oriented framework system for routing  editing  and synchronizing MIDI multimedia information using graphically represented connection objectGRANT1995-02-071993-09-1322356512GoodTaligent IncApple Inc
US5440634A0.259Value transfer systemGRANT1995-08-081991-10-1610703051GoodJonhig LtdMondex International Ltd
US5633932A0.259Apparatus and method for preventing disclosure through user-authentication at a printing nodeGRANT1997-05-271995-12-1926792309GoodIntel CorpIntel Corp
US4935962A0.259Method and system for authenticationGRANT1990-06-191988-05-1926293902GoodNCR CorpNCR Corp
US8190513B20.259Method of billing a purchase made over a computer networkGRANT2012-05-291996-06-0540793590GoodFraud Control Systems com CorpFraud Control Systems com Corp
US5841978A0.258Network linking method using steganographically embedded data objectsGRANT1998-11-241993-11-1827569030GoodDigimarc CorpDigimarc Corp
US5710834A0.258Method and apparatus responsive to a code signal conveyed through a graphic imageGRANT1998-01-201995-05-0823731106GoodDigimarc CorpDigimarc Corp
US5875249A0.257Invisible image watermark for image verificationGRANT1999-02-231997-01-0825119716GoodInternational Business Machines CorpTrend Micro Inc
US5636292A0.256Steganography methods employing embedded calibration dataGRANT1997-06-031995-05-0823731100GoodDigimarc CorpDigimarc Corp
US5778234A0.256Method for downloading programsGRANT1998-07-071992-05-0825375864GoodParadyne CorpREMBRANDT TECHNOLOGIES LP
US5850481A0.255Steganographic systemGRANT1998-12-151993-11-1827387649GoodDigimarc CorpDigimarc Corp
US5748763A0.255Image steganography system featuring perceptually adaptive and globally scalable signal embeddingGRANT1998-05-051993-11-1846251362GoodDigimarc CorpDigimarc Corp
US5748783A0.254Method and apparatus for robust information codingGRANT1998-05-051995-05-0823731118GoodDigimarc CorpDigimarc Corp
WO1999035799A20.248A METHOD FOR PACKET AUTHENTICATION IN THE PRESENCE OF NETWORK ADDRESS TRANSLATIONS AND PROTOCOL CONVERSIONSAPPLICATION1999-07-151997-12-318550255Good
US5832119A0.247Methods for controlling systems using control signals embedded in empirical dataGRANT1998-11-031993-11-1827568530GoodDigimarc CorpDigimarc Corp
US5561785A0.247System for allocating and returning storage and collecting garbage using subpool of available blocksGRANT1996-10-011992-10-2925516098GoodInternational Business Machines CorpInternational Business Machines Corp
US5822436A0.244Photographic products and methods employing embedded informationGRANT1998-10-131996-04-2524556332GoodDigimarc CorpDigimarc Corp
US5315703A0.243Object-oriented notification framework systemGRANT1994-05-241992-12-2325543312GoodTaligent IncApple Inc
US5684951A0.243Method and system for user authorization over a multi-user computer systemGRANT1997-11-041996-03-2024483757GoodSynopsys IncSynopsys Inc
US5862260A0.243Methods for surveying dissemination of proprietary empirical dataGRANT1999-01-191993-11-1846253042GoodDigimarc CorpDigimarc Corp
US5905505A0.243Method and system for copy protection of on-screen display of textGRANT1999-05-181996-05-1326689690GoodTelcordia Technologies IncNytell Software LLC
US8255680B10.242Layer-independent security for communication channelsGRANT2012-08-281997-06-2625383007GoodOracle America IncOracle America Inc
US6088355A0.237Processing system with pointer-based ATM segmentation and reassemblyGRANT2000-07-111996-10-1124938871GoodC Cube Microsystems IncAvago Technologies International Sales Pte Ltd, LSI Corp, Divicom Inc
US6092081A0.234System and method for taggable digital portfolio creation and report generationGRANT2000-07-181997-03-0525204731GoodInternational Business Machines CorpInternational Business Machines Corp
US5764770A0.232Image authentication patterningGRANT1998-06-091995-11-0724213649GoodTrimble Navigation LtdTrimble Inc
WO1991016691A10.230VALUE TRANSFER SYSTEMAPPLICATION1991-10-311990-04-1210674365Good
US5386568A0.230Apparatus and method for linking software modulesGRANT1995-01-311992-12-0125530949GoodYamaha CorpYamaha Corp
US5016274A0.230On-line/off-line digital signingGRANT1991-05-141988-11-0823024552Good
US6043817A0.228Method and apparatus for arranging displayed graphical representations on a computer interfaceGRANT2000-03-281995-06-3023976720GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6178243B10.228User-controlled document processingGRANT2001-01-231995-08-2727271723GoodAliroo LtdActivepath Ltd
US5459304A0.226Smart card techniques for motor vehicle record administrationGRANT1995-10-171994-09-1323178860GoodAT&T IPM CorpAT&T Corp
US6003038A0.222Object-oriented processor architecture and operating methodGRANT1999-12-141997-03-3125259064GoodSun Microsystems IncOracle America Inc
US6487543B10.220Media-integrating system  terminal device  recording medium and broadcasting method for use in the media-integrating systemGRANT2002-11-261996-12-1318270628GoodHitachi LtdHitachi Ltd
US4689478A0.217System for handling transactions including a portable personal terminalGRANT1987-08-251984-12-2424752992GoodNCR CorpNCR Corp
US5896383A0.215System and method for encoding instruction fields within data packetsGRANT1999-04-201997-05-0125295736GoodAdvanced Micro Devices IncGlobalFoundries Inc
EP0363122B10.214Transaction authentication systemGRANT1994-12-211988-10-0317194831GoodFujitsu LtdFujitsu Ltd
US4405829A0.214Cryptographic communications system and methodGRANT1983-09-201977-12-1425333547GoodMassachusetts Institute of TechnologyMassachusetts Institute of Technology
US5291587A0.213Graphical system for executing a process and for programming a computer to execute a process  including graphical variable inputs and variable outputsGRANT1994-03-011986-04-1446246956GoodNational Instruments CorpNational Instruments Corp
US4614861A0.212Unitary  self-contained card verification and validation system and methodGRANT1986-09-301984-11-1524695726GoodINTELLICARD INTERNATIONAL IncINTELLICARD INTERNATIONAL Inc
US10007908B10.211Method and system for automatically harmonizing access to a software application program via different access devicesGRANT2018-06-261996-10-3024979481GoodCiticorp Credit Services Inc USACiticorp Credit Services Inc USA
US4901221A0.211Graphical system for modelling a process and associated methodGRANT1990-02-131986-04-1425311082GoodNational Instruments CorpNational Instruments Corp
US4914568A0.211Graphical system for modelling a process and associated methodGRANT1990-04-031986-10-2425448164GoodNational Instruments CorpNational Instruments Corp
US4454414A0.211Funds transfer system using optically coupled  portable modulesGRANT1984-06-121982-06-1623547243GoodVERICARD CORPMoneyfax Inc
US5761686A0.210Embedding encoded information in an iconic version of a text imageGRANT1998-06-021996-06-2724694454GoodXerox CorpXerox Corp
US7627001B20.210Protocol stack that offloads a TCP connection from a host computer to a network interface deviceGRANT2009-12-011997-10-1424047067GoodAlacritech IncAlacritech Inc
US5553227A0.210Method and system for visually programming state information using a visual switchGRANT1996-09-031994-08-2623143534GoodInternational Business Machines CorpInternational Business Machines Corp
US4303904A0.207Universally applicable  in-motion and automatic toll paying system using microwavesGRANT1981-12-011979-10-1222184524GoodTranscore LPTranscore LP
US6892109B20.207Remote maintenance systemGRANT2005-05-101996-07-3127322825GoodCanon IncCanon Inc
US5893101A0.198Protection of an electronically stored image in a first color space by the alteration of digital component in a second color spaceGRANT1999-04-061994-06-0822968060GoodSystems Research and Applications CorpSystems Research and Applications Corp
US5600831A0.196Apparatus and methods for retrieving information by modifying query plan based on description of information sourcesGRANT1997-02-041994-02-2826898299GoodLucent Technologies IncAlcatel Lucent SAS, Sound View Innovations LLC
US5900005A0.193System for extraction of text strings from on-screen computer window displays using the computer operating system in lieu of a clipboardGRANT1999-05-041996-05-1714850676GoodTechCraft Co LtdTechCraft Co Ltd, Techno Craft Co Ltd
US5841886A0.193Security system for photographic identificationGRANT1998-11-241993-11-1827578583GoodDigimarc CorpDigimarc Corp
EP0644484A20.193Pre-emptive multi-tasking with co-operative groups of tasksGRANT1995-03-221993-09-2122422115GoodMicrosoft CorpMicrosoft Corp
US6130917A0.192Instant protocol selection scheme for electronic data transmissionGRANT2000-10-101997-03-1425220483Goode-Watch Ince-Watch Inc
US4968873A0.191Smart card issuing and receiving apparatusGRANT1990-11-061987-09-0826788792Good
US4906828A0.190Electronic money purse and fund transfer systemGRANT1990-03-061983-02-2826896636GoodPaperless Accounting IncPASS TECHNOLOGIES Inc
US5765221A0.188Method and system of addressing which minimize memory utilized to store logical addresses by storing high order bits within a registerGRANT1998-06-091994-10-0523241798GoodInternational Business Machines Corp, Motorola IncInternational Business Machines Corp, Motorola Solutions Inc
US5745604A0.188Identification/authentication system using robust  distributed codingGRANT1998-04-281993-11-1826851836GoodDigimarc CorpDigimarc Corp
US5721788A0.185Method and system for digital image signaturesGRANT1998-02-241992-07-3125449340GoodCorbis CorpDigimarc Corp
US4766293A0.182Portable financial transaction card capable of authorizing a transaction in foreign currenciesGRANT1988-08-231986-06-2625372420GoodVisa International Service AssociationVisa International Service Association
US5822432A0.176Method for human-assisted random key generation and application for digital watermark systemGRANT1998-10-131996-01-1724351824GoodDice CoWistaria Trading Ltd
US6041408A0.174Key distribution method and system in secure broadcast communicationGRANT2000-03-211996-06-2827474232GoodHitachi LtdHitachi Ltd
US5838902A0.171Copy protection circuit for a data in a memoryGRANT1998-11-171994-04-3026630333GoodLG Semicon Co LtdSK Hynix Inc
US6178422B10.171Information registration method and document information processing apparatusGRANT2001-01-231997-02-1912877099GoodHitachi LtdHitachi Ltd
US4630201A0.167On-line and off-line transaction security system using a code generated from a transaction parameter and a random numberGRANT1986-12-161984-02-1424319245GoodINTERNATIONAL SECURITY NOTE AND COMPUTER CORPINTERNATIONAL SECURITY NOTE AND COMPUTER Corp 33 AVENIDA FEDERICO BOYD APARTADO 951 PANAMA CITY PANAMA, INTERNATIONAL SECURITY NOTE AND COMPUTER CORP
EP0256768B10.166Transaction processing apparatusGRANT1994-03-021986-08-0516123438GoodOki Electric Industry Co LtdOki Electric Industry Co Ltd
US5485510A0.164Secure credit/debit card authorizationGRANT1996-01-161992-09-2925493969GoodAT&T CorpCiticorp USA Inc
US4277837A0.164Personal portable terminal for financial transactionsGRANT1981-07-071977-12-3026818168GoodInternational Business Machines CorpInternational Business Machines Corp
US5420405A0.164Secure  automated transaction system that supports an electronic currency operating in mixed debit & credit modesGRANT1995-05-301993-02-2621813243GoodCURSYS Inc (NOW CURRENCY SCIENTIFIC INC)CURSYS Inc (NOW CURRENCY SCIENTIFIC INC)
US5831998A0.163Method of testcase optimizationGRANT1998-11-031996-12-1325077551GoodNorthern Telecom LtdNortel Networks Ltd
US20040103415A10.162Method of interfacing with data storage cardAPPLICATION2004-05-271995-05-0919925257Good
US5301301A0.161Polymorphic dataflow block diagram system and method for programming a computerGRANT1994-04-051991-01-3024598267GoodNational Instruments CorpNational Instruments Corp
US5986676A0.160Device for protecting selected information in multi-media workstationsGRANT1999-11-161994-10-1323255922GoodInternational Business Machines CorpLenovo Singapore Pte Ltd
US6282362B10.155Geographical position/image digital recording and display systemGRANT2001-08-281995-11-0724214839GoodTrimble Navigation LtdTrimble Inc
US5950001A0.152Method and apparatus for customizing a software componentGRANT1999-09-071997-06-0325351390GoodSun Microsystems IncOracle America Inc
US4813013A0.149Schematic diagram generating system using library of general purpose interactively selectable graphic primitives to create special applications iconsGRANT1989-03-141984-03-0127079424GoodCADWARE GROUP LtdCADWARE GROUP Ltd
US6236387B10.143Page display system  method therefor  and recording medium containing program for displaying pageGRANT2001-05-221997-11-0517914420GoodNEC CorpNEC Corp
US5754170A0.143Transparent blocking of CRT refresh fetches during video overlay using dummy fetchesGRANT1998-05-191996-01-1624346342GoodNeoMagic CorpXylon LLC
US6877005B20.138Longest best match searchGRANT2005-04-051997-10-3127535635GoodNortel Networks LtdRPX Clearinghouse LLC
US6728547B10.134Call setup in mobile systemsGRANT2004-04-271997-11-0620408883GoodTelia ABS Aqua Semiconductor LLC
EP0172670A20.132An apparatus for effecting and recording monetary transactionsGRANT1986-02-261984-07-2724547075GoodTechnion Research and Development Foundation LtdTechnion Research and Development Foundation Ltd
US6212329B10.128Method of protection of data reproduction  and reproduction apparatus providing protection of data reproductionGRANT2001-04-031994-02-2212784390GoodVictor Company of Japan LtdJVCKenwood Corp
US5323392A0.122Adaptation device and method for efficient interconnection of data processing devices and networksGRANT1994-06-211991-03-138208701GoodInternational Business Machines CorpInternational Business Machines Corp
US5300946A0.118Method for outputting transparent textGRANT1994-04-051992-12-0825532744GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US4859837A0.112Portable data carrier incorporating manually presettable processing modesGRANT1989-08-221987-03-2326705848GoodPASS TECHNOLOGIES IncPASS TECHNOLOGIES Inc
US5478993A0.101Process as safety concept against unauthorized use of a payment instrument in cashless payment at payment sitesGRANT1995-12-261993-01-184180073GoodAscom Autelca AGAscom Autelca AG
US6330332B10.094Prime number generation apparatus B-smoothness judgement apparatus and computer memory productGRANT2001-12-111997-07-3016501001GoodFujitsu LtdFujitsu Ltd
US4992646A0.089Transaction system of the electronic purse typeGRANT1991-02-121988-05-3026226686GoodElectronique Serge Dassault SAThales SA
US5953693A0.089Sign language generation apparatus and sign language translation apparatusGRANT1999-09-141993-02-2527289060GoodHitachi LtdHitachi Ltd
JPH06274349ANRMESSAGE COMPILER FOR OBJECT DIRECTING LANGUAGEGRANT1994-09-301993-03-1913147332Good
JPH06266563ANRMETHOD FOR CHANGING OBJECT ORIENTED PROGRAM ENVIRONMENT AND DEVICE FOR THE SAMEGRANT1994-09-221992-09-3025494983Good
GB2339042ANRAutomatic extraction and graphic visualization system and methodGRANT2000-01-121997-04-0126719067GoodManning & Napier Inf ServicesManning & Napier Inf Services
FR2701580A1NRNo titleGRANT1994-08-191993-02-109443895GoodBull SABull SA
US5953731A0.847HTML integration utility for a program development environmentGRANT1999-09-141997-03-3125253015FairInternational Business Machines CorpInternational Business Machines Corp
US6564250B10.817Miniclient for internet applianceGRANT2003-05-131997-08-2125439798FairPlanetweb IncIntellectual Ventures I LLC
US5740430A0.781Method and apparatus for server-independent caching of dynamically-generated customized pagesGRANT1998-04-141995-11-0624212293FairC NET IncC/NET Inc, Open Text SA, CBS Interactive Inc, C NET Inc
US5828840A0.752Server for starting client application on client if client is network terminal and initiating client application on server if client is non network terminalGRANT1998-10-271996-08-0624780790FairVerifone IncHewlett Packard Enterprise Development LP
US6192408B10.729Network file server sharing local caches of file access information in data processors assigned to respective file systemsGRANT2001-02-201997-09-2625471868FairEMC CorpEMC Corp
US7447738B10.720Component download selection mechanism for web browsersGRANT2008-11-041997-03-1439916573FairInternational Business Machines CorpInternational Business Machines Corp
US6185586B10.647Content display during idle time as a user waits for information during an internet transactionGRANT2001-02-061995-10-1927067446FairOath IncINTERNETAD SYSTEMS LLC
US5913033A0.631Apparatus and method for retrieving information using standard objectsGRANT1999-06-151996-12-2025092807FairInternational Business Machines CorpInternational Business Machines Corp
US5583563A0.627Method and system for delivering an application in an interactive television networkGRANT1996-12-101995-01-1223465174FairUS West Marketing Resources Group IncComcast MO Group Inc, US West Marketing Resources Group Inc
US6584498B20.591Dynamic preloading of web pagesGRANT2003-06-241996-09-1324862752FairPlanet Web IncApple Inc, Planet Web Inc
US5491820A0.584Distributed  intermittently connected  object-oriented database and management systemGRANT1996-02-131994-11-1023319026FairAT&T CorpAT&T Corp
US5701451A0.545Method for fulfilling requests of a web browserGRANT1997-12-231995-06-0723884145FairInternational Business Machines CorpGoogle LLC
US6144990A0.529Computer apparatus and method for communicating between software applications and computers on the world-wide web using universal variable handlingGRANT2000-11-071996-12-2325118294FairInternational Business Machines CorpInternational Business Machines Corp
US6012098A0.500Servlet pairing for isolation of the retrieval and rendering of dataGRANT2000-01-041998-02-2321839689FairInternational Business Machines CorpInternational Business Machines Corp
US6138150A0.471Method for remotely controlling computer resources via the internet with a web browserGRANT2000-10-241997-09-0325448128FairInternational Business Machines CorpInternational Business Machines Corp
US6393465B20.449Junk electronic mail detector and eliminatorGRANT2002-05-211997-11-2526746578FairNixmail CorpNixmail Corp
US6055530A0.396Document information management system  method and memoryGRANT2000-04-251997-03-0326356737FairToshiba CorpToshiba Corp
US5983351A0.373Web site copyright registration system and methodGRANT1999-11-091996-10-1626704124FairIntellectual Protocols LLCIntellectual Protocols LLC
US6324672B10.346Method for configuring circuits over a data communications linkGRANT2001-11-271996-03-2925191410FairXilinx IncXilinx Inc
US6085206A0.342Method and system for verifying accuracy of spelling and grammatical composition of a documentGRANT2000-07-041996-06-2024673333FairMicrosoft CorpMicrosoft Technology Licensing LLC
US5845075A0.339Method and apparatus for dynamically adding functionality to a set of instructions for processing a Web document based on information contained in the Web documentGRANT1998-12-011996-07-0124704766FairSun Microsystems IncOracle America Inc
US8600910B20.327System and method for remote postage meteringGRANT2013-12-031996-10-0224913234FairStamps com IncE-Stamp Corp, Stamps com Inc
US5649186A0.303System and method for a computer-based dynamic information clipping serviceGRANT1997-07-151995-08-0724036637FairSilicon Graphics IncOpen Invention Network LLC
US5745360A0.300Dynamic hypertext link converter system and processGRANT1998-04-281995-08-1424049304FairInternational Business Machines CorpInternational Business Machines Corp
US5465291A0.291Apparatus for ordering from remote locationsGRANT1995-11-071991-04-1624753903FairArtisoft IncArtisoft Inc
US5537586A0.280Enhanced apparatus and methods for retrieving and selecting profiled textural information records from a database of defined category structuresGRANT1996-07-161992-04-3025367454FairIndividual IncThomson Reuters Global Resources ULC
US5291583A0.279Automatic storage of persistent ASN.1 objects in a relational schemaGRANT1994-03-011990-12-1424517560FairRacal Data Communications IncRacal Data Communications Inc
US6026388A0.241User interface and other enhancements for natural language information retrieval system and methodGRANT2000-02-151995-08-1627555416FairTEXTWISE LLCTEXTWISE LLC
US5781914A0.219Converting documents  with links to other electronic information  between hardcopy and electronic formatsGRANT1998-07-141995-06-3023979146FairRicoh Co Ltd, Ricoh Americas CorpRICHOH Corp, Ricoh Co Ltd, Ricoh Americas Corp
US6125458A0.217Fault management system for a telecommunications networkGRANT2000-09-261996-11-138225149FairBritish Telecommunications PLCBritish Telecommunications PLC
US5991756A0.216Information retrieval from hierarchical compound documentsGRANT1999-11-231997-11-0325507146FairYahoo IncENERGETIC POWER INVESTMENT Ltd, Oath Inc
US5452352A0.198Automatic dialing systemGRANT1995-09-191990-03-2023970994Fair
EP0387226A10.187Natural language analyzing apparatus and methodGRANT1990-09-121989-03-0620375246FairInternational Business Machines CorpInternational Business Machines Corp
US6289137B10.178Image processing apparatus and methodGRANT2001-09-111994-06-0227314215FairCanon IncCanon Inc
US4739477A0.175Implicit creation of a superblock data structureGRANT1988-04-191984-08-3024589759FairInternational Business Machines CorpInternational Business Machines Corp
US6038031A0.1653D graphics object copying with reduced edge artifactsGRANT2000-03-141997-07-2825414825Fair3Dlabs LtdRPX Corp
US5873055A0.159Sentence translation system showing translated word and original wordGRANT1999-02-161995-06-1415441025FairSharp CorpSharp Corp
US5805724A0.158Method and system for hybrid error diffusion processing of image information using dynamic screens based on brightness/darkness settingsGRANT1998-09-081996-09-2424888739FairXerox CorpXerox Corp
US5873056A0.144Natural language processing system for semantic vector representation which accounts for lexical ambiguityGRANT1999-02-161993-10-1222469821FairSyracuse UniversitySyracuse University
US4991118A0.140Enhanced data stream processing in a fixed function terminalGRANT1991-02-051989-04-1723327017FairInternational Business Machines CorpInternational Business Machines Corp
US5570306A0.138Method and apparatus for recognizing a bit pattern in a string of bits  altering the string of bits  and removing the alteration from the string of bitsGRANT1996-10-291994-11-0123301517FairIntel CorpIntel Corp
US4994991A0.137Digital synchronous detector samplingGRANT1991-02-191988-12-3023124756FairMcDonnell Douglas CorpMcDonnell Douglas Corp
US5303370A0.137Anti-counterfeiting process using lenticular optics and color maskingGRANT1994-04-121992-11-1325523846FairScore Group IncWells Fargo Bank NA, Score Group Inc
US5745254A0.131Image reading device used in a facsimile machineGRANT1998-04-281994-05-1314880228FairBrother Industries LtdBrother Industries Ltd
US4586811A0.127Confidential document reproduction prevention methodGRANT1986-05-061982-04-2313372437FairRicoh Co LtdRicoh Co Ltd
US4620282A0.126System and method for documenting and checking cable interconnectionsGRANT1986-10-281984-02-0324305176Fair
US5982931A0.123Apparatus and method for the manipulation of image containing documentsGRANT1999-11-091995-06-0723935299Fair
US5901277A0.122Shared decompression bufferGRANT1999-05-041994-07-2923083816FairApple Computer IncApple Inc
US8102457B10.121Method and apparatus for correcting aspect ratio in a camera graphical user interfaceGRANT2012-01-241997-07-0925398157FairFlashPoint Technology IncFlashPoint Technology Inc
US5859855A0.111Network emulator for private communication terminal equipmentGRANT1999-01-121995-07-287768129FairSiemens AGSiemens AG
US5476259A0.108Pari-mutuel electronic and live table gamingGRANT1995-12-191992-06-1126849583FairGamin Weingardt Trust a Nevada trustGAMIN WEINGARDT TRUST, Gamin Weingardt Trust a Nevada trust
US5590258A0.107Text generation apparatusGRANT1996-12-311993-10-0117159123FairMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US5954028A0.098Air-fuel ratio control system for internal combustion enginesGRANT1999-09-211996-08-0827477137FairHonda Motor Co LtdHonda Motor Co Ltd
US5741136A0.092Audio-visual work with a series of visual word symbols coordinated with oral word utterancesGRANT1998-04-211993-09-2426824546FairReadspeak IncReadspeak Inc
US5642207A0.084Color scanner with variable line resolutionGRANT1997-06-241994-09-1623191575FairContex ASContex AS
US5012232A0.077Bit mapped memory plane with character attributes for video displayGRANT1991-04-301986-12-0526919590FairNCR CorpNCR Corp, CIT Group Business Credit Inc
US5684999A0.076Apparatus and a method for retrieving image objects based on correlation with natural language sentence parametersGRANT1997-11-041993-12-0626561527FairMatsushita Electric Industrial Co LtdPanasonic Holdings Corp, Panasonic Intellectual Property Corp of America
US5229125A0.054MOLLUSCICIDAL WATER DISTRIBUTION SYSTEM COMPONENTSGRANT1993-07-201991-11-0825147115FairGarlock IncColtec Industrial Products Inc
US4877950A0.043Electronic purse-deviceGRANT1989-10-311982-08-2323623890FairPaperless Accounting IncPaperless Accounting Inc
EP0406828A10.029Emulsion adhesive composition and process for production thereofGRANT1991-01-091989-07-0426494038FairChisso CorpJNC Corp
US2381832ANRInternal-combustion engineGRANT1945-08-071943-05-0823930678Fair
JPH1074153ANRFILE MANAGING DEVICE AND METHOD FOR TRANSFERRING FILEGRANT1998-03-171996-08-3016919134Fair
JPH1055279ANRDISTRIBUTED PROCESSORGRANT1998-02-241996-08-0916597985Fair
JPH1049354ANRINFORMATION PROCESSING SYSTEMGRANT1998-02-201996-08-0516514219Fair
JPH10289215ANRCOMPUTER SYSTEM HAVING CURRENT AND SPARE SWITCHING FUNCTION IN APPLICATION PROGRAM UNIT AND MACHINE READABLE RECORDING MEDIUM RECORDING PROGRAMGRANT1998-10-271997-04-1514614718Fair
JPH0683597ANROBJECT ORIENTED PROGRAM DEVELOPMENT DEVICE AND OBJECT ORIENTED PROGRAM DEVELOPMENT METHODGRANT1994-03-251992-09-0216970512Fair
JPH06161726ANRTOOL DATA REUSING DEVICEGRANT1994-06-101992-11-2018020690Fair

Predictive Analytics

Composite Research Score (1-10)
9
  HARD
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityBROAD
Expert Services Estimate$4,950 — $5,400
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
2,081
Recommended Classes
521
Government Assigned Classes
8
CPC
Title
Score
G06F8/76Adapting program code to run in a different environment| Porting2.283
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)2.283
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)2.281
G06F9/44568Immediately runnable code2.005
G06F21/44Program or device authentication2.005
G06F21/629to features or functions of an application2.005
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files1.826
G06Q20/3227Use of a security embedded in M-devices1.757
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC1.676
H04L9/3271using challenge-response1.676
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)1.676
H04W12/06Authentication1.676
G07F7/0893the card reader reading the card in a contactless manner1.676
H04W12/12Fraud detection1.676
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.676
G06K5/04Verifying the alignment of markings1.676
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords1.676
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities1.633
G06F21/602Providing cryptographic facilities or services1.633
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics1.633
G06K7/10297arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs  e.g. ISO/IEC 14443 and 18092 | protocols for data communication in general  | see|  | (ref: H04L29/06)1.618
G06F13/385for adaptation of a particular data processing system to different peripheral devices1.618
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.608
H04L63/168above the transport layer1.608
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)1.590
G06F8/41Compilation1.590
G06F9/4552Involving translation to a different instruction set architecture  e.g. just-in-time translation in a JVM1.590
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)1.589
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)1.589
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)1.585
G06F21/128involving web programs  i.e. using technology especially used in internet  generally interacting with a web browser  e.g. hypertext markup language [HTML]  applets  java1.577
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)1.577
H04L63/0281Proxies1.575
G06F21/33using certificates1.572
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity1.551
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.551
G06F9/54Interprogram communication1.546
G06F9/451Execution arrangements for user interfaces1.539
G06F3/0483interaction with page-structured environments  e.g. book metaphor1.539
H04L43/14using software  i.e. software packages | network security related monitoring | (ref: H04L63/1408)1.536
G06F12/0811with multilevel cache hierarchies1.531
G06F12/0866for peripheral storage systems  e.g. disk cache1.531
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)1.530
H04L67/143provided for session termination  e.g.  event controlled end of session1.525
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence1.525
G06F8/71Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management1.515
G06F8/30Creation or generation of source code1.515
G06F9/452Remote windowing  e.g. X-Window System  desktop virtualisation | protocols for telewriting | (ref: H04L67/38)1.515
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.515
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy1.515
G06Q30/0283Price estimation or determination1.513
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD1.513
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems1.507
G06F3/0482interaction with lists of selectable items  e.g. menus1.507
H04L67/148provided for migration or transfer of sessions | in-session procedures in real-time communications | (ref: H04L65/1083)| | control or signalling for completing the hand-off in wireless networks | (ref: H04W36/0005)1.505
G06F21/71to assure secure computing or processing of information1.502
G06F21/606by securing the transmission between two devices or processes1.501
G06Q20/38215Use of certificates or encrypted proofs of transaction rights1.494
H04W24/02Arrangements for optimising operational condition1.480
H04W48/18Selecting a network or a communication service1.480
G06F8/31Programming languages or programming paradigms1.475
G06F9/45508Runtime interpretation or emulation  e g. emulator loops  bytecode interpretation1.475
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage1.474
H04N21/8456by decomposing the content in the time domain  e.g. in time segments1.469
H04N21/23106involving caching operations | prefetching while addressing of a memory level in which the access to the desired data or data block requires associative addressing means within memory systems or architectures | (ref: G06F12/0862)| | caching at an intermediate stage in a data network | (ref: H04L29/08801)1.469
H04N21/4335Housekeeping operations  e.g. prioritizing content for deletion because of storage space restrictions | storage management  e.g. defragmentation | (ref: G06F3/0604)| | unloading stored programs | (ref: G06F9/445)| | storage management in file systems | (ref: G06F17/30067)| | buffering arrangements in a network node or in an end terminal in packet networks | (ref: H04L49/90)1.468
H04L47/10Flow control or congestion control1.468
H04L63/0263Rule management1.468
H04L45/24Multipath1.466
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals1.466
G06F9/4881Scheduling strategies for dispatcher  e.g. round robin  multi-level priority queues1.466
G06F9/5005to service a request1.464
G06F9/5061Partitioning or combining of resources1.464
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)1.461
G06F12/0882Page mode1.453
G06F12/0862with prefetch1.453
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine1.450
H04L63/0815providing single-sign-on or federations1.449
G06F9/5077Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455)1.448
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.447
G06T11/002D [Two Dimensional] image generation1.447
H04L63/166at the transport layer1.444
H04L63/1458Denial of Service1.444
G06F21/335for accessing specific resources  e.g. using Kerberos tickets1.444
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)1.443
G06F9/44542Retargetable1.441
G06F3/0238Programmable keyboards | key guide holders | (ref: G06F3/0224)1.441
G06F11/3684for test design  e.g. generating new test cases1.441
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance1.436
G06F3/04817using icons | graphical programming languages using iconic symbols | (ref: G06F8/34)1.436
H04L63/1416Event detection  e.g. attack signature detection1.436
G06F12/084with a shared cache1.436
G06F12/0868Data transfer between cache memory and other subsystems  e.g. storage devices or host systems1.436
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)1.431
G06Q20/4014Identity check for transaction1.431
H04L45/22Alternate routing1.430
G06F21/6245Protecting personal data  e.g. for financial or medical purposes1.428
H04L41/0806for initial configuration or provisioning1.426
H04L41/0226Mapping or translation of multiple network management protocols1.426
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)1.426
G06F21/54by adding security routines or objects to programs1.417
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself1.416
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database1.416
G06T1/20Processor architectures| Processor configuration  e.g. pipelining1.413
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes1.413
G06F8/658Incremental updates| Differential updates1.411
G06F8/656while running1.411
G06F8/458Synchronisation  e.g. post-wait  barriers  locks | synchronisation among tasks | (ref: G06F9/52)1.408
G06F11/3636by tracing the execution of the program1.408
G06Q20/352Contactless payments by cards1.402
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint1.401
G06Q20/354Card activation or deactivation1.398
G16H30/20for handling medical images  e.g. DICOM  HL7 or PACS1.389
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)1.382
G06F9/5072Grid computing1.382
H04L63/0272Virtual private networks1.377
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL1.377
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]1.372
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.369
G06F9/5055considering software capabilities  i.e. software resources associated or available to the machine1.363
G06F9/505considering the load1.363
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)1.360
H04W12/02Protecting privacy or anonymity1.360
G06Q20/3276using a pictured code  e.g. barcode or QR-code  being read by the M-device1.360
H04L63/102Entity profiles1.360
G06F11/3428Benchmarking1.358
H04L41/046Aspects of network management agents1.356
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)1.354
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]1.353
H04N21/2187Live feed1.351
H04N21/44016involving splicing one content stream with another content stream  e.g. for substituting a video clip1.351
G06F11/3624by performing operations on the source code  e.g. via a compiler1.349
A61F5/566Intra-oral devices1.349
G06F9/5016the resource being the memory1.349
G06F11/3604Software analysis for verifying properties of programs | byte-code verification | (ref: G06F9/44589)1.348
G06F9/45558Hypervisor-specific management and integration aspects1.345
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model1.343
G06Q20/3674involving authentication1.342
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip1.342
G06F21/6254by anonymising data  e.g. decorrelating personal data from the owner's identification1.342
H04L41/0896Bandwidth or capacity management  i.e. automatically increasing or decreasing capacities  e.g. bandwidth on demand | reallocation of resources  renegotiation of resources  e.g. in-call | (ref: H04L47/76)1.340
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow1.339
H04L65/4076Multicast or broadcast | data switching systems for broadcast or conference | (ref: H04L12/18)| | analog television systems in general | (ref: H04N7/00)| | creating video channels for a dedicated end-user group | (ref: H04N21/2668)| | arrangements for broadcast or distribution combined with broadcast | (ref: H04H20/00)| | arrangements for broadcast applications with a direct linkage of broadcast information | (ref: H04H60/00)| | arrangements for push based network services | (ref: H04L67/26)1.339
H04N21/222Secondary servers  e.g. proxy server  cable television Head-end | intermediate processing or storage in data networks | (ref: H04L29/08702)1.339
H04L63/0485Networking architectures for enhanced packet encryption processing  e.g. offloading of IPsec packet processing or efficient security association look-up1.337
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)1.337
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries1.333
G06F21/6263during internet communication  e.g. revealing personal data from cookies1.333
G06F21/72in cryptographic circuits1.328
G06F21/577Assessing vulnerabilities and evaluating computer system security1.328
G06F11/26Functional testing1.328
G06F9/4856resumption being on a different machine  e.g. task migration  virtual machine migration | (ref: G06F9/5088)|  takes precedence1.322
H04L9/3236using cryptographic hash functions1.320
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)1.320
H04L9/3247involving digital signatures1.316
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.316
H04L63/108when the policy decisions are valid for a limited amount of time1.316
G06F12/0646Configuration or reconfiguration1.315
G06Q10/101Collaborative creation of products or services1.314
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)1.313
H04L63/1425Traffic logging  e.g. anomaly detection1.312
G06F21/85interconnection devices  e.g. bus-connected or in-line devices1.311
H04L67/289where the intermediate processing is functionally located closer to the data consumer application  e.g. in same machine  in same home or in same subnetwork1.311
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)1.311
H04N21/4331Caching operations  e.g. of an advertisement for later insertion during playback1.308
H04N21/2183Cache memory | caches in web servers or browsers | (ref: G06F17/30902)| | intermediate storage and caching in data networks | (ref: H04L29/08801)1.308
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key1.307
G06F8/61Installation1.306
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits1.306
G06F8/60Software deployment1.306
G06F9/453Help systems1.306
G06F8/33Intelligent editors1.306
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)1.304
G06Q20/385Use of an alias or a single-use code1.304
G06Q20/405Establishing or using transaction specific rules1.304
A63F13/355Performing operations on behalf of clients with restricted processing capabilities  e.g. servers transform changing game scene into an MPEG-stream for transmitting to a mobile phone or a thin client1.302
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates1.301
H04W40/34Modification of an existing route1.301
H04L45/308Route determination based on user's profile  e.g. premium users1.301
G06F12/123with age lists  e.g. queue  most recently used [MRU] list or least recently used [LRU] list1.298
G06F8/36Software reuse1.297
G06F8/35Model driven1.297
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)1.297
H04L41/0893Assignment of logical groupings to network elements| Policy based network management or configuration1.293
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)1.293
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)1.293
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)1.291
H04L47/82Miscellaneous aspects1.291
H04W4/02Services making use of location information1.289
G06Q20/3829involving key management1.289
H04N21/64738Monitoring network characteristics  e.g. bandwidth  congestion level | data switched network analysis | (ref: H04L41/14)| | monitoring functioning in data switched networks | (ref: H04L43/0817)| | flow control in packet networks | (ref: H04L47/10)1.283
H04L67/306User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867)1.282
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)1.281
G06F9/4843by program  e.g. task dispatcher  supervisor  operating system1.279
G06F9/5038considering the execution order of a plurality of tasks  e.g. taking priority or time dependency constraints into consideration | scheduling strategies | (ref: G06F9/4881)|  and subgroups1.279
H04L12/1818Conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources  notifying involved parties1.278
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)1.278
H04L41/082due to updating or upgrading of network functionality  e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02)1.277
G06Q20/401Transaction verification1.276
G06F21/305by remotely controlling device operation1.274
G06Q30/0185Product  service or business identity fraud1.272
H04L67/1046Joining mechanisms1.271
H04L67/1074for supporting resource transmission mechanisms | routing over an overlay routing layer | (ref: H04L45/64)| | file transfer | (ref: H04L67/06)1.271
G06F11/0721within a central processing unit [CPU]1.270
H04L67/08adapted for terminal emulation  e.g. telnet | protocols for telewriting or protocols for networked simulations  virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455)1.269
H04L41/5096wherein the managed service relates to distributed or central networked applications | management of file systems | (ref: G06F17/30067)| | management of structured data stores | (ref: G06F17/30286)1.269
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)1.268
H04L63/105Multiple levels of security1.268
G06F9/547Remote procedure calls [RPC]| Web services1.268
G06Q20/18involving self- service terminals [SSTs]  vending machines  kiosks or multimedia terminals1.267
G06Q20/20Point-of-sale [POS] network systems | POS | per se|  | (ref: G07F)|  or | (ref: G07G)1.267
H04N21/4622Retrieving content or additional data from different sources  e.g. from a broadcast channel and the Internet | web site content organization and management for information retrieval from the Internet | (ref: G06F17/3089)| | transmission by internet of broadcast information | (ref: H04H60/82)| | stock exchange data over packet-switching network | (ref: H04L12/1804)| | push services including data channel over packet-switching network | (ref: H04L12/1859)1.266
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols1.265
G06Q30/0233Method of redeeming a frequent usage reward1.264
G06Q30/0207Discounts or incentives  e.g. coupons  rebates  offers or upsales1.264
H04L67/1021based on client or server locations1.263
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB1.262
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]1.262
H04N21/23406involving management of server-side video buffer1.262
G06Q10/06316Sequencing of tasks or work1.260
H04L47/781Centralized allocation of resource1.254
G06F21/564by virus signature recognition1.254
H04N21/2347involving video stream encryption | arrangements for secret or secure communication | (ref: H04L9/00)|   analogue secrecy systems | (ref: H04N7/16)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)| | arrangements for preventing the taking of data from a data transmission channel without authorisation | (ref: H04L12/22)| | security arrangements in wireless networks | (ref: H04W12/00)1.250
G06K9/6267Classification techniques1.249
G06F21/45Structures or tools for the administration of authentication1.248
H04L69/40Techniques for recovering from a failure of a protocol instance or entity  e.g. failover routines  service redundancy protocols  protocol state redundancy or protocol service redirection in case of a failure or disaster recovery | network fault management | (ref: H04L41/06)| | route fault recovery in network routing | (ref: H04L45/28)| | fault recovery in packet switches | (ref: H04L49/557)| | reactions to failures of replicated servers by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | intermediate processing of oper1.248
G06F8/427Parsing1.248
H04L9/008involving homomorphic encryption1.247
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)1.245
G06Q30/0275Auctions1.245
G06Q30/0257User requested1.245
G06F12/1027using associative or pseudo-associative address translation means  e.g. translation look-aside buffer [TLB]1.243
H04L49/90Queuing arrangements1.243
G06F12/0864using pseudo-associative means  e.g. set-associative or hashing1.243
G06F3/038Control and interface arrangements therefor  e.g. drivers or device-embedded control circuitry1.242
G06Q50/30Transportation| Communications1.242
A63F13/71using secure communication between game devices and game servers  e.g. by encrypting game data or authenticating players1.241
A63F13/216using geographical information  e.g. location of the game device or player using GPS1.241
A63F13/65automatically by game devices or servers from real world data  e.g. measurement in live racing competition1.241
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)1.241
G06F21/6272by registering files or documents with a third party1.240
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding1.240
H04L12/283Processing of data at an internetworking point of a home automation network1.236
G10L15/30Distributed recognition  e.g. in client-server systems  for mobile phones or network applications1.236
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level1.236
H04L41/5016based on statistics of service availability  e.g. in percentage or over a given time1.236
H04L9/085Secret sharing or secret splitting  e.g. threshold schemes1.235
H04N21/234363by altering the spatial resolution  e.g. for clients with a lower screen resolution1.234
H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP  | (ref: H04W80/04)1.232
H04L65/1069Setup | computer conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources or notifying involved parties | (ref: H04L12/1818)| | admission control or resource reservation in packet switching networks | (ref: H04L47/70)| | arrangements for peer-to-peer networking in network applications | (ref: H04L67/104)| | session management in network applications | (ref: H04L67/14)| | negotiation of communication capabilities | (ref: H04L69/24)1.232
G06Q10/105Human resources1.231
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)1.231
H04L67/1014based on the content of a request1.230
H04N21/4312involving specific graphical features  e.g. screen layout  special fonts or colors  blinking icons  highlights or animations1.230
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements1.229
G06F8/443Optimisation1.229
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines1.229
G06Q20/3226Use of secure elements separate from M-devices1.228
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)1.228
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys1.228
H04L9/0819Key transport or distribution  i.e. key establishment techniques where one party creates or otherwise obtains a secret value  and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062)1.225
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]1.225
H04W12/10Integrity1.224
H04L51/046interacting with other applications or services1.222
G06Q50/01Social networking1.222
G06F9/541via adapters  e.g. between incompatible applications1.220
G06F13/1694Configuration of memory controller to different memory types1.219
H04L63/14for detecting or protecting against malicious traffic1.218
G06Q20/3567Software being in the reader1.217
G06F21/552involving long-term monitoring or reporting1.217
G06F12/0895of parts of caches  e.g. directory or tag array1.215
G06Q10/063Operations research or analysis1.214
G01S19/05providing aiding information1.214
G06F8/433Dependency analysis| Data or control flow analysis1.213
G06F8/4443Inlining1.213
H04W4/029Location-based management or tracking services1.213
H04N21/84Generation or processing of descriptive data  e.g. content descriptors | systems specially adapted for using meta-information in broadcast systems | (ref: H04H60/73)1.212
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones1.209
G06F8/20Software design1.207
G06Q10/0834Choice of carriers1.206
H04L67/1082involving incentive schemes1.206
G06Q40/12Accounting1.206
G06F12/0842for multiprocessing or multitasking1.206
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences1.205
G06Q20/045characterized in that the payment protocol involves at least one ticket1.205
G06F9/4416Network booting| Remote initial program loading [RIPL]1.203
G06F21/121Restricting unauthorised execution of programs1.203
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]1.203
G06Q30/0209Incentive being awarded or redeemed in connection with the playing of a video game1.203
H03M13/09Error detection only  e.g. using cyclic redundancy check [CRC] codes or single parity bit | error detection or correction by redundancy in data representation | (ref: G06F11/08)1.203
H03M13/154Error and erasure correction  e.g. by using the error and erasure locator or Forney polynomial1.203
G06F21/554involving event detection and direct action1.201
G06F9/4812by interrupt  e.g. masked1.201
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)1.201
H04L63/0245Filtering by information in the payload1.201
G06T19/006Mixed reality | object pose determination  tracking or camera calibration for mixed reality | (ref: G06T7/00)1.200
G06T19/20Editing of 3D images  e.g. changing shapes or colours  aligning objects or positioning parts1.200
G06F9/30047Prefetch instructions| cache control instructions1.199
A63F13/358Adapting the game course according to the network or server load  e.g. for reducing latency due to different connection speeds between clients1.199
G06T1/60Memory management1.198
G06F3/062Securing storage systems1.197
H04L9/0618Block ciphers  i.e. encrypting groups of characters of a plain text message using fixed encryption transformation1.197
G06F21/55Detecting local intrusion or implementing counter-measures1.197
G06F9/4403Processor initialisation1.197
G06N5/022Knowledge engineering  knowledge acquisition1.197
H04L45/34Source routing1.196
H04L41/0645by additionally acting on or stimulating the network after receiving notifications1.195
H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture| Specification of modified or new header fields | protocols engines in general | (ref: H04L69/12)| | OSI stack based layering aspects | (ref: H04L69/32)| | protocol header analysis in general | (ref: H04L69/22)| | addressing aspects in multiple interfaces involving dual-stack hosts | (ref: H04L61/6086)1.195
B60W50/06Improving the dynamic response of the control system  e.g. improving the speed of regulation or avoiding hunting or overshoot1.195
G10L15/22Procedures used during a speech recognition process  e.g. man-machine dialogue1.195
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules1.194
G06F12/0886Variable-length word access1.193
G06F12/0871Allocation or management of cache space1.193
H04L41/0843based on generic templates1.193
G06Q10/103Workflow collaboration or project management1.193
G06F9/44Arrangements for executing specific programs1.193
G06F9/30145Instruction analysis  e.g. decoding  instruction word fields1.192
G06F9/30101Special purpose registers1.192
H04L65/403Arrangements for multiparty communication  e.g. conference | television conferencing systems | (ref: H04N7/15)| | telephonic conference systems | (ref: H04M3/56)| | data switching systems for computer conference | (ref: H04L12/1813)1.192
H04N7/147Communication arrangements  e.g. identifying the communication as a video-communication  intermediate storage of the signals | selecting | (ref: H04Q)1.192
G06F21/6281at program execution time  where the protection is within the operating system1.191
G06F8/4452Software pipelining1.190
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode1.190
G06F21/31User authentication1.189
G06F3/167Audio in a user interface  e.g. using voice commands for navigating  audio feedback1.189
H04L45/121Minimizing delay1.189
H04L43/0864Round trip delays1.189
G06F9/5011the resources being hardware resources other than CPUs  Servers and Terminals1.189
G06F8/38for implementing user interfaces1.189
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)1.189
G06F12/0817using directory methods1.188
G06F12/0828with concurrent directory accessing  i.e. handling multiple concurrent coherency transactions1.188
G06N3/082modifying the architecture  e.g. adding or deleting nodes or connections  pruning1.188
H04N21/4782Web browsing |   e.g. WebTV | information retrieval from the Internet | (ref: G06F17/30861)| | protocols for network applications involving the use of web-based technology | (ref: H04L29/0809)1.188
H04M15/64On-line charging system [OCS]1.188
H04W4/10Push-to-Talk [PTT] or Push-On-Call services1.186
H04W76/45for Push-to-Talk [PTT] or Push-to-Talk over cellular [PoC] services1.186
G06N7/02using fuzzy logic | (ref: G06N3/00)|   | (ref: G06N5/00)|  take precedence| for adaptive control | (ref: G05B13/00)1.186
G06F12/0253Garbage collection  i.e. reclamation of unreferenced memory1.185
G06F12/0238Memory management in non-volatile memory  e.g. resistive RAM or ferroelectric memory1.185
H04L43/026using flow generation1.183
G05B19/4184characterised by fault tolerance  reliability of production system1.182
H04L67/2885Hierarchically arranged intermediate devices  e.g. hierarchical caching1.182
G06F12/1072Decentralised address translation  e.g. in distributed shared memory systems1.180
G06F13/404with address mapping1.180
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)1.180
G06Q20/4016involving fraud or risk level assessment in transaction processing1.180
G06F12/0808with cache invalidating means | (ref: G06F12/0815)|  takes precedence1.180
G06F12/126with special data handling  e.g. priority of data or instructions  handling errors or pinning1.180
G06Q50/10Services1.179
G06Q20/02involving a neutral party  e.g. certification authority  notary or trusted third party [TTP]1.179
G06F9/50Allocation of resources  e.g. of the central processing unit [CPU]1.178
A63F13/792for payment purposes  e.g. monthly subscriptions1.178
A63F13/75Enforcing rules  e.g. detecting foul play or generating lists of cheating players1.178
G06F9/5066Algorithms for mapping a plurality of inter-dependent sub-tasks onto a plurality of physical CPUs | mappping at compile time  | see|  | (ref: G06F8/451)1.178
G06F9/44526Plug-ins| Add-ons1.177
H04L9/3218using proof of knowledge  e.g. Fiat-Shamir  GQ  Schnorr  ornon-interactive zero-knowledge proofs1.177
H04N21/632using a connection between clients on a wide area network  e.g. setting up a peer-to-peer communication via Internet for retrieving video segments from the hard-disk of other client devices | broadcast-related systems characterised by transmission among terminal devices | (ref: H04H60/80)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)1.176
H04N21/466Learning process for intelligent management  e.g. learning user preferences for recommending movies | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | computer systems using learning methods | (ref: G06N3/08)| | services using the results of monitoring in broadcast systems | (ref: H04H60/61)1.176
G06F9/45533Hypervisors| Virtual machine monitors1.175
G06F3/0622in relation to access1.175
G06F11/362Software debugging1.175
G06T13/40of characters  e.g. humans  animals or virtual beings1.174
G06F9/44521Dynamic linking or loading| Link editing at or after load time  e.g. Java class loading1.173
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling1.173
G06F15/00Digital computers in general | details | (ref: G06F1/00)|  – | (ref: G06F13/00)| Data processing equipment in general1.172
G06F15/161Computing infrastructure  e.g. computer clusters  blade chassis or hardware partitioning | casings  cabinets  racks or drawers for data centers | (ref: H05K5/00)1.171
H04W88/16Gateway arrangements1.170
H04L12/2834Switching of information between an external network and a home network | access arrangements | (ref: H04L12/2856)1.170
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)1.170
G06T19/00Manipulating 3D models or images for computer graphics1.169
H04W4/44for communication between vehicles and infrastructures  e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]1.169
H04L63/126the source of the received data1.169
H04L41/0853by actively collecting or retrieving configuration information1.169
G05B19/41845characterised by system universality  reconfigurability  modularity1.169
H04W36/18for allowing seamless reselection  e.g. soft reselection1.169
H04W36/06Reselecting a communication resource in the serving access point1.169
H04W84/12WLAN [Wireless Local Area Networks]1.169
H04L51/00Arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages1.168
G06F9/548Object oriented| Remote method invocation [RMI] | non-remote method invocation | (ref: G06F9/449)1.167
H04L9/3221interactive zero-knowledge proofs1.167
H04L63/101Access control lists [ACL]1.167
G06F12/1425the protection being physical  e.g. cell  word  block1.165
G06F11/1433during software upgrading1.165
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment1.165
G06K9/628Multiple classes1.164
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints1.164
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability1.164
H04B7/088using beam selection1.162
G06Q20/3224Transactions dependent on location of M-devices1.162
H04L43/0811Connectivity1.161
H04N21/25808Management of client data | protocols involving terminal profiles for network applications in communication control or processing | (ref: H04L29/08927)1.161
G06F8/4434Reducing the memory space required by the program code1.161
G06Q50/18Legal services| Handling legal documents1.160
G06Q10/1095Meeting or appointment1.159
G06Q10/06313Resource planning in a project environment1.159
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)1.159
H04L69/03Protocol definition or specification | protocol conformance testing | (ref: H04L1/244)| | specification techniques | (ref: G06F8/10)1.159
H04W4/50Service provisioning or reconfiguring1.159
G06F11/3409for performance assessment1.159
G06F21/12Protecting executable software1.158
H04L67/1004Server selection in load balancing1.158
H04N21/8549Creating video summaries  e.g. movie trailer | retrieval in video databases by using presentations in form of a video summary | (ref: G06F17/30843)1.158
H04N21/23424involving splicing one content stream with another content stream  e.g. for inserting or substituting an advertisement1.158
G06F3/1204resulting in reduced user or operator actions  e.g. presetting  automatic actions  using hardware token storing data1.157
G06F3/1288in client-server-printer device configuration1.157
G06F3/1203Improving or facilitating administration  e.g. print management1.157
G06F8/52Binary to binary1.157
H04L65/80QoS aspects | monitoring of the downstream path of a video distribution network | (ref: H04N21/2402)|   | (ref: H04N21/44209)| | network service management  ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer | (ref: H04L41/50)| | monitoring arrangements  testing arrangements  with monitoring of QoS metrics | (ref: H04L43/08)| | traffic-type related flow control in packet switching networks  e.g. priorities or QoS | (ref: H04L47/24)| | admission control/resource reservation in packet switching networks based 1.156
H04L67/101based on network conditions1.156
H04M15/51for resellers  retailers or service providers1.156
G06F3/1454involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays  e.g. teledisplay1.155
H04L12/189in combination with wireless systems | selective distribution or broadcast in wireless communication networks | (ref: H04W4/06)1.154
H04L67/1023based on other criteria  e.g. hash applied to IP address  specific algorithms or cost1.153
B25J9/1671characterised by simulation  either to verify existing program or to create and verify new program  CAD/CAM oriented  graphic oriented programming systems1.153
A63F13/35Details of game servers1.153
H04N21/23439for generating different versions1.152
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]1.151
H04L41/14involving network analysis or design  e.g. simulation  network model or planning | network monitoring | (ref: H04L43/00)1.151
H04L41/142using statistical or mathematical methods1.151
G06F8/34Graphical or visual programming1.150
G06F8/70Software maintenance or management1.150
G06F15/167using a common memory  e.g. mailbox1.149
G06Q10/0631Resource planning  allocation or scheduling for a business operation1.147
H04L47/828Allocation of resources per group of connections  e.g. per group of users1.147
G06F8/751Code clone detection1.147
G06F21/445by mutual authentication  e.g. between devices or programs1.147
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals1.147
G06K7/14172D bar codes1.146
G06Q10/087Inventory or stock management  e.g. order filling  procurement  balancing against orders1.146
G06F11/1658Data re-synchronization of a redundant component  or initial sync of replacement  additional or spare unit1.146
G06F9/4482Procedural1.146
H04W8/183Processing at user equipment or user record carrier1.146
G06N5/04Inference methods or devices1.146
H04L45/02Topology update or discovery | topology discovery for network management | (ref: H04L41/12)| | LAN interconnection over a backbone network | (ref: H04L12/4604)| | node-based peer discovery mechanisms in peer-to-peer networks | (ref: H04L67/1061)1.145
H04L67/104for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer  upload  download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r1.144
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]1.144
H04L65/1083In-session procedures | computer conferences  network arrangements for conference optimisation or adaptation | (ref: H04L12/1827)| | reactions to resource unavailability in packet switching networks | (ref: H04L47/74)| | reallocation or renegotiation of resources in packet switching networks | (ref: H04L47/76)1.144
G06F11/3093Configuration details thereof  e.g. installation  enabling  spatial arrangement of the probes1.144
G05D1/0088characterized by the autonomous decision making process  e.g. artificial intelligence  predefined behaviours | using knowledge based models | (ref: G06N5/00)1.144
G06F11/3079the data filtering being achieved by reporting only the changes of the monitored data1.143
G06F21/604Tools and structures for managing or administering access control systems1.143
H04L12/1827Network arrangements for conference optimisation or adaptation1.142
G06F9/542Event management| Broadcasting| Multicasting| Notifications1.142
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)1.141
G06F12/1045associated with a data cache1.141
G06F11/3664Environments for testing or debugging software1.141
G06F11/3644by instrumenting at runtime1.141
G06Q10/00Administration| Management1.140
B60W30/08Active safety systems|  predicting or avoiding probable or impending collision | or attempting to minimise its consequences1.140
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM] | network arrangements or protocols for real-time communications | (ref: H04L65/00)1.140
G10L17/04Training  enrolment or model building1.140
G10L17/00Speaker identification or verification1.140
G06F12/1441for a range1.139
H04N21/2225Local VOD servers1.139
G06Q10/107Computer aided management of electronic mail | electronic mail protocols | (ref: H04L29/06)| | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)1.139
H04W12/08Access security1.138
G05B19/418Total factory control  i.e. centrally controlling a plurality of machines  e.g. direct or distributed numerical control [DNC]  flexible manufacturing systems [FMS]  integrated manufacturing systems [IMS]  computer integrated manufacturing [CIM]1.138
G05B19/41865characterised by job scheduling  process planning  material flow1.138
G06F7/483Computations with numbers represented by a non-linear combination of denominational numbers  e.g. rational numbers  logarithmic number system  floating-point numbers | conversion to or from floating-point codes | (ref: H03M7/24)|  | (ref: G06F7/4806)|   | (ref: G06F7/4824)|   | (ref: G06F7/49)|   | (ref: G06F7/491)|   | (ref: G06F7/544)|  take precedence1.137
G06F9/3001Arithmetic instructions1.137
G06F7/57Arithmetic logic units [ALU]  i.e. arrangements or devices for performing two or more of the operations covered by groups | (ref: G06F7/483)|  - | (ref: G06F7/556)|  or for performing logical operations | instruction execution | (ref: G06F9/30)|  | (ref: G06F7/49)|   | (ref: G06F7/491)|  take precedence| logic gate circuits | (ref: H03K19/00)1.137
G06Q50/265Personal security  identity or safety1.137
G08G1/0112from the vehicle  e.g. floating car data [FCD]1.137
G06F21/88Detecting or preventing theft or loss1.136
G06F9/48Program initiating| Program switching  e.g. by interrupt1.136
G09B7/02of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student1.136
B60R25/252Fingerprint recognition1.135
B60R25/25using biometry1.135
G06N3/0454using a combination of multiple neural nets1.133
G06Q30/0243Comparative campaigns1.133
H04N21/23418involving operations for analysing video streams  e.g. detecting features or characteristics | filtering for image enhancement | (ref: G06T5/00)| | methods or arrangements for recognising scenes | (ref: G06K9/00624)| | arrangements characterised by components specially adapted for monitoring  identification or recognition of video in broadcast systems | (ref: H04H60/59)| | television picture signal circuitry for scene change detection | (ref: H04N5/147)1.132
H04N21/2393involving handling client requests | scheduling and organising the servicing of requests in data switching networks | (ref: H04L29/08945)1.132
H04L49/9063Intermediate storage in different physical parts of a node or terminal1.130
G06F15/17331Distributed shared memory [DSM]  e.g. remote direct memory access [RDMA]1.130
H04L49/356Storage area network switches1.130
H04L43/0876Network utilization1.130
G06Q30/06Buying  selling or leasing transactions1.129
G05B19/4185characterised by the network communication1.127
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks1.127
G06Q20/3825Use of electronic signatures1.126
H04L67/288Distributed intermediate devices  i.e. intermediate device interaction with other intermediate devices on the same level1.126
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms1.123
H04N19/513Processing of motion vectors1.122
G06Q30/0201Market data gathering  market analysis or market modelling1.122
G07C9/00174Electronically operated locks| Circuits therefor| Nonmechanical keys therefor  e.g. passive or active electrical keys or other data carriers without mechanical keys | mechanical locks with electric permutation | (ref: E05B49/00)| | arrangements for sensing or reading record carriers | (ref: G06K7/00)|   | (ref: G06K9/00)| | electronic switching | (ref: H03K17/00)1.122
G06F21/60Protecting data1.121
G06F3/0613in relation to throughput1.120
G06Q20/3274using a pictured code  e.g. barcode or QR-code  being displayed on the M-device1.120
G05B23/0291Switching into safety or degraded mode  e.g. protection and supervision after failure1.120
H04L65/4053without floor control1.119
A63F13/327using wireless networks  e.g. Wi-Fi or piconet1.118
G06F21/645using a third party1.118
H04L41/12network topology discovery or management | topology discovery for routing | (ref: H04L45/02)1.118
H04L63/123received data contents  e.g. message integrity1.118
G06Q20/4018using the card verification value [CVV] associated with the card1.118
G06Q20/3827Use of message hashing1.117
G06F9/465Distributed object oriented systems | remote method invocation [RMI] | (ref: G06F9/548)1.117
G06F12/0877Cache access modes1.117
G06F12/0815Cache consistency protocols1.117
H04L61/2514between local and global IP addresses1.116
G06F11/3612by runtime analysis | performance monitoring | (ref: G06F11/3466)1.116
H04L63/02for separating internal from external traffic  e.g. firewalls1.114
G11C11/40603Arbitration  priority and concurrent access to memory cells for read/write or refresh operations1.114
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)1.114
G06F3/067Distributed or networked storage systems  e.g. storage area networks [SAN]  network attached storage [NAS]1.114
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)1.114
H04L63/104Grouping of entities1.114
G06Q20/145Payments according to the detected use or quantity1.114
G06Q10/0832Special goods or special handling procedures1.114
G06F12/0822Copy directories | local copy tags for implementing a bus snooping protocol | (ref: G06F12/0831)1.114
H04N21/2541Rights Management | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)1.114
H04N21/25841involving the geographical location of the client | retrieval from the Internet by querying based on geographical locations | (ref: G06F17/3087)| | arrangements for identifying locations of receiving stations in broadcast systems | (ref: H04H60/51)| | protocols in which the network application is adapted for the location of the user terminal in communication control or processing | (ref: H04L29/08657)| | services making use of the location of users or terminals in wireless networks | (ref: H04W4/02)| | locating users or terminals in wireless networks | (ref: H04W64/00)1.114
G06F12/0804with main memory updating | (ref: G06F12/0806)|  takes precedence1.112
G06F12/0897with two or more cache hierarchy levels | with multilevel cache hierarchies | (ref: G06F12/0811)1.112
H04W8/186Processing of subscriber group data1.111
H04W8/26Network addressing or numbering for mobility support1.111
H04W4/08User group management1.111
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)1.110
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)1.110
H04L12/4604LAN interconnection over a backbone network  e.g. Internet  Frame Relay1.110
G06F9/522Barrier synchronisation1.109
G06Q30/018Business or product certification or verification1.108
G06F21/36by graphic or iconic representation1.108
H04L45/306Route determination based on the nature of the carried application | communications protocols whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status | (ref: H04L67/327)1.107
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)1.106
H04L41/0816due to adaptation  e.g. in response to network events1.106
H02J3/32using batteries with converting means1.106
G07C5/0808Diagnosing performance data | testing of vehicles | (ref: G01M17/00)| | testing of electrical installation on vehicles | (ref: G01R31/005)1.105
G06F13/20for access to input/output bus1.105
H04L41/0866Checking configuration1.105
G06F9/546Message passing systems or structures  e.g. queues1.102
H04L12/44Star or tree networks1.102
G06F12/1081for peripheral access to main memory  e.g. direct memory access [DMA]1.102
G06F9/3851from multiple instruction streams  e.g. multistreaming | initiation or dispatching of multiple tasks or threads | (ref: G06F9/48)1.101
G06F9/3887controlled by a single instruction  e.g. SIMD1.101
H04L47/783Distributed allocation of resources  e.g. bandwidth brokers1.101
G08G3/00Traffic control systems for marine craft | marking of navigational route | (ref: B63B22/16)|   | (ref: B63B51/00)1.101
G06Q20/16Payments settled via telecommunication systems1.100
G06Q20/3821Electronic credentials1.100
G06Q20/12specially adapted for electronic shopping systems1.100
G06F3/0484for the control of specific functions or operations  e.g. selecting or manipulating an object or an image  setting a parameter value or selecting a range1.100
G06F11/3414Workload generation  e.g. scripts  playback1.100
H04L47/283Network and process delay  e.g. jitter or round trip time [RTT]1.099
G06F9/30003Arrangements for executing specific machine instructions1.099
G06F9/5044considering hardware capabilities1.099
H04L9/3252using DSA or related signature schemes  e.g. elliptic based signatures  ElGamal or Schnorr schemes1.098
H04M3/42042Notifying the called party of information on the calling party | details within substation equipment | (ref: H04M1/57)|   signalling details | (ref: H04Q3/72)1.097
G06F21/35communicating wirelessly1.097
G05B19/4183characterised by data acquisition  e.g. workpiece identification1.096
G05B23/0272Presentation of monitored results  e.g. selection of status reports to be displayed| Filtering information to the user1.096
G06Q20/065using e-cash1.096
G06F9/45516Runtime code conversion or optimisation1.096
G06F3/0635by changing the path  e.g. traffic rerouting  path reconfiguration1.095
H04L9/321involving a third party or a trusted authority1.095
G16H10/60for patient-specific data  e.g. for electronic patient records1.095
G16H20/10relating to drugs or medications  e.g. for ensuring correct administration to patients1.095
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation1.094
G16H40/67for remote operation1.094
G06F3/011Arrangements for interaction with the human body  e.g. for user immersion in virtual reality | for handicapped people in general | (ref: A61F4/00)| | robot control | (ref: B25J)| | tactile signalling | (ref: G08B)| | blind teaching | (ref: G09B21/00)| | for electrophonic musical instruments | (ref: G10H1/344)| | electronic switches characterised by the way in which the control signals are generated | (ref: H03K17/94)1.094
G06F11/0709in a distributed system consisting of a plurality of standalone computer nodes  e.g. clusters  client-server systems1.094
G06F11/079Root cause analysis  i.e. error or fault diagnosis | in a hardware test environment | (ref: G06F11/22)| | in a software test environment | (ref: G06F11/36)1.094
G06F9/52Program synchronisation| Mutual exclusion  e.g. by means of semaphores1.093
G05B19/056Programming the PLC1.093
G06F12/109for multiple virtual address spaces  e.g. segmentation | (ref: G06F12/1036)|  takes precedence1.092
G06F9/544Buffers| Shared memory| Pipes1.092
G06F9/3836Instruction issuing  e.g. dynamic instruction scheduling  out of order instruction execution1.092
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)1.092
H04W24/08Testing  | supervising or monitoring|  using real traffic1.092
H04W48/17Selecting a data network PoA [Point of Attachment]1.092
G06F21/562Static detection1.091
G06T17/20Finite element generation  e.g. wire-frame surface description  | tesselation1.091
H04W12/04Key management1.091
G06F9/30134Register stacks| shift registers1.091
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence1.090
G06F13/1668Details of memory controller1.090
G06F3/0685Hybrid storage combining heterogeneous device types  e.g. hierarchical storage  hybrid arrays1.090
G16H10/20for electronic clinical trials or questionnaires1.089
G16H30/40for processing medical images  e.g. editing1.089
G06F21/563by source code analysis1.089
G06Q30/0621Item configuration or customization1.089
H04N21/4755for defining user preferences  e.g. favourite actors or genre | retrieval personalisation and generation of user profiles for the retrieval of video data | (ref: G06F17/30843)| | data switching network applications using user profiles | (ref: H04L29/08936)1.089
B66B1/3461between the elevator control system and remote or mobile stations1.088
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity1.088
G06F3/0611in relation to response time1.088
H04N21/47202for requesting content on demand  e.g. video on demand1.088
G06F13/4282on a serial bus  e.g. I2C bus  SPI bus | on daisy chain buses | (ref: G06F13/4247)1.087
G06F13/4265on a point to point bus | (ref: G06F13/4247)|   | (ref: G06F13/4282)|  take precedence1.087
G06F13/40Bus structure | for computer networks | (ref: G06F15/163)| | for optical bus networks | (ref: H04B10/25)1.087
G06F13/4027using bus bridges | (ref: G06F13/4022)|  takes precedence1.087
G06F13/4295using an embedded synchronisation1.087
H04L9/0872using geo-location information  e.g. location data  time  relative position or proximity to other entities1.086
G06Q30/0222During e-commerce  i.e. online transactions1.086
G06Q30/0239Online discounts or incentives1.086
G06F9/468Specific access rights for resources  e.g. using capability register1.084
G06F11/0793Remedial or corrective actions | by retry | (ref: G06F11/1402)| | recovery from an exception in an instruction pipeline | (ref: G06F9/3861)| | in a network context | (ref: H04L29/14)1.084
G06F11/0769Readable error formats  e.g. cross-platform generic formats  human understandable formats1.084
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour1.083
G06Q20/42Confirmation  e.g. check or permission by the legal debtor of payment1.083
G06F3/017Gesture based interaction  e.g. based on a set of recognized hand gestures | interaction based on gestures traced on a digitiser | (ref: G06F3/04883)1.083
G06F3/0346with detection of the device orientation or free movement in a 3D space  e.g. 3D mice  6-DOF [six degrees of freedom] pointers using gyroscopes  accelerometers or tilt-sensors1.083
H04L41/0246exchanging or transporting network management information using Internet  e.g. aspects relating to embedding network management web servers in network elements  web service for network management purposes  aspects related to Internet applications or services or web-based protocols  simple object access protocol [SOAP] | web-based network application protocols | (ref: H04L67/02)| | web-based network application protocols for remote control of end-devices or monitoring of remote application data | (ref: H04L67/025)| | proprietary application protocols for remote control of end-devices in special1.082
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication1.082
H04L67/1012based on compliance of requirements or conditions with available server resources1.082
G06F3/162Interface to dedicated audio devices  e.g. audio drivers  interface to CODECs1.081
G06N5/02Knowledge representation | (ref: G06N5/04)|  takes precedence1.080
E02F9/2054Fleet management1.080
H04W64/00Locating users or terminals | or network equipment|  for network management purposes  e.g. mobility management1.080
H04W36/08Reselecting an access point1.080
H04W84/045using private Base Stations  e.g. femto Base Stations  home Node B1.079
H04W48/16Discovering  processing access restriction or access information1.079
H04L43/045for graphical visualization of monitoring data | graphical user interfaces | (ref: H04L41/22)| | display of network or application conditions affecting the network application to the application user | (ref: H04L67/36)| | visual indication of the functioning of a computing machine | (ref: G06F11/32)1.078
H04L43/12using dedicated network monitoring probes1.078
H04L43/04Processing of captured monitoring data1.078
G06F1/3237Power saving by disabling clock generation or distribution1.077
G06F1/3206Monitoring a parameter  a device or an event triggering a change in power modality1.077
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)1.077
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)1.077
G10L15/1822Parsing for meaning understanding1.076
G10L15/1815Semantic context  e.g. disambiguation of the recognition hypotheses based on word meaning1.076
G06Q20/24Credit schemes  i.e. "pay after"1.076
G06Q20/0855involving a third party1.076
G05B19/41885characterised by modeling  simulation of the manufacturing system1.075
G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction1.074
G06F21/125by manipulating the program code  e.g. source code  compiled code  interpreted code  machine code1.073
H04L9/0869involving random numbers or seeds1.073
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals1.072
G06F12/1491in a hierarchical protection system  e.g. privilege levels  memory rings1.072
G06F8/54Link editing before load time1.072
G06F12/0888using selective caching  e.g. bypass1.072
G06F9/45537Provision of facilities of other operating environments  e.g. WINE | I/O emulation | (ref: G06F13/105)1.072
H04L63/1433Vulnerability analysis1.071
A63F13/34using peer-to-peer connections1.071
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks1.070
G06F13/1689Synchronisation and timing concerns | synchronisation on a memory bus | (ref: G06F13/4234)1.070
G06Q30/02Marketing  e.g. market research and analysis  surveying  promotions  advertising  buyer profiling  customer management or rewards| Price estimation or determination1.070
H04N21/4725using interactive regions of the image  e.g. hot spots | details of information retrieval from the Internet by using URLs | (ref: G06F17/30876)| | processing chained hypermedia data for information retrieval | (ref: G06F17/30014)1.070
G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means  e.g. caches1.070
G06Q20/14specially adapted for billing systems1.070
G06F17/40Data acquisition and logging | for input to computer | (ref: G06F3/00)|   | | displays as computer output | (ref: G06F3/14)| | for image data processing | (ref: G06T9/00)| | compression in general | (ref: H03M7/30)| | for transmission | (ref: H04B1/66)| | for pictorial communication | (ref: H04N)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station | (ref: H04Q9/00)1.070
G06F13/10Program control for peripheral devices | (ref: G06F13/14)|  - | (ref: G06F13/42)|  take precedence1.069
H04L69/165involving combined use or selection criteria between TCP and UDP protocols | multi-protocol arrangements in general | (ref: H04L69/18)| | multilink protocols in general | (ref: H04L69/14)1.069
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)1.069
G06F11/302where the computing system component is a software system1.069
G06F11/3495for systems1.069
H04W36/0016for hand-off preparation1.069
H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom1.068
G01C21/20Instruments for performing navigational calculations | (ref: G01C21/24)|   | (ref: G01C21/26)|  take precedence| adaptations of digital computers to a specific function or application | (ref: G06F17/00)|   | (ref: G06F19/00)1.067
H02J50/80involving the exchange of data  concerning supply or distribution of electric power  between transmitting devices and receiving devices1.067
G06F11/1471involving logging of persistent data for recovery1.067
G06T7/50Depth or shape recovery1.067
G06T7/536from perspective effects  e.g. by using vanishing points1.067
H04M3/533Voice mail systems1.067
H04M7/1295Details of dual tone multiple frequency signalling1.067
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)1.066
G06F21/575Secure boot1.066
H04N21/23892involving embedding information at multiplex stream level  e.g. embedding a watermark at packet level1.065
G06F21/16Program or content traceability  e.g. by watermarking | digital watermarking on images | (ref: H04N1/32)1.065
H04N21/4353involving decryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)1.065
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds1.065
H04N21/8352involving content or source identification data  e.g. Unique Material Identifier [UMID]1.064
H04L67/2895where the intermediate processing is functionally located closer to the data provider application  e.g. reverse proxies| in same machine  in same cluster or subnetwork1.063
H04L67/2866Architectural aspects1.063
H04W4/40for vehicles  e.g. vehicle-to-pedestrians [V2P]1.063
G05B19/41835characterised by programme execution1.063
G06Q50/184Intellectual property management1.063
H04W28/0273adapting protocols for flow control or congestion control to wireless environment  e.g. adapting transmission control protocol [TCP] | wireless network protocols or protocol adaptations to wireless operation  e.g. wireless application protocol | (ref: H04W80/00)1.061
H04L45/126minimizing geographical or physical path length1.061
G06F9/45504Abstract machines for programme code execution  e.g. Java virtual machine [JVM]  interpreters  emulators1.061
G06F9/4451User profiles  roaming | user profiles for network-specific applications | (ref: H04L67/306)1.061
H04L51/02with automatic reactions or user delegation  e.g. automatic replies or chatbot1.060
H04N21/2335involving reformatting operations of audio signals  e.g. by converting from one coding standard to another | details of audio signal transcoding | (ref: G10L19/173)1.060
G06F3/04847Interaction techniques to control parameter settings  e.g. interaction with sliders  dials1.060
H04M1/6075adapted for handsfree use in a vehicle | (ref: H04M1/6058)|  takes precedence| arrangements for holding telephones in a vehicle | (ref: B60R11/0241)1.060
G06F3/0659Command handling arrangements  e.g. command buffers  queues  command scheduling1.058
E21B41/00Equipment or details not covered by groups | (ref: E21B15/00)|  - | (ref: E21B40/00)1.058
H04N21/812involving advertisement data | advertising | per se|  | (ref: G06Q30/02)1.057
H04N21/26258for generating a list of items to be played back in a given order  e.g. playlist  or scheduling item distribution according to such list | retrieval of multimedia data based on playlists | (ref: G06F17/30017)1.057
H04W28/10Flow control | between communication endpoints1.057
H04L41/0886Fully automatic configuration1.057
H04N21/238Interfacing the downstream path of the transmission network  e.g. adapting the transmission rate of a video stream to network bandwidth| Processing of multiplex streams | hybrid Fiber Coaxial HFC networks for downstream channel allocation for video distribution | (ref: H04L12/2801)| | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing | (ref: H04L29/08945)| | flow control in packet networks | (ref: H04L47/10)1.056
H04N19/159Prediction type  e.g. intra-frame  inter-frame or bidirectional frame prediction1.056
H04N21/631Multimode Transmission  e.g. transmitting basic layers and enhancement layers of the content over different transmission paths or transmitting with different error corrections  different keys or with different transmission protocols1.056
H04N19/593involving spatial prediction techniques1.056
G06F7/582Pseudo-random number generators1.056
G06Q20/0658e-cash managed locally1.056
H04L47/125Load balancing  e.g. traffic engineering | load balancing among servers | (ref: H04L67/1002)1.055
G06F13/4068Electrical coupling1.055
G06F1/3275Power saving in memory  e.g. RAM  cache1.055
G06F1/3225of memory devices1.055
H04W76/25Maintenance of established connections1.055
G06F3/1287via internet1.055
H04L45/44Distributed routing1.055
G06Q10/20Product repair or maintenance administration1.054
H04L65/103in the network1.054
G06Q30/0623Item investigation1.054
H04L12/281indicating a format for calling an appliance service function in a home automation network | protocols for network applications involving the use of web-based technology | (ref: H04L29/08099)1.054
G06F13/4022using switching circuits  e.g. switching matrix  connection or expansion network | (ref: G06F13/4009)|  takes precedence1.054
G06Q20/223based on the use of peer-to-peer networks1.053
G06Q20/3678e-cash details  e.g. blinded  divisible or detecting double spending1.053
G06F21/77in smart cards1.053
G06F21/42using separate channels for security data1.053
H04W28/16Central resource management| Negotiation of resources | or communication parameters|   e.g. negotiating bandwidth or QoS [Quality of Service]1.053
G06F9/30079Pipeline control instructions1.053
G10L15/183using context dependencies  e.g. language models1.053
G10L15/18using natural language modelling1.053
H04L45/64using an overlay routing layer | Peer-to-Peer networks | (ref: H04L67/104)1.052
G06F8/64Retargetable1.052
G06F8/72Code refactoring1.052
H04L41/0823Configuration optimization1.051
G06T7/579from motion1.051
G06T17/05Geographic models1.051
G06T7/70Determining position or orientation of objects or cameras | camera calibration | (ref: G06T7/80)1.051
G01C21/3638including 3D objects and buildings | three dimensional [3D] modelling  e.g. data description of 3D objects | (ref: G06T17/00)| | geographic models | (ref: G06T17/05)1.051
H04W28/0268using specific QoS parameters for wireless networks  e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR] | negotiating SLA or negotiating QoS | (ref: H04W28/24)1.051
H04L9/3255using group based signatures  e.g. ring or threshold signatures1.050
A63F13/52involving aspects of the displayed game scene1.050
G06T17/00Three dimensional [3D] modelling  e.g. data description of 3D objects1.050
G06N3/088Non-supervised learning  e.g. competitive learning1.050
A63F13/352involving special game server arrangements  e.g. regional servers connected to a national server or a plurality of servers managing partitions of the game world1.050
H04W28/0289Congestion control | performing reselection for handling the traffic | (ref: H04W36/22)| | load shedding arrangements in network planning | (ref: H04W16/08)| | dynamic wireless traffic scheduling | (ref: H04W72/12)1.049
H04L47/33Forward notification1.049
H04N21/816involving special video data  e.g 3D video1.049
G06F9/4401Bootstrapping | security arrangements therefor | (ref: G06F21/57)0.856
G06F9/44589Program code verification  e.g. Java bytecode verification  proof-carrying code | high-level semantic checks | (ref: G06F8/43)| | testing and debugging software | (ref: G06F11/36)0.855
G06F9/543User-generated data transfer  e.g. clipboards  dynamic data exchange [DDE]  object linking and embedding [OLE]0.752
G10L15/26Speech to text systems | (ref: G10L15/08)|  takes precedence0.685
G06Q20/102Bill distribution or payments0.659
G06Q20/3572Multiple accounts on card0.659
G06Q20/3672Intelligent token initializing or reloading0.659
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists0.629
G06Q20/36using electronic wallets or electronic money safes0.629
H04L9/0822using key encryption key0.629
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.629
G06Q20/40975Use of encryption for mutual authentication0.629
G07F7/122Online card verification0.629
G06Q20/3552Downloading or loading of personalisation data0.629
G06Q20/3563Software being resident on card0.629
G06Q20/4097Mutual authentication between card and transaction partners0.629
H04L9/0625with splitting of the data block into left and right halves  e.g. Feistel based algorithms  DES  FEAL  IDEA or KASUMI0.629
G06Q20/3823combining multiple encryption tools for a transaction0.629
H04B5/0075using inductive coupling | transformers or inductances adapted for inductive coupling | (ref: H01F38/14)0.629
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC0.629
G06Q20/108Remote banking  e.g. home banking0.629
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.629
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)0.629
G06Q20/382insuring higher security of transaction0.629
G06Q20/409Card specific authentication in transaction processing0.629
G06Q20/227characterized in that multiple accounts are available to the payer0.629
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.629
G06Q20/3278RFID or NFC payments by means of M-devices0.629
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.629
G06Q20/204comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit0.629
G06Q20/32using wireless devices0.629
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.629
H04B5/0056for use in interrogation  identification or read/write systems | record carriers | (ref: G06K7/00)|   | (ref: G06K19/00)| | for railways | (ref: B61L3/12)0.629
G06K9/6263based on the feedback of a supervisor | relevance feedback in information retrieval | (ref: G06F17/30)0.612
G06Q20/356Aspects of software for card payments0.607
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system0.607
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards0.607
G06Q20/4012Verifying personal identification number [PIN]0.607
G06Q20/3415Cards acting autonomously as pay-media0.607
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities0.596
G06F9/45529Embedded in an application  e.g. JavaScript in a Web browser0.596
G06F8/43Checking| Contextual analysis0.596
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.596
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)0.591
H04L65/1063Application servers | systems providing special services to telephonic subscribers | (ref: H04M3/42)0.589
G06F21/41where a single sign-on provides access to a plurality of computers0.582
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)0.576
G06F12/0891using clearing  invalidating or resetting means0.574
G06F9/4406Loading of operating system0.574
H04L67/145provided for avoiding end of session  e.g. keep-alive  heartbeats  resumption message  wake-up for inactive or interrupted session0.572
G06Q40/00Finance| Insurance| Tax strategies| Processing of corporate or income taxes0.567
G06Q50/06Electricity  gas or water supply0.567
H04L67/142provided for managing session state for stateless protocols| Signalling a session state| State transitions| Keeping-state mechanisms0.565
G06Q20/40145Biometric identity checks0.560
H04L43/10using active monitoring  e.g. heartbeat protocols  polling  ping  trace-route0.555
H04N21/435Processing of additional data  e.g. decrypting of additional data  reconstructing software from modules extracted from the transport stream0.551
H04N21/8543using a description language  e.g. Multimedia and Hypermedia information coding Expert Group [MHEG]  eXtensible Markup Language [XML] | information retrieval of semistructured data  the underlying structure being taken into account  e.g. mark-up language structure data | (ref: G06F17/30908)0.551
H04N21/437Interfacing the upstream path of the transmission network  e.g. for transmitting client requests to a VOD server | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing of client requests | (ref: H04L29/08945)| | flow control in data networks | (ref: H04L47/10)0.551
H04N21/2402Monitoring of the downstream path of the transmission network  e.g. bandwidth available | traffic monitoring in data switching networks | (ref: H04L43/00)| | monitoring data switching networks utilization | (ref: H04L43/0876)0.551
H04N21/438Interfacing the downstream path of the transmission network originating from a server  e.g. retrieving MPEG packets from an IP network | transmission of MPEG streams over ATM | (ref: H04L12/5601)| | processing of real-time packets | (ref: H04L29/06176)| | flow control in data networks | (ref: H04L47/10)0.551
H04N21/462Content or additional data management  e.g. creating a master electronic program guide from data received from the Internet and a Head-end  controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities0.550
H04L12/2854Wide area networks  e.g. public data networks0.550
H04L69/326in the transport layer  i.e. layer four | TCP/IP | (ref: H04L69/16)| | streaming protocols  e.g. RTP  | (ref: H04L65/608)0.550
H04L69/14Multichannel or multilink protocols0.550
G06F9/5022Mechanisms to release resources0.550
G06F9/5083Techniques for rebalancing the load in a distributed system0.550
G06F11/3419by assessing time0.549
G06F11/301where the computing system is a virtual computing platform  e.g. logically partitioned systems | virtual machines | (ref: G06F9/45533)| | logical partitioning of resources | (ref: G06F9/5077)0.549
G06F12/0292using tables or multilevel address translation means | (ref: G06F12/023)|  takes precedence| address translation in virtual memory systems | (ref: G06F12/10)0.545
G06F12/1009using page tables  e.g. page table structures0.545
G06F12/1054the data cache being concurrently physically addressed0.545
G06F21/84output devices  e.g. displays or monitors0.544
G06T11/20Drawing from basic elements  e.g. lines or circles0.544
G06T11/60Editing figures and text| Combining figures or text0.542
G06K9/00496Recognising patterns in signals and combinations thereof | signature verification | (ref: G06K9/00154)| | analysing specific medical signals  e.g. bioelectric signals  blood pressure | (ref: A61B5/00)| | processing radar and similar signals | (ref: G01S)| | analysis of chromatographic signals | (ref: G01N30/86)| | processing seismic signals | (ref: G01V1/28)|   | (ref: G01V1/46)| | acoustic speech processing | (ref: G10L)| | transmission systems | (ref: H04B1/00)0.542
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)0.541
H04L63/0838using one-time-passwords0.541
G06F8/447Target code generation0.541
G06F9/44578Preparing or optimising for loading0.541
G06F8/53Decompilation| Disassembly0.541
G06F8/47Retargetable compilers0.541
G06F11/3457Performance evaluation by simulation0.540
G06F11/3688for test execution  e.g. scheduling of test suites0.540
G06F3/0486Drag-and-drop0.539
G06F11/1448Management of the data involved in backup or backup restore0.538
G06Q20/381Currency conversion0.537
H04L41/0668selecting new candidate element0.536
H04W88/04adapted for relaying to or from another terminal or user0.536
H04W76/15Setup of multiple wireless link connections0.536
H04W36/305Reselection due to radio link failure | control signalling for hand-off failure | (ref: H04W36/0079)0.536
H04W24/04Arrangements for maintaining operational condition0.536
H04L45/28Route fault recovery | network fault recovery | (ref: H04L41/0654)0.536
H04W40/12based on transmission quality or channel quality0.536
H04L41/5019Ensuring SLA | flow or congestion control at network level | (ref: H04L47/10)0.536
H04L41/0681involving configuration of triggering conditions0.536
H04L9/3297involving time stamps  e.g. generation of time stamps0.536
G06F3/0485Scrolling or panning0.536
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.534
H04L69/04Protocols for data compression | compression in general | (ref: H03M7/30)| | reduction of the amount or size of exchanged application data at an intermediate network processing stage | (ref: H04L67/2828)| | optimizing  e.g. header compression  information sizing in wireless communication networks | (ref: H04W28/06)0.534
H03M7/3084using adaptive string matching  e.g. the Lempel-Ziv method0.534
H03M7/3091Data deduplication0.534
H04N21/436Interfacing a local distribution network  e.g. communicating with another STB  inside the home | | Interfacing an external card to be used in combination with the client device| arrangements specially adapted plural spots in a confined site in broadcast systems | (ref: H04H20/63)0.531
H04N21/4408involving video stream encryption  e.g. re-encrypting a decrypted video stream for redistribution in a home network | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.531
G06F15/173using an interconnection network  e.g. matrix  shuffle  pyramid  star  snowflake0.530
G06F9/3877using a slave processor  e.g. coprocessor | peripheral processor | (ref: G06F13/12)| | vector processor | (ref: G06F15/8053)0.530
G06F9/30036Instructions to perform operations on packed data  e.g. vector operations0.530
H04L45/745Address table lookup or address filtering0.530
G06F11/3648using additional hardware0.528
G06F11/3466Performance evaluation by tracing or monitoring0.528
H04W12/00Security arrangements  e.g. access security or fraud detection| Authentication  e.g. verifying user identity or authorisation| Protecting privacy or anonymity0.526
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it0.525
H04L12/4625Single bridge functionality  e.g. connection of two networks over a single bridge0.525
G06F3/0608Saving storage space on storage systems0.521
G06F3/068Hybrid storage device0.521
G06F3/0631by allocating resources to storage systems0.521
G06F3/0616in relation to life time  e.g. increasing Mean Time Between Failures [MTBF]0.521
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.513
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.513
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme0.513
H04L9/3066involving algebraic varieties  e.g. elliptic or hyper-elliptic curves0.513
G06F11/3442for planning or managing the needed capacity0.511
G06F8/75Structural analysis for program understanding0.511
G06F9/5088involving task migration0.511
H04L67/303Terminal profiles0.510
H04W76/10Connection setup0.510
G06Q20/367involving intelligent token  e.g. electronic purse0.510
G06K19/06112the marking being simulated using a light source  e.g. a barcode shown on a display or a laser beam with time-varying intensity profile0.510
G06K7/1095the scanner comprising adaptations for scanning a record carrier that is displayed on a display-screen or the like0.510
H04L43/08Monitoring based on specific metrics0.509
G06F8/77Software metrics0.509
H04L41/0859by keeping history of different configuration generations or versions0.509
G06F11/323Visualisation of programs or trace data0.509
H04L43/028using filtering | alarm or event filtering | (ref: H04L41/0604)0.509
G06F11/1484involving virtual machines0.508
G06F11/203using migration0.508
G06F11/2035without idle spare hardware0.508
G06F11/2046where the redundant components share persistent storage | (ref: G06F11/2043)|  takes precedence0.508
H04W60/06De-registration or detaching0.508
H04W76/19Connection re-establishment0.508
H04W60/04using triggered events0.508
H04N21/6125involving transmission via Internet | transmission by internet of broadcast information | (ref: H04H60/82)0.507
H04N21/26216involving the channel capacity  e.g. network bandwidth | admission control  resource allocation in open networks | (ref: H04L12/5692)| | protocols for scheduling and organising the servicing of requests  whereby quality of service and priority requirements are taken into account in network applications in communication control or processing | (ref: H04L29/08954)| | flow control in packet networks | (ref: H04L47/10)0.507
G06F11/3652in-circuit-emulation [ICE] arrangements0.506
G06Q20/353Payments by additional cards plugged into M-devices0.503
H04L47/822Collecting or measuring resource availability data0.503
H04L41/0253involving a browser or web-pages for accessing management information | graphical user interface for network management | (ref: H04L41/22)0.503
G06F9/30058Conditional branch instructions0.502
G06F9/30098Register arrangements0.502
G06F9/3806using address prediction  e.g. return stack  branch history buffer0.502
G06F9/4486Formation of subprogram jump address0.502
H04N21/239Interfacing the upstream path of the transmission network  e.g. prioritizing client | content|  requests | hybrid Fiber Coaxial [HFC] networks for upstream channel allocation for video distribution | (ref: H04L12/2801)| | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing of client requests | (ref: H04L29/08945)| | flow control in data networks | (ref: H04L47/10)0.502
H04N21/6408Unicasting0.502
H04N21/6437Real-time Transport Protocol [RTP]0.502
H04L65/40Services or applications | network service management for ensuring proper service fulfilment | (ref: H04L41/50)| | information services comprising voice | (ref: H04M3/487)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | contact center services | (ref: H04M3/51)0.502
H04L67/2842for storing data temporarily at an intermediate stage  e.g. caching | distributed storage of data in a network | (ref: H04L67/1097)| | browsing optimization of access to content by caching | (ref: G06F17/30902)| | addressing of a cache within a hierarchically structured memory system | (ref: G06F12/0802)| | disk caching | (ref: G06F12/0866)0.502
H04L47/24depending on the type of traffic  e.g. priority or quality of service [QoS] | network arrangements for networked applications for scheduling or organising the servicing of application requests whereby quality of service or priority requirements are taken into account | (ref: H04L67/322)0.501
H04N21/63775for uploading keys  e.g. for a client to communicate its public key to the server | arrangements for network security key management | (ref: H04L29/06707)0.500
H04N21/2547Third Party Billing  e.g. billing of advertiser0.500
H04N21/26613for generating or managing keys in general | key distribution for secret or secure communication involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP] | (ref: H04L9/083)| | key management for security in wireless networks | (ref: H04L29/06707)| | key management for network security in communication control or processing | (ref: H04W12/04)0.500
H04N21/2351involving encryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.500
G06Q30/0241Advertisement0.500
H04L9/3073involving pairings  e.g. identity based encryption [IBE]  bilinear mappings or bilinear pairings  e.g. Weil or Tate pairing0.500
H04L69/163Adaptation of TCP data exchange control procedures | generic OSI layer 4 protocols  e.g. SCTP | (ref: H04L69/326)| | TCP or UDP flow control procedures | (ref: H04L47/19)| | error control procedures in general | (ref: H04L1/18)0.500
H04L61/2503Internet protocol [IP] address translation0.500
H04L69/08Protocols for interworking or protocol conversion | arrangements for connecting between networks having differing types of switching systems  e.g. gateways  | (ref: H04L12/66)| | network management protocols conversion | (ref: H04L41/0226)0.500
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.498
G06F21/76in application-specific integrated circuits [ASICs] or field-programmable devices  e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs]0.498
G06F11/2733Test interface between tester and unit under test0.498
H04L67/1076Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network0.497
G06Q40/04Exchange  e.g. stocks  commodities  derivatives or currency exchange0.493
G06F12/0893Caches characterised by their organisation or structure0.493
G06F12/1433for a module or a part of a module0.493
G06F21/79in semiconductor storage media  e.g. directly-addressable memories0.493
H04L43/16using threshold monitoring0.492
G06F11/1469Backup restoration techniques0.492
G01S19/45by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement0.492
H04N21/8547involving timestamps for synchronizing content0.490
H04N21/658Transmission by the client directed to the server0.490
H04N21/47208for requesting near-video-on-demand content0.490
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)0.490
H04L67/30involving profiles0.490
G06Q20/123Shopping for digital content0.490
G06F21/6236between heterogeneous systems0.490
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords0.490
G06Q10/0633Workflow analysis0.490
H04L41/0273involving the use of web services for network management  e.g. SOAP0.490
H04W80/12Application layer protocols  e.g. WAP0.489
A63F13/77involving data related to game devices or game servers  e.g. configuration data  software version or amount of memory0.488
H03K19/17756for partial configuration or reconfiguration0.488
G06F15/7867with reconfigurable architecture0.488
H04L45/56Routing software0.488
G06F12/0831using a bus scheme  e.g. with bus monitoring or watching means0.487
G06N5/025Extracting rules from data | learning in general | (ref: G06F15/18)0.486
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)0.486
H04L41/0663involving offline failover planning0.484
H04L41/5083wherein the managed service relates to web hosting | web-based network application protocols | (ref: H04L67/02)| | web site content organization and management | (ref: G06F17/3089)| | video-hosting | (ref: H04N21/2743)0.484
H04L67/1031Controlling of the operation of servers by a load balancer  e.g. adding or removing servers that serve requests0.484
H04L41/0813Changing of configuration0.484
H04N21/637Control signals issued by the client directed to the server or network components0.481
G06N3/08Learning methods0.481
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.480
G06Q20/027involving a payment switch or gateway0.479
G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer  e.g. network details  transfer of information from host to ECR or from ECR to ECR0.479
G06Q20/0655e-cash managed centrally0.479
H04L9/0841involving Diffie-Hellman or related key agreement protocols0.479
H04L65/4015where at least one of the additional parallel sessions is real time or time sensitive  e.g. white board sharing  collaboration or spawning of a subconference | telewriting  virtual reality or network gaming | (ref: H04L67/38)0.479
H04L12/1822Conducting the conference  e.g. admission  detection  selection or grouping of participants  correlating users to one or more conference sessions  prioritising transmission0.479
G06F3/1423controlling a plurality of local displays  e.g. CRT and flat panel display0.479
H04L41/0809Plug-and-play configuration0.479
H04L41/22using GUI [Graphical User Interface]0.479
G06F9/4411Configuring for operating with peripheral devices| Loading of device drivers0.479
H04L41/5041Service implementation0.479
G06Q30/08Auctions |   matching or brokerage | matching or brokerage for stock exchange | (ref: G06Q40/04)0.478
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer0.478
G06Q40/02Banking  e.g. interest calculation  credit approval  mortgages  home banking or on-line banking0.477
G06Q20/29characterised by micropayments0.477
G06F15/7807System on chip  i.e. computer system on a single chip| System in package  i.e. computer system on one or more chips in a single package0.476
G06T15/005General purpose rendering architectures0.476
G06F9/461Saving or restoring of program or task context0.476
G06N3/084Back-propagation0.476
H04L45/42Centralized routing0.476
H04L45/72Routing based on the source address0.476
H04N21/44004involving video buffer management  e.g. video decoder buffer or video display buffer0.475
H04N21/44209Monitoring of downstream path of the transmission network originating from a server  e.g. bandwidth variations of a wireless network | arrangements for maintenance or administration in data switching networks involving bandwidth and capacity management | (ref: H04L41/0896)0.475
G06Q30/0236Incentive or reward received by requiring registration or ID from user0.474
G06Q20/387Payment using discounts or coupons | relating to marketing | (ref: G06Q30/02)0.474
H04L9/0827involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.473
H04N21/4384involving operations to reduce the access time  e.g. fast-tuning for reducing channel switching latency0.473
H04N21/23109by placing content in organized collections  e.g. EPG data repository | details of retrieval of video data and associated meta data in video databases | (ref: G06F17/30843)0.473
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)0.470
G07F17/3244Payment aspects of a gaming system  e.g. payment schemes  setting payout ratio  bonus or consolation prizes0.470
G07F17/3225Data transfer within a gaming system  e.g. data sent between gaming machines and users0.470
G07F17/3241Security aspects of a gaming system  e.g. detecting cheating  device integrity  surveillance | computer security | (ref: G06F21/00)0.470
H04L47/805QOS or priority aware0.470
H04L47/808User-type aware0.470
H04L47/762triggered by the network0.470
G06F21/561Virus type analysis0.470
G06F8/51Source to source0.470
H04L45/38Flow based routing0.469
H04N21/2343involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements | media manipulation  adaptation or conversion at the source in one way streaming for real-time multimedia communications | (ref: H04L29/06489)| | video transcoding | (ref: H04N19/40)0.469
H04N21/63345by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | arrangements for network security key management | (ref: H04L29/06707)0.469
H04N21/26606for generating or managing entitlement messages  e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14)0.469
H04N21/23605Creation or processing of packetized elementary streams [PES]0.469
G06Q30/0251Targeted advertisement0.468
G06K9/6227Selection of pattern recognition techniques  e.g. of classifiers in a multi-classifier system0.468
G06F11/3034where the computing system component is a storage system  e.g. DASD based or network based | digital recording or reproducing | (ref: G11B20/18)| | digital input from or digital output to record carriers | (ref: G06F3/06)| | arrangements and networking functions for distributed storage of data in a network | (ref: H04L29/08549)0.468
G06F11/0772Means for error signaling  e.g. using interrupts  exception flags  dedicated error registers0.468
H04L67/1078Resource delivery mechanisms0.468
G06F7/14Merging  i.e. combining at least two sets of record carriers each arranged in the same ordered sequence to produce a single set having the same ordered sequence0.468
G06N5/003Dynamic search techniques  heuristics  branch-and-bound | (ref: G06N5/046)|  take precedence| for optimisation | (ref: G06Q10/04)0.468
G06Q30/0267Wireless devices0.467
G06Q30/0255based on user history0.467
G06Q30/0269based on user profile or attribute0.467
H04L47/6295Multiple queues per individual QOS  connection  flow or priority0.466
H04L47/622Queue service order0.466
H04L45/742Route cache and its operation0.466
H04L49/254Centralized controller  i.e. arbitration or scheduling0.466
H04L47/624Altering the ordering of packets in an individual queue0.466
G06F3/0383Signal control means within the pointing device0.466
G06F3/048Interaction techniques based on graphical user interfaces [GUI]0.466
A63F13/655by importing photos  e.g. of the player0.466
G06T7/74involving reference images or patches0.466
A63F13/25Output arrangements for video game devices0.466
A63F13/533for prompting the player  e.g. by displaying a game menu0.466
H04L69/162involving adaptations of sockets based mechanisms | secure socket layer | (ref: H04L63/168)0.465
G06F3/041Digitisers  e.g. for touch screens or touch pads  characterised by the transducing means0.463
G10L15/04Segmentation| Word boundary detection0.463
H04L12/282based on user interaction within the home | receiver circuitry for displaying additional information being controlled by a remote control apparatus | (ref: H04N5/44582)0.463
H04R9/08Microphones0.463
H04L41/5032Generating service level reports0.463
H04L41/069involving storage or log of alarms or notifications or post-processing thereof0.463
H04L43/0882Utilization of link capacity0.463
H04L47/27Window size evaluation or update  e.g. using information derived from ACK packets0.463
H04L47/365Dynamic adaptation of the packet size0.463
H04N21/8586by using a URL | processing chained hypermedia data for information retrieval | (ref: G06F17/30014)| | information retrieval from the Internet by using URLs | (ref: G06F17/30876)| | URL in broadcast information | (ref: H04H20/93)| | protocols for network applications involving the use of web-based technology | (ref: H04L29/0809)0.462
H04N21/643using dedicated|  Communication protocols | streaming protocols for real-time multimedia communications | (ref: H04L29/06517)0.462
H04W40/20based on geographic position or location0.462
G06F17/16Matrix or vector computation |   e.g. matrix-matrix or matrix-vector multiplication  matrix factorization | matrix transposition | (ref: G06F7/78)0.461
H04L41/5054Automatic provisioning of the service triggered by the service manager  e.g. concrete service implementation by automatic configuration of network components | for initializing configuration  i.e. provisioning of network or devices | (ref: H04L41/0806)0.461
H04N21/4825using a list of items to be played back in a given order  e.g. playlists0.461
H04N21/4821using a grid  e.g. sorted out by channel and broadcast time0.461
G06F3/061Improving I/O performance0.461
G06F3/0647Migration mechanisms0.461
G06F3/06Digital input from or digital output to record carriers  | e.g. RAID  emulated record carriers  networked record carriers | recording or reproducing devices | per se|  | (ref: G11B)| | error detection  error correction  monitoring | per se|  regarding storage systems | (ref: G06F11/00)| | accessing or addressing within memory systems or architectures | (ref: G06F12/00)| | information retrieval | (ref: G06F17/30)0.461
G06F3/0629Configuration or reconfiguration of storage systems0.461
G06F21/80in storage media based on magnetic or optical technology  e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00)0.461
G08G5/0013with a ground station0.461
G08G5/0021located in the aircraft0.461
G08G5/0052for cruising | combined instruments indicating more than one navigational value | (ref: G01C23/00)0.461
G06Q20/327Short range or proximity payments by means of M-devices0.461
H04L9/06the encryption apparatus using shift registers or memories for block-wise | or stream|  coding  e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators0.460
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.460
H04L67/1027Persistence of sessions during load balancing0.459
H04L67/1019based on random server selection0.459
G06Q20/322Aspects of commerce using mobile devices [M-devices]0.458
G06Q20/388Mutual authentication without cards0.458
A63F13/61using advertising information0.458
A63F13/92Video game devices specially adapted to be hand-held while playing0.458
A63F13/48Starting a game  e.g. activating a game device or waiting for other players to join a multiplayer session0.458
G06Q30/0601Electronic shopping0.458
A63F13/87Communicating with other players during game play  e.g. by e-mail or chat0.458
H04L67/28for the provision of proxy services  e.g. intermediate processing or storage in the network | network management provisions | (ref: H04L41/00)| | network monitoring provisions | (ref: H04L43/00)| | proxies for network security | (ref: H04L63/0281)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)0.458
H04L47/787Bandwidth trade among domains0.457
H04L45/586Virtual routers0.457
G06F12/0848Partitioned cache  e.g. separate instruction and operand caches0.457
G06F11/3006where the computing system is distributed  e.g. networked systems  clusters  multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50)0.457
G06Q20/363with the personal data files for a user0.456
G06F9/3891organised in groups of units sharing resources  e.g. clusters0.456
G06F12/0837with software control  e.g. non-cacheable data0.456
G06Q30/0635Processing of requisition or of purchase orders0.456
G01C21/365Guidance using head up displays or projectors  e.g. virtual vehicles or arrows projected on the windscreen or on the road itself0.455
G01C21/3697output of additional  non-guidance related information  e.g. low fuel level  fuel efficient driving  gear change  speeding  dangerous curve ahead  slippery road  school zone  speed traps  driving behaviour feedback  advertising  virtual billboards or road signs | (ref: G01C21/3679)|  takes precedence0.455
G06F17/15Correlation function computation | including computation of convolution operations | arithmetic circuits for sum of products | per se|   e.g. multiply-accumulators | (ref: G06F7/5443)| | digital filters  e.g. FIR  IIR  adaptive filters | (ref: H03H17/00)0.455
H04W72/04Wireless resource allocation0.455
H04N21/858Linking data to content  e.g. by linking an URL to a video object  by creating a hotspot0.454
H04W36/0005Control or signalling for completing the hand-off0.453
H04W36/14Reselecting a network or an air interface0.453
H04N21/2387Stream processing in response to a playback request from an end-user  e.g. for trick-play0.453
H04N21/4586Content update operation triggered locally  e.g. by comparing the version of software modules in a DVB carousel to the version stored locally | deployment  distribution  installation  update of software | (ref: G06F8/65)| | program updating while running in general | (ref: G06F8/656)| | error detection or correction of the data by redundancy during software upgrading | (ref: G06F11/1433)| | arrangements for updating broadcast information or broadcast-related information | (ref: H04H60/25)0.453
G10L15/28Constructional details of speech recognition systems0.453
B64C39/024of the remote controlled vehicle type  i.e. RPV0.452
B64F1/00Ground or aircraft-carrier-deck installations | specially adapted for captive aircraft | (ref: B64F3/00)0.452
G06Q50/28Logistics  e.g. warehousing  loading  distribution or shipping0.452
G01C21/3461Preferred or disfavoured areas  e.g. dangerous zones  toll or emission zones  intersections  manoeuvre types  segments such as motorways  toll roads  ferries0.452
H04W4/024Guidance services0.452
H04L12/1428Invoice generation  e.g. customization  lay-out  database processing  algorithms for calculating the bill or formatting invoices as WWW pages | invoicing in general | (ref: G06Q30/04)0.452
H04L67/1065Discovery involving distributed pre-established resource-based relationships among peers  e.g. based on distributed hash tables [DHT] | pre-configuration of logical or physical connections | (ref: H04L67/1053)0.452
H04W4/24Accounting or billing0.452
H04L69/28Timer mechanisms used in protocols0.452
G06Q30/0256User search0.452
H04W4/21for social networking applications0.452
H04W4/14Short messaging services  e.g. short message services [SMS] or unstructured supplementary service data [USSD]0.452
G06Q30/0261based on user location0.452
H04W4/30Services specially adapted for particular environments  situations or purposes0.452
G06F8/45Exploiting coarse grain parallelism in compilation  i.e. parallelism between groups of instructions0.452
G06F8/4442Reducing the number of cache misses| Data prefetching | cache prefetching | (ref: G06F12/0862)0.452
G06F9/30076to perform miscellaneous control operations  e.g. NOP0.452
G06F9/3838Dependency mechanisms  e.g. register scoreboarding0.452
G06F8/4441Reducing the execution time required by the program code0.452
G06F9/3005to perform operations for flow control0.452
G06Q20/0457characterized in that the ticket is sent electronically0.452
G06Q30/0631Item recommendations0.452
G06Q30/0235Including timing  i.e. limited awarding or usage time constraint0.452
G06Q10/02Reservations  e.g. for tickets  services or events0.452
G06F11/1464for networked environments0.452
G06F11/3096wherein the means or processing minimize the use of computing system or of computing system component resources  e.g. non-intrusive monitoring which minimizes the probe effect: sniffing  intercepting  indirectly deriving the monitored data from other directly available data0.452
A63F13/69by enabling or updating specific game elements  e.g. unlocking hidden features  items  levels or versions0.451
G06Q30/0211Determining discount or incentive effectiveness0.451
A63F13/795for finding other players| for building a team| for providing a buddy list0.451
A63F13/80Special adaptations for executing a specific game genre or game mode0.451
H03M13/2909Product codes0.451
H03M13/373with erasure correction and erasure determination  e.g. for packet loss recovery or setting of erasures for the decoding of Reed-Solomon codes0.451
G06F11/1076Parity data used in redundant arrays of independent storages  e.g. in RAID systems0.451
G06F11/1004to protect a block of data words  e.g. CRC or checksum | (ref: G06F11/1076)|  takes precedence| security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.451
G06F9/30043LOAD or STORE instructions| Clear instruction0.451
G06F9/3013according to data content  e.g. floating-point registers  address registers0.451
G06F21/75by inhibiting the analysis of circuitry or operation0.451
G06F13/24using interrupt | (ref: G06F13/32)|  takes precedence0.451
H04L45/74Address processing for routing0.450
H04L47/263Source rate modification after feedback0.450
G06T13/203D [Three Dimensional] animation0.450
G06T19/003Navigation within 3D models or images0.450
G06T15/20Perspective computation0.450
G06T11/206Drawing of charts or graphs0.450
G02B27/017Head mounted0.450
G06F3/04815Interaction with three-dimensional environments  e.g. control of viewpoint to navigate in the environment0.450
G06F9/382Pipelined decoding  e.g. using predecoding0.450
G06F9/3867using instruction pipelines0.450
G06F15/8069using a cache0.450
A63F13/40Processing input control signals of video game devices  e.g. signals generated by the player or derived from the environment0.450
A63F13/323between game devices with different hardware characteristics  e.g. hand-held game devices connectable to game consoles or arcade machines0.450
A63F13/335using Internet0.450
G06F1/3287Power saving by switching off individual functional units in a computer system  i.e. selective power distribution0.449
G06F1/329Power saving by task scheduling0.449
G06F9/4893taking into account power or heat criteria | power management in computers in general | (ref: G06F1/3203)| | thermal management in computers in general | (ref: G06F1/206)0.449
H04N21/2358for generating different versions  e.g. for different recipient devices0.449
H04N21/26283for associating distribution time parameters to content  e.g. to generate electronic program guide data0.449
H04N21/2323using file mapping0.449
G06F3/0679Non-volatile semiconductor memory device  e.g. flash memory  one time programmable memory [OTP]0.449
G06F3/0646Horizontal data movement in storage systems  i.e. moving data in between storage devices or systems0.449
G06N7/005Probabilistic networks0.449
G06N5/046Forward inferencing  production systems0.448
G06N3/004Artificial life  i.e. computers simulating life0.448
G06N3/006based on simulated virtual individual or collective life forms  e.g. single "avatar"  social simulations  virtual worlds | computer games | (ref: A63F13/00)| | medical simulations | (ref: G06F19/00)| | information retrieval | (ref: G06F17/30873)| | image processing | (ref: G06T)| | telecommunication protocols | (ref: H04L29/06034)0.448
B60K35/00Arrangement of adaptations of instruments specially for vehicles| Dashboards0.448
B60W50/12Limiting control by the driver depending on vehicle state  e.g. interlocking means for the control input for preventing unsafe operation0.448
B60W50/087where the control system corrects or modifies a request from the driver0.448
B60W50/14Means for informing the driver  warning the driver or prompting a driver intervention0.448
B60R21/01508detecting forces or pressure in bags or modules0.448
B60W40/08related to drivers or passengers0.448
H04N1/00501Tailoring a user interface [UI] to specific requirements0.448
G06F9/44594Unloading0.447
G06F9/4418Suspend and resume| Hibernate and awake0.447
G06F12/0846Cache with multiple tag or data arrays being simultaneously accessible0.447
H04L41/0869by validating configuration within one network element0.447
H04L41/0883Semiautomatic configuration  e.g. proposals from system0.447
G06F9/4837time dependent0.447
G06F9/30189according to execution mode  e.g. mode flag0.447
G06F9/355Indexed addressing |   i.e. using more than one address operand0.447
G06F9/223Execution means for microinstructions irrespective of the microinstruction function  e.g. decoding of microinstructions and nanoinstructions| timing of microinstructions| programmable logic arrays| delays and fan-out problems0.447
G06F9/3842Speculative instruction execution0.447
G06F12/0284Multiple user address space allocation  e.g. using different base addresses | interprocessor communication | (ref: G06F15/163)0.447
H04N7/15Conference systems | video terminal details | (ref: H04N7/141)|  | telephonic conference arrangements | (ref: H04M3/56)| | | computer conferencing | (ref: H04L12/1813)0.447
H04N21/4788communicating with other users  e.g. chatting | arrangements for providing for computer conferences  e.g. chat rooms  to substation in data switching networks | (ref: H04L12/1813)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)0.447
H04L51/10Messages including multimedia information | network arrangements or protocols for real-time communication | (ref: H04L65/00)| | voice messaging in telephonic communication using automatic or semi-automatic exchanges with non-audio components | (ref: H04M3/5307)0.447
H04N7/141between two video terminals  e.g. videophone | telephonic communication systems combined with television receiver for reception of entertainment or information matter | (ref: H04M11/085)0.447
H04N7/152Multipoint control units therefor0.447
G10L15/32Multiple recognisers used in sequence or in parallel| Score combination systems therefor  e.g. voting systems0.447
G06F9/545where tasks reside in different layers  e.g. user- and kernel-space0.447
G06F1/12Synchronisation of different clock signals | provided by a plurality of clock generators0.446
H04L47/32Packet discarding or delaying0.446
H04L47/827Aggregation of resource allocation or reservation requests0.446
G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component  e.g. monitoring if the computing system is on  off  available  not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16)0.446
H04L47/72Reservation actions0.446
G06F9/454Multi-language systems| Localisation| Internationalisation0.446
G10L17/02Preprocessing operations  e.g. segment selection| Pattern representation or modelling  e.g. based on linear discriminant analysis [LDA] or principal components| Feature selection or extraction0.446
G10L17/24the user being prompted to utter a password or a predefined phrase0.446
G10L25/51for comparison or discrimination0.446
H04W4/025using location based information parameters0.446
G06N3/04Architectures  e.g. interconnection topology0.446
G07F7/0833Card having specific functional components0.445
G06F21/755with measures against power attack0.445
H04N21/4431characterized by the use of Application Program Interface [API] libraries0.445
H04N21/4784receiving rewards | payment schemes  architectures or protocols | (ref: G06Q20/00)| | e-commerce | (ref: G06Q30/00)| | charging arrangements in data networks | (ref: H04L12/14)0.445
H04M15/44Augmented  consolidated or itemized billing statement or bill presentation0.445
H04M15/47Fraud detection or prevention means0.445
H04M15/00Arrangements for metering  time-control or time indication | | Metering  charging or billing arrangements for voice wireline or wireless communications  e.g. VoIP0.445
H04N21/8173End-user applications  e.g. Web browser  game0.445
H04N21/4668for recommending content  e.g. movies0.445
G06F8/313Logic programming  e.g. PROLOG programming language0.445
G06F17/18for evaluating statistical data |   e.g. average values  frequency distributions  probability functions  regression analysis | forecasting specially adapted for a specific administrative  business or logistic context | (ref: G06Q10/04)0.445
G06F12/128adapted to multidimensional cache systems  e.g. set-associative  multicache  multiset or multilevel0.444
G06F12/0269Incremental or concurrent garbage collection  e.g. in real-time systems | (ref: G06F12/0261)|  takes precedence0.444
H04L41/20Network management software packages0.444
G06F21/568eliminating virus  restoring damaged files0.444
G06F11/1435using file system or storage system metadata0.444
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.443
H04L43/0894Packet rate0.443
H04L41/145involving simulating  designing  planning or modelling of a network0.443
G06F13/1663Access to shared memory0.443
G06F12/0692Multiconfiguration  e.g. local and global addressing0.443
G06Q20/407Cancellation of a transaction0.443
G06F8/314Parallel programming languages | (ref: G06F8/313)|  takes precedence0.443
G06F9/4484Executing subprograms0.442
G06F7/588Random number generators  i.e. based on natural stochastic processes0.442
G10L15/005Language recognition0.442
G06F11/3037where the computing system component is a memory  e.g. virtual memory  cache | accessing  addressing or allocating within memory systems or architectures | (ref: G06F12/00)| | checking stores for correct operation | (ref: G11C29/00)0.442
G06F12/121using replacement algorithms0.442
H04N21/6332directed to client0.442
H04N21/2407Monitoring of transmitted content  e.g. distribution time  number of downloads | arrangements for monitoring programmes for broadcast or for distribution combined with broadcast | (ref: H04H20/14)0.442
H04N21/21815comprising local storage units0.442
H04N21/8133specifically related to the content  e.g. biography of the actors in a movie  detailed information about an article seen in a video program0.442
H04L67/1091Interfacing with client-server systems or between P2P systems0.442
A63F13/79involving player-related data  e.g. identities  accounts  preferences or play histories0.442
A63F13/213comprising photodetecting means  e.g. cameras  photodiodes or infrared cells | (ref: A63F13/219)|   | (ref: A63F13/655)|  take precedence0.442
H04N21/2405Monitoring of the internal components or processes of the server  e.g. server load | allocation of resources in multiprogramming arrangements | (ref: G06F9/50)| | performance measurement of computer activity | (ref: G06F11/34)0.441
H04N21/251Learning process for intelligent management  e.g. learning user preferences for recommending movies | details of learning user preferences for the retrieval of video data in a video database | (ref: G06F17/30843)| | computer systems using learning methods | (ref: G06N3/08)0.441
H04N21/4667Processing of monitored end-user data  e.g. trend analysis based on the log file of viewer selections0.441
H04N21/4666using neural networks  e.g. processing the feedback provided by the user0.441
H04N21/4621Controlling the complexity of the content stream or additional data  e.g. lowering the resolution or bit-rate of the video stream for a mobile client with a small screen | arrangements for using the results of monitoring on user's side in broadcast systems | (ref: H04H60/65)| | flow control in packet networks | (ref: H04L47/10)0.441
H04N21/2662Controlling the complexity of the video stream  e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities0.441
G09G5/395Arrangements specially adapted for transferring the contents of the bit-mapped memory to the screen | (ref: G09G5/399)|  takes precedence0.441
H04L51/18Messages including commands or codes to be executed either at an intermediate node or at the recipient to perform message-related actions | computer aided management of electronic mail | (ref: G06Q10/10)| | networked applications for remote control or remote monitoring of the application | (ref: H04L67/025)| | networked applications involving the movement of software or configuration parameters | (ref: H04L67/34)0.441
G06F3/0662Virtualisation aspects0.441
G06F3/0637Permissions0.441
G06F3/0605by facilitating the interaction with a user or administrator0.441
G06F3/0638Organizing or formatting or addressing of data0.441
A63F13/53involving additional visual information provided to the game scene  e.g. by overlay to simulate a head-up display [HUD] or displaying a laser sight in a shooting game0.440
A63F13/56Computing the motion of game characters with respect to other game characters  game objects or elements of the game scene  e.g. for simulating the behaviour of a group of virtual soldiers or for path finding0.440
G06T15/04Texture mapping0.440
H04L41/00Arrangements for maintenance or administration or management of packet switching networks0.440
H04W72/0406involving control information exchange between nodes0.440
H04L41/0654Network fault recovery | backup route selection | (ref: H04L45/22)| | route fault recovery | (ref: H04L45/28)| | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)0.440
H04L12/2856Access arrangements  e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W)0.440
H04W8/205Transfer to or from user equipment or user record carrier0.439
H04L47/286Time to live0.439
H04W76/12Setup of transport tunnels0.439
H04L41/0876Aspects of the degree of configuration automation0.439
H04L43/0852Delays0.439
H04L67/1029using data related to the state of servers by a load balancer | server selection based on server parameters | (ref: H04L67/1008)| | performance measurement for load balancing | (ref: G06F11/3433)| | information retrieval in structured data stores | (ref: G06F17/30286)0.439
H04N21/42653for processing graphics0.439
H04N21/47205for manipulating displayed content  e.g. interacting with MPEG-4 objects  editing locally0.439
H04N21/64322IP0.439
H04N21/23412for generating or manipulating the scene composition of objects  e.g. MPEG-4 objects0.439
H04L65/1073Registration | arrangements for addressing or naming in data networks | (ref: H04L61/00)0.439
G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component  e.g. monitoring the presence of processing resources  peripherals  I/O links  software programs | verification or detection of system hardware configuration | (ref: G06F11/2247)0.438
H04L41/04Architectural aspects of network management arrangements0.438
H04L69/18Multi-protocol handler  e.g. single device capable of handling multiple protocols | multilayer or multiprotocol switches | (ref: H04L49/602)0.438
H04W36/0094Definition of hand-off measurement parameters0.438
H04W36/38by fixed network equipment0.438
H04B17/318Received signal strength0.438
G06F12/06Addressing a physical block of locations  e.g. base addressing  module addressing  memory dedication | (ref: G06F12/08)|  takes precedence0.437
G06F8/441Register allocation| Assignment of physical memory space to logical memory space0.437
G06F3/0641De-duplication techniques0.436
H04L5/0053Allocation of signaling  i.e. of overhead other than pilot signals0.436
H04W72/0446the resource being a slot  sub-slot or frame0.436
H04B7/0408using two or more beams  i.e. beam diversity0.436
H04L5/0048Allocation of pilot signals  i.e. of signals known to the receiver0.436
H04L5/0023Time-frequency-space0.436
G01S19/13Receivers0.436
H04B7/0695using beam selection0.436
H04B7/0456Selection of precoding matrices or codebooks  e.g. using matrices antenna weighting0.436
H04N21/482End-user interface for program selection | systems specially adapted for using EPGs in broadcast systems | (ref: H04H60/72)0.435
H04L65/1089by adding or removing media0.435
G06Q30/016Customer service  i.e. after purchase service0.435
G01C21/206specially adapted for indoor navigation0.435
H04W4/33for indoor environments  e.g. buildings0.435
H04L69/06Notations for structuring of protocol data  e.g. abstract syntax notation one [ASN.1]0.435
H04L67/147provided for signalling methods or particular messages providing extensions to IETF  ITU  ETSI or 3GPP protocols  e.g.  additional proprietary messages  standard messages enhanced by additional header fields or standard messages being used for purposes other than originally intended0.435
H04L12/2803Home automation networks0.435
H04W4/38for collecting sensor information0.435
H04L43/06Report generation0.434
H04W24/00Supervisory  monitoring or testing arrangements0.434
H04N21/235Processing of additional data  e.g. scrambling of additional data  processing content descriptors | arrangements for simultaneous broadcast of plural pieces of information | (ref: H04H20/28)0.434
H04N21/6587Control parameters  e.g. trick play commands  viewpoint selection0.434
H04N21/854Content authoring0.434
H04L67/1006with static server selection  e.g. the same server being selected for a specific client | allocation of processing resources considering data affinity | (ref: G06F9/5033)0.434
H04L67/2871Implementation details of a single intermediate entity0.434
G06F3/1267Job repository  e.g. non-scheduled jobs  delay printing0.434
G06F3/1286via local network0.434
G06F3/1285Remote printer device  e.g. being remote from client or server0.434
G06F3/1238Secure printing  e.g. user identification  user rights for device usage  unallowed content  blanking portions or fields of a page  releasing held jobs0.434
G06F3/1236Connection management0.434
H04W40/248Connectivity information update0.433
H04M15/8044Least cost routing0.433
G06F12/0875with dedicated cache  e.g. instruction or stack0.433
G05B17/02electric0.433
G06T15/06Ray-tracing0.432
H04N21/234381by altering the temporal resolution  e.g. decreasing the frame rate by frame skipping0.432
H04N19/132Sampling  masking or truncation of coding units  e.g. adaptive resampling  frame skipping  frame interpolation or high-frequency transform coefficient masking0.432
H04N21/4302Content synchronization processes  e.g. decoder synchronization0.432
H04N19/16for a given display mode  e.g. for interlaced or progressive display mode0.432
H04N19/172the region being a picture  frame or field0.432
H04N19/164Feedback from the receiver or from the transmission channel0.432
H04N21/4781Games0.432
H04N21/25825involving client display capabilities  e.g. screen resolution of a mobile phone | optimising the visualisation of content during browsing in the Internet | (ref: G06F17/30905)| | processing of terminal status or physical abilities in wireless networks | (ref: H04W8/22)| | authentication in wireless network security | (ref: H04W12/06)0.432
H04N19/587involving temporal sub-sampling or interpolation  e.g. decimation or subsequent interpolation of pictures in a video sequence0.432
H04N21/6377directed to server | control of source by destination in one way streaming for real-time multimedia communications | (ref: H04L29/06469)0.432
H04N21/6373for rate control |   e.g. request to the server to modify its transmission rate | flow control in packet networks | (ref: H04L47/10)0.432
G08B13/196using television cameras | recognition of scenes under surveillance | (ref: G06K9/00771)| | image analysis | per se|  | (ref: G06T7/00)| | television cameras | (ref: H04N5/225)| | CCTV systems | (ref: H04N7/18)0.432
G08B13/19667Details realated to data compression  encryption or encoding  e.g. resolution modes for reducing data volume to lower transmission bandwidth or memory requirements0.432
H04L9/065Encryption by serially and continuously modifying data stream elements  e.g. stream cipher systems  RC4  SEAL or A5/30.432
H04N21/21805enabling multiple viewpoints  e.g. using a plurality of cameras0.432
H04N21/8455involving pointers to the content  e.g. pointers to the I-frames of the video stream0.432
H04N21/85406involving a specific file format  e.g. MP4 format0.432
H04N21/4728for selecting a Region Of Interest [ROI]  e.g. for requesting a higher resolution version of a selected region0.432
H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence  e.g. one-time-pad [OTP] or Vernam's cipher0.432
H04L41/50Network service management  i.e. ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer0.432
G06F9/38Concurrent instruction execution  e.g. pipeline  look ahead0.431
G06F9/30Arrangements for executing machine instructions  e.g. instruction decode | for executing microinstructions | (ref: G06F9/22)0.431
G06Q30/0603Catalogue ordering0.431
G06T7/00Image analysis0.431
G06K9/6272based on distances to cluster centroïds0.431
G06F3/005Input arrangements through a video camera0.431
G06F12/10Address translation0.430
G06F21/556involving covert channels  i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755)0.430
H04L12/185with management of multicast group membership0.430
G06Q10/0833Tracking0.430
G06K19/06037multi-dimensional coding0.430
G06Q30/0639Item locations0.430
G06Q30/0205Location or geographical consideration0.430
G06K7/10366the interrogation device being adapted for miscellaneous applications0.430
G06F11/28by checking the correct order of processing | (ref: G06F11/08)|  - | (ref: G06F11/26)|  take precedence| monitoring patterns of pulse trains | (ref: H03K5/19)0.430
G06F11/1407Checkpointing the instruction stream0.430
G06F11/2097maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)|  and subgroups0.430
G06Q30/0641Shopping interfaces0.430
G06Q10/06395Quality analysis or management0.430
H04W8/20Transfer of user or subscriber data0.429
H04W88/06adapted for operation in multiple networks | or having at least two operational modes|   e.g. multi-mode terminals0.429
H04L63/0218Distributed architectures  e.g. distributed firewalls0.429
H04L43/067for time frame related reporting0.429
H04L12/5601Transfer mode dependent  e.g. ATM0.429
G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data | error or fault reporting or logging | (ref: G06F11/0766)0.429
G06N3/0445Feedback networks  e.g. hopfield nets  associative networks0.429
G06N3/063using electronic means0.429
G06K19/06028using bar codes0.428
G06F12/0246in block erasable memory  e.g. flash memory0.428
G06F12/0653with centralised address assignment0.428
G06F11/366using diagnostics | (ref: G06F11/0703)|  takes precedence0.428
G10L15/06Creation of reference templates| Training of speech recognition systems  e.g. adaptation to the characteristics of the speaker's voice | (ref: G10L15/14)|  takes precedence0.428
G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates0.428
G10L17/22Interactive procedures| Man-machine interfaces0.428
G06F21/567using dedicated hardware0.427
H04N21/23116involving data replication  e.g. over plural servers | synchronization of replicated data | (ref: G06F11/1658)| | error detection or correction by means of data replication | (ref: G06F11/2053)| | replication in distributed file systems | (ref: G06F17/30067)| | replication in distributed file systems | (ref: G06F17/30283)| | replication or mirroring of data in data networks | (ref: H04L29/0854)0.427
H04N21/41407embedded in a portable device  e.g. video client on a mobile phone  PDA  laptop | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)| | arrangements specially adapted for mobile receivers in broadcast systems | (ref: H04H20/57)0.427
G06F12/0813with a network or matrix configuration0.427
H04W24/10Scheduling measurement reports | | Arrangements for measurement reports0.427
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.427
G06Q50/04Manufacturing0.427
G06Q10/06375Prediction of business process outcome or impact based on a proposed change0.427
G06F15/1735Network adapters  e.g. SCI  Myrinet | protocol engines | (ref: H04L29/06081)0.426
H04W92/18between terminal devices0.426
H04L69/12Protocol engines  e.g. VLSIs or transputers0.426
G06F3/04812interaction techniques based on cursor appearance or behaviour being affected by the presence of displayed objects  e.g. visual feedback during interaction with elements of a graphical user interface through change in cursor appearance  constraint movement or attraction/repulsion with respect to a displayed object | interaction techniques based on cursor behaviour involving tactile or force feedback | (ref: G06F3/016)0.426
G06F9/30014with variable precision0.426
G09G5/393Arrangements for updating the contents of the bit-mapped memory0.426
G06F7/5443Sum of products | for applications thereof  | see|  the relevant places  e.g. | (ref: G06F17/10)|   | (ref: H03H17/00)0.426
G06F21/73by creating or determining hardware identification  e.g. serial numbers0.426
G06F15/17375One dimensional  e.g. linear array  ring0.426
G08G1/0133for classifying traffic situation0.426
G16H50/30for calculating health indices| for individual health risk assessment0.426
G08G1/012from other sources than vehicle or roadside beacons  e.g. mobile networks0.426
G06F9/4806Task transfer initiation or dispatching0.426
G08G1/202Dispatching vehicles on the basis of a location  e.g. taxi dispatching0.426
B60R25/255Eye recognition0.426
B60R25/257Voice recognition0.426
G08G1/005including pedestrian guidance indicator0.426
H04L12/4645Details on frame tagging | routing of packets | (ref: H04L45/00)| | support for virtual LAN | (ref: H04L49/354)0.425
G10L15/00Speech recognition | (ref: G10L17/00)|  takes precedence0.425
G10L15/222Barge in  i.e. overridable guidance for interrupting prompts0.425
G06N3/00Computer systems based on biological models | analogue computers simulating functional aspects of living beings | (ref: G06G7/60)0.425
G06N3/02using neural network models | for adaptive control | (ref: G05B13/00)| | for image pattern matching | (ref: G06K9/00)| | for image data processing | (ref: G06T1/20)| | for phonetic pattern matching | (ref: G10L15/16)0.425
G10L15/20Speech recognition techniques specially adapted for robustness in adverse environments  e.g. in noise  of stress induced speech | (ref: G10L21/02)|  takes precedence0.425
H04W8/22Processing or transfer of terminal data  e.g. status or physical capabilities0.425
G06F11/3452Performance evaluation by statistical analysis0.425
G06F11/3672Test management0.425
G06F11/3692for test results analysis0.425
G06F11/3438monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22)0.425
H04L41/042Arrangements involving multiple distributed management centers cooperatively managing the network0.424
H04N21/47217for controlling playback functions for recorded or on-demand content  e.g. using progress bars  mode or play-point indicators or bookmarks | specific graphical features in visual interfaces | (ref: H04N21/4312)0.424
G06N3/0472using probabilistic elements  e.g. p-rams  stochastic processors0.424
G10L17/06Decision making techniques| Pattern matching strategies0.424
H04L12/10Current supply arrangements0.424
H04L49/351LAN switches  e.g. ethernet switches0.424
H04L49/103using shared central buffer  shared memory  e.g. time switching0.424
H04L49/30Peripheral units  e.g. input or output ports0.424
G06N7/00Computer systems based on specific mathematical models0.423
G06Q20/325using wireless networks0.423
G06F3/1462with means for detecting differences between the image stored in the host and the images displayed on the remote displays0.423
H04W4/06Selective distribution of broadcast services  e.g. multimedia broadcast multicast service [MBMS]| Services to user groups| One-way selective calling services0.423
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.423
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.422
H04L43/0823Errors | management of events  faults or alarms in networks or network elements | (ref: H04L41/06)0.422
H04W80/06Transport layer protocols  e.g. TCP [Transport Control Protocol] over wireless | transmission control protocol/Internet protocol [TCP/IP] or user datagram protocol [UDP] | (ref: H04L69/16)0.422
H04L69/164Adaptation or special uses of UDP protocol0.422
H04L45/122Minimizing distance  e.g. ? number of hops0.421
H04L45/123Evaluation of link metrics | techniques for monitoring network metrics | (ref: H04L43/08)0.421
H04N21/442Monitoring of processes or resources  e.g. detecting the failure of a recording device  monitoring the downstream bandwidth  the number of times a movie has been viewed  the storage space available from the internal hard disk | arrangements for monitoring broadcast services or broadcast-related services | (ref: H04H60/29)| | arrangements for identifying or recognising characteristics with a direct linkage to broadcast information | (ref: H04H60/35)| | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | monitoring in wireless networks | (0.421
H04N21/845Structuring of content  e.g. decomposing content into time segments0.421
H04L65/00Network arrangements or protocols for real-time communications | computer conference | (ref: H04L12/1813)| | real time or near real time messaging in message switching systems  e.g. instant messaging | (ref: H04L51/04)| | network applications in general | (ref: H04L67/00)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | interconnection arrangements between switching centres for working between exchanges having different types of switching equipment where the types of switching equipment comprise PSTN/ISDN equipment and equipment of networks other than PSTN/I0.421
H04N21/44029for generating different versions0.421
H04M3/42348Location-based services which utilize the location information of a target0.421
H04N19/98Adaptive-dynamic-range coding [ADRC]0.421
H04N19/102characterised by the element  parameter or selection affected or controlled by the adaptive coding0.421
H04N19/13Adaptive entropy coding  e.g. adaptive variable length coding [AVLC] or context adaptive binary arithmetic coding [CABAC]0.421
H04N19/52by predictive encoding0.421
H04N19/157Assigned coding mode  i.e. the coding mode being predefined or preselected to be further used for selection of another element or parameter0.421
H04N19/70characterised by syntax aspects related to video coding  e.g. related to compression standards0.421
H04N19/523with sub-pixel accuracy0.421
G07C9/00571operated by interacting with a central unit0.421
H01H13/14Operating parts  e.g. push-button0.420
G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component  e.g. monitoring of power  currents  temperature  humidity  position  vibrations | thermal management in cooling arrangements of a computing system | (ref: G06F1/206)0.420
G06F11/3082the data filtering being achieved by aggregating or compressing the monitored data0.420
G06F3/064Management of blocks0.420
G06F3/0656Data buffering arrangements0.420
G06F3/0604Improving or facilitating administration  e.g. storage management0.420
H04L47/788Autonomous allocation of resources0.420
G06F11/0736in functional embedded systems  i.e. in a data processing system designed as a combination of hardware and software dedicated to performing a certain function | testing or monitoring of automated control systems | (ref: G05B23/02)0.420
G06F11/0718in an object-oriented system0.420
H04L47/821Prioritising resource allocation or reservation requests0.420
H04N21/4532involving end-user characteristics  e.g. viewer profile  preferences | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protocols involving user profiles for network applications in communication control or processing | (ref: H04L29/08936)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)0.420
H04N21/43615Interfacing a Home Network  e.g. for connecting the client to a plurality of peripherals | home Audio Video Interoperability [HAVI] data switching networks | (ref: H04L12/2805)0.420
H04N21/6334for authorisation  e.g. by transmitting a key | arrangements for secret or secure communication | (ref: H04L9/00)|  | | wireless communications network key management | (ref: H04W12/04)| | wireless communications network access security | (ref: H04W12/08)0.420
G06F3/165Management of the audio stream  e.g. setting of volume  audio stream path0.420
G06T17/005Tree description  e.g. octree  quadtree0.419
A63F13/822Strategy games| Role-playing games  | (ref: A63F13/825)|   | (ref: A63F13/828)|  take precedence0.419
G06Q20/10specially adapted for electronic funds transfer [EFT] systems| specially adapted for home banking systems0.419
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.419
H04L41/085Keeping track of network configuration0.419
G06Q40/06Investment  e.g. financial instruments  portfolio management or fund management0.419
G06F8/10Requirements analysis| Specification techniques0.419
H04N21/4223Cameras | (ref: H04N5/225)|  takes precedence0.418
G08B13/19656Network used to communicate with a camera  e.g. WAN  LAN  Internet0.418
H04N7/181for receiving images from a plurality of remote sources0.418
H04N19/40using video transcoding  i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream0.418
H04N7/0117involving conversion of the spatial resolution of the incoming video signal | for graphics images | (ref: G09G2340/0407)0.418
H04N21/4402involving reformatting operations of video signals for household redistribution  storage or real-time display | adapting incoming signals to the display format of the display terminal | (ref: G09G5/005)| | media manipulation  adaptation or conversion at the destination in one way streaming for real-time multimedia communications | (ref: H04L29/06496)| | details of conversion of video standards at pixel level | (ref: H04N7/01)| | video transcoding | (ref: H04N19/40)0.418
G06F12/1466Key-lock mechanism0.418
G06F13/1642with request queuing0.418
G06F13/18based on priority control | (ref: G06F13/1605)|  takes precedence0.418
G11C7/1087Data input latches0.418
G11C7/106Data output latches0.418
G06F9/526Mutual exclusion algorithms0.418
G07F17/0092for assembling and dispensing of pharmaceutical articles | medical dispensers for private use  | (ref: A61J7/00)| | data processing for medical purposes | (ref: G06F19/00)0.418
G06Q30/0282Business establishment or product rating or recommendation0.418
G06Q30/0607Regulated0.418
G06Q10/08355Routing methods0.418
H04N1/444to a particular document or image or part thereof0.418
G06F12/0215with look ahead addressing means0.418
G06F12/0833in combination with broadcast means (e.g. for invalidation or updating)0.418
H04N21/6582Data stored in the client  e.g. viewing habits  hardware capabilities  credit card number | arrangements where receivers interact with the broadcast | (ref: H04H20/38)0.418
H04N21/42204User interfaces specially adapted for controlling a client device through a remote control device| Remote control devices therefor | interaction techniques for graphical user interfaces in general  | see|  | (ref: G06F3/048)| | computer pointing devices in general  | see|  | (ref: G06F3/033)| | user interfaces for controlling a tuning device of a television receiver through a remote control | (ref: H03J9/00)| | constructive details of casings for the remote control device | (ref: H01H9/0235)| | remote control of peripheral devices connected to a television receiver through the remote control d0.418
H04N21/42684Client identification by a unique number or address  e.g. serial number  MAC address  socket ID | addressing and naming in data networks | (ref: H04L29/12009)0.418
H04N21/25875involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.418
G06F3/065Replication mechanisms0.417
G06F12/122of the least frequently used [LFU] type  e.g. with individual count value0.417
G06F3/0683Plurality of storage devices0.417
G06F1/30Means for acting in the event of power-supply failure or interruption  e.g. power-supply fluctuations | for resetting only | (ref: G06F1/24)0.417
G06F11/2023Failover techniques0.417
G06F3/16Sound input| Sound output | conversion of speech into digital information or | vice versa|  | (ref: G10L)0.417
G06F21/123by using dedicated hardware  e.g. dongles  smart cards  cryptographic processors  global positioning systems [GPS] devices0.416
H04L61/30Arrangements for managing names  e.g. use of aliases or nicknames | retrieval from the Internet by using information identifiers  e.g. uniform resource locators [URLs] | (ref: G06F17/30876)| | name-to-address mapping | (ref: H04L61/15)0.416
H04W4/16Communication-related supplementary services  e.g. call-transfer or call-hold0.416
H04W76/11Allocation or use of connection identifiers0.416
H04W68/02Arrangements for increasing efficiency of notification or paging channel0.416
G06F9/3009Thread control instructions0.416
G06Q30/0609Buyer or seller confidence or verification0.416
H04L47/2475Application aware0.415
H04L47/2483Flow identification0.415
H04L47/2441Flow classification0.415
G16H15/00ICT specially adapted for medical reports  e.g. generation or transmission thereof0.415
G05B15/02electric0.415
H02J3/381Dispersed generators0.415
G06F11/3485for I/O devices0.414
H04W28/24Negotiating SLA [Service Level Agreement]| Negotiating QoS [Quality of Service]0.414
H04L41/5051Service on demand  i.e. services are defined and provided in real time as requested by the user0.414
G06Q30/0277Online advertisement0.413
G06F12/1036for multiple virtual address spaces  e.g. segmentation | (ref: G06F12/1045)|  takes precedence0.413
H04W8/08Mobility data transfer0.413
H04W76/30Connection release0.413
H04W76/27Transitions between radio resource control [RRC] states0.413
H04L47/745Reaction in network0.413
G06Q10/08Logistics  e.g. warehousing  loading  distribution or shipping| Inventory or stock management  e.g. order filling  procurement or balancing against orders0.413
G06Q10/04Forecasting or optimisation  e.g. linear programming  "travelling salesman problem" or "cutting stock problem" | data collection specially adapted for marketing  price determination or demand forecasting | (ref: G06Q30/02)0.413
G06Q20/127Shopping or accessing services according to a time-limitation0.413
H04L47/12Congestion avoidance or recovery0.412
G06F21/565by checking file integrity0.412
H04L41/0604Alarm or event filtering  e.g. for reduction of information0.412
G06F12/1483using an access-table  e.g. matrix or list0.412
G16H50/20for computer-aided diagnosis  e.g. based on medical expert systems0.411
G16H40/20for the management or administration of healthcare resources or facilities  e.g. managing hospital staff or surgery rooms0.411
H04M3/42008Systems for anonymous communication between parties  e.g. by use of disposal contact identifiers0.411
H04M3/42102Making use of the called party identifier0.411
H04L61/2517involving port numbers0.411
H04L45/54Organization of routing tables0.411
G06Q20/3229Use of the SIM of a M-device as secure element0.411
G05B23/0216Human interface functionality  e.g. monitoring system providing help to the user in the selection of tests or in its configuration0.411
G05B19/0428Safety  monitoring | (ref: G05B19/0423)|  takes precedence0.411
G05B23/027Alarm generation  e.g. communication protocol| Forms of alarm0.411
G06F9/466Transaction processing0.411
G05B19/4155characterised by programme execution  i.e. part programme or machine function execution  e.g. selection of a programme0.411
G16H80/00ICT specially adapted for facilitating communication between medical practitioners or patients  e.g. for collaborative diagnosis  therapy or health monitoring0.411
G06Q30/0633Lists  e.g. purchase orders  compilation or processing0.410
G06Q20/04Payment circuits0.410
G16H20/30relating to physical therapies or activities  e.g. physiotherapy  acupressure or exercising0.410
A61B5/1126using a particular sensing technique0.410
A61F5/02Orthopaedic corsets | arm-rests for use as writing aids | (ref: B43L15/00)0.410
G04F10/00Apparatus for measuring unknown time intervals by electric means | timing devices for clocks or watches for comparing the rate of the oscillating member with a standard | (ref: G04D7/12)| | radar systems  analogous systems | (ref: G01S7/00)| | measuring frequency | (ref: G01R23/00)| | measuring phase angle | (ref: G01R25/00)0.410
A61B5/6831Straps  bands or harnesses0.410
A61B5/742using visual displays | (ref: A61B5/044)|  takes precedence0.410
A61B5/4833Assessment of subject's compliance to treatment0.410
A61B5/6843Monitoring or controlling sensor contact pressure0.410
G06F11/3072where the reporting involves data filtering  e.g. pattern matching  time or event triggered  adaptive or policy-based reporting0.410
G06F11/2294by remote test0.410
G06F11/0787Storage of error reports  e.g. persistent data storage  storage using memory protection0.410
G06F11/0751Error or fault detection not based on redundancy | power supply failures | (ref: G06F1/30)| | network fault management | (ref: H04L41/06)0.410
G16H20/00ICT specially adapted for therapies or health-improving plans  e.g. for handling prescriptions  for steering therapy or for monitoring patient compliance0.410
H04W48/02Access restriction performed under specific conditions0.410
G06Q30/0615Anonymizing0.410
G06F21/46by designing passwords or checking the strength of passwords0.410
H03M7/6023Parallelization0.410
H03M7/3064Segmenting0.410
G06F7/24Sorting  i.e. extracting data from one or more carriers  rearranging the data in numerical or other ordered sequence  and rerecording the sorted data on the original carrier or on a different carrier or set of carriers | sorting methods in general| (ref: G06F7/36)|  takes precedence0.410
H03M7/30Compression | speech analysis-synthesis for redundancy reduction | (ref: G10L19/00)| | for image communication | (ref: H04N)| Expansion| Suppression of unnecessary data  e.g. redundancy reduction | for data acquisition | (ref: G06F17/40)| | for image data processing | (ref: G06T9/00)| | redundancy reduction in data recording | (ref: G11B20/14)| | for transmission | (ref: H04B1/66)0.410
G06F11/1044with specific ECC/EDC distribution0.410
G06F12/0615Address space extension0.410
H04W8/245from a network towards a terminal0.409
H04W28/0284detecting congestion or overload during communication | monitoring arrangements | (ref: H04L43/00)0.409
A63F13/26having at least one additional display device  e.g. on the game controller or outside a game booth0.409
G06F9/30116Shadow registers  e.g. coupled registers  not forming part of the register space0.409
H04W28/0278using buffer status reports | dynamic wireless traffic scheduling definition | (ref: H04W72/1205)0.409
H04W4/23for mobile advertising0.409
H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks0.409
G06F9/44584Portable applications  i.e. making applications self-contained  e.g. U3 standard0.409
G06F13/4221being an input/output bus  e.g. ISA bus  EISA bus  PCI bus  SCSI bus0.409
G06F13/28using burst mode transfer  e.g. direct memory access | DMA|   cycle steal | (ref: G06F13/32)|  takes precedence0.409
H04N21/233Processing of audio elementary streams | details of formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes | (ref: G10L19/167)| | arrangements characterised by components specially adapted for monitoring  identification or recognition of audio in broadcast systems | (ref: H04H60/58)0.408
H04N21/26241involving the time of distribution  e.g. the best time of the day for inserting an advertisement or airing a children program0.408
H04N21/2668Creating a channel for a dedicated end-user group  e.g. insertion of targeted commercials based on end-user profiles | information retrieval from the Internet by querying with filtering and personalisation | (ref: G06F17/30867)| | arrangements for replacing or switching information during the broadcast | (ref: H04H20/10)| | push services over packet-switching network | (ref: H04L12/1859)| | adaptation of message content in packet-switching networks | (ref: H04L51/063)0.408
H04N21/2368Multiplexing of audio and video streams0.408
H04N21/458Scheduling content for creating a personalised stream  e.g. by combining a locally stored advertisement with an incoming stream| Updating operations  e.g. for OS modules | | time-related management operations | arrangements for replacing or switching information during the broadcast or during the distribution | (ref: H04H20/10)0.408
H04N21/2353specifically adapted to content descriptors  e.g. coding  compressing or processing of metadata0.408
H04L65/4061"Push-to-X" services | push-to-talk services in wireless networks | (ref: H04W4/10)| | connection management  e.g. connection set-up  manipulation or release for push-to-talk or push-on-call services in wireless communication networks | (ref: H04W76/45)0.408
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]0.408
H04W76/40for selective distribution or broadcast0.408
H04N21/6581Reference data  e.g. a movie identifier for ordering a movie or a product identifier in a home shopping application0.408
G06F9/30029Logical and Boolean instructions  e.g. XOR  NOT0.408
G06F12/0806Multiuser  multiprocessor or multiprocessing cache systems0.408
A61B5/7275Determining trends in physiological measurement data| Predicting development of a medical condition based on physiological measurements  e.g. determining a risk factor0.407
A61B5/18for vehicle drivers | or machine operators0.407
G06Q40/08Insurance  e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10)0.407
A61B5/6898Portable consumer electronic devices  e.g. music players  telephones  tablet computers0.407
A61B5/163by tracking eye movement  gaze  or pupil change0.407
A61B5/1112Global tracking of patients  e.g. by using GPS0.407
A61B5/02Detecting  measuring or recording pulse  heart rate  blood pressure or blood flow| Combined pulse/heart-rate/blood pressure determination| Evaluating a cardiovascular condition not otherwise provided for  e.g. using combinations of techniques provided for in this group with electrocardiography or electroauscultation| Heart catheters for measuring blood pressure0.407
A61B5/0022Monitoring a patient using a global network  e.g. telephone networks  internet0.407
A61B5/024Detecting  measuring or recording pulse rate or heart rate | (ref: A61B5/0205)|   | (ref: A61B5/021)|  take precedence0.407
G06Q30/0611Request for offers or quotes0.407
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities0.407
G06F3/04845for image manipulation  e.g. dragging  rotation0.407
H04L41/5009Determining service level performance  e.g. measuring SLA quality parameters  determining contract or guarantee violations  response time or mean time between failure [MTBF] | monitoring performance metrics on a simple network level | (ref: H04L43/08)0.406
G06Q10/0635Risk analysis0.406
H04L12/46Interconnection of networks0.406
G06N3/10Simulation on general purpose computers0.406
H04L12/18for broadcast or conference |   e.g. multicast | multicast or broadcast switches | (ref: H04L49/201)0.406
G06N3/105Shells for specifying net layout0.406
G06F3/04883for entering handwritten data  e.g. gestures  text0.406
G05B23/0208characterized by the configuration of the monitoring system0.406
G07F19/20Automatic teller machines [ATMs]0.406
H04L67/1036Load balancing of requests to servers for services different from user content provisioning  e.g. load balancing to DNS servers or firewalls | internet service provider selection | (ref: H04L12/5691)0.406
G06F11/3668Software testing | software testing in telephone exchanges | (ref: H04M3/242)|   testing of hardware | (ref: G06F11/22)0.405
H04L41/022Multivendor or multistandard integration0.405
G05B19/0426Programming the control sequence0.405
B60W50/00Details of control systems for road vehicle drive control not related to the control of a particular sub-unit |   e.g. process diagnostic or vehicle driver interfaces0.405
B66C13/48Automatic control of crane drives for producing a single or repeated working cycle| Programme control0.405
H04W36/32by location or mobility data  e.g. speed data0.405
H04W8/12between location registers or mobility servers0.405
G06T1/0021Image watermarking0.405
H04N1/32144embedded in the image data  i.e. enclosed or integrated in the image  e.g. watermark  super-imposed logo or stamp0.405
H04W16/14Spectrum sharing arrangements | between different networks0.405
G06T15/503Blending  e.g. for anti-aliasing0.404
G06Q30/0643Graphical representation of items or shoppers0.404
G06T7/13Edge detection0.404
G06T7/12Edge-based segmentation0.404
G06Q30/0206Price or cost determination based on market factors0.404
G06F11/008Reliability or availability analysis0.404
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)0.404
G06F8/44Encoding0.404
G06Q20/38Payment protocols| Details thereof0.404
H04L9/302involving the integer factorization problem  e.g. RSA or quadratic sieve [QS] schemes0.404
G09C5/00Ciphering apparatus or methods not provided for in the preceding groups  e.g. involving the concealment or deformation of graphic data such as designs  written or printed messages0.404
H04N21/44218Detecting physical presence or behaviour of the user  e.g. using sensors to detect if the user is leaving the room or changes his face expression during a TV program | methods or arrangements for acquiring or recognising human faces  facial parts  facial sketches  facial expressions | (ref: G06K9/00221)| | methods or arrangements for recognising movements or behaviour | (ref: G06K9/00335)| | methods or arrangements for recognising human body or animal bodies or body parts | (ref: G06K9/00362)| | arrangements for identifying users in broadcast systems | (ref: H04H60/45)0.404
G06T17/205Re-meshing0.404
G06N3/0481Non-linear activation functions  e.g. sigmoids  thresholds0.404
G06F9/44536Selecting among different versions0.404
G10L13/047Architecture of speech synthesisers0.404
G10L15/16using artificial neural networks0.404
G10L13/027Concept to speech synthesisers| Generation of natural phrases from machine-based concepts | generation of parameters for speech synthesis out of text | (ref: G10L13/08)0.404
G07F7/125Offline card verification0.403
G06Q20/4033Local solvency checks0.403
G07B15/02taking into account a variable factor such as distance or time  e.g. for passenger transport  parking systems or car rental systems | (ref: G07B15/06)|  takes precedence| taximeters | (ref: G07B13/00)| | parking meters | per se|  | (ref: G07F17/24)| | | car rental systems | per se|  | (ref: G07B15/00)0.403
G07F15/005dispensed for the electrical charging of vehicles | electrical charging as such  | (ref: B60L11/00)0.403
G05B19/41875characterised by quality surveillance of production0.403
G06Q20/023characterized in that the neutral party is a clearing house0.403
G06F12/145the protection being virtual  e.g. for virtual blocks or segments before a translation mechanism0.402
G06F12/1458by checking the subject access rights0.402
G06F9/449Object-oriented method invocation or resolution0.402
G06F12/0824Distributed directories  e.g. linked lists of caches0.402
G06F3/0673Single storage device0.402
H04L43/062for traffic related reporting0.402
A63F13/847Cooperative playing  e.g. requiring coordinated actions from several players to achieve a common goal0.402
A63F13/42by mapping the input signals into game commands  e.g. mapping the displacement of a stylus on a touch screen to the steering angle of a virtual vehicle0.402
H04N21/2743Video hosting of uploaded data from client0.402
A63F13/86Watching games played by other players0.402
H04B1/3816Mechanical arrangements for accommodating identification devices  e.g. cards or chips| with connectors for programming identification devices0.401
H04W8/005Discovery of network devices  e.g. terminals0.401
H04W52/0229where the received signal is a wanted signal0.401
H04W88/02Terminal devices0.401
H04W28/08Load balancing or load distribution0.401
H04W8/04Registration at HLR or HSS [Home Subscriber Server]0.401
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.401
H04L67/00Network-specific arrangements or communication protocols supporting networked applications | message switching systems | (ref: H04L51/00)| | network management protocols | (ref: H04L41/00)| | routing or path finding of packets in data switching networks | (ref: H04L45/00)| | protocols for real-time multimedia communication | (ref: H04L65/00)| | information retrieval | (ref: G06F17/30)| | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)| | network structures or processes for video distribution between server and client or between remote clients | (r0.401
H04W4/12Messaging| Mailboxes| Announcements0.401
G06Q30/04Billing or invoicing |   e.g. tax processing in connection with a sale0.401
G09C1/00Apparatus or methods whereby a given sequence of signs  e.g. an intelligible text  is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00)0.401
H04W60/00Registration  e.g. affiliation to network| De-registration  e.g. terminating affiliation0.401
H04W52/383power control in peer-to-peer links0.401
H04L61/00Network arrangements or network protocols for addressing or naming0.401
H04W76/14Direct-mode setup0.401
H04W40/246Connectivity information discovery0.401
H04L12/2827Reporting to a device within the home network| wherein the reception of the information reported automatically triggers the execution of a home appliance functionality0.401
G08B21/0415detecting absence of activity | per se0.401
H04L12/2814Exchanging control software or macros for controlling appliance services in a home automation network | arrangements for maintenance or administration involving configuration of the network and network elements | (ref: H04L41/08)0.401
H04L43/065for device related reporting | reporting of sensed information of home appliances | (ref: H04L12/2803)0.401
H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network | device-related reporting | (ref: H04L43/065)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom | (ref: H04Q9/00)0.401
H04W72/0493where an allocation plan is defined based on a resource usage policy0.401
H04W52/0212managed by the network  e.g. network or access point is master and terminal is slave0.401
H04L12/28characterised by path configuration  e.g. local area networks [LAN]  wide area networks [WAN]0.401
H04W72/085using measured or perceived quality0.401
H04W74/0808using carrier sensing  e.g. as in CSMA0.401
H04W72/0453the resource being a frequency  carrier or frequency band0.401
H04W74/04Scheduled | or contention-free|  access0.401
H04W36/0055Transmission and use of information for re-establishing the radio link0.401
G10L15/083Recognition networks | (ref: G10L15/142)|   | (ref: G10L15/16)|  take precedence0.400
G10L15/063Training0.400
G01D21/00Measuring or testing not otherwise provided for0.400
H02J50/12of the resonant type0.400
G06F11/2092Techniques of failing over between control units0.400
G06F11/1662the resynchronized component or unit being a persistent storage device | re-synchronization of failed mirror storage | (ref: G06F11/2082)| | rebuild or reconstruction of parity RAID storage | (ref: G06F11/1008)0.400
G06F11/1666where the redundant component is memory or memory area0.400
H04M7/0069comprising a residential gateway  e.g. those which provide an adapter for POTS or ISDN terminals0.400
H04J3/0658Clock or time synchronisation among packet nodes0.400
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner0.400
H04W36/0011for data session or connection0.400
H04N21/2355involving reformatting operations of additional data  e.g. HTML pages | optimising the visualization of content for information retrieval from the Internet | (ref: G06F17/30905)| | media manipulation  adaptation or conversion at the source in one way streaming for real-time multimedia communications | (ref: H04L29/06489)| | message adaptation based on network or terminal capabilities in stored and forward packet switching | (ref: H04L51/34)0.399
H04N21/8358involving watermark | protecting executable software by watermarking | (ref: G06F21/16)| | image watermarking in general | (ref: G06T1/0021)| | watermarks inserted in still images for transmission purposes | (ref: H04N1/32144)| | inserting watermarks during video coding | (ref: H04N19/467)0.399
G11C11/2297Power supply circuits0.399
G11C11/2273Reading or sensing circuits or methods0.399
H04L5/006Quality of the received signal  e.g. BER  SNR  water filling0.399
G11C11/2257Word-line or row circuits0.399
H04B17/27for locating or positioning the transmitter0.399
G11C11/2259Cell access0.399
H04B17/373Predicting channel quality parameters0.399
H04B17/336Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]0.399
G11C11/2293Timing circuits or methods0.399
G01V3/12operating with electromagnetic waves | operating with millimetre waves | (ref: G01V8/005)0.399
H04L1/0018based on latency requirement0.399
G10L13/00Speech synthesis| Text to speech systems0.399
H04B7/18519Operations control  administration or maintenance0.399
H04N21/44204Monitoring of content usage  e.g. the number of times a movie has been viewed  copied or the amount which has been watched | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protecting generic digital content where the protection is independent of the precise nature of the content | (ref: G06F21/10)| | arrangements for monitoring the use made of the broadcast services in broadcast systems | (ref: H04H60/31)0.399
G06Q99/00Subject matter not provided for in other groups of this subclass0.399
G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer | (ref: G06F3/16)|  takes precedence0.399
H04L49/208Port mirroring0.399
H04L41/16Network management using artificial intelligence0.399
H04L41/5058Service discovery by the service manager | automatically determining the actual topology of a network | (ref: H04L41/12)| | topology discovery for routing | (ref: H04L45/02)| | arrangements for service discovery  e.g. service location protocol | (ref: H04L67/16)0.399
H04W88/18Service support| Network management devices0.399
G06Q20/403Solvency checks0.399
H04L67/1087involving cross functional networking aspects0.399
G10L25/78Detection of presence or absence of voice signals | switching of direction of transmission by voice frequency in two-way loud-speaking telephone systems | (ref: H04M9/10)0.399
H04L12/2832Interconnection of the control functionalities between home networks | single bridge functionality | (ref: H04L12/4625)0.399
H04L12/2829involving user profiles according to which the execution of a home appliance functionality is automatically triggered0.399
H04W28/04Error control0.398
G05B13/0265the criterion being a learning criterion0.398
A01B79/005Precision agriculture0.398
H04W4/022with dynamic range variability0.398
H04L12/4675Dynamic sharing of VLAN information amongst network nodes | configuration of the network or of network elements | (ref: H04L41/08)0.398
H04L45/245Link aggregation  e.g. trunking0.398
B41F33/00Indicating  counting  warning  control or safety devices | arrangements of counting devices in platen presses | (ref: B41F1/00)|  |   | (ref: B41F1/58)| | arrangements of counting devices|  in cylinder presses | (ref: B41F3/84)| | ink supply or metering devices | (ref: B41F31/02)0.398
H04N21/8106involving special audio data  e.g. different tracks for different languages0.398
G10L25/54for retrieval0.398
H04N21/4398involving reformatting operations of audio signals | details of audio signal transcoding | (ref: G10L19/173)0.398
H04W72/10where an allocation plan is defined|  based on priority criteria0.398
H04L5/0055Physical resource allocation for ACK/NACK | for physical mapping arrangements in ARQ protocols | (ref: H04L1/1861)0.398
H04W72/0433between access point and access point controlling device0.398
G06F3/0661Format or protocol conversion arrangements0.397
G01V99/005Geomodels or geomodelling  not related to particular measurements0.397
G05B19/4186by protocol  e.g. MAP  TOP0.397
G06F21/83input devices  e.g. keyboards  mice or controllers thereof0.396
H04N21/254Management at additional data server  e.g. shopping server  rights management server | protocols involving third party service providers for network applications in communication control or processing | (ref: H04L29/08666)| | arrangements for maintenance or administration in data networks | (ref: H04L41/00)0.396
G06F3/1228Printing driverless or using generic drivers0.396
G06F3/1247by conversion to printer ready format0.396
G06F3/1211Improving printing performance0.396
H04N21/23113involving housekeeping operations for stored content  e.g. prioritizing content for deletion because of storage space restrictions | storage management  e.g. defragmentation | (ref: G06F3/0604)| | snloading stored programs | (ref: G06F9/445)| | housekeeping operations in file systems  e.g. deletion policies | (ref: G06F17/30067)| | buffering arrangements in a network node or in an end terminal in packet networks | (ref: H04L49/90)0.396
H04N21/231Content storage operation  e.g. caching movies for short term storage  replicating data over plural servers  prioritizing data for deletion0.396
H04N19/60using transform coding0.396
H04N5/23229comprising further processing of the captured image without influencing the image pickup process | image processing in general | (ref: G06T)0.396
H04L61/256Network address translation [NAT] traversal0.396
H04L45/7453using hashing0.396
G06F13/122where hardware performs an I/O function other than control of data transfer0.396
G06F3/0625Power saving in storage systems0.396
G06F3/0607by facilitating the process of upgrading existing storage systems  e.g. for improving compatibility between host and storage device0.396
G06F13/364using independent requests or grants  e.g. using separated request and grant lines0.396
G06F1/266Arrangements to supply power to external peripherals either directly from the computer or under computer control  e.g. supply of power through the communication port  computer controlled power-strips0.396
G06F9/381Loop buffering0.396
G06F3/1222Increasing security of the print job0.396
G06F3/1268Job submission  e.g. submitting print job order or request not the print data itself0.396
G06F3/1296Printer job scheduling or printer resource handling0.396
H04L1/16in which the return channel carries supervisory signals  e.g. repetition request signals0.396
H04J3/0661using timestamps0.395
H04N21/6405Multicasting | data broadcast and multicast in packet switching networks | (ref: H04L12/18)0.395
H04L41/08Configuration management of network or network elements | proprietary application protocols for remote control of end-devices in special networking environments | (ref: H04L67/125)| | automatic configuration specially adapted for wireless networks | (ref: H04W24/02)0.395
G08C17/02using a radio link0.395
B63B49/00Arrangements of nautical instruments or navigational aids | nautical measuring instruments | (ref: G01C)| | radio navigation  analogous arrangements using other waves | (ref: G01S)0.395
G01S19/48by combining or switching between position solutions derived from the satellite radio beacon positioning system and position solutions derived from a further system0.395
G06F13/4063Device-to-bus coupling0.395
G06F3/04842Selection of a displayed object | (ref: G06F3/0482)|  takes precedence0.395
G06F21/43wireless channels0.395
H04W48/14using user query | or user detection0.395
H04L49/1546Pipelined operation0.395
G06Q50/26Government or public services0.395
G06Q10/0831Overseas transactions0.395
G06F8/74Reverse engineering| Extracting design information from source code0.395
G06T7/20Analysis of motion | motion estimation for coding  decoding  compressing or decompressing digital video signals | (ref: H04N19/43)|   | (ref: H04N19/51)0.394
G06T7/75involving models0.394
G05D1/0274using mapping information stored in a memory device | navigation using map-matching | (ref: G01C21/30)0.394
G01C21/367Details  e.g. road map scale  orientation  zooming  illumination  level of detail  scrolling of road map or positioning of current position marker0.394
G01C21/32Structuring or formatting of map data0.394
G06K9/6256Obtaining sets of training patterns| Bootstrap methods  e.g. bagging  boosting0.394
G06T15/205Image-based rendering0.394
G06T15/003D [Three Dimensional] image rendering0.394
H04M1/67by electronic means0.394
H04N21/44Processing of video elementary streams  e.g. splicing a video clip retrieved from local storage with an incoming video stream  rendering scenes according to MPEG-4 scene graphs0.393
H04L65/60Media handling  encoding  streaming or conversion0.393
H04N21/472End-user interface for requesting content  additional data or services| End-user interface for interacting with content  e.g. for content reservation or setting reminders  for requesting event notification  for manipulating displayed content | end-user interfaces for retrieving video data from a database | (ref: G06F17/30843)| | content on demand in one way streaming for real-time multimedia communications | (ref: H04L29/06462)0.393
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.105
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.105
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.105
H04L67/1038Load balancing arrangements to avoid a single path through a load balancer0.099
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.099
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.099
G06F2209/549Remote execution0.099
G06F2209/5015Service provider selection0.096
H04L61/35involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address or functional addressing  i.e. assigning an address to a function0.096
G06F2212/151Emulated environment  e.g. virtual machine0.096
G06F2009/45562Creating  deleting  cloning virtual machine instances0.096
G06F2212/6042Allocation of cache space to multiple users or processors0.096
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.096
G06F2009/45575Starting  stopping  suspending  resuming virtual machine instances | program initiating | (ref: G06F9/445)| | task life-cycle in general | (ref: G06F9/485)0.096
H04L2463/081applying self-generating credentials  e.g. instead of receiving credentials from an authority or from another peer  the credentials are generated at the entity itself | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.095
H04N21/81Monomedia components thereof0.092
H04N21/4627Rights management | associated to the content | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)0.092
H04L47/2408Different services  e.g. type of service [ToS]0.092
G06F2209/547Messaging middleware0.092
G06F2209/484Precedence0.092
G06F2209/508Monitor0.092
G06F2209/5011Pool0.092
G06F2209/544Remote0.092
G06F2201/88Monitoring involving counting0.092
G06F2221/033Test or assess software0.092
G06F2209/502Proximity0.092
G06F2201/865Monitoring of software0.092
G06F2209/521Atomic0.092
Y02D10/00Energy efficient computing0.091
G06F2221/032Protect output to user by software means0.091
H04W4/18Information format or content conversion  e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals0.091
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.090
G06F2209/501Performance criteria0.090
G06F2209/506Constraint0.090
G06F2221/0748Hiding0.090
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.090
G06F2009/45591Monitoring or debugging support | monitoring and debugging in general in | (ref: G06F11/30)|   | (ref: G06F11/36)0.090
G06F2212/1032Reliability improvement  data loss prevention  degraded operation etc0.090
G06F2212/313In storage device0.090
G06F2212/1021Hit rate improvement0.090
G06F2221/034Test or assess a computer or a system0.089
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.088
G06T2200/28involving image processing hardware0.088
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.086
H04L2209/127Trusted platform modules [TPM]0.085
G06F2201/81Threshold0.085
G06F9/45554Instruction set architectures of guest OS and hypervisor or native processor differ  e.g. Bochs or VirtualPC on PowerPC MacOS0.085
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.085
G06F2201/875Monitoring of systems including the internet0.085
G06F2221/2135Metering0.084
G06F2221/2103Challenge-response0.084
G06F11/0763by bit configuration check  e.g. of formats or tags0.084
G06F11/0706the processing taking place on a specific hardware platform or in a specific software environment0.084
G06F2212/6028Prefetching based on hints or prefetch instructions0.084
G06F2221/0713User0.084
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.084
G06F2221/2137Time limited access  e.g. to a computer or data0.084
H04L47/825Involving tunnels  e.g. MPLS0.084
H04L45/302Route determination based on requested QoS0.084
G06F2221/2101Auditing as a secondary aspect0.083
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.083
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.083
H04L49/70Virtual switches0.082
G06F2209/5016Session0.082
G06F2221/2151Time stamp0.082
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.082
G06F2212/152Virtualized environment  e.g. logically partitioned system0.082
G06F2221/2107File encryption0.082
G06F2212/1008Correctness of operation  e.g. memory ordering0.082
G06F2212/282Partitioned cache0.082
H04L2463/144Detection or countermeasures against botnets0.082
B82Y10/00Nanotechnology for information processing  storage or transmission  e.g. quantum computing or single electron logic0.082
G06F8/436Semantic checking0.081
H04L41/0213using standardized network management protocols  e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]0.081
G06F2209/504Resource capping0.080
G09G2370/022Centralised management of display operation  e.g. in a server instead of locally0.080
G06F3/1446display composed of modules  e.g. video walls0.080
G06F2221/2115Third party0.080
G06F2209/505Clust0.079
G06F2209/509Offload0.079
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.079
G06F2209/5017Task decomposition0.079
H04L67/1017based on a round robin mechanism0.079
G06F2206/1012Load balancing0.079
G06F2221/2131Lost password  e.g. recovery of lost or forgotten passwords0.079
G06Q50/34Betting or bookmaking  e.g. Internet betting0.078
G06F2209/5014Reservation0.078
G06F2221/0753Distribution0.078
G06F2221/2125Just-in-time application of countermeasures  e.g.  on-the-fly decryption  just-in-time obfuscation or de-obfuscation0.078
H04L2209/46Secure multiparty computation  e.g. millionaire problem0.078
H04L2209/08Randomization  e.g. dummy operations or using noise0.078
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.078
G06F2212/656Address space sharing0.078
G06F2212/401Compressed data0.078
G06F2212/1024Latency reduction0.078
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.078
G10L2015/226Taking into account non-speech caracteristics0.077
G10L2015/223Execution procedure of a spoken command0.077
G06F2221/0773Recurrent authorisation0.077
G06F2221/2149Restricted operating environment0.077
G06F2221/0711Token0.077
G06F2221/0775Logging0.077
H04L2209/50Oblivious transfer0.077
H04W36/0033with transfer of context information0.077
G06F2209/545Gui0.077
H04L2209/04Masking or blinding0.077
G06F2212/1041Resource optimization0.076
G06T2200/24involving graphical user interfaces [GUIs]0.076
G06F2212/602Details relating to cache prefetching0.076
G10L2015/088Word spotting0.075
B64C2201/146Remote controls0.075
B64C2201/141autonomous  i.e. by navigating independently from ground or air stations  e.g. by using inertial navigation systems [INS]0.075
B64C2201/027Flying platforms0.075
B64C2201/128for transporting goods other than bombs0.075
G06F2212/6046Using a specific cache allocation policy other than replacement policy0.075
G06F2212/1016Performance improvement0.075
G06F2221/2153Using hardware token as a secondary aspect0.075
G06F2201/815Virtual | middleware or OS functionality using virtual machines to implement generic software techniques for error detection or fault masking | (ref: G06F11/1484)0.075
G06T2219/2012Colour editing  changing  or manipulating| Use of colour codes0.075
G06T2219/024Multi-user  collaborative environment0.075
G06T2219/028Multiple view windows (top-side-front-sagittal-orthogonal)0.075
A63F2300/534for network load management  e.g. bandwidth optimization  latency reduction0.075
A63F2300/535for monitoring  e.g. of user parameters  terminal parameters  application parameters  network parameters0.075
H04L2212/00Encapsulation of packets0.075
G06F2212/653Page colouring0.075
G06F2212/1052Security improvement0.075
G06F2207/7219Countermeasures against side channel or fault attacks0.075
B60W2420/00Indexing codes relating to the type of sensors based on the principle of their operation0.075
G10L2015/228of application context0.075
B60Y2400/30Sensors0.075
B60W2050/146Display means0.075
B60W2050/065by reducing the computational load on the digital processor of the control computer0.075
G06F2212/604Details relating to cache allocation0.075
G06F2212/1044Space efficiency improvement0.075
G06F2212/608Details relating to cache mapping0.075
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]0.074
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.074
H04W76/50for emergency connections0.074
H04W84/005Moving wireless networks0.074
H04W92/02Inter-networking arrangements0.074
G06F2212/464Multimedia object  e.g. image  video0.074
Y02P90/02Total factory control  e.g. smart factories  flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]0.074
G05B2219/31362Verify correct configuration of system0.074
G06F2212/1048Scalability0.074
G06F2212/683Invalidation0.074
G06F2212/502using adaptive policy0.074
H04L2012/5626Network management  e.g. Intelligent nets0.074
G06T2219/2008Assembling  disassembling0.073
G06T2210/36Level of detail0.073
A63F2300/6615using models with different levels of detail [LOD]0.073
H04W88/14Backbone network devices0.073
H04W88/12Access point controller devices0.073
G06T2210/52Parallel processing0.073
G06F2212/402Encrypted data0.073
G06T2200/16involving adaptation to the client's capabilities0.073
G05B2219/13119Compiler0.073
G05B2219/32137Configure  connect  combine different program modules0.073
Y10S707/99943Generating database or data structure  e.g. via user interface0.073
Y10S707/99939Privileged access0.073
G07C2209/63Comprising locating means for detecting the position of the data carrier  i.e. within the vehicle or within a certain distance from the vehicle0.073
H04L5/0044allocation of payload0.073
H04L41/0631Alarm or event or notifications correlation| Root cause analysis0.073
H04L69/02Protocol performance0.072
G05B2219/2614HVAC  heating  ventillation  climate control0.072
G06F2201/87Monitoring of transactions0.072
H04L61/2528Translation at a proxy0.072
H04L43/087Jitter0.072
H04L43/0805Availability0.072
G06F2212/452Instruction code0.072
G06F2212/6022Using a prefetch buffer or dedicated prefetch cache0.072
G06F2212/171Portable consumer electronics  e.g. mobile phone0.072
G06F2212/1028Power efficiency0.072
G05B2219/40323Modeling robot environment for sensor based robot system0.072
A63F2300/538for performing operations on behalf of the game client  e.g. rendering0.072
H04L2209/601Broadcast encryption0.072
H04L2209/60Digital content management  e.g. content distribution0.072
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.072
G06F2201/84Using snapshots  i.e. a logical point-in-time copy of the data0.072
G06T2200/21involving computational photography0.072
G06F2212/657Virtual address space management0.072
G06F2221/2133Verifying human interaction  e.g.  Captcha0.072
G06F11/2048where the redundant components share neither address space nor persistent storage0.072
Y02D30/00High level techniques for reducing energy consumption in communication networks0.072
H04W88/182Network node acting on behalf of an other network entity  e.g. proxy0.072
H04L2012/5635Backpressure  e.g. for ABR0.071
G06F9/46Multiprogramming arrangements0.071
H04N2007/145Handheld terminals0.071
G06F2212/7201Logical to physical mapping or translation of blocks or pages0.071
G06F2212/652Page size control0.071
G06F11/0778Dumping  i.e. gathering error/state information after a fault for later diagnosis0.071
B60W2030/082Vehicle operation after collision0.071
B60W2050/0075Automatic parameter input  automatic initialising or calibrating means0.071
B60W2050/0004In digital systems  e.g. discrete-time systems involving sampling0.071
G06F2212/271Non-uniform cache access [NUCA] architecture0.071
G05B2219/32128Gui graphical user interface0.071
G05B2219/31449Monitor workflow  to optimize business  industrial processes0.071
G05B2219/32252Scheduling production  machining  job shop0.071
G06F2212/465Structured object  e.g. database record0.071
G06F9/30025Format conversion instructions  e.g. Floating-Point to Integer  decimal conversion0.071
G06F2207/3824Accepting both fixed-point and floating-point numbers0.071
G05D2201/0213Road vehicle  e.g. car or truck0.071
B60R2325/101Bluetooth0.071
G05D1/021specially adapted to land vehicles0.071
B60R2325/108Encryption0.071
G06F2221/2123Dummy operation0.071
G06F2209/482Application0.071
G06N5/027Frames0.071
G06F2216/15Synchronised browsing0.071
G06Q30/0242Determination of advertisement effectiveness0.071
G06F2212/163Server or database system0.071
G06F12/04Addressing variable-length words or parts of words0.071
G06F2212/3042being part of a memory device  e.g. cache DRAM0.071
G06F2209/5022Workload threshold0.071
G06F2212/154Networked environment0.071
G06F2212/7208Multiple device management  e.g. distributing data over multiple flash devices0.071
G06F2213/0026PCI express0.071
G06F2212/205Hybrid memory  e.g. using both volatile and non-volatile memory0.071
G09G2320/103Detection of image changes  e.g. determination of an index representative of the image change0.071
G09G2370/027Arrangements and methods specific for the display of internet documents0.071
G09G2340/02Handling of images in compressed format  e.g. JPEG  MPEG0.071
G09G2310/04Partial updating of the display screen0.071
G06Q2220/18Licensing0.070
G05B2219/34263OLE object linking and embedding  OPC ole for process control0.070
G06F2221/0759Conversion0.070
H04L2209/603Digital right managament [DRM]0.070
G06F2212/6024History based prefetching0.070
G06F2209/483Multiproc0.070
A63F2300/405being a wireless ad hoc network  e.g. Bluetooth  Wi-Fi  Pico net0.070
A63F2300/807Role playing or strategy games0.070
H04L41/06involving management of faults or events or alarms0.070
G06F2212/221Static RAM0.070
G08B19/00Alarms responsive to two or more different undesired or abnormal conditions  e.g. burglary and fire  abnormal temperature and abnormal rate of flow0.070
G06F2212/621Coherency control relating to peripheral accessing  e.g. from DMA or I/O device0.070
G06F2201/885Monitoring specific for caches0.070
G06F11/3471Address tracing0.070
G06F2212/283Plural cache memories0.070
G06F11/2038with a single idle spare processing component0.070
G06F2201/805Real-time0.070
G06F11/2041with more than one idle spare processing component0.070
H04L63/0254Stateful filtering0.069
H04L2209/84Vehicles0.069
G05B2219/31088Network communication between supervisor and cell  machine group0.069
H04N1/4413involving the use of passwords  ID codes or the like  e.g. PIN0.069
G05B2219/2639Energy management  use maximum of cheap power  keep peak load low0.069
Y02B70/3225Demand response systems  e.g. load shedding  peak shaving0.069
Y04S20/222Demand response systems  e.g. load shedding  peak shaving0.069
G07B15/063using wireless information transmission between the vehicle and a fixed station | identification of vehicles | (ref: G08G)0.069
G07C5/008communicating information to a remotely located station | transmission systems for measured values | (ref: G08C)0.069
G06F2212/651Multi-level translation tables0.069
G06F2212/684TLB miss handling0.069
H04M2203/6009Personal information  e.g. profiles or personal directories being only provided to authorised persons0.069
H04M2201/39using speech synthesis | speech synthesis | per se|  | (ref: G10L13/00)0.069
H04M2203/252where a voice mode is enhanced with visual information0.069
H04M2203/306Prerecordings to be used during a voice call0.069
G06F2209/5019Workload prediction0.069
H04L41/5048Automatic or semi-automatic definitions  e.g. definition templates0.069
H04L41/5067Customer-centric quality of service [QoS] measurement0.069
H04L41/0863by rolling back to previous configuration versions0.069
H04L41/0233using object oriented techniques  e.g. common object request broker architecture [CORBA] for representation of network management data0.069
G06F2221/0797using dedicated hardware at the client0.069
H04M2203/6081Service authorization mechanisms0.069
G05B2219/32411Derive control data from displayed element  logic for it and feedback data0.069
G05B2219/31472Graphical display of process0.069
G05B2219/34121Edge generator0.069
G05B2219/24215Scada supervisory control and data acquisition0.069
G05B2219/31094Data exchange between modules  cells  devices  processors0.068
G06F2221/2113Multi-level security  e.g. mandatory access control0.068
G06F2209/541Client-server0.068
A61B2560/028Arrangements to prevent overuse  e.g. by counting the number of uses0.068
A61B2562/0247Pressure sensors0.068
A61B2562/0271Thermal or temperature sensors0.068
H04L2209/88Medical equipments0.068
H04L2209/42Anonymization  e.g. involving pseudonyms0.068
G06F2211/1011Clustered RAID  i.e. clustered or de-clustered RAID where data and parity are spread over more disks than blocks in a parity group0.068
G06F12/0207with multidimensional access  e.g. row/column  matrix0.068
G02B2027/0134of stereoscopic type0.068
G06T2210/08Bandwidth reduction0.068
G02B2027/014comprising information/image processing systems0.068
H04M2250/06including a wireless LAN interface0.068
G06F2213/28DMA0.068
A61B2562/0219Inertial sensors  e.g. accelerometers  gyroscopes  tilt switches0.068
A61B2560/0242adapted to measure environmental factors  e.g. temperature  pollution0.068
G06F2009/45579I/O management (device drivers  storage access) | internal functioning of device drivers | (ref: G06F13/102)|   loading of device drivers | (ref: G06F9/4411)0.068
H04M2215/7846Transaction based0.068
H04M2215/78Metric aspects0.068
G06F2221/2129Authenticate client device independently of the user0.068
H04L2209/20Manipulating the length of blocks of bits  e.g. padding or block truncation0.068
H04L2209/16Obfuscation or hiding  e.g. involving white box0.068
H04M2201/40using speech recognition | speech recognition | per se|  | (ref: G10L15/00)0.068
H04M3/4938comprising a voice browser which renders and interprets  e.g. VoiceXML0.068
Y04S40/18Network protocols supporting networked applications  e.g. including control of end-device applications over a network0.068
B60W2050/0083Setting  resetting  calibration0.067
G05B2219/2637Vehicle  car  auto  wheelchair0.067
G06T2207/20081Training| Learning0.067
G06T2207/30168Image quality inspection0.067
G06T2219/2016Rotation  translation  scaling0.067
G06T2207/10016Video| Image sequence0.067
G06T2210/04Architectural design  interior design0.067
G06T2219/2004Aligning objects  relative positioning of parts0.067
G06T2207/20084Artificial neural networks [ANN]0.067
G06F11/004Error avoidance | (ref: G06F11/07)|  and subgroups take precedence0.067
G07C9/00Individual entry or exit registers0.067
Y02T90/12Electric charging stations0.067
G06Q2240/00Transportation facility access  e.g. fares  tolls or parking0.067
G06Q50/00Systems or methods specially adapted for specific business sectors  e.g. utilities or tourism | healthcare informatics | (ref: G16H)0.067
G05B2219/32339Object oriented modeling  design  analysis  implementation  simulation language0.067
Y10S707/99944Object-oriented database structure0.067
Y10S707/99945Object-oriented database structure processing0.067
G06F2221/0751Key | not used0.067
Y10S707/99953Recoverability0.067
G06F2212/60Details of cache memory0.067
G06F2213/40Bus coupling0.067
Y04S40/20Information technology specific aspects0.067
H04L12/56Packet switching systems0.067
H04W80/045involving different protocol versions  e.g. MIPv4 and MIPv60.067
G10L2015/0635updating or merging of old and new templates| Mean values| Weighting0.067
Y02E60/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation0.067
Y02E60/7807characterised by data transport means between the monitoring  controlling or managing units and monitored  controlled or operated electrical equipment0.067
G01D7/00Indicating measured values0.067
Y04S10/30Systems characterised by state monitoring  e.g. fault  temperature monitoring  insulator monitoring  corona discharge0.067
H04Q2209/40using a wireless architecture0.067
H04Q2209/88Providing power supply at the sub-station0.067
H04Q2209/823where the data is sent when the measured values exceed a threshold  e.g. sending an alarm0.067
B60L2240/70Interactions with external data bases  e.g. traffic centres0.067
Y02T90/14Plug-in electric vehicles0.067
Y02T90/16Information or communication technologies improving the operation of electric vehicles0.067
Y04S30/12Remote or cooperative charging0.067
Y02T10/7072Electromobility specific charging systems or methods for batteries  ultracapacitors  supercapacitors or double-layer capacitors | efficient charging systems for batteries  ultracapacitors  supercapacitors or double-layer capacitors in road transportation in general | (ref: Y02T10/92)0.067
Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles  i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV] | power aggregation of EV or HEV | (ref: Y02E60/721)0.067
Y02T10/72Electric energy management in electromobility0.067
Y02T10/70Energy storage for electromobility | hydrogen internal combustion engines | (ref: Y02T90/42)| | fuel cell powered electric vehicles | (ref: Y02T90/34)0.067
G06F11/2053where persistent mass storage functionality or persistent mass storage control functionality is redundant | error detection or correction in information storage based on relative movement between record carrier and transducer | (ref: G11B20/18)0.067
G06F11/20using active fault-masking  e.g. by switching out faulty elements or by switching in spare elements0.067
G06F3/0655Vertical data movement  i.e. input-output transfer| data movement between one or more hosts and one or more storage devices0.067
G06T2207/10028Range image| Depth image| 3D point clouds0.067
H04L2209/608Watermarking0.067
G01V1/001Acoustic presence detection | measurement of sonic vibrations | (ref: G01H)| | alarm systems | (ref: G08B)0.067
G11C11/221using ferroelectric capacitors0.067
H04L41/147for prediction of network behaviour0.066
G05B2219/32331Network of coordinating planning systems for each cell  factory0.066
Y02P90/82Energy audits or management systems therefor0.066
G07C2009/00769with data transmission performed by wireless means0.066
G07C2009/00761with data transmission performed by connected means  e.g. mechanical contacts  plugs  connectors0.066
H04L1/188Time-out mechanisms0.066
H04W88/08Access point devices0.066
H04M2250/04including near field communication means  e.g. RFID0.066
G10L13/086Detection of language0.066
G10L13/033Voice editing  e.g. manipulating the voice of the synthesiser0.066
G05B2219/31161Java programcode or simular active agents  programs  applets0.066
G05B2219/31083In server store virtual nodes for controlled machines  with states for map0.066
G05B2219/33148CLS client server architecture  client consumes  server provides services0.066
G06F9/30174for non-native instruction set  e.g. Javabyte  legacy code0.066
G06F9/3455using stride0.066
G06F8/452Loops0.066
G06F8/456Parallelism detection0.066
G06F9/325for loops  e.g. loop detection  loop counter0.066
G06F2211/006E-Mail0.066
G06F3/1219with regard to consumables  e.g. ink  toner  paper0.066
G06F2209/503Resource availability0.066
G06F2209/507Low-level0.066
G06F2213/0058Bus-related hardware virtualisation0.066
G06F2212/6026Prefetching based on access pattern detection  e.g. stride based prefetch0.066
G10L2015/227of the speaker|  Human-factor methodology0.066
G06T2207/20221Image fusion| Image merging0.066
G06T2200/04involving 3D image data0.066
G06T2207/10032Satellite or aerial image| Remote sensing0.066
G06K9/6257characterised by the organisation or the structure of the process  e.g. boosting cascade | feature selection by floating search | (ref: G06K9/6231)0.066
G06K9/6259characterised by the incorporation of unlabelled data  e.g. multiple instance learning [MIL]  semi-supervised techniques using expectation-maximisation [EM] or naïve labelling | EM techniques | (ref: G06K9/6226)| | validation with "oracles" | (ref: G06K9/6263)0.066
G06T2210/61Scene description0.066
A63F13/67adaptively or by learning from player actions  e.g. skill level adjustment or by storing successful combat sequences for re-use0.066
A63F13/60Generating or modifying game content before or while executing the game program  e.g. authoring tools specially adapted for game development or game-integrated level editor0.066
G06F2209/5013Request control0.066
A63F2300/407Data transfer via internet0.066
A63F2300/531Server assignment0.066
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.