Validity Report
Full Report
US10726102B2 — Method of and system for providing access to access restricted content to a user
Priority Date: 2014-01-08, Publication Date: 2020-07-28, Current Assignee: Ipra Technologies Ltd OyReport Generated: 2022-04-15

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP3860083A11.432SYSTEM AND METHOD FOR IDENTITY MANAGEMENTGRANT2021-08-042013-08-2352481628GreatIdemia Identity and Security USA LLCIdemia Identity and Security USA LLC
EP3901792A11.411METHOD AND SYSTEM FOR CONTENT DISTRIBUTIONGRANT2021-10-272011-12-2947561582GreatKoninklijke KPN NVKoninklijke KPN NV
EP3907636A11.372SECURELY COMMUNICATING BETWEEN A CARD READER AND A MOBILE DEVICEGRANT2021-11-102012-06-1249714882GreatSquare IncBlock Inc
EP3916593A11.342SYSTEM AND METHOD FOR EFFICIENTLY ENROLLING  REGISTERING  AND AUTHENTICATING WITH MULTIPLE AUTHENTICATION DEVICESGRANT2021-12-012012-12-2851022200GreatNok Nok Labs IncNok Nok Labs Inc
EP3917106A11.313METHOD AND APPARATUS FOR PROVIDING AUTHENTICATION SESSION SHARINGGRANT2021-12-012010-02-1844370560GreatNokia Technologies OyNokia Technologies Oy
EP3866447A11.279SYSTEM AND METHOD FOR AUTHORIZING ACCESS TO ACCESS-CONTROLLED ENVIRONMENTSGRANT2021-08-182013-05-1351865547GreatVeridium IP LtdVeridium IP Ltd
EP3859635A11.272FILE-LEVEL COMMENTINGGRANT2021-08-042013-11-1451663477GreatDropbox IncDropbox Inc
EP3910580A11.250PAYMENT SYSTEMGRANT2021-11-172011-04-0544071994GreatVisa Europe LtdVisa Europe Ltd
EP3917111A11.247STORAGE DEVICE AUTHENTICATIONGRANT2021-12-012009-05-1543069460GreatAmazon Technologies IncAmazon Technologies Inc
EP3905076A11.232CONTENT PROTECTIONGRANT2021-11-032012-11-0447429119GreatMining Ip LtdMining Ip Ltd
EP3905171A11.224METHOD AND SYSTEM FOR SECURE ORDER MANAGEMENT SYSTEM DATA ENCRYPTION  DECRYPTION  AND SEGMENTATIONGRANT2021-11-032010-06-1145097005GreatCardinalCommerce CorpCardinalCommerce Corp
EP3890217A11.180SYSTEMS  METHODS  AND DEVICES FOR SCANNING BROADCASTSGRANT2021-10-062008-02-0540940018GreatStratosAudio IncStratosAudio Inc
EP3860094A11.164SUBSCRIPTION-NOTIFICATION MECHANISMS FOR SYNCHRONIZATION OF DISTRIBUTED STATESGRANT2021-08-042012-09-2249919341GreatGoogle LLCGoogle LLC
EP3886452A11.135METHOD FOR SHARING MEDIA CONTENT  TERMINAL DEVICE  AND CONTENT SHARING SYSTEMGRANT2021-09-292013-07-2349605759GreatHuawei Technologies Co LtdHuawei Technologies Co Ltd
EP3872724A11.133NOTIFICATION FEED ACROSS MULTIPLE CLIENT DEVICESGRANT2021-09-012013-01-1449920615GreatDropbox IncDropbox Inc
EP3896911A11.124METHOD AND SYSTEM FOR A COMMON CONTROL PROTOCOL FOR WIRED AND WIRELESS NODESGRANT2021-10-202012-09-2848288790GreatJuniper Networks IncJuniper Networks Inc
EP3885916A11.122SOFTWARE DEPLOYMENT AND CONTROL METHOD AND SYSTEMGRANT2021-09-292012-11-1647521319GreatOvernet Data Management LtdOvernet Data Management Ltd
EP3885887A11.121METHOD AND APPARATUS FOR INCREASING THE FUNCTIONALITY OF A USER DEVICE IN A LOCKED STATEGRANT2021-09-292011-10-2848168686GreatHere Global BVHere Global BV
EP3897027A11.120METHODS AND APPARATUS FOR CONTROLLING WIRELESS ACCESS POINTSGRANT2021-10-202012-09-2848288775GreatJuniper Networks IncJuniper Networks Inc
EP3885933A11.119METHOD AND APPARATUS FOR SHARING CONTENTGRANT2021-09-292012-12-2149816937GreatNokia Technologies OyNokia Technologies Oy
EP3860080A11.109KEYCHAIN SYNCHRONIZATIONGRANT2021-08-042013-01-1851209997GreatApple IncApple Inc
EP3910876A11.085METHOD  SYSTEM  AND DEVICE FOR GENERATING  STORING  USING  AND VALIDATING NFC TAGS AND DATAGRANT2021-11-172013-03-1550942708GreatAssa Abloy ABAssa Abloy AB
EP3848910A11.085TOLL PAYMENT COLLECTION WITH COMMUNICATION DEVICEGRANT2021-07-142013-03-1151658784GreatAetolls LLCAetolls LLC
EP3859570A11.071CONFIRMING THE IDENTITY OF INTEGRATOR APPLICATIONSGRANT2021-08-042013-09-1952669270GreatGoogle LLCGoogle LLC
EP3866409A11.047LOCAL NETWORKGRANT2021-08-182013-06-2551211873GreatGoogle LLCGoogle LLC
EP3848874A11.045SYSTEMS AND METHODS FOR FACILITATING A TRANSACTION USING A VIRTUAL CARD ON A MOBILE DEVICEGRANT2021-07-142012-04-1649382762GreatStickyIo IncStickyIo Inc
EP3863294A11.038METHODS AND SYSTEMS FOR DISPLAYING CONTEXTUALLY RELEVANT INFORMATION REGARDING A MEDIA ASSETGRANT2021-08-112012-12-0549780423GreatRovi Guides IncRovi Guides Inc
EP3855815A11.037METHOD FOR RE-SYNCHRONIZING AN UPLINK BETWEEN AN ACCESS DEVICE AND A USER AGENTGRANT2021-07-282010-06-1843447027GreatBlackBerry LtdBlackBerry Ltd
EP3862961A11.035ACCOUNT ASSOCIATION SYSTEMS AND METHODSGRANT2021-08-112013-09-3049585082GreatVisa Europe LtdVisa Europe Ltd
US7036011B21.023Digital rights managementGRANT2006-04-252000-06-2922800193GreatCacheStream CorpCacheStream Corp
EP3913500A11.016IDENTIFYING MEDIA COMPONENTSGRANT2021-11-242013-11-0852003980GreatFriend For Media LtdFriend For Media Ltd
EP3863280A11.005SYSTEMS AND METHODS FOR SUPPORTING MULTI-USER MEDIA CONTENT ACCESS USING INDEX POINTSGRANT2021-08-112006-12-2239544869GreatRovi Guides IncRovi Guides Inc
EP3905600A11.004EFFICIENT COMMUNICATION FOR DEVICES OF A HOME NETWORKGRANT2021-11-032013-06-2551211874GreatGoogle LLCGoogle LLC
EP3901880A10.992MOBILE DEVICE-TO-MACHINE PAYMENT SYSTEMSGRANT2021-10-272013-12-1851627058GreatPayRange IncPayRange Inc
EP3901779A10.986VIDEO DISTRIBUTION SYSTEM INCLUDING PROGRESSIVE PLAYBACKGRANT2021-10-272007-01-0539595207GreatDivx LLCDivx LLC
US8194859B20.983Efficient key hierarchy for delivery of multimedia contentGRANT2012-06-052005-09-0137800528GreatQualcomm IncQualcomm Inc
EP1999883A20.966FEDERATED DIGITAL RIGHTS MANAGEMENT SCHEME INCLUDING TRUSTED SYSTEMSGRANT2008-12-102006-03-1438510257GreatDivx LLCSonic IP Inc, Divx LLC
US7237108B20.948Encryption of streaming control protocols and their headersGRANT2007-06-262001-09-2629999196GreatGeneral Instrument CorpGoogle Technology Holdings LLC
EP1154348A20.937File management apparatusGRANT2001-11-142000-05-1118646227GreatMatsushita Electronics Corp, Matsushita Electric Industrial Co LtdPanasonic Holdings Corp
US10178072B20.935Technique for securely communicating and storing programming material in a trusted domainGRANT2019-01-082004-07-2035658621GreatTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
EP2273409A20.932Interoperable keychestGRANT2011-01-122009-07-1042791075GreatDisney Enterprises IncDisney Enterprises Inc
US7921450B10.918Security system using indirect key generation from access rules and methods thereforGRANT2011-04-052001-12-1243805960GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US6993137B20.906Method and system to securely distribute content via a networkGRANT2006-01-312000-06-1622789653GreatEntriq IncMih Technology Holdings Bv
US8307455B20.904Decryption-key distribution method and authentication apparatusGRANT2012-11-062005-06-0637510375GreatHitachi LtdHitachi Ltd
US8006280B10.902Security system for generating keys from access rules in a decentralized manner and methods thereforGRANT2011-08-232001-12-1244455544GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US7356687B20.891Association of security parameters for a collection of related streaming protocolsGRANT2008-04-082002-05-2129548656GreatGeneral Instrument CorpGoogle Technology Holdings LLC
US9342701B10.891Digital rights management system and methods for provisioning content to an intelligent storageGRANT2016-05-172012-04-1049292314GreatWestern Digital Technologies IncWestern Digital Technologies Inc
US20020194492A10.889Method of protecting and managing digital contents and system for using thereofAPPLICATION2002-12-192001-04-3019708931GreatMarkany IncMarkany Inc
EP1335266A10.888Distribution and management process and system for mobile terminals for use rights associated with a purchased content.GRANT2003-08-132002-02-1227589322GreatVodafone Group PLCVodafone Group PLC
US20130283051A10.886Persistent License for Stored ContentAPPLICATION2013-10-242004-02-1934861071GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US20030093694A10.877Key management protocol and authentication system for secure internet protocol rights management architectureAPPLICATION2003-05-152001-11-1526785560GreatGeneral Instrument CorpGoogle Technology Holdings LLC
US8549606B20.876Device for protecting digital content  device for processing protected digital content  method for protecting digital content  method for processing protected digital content  storage medium storing program for protecting digital content  and storage medium storing program for processing protected digital contentGRANT2013-10-012005-06-0137484124GreatFuji Xerox Co LtdFujifilm Business Innovation Corp
US10432394B20.875Method and system for sharing encrypted contentGRANT2019-10-012010-03-0944562739GreatKL DATA SECURITY Pty LtdKL DATA SECURITY Pty Ltd
US9892239B20.874Digital rights management for HTTP-based media streamingGRANT2018-02-132013-01-2951224362GreatMobiTv IncTivo Corp
US8707034B10.870Method and system for using remote headers to secure electronic filesGRANT2014-04-222003-05-3050482002GreatIntellectual Ventures I LLCIntellectual Ventures I LLC
US9424400B10.865Digital rights management system transfer of content and distributionGRANT2016-08-232012-04-1049293254GreatWestern Digital Technologies IncWestern Digital Technologies Inc
EP3846104A10.863PROVIDING IDENTIFICATION INFORMATION TO MOBILE COMMERCE APPLICATIONSGRANT2021-07-072013-10-1452810519GreatEquifax IncEquifax Inc
US20030200176A10.861Method  system and program product for attaching a title key to encrypted content for synchronized transmission to a recipientAPPLICATION2003-10-232002-04-1829214668GreatInternational Business Machines CorpInternational Business Machines Corp
US7356143B20.860System  method  and apparatus for securely providing content viewable on a secure deviceGRANT2008-04-082003-03-1838459709GreatWidevine Technologies IncGoogle LLC
US20120130900A10.857System and Method for Trading Unused Digital RightsAPPLICATION2012-05-242010-11-1944993912GreatGeneral Instrument CorpGoogle Technology Holdings LLC
US7065216B10.856Methods and systems of protecting digital contentGRANT2006-06-201999-08-1336586492GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US20090036099A10.855Content providing method and systemAPPLICATION2009-02-052007-07-2540338634GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US6385596B10.852Secure online music distribution systemGRANT2002-05-071998-02-0621796331GreatLiquid Audio IncMicrosoft Technology Licensing LLC
US9450763B20.849Server-side key generationGRANT2016-09-202006-06-0638972754GreatRed Hat IncRed Hat Inc
US7921288B10.848System and method for providing different levels of key security for controlling access to secured itemsGRANT2011-04-052001-12-1243805941GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US20060229992A10.846Securely relaying content using key chainsAPPLICATION2006-10-122005-03-2537084240GreatWidevine Technologies IncGoogle LLC
EP1326157A20.845Method and apparatus for securing digital assetsGRANT2003-07-092001-12-1227372550GreatPervasive Security Systems IncPervasive Security Systems Inc
US10360545B20.842Method and apparatus for accessing secured electronic data off-lineGRANT2019-07-232001-12-1226756098GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US8091137B20.838Transferring a data object between devicesGRANT2012-01-032006-10-3139332003GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
US8619994B20.837System and method for providing digital contents serviceGRANT2013-12-312008-11-2742012418GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US7315950B10.831Method of securely sharing information over public networks using untrusted service providers and tightly controlling client accessibilityGRANT2008-01-011999-12-2038870568GreatInternational Business Machines CorpGoogle LLC
US7971261B20.826Domain management for digital mediaGRANT2011-06-282007-06-1240133358GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US8065713B10.826System and method for providing multi-location access management to secured itemsGRANT2011-11-222001-12-1244936937GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US20050273629A10.825System  method and computer program product for providing digital rights management of protected contentAPPLICATION2005-12-082004-06-0434971055GreatVitalsource TechnologyVITALSOURCE TECHNOLOGIES Inc, Vitalsource Technology
US7549063B20.825Methods and systems of protecting digital contentGRANT2009-06-161999-08-1322528833GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US20030063750A10.823Unique on-line provisioning of user terminals allowing user authenticationAPPLICATION2003-04-032001-09-2625511576GreatGeneral Instrument CorpArris Technology Inc, Google Technology Holdings LLC
US7681034B10.822Method and apparatus for securing electronic dataGRANT2010-03-162001-12-1226756315GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US10621518B20.821Interoperable keychestGRANT2020-04-142009-07-1043428236GreatDisney Enterprises IncDisney Enterprises Inc
US9184917B20.820Method and system for registering a DRM clientGRANT2015-11-102011-05-2747220075GreatGoogle Technology Holdings LLCGoogle Technology Holdings LLC
US7783765B20.820System and method for providing distributed access control to secured documentsGRANT2010-08-242001-12-1226757753GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US8543827B20.818Methods and systems for providing access control to secured dataGRANT2013-09-242001-12-1226756071GreatIntellectual Ventures I LLCIntellectual Ventures I LLC
US20100125736A10.816METHOD AND SYSTEM FOR SHARING CONTENTS WITH REMOVABLE STORAGEAPPLICATION2010-05-202007-06-2840186154GreatKT CorpKT Corp
US7711647B20.816Digital rights management in a distributed networkGRANT2010-05-042004-06-1035461685GreatAkamai Technologies IncAkamai Technologies Inc
US6775655B10.814Rendering digital content in an encrypted rights-protected formGRANT2004-08-101999-03-2726824864GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US7729995B10.813Managing secured files in designated locationsGRANT2010-06-012001-12-1226757862GreatGuardian Data Storage LLCSeceretseal Inc, Intellectual Ventures I LLC, Seceretseal Inc
US20050209972A10.812System and method for digital rights management of electronic contentAPPLICATION2005-09-222004-03-2234960795GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US7921464B20.811Method of downloading contents and system thereofGRANT2011-04-052004-06-2136643859GreatLG Electronics IncLG Electronics Inc
US9973798B20.811Technique for securely communicating programming contentGRANT2018-05-152004-07-2036578597GreatComcast Cable Communications LLC, Time Warner Cable Enterprises LLCComcast Cable Communications LLC, Time Warner Cable Enterprises LLC
US7536016B20.810Encrypted content data structure package and generation thereofGRANT2009-05-192004-12-1736597776GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US8595139B20.808Content distribution program  content distribution method  server  content utilization apparatus  and content utilization systemGRANT2013-11-262004-09-2436089921GreatFujitsu LtdFujitsu Ltd
US7756271B20.806Scalable layered access control for multimediaGRANT2010-07-132004-06-1535460540GreatMicrosoft CorpMicrosoft Technology Licensing LLC
WO2014196966A10.806TECHNOLOGIES FOR HARDENING THE SECURITY OF DIGITAL INFORMATION ON CLIENT PLATFORMSAPPLICATION2014-12-112013-06-0452008454Great
US7685643B20.805System and method for managing multimedia contents in intranetGRANT2010-03-232003-01-2432822590GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US9633183B20.804Modular software protectionGRANT2017-04-252009-06-1943086520GreatUniloc Luxembourg SAAtreus Labs LLC
US20100275023A10.803TRANSMITTER  RECEIVER  AND CONTENT TRANSMITTING AND RECEIVING METHODAPPLICATION2010-10-282009-04-2442993165GreatToshiba CorpToshiba Corp
US7844821B20.799System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage stateGRANT2010-11-302001-10-1825529307GreatNokia OyjNokia Oyj
US20020107806A10.798Content usage management system and content usage management methodAPPLICATION2002-08-082001-02-0218891968GreatMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US9031876B20.797Managing keys for encrypted shared documentsGRANT2015-05-122009-06-1943355474GreatHewlett Packard Development Co LPValtrus Innovations Ltd, Hewlett Packard Enterprise Development LP
US5673316A0.796Creation and distribution of cryptographic envelopeGRANT1997-09-301996-03-2924506266GreatInternational Business Machines CorpInternational Business Machines Corp
US9542563B20.796Accessing protected content for archivingGRANT2017-01-102013-10-2452997032GreatGlobalFoundries IncGlobalFoundries Inc
US8224751B20.789Device-independent management of cryptographic informationGRANT2012-07-172006-05-0338330785GreatApple IncApple Inc
WO2001078285A10.789SYSTEM AND METHOD FOR CONTROLLING AND ENFORCING ACCESS RIGHTS TO ENCRYPTED MEDIAAPPLICATION2001-10-182000-04-0622720289Great
US6226618B10.789Electronic content delivery systemGRANT2001-05-011998-08-1322458995GreatInternational Business Machines CorpLevel 3 Communications LLC
US8452016B20.788Interoperable keychest for use by service providersGRANT2013-05-282009-07-1043428356GreatDisney Enterprises IncDisney Enterprises Inc
EP1026854A20.787Method and system for analyzing the content of encrypted electronic dataGRANT2000-08-091998-12-2210844813GreatClearswift LtdClearswift Ltd, Content Technologies Ltd
US7010808B10.787Binding digital content to a portable storage device or the like in a digital rights management (DRM) systemGRANT2006-03-072000-08-2535966437GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US7995758B10.782Family of encryption keysGRANT2011-08-092004-11-3044350816GreatAdobe Systems IncAdobe Inc
EP1777639A10.780Use of media storage structure with multiple pieces of content in a content-distribution systemGRANT2007-04-252005-10-1137668179GreatApple Computer IncApple Inc
US9325505B20.780Apparatus and method for content encryption and decryption based on storage device IDGRANT2016-04-262012-05-1748790537GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US7921284B10.780Method and system for protecting electronic data in enterprise environmentGRANT2011-04-052001-12-1243805940GreatGuardian Data Storage LLCIntellectual Ventures I LLC, PERVASIVE SECURITY SYSTEM Inc
US10313312B20.779Key rotation techniquesGRANT2019-06-042013-06-1358360159GreatAmazon Technologies IncAmazon Technologies Inc
US9058497B20.777Cryptographic key managementGRANT2015-06-162010-12-2346415872GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8755526B20.777Universal file packager for use with an interoperable keychestGRANT2014-06-172009-07-1043427483GreatDisney Enterprises IncDisney Enterprises Inc
US8892902B20.776Information processing apparatus and information processing methodGRANT2014-11-182009-01-0942316468GreatToshiba CorpToshiba Corp
US20070179898A10.776Secure consumer distribution of content using subkeys for encryption and authenticationAPPLICATION2007-08-022006-02-0238323283GreatGeneral Instrument CorpGoogle Technology Holdings LLC
EP1452941A20.775Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) systemGRANT2004-09-012003-02-1132771395GreatMicrosoft CorpMicrosoft Corp
US20050071280A10.775System and method for federated rights managementAPPLICATION2005-03-312003-09-2534376131GreatConvergys Information Management Group IncNetcracker Technology Solutions Inc
US9177114B20.775Method and apparatus for determining the proximity of a client deviceGRANT2015-11-032005-10-0438862959GreatGoogle Technology Holdings LLCGoogle Technology Holdings LLC
US20140281576A10.774INFORMATION PROVIDING SYSTEM  INFORMATION PROCESSING APPARATUS  COMPUTER READABLE MEDIUM  AND INFORMATION PROVIDING METHODAPPLICATION2014-09-182013-03-1251534092GreatFuji Xerox Co LtdFujifilm Business Innovation Corp
US20050265555A10.772Integrity protection of streamed contentAPPLICATION2005-12-012004-05-1235320370GreatNokia OyjNokia Technologies Oy
US20080089516A10.771Method and apparatus for providing secure internet protocol media servicesAPPLICATION2008-04-172006-10-1339303131GreatSYPHERMEDIA INTERNATIONAL IncRambus Inc
US20020029199A10.770Information providing apparatus and method  information processing apparatus and method  and program storage mediumAPPLICATION2002-03-072000-03-1418589191GreatSony CorpSony Corp
US7073063B20.770Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the likeGRANT2006-07-041999-03-2725399856GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US9369464B20.769Scalable authentication systemGRANT2016-06-142012-03-0946026295GreatDistributed Management Systems LtdDistributed Management Systems Ltd
US8763156B20.768Digital receipt for use with an interoperable keychestGRANT2014-06-242009-07-1043428472GreatDisney Enterprises IncDisney Enterprises Inc
US20030079133A10.768Method and system for digital rights management in content distribution applicationAPPLICATION2003-04-242001-10-1825528935GreatInternational Business Machines CorpInternational Business Machines Corp
US20030059053A10.767Key management interface to multiple and simultaneous protocolsAPPLICATION2003-03-272001-09-2646204531GreatArris Technology IncArris Technology Inc, Google Technology Holdings LLC
US8677152B20.766Method and apparatus for encrypting media programs for later purchase and viewingGRANT2014-03-182001-09-2125503693GreatDirecTV Group IncDirecTV LLC
US8256007B20.766Data security management system and methodsGRANT2012-08-282008-03-2541118934GreatNorthrop Grumman Systems CorpNorthrop Grumman Systems Corp
US8713315B20.764Content distribution system  mobile communication terminal device  and computer readable mediumGRANT2014-04-292011-01-2646545045GreatFuji Xerox Co LtdFujifilm Business Innovation Corp
US8184811B10.762Mobile telephony content protectionGRANT2012-05-222005-10-1246061307GreatSprint Spectrum LLCSprint Spectrum LLC
US9288052B20.762Method and apparatus to provide an authoring tool to create content for a secure content serviceGRANT2016-03-152006-04-1338610079GreatMoreover Acquisition CorpMoreover Acquisition Corp
US7110985B20.762Content revocation and license modification in a digital rights management (DRM) system on a computing deviceGRANT2006-09-192002-03-2628452836GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US20040179691A10.761Data reproduction apparatus capable of safely controlling reproduction time of encrypted content data and data reproduction circuit and data recording apparatus used for the sameAPPLICATION2004-09-162001-07-0219038031GreatFujitsu Ltd, Hitachi Ltd, Sanyo Electric Co LtdFujitsu Ltd, Maxell Holdings Ltd, Sanyo Electric Co Ltd, Maxell Ltd
US9565472B20.760Apparatus and methods for content transfer protectionGRANT2017-02-072012-12-1050882340GreatTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US6999948B10.758Memory cardGRANT2006-02-141999-08-1026527154GreatFujitsu Ltd, Hitachi Ltd, Nippon Columbia Co Ltd, Sanyo Electric Co LtdRenesas Technology Corp, Fujitsu Ltd, Nippon Columbia Co Ltd, Sanyo Electric Co Ltd
EP1528455A10.758Offline access in a document control systemGRANT2005-05-042003-10-3134423435GreatAdobe Systems IncAdobe Inc
US20080162354A10.756METHOD FOR DETERMINING THE PRICE OF SUPERDISTRIBUTED RECORDINGSAPPLICATION2008-07-032006-12-2939148623GreatNokia OyjNokia Oyj
US10498530B20.755Secure PKI communications for “machine-to-machine” modules  including key derivation by modules and authenticating public keysGRANT2019-12-032013-09-2765810375GreatNetwork 1 Technologies IncJohn A Nix, Network 1 Technologies Inc
US20020077985A10.754Controlling and managing digital assetsAPPLICATION2002-06-202000-07-1427499104GreatAtabok Japan IncAtabok Japan Inc
US20050004873A10.753Distribution and rights management of digital contentAPPLICATION2005-01-062003-02-0332853387GreatTENNESSEE PACIFIC GROUP LLCPAN ASSET ACQUISITION LLC
US7958544B20.752Device authenticationGRANT2011-06-072006-07-2138957687GreatGoogle LLCGoogle LLC
US20050216763A10.752Method and apparatus for playing back content based on digital rights management between portable storage and device  and portable storage for the sameAPPLICATION2005-09-292004-03-2937276269GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US9166783B20.752Protection method  decryption method  player  storage medium  and encryption apparatus of digital contentGRANT2015-10-202010-10-1445938118GreatToshiba CorpToshiba Corp
US20050117746A10.752Systems and methods for compression of key sets having multiple keysAPPLICATION2005-06-021999-08-1334315922GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US9311492B20.751Media storage structures for storing content  devices for using such structures  systems for distributing such structuresGRANT2016-04-122007-05-2250234611GreatApple IncApple Inc
US7224805B20.751Consumption of contentGRANT2007-05-292001-07-0627256210GreatNokia OyjNokia Oyj
US20080092240A10.751Method and system for secure distribution of selected content to be protected on an appliance specific basisAPPLICATION2008-04-172006-10-1139304566GreatOL Security LLCOL Security LLC
US20070143216A10.750Data Signal with a Database and a Compressed KeyAPPLICATION2007-06-212005-12-1638174907GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7448080B20.750Method for implementing secure corporate communicationGRANT2008-11-042003-06-3033435363GreatNokia IncWSOU Investments LLC
US8266674B20.750Method and system for implementing changes to security policies in a distributed security systemGRANT2012-09-112001-12-1240872738GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US8978154B20.749Method and apparatus for importing content having plurality of partsGRANT2015-03-102006-02-1546045604GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US7039615B10.748Retail transactions involving digital content in a digital rights management (DRM) systemGRANT2006-05-022000-09-2836216197GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US8229116B20.747Information processing apparatus and method and programGRANT2012-07-242006-05-2638749541GreatSony CorpSony Corp
US20040168184A10.746Multiple content provider user interfaceAPPLICATION2004-08-262002-12-0432469593GreatIrdeto USA IncIrdeto USA Inc
US9559840B20.746Low-bandwidth time-embargoed content disclosureGRANT2017-01-312013-10-1852826180GreatGlobalFoundries IncGlobalFoundries Inc
US20070156601A10.745Method and system for providing interoperability between digital rights management systemsAPPLICATION2007-07-052006-01-0337806950GreatInternational Business Machines CorpInternational Business Machines Corp
WO2012075654A10.745PRODUCTION MANAGEMENT METHOD FOR DIGITAL RIGHTS MANAGEMENT (DRM) KEY OF BLU-RAY DVD PLAYERAPPLICATION2012-06-142010-12-1044033679Great
US10467422B10.745Automatic key rotationGRANT2019-11-052013-02-1268392059GreatAmazon Technologies IncAmazon Technologies Inc
US10666436B20.745Federated key managementGRANT2020-05-262013-02-1251298337GreatAmazon Technologies IncAmazon Technologies Inc
US7627892B20.743Multiple methods for transacting  publishing and purchasing copyrighted digital contentGRANT2009-12-012004-12-2436613336GreatIndustrial Technology Research Institute ITRIIndustrial Technology Research Institute ITRI
US20090290711A10.742Method  Apparatus and System for Secure Distribution of ContentAPPLICATION2009-11-262006-07-2438127556Great
US8612749B20.741Medical device rights and recall management systemGRANT2013-12-172008-05-0841267841GreatHealth Hero Network IncRobert Bosch Healthcare Systems Inc
US6873975B10.741Content usage control system  content usage apparatus  computer readable recording medium with program recorded for computer to execute usage methodGRANT2005-03-291999-04-0614248539GreatFujitsu LtdFujitsu Ltd
US20100064378A10.741METHOD AND APPARATUS FOR MANAGING DIGITAL RIGHTS MANAGEMENT MODULEAPPLICATION2010-03-112008-09-0541800307GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US7181017B10.741System and method for secure three-party communicationsGRANT2007-02-202001-03-2343416589GreatFELSHER DAVID P MRRPX Corp
US9430664B20.741Data protection for organizations on computing devicesGRANT2016-08-302013-05-2049293909GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20090007240A10.740Systems and methods for conditional access and digital rights managementAPPLICATION2009-01-012007-06-2639791343GreatDigital Keystone IncDigital Keystone Inc
US7930756B10.740Multi-level cryptographic transformations for securing digital assetsGRANT2011-04-192001-12-1243858766GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US8613102B20.739Method and system for providing document retention using cryptographyGRANT2013-12-172004-03-3035055759GreatIntellectual Ventures I LLCCitrix Systems Inc
US10210341B20.738Delayed data accessGRANT2019-02-192013-02-1251298338GreatAmazon Technologies IncAmazon Technologies Inc
US10460081B20.738Method and apparatus for portably binding license rights to content stored on optical mediaGRANT2019-10-292013-11-0553042045GreatFox Broadcasting Co LLCDisney Enterprises Inc
US9608811B20.738Managing access to a secure digital documentGRANT2017-03-282010-11-1846065517GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
US7809945B20.737Examination apparatus  communication system  examination method  computer-executable program product  and computer-readable recording mediumGRANT2010-10-052004-07-2035785386GreatRicoh Co LtdRicoh Co Ltd
US20040125957A10.736Method and system for secure distributionAPPLICATION2004-07-012000-04-1132659123GreatDIGITAL MEDIA ON DEMAND IncDIGITAL MEDIA ON DEMAND Inc
US9436804B20.736Establishing a unique session key using a hardware functionality scanGRANT2016-09-062005-04-2237855119GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9240883B20.736Multi-key cryptography for encrypting file system accelerationGRANT2016-01-192008-09-0448290706GreatIntel CorpIntel Corp
US20040071293A10.735Encryption apparatus  decryption apparatus and encryption systemAPPLICATION2004-04-152002-10-0932064137GreatMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US8775319B20.735Secure content transfer systems and methods to operate the sameGRANT2014-07-082006-05-1538686299GreatDirecTV Group IncDirecTV LLC
US20020166056A10.734Hopscotch ticketingAPPLICATION2002-11-072001-05-0426834696GreatQUANTUM DIGITAL SOLUTIONS IncQUANTUM DIGITAL SOLUTIONS Inc
US20080040283A10.734CONTENT PROTECTION SYSTEM AND METHOD FOR ENABLING SECURE SHARING OF COPY-PROTECTED CONTENTAPPLICATION2008-02-142006-08-1139052037GreatArcadyan Technology CorpArcadyan Technology Corp
US7937753B20.733Method and apparatus for distributed information managementGRANT2011-05-032005-03-2536283207GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US10404670B20.732Data security serviceGRANT2019-09-032013-02-1251298333GreatAmazon Technologies IncAmazon Technologies Inc
US8347098B20.730Media storage structures for storing content  devices for using such structures  systems for distributing such structuresGRANT2013-01-012007-05-2239651117GreatApple IncApple Inc
US6289450B10.730Information security architecture for encrypting documents for remote access while maintaining access controlGRANT2001-09-111999-05-2823252254GreatAuthentica IncEMC Corp
US11036869B20.730Data security with a security moduleGRANT2021-06-152013-02-1256100576GreatAmazon Technologies IncAmazon Technologies Inc
US8621200B20.730Key delivery method and apparatus in a communications systemGRANT2013-12-312005-02-1434356184GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US20060021065A10.729Method and device for authorizing content operationsAPPLICATION2006-01-262002-10-2232116281GreatKoninklijke Philips Electronics NVKoninklijke Philips NV
US9350714B20.729Data encryption at the client and server levelGRANT2016-05-242013-11-1953174513GreatGlobalFoundries IncGlobalFoundries US Inc
US20070156587A10.728Content Protection Using Encryption Key Embedded with Content FileAPPLICATION2007-07-052000-01-0638225769GreatSuper Talent Electronics IncSuper Talent Electronics Inc
US6438235B20.727Media content protection utilizing public key cryptographyGRANT2002-08-201998-08-0522439636GreatHewlett Packard CoHewlett Packard Development Co LP
US10700856B20.726Key derivation for a module using an embedded universal integrated circuit cardGRANT2020-06-302013-11-1965810195GreatNetwork 1 Technologies IncJohn A Nix, Network 1 Technologies Inc
US9619659B10.726Systems and methods for providing information security using context-based keysGRANT2017-04-112011-06-1454932427GreatIonic Security IncIonic Security Inc
US10211977B10.724Secure management of information using a security moduleGRANT2019-02-192013-02-1265322878GreatAmazon Technologies IncAmazon Technologies Inc
US9369441B20.723End-to-end secure communication systemGRANT2016-06-142013-06-0452008452GreatIntel CorpIntel Corp
US8838681B20.723Systems and methods for adding digital content to content management service accountsGRANT2014-09-162012-12-2150975955GreatDropbox IncDropbox Inc
US8590055B20.722Method and apparatus for importing content having plurality of partsGRANT2013-11-192006-02-1538612151GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US8712045B20.719Digital rights management for media streamsGRANT2014-04-292010-01-0744224705GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US9805374B20.719Content previewGRANT2017-10-312007-04-1239854633GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20060021063A10.718Method for transmission/reception of contents usage right information in encrypted form  and device thereofAPPLICATION2006-01-262004-07-2235658820GreatSanyo Electric Co LtdPanasonic Intellectual Property Corp of America
US8667286B20.716Host device  semiconductor memory device  and authentication methodGRANT2014-03-042012-01-1646651568GreatToshiba CorpKioxia Corp
US7801819B20.716Rendering rights delegation system and methodGRANT2010-09-212003-10-0334421788GreatSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US20070288743A10.715ENABLING STATELESS SERVER-BASED PRE-SHARED SECRETSAPPLICATION2007-12-132004-01-1234739879GreatCisco Technology IncCisco Technology Inc
US8973160B20.713Electronic media distribution systemsGRANT2015-03-032003-10-1634465470GreatPrecisionist Fund II LLCGula Consulting LLC
US7308573B20.712Enrolling / sub-enrolling a digital rights management (DRM) server into a DRM architectureGRANT2007-12-112003-02-2532824717GreatMicrosoft CorpMicrosoft Technology Licensing LLC
WO2001063387A20.712SECURE DISTRIBUTING SERVICES NETWORK SYSTEM AND METHOD THEREOFAPPLICATION2001-08-302000-02-2227391777Great
US20010051996A10.712Network-based content distribution systemAPPLICATION2001-12-132000-02-1827539104GreatVerimatrix France SASVerimatrix France SAS
US8996421B20.711Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systemsGRANT2015-03-312006-05-1538686289GreatDirecTV Group IncDirecTV Group Inc
US20020012432A10.710Secure video card in computing device having digital rights management (DRM) systemAPPLICATION2002-01-311999-03-2725399740GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US8874899B10.710Premium services authenticationGRANT2014-10-282011-01-1351752891GreatSprint Communications Co LPT Mobile Innovations LLC
US8195951B20.710Data processing system for providing authorization keysGRANT2012-06-052008-10-1040459350GreatCompugroup Medical SE and Co KGaACompugroup Medical SE and Co KGaA
WO2009151277A20.710ENCRYPTION KEY DISTRIBUTION METHOD IN MOBILE BROADCASTING SYSTEM AND SYSTEM FOR THE SAMEAPPLICATION2009-12-172008-06-1141417250Great
US8001565B20.709Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systemsGRANT2011-08-162006-05-1538686292GreatDirecTV Group IncDirecTV LLC
US20050207578A10.708Content distribution system  content distribution method  information processing apparatus  and program providing mediumAPPLICATION2005-09-222000-08-3118751918GreatSony CorpSony Corp
US8127366B20.708Method and apparatus for transitioning between states of security policies used to secure electronic documentsGRANT2012-02-282003-09-3034377400GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US20090044241A10.708BROADCASTING CONTENT PROTECTION/MANAGEMENT SYSTEMAPPLICATION2009-02-122005-04-1537087168GreatElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US9990473B20.708Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trustGRANT2018-06-052011-12-0848574728GreatIntel CorpIntel Corp
US7992175B20.707Methods and apparatus to provide content on demand in content broadcast systemsGRANT2011-08-022006-05-1538686578GreatDirecTV Group IncDirecTV LLC
US20130024701A10.706METHOD AND SYSTEM FOR MANAGING AN ENCRYPTION KEY FOR A BROADCASTING SERVICEAPPLICATION2013-01-242010-04-0244712801GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
EP3886418A10.706A COMMUNICATION METHOD AND A COMMUNICATION SYSTEM FOR TAILORED MOBILE COMMUNICATIONGRANT2021-09-292010-11-1943799633GreatSunduka OySunduka Oy
US9124773B20.706Elementary bitstream cryptographic material transport systems and methodsGRANT2015-09-012009-12-0444082023GreatSonic IP IncDivx LLC
US8095466B20.706Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systemsGRANT2012-01-102006-05-1538686290GreatDirecTV Group IncDirecTV LLC
US20080270311A10.703Method and Apparatus for Composing a Digital Rights Management License FormatAPPLICATION2008-10-302007-04-2739888168GreatGeneral Instrument CorpGoogle Technology Holdings LLC
US7565438B10.703Digital rights management integrated service solutionGRANT2009-07-212004-03-3040872709GreatSprint Communications Co LPT Mobile Innovations LLC
US20080195546A10.699MULTILEVEL DISTRIBUTION OF DIGITAL CONTENTAPPLICATION2008-08-142007-02-1238859732GreatSony Ericsson Mobile Communications ABSony Mobile Communications AB
US20050249350A10.697Digital media conditional access system for handling digital media contentAPPLICATION2005-11-102004-05-0435239459GreatDirecTV Group IncDirecTV LLC
US6330670B10.696Digital rights management operating systemGRANT2001-12-111998-10-2626803067GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US10019741B20.695Methods and systems for a personal multimedia content archiveGRANT2018-07-102010-08-0945556835GreatWestern Digital Technologies IncWestern Digital Technologies Inc
US8924731B20.691Secure signing method  secure authentication method and IPTV systemGRANT2014-12-302007-09-1140452703GreatLG Electronics IncLG Electronics Inc
US8176334B20.691Document security system that permits external users to gain access to secured filesGRANT2012-05-082002-09-3032030168GreatGuardian Data Storage LLCIntellectual Ventures I LLC
US20060080259A10.690Method and device for providing access to encrypted content and generating a secure content packageAPPLICATION2006-04-132004-07-3034929402GoodIrdeto Access BVIrdeto BV
US9053482B20.690Service for managing digital content licensesGRANT2015-06-092011-05-2447219877GoodAmazon Technologies IncAmazon Technologies Inc
US7882035B20.690Pre-performing operations for accessing protected contentGRANT2011-02-012008-01-2540900213GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20030233554A10.690Network content access controlAPPLICATION2003-12-182000-04-0911074037GoodVidius IncVidius Inc
US8813243B20.690Reducing a size of a security-related data object stored on a tokenGRANT2014-08-192007-02-0239677184GoodRed Hat IncRed Hat Inc
US7703140B20.690Method and system for securing digital assets using process-driven security policiesGRANT2010-04-202003-09-3034377530GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US8738531B10.689Cryptographic distributed storage system and methodGRANT2014-05-272008-07-0850736599GoodInfoWatchInfoWatch
US20090228450A10.689DIGITAL RIGHT MANAGEMENT CLIENT SYSTEM AND METHOD THEREOF AS WELL AS DIGITAL RIGHT MANAGEMENT SYSTEMAPPLICATION2009-09-102008-03-0440676482GoodSony China LtdSony China Ltd
US9665696B10.689Protecting content with initialization vector manipulationGRANT2017-05-302012-09-0550982240GoodAmazon Technologies IncAmazon Technologies Inc
US20020026424A10.687License issuing device/method and contents reproducing device/methodAPPLICATION2002-02-282000-08-3118750521GoodMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US8472630B20.687Method and system for establishing cryptographic communications between a remote device and a medical deviceGRANT2013-06-252009-11-0641800664GoodRoche Diagnostics International AGRoche Diabetes Care Inc
US7356838B20.686System and method for controlling access to digital content  including streaming mediaGRANT2008-04-082001-06-0634590657GoodYahoo IncVerizon Patent and Licensing Inc
US20030110397A10.685Guaranteed delivery of changes to security policies in a distributed systemAPPLICATION2003-06-122001-12-1227372626GoodPervasive Security Systems IncIntellectual Ventures I LLC
US20050278787A10.684Robust and flexible digital rights management involving a tamper-resistant identity moduleAPPLICATION2005-12-152002-08-1520288742GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US8930575B10.684Service for automatically converting content submissions to submission formats used by content marketplacesGRANT2015-01-062011-03-3052117425GoodAmazon Technologies IncAmazon Technologies Inc
US9118617B10.684Methods and apparatus for adapting the protection level for protected contentGRANT2015-08-252005-12-2353838584GoodEMC CorpEMC Corp
US10362012B20.684Network supporting two-factor authentication for modules with embedded universal integrated circuit cardsGRANT2019-07-232013-11-1953274112GoodNetwork 1 Technologies IncM2M AND IOT TECHNOLOGIES LLC, Network 1 Technologies Inc
US7403618B20.684Conditional accessGRANT2008-07-222000-12-228172557GoodIrdeto Eindhoven BVIrdeto BV
US8364984B20.684Portable secure data filesGRANT2013-01-292009-03-1342731658GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7661128B20.683Secure login credentials for substantially anonymous usersGRANT2010-02-092005-03-3137072187GoodGoogle LLCGoogle LLC
US6363488B10.683Systems and methods for secure transaction management and electronic rights protectionGRANT2002-03-261995-02-1323532729GoodIntertrust Technologies CorpIntertrust Technologies Corp
US20120179909A10.682SYSTEMS AND METHODS FOR PROVIDING INDIVIDUAL ELECTRONIC DOCUMENT SECURE STORAGE  RETRIEVAL AND USEAPPLICATION2012-07-122011-01-0646456146GoodPitney Bowes IncPitney Bowes Inc
US20060072745A10.682Encryption system using device authentication keysAPPLICATION2006-04-062004-10-0135589332Good
US20090122988A10.681METHOD AND APPARATUS FOR SECURELY REGISTERING HARDWARE AND/OR SOFTWARE COMPONENTS IN A COMPUTER SYSTEMAPPLICATION2009-05-142007-11-1340623721GoodSun Microsystems IncOracle America Inc
US7613182B20.681Distributed and secured method and system for protecting and distributing audiovisual flowsGRANT2009-11-032003-08-1134112881GoodQuerell Data LLCOL Security LLC
US20100131760A10.681CONTENT USING SYSTEM AND CONTENT USING METHODAPPLICATION2010-05-272007-04-1139863937GoodNEC CorpNEC Corp
US10528704B20.680Divided rights in authorized domainGRANT2020-01-072002-12-3032668845GoodKoninklijke Philips NVKoninklijke Philips NV
US10033700B20.680Dynamic evaluation of access rightsGRANT2018-07-242001-12-1227372842GoodIntellectual Ventures I LLCIntellectual Ventures I LLC
US7797552B20.680Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoderGRANT2010-09-142001-09-2123262593GoodNDS Group Ltd, DirecTV Group IncNDS Group Ltd, Synamedia Ltd, DirecTV LLC
US20070219921A10.679Apparatus and method for digital rights managementAPPLICATION2007-09-202006-02-2438519105GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US8539543B20.679Managing digital rights for multiple assets in an envelopeGRANT2013-09-172007-04-1239854980GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5892900A0.678Systems and methods for secure transaction management and electronic rights protectionGRANT1999-04-061996-08-3024836636GoodIntertrust Technologies CorpIntertrust Technologies Corp
US20050216419A10.677Method and apparatus for acquiring and removing information regarding digital rights objectsAPPLICATION2005-09-292004-03-2943414739GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20080072296A10.677Method for securing sessions between a wireless terminal and equipment in a networkAPPLICATION2008-03-202006-09-1938171165GoodSociete Francaise du Radiotelephone SFR SASociete Francaise du Radiotelephone SFR SA
US20060227975A10.677Information processor  information processing method  and computer programAPPLICATION2006-10-122005-04-1137077690GoodSony CorpSony Corp
US7774594B20.675Method and system for providing strong security in insecure networksGRANT2010-08-102005-07-2735457848GoodOracle America IncOracle America Inc
EP2702525A20.675METHOD AND APPARATUS FOR PROVIDING DRM SERVICEGRANT2014-03-052011-04-2947072949GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20070265973A10.675Methods and apparatus to protect content in home networksAPPLICATION2007-11-152006-05-1538686295GoodDirecTV Group IncDirecTV Group Inc
US20090183000A10.673Method And System For Dynamically Granting A DRM License Using A URLAPPLICATION2009-07-162008-01-1640851721GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US8644969B20.673Content provisioning and revenue disbursementGRANT2014-02-042003-01-0243450057GoodCatch Media IncCatch Media Inc
US7804958B20.673Super encrypted storage and retrieval of media programs with smartcard generated keysGRANT2010-09-282000-07-2124487332GoodDirecTV Group IncDirecTV Group Inc
US20050223414A10.672Method and system for providing cryptographic document retention with off-line accessAPPLICATION2005-10-062004-03-3035055869GoodPSS Systems IncCitrix Systems Inc
EP1465426A10.672Scalable and error resilient digital rights management (DRM) for scalable mediaGRANT2004-10-062003-04-0132850633GoodMicrosoft CorpMicrosoft Corp
US10824756B20.672Hosted application gateway architecture with multi-level security policy and rule promulgationsGRANT2020-11-032013-09-2067300067GoodOpen Text SA ULCOpen Text SA ULC, Open Text SA
US20130132722A10.672SYSTEM AND METHOD FOR AUTHENTICATING DATAAPPLICATION2013-05-232011-11-2148428098GoodCombined Conditional Access Development and Support LLCCombined Conditional Access Development and Support LLC
US7676846B20.672Binding content to an entityGRANT2010-03-092004-02-1334701402GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20070133795A10.672Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage deviceAPPLICATION2007-06-142000-07-2124490313Good
US9025767B20.671Method and apparatus for querying content protected by identity-based encryptionGRANT2015-05-052010-03-2444656505GoodNokia OyjNokia Technologies Oy
US10055594B20.670Virtual service provider zonesGRANT2018-08-212012-06-0752116871GoodAmazon Technologies IncAmazon Technologies Inc
US9742737B20.670Authenticated time-of-flight indoor positioning systems and methodsGRANT2017-08-222013-09-2552744143GoodIntel CorpIntel Corp
EP1985057A20.669METHOD OF TRANSFERRING DIGITAL RIGHTSGRANT2008-10-292006-02-0338345857GoodMotorola IncMotorola Solutions Inc, Motorola Mobility LLC, Google Technology Holdings LLC
US20120005041A10.669MOBILE CONTENT DISTRIBUTION WITH DIGITAL RIGHTS MANAGEMENTAPPLICATION2012-01-052010-06-3045400411GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US20060188099A10.669Key management system and method for the sameAPPLICATION2006-08-242005-02-2136912741GoodToshiba CorpToshiba Corp
US8108672B10.668Transparent authentication process integrationGRANT2012-01-312003-10-3145508260GoodAdobe Systems IncAdobe Inc
US8644510B20.668Discovery of security associations for key management relying on public keysGRANT2014-02-042011-05-1146124719GoodAlcatel Lucent SASAlcatel Lucent SAS
US8176322B20.668Apparatus and method for moving and copying rights objects between device and portable storage deviceGRANT2012-05-082004-03-2234987731GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US7643478B20.667Secure and personalized broadcasting of audiovisual streams by a hybrid unicast/multicast systemGRANT2010-01-052003-11-2434531389GoodMedialive SANagra France SAS
US5870477A0.667Enciphering/deciphering device and method  and encryption/decryption communication systemGRANT1999-02-091993-09-2926546327GoodPumpkin House IncPumpkin House Inc
US7707427B10.667Multi-level file digestsGRANT2010-04-272004-07-1942112596GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US20150047053A10.667SERVER  TERMINAL  AND TRANSFER METHOD FOR DIGITAL CONTENT UNDER COPYRIGHT PROTECTIONAPPLICATION2015-02-122013-08-0852449817GoodPeking University Founder Group Co Ltd, Founder Apabi Technology LtdPeking University Founder Group Co Ltd, Founder Apabi Technology Ltd
US9325944B20.667Secure delivery of program content via a removable storage mediumGRANT2016-04-262005-08-1137397452GoodDirecTV Group IncDirecTV LLC
WO2006001153A10.667FILE MANAGING PROGRAMAPPLICATION2006-01-052004-06-2935781679Good
US20080065548A10.667Method of Providing Conditional AccessAPPLICATION2008-03-132004-09-1035207621GoodKoninklijke Philips Electronics NVKoninklijke Philips NV
US9923883B20.666Downloadable security and protection methods and apparatusGRANT2018-03-202006-10-2039319439GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US20040158707A10.666Mobile terminal for use restriction and copyright protection for content  and content security system using the sameAPPLICATION2004-08-122003-02-1032822684GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
EP2334008A10.665A system and method for designing secure client-server communication protocols based on certificateless public key infrastructureGRANT2011-06-152009-12-1043797795GoodTata Consultancy Services LtdTata Consultancy Services Ltd
US20070242827A10.665Method and apparatus to provide content containing its own access permissions within a secure content serviceAPPLICATION2007-10-182006-04-1338604858GoodVerisign IncMoreover Acquisition Corp
US20080089517A10.665Method and System for Access Control and Data Protection in Digital Memories  Related Digital Memory and Computer Program Product ThereforAPPLICATION2008-04-172004-12-2234960079GoodTelecom Italia SpATelecom Italia SpA
US8560455B10.663System and method for operating multiple rental domains within a single credit card domainGRANT2013-10-152012-12-1349321584GoodDIGIBOO LLCDIGIBOO LLC
US20080256646A10.662Managing Digital Rights in a Member-Based Domain ArchitectureAPPLICATION2008-10-162007-04-1239855012GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20040168073A10.662Issuing a publisher use license off-line in a digital rights management (DRM) systemAPPLICATION2004-08-262003-02-2532850467GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20040158731A10.662Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) systemAPPLICATION2004-08-122003-02-1132771390GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20100316218A10.662PERSONAL INFORMATION MANAGING DEVICE FOR FALSIFICATION PREVENTION OF PERSONAL INFORMATION AND NON REPUDIATION OF PERSONAL INFORMATION CIRCULATIONAPPLICATION2010-12-162007-02-0639681689GoodNEC CorpNEC Corp
US10075295B20.661Probabilistic key rotationGRANT2018-09-112013-02-1255537612GoodAmazon Technologies IncAmazon Technologies Inc
US20030115147A10.661Secure access method and systemAPPLICATION2003-06-192001-08-2725474197GoodDataPlay Inc, DPHI IncChemtron Research LLC, DataPlay Inc
US10075471B20.659Data loss prevention techniquesGRANT2018-09-112012-06-0752144137GoodAmazon Technologies IncAmazon Technologies Inc
US9647847B20.659Tamper evidence per device protected identityGRANT2017-05-092008-01-1840877381GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7611053B20.658Ticket issuing system  storage medium and electronic ticket issuing and managing methodGRANT2009-11-032006-02-0338335300GoodFuji Xerox Co LtdFujifilm Business Innovation Corp
US8627489B20.657Distributed document version controlGRANT2014-01-072003-10-3134550987GoodAdobe Systems IncAdobe Inc
US8533474B20.657Generating session keysGRANT2013-09-102008-02-2740998320GoodRed Hat IncRed Hat Inc
US9042553B20.657Communicating device and communicating methodGRANT2015-05-262011-03-0346753304GoodToshiba CorpToshiba Corp
US20080052388A10.657Substitutable domain management system and method for substituting the systemAPPLICATION2008-02-282006-08-2839197953GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US9690869B20.656Systems and methods for predictive caching of digital contentGRANT2017-06-272012-12-2751018522GoodDropbox IncDropbox Inc
US7849100B20.655Method and computer-readable medium for generating usage rights for an item based upon access rightsGRANT2010-12-072005-03-0136586047GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7421411B20.655Digital rights management in a mobile communications environmentGRANT2008-09-022001-07-0626789646GoodNokia OyjNokia Technologies Oy
US9065642B20.655Intercepting key sessionsGRANT2015-06-232012-03-0747749682GoodCerticom CorpBlackBerry Ltd
US8560456B20.654System and method for an anonymous exchange of private dataGRANT2013-10-152005-12-0238119925GoodCredigy Tech IncCredigy Tech Inc
US20050210279A10.654Authentication between device and portable storageAPPLICATION2005-09-222004-03-2234987746GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20070265981A10.653METHOD OF TRANSFERING RIGHTS OBJECT AND ELECTRONIC DEVICEAPPLICATION2007-11-152006-05-1239064246GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20120308008A10.653Wireless Transmission of Protected ContentAPPLICATION2012-12-062011-05-3146147262GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US9166778B20.653Secure group messagingGRANT2015-10-202011-07-1546545534GoodAlcatel Lucent SASAlcatel Lucent SAS
WO2008033507A20.650CONTENT SERVER SYSTEMS AND METHODSAPPLICATION2008-03-202006-09-1439184379Good
US7337147B20.650Dynamic digital content licensingGRANT2008-02-262005-06-3037590887GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20130159123A10.650CONTENT ACCESS MANAGEMENT IN A SOCIAL NETWORKING SYSTEM FOR LOCALLY STORED CONTENTAPPLICATION2013-06-202011-12-1648611146GoodFacebook IncMeta Platforms Inc
US9219791B20.650Digital filling station for digital locker contentGRANT2015-12-222012-12-1350932284GoodDIGIBOO LLCDIGIBOO LLC
US20080219436A10.649METHOD AND APPARATUS FOR PROVIDING A DIGITAL RIGHTS MANAGEMENT ENGINEAPPLICATION2008-09-112007-03-0539731969GoodGeneral Instrument CorpArris Enterprises LLC
US11074321B20.649Systems and methods for entitlement managementGRANT2021-07-272013-10-0852778083GoodComcast Cable Communications Management LLCComcast Cable Communications Management LLC
US20030210789A10.648Data transmission linksAPPLICATION2003-11-132002-01-179929256GoodToshiba CorpToshiba Corp
EP2575070A10.647Classification-based digital rights managementGRANT2013-04-032011-09-3045495651GoodTata Consultancy Services LtdTata Consultancy Services Ltd
US20060136339A10.647System and method for protecting unprotected digital contentsAPPLICATION2006-06-222004-11-0936336727GoodLG Electronics IncLG Electronics Inc
US20060120520A10.647Encryption device  encryption processing method and program  and information protection system employing the encryption deviceAPPLICATION2006-06-082004-09-2435788149GoodFuji Xerox Co LtdFujifilm Business Innovation Corp
US20100250388A10.647METHOD AND APPARATUS FOR PROTECTING DRM CONTENTSAPPLICATION2010-09-302009-03-3142785424GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US9363258B20.647Secure digital signature systemGRANT2016-06-072007-12-1740754849GoodInternational Business Machines CorpInternational Business Machines Corp
US9742768B20.646Methods and apparatus for premises content distributionGRANT2017-08-222006-11-0139369145GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US20050100167A10.646System and method for using DRM to control conditional access to broadband digital contentAPPLICATION2005-05-122003-11-1134552370GoodNokia OyjNokia Technologies Oy
USRE41546E10.645Method and system for managing security tiersGRANT2010-08-172001-12-1246150502GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US20070265966A10.645Content delivery systems and methods to operate the sameAPPLICATION2007-11-152006-05-1538686288GoodDirecTV Group IncDirecTV Group Inc
WO1998042098A10.643DIGITAL PRODUCT RIGHTS MANAGEMENT TECHNIQUEAPPLICATION1998-09-241997-03-1425224756Good
US20030172278A10.642Data transmission linksAPPLICATION2003-09-112002-01-179929255GoodToshiba CorpToshiba Corp
US20070180497A10.641Domain manager and domain deviceAPPLICATION2007-08-022004-03-1134961164GoodKoninklijke Philips Electronics NVKoninklijke Philips NV
US20050039034A10.641Security containers for document componentsAPPLICATION2005-02-172003-07-3134135548GoodInternational Business Machines CorpInternational Business Machines Corp
US8254581B20.640Lightweight key distribution and management method for sensor networksGRANT2012-08-282007-05-2240072410GoodIntel CorpIntel Corp
US7899185B20.640Real privacy management authentication systemGRANT2011-03-012006-09-0639157839GoodQwyit LLCQwyit LLC
US9106425B20.640Method and system for restricting execution of virtual applications to a managed process environmentGRANT2015-08-112010-10-2945997982GoodCode Systems CorpCode Systems Corp
US20050097348A10.638Password-based key managementAPPLICATION2005-05-052003-11-0334551284GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10275603B20.637Containerless data for trustworthy computing and data servicesGRANT2019-04-302009-11-1643992326GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20070168293A10.637Method and apparatus for authorizing rights issuers in a content distribution systemAPPLICATION2007-07-192005-06-0237498886GoodGeneral Instrument CorpGoogle Technology Holdings LLC
US7222104B20.637Method and apparatus for transferring usage rights and digital work having transferrable usage rightsGRANT2007-05-222001-05-3125350388GoodContentguard Holdings IncContentguard Holdings Inc
US20090044007A10.636Secure Communication Between a Data Processing Device and a Security ModuleAPPLICATION2009-02-122005-04-0736685943GoodFrance Telecom SAOrange SA
US6236971B10.635System for controlling the distribution and use of digital works using digital ticketsGRANT2001-05-221994-11-2323351914GoodContentguard Holdings Inc, Xerox CorpContentguard Holdings Inc
US20050076210A10.635Method and system for content downloads via an insecure communications channel to devicesAPPLICATION2005-04-072003-10-0334394096GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9235834B20.635Interoperable systems and methods for peer-to-peer service orchestrationGRANT2016-01-122003-06-0534197784GoodIntertrust Technologies CorpIntertrust Technologies Corp
US8140859B10.635Secure storage and replay of media programs using a hard-paired receiver and storage deviceGRANT2012-03-202000-07-2124487588GoodDirecTV Group IncDirecTV LLC
US8843413B20.634Binding content to a domainGRANT2014-09-232004-02-1334701399GoodMicrosoft CorpZhigu Holdings Ltd
US20070022306A10.634Method and apparatus for providing protected digital contentAPPLICATION2007-01-252005-07-2537680406GoodMotorola IncMotorola Solutions Inc
US20100268649A10.633Method and Apparatus for Electronic Ticket ProcessingAPPLICATION2010-10-212009-04-1742732453GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US20030174838A10.632Method and apparatus for user-friendly peer-to-peer distribution of digital rights management protected content and mechanism for detecting illegal content distributorsAPPLICATION2003-09-182002-03-1428039714GoodNokia OyjNokia Oyj
US9998464B20.632Storage device security systemGRANT2018-06-122013-10-2452996805GoodDell Products LPDell Products LP
US7085385B20.631Method and apparatus for initiating strong encryption using existing SSL connection for secure key exchangeGRANT2006-08-012002-01-0421894616GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20190340335A10.631Systems and Methods for Enabling Playback of Digital Content Using Status Associable Electronic Tickets and Ticket Tokens Representing Grant of Access RightsAPPLICATION2019-11-072012-01-0648744543GoodDivx LLCDivx LLC
US10257249B10.631Method and system for communicating content to a client device by pulling content from a publisher from a content delivery network when first requested by the client deviceGRANT2019-04-092013-02-1465998252GoodDirecTV Group IncDirecTV LLC
US20040003139A10.630Secure server plug-in architecture for digital rights management systemsAPPLICATION2004-01-012002-06-2827612990GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20050267845A10.630Apparatus and method for sending and receiving digital rights objects in converted format between device and portable storageAPPLICATION2005-12-012004-05-3135426606GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US10348693B20.629Trustworthy extensible markup language for trustworthy computing and data servicesGRANT2019-07-092009-12-1544144231GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20020159596A10.629Rendering of contentAPPLICATION2002-10-312001-04-3023101112GoodNokia OyjNokia Oyj
US6144743A0.629Information recording medium  recording apparatus  information transmission system  and decryption apparatusGRANT2000-11-071997-02-0712162254GoodToshiba CorpToshiba Corp
US8045709B20.628Digital broadcasting conditional access terminal and methodGRANT2011-10-252005-10-0437666674GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US5715403A0.627System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammarGRANT1998-02-031994-11-2323348787GoodXerox CorpContentguard Holdings Inc
US20020029347A10.627System and method for preventing unauthorized access to electronic dataAPPLICATION2002-03-072000-09-0126923752GoodUniloc 2017 LLCUniloc 2017 LLC
US8165303B10.627Method and apparatus for public key cryptographyGRANT2012-04-242007-05-0345953555GoodAdobe Systems IncAdobe Inc
US7895437B20.626Augmented single factor split key asymmetric cryptography-key generation and distributorGRANT2011-02-222005-05-3137482230GoodVMware IncVMware Inc
US6381696B10.626Method and system for transient key digital time stampsGRANT2002-04-301998-09-2222568846GoodProofspace IncDEVELOPMENT SPECIALISTS Inc
US6460163B10.626Software and method for digital content vending and transportGRANT2002-10-012000-04-0524166938GoodInternational Business Machines CorpLinkedIn Corp
US20090252324A10.625METHOD AND APPARATUS FOR PROVIDING BROADCAST SERVICE USING ENCRYPTION KEY IN A COMMUNICATION SYSTEMAPPLICATION2009-10-082008-04-0441133298GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US9589140B20.625Digital asset authentication system and methodGRANT2017-03-072010-04-0642228934GoodArlington Technology Holdings LtdArlington Technology Holdings Ltd
US8181266B20.625Method for moving a rights object between devices and a method and device for using a content object based on the moving method and deviceGRANT2012-05-152005-01-1336677887GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20040174824A10.623Content distribution systemAPPLICATION2004-09-092002-09-2732046009GoodMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US20080216177A10.623Contents Distribution SystemAPPLICATION2008-09-042005-02-2836940886GoodMitsubishi Electric CorpMitsubishi Electric Corp
US8661266B20.621System and method for secure device key storageGRANT2014-02-252010-04-2145439429GoodCavium LLCCavium International, Marvell Asia Pte Ltd
US7185363B10.621Using a first device to engage in a digital rights management transaction on behalf of a second deviceGRANT2007-02-272002-10-0437769808GoodMicrosoft CorpRovi Technologies Corp
US20030074569A10.620Data backup method and storage medium for use with content reproduction apparatusAPPLICATION2003-04-172001-04-1218964978GoodYamaha CorpYamaha Corp
EP2482243A10.617A payment transaction method and corresponding applicationsGRANT2012-08-012011-01-3143896652GoodAlcatel Lucent SASAlcatel Lucent SAS
US20050022025A10.617Rights enforcement and usage reporting on a client deviceAPPLICATION2005-01-272003-06-3034083302GoodRealNetworks IncIntel Corp
US20090254751A10.616DATA TRANSMISSION APPARATUS  DATA RECEPTION APPARATUS  AND DATA TRANSFER SYSTEMAPPLICATION2009-10-082005-11-1138023330GoodPanasonic CorpGodo Kaisha IP Bridge 1
US20060143134A10.615Method and apparatus for sharing a digital access licenseAPPLICATION2006-06-292004-12-2536612970Good
US7565399B10.614Caching web objects transformed by a pipeline of adaptation servicesGRANT2009-07-212002-08-2640872698GoodNetApp IncNetApp Inc
US20140279128A10.613ACCESSING MEDIA CONTENT IN A MEDIA MANAGEMENT SYSTEMAPPLICATION2014-09-182013-03-1451532367Good
US20060280297A10.613Cipher communication system using device authentication keysAPPLICATION2006-12-142005-05-2637199264Good
US8650393B20.612AuthenticatorGRANT2014-02-112011-11-1146651567GoodToshiba CorpKioxia Corp
US10523432B20.612Power management and security for wireless modules in “machine-to-machine” communicationsGRANT2019-12-312013-09-1052625523GoodNetwork 1 Technologies IncM2M AND IOT TECHNOLOGIES LLC, Network 1 Technologies Inc
US20030233329A10.610System and method for providing subscription content services to mobile devicesAPPLICATION2003-12-182001-12-0623324334GoodAccess Systems Americas IncAccess Co Ltd
US9626667B20.609Digital rights management engine systems and methodsGRANT2017-04-182005-10-1838335187GoodIntertrust Technologies CorpIntertrust Technologies Corp
US9686251B20.609Devices and techniques for controlling disclosure of sensitive informationGRANT2017-06-202013-09-1752669099GoodIGT UK Interactive LtdIGT UK Interactive Ltd
US20120331529A10.609Persistent Key Access To AlbumAPPLICATION2012-12-272011-06-2746489480GoodGoogle LLCGoogle LLC
US7406176B20.608Fully scalable encryption for scalable multimediaGRANT2008-07-292003-04-0132850630GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8447695B20.608System and method for processing feedback entries received from softwareGRANT2013-05-212006-01-0538225768GoodInternational Business Machines CorpInternational Business Machines Corp
US5926624A0.607Digital information library and delivery system with logic for generating files targeted to the playback deviceGRANT1999-07-201996-09-1224852684GoodAudible IncAudible Inc
US20090178070A10.606Content Rental SystemAPPLICATION2009-07-092008-01-0440845635GoodApple IncApple Inc
US20060075455A10.606Digital rights management and payment for a file downloadAPPLICATION2006-04-062004-10-0546322967GoodBellSouth Intellectual Property CorpAT&T Delaware Intellectual Property Inc
US8688583B20.606Digital rights management engine systems and methodsGRANT2014-04-012005-10-1837890788GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5708709A0.605System and method for managing try-and-buy usage of application programsGRANT1998-01-131995-12-0824276928GoodSun Microsystems IncOracle America Inc
US11108827B20.605Application gateway architecture with multi-level security policy and rule promulgationsGRANT2021-08-312013-09-2051609940GoodOpen Text SA ULCOpen Text SA ULC, Open Text SA
US8621218B20.604Method and apparatus for mutual authentication in downloadable conditional access systemGRANT2013-12-312007-12-1040722896GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US9674225B20.603System and method for updating downloaded applications using managed containerGRANT2017-06-062013-09-2052692095GoodOpen Text SA ULCOpen Text SA ULC, Open Text SA
US7023995B20.601Secure location-based services system and methodGRANT2006-04-042000-12-0826943890GoodTelefonaktiebolaget LM Ericsson ABIDTP Holdings Inc
US5933498A0.600System for controlling access and distribution of digital propertyGRANT1999-08-031996-01-1124337542GoodMRJ IncHanger Solutions LLC
US10348700B20.600Verifiable trust for data through wrapper compositionGRANT2019-07-092009-12-1544144239GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7958369B20.599Systems and methods for multiple level control of access of privileges to protected media contentGRANT2011-06-072004-10-2235809594GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US7836310B10.599Security system that uses indirect password-based encryptionGRANT2010-11-162002-11-0143065971GoodInternational Business Machines Corp, Guardian Data Storage LLCInternational Business Machines Corp, Intellectual Ventures I LLC
US8595816B20.599User authentication system and method for the sameGRANT2013-11-262007-10-1940567205GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US20130174272A10.598Digital Content Distribution and ProtectionAPPLICATION2013-07-042011-12-2948696093GoodChegg IncChegg Inc
US6934463B20.598Information processing apparatus  information processing method  information processing system and recording mediumGRANT2005-08-231997-04-2327310657GoodSony CorpSony Corp
US9451217B20.598System and method for providing wireless security surveillance services accessible via a telecommunications deviceGRANT2016-09-202008-07-1641530715GoodCenturyLink Intellectual Property LLCCenturyLink Intellectual Property LLC
US8745223B20.597System and method of distributed license managementGRANT2014-06-032005-10-1437949390GoodPsion IncPsion Inc
US5502766A0.596Data enclave and trusted path systemGRANT1996-03-261992-04-1725355638GoodSecure Computing LLCMcAfee LLC
US8671276B20.595Method for passing selective encrypted attributes of specific versions of objects in a distributed systemGRANT2014-03-112005-10-0437903235GoodInternational Business Machines CorpKyndryl Inc
US20120144200A10.595CONTENT SECURITY TRANSMISSION PROTECTION DEVICE AND SYSTEM THEREOF  AND CONTENT SECURITY TRANSMISSION METHODAPPLICATION2012-06-072009-07-1641372314GoodSichuan Changhong Electric Co LtdSichuan Changhong Electric Co Ltd
US6912275B10.594Secure remote access to voice mailGRANT2005-06-282001-07-0534679500GoodAT&T CorpAT&T Corp
US5515441A0.594Secure communication method and apparatusGRANT1996-05-071994-05-1222911089GoodAT&T CorpAT&T Corp
US10965727B20.594Methods and apparatus for premises content distributionGRANT2021-03-302009-06-0843301504GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
EP2082345B10.593LICENSE SPECIFIC AUTHORIZED DOMAINSGRANT2017-12-132006-10-1239208178GoodKoninklijke Philips NVKoninklijke Philips NV
US10742402B20.593Method and system for key generation  distribution and managementGRANT2020-08-112013-01-3061005587GoodCisco Technology IncCisco Technology Inc
US20090168110A10.593Content Transmitting Apparatus  Content Receiving Apparatus  and Content Transmitting MethodAPPLICATION2009-07-022007-12-2740214545GoodToshiba CorpToshiba Corp
US8443206B20.593Method and apparatus for managing digital rights using portable storage deviceGRANT2013-05-142003-10-2237241734GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US8656507B20.592Apparatus  system and computer readable medium for transmitting electronic information in response to a determination that changed access right information satifies a stored conditionGRANT2014-02-182007-09-0340409701GoodFuji Xerox Co LtdFujifilm Business Innovation Corp
US11076203B20.591Methods and apparatus for providing and uploading content to personalized network storageGRANT2021-07-272013-03-1251534918GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US9071574B10.590Access and control system for network-enabled devicesGRANT2015-06-301999-12-0232324406GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US7581255B20.590Systems and methods for licensing one or more data streams from an encoded digital media fileGRANT2009-08-252003-01-2132712717GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20040153642A10.589Encryption based security system for network storageAPPLICATION2004-08-052002-05-1432772174GoodDecru IncNetApp Inc
US20070211896A10.588ENCRYPTION AND DECRYPTION PROGRAMS AND CRYPTOSYSTEMAPPLICATION2007-09-132004-08-3135999998GoodAzbil CorpAzbil Corp
US20120233019A10.587METHOD AND APPARATUS FOR MANAGING CONTENT TO BE SHARED AMONG DEVICESAPPLICATION2012-09-132011-03-0846796948GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US9444861B20.586Predictive caching for contentGRANT2016-09-132012-08-2350149013GoodAmazon Technologies IncAmazon Technologies Inc
US8769288B20.586Discovery of security associationsGRANT2014-07-012011-04-2247022190GoodAlcatel Lucent SASAlcatel Lucent SAS
US8233626B20.586Storage system and storage system management methodGRANT2012-07-312007-10-1240534211GoodHitachi LtdHitachi Ltd
US20070150735A10.586Encrypted communication system and communication deviceAPPLICATION2007-06-282003-10-1634463187GoodMatsushita Electric Industrial Co LtdIntertrust Technologies Corp
US9589110B20.585Information security systems and methodsGRANT2017-03-072011-04-1146967175GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7634084B20.585Prime calculation device  method  and key issuing systemGRANT2009-12-152003-12-2634743474GoodPanasonic CorpPanasonic Corp
US9129125B20.583Data sharing method and deviceGRANT2015-09-082013-01-3051224360GoodHuawei Device Co LtdHuawei Device Co Ltd
US20130091545A10.583DELIVERY OF CUSTOMIZED CONTENT FOR UNIQUELY IDENTIFIED MEMORY DEVICESAPPLICATION2013-04-112011-10-1048042985GoodSony Corp, Sony DADC US IncSony Corp, Sony DADC US Inc
US9674224B20.581Apparatus and methods for provisioning in a download-enabled systemGRANT2017-06-062007-01-2439642411GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US8489673B20.581Content set based pre-positioningGRANT2013-07-162009-01-1342123182GoodViasat IncViasat Inc
US8775822B20.581Computer-implemented method and system for protecting a software installation after certificationGRANT2014-07-082007-08-3140387853GoodFlexera Software LLCFlexera Software LLC
US9882850B20.580Systems and methods for controlling email accessGRANT2018-01-302012-12-0650882572GoodAirwatch LLCAirwatch LLC
US20030126086A10.579Methods and apparatus for digital rights managementAPPLICATION2003-07-032001-12-3121903958GoodGeneral Instrument CorpArris Technology Inc
US6542610B20.577Content protection for digital transmission systemsGRANT2003-04-011997-01-3046276175GoodIntel CorpIntel Corp
US7711942B20.576Computer security system and methodGRANT2010-05-042004-09-2335221335GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US6038322A0.575Group key distributionGRANT2000-03-141998-10-2022639522GoodCisco Technology IncCisco Technology Inc
US20070041583A10.575Systems and methods for identity-based encryption and related cryptographic techniquesAPPLICATION2007-02-222001-08-1323209176GoodLeland Stanford Junior University, University of California DavisLeland Stanford Junior University, University of California Davis
US20100037062A10.575SIGNED DIGITAL DOCUMENTSAPPLICATION2010-02-112008-08-1141653998Good
US8898708B20.574Media distribution server that presents interactive media to digital devicesGRANT2014-11-252006-10-0444354684GoodMOBILE TIP LLCQualtrics LLC
WO2006136280A10.573SIM/UICC BASED BROADCAST PROTECTIONAPPLICATION2006-12-282005-06-2336968620Good
US8423473B20.573Systems and methods for game activationGRANT2013-04-162009-06-1943086536GoodUniloc Luxembourg SAUniloc 2017 LLC
US7266684B20.570Internet third-party authentication using electronic ticketsGRANT2007-09-042000-08-0822838106GoodWachovia CorpWells Fargo Bank NA
US10437896B20.569Singular  collective  and automated creation of a media guide for online contentGRANT2019-10-082009-01-0742316810GoodDivx LLCDivx LLC
US7209892B10.569Electronic music/media distribution systemGRANT2007-04-241998-12-2437950880GoodUniversal Music Group IncUniversal Music Group Inc
WO2007008922A20.569SENDER IDENTIFICATION SYSTEM AND METHODAPPLICATION2007-01-182005-07-1237637902Good
US10142108B20.568Copy protection scheme for digital audio and video content authenticated HDCP receiversGRANT2018-11-272013-06-1752020317GoodQUBE CINEMA IncQUBE CINEMA Inc
US8832467B20.568Digital rights management metafile  management protocol and applications thereofGRANT2014-09-092007-05-1640028736GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US8381287B20.567Trusted records using secure exchangeGRANT2013-02-192006-07-1940383409GoodSecure Exchange Solutions LLCSecure Exchange Solutions LLC
US9858561B20.566Method and apparatus for digital rights managementGRANT2018-01-022006-06-2638805723GoodInternational Business Machines CorpInternational Business Machines Corp
US9363481B20.564Protected media pipelineGRANT2016-06-072005-04-2237235970GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US11093623B20.564System and methods for using cipher objects to protect dataGRANT2021-08-172011-12-0955067795GoodSertainty CorpECHARGE2 CORP, Sertainty Corp
US20080289044A10.561Apparatus  system  and method for storing DRM licensesAPPLICATION2008-11-202007-05-1839383448GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20100220977A10.561METHOD AND APPARATUS FOR PROTECTING AGAINST COPYING CONTENTS BY USING WiHD DEVICEAPPLICATION2010-09-022009-02-2742666038GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20100042846A10.560TRUSTED CARD SYSTEM USING SECURE EXCHANGEAPPLICATION2010-02-182008-08-1341669277GoodSecure Exchange Solutions LLCSecure Exchange Solutions LLC
US20100146601A10.560Method for Exercising Digital Rights via a ProxyAPPLICATION2010-06-102008-12-0942232574GoodMotorola IncMotorola Mobility LLC
US9477614B20.559Sector map-based rapid data encryption policy complianceGRANT2016-10-252011-08-3047728295GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8700533B20.557Authenticating licenses for legally-protectable content based on license profiles and content identifiersGRANT2014-04-152003-12-0434633648GoodBlack Duck Software IncSynopsys Inc
US8826449B20.556Data security in a disconnected environmentGRANT2014-09-022007-09-2740509748GoodProtegrity CorpProtegrity Corp
US20030217281A10.556System and method for imposing security on copies of secured itemsAPPLICATION2003-11-202002-05-1429418766GoodSecretSEAL IncIntellectual Ventures I LLC, SecretSEAL Inc
EP0614308A10.555Method and apparatus for controlling access to selected image components in an image storage and retrieval systemGRANT1994-09-071993-03-0521833456GoodEastman Kodak CoEastman Kodak Co
US20050210241A10.555Method and apparatus for digital rights management using certificate revocation listAPPLICATION2005-09-222004-03-2234987726GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US5633933A0.554Method and apparatus for a key-management scheme for internet protocolsGRANT1997-05-271994-06-1022979851GoodSun Microsystems IncSun Microsystems Inc
US9119065B20.553Authentication in secure user plane location (SUPL) systemsGRANT2015-08-252010-11-0645048220GoodQualcomm IncQualcomm Inc
US9749677B20.552Media bridge apparatus and methodsGRANT2017-08-292009-06-0843301705GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US9542536B20.552Sustained data protectionGRANT2017-01-102012-01-1348780950GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8356340B20.552Secure subscriber identity module serviceGRANT2013-01-152009-12-1743663505GoodIntel CorpIntel Corp
US8943553B20.552Information processing apparatus  content management method  and computer-readable non-transitory recording medium encoded with content management programGRANT2015-01-272010-03-1944603473GoodKonica Minolta IncKonica Minolta Inc
US9275233B10.552Generation and use of a modified protected fileGRANT2016-03-012012-12-2155359996GoodEMC CorpEMC Corp
US9754311B20.552Systems and methods for detection of session tampering and fraud preventionGRANT2017-09-052006-03-3138561105Good41st Parameter Inc41st Parameter Inc
US8909922B20.551Systems and methods for playing back alternative streams of protected content protected using common cryptographic informationGRANT2014-12-092011-09-0147754059GoodSonic IP IncDivx LLC
US20180247032A10.550DYNAMIC NETWORK CONSTRUCTIONAPPLICATION2018-08-302013-09-2652692299GoodPearson Education IncPearson Education Inc
US20100211779A10.550Identity Based Authenticated Key Agreement ProtocolAPPLICATION2010-08-192009-02-1742560899GoodAlcatel Lucent USA IncAlcatel Lucent SAS
US20100262837A10.550Systems And Methods For Personal Digital Data Ownership And VaultingAPPLICATION2010-10-142009-04-1442935285GoodPERSONAL BLACKBOX COMPANY LLCPERSONAL BLACKBOX COMPANY LLC
US8108362B20.549Secure content descriptionsGRANT2012-01-312006-02-2836658641GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP1929685A20.549SYSTEM AND METHOD FOR DIGITAL RIGHTS MANAGEMENT USING ADVANCED COPY WITH ISSUE RIGHTS  AND MANAGED COPY TOKENSGRANT2008-06-112005-09-2937906691GoodContentguard Holdings IncContentguard Holdings Inc
US8584206B20.549Method for managing domain using multi domain manager and domain systemGRANT2013-11-122007-02-1639690288GoodLG Electronics IncLG Electronics Inc
US10360567B20.549Method and system for distributing electronic tickets with data integrity checkingGRANT2019-07-232011-03-1152691747GoodBytemark IncBytemark Inc
US8732466B20.549Semiconductor memory deviceGRANT2014-05-202011-12-0246754739GoodToshiba CorpKioxia Corp
US9027161B20.548System  method  and computer-readable recording medium for supporting license acquirementGRANT2015-05-052009-09-1143502929GoodRicoh Co LtdRicoh Co Ltd
US20050187877A10.547Method and apparatus for hierarchical assignment of rights to documents and documents having such rightsAPPLICATION2005-08-252001-05-3125350394GoodContentguard Holdings IncContentguard Holdings Inc
US8761389B20.546MemoryGRANT2014-06-242011-12-0246651565GoodToshiba CorpKioxia Corp
US7254836B20.545Protected media path and refusal response enablerGRANT2007-08-072003-10-2334526913GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP1650893A10.545KEY INFORMATION PROCESSING METHOD  DEVICE THEREOF  AND PROGRAMGRANT2006-04-262003-07-1134198741GoodCanon IncCanon Inc
US20100169646A10.545SECURE AND EFFICIENT DOMAIN KEY DISTRIBUTION FOR DEVICE REGISTRATIONAPPLICATION2010-07-012008-12-2942286343GoodGeneral Instrument CorpGoogle Technology Holdings LLC
US7933874B20.545Maintaining tracking information for electronic documentsGRANT2011-04-262006-11-1439370421GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9201811B20.542Device and authentication method thereforGRANT2015-12-012013-02-1451298339GoodToshiba CorpKioxia Corp
US20030133576A10.541Generation of a common encryption keyAPPLICATION2003-07-172000-10-188172145GoodKoninklijke Philips Electronics NVKoninklijke Philips NV
US20090271615A10.541BRIDGING SYSTEM  BRIDGE  AND BRIDGING METHODAPPLICATION2009-10-292007-11-0740867304GoodMeidensha CorpMeidensha Corp
US9239993B20.541Method and system for distributing electronic tickets with visual displayGRANT2016-01-192011-03-1147175686GoodBytemark IncBytemark Inc
US8812843B20.541Device and authentication method thereforGRANT2014-08-192011-12-0246651566GoodToshiba CorpKioxia Corp
US8627086B20.541Secure loading and storing of data in a data processing deviceGRANT2014-01-072004-10-1139531334GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
WO2008120872A10.540METHOD OF PROVIDING A ENCRYPTED MULTIMEDIA FILE AND A PRE-PLAY KEY TO A MOBILE TERMINALAPPLICATION2008-10-092007-03-2938614630Good
US7552323B20.540System  apparatuses  methods  and computer-readable media using identification data in packet communicationsGRANT2009-06-232002-11-1832296399GoodLiquidware Labs IncLiquidware Labs Inc
US9948629B20.540Systems and methods of sharing information through a tag-based consortiumGRANT2018-04-172009-03-2553786161Good41st Parameter Inc41st Parameter Inc
US9449152B20.540License acquisition scheme indication method and mobile terminal thereforGRANT2016-09-202007-08-1040347520GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20070094736A10.540License management method  information processing apparatus  information processing method  and programAPPLICATION2007-04-262003-11-1434587370GoodSony Corp, Matsushita Electric Industrial Co LtdPanasonic Corp, Sony Corp
US20130163762A10.538RELAY NODE DEVICE AUTHENTICATION MECHANISMAPPLICATION2013-06-272010-09-1344533029GoodNEC CorpNEC Corp
US9147080B20.538System and methods for granular access controlGRANT2015-09-292008-02-0640933094GoodInternational Business Machines CorpInternational Business Machines Corp
US8984294B20.537System of authenticating an individual memory device via reading data including prohibited data and readable dataGRANT2015-03-172013-02-1551352172GoodToshiba CorpKioxia Corp
WO2007058439A10.537METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT AMONG APPARATUSESAPPLICATION2007-05-242005-11-1838048799Good
US7890990B10.537Security system with staging capabilitiesGRANT2011-02-152002-12-2043568693GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US8010803B20.537Methods and apparatus for automated export complianceGRANT2011-08-302006-10-1239283438GoodBlack Duck Software IncSynopsys Inc
US9049176B20.535File sharing via link generationGRANT2015-06-022011-06-2257684564GoodDropbox IncDropbox Inc
US20040059685A10.535IC card and authentication method in electronic ticket distribution systemAPPLICATION2004-03-252002-06-1029561731GoodNTT Docomo IncSAKUMRA KEN, NTT Docomo Inc
WO2012003389A10.534FLOATING AND FIXED TIME MERCHANDISING AND ACCESS CONTROLAPPLICATION2012-01-052010-07-0144533083Good
US6226745B10.534Information sharing system and method with requester dependent sharing and security rulesGRANT2001-05-011997-03-2126717145Good
US8634557B20.534Semiconductor storage deviceGRANT2014-01-212011-12-0246754738GoodToshiba CorpKioxia Corp
US8571535B10.534Method and system for a hosted mobile management service architectureGRANT2013-10-292007-02-1239686284GoodAmazon Technologies IncAmazon Technologies Inc
US9432344B20.533Secure storage and sharing of user objectsGRANT2016-08-302013-03-1551534027GoodLOW GRAVITY INNOVATION IncLOW GRAVITY INNOVATION Inc
US10560772B20.532Apparatus and methods for selective data network accessGRANT2020-02-112013-07-2352390565GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US20080307530A10.532Right object acquisition method and systemAPPLICATION2008-12-112007-06-0940032693GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20060198520A10.531Secure transmission of digital audio signalsAPPLICATION2006-09-072002-12-2032683981Good
US9519399B10.530Providing a visual indication that stored content is associated with a collaboration environmentGRANT2016-12-132006-03-0757483944GoodEMC CorpOpen Text Corp
US7941092B20.530Media distribution server that presents interactive media to a mobile deviceGRANT2011-05-102006-11-2246329553GoodQualtrics LLCQualtrics LLC
US20060143695A10.529Anonymous Spoof resistant authentication and enrollment methodsAPPLICATION2006-06-292004-12-2736613338Good
US7681045B20.528Software algorithm identificationGRANT2010-03-162006-10-1239304389GoodBlack Duck Software IncSynopsys Inc
US11032583B20.527Method and system for improving high availability for live contentGRANT2021-06-082010-08-2270971320GoodQwilt Inc, Qwlt IncQwlt Inc
US7814173B20.526Information-processing system  information-processing apparatus and method  recording medium and programGRANT2010-10-122004-03-2334858389GoodSony CorpSony Corp
US9754119B10.526Containerized security for managed contentGRANT2017-09-052006-03-0759702227GoodEMC CorpEMC Corp
US9813390B20.526Systems and methods for controlling email accessGRANT2017-11-072012-12-0650882339GoodAirwatch LLCAirwatch LLC
US9348864B10.526Managed peer-to-peer applications  systems and methods for distributed data access and storageGRANT2016-05-241999-12-0246303294GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US6282653B10.525Royalty collection method and system for use of copyrighted digital materials on the internetGRANT2001-08-281998-05-1522154806GoodInternational Business Machines CorpAlibaba Group Holding Ltd
US20090119784A10.524OUT OF BAND LICENSE ACQUISITION INCLUDING CONTENT IDENTIFICATIONAPPLICATION2009-05-072007-11-0740589525GoodSony Corp, Sony Corp of AmericaSony Corp, Sony Corp of America
US8654975B20.524Joint encryption of dataGRANT2014-02-182011-04-2946261621GoodInternational Business Machines CorpInternational Business Machines Corp
WO2000031964A10.522A METHOD AND A DEVICE FOR ENCRYPTION OF IMAGESAPPLICATION2000-06-021998-11-2020413358Good
US8205082B20.522Domain upgrade method in digital rights managementGRANT2012-06-192007-11-0840857488GoodLG Electronics IncLG Electronics Inc
US9178693B20.520Distributed media-protection systems and methods to operate the sameGRANT2015-11-032006-08-0439030436GoodDirecTV Group IncDirecTV LLC
US20040003241A10.520Authentication of remotely originating network messagesAPPLICATION2004-01-012002-06-2729778858GoodNokia IncNokia Solutions and Networks Oy
US8099761B20.519Protocol for device to station associationGRANT2012-01-172008-08-1441669559GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20100325735A10.519System and Method for Software ActivationAPPLICATION2010-12-232009-06-2243086516GoodUniloc Luxembourg SAUniloc Luxembourg SA
US20080095370A10.518METHOD FOR SECURELY EXTENDING KEY STREAM TO ENCRYPT HIGH-ENTROPY DATAAPPLICATION2008-04-242006-10-1838825306GoodQualcomm IncQualcomm Inc
US9189605B20.518Protected computing environmentGRANT2015-11-172005-04-2240754843GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9225761B20.518Distributed media-aggregation systems and methods to operate the sameGRANT2015-12-292006-08-0439030689GoodDirecTV Group IncDirecTV LLC
US20080046758A10.517DIGITAL RIGHTS MANAGEMENT USING TRUSTED PROCESSING TECHNIQUESAPPLICATION2008-02-212006-05-0539679410GoodInterDigital Technology CorpInterDigital Technology Corp
US9268933B20.517Privacy brokerGRANT2016-02-232012-08-2250149234GoodMcAfee LLCMcAfee LLC
US20080240433A10.517LIGHTWEIGHT SECURE AUTHENTICATION CHANNELAPPLICATION2008-10-022007-01-2239794403GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20110247077A10.516System and Method for Rights Offering and Granting Using Shared State VariablesAPPLICATION2011-10-062001-05-3125350385GoodContentguard Holdings IncContentguard Holdings Inc
US20050198322A10.516Information-processing method  information-processing apparatus and computer programAPPLICATION2005-09-082004-02-2534747468GoodSony CorpSony Corp
US20130174273A10.514SYSTEMS AND METHODS FOR MANAGING DIGITAL RIGHTS BASED ON A UNION OR INTERSECTION OF INDIVIDUAL RIGHTSAPPLICATION2013-07-042011-12-3048696094GoodUnited Video Properties IncUV CORP, Rovi Guides Inc, TV Guide Inc
US20100323790A10.513Devices and Methods for Auditing and Enforcing Computer Game LicensesAPPLICATION2010-12-232009-06-1943086530Good
US20020194485A10.513Self-protecting documentsAPPLICATION2002-12-191998-10-2322652901GoodContentguard Holdings IncContentguard Holdings Inc
US9344517B20.513Downloading and adaptive streaming of multimedia content to a device with cache assistGRANT2016-05-172013-03-2851621971GoodSonic IP IncDivx LLC
US8463709B20.512Identifying and labeling licensed content in an embedded partitionGRANT2013-06-112006-04-1138576665GoodDell Products LPDell Products LP
US20090300767A10.512METHOD FOR OUT OF BAND LICENSE ACQUISITION ASSOCIATED WITH CONTENT REDISTRIBUTED USING LINK PROTECTIONAPPLICATION2009-12-032008-06-0241381557GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US9104517B20.511System for downloading and executing a virtual applicationGRANT2015-08-112010-01-2744309784GoodCode Systems CorpCode Systems Corp
US9262623B20.511Anonymous shipment brokeringGRANT2016-02-162012-08-2250149252GoodMcAfee LLCMcAfee LLC
US8094037B20.511Method and apparatus for identifying an electronic applianceGRANT2012-01-102007-03-3039793307GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US9210190B10.511Leveraging digital security using intelligent proxiesGRANT2015-12-082012-05-0954708458Good
US8925026B20.511Back office support for a video provisioning systemGRANT2014-12-302010-09-2945872050GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US8331989B20.510Field programming of a mobile station with subscriber identification and related informationGRANT2012-12-112007-06-1540132839GoodIntel CorpApple Inc
US20190230130A10.510SYSTEM AND METHOD FOR UPDATING DOWNLOADED APPLICATIONS USING MANAGED CONTAINERAPPLICATION2019-07-252013-09-2067298857GoodOpen Text SA ULCOpen Text SA ULC, Open Text SA
US20030120940A10.510Location-based content protectionAPPLICATION2003-06-262001-12-2121819483GoodNokia OyjWSOU Investments LLC
US7957534B20.509System and method for security association between communication devices within a wireless home networkGRANT2011-06-072004-08-1341646494GoodTexas Instruments IncTexas Instruments Inc
EP1801720A10.509Authorisation and authenticationGRANT2007-06-272005-12-2236590808GoodMicrosoft CorpMicrosoft Corp
US20040139315A10.508Private data protection distribution method and programAPPLICATION2004-07-152002-10-0932286642GoodFujitsu LtdFujitsu Ltd
US6952836B10.507Method and apparatus for managing the provisioning of client devices connected to an interactive TV networkGRANT2005-10-042000-09-2635005246GoodAT&T CorpComcast Cable Communications LLC
US8918195B20.506Media management and trackingGRANT2014-12-232003-01-0239492841GoodCatch Media IncCatch Media Inc
US8661527B20.506Authenticator  authenticatee and authentication methodGRANT2014-02-252011-08-3147745403GoodToshiba CorpKioxia Corp
US20140351832A10.504ELECTRONIC DEVICE USING FRAMEWORK INTERFACE FOR COMMUNICATIONAPPLICATION2014-11-272013-05-2151936165GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US5892899A0.504Tamper resistant methods and apparatusGRANT1999-04-061996-06-1324658729GoodIntel CorpIntel Corp
US9301093B20.504Methods and apparatus for identifying and authorizing location servers and location servicesGRANT2016-03-292011-02-0751267550GoodQualcomm IncQualcomm Inc
US20090165080A10.504GENERIC RIGHTS TOKEN AND DRM-RELATED SERVICE POINTERS IN A COMMON PROTECTED CONTENT FILEAPPLICATION2009-06-252007-12-2040790292GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20110103374A10.504METHODS AND APPARATUS FOR PACKETIZED CONTENT DELIVERY OVER A CONTENT DELIVERY NETWORKAPPLICATION2011-05-052009-10-3043922598GoodTime Warner Cable IncSpectrum Management Holding Co LLC
US7770220B20.502System and method for securing documents using an attached electronic data storage deviceGRANT2010-08-032005-08-1637831386GoodXerox CorpXerox Corp
US20080134237A10.502AUTOMATICALLY RECONFIGURABLE MULTIMEDIA SYSTEM WITH INTERCHANGEABLE PERSONALITY ADAPTERSAPPLICATION2008-06-052006-08-1839083164GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US9881433B20.500Systems and methods for electronic ticket validation using proximity detectionGRANT2018-01-302011-03-1152690459GoodBytemark IncBytemark Inc
US8874770B20.500Systems and methods for access-controlled interactionsGRANT2014-10-282013-01-0951061857GoodEvernym IncEvernym Inc
US9247317B20.499Content streaming with client device trick play indexGRANT2016-01-262013-05-3051986730GoodSonic IP IncDivx LLC
US20080047006A10.499METHOD FOR REGISTERING RIGHTS ISSUER AND DOMAIN AUTHORITY IN DIGITAL RIGHTS MANAGEMENT AND METHOD FOR IMPLEMENTING SECURE CONTENT EXCHANGE FUNCTIONS USING THE SAMEAPPLICATION2008-02-212006-08-2138826501GoodPantech and Curitel Communications Inc, Pantech Co LtdPantech Co Ltd
US7950066B10.498Method and system for restricting use of a clipboard applicationGRANT2011-05-242001-12-2144022355GoodGuardian Data Storage LLCIntellectual Ventures I LLC
US8307067B20.498Protecting encrypted files transmitted over a networkGRANT2012-11-062002-09-1140474148GoodGuardian Data Storage LLCKioba Processing LLC
US20100205439A10.497METHOD AND TERMINAL FOR RECEIVING RIGHTS OBJECT FOR CONTENT ON BEHALF OF MEMORY CARDAPPLICATION2010-08-122009-01-2942541367GoodLG Electronics IncLG Electronics Inc
EP2618591A10.497Electronic apparatus and content transfer methodGRANT2013-07-242012-01-2046832206GoodToshiba CorpToshiba Corp
US20020018569A10.496Enhanced subscriber authentication protocolAPPLICATION2002-02-141998-12-044163073GoodCerticom CorpBlackBerry Ltd
US9990631B20.496Systems and methods of global identificationGRANT2018-06-052012-11-1450731695Good41st Parameter Inc41st Parameter Inc
US8181261B20.496System and method for controlling reproduction of documents containing sensitive informationGRANT2012-05-152005-05-1336676074GoodXerox CorpXerox Corp
US7778422B20.494Security associations for devicesGRANT2010-08-172004-02-2734750561GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8543606B20.494Method and system for automated security access policy for a document management systemGRANT2013-09-242009-04-0842935156GoodTITUS IncTITUS Inc
US9521551B20.493Methods and systems for persistent cross-application mobile device identificationGRANT2016-12-132012-03-2249223353Good41st Parameter Inc41st Parameter Inc
US20080016239A10.493Automatic method and system for securely transferring filesAPPLICATION2008-01-172005-01-2036692842GoodAirZip IncAirZip Inc
US10009319B20.492Methods  apparatuses and articles for identifying and authorizing location servers and location services using a proxy location serverGRANT2018-06-262011-02-0751267552GoodQualcomm IncQualcomm Inc
EP1189432A20.491A hierarchical encryption scheme for secure distribution of predetermined contentGRANT2002-03-202000-08-1424559405GoodMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US20060253713A10.491Copy protected digital dataAPPLICATION2006-11-092003-11-1934442859GoodSony Deutschland GmbHSony Deutschland GmbH
US7606370B20.490System  method and computer program product for updating security criteria in wireless networksGRANT2009-10-202005-04-0537073920GoodMcAfee LLCMcAfee LLC
US7590856B20.487System for managing license for protecting content  server for issuing license for protecting content  and terminal for using content protected by licenseGRANT2009-09-152003-08-0534113680GoodHitachi LtdHitachi Ltd
US7467202B20.487High-performance network content analysis platformGRANT2008-12-162003-09-1034226847GoodFidelis Security SystemsFidelis Cybersecurity Solutions Inc
US9807147B10.486Program recording webificationGRANT2017-10-311999-12-0227037361GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US8156337B20.486Systems and methods for authenticating communications in a network mediumGRANT2012-04-102002-02-0627610512GoodPalo Alto Research Center IncCisco Technology Inc, Palo Alto Research Center Inc
US8725650B20.484Document template licensingGRANT2014-05-132012-01-2648871106GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7757274B20.484Methods and systems for exchanging security information via peer-to-peer wireless networksGRANT2010-07-132005-04-0537073921GoodMcAfee LLCMcAfee LLC
US20050113070A10.484Mobile terminal authentication method capable of reducing authentication processing time and preventing fraudulent transmission/reception of data through spoofingAPPLICATION2005-05-262003-11-2134587494GoodNEC CorpNEC Corp
US8566960B20.484System and method for adjustable licensing of digital productsGRANT2013-10-222007-11-1740521737GoodUniloc Luxembourg SAUniloc 2017 LLC
US8732086B20.483Method and system for managing rights for digital musicGRANT2014-05-202003-01-0235058367GoodCatch Media IncCatch Media Inc
US6138119A0.482Techniques for defining  using and manipulating rights management data structuresGRANT2000-10-241997-02-2525192553GoodIntertrust Technologies CorpIntertrust Technologies Corp
US8522042B20.482Method and apparatus for enforcement of software licence protectionGRANT2013-08-272006-10-3139529280GoodHewlett Packard Development Co LPValtrus Innovations Ltd, Hewlett Packard Enterprise Development LP
US20100071070A10.482Managing Sharing of Media Content From a Server Computer to One or More of a Plurality of Client Computers Across the Computer NetworkAPPLICATION2010-03-182005-01-0743569155GoodApple IncApple Inc
US20050086531A10.482Method and system for proxy approval of security changes for a file security systemAPPLICATION2005-04-212003-10-2034521588GoodPSS Systems IncIntellectual Ventures I LLC
US20130166456A10.481System and Method for Remote Payment Based on Mobile TerminalAPPLICATION2013-06-272010-09-0743391647GoodZTE CorpZTE Corp
US7761710B20.479Captive portal system and method for use in peer-to-peer networksGRANT2010-07-202005-04-0537073924GoodMcAfee LLCMcAfee LLC
US8959183B20.479System for downloading and executing a virtual applicationGRANT2015-02-172010-01-2744309799GoodCode Systems CorpCode Systems Corp
US6510513B10.478Security services and policy enforcement for electronic dataGRANT2003-01-211999-01-1322861205GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9571280B20.477Application integrity protection via secure interaction and processingGRANT2017-02-142013-06-0451986547GoodIntel CorpIntel Corp
US20090204639A10.477SELECTIVE CONTENT REPLACEMENT FOR MEDIA PLAYERSAPPLICATION2009-08-132008-02-1140939801GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10498582B20.477Related content display associated with browsingGRANT2019-12-032013-06-1451134386GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9230128B20.476Assignment of security contexts to define access permissions for file system objectsGRANT2016-01-052013-03-1351535166GoodProtegrity CorpProtegrity Corp
US20060277092A10.476System and method for a peer to peer exchange of consumer informationAPPLICATION2006-12-072005-06-0337495285GoodCredigy Tech IncCredigy Tech Inc
US9542537B20.475Method and system for confidentially providing software componentsGRANT2017-01-102009-11-0943302512GoodSiemens AGSiemens AG
US8443378B20.474Method and apparatus for associating rules with messages and using the rules for message processingGRANT2013-05-142007-05-3140087496GoodRed Hat IncRed Hat Inc
US7471794B20.473Network lock method and related apparatus with ciphered network lock and inerasable deciphering keyGRANT2008-12-302003-04-0434076071GoodQisda CorpQisda Corp
US8266245B10.472Systems and methods for incremental loading of collaboratively generated presentationsGRANT2012-09-112011-10-1746760770GoodGoogle LLCGoogle LLC
US11282003B20.471Validity determination of an event ticket and automatic population of admission informationGRANT2022-03-222014-01-0853495459GoodStubhub IncStubhub Inc
US7822972B20.471Remotely configurable bridge system and method for use in secure wireless networksGRANT2010-10-262005-04-0537072012GoodMcAfee LLCMcAfee LLC
US9826197B20.470Providing television broadcasts over a managed network and interactive content over an unmanaged network to a client deviceGRANT2017-11-212007-01-1244227163GoodActiveVideo Networks IncActiveVideo Networks Inc
EP0950941A20.468Method of and apparatus for protecting data on storage medium and storage mediumGRANT1999-10-201998-03-1813386452GoodFujitsu LtdFujitsu Ltd
US7797245B20.467Methods and systems for identifying an area of interest in protectable contentGRANT2010-09-142005-03-1836710698GoodBlack Duck Software IncSynopsys Inc
US9450751B20.467Smart card  electronic device  and portable electronic deviceGRANT2016-09-202013-03-0850336060GoodToshiba CorpToshiba Corp
US9967305B20.467Systems  methods  and media for streaming media contentGRANT2018-05-082013-06-2852116734GoodDivx LLCDivx LLC
US7315944B20.467Secure handling of stored-value data objectsGRANT2008-01-012001-11-1321730161GoodEricsson IncEricsson Inc
US20090012805A10.466Portable Digital Rights for Multiple DevicesAPPLICATION2009-01-082007-07-0640222157GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8626931B20.466Media transport protocol extensions for system information exchange  and applications thereofGRANT2014-01-072007-02-0539677079GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US10430388B10.464Systems and methods for incremental loading of collaboratively generated presentationsGRANT2019-10-012011-10-1768063855GoodGoogle LLCGoogle LLC
US20070244965A10.464Negotiated wireless peripheral systemsAPPLICATION2007-10-182000-10-2734623812GoodRPX CorpRPX Corp
US6311269B20.463Trusted services broker for web page fine-grained security labelingGRANT2001-10-301998-06-1522246162GoodLockheed Martin CorpLeidos Innovations Technology Inc.
US9166958B20.462ID-based control unit-key fob pairingGRANT2015-10-202012-07-1749947582GoodTexas Instruments IncTexas Instruments Inc
US7630986B10.461Secure data interchangeGRANT2009-12-081999-10-2741134470GoodPinpoint IncStripe Inc
US10902327B10.461System and method for device identification and uniquenessGRANT2021-01-262013-08-3074191105Good41st Parameter Inc41st Parameter Inc
US8584230B20.461Security authorization queriesGRANT2013-11-122006-09-0839157588GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20040030896A10.459IC card and cryptographic communication method between IC cardsAPPLICATION2004-02-122002-06-1029561735GoodNTT Docomo IncNTT Docomo Inc
US20050239447A10.458Account creation via a mobile deviceAPPLICATION2005-10-272004-04-2734939218GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20100043056A10.458PORTABLE DEVICE ASSOCIATIONAPPLICATION2010-02-182008-08-1441669555GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10225299B20.458Systems  methods  and media for controlling delivery of contentGRANT2019-03-052012-12-3151018538GoodDivx LLCDivx LLC
US10397292B20.457Systems  methods  and media for delivery of contentGRANT2019-08-272013-03-1551533583GoodDivx LLCDivx LLC
US20020152380A10.456Methods and systems for unilateral authentication of messagesAPPLICATION2002-10-172001-04-1225265623GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9202084B20.456Security facility for maintaining health care data poolsGRANT2015-12-012006-02-0149478561GoodNewsILike Media Group IncNewsILike Media Group Inc
US20050138371A10.456Method and system for distribution of notifications in file security systemsAPPLICATION2005-06-232003-12-1934678517GoodPSS Systems IncIntellectual Ventures I LLC
US7680937B20.454Content publicationGRANT2010-03-162005-12-2238195237GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US11122304B20.454Source device  content providing method using the source device  sink device and controlling method of the sink deviceGRANT2021-09-142013-01-2849943251GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US7409550B20.454Method for binding networked devicesGRANT2008-08-052004-08-1635801374GoodMitsubishi Electric Research Laboratories IncMitsubishi Electric Research Laboratories Inc
US9094737B20.453Network video streaming with trick play based on separate trick play filesGRANT2015-07-282013-05-3051986731GoodSonic IP IncDivx LLC
US8683600B20.452Print policy commandsGRANT2014-03-252006-10-1149994598GoodAdobe Systems IncAdobe Inc
US6295359B10.451Method and apparatus for distributing keys to secure devices such as a postage meterGRANT2001-09-251998-05-2122172839GoodPitney Bowes IncPitney Bowes Inc
EP2389659A20.451PERSONAL DATA MANAGER SYSTEMS AND METHODSGRANT2011-11-302009-01-2042396288GoodTitanium Fire LtdTHE TITANIUM FIRE LTD EXECUTIVE PENSION SCHEME, Titanium Fire Ltd
US7603355B20.450Variably controlling access to contentGRANT2009-10-132004-10-0135809914GoodGoogle LLCGoogle LLC
US20090136031A10.449METHOD FOR PROTECTING CONTENT AND METHOD FOR PROCESSING INFORMATIONAPPLICATION2009-05-282007-01-1939636157GoodLG Electronics IncLG Electronics Inc
US20140135115A10.448SYSTEM AND METHOD FOR FACILITATING A VIDEO GAME EXCHANGEAPPLICATION2014-05-152010-01-1344258927GoodGreen Man Gaming LtdGreen Man Gaming Ltd
US9503436B10.444Methods and systems for NAS device pairing and mirroringGRANT2016-11-222012-06-0752782399GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US20050070257A10.443Active ticket with dynamic characteristic such as appearance with various validation optionsAPPLICATION2005-03-312003-09-3034377290GoodNokia OyjNokia Technologies Oy
EP1512286A10.443ENCRYPTED AND WATERMARKED TEMPOREL AND RESOLUTION LAYERING IN ADVANCED TELEVISIONGRANT2005-03-092002-06-1331185972GoodDolby Laboratories Licensing CorpDolby Laboratories Licensing Corp
US10089606B20.443System and method for trusted mobile device paymentGRANT2018-10-022011-02-1146637590GoodBytemark IncBytemark Inc
US20080320605A10.443METHOD AND SYSTEM FOR TRACKING AND MANAGING RIGHTS FOR DIGITAL MUSICAPPLICATION2008-12-252003-01-0237591718GoodCatch Media IncCatch Media Inc
US9021015B20.442Method and system for publishing virtual applications to a web serverGRANT2015-04-282010-10-1845935050GoodCode Systems CorpCode Systems Corp
US8275990B20.442Method for receiving/sending multimedia messagesGRANT2012-09-252004-03-2234963624GoodInternational Business Machines CorpInternational Business Machines Corp
US7480801B20.441Method for securing data traffic in a mobile network environmentGRANT2009-01-202002-01-2427614250GoodSiemens AGSiemens AG
US8510564B20.441Automatic configuration and continuation of federation relationshipsGRANT2013-08-132010-08-0645557069GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8626806B20.440Method and system for managing execution of virtual applicationsGRANT2014-01-072010-07-0245400524GoodCode Systems CorpCode Systems Corp
US5943615A0.440Method and apparatus for providing authentication security in a wireless communication systemGRANT1999-08-241997-01-1525131942GoodQualcomm IncQualcomm Inc
US4200770A0.440Cryptographic apparatus and methodGRANT1980-04-291977-09-0625257633GoodLeland Stanford Junior UniversityLeland Stanford Junior University
US20070242822A10.440SYSTEM  DEVICE  METHOD  AND PROGRAM FOR COMMUNICATIONAPPLICATION2007-10-182006-04-1238370841GoodSony CorpSony Corp
US20020069132A10.440Cross technology monitoring  profiling and predictive caching method and systemAPPLICATION2002-06-062000-12-0122946499GoodLumenati IncLumenati Inc
US9715775B20.438Biological information storing apparatus  biological authentication apparatus  data structure for biological authentication  and biological authentication methodGRANT2017-07-252007-09-2140471655GoodSony CorpSony Corp
US20110093900A10.438GATEWAY APPARATUS AND METHODS FOR DIGITAL CONTENT DELIVERY IN A NETWORKAPPLICATION2011-04-212009-10-2043880281GoodTime Warner Cable IncSpectrum Management Holding Co LLC
US9553787B10.437Monitoring hosted service usageGRANT2017-01-242013-04-2957795047GoodAmazon Technologies IncAmazon Technologies Inc
US20030093695A10.437Secure handling of stored-value data objectsAPPLICATION2003-05-152001-11-1328452372GoodEricsson IncEricsson Inc
US8225378B20.434Auditing authorization decisionsGRANT2012-07-172006-09-0839171303GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20100241529A10.433CONTENT TRANSACTION METHOD AND SYSTEMAPPLICATION2010-09-232009-03-1742738466GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20030051054A10.433Data security system and method adjunct to e-mail  browser or telecom programAPPLICATION2003-03-132000-11-1327485749GoodDigital Doors IncDigital Doors Inc
US9984252B20.433Methods and systems for facilitating personal data propagationGRANT2018-05-292009-01-2042337770GoodTitanium Fire Ltd Executive Pension SchemeTitanium Fire Ltd Executive Pension Scheme
US8763009B20.432Method of hosting a first application in a second applicationGRANT2014-06-242010-04-1744973548GoodCode Systems CorpCode Systems Corp
US6571279B10.432Location enhanced information delivery systemGRANT2003-05-271997-12-0523219499GoodPinpoint IncIREACTOR Inc, Fred Herz Patents LLC
US7571485B10.429Use of database schema for fraud prevention and policy complianceGRANT2009-08-042005-03-3040910280GoodSymantec CorpCA Inc
US20080046471A10.428Calendar Synchronization using Syndicated DataAPPLICATION2008-02-212005-02-0139102607GoodNewsILike Media Group IncNewsILike Media Group Inc
US20040123098A10.426Method and apparatus for use in relation to verifying an association between two partiesAPPLICATION2004-06-242002-07-059939912GoodHewlett Packard Development Co LPValtrus Innovations Ltd
EP0777227A10.423RECORDING MEDIUM  RECORDING DEVICE  REPRODUCING METHOD  AND REPRODUCING DEVICEGRANT1997-06-041995-05-3115634705GoodSony CorpSony Corp
US10278008B20.422Apparatus and methods for enabling location-based services within a premisesGRANT2019-04-302012-08-3050188256GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US20040111694A10.422Method and apparatus for distributing enforceable property rightsAPPLICATION2004-06-102001-01-1746204496GoodContentguard Holdings IncContentguard Holdings Inc
US8132005B20.421Establishment of a trusted relationship between unknown communication partiesGRANT2012-03-062005-07-0737619574GoodNokia OyjRPX Corp, Nokia USA Inc
US8332908B20.420Sharing management system  sharing management method and programGRANT2012-12-112006-06-2238833304GoodNEC CorpNEC Corp
US8528102B20.420Method and system for protection of customer secrets in a secure reprogrammable systemGRANT2013-09-032006-10-0639275972GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US10999298B20.420Method and system for identifying users and detecting fraud by use of the internetGRANT2021-05-042004-03-0243823927Good41st Parameter Inc41st Parameter Inc
US8688978B20.419Method and apparatus for providing an adaptable security level in an electronic communicationGRANT2014-04-012006-04-1338608993GoodCerticom CorpBlackBerry Ltd
US8997161B20.418Application enhancement tracksGRANT2015-03-312008-01-0240798566GoodSonic IP IncDivx LLC
US20130144755A10.417APPLICATION LICENSING AUTHENTICATIONAPPLICATION2013-06-062011-12-0148109640GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10305900B20.417Establishing a secure connection between a master device and a slave deviceGRANT2019-05-282013-10-1549515449GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US7712027B20.416Method for document page delivery to a mobile communication deviceGRANT2010-05-042004-08-3135944695GoodResearch in Motion LtdBlackBerry Ltd
EP0649261A20.416Image data processing and encrypting apparatusGRANT1995-04-191993-10-1817338731GoodCanon IncCanon Inc
US8943193B20.415Unified web hosting and content distribution system and method for assuring predetermined performance levelsGRANT2015-01-272003-12-2341581419GoodMarlow Technologies LLCAT&T Properties LLC, Marlow Technologies LLC
US6006228A0.415Assigning security levels to particular documents on a document by document basis in a databaseGRANT1999-12-211996-12-1125069173GoodNCR CorpNCR Corp
US8161524B20.415Method and portable storage device for allocating secure area in insecure areaGRANT2012-04-172005-01-1336677884GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20060195366A10.414Granting greater rights to stored contentAPPLICATION2006-08-312005-02-1136932949GoodGeneral Instrument CorpArris Technology Inc
US9787686B20.412On-demand security policy activationGRANT2017-10-102013-04-1251687732GoodAirwatch LLCAirwatch LLC
US20110208418A10.412Completing Obligations Associated With Transactions Performed Via Mobile User Platforms Based on Digital Interactive TicketsAPPLICATION2011-08-252010-02-2544477204GoodIPI LLCIPI LLC
US20050138383A10.412Method and system for validating timestampsAPPLICATION2005-06-232003-12-2234679080GoodPSS Systems IncIntellectual Ventures I LLC
US9942161B10.411Methods and systems for configuring and updating session-based quality of service for multimedia traffic in a local area networkGRANT2018-04-102012-09-2961801335GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US7814553B20.411Access control system  access managing method  image forming device and computer program productGRANT2010-10-122004-06-0235450320GoodKonica Minolta Business Technologies IncKonica Minolta Business Technologies Inc
US9164874B10.411Testing conversion and rendering of digital contentGRANT2015-10-202013-12-2054290343GoodAmazon Technologies IncAmazon Technologies Inc
US9607002B20.410File retrieval from multiple storage locationsGRANT2017-03-282013-12-1853368689GoodIntel CorpIntel Corp
US20050132191A10.410Method for authenticating different rendering devices with different service providersAPPLICATION2005-06-162003-12-1634654252GoodIntel CorpIntel Corp
US9569635B20.410Requesting modification rights to a linked file setGRANT2017-02-142012-08-2951224570GoodDropbox IncDropbox Inc
US9317851B20.409Secure transaction personal computerGRANT2016-04-192008-06-1940940965GoodBank of America CorpBank of America Corp
US7370070B20.408Data sharing method  request processing method  program  and apparatusGRANT2008-05-062003-09-0534131899GoodCanon IncCanon Inc
US10417637B20.408Systems and methods for accessing records via derivative locatorsGRANT2019-09-172012-08-0250028571Good41st Parameter Inc41st Parameter Inc
US20080082633A10.407RECOMMENDING SYSTEM  RECOMMENDING SERVER  CONTENT RECOMMENDING METHOD  AND RECOMMENDING PROGRAM PRODUCTAPPLICATION2008-04-032006-08-2439237649GoodToshiba CorpToshiba Digital Solutions Corp
US9584873B20.406Method and apparatus for configuring an electronic deviceGRANT2017-02-282013-10-1152810798GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US20090102972A10.406Display ApparatusAPPLICATION2009-04-232007-10-1740563115GoodHitachi LtdMaxell Holdings Ltd, Maxell Ltd
US20100251305A10.405RECOMMENDATION ENGINE APPARATUS AND METHODSAPPLICATION2010-09-302009-03-3042785971GoodTime Warner Cable IncSpectrum Management Holding Co LLC
US5988346A0.405Method and apparatus for establishing and managing vending machine subscriptionsGRANT1999-11-231997-11-1025511626GoodWalker Asset Management LPWalker Digital LLC
US20100169502A10.404Hybrid method for delivering streaming media within the homeAPPLICATION2010-07-012008-12-3042111782GoodIntel CorpIntel Corp
US8745158B20.403Application-guided bandwidth-managed cachingGRANT2014-06-032011-09-3047993702GoodAvid Technology IncAvid Technology Inc
US8862866B20.402Method and apparatus for providing an adaptable security level in an electronic communicationGRANT2014-10-142003-07-0734396108GoodCerticom CorpBlackBerry Ltd
US10791050B20.401Geographic location determination in a content delivery frameworkGRANT2020-09-292012-12-1351896692GoodLevel 3 Communications LLCLevel 3 Communications LLC
US10409445B20.401Rendering of an interactive lean-backward user interface on a televisionGRANT2019-09-102012-01-0948744832GoodActiveVideo Networks IncActiveVideo Networks Inc
US20060259426A10.400Apparatus and method for producing electronic media on demandAPPLICATION2006-11-162005-05-1237420353Good
US20050091539A10.399Supporting auto-logon for multiple devicesAPPLICATION2005-04-282003-10-2834473856GoodInternational Business Machines CorpLenovo Singapore Pte Ltd
US20040030650A10.398Information recording/reproducing systemAPPLICATION2004-02-122002-06-2429717551GoodHitachi LtdHGST Japan Ltd
US20080109867A10.397SERVICE AND POLICIES FOR COORDINATING BEHAVIORS AND CONNECTIVITY OF A MESH OF HETEROGENEOUS DEVICESAPPLICATION2008-05-082006-11-0739361176GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9503532B20.396Rediscovery of past dataGRANT2016-11-222013-09-0352584782GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US11197050B20.395Methods and apparatus for client-based dynamic control of connections to co-existing radio access networksGRANT2021-12-072013-03-1551534916GoodCharter Communications Operating LLCCharter Communications Operating LLC
US9256753B20.395Method and apparatus for protecting regions of an electronic documentGRANT2016-02-092003-06-1134102600GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US10534931B20.394Systems  devices and methods for automatic detection and masking of private dataGRANT2020-01-142011-03-1746829244GoodAttachmate CorpAttachmate Corp
US8180276B20.394Mobile device that presents interactive media and processes user responseGRANT2012-05-152006-11-2246329554GoodQualtrics LLCQualtrics LLC
US9634918B20.394Invalidation sequencing in a content delivery frameworkGRANT2017-04-252012-12-1351896717GoodLevel 3 Communications LLCLevel 3 Communications LLC
US10701148B20.393Content delivery framework having storage servicesGRANT2020-06-302012-12-1351896687GoodLevel 3 Communications LLCLevel 3 Communications LLC
US10701149B20.393Content delivery framework having origin servicesGRANT2020-06-302012-12-1351896693GoodLevel 3 Communications LLCLevel 3 Communications LLC
US10652087B20.393Content delivery framework having fill servicesGRANT2020-05-122012-12-1351896702GoodLevel 3 Communications LLCLevel 3 Communications LLC
US9137550B10.392Physical location influenced cachingGRANT2015-09-152011-12-1354063684GoodAmazon Technologies IncAmazon Technologies Inc
US9294576B20.392Social media impact assessmentGRANT2016-03-222013-01-0249998714GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20100218234A10.390METHOD AND APPARATUS FOR LIMITING OPERATION OF DIGITAL RIGHTS MANAGEMENT MODULEAPPLICATION2010-08-262009-02-2042632070GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20090288131A10.390PROVIDING ADVANCE CONTENT ALERTS TO A MOBILE DEVICE DURING PLAYBACK OF A MEDIA ITEMAPPLICATION2009-11-192008-05-1341317411GoodPorto Tech LLCConcert Technology Corp
US20090288112A10.389INSERTING ADVANCE CONTENT ALERTS INTO A MEDIA ITEM DURING PLAYBACKAPPLICATION2009-11-192008-05-1341317399GoodPorto Tech LLCConcert Technology Corp
US6016520A0.389Method of viewing at a client viewing station a multiple media title stored at a server and containing a plurality of topics utilizing anticipatory cachingGRANT2000-01-181995-07-1423999129GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20020184511A10.388Secure accounting and operational control reporting systemAPPLICATION2002-12-051997-05-0831190488Good
US7552093B20.387Resolving license dependencies for aggregations of legally-protectable contentGRANT2009-06-232003-12-0434633649GoodBlack Duck Software IncSynopsys Inc
US10862924B20.387Method and apparatus to facilitate message transmission and reception using different transmission characteristicsGRANT2020-12-082005-06-3036888432GoodChamberlain Group IncChamberlain Group Inc
US6101180A0.387High bandwidth broadcast system having localized multicast access to broadcast contentGRANT2000-08-081996-11-1227363473GoodStarGuide Digital Networks IncHanger Solutions LLC
US6675178B10.386Method and system for enhancing a commercial transaction conducted via a communications networkGRANT2004-01-062000-11-0929737177GoodAccenture LLPAccenture Global Services Ltd, Avient Corp
US8411851B20.385Determining HDCP source KSV supportGRANT2013-04-022010-05-0644901938GoodCrestron Electronics IncCrestron Electronics Inc
US8185592B20.384Method and program product for preventing distribution of an e-mail messageGRANT2012-05-222007-05-1740028640GoodInternational Business Machines CorpInternational Business Machines Corp
US7720767B20.383Method and system to support dynamic rights and resources sharingGRANT2010-05-182005-10-2437968314GoodContentguard Holdings IncContentguard Holdings Inc
US10084818B10.380Flexibly configurable data modification servicesGRANT2018-09-252012-06-0763556915GoodAmazon Technologies IncAmazon Technologies Inc
US20050289358A10.380Method and system for sensitive information protection in structured documentsAPPLICATION2005-12-292004-06-2935507473GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20070136523A10.379Advanced dynamic disk memory module special operationsAPPLICATION2007-06-142005-12-0838140837GoodADDMM LLCADDMM LLC
US9559975B10.378Real-time analysis of quality of service for multimedia traffic in a local area networkGRANT2017-01-312012-09-2957867578GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US8938671B20.378Methods and apparatus for securely displaying digital imagesGRANT2015-01-202005-12-1639731765Good41st Parameter Inc41st Parameter Inc
US10453066B20.378Keystroke analysisGRANT2019-10-222003-07-0134991223Good41st Parameter Inc41st Parameter Inc
US6883065B10.378System and method for a redundant communication channel via storage area network back-endGRANT2005-04-192001-11-1534437646GoodXiotech CorpVsip Holdings LLC
US9628345B20.378Framework supporting content delivery with collector services networkGRANT2017-04-182012-12-1350932235GoodLevel 3 Communications LLCLevel 3 Communications LLC
US20150312858A10.374METHOD AND APPARATUS FOR GENERATING A BLUETOOTH LOW ENERGY DATA PACKET COMPRISING AUDIO PAYLOAD DATAAPPLICATION2015-10-292012-11-1950730650GoodNokia Technologies OyRPX Corp, Nokia USA Inc
US10147123B20.374Electronic marketplace for hosted service imagesGRANT2018-12-042011-09-2947993509GoodAmazon Technologies IncAmazon Technologies Inc
US20130185810A10.373CONTROLLED SERIALIZATION AND/OR DESERIALIZATIONAPPLICATION2013-07-182012-01-1348780949GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8181257B20.372Method to allow role based selective document access between domainsGRANT2012-05-152007-06-1540133598GoodInternational Business Machines CorpInternational Business Machines Corp
US8612854B20.371Methods and apparatus for securely displaying digital imagesGRANT2013-12-172005-12-1638218506Good41st Parameter Inc41st Parameter Inc
US8640231B20.371Client side attack resistant phishing detectionGRANT2014-01-282006-02-2338429902GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080066169A10.371Fact Qualifiers in Security ScenariosAPPLICATION2008-03-132006-09-0839171318GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8938783B20.370Security language expressions for logic resolutionGRANT2015-01-202006-09-1139171312GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20060062363A10.370Method and apparatus for interacting with broadcast programmingAPPLICATION2006-03-232004-09-1936073983GoodSirenada IncAdam Albrett, Cufer Asset Ltd LLC
US7912799B20.370Smart containersGRANT2011-03-222006-03-3038560639GoodEMC CorpEMC Corp
US20030163808A10.369Electronic delivery of software access to an end-userAPPLICATION2003-08-282002-02-2827753627GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US9530156B20.367Customizable uniform control user interface for hosted service imagesGRANT2016-12-272011-09-2947993513GoodAmazon Technologies IncAmazon Technologies Inc
US10275128B20.367Multiple-mode system and method for providing user selectable video contentGRANT2019-04-302013-03-1550686183GoodActiveVideo Networks IncActiveVideo Networks Inc
US7836295B20.365Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacksGRANT2010-11-162002-07-2930770513GoodInternational Business Machines CorpInternational Business Machines Corp
US9152490B20.365Detection of user behavior using time series modelingGRANT2015-10-062013-04-0251622075GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US9247284B10.365Portable content container displaying A/V files in response to a command received from a consumer deviceGRANT2016-01-262009-12-2344151253GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US20070179854A10.364Media predictive consignmentAPPLICATION2007-08-022006-01-3038309598GoodSanDisk IL LtdWestern Digital Israel Ltd
US7971229B10.364Non-obtrusive security system for devicesGRANT2011-06-282007-06-2944169545GoodMcAfee LLCMcAfee LLC
USRE48433E10.363Method and apparatus to facilitate transmission of an encrypted rolling codeGRANT2021-02-092005-01-2774402158GoodChamberlain Group IncChamberlain Group Inc
US20130279693A10.363TRANSMITTING A SIGNAL BASED ON A HIGH-DEFINITION MULTIMEDIA INTERFACE SIGNALAPPLICATION2013-10-242012-04-2449380132GoodAriel Inventions LLCAriel Inventions LLC
US20080103977A10.361DIGITAL RIGHTS MANAGEMENT FOR DISTRIBUTED DEVICESAPPLICATION2008-05-012006-10-3139331519GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6766376B20.361Streaming media buffering systemGRANT2004-07-202000-09-1226925594GoodSN Acquisition LLCWAG Acquisition LLC
US9679135B20.360Computing device for secured transactions and virtual monitoring external from the operating systemGRANT2017-06-132008-06-1957222685GoodBank of America CorpBank of America Corp
US9998390B10.360Providing streaming media dataGRANT2018-06-122001-07-2726872308GoodWestern Digital Ventures IncPLUSTREAM Inc, Western Digital Technologies Inc
US9253231B20.360Retrieving and caching adaptive bitrate stream segments based on network congestionGRANT2016-02-022013-12-1953401420GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US20090019530A10.358Device-Specific Authorization at Distributed LocationsAPPLICATION2009-01-152007-07-1240137970GoodWayport IncWayport Inc
US8201215B20.357Controlling the delegation of rightsGRANT2012-06-122006-09-0839157592GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8776043B10.357Service image notificationsGRANT2014-07-082011-09-2951031981GoodAmazon Technologies IncAmazon Technologies Inc
US20090251605A10.356SYSTEM  METHOD AND DEVICES FOR HDMI TRANSMISSIONAPPLICATION2009-10-082008-04-0741132913GoodMediaTek IncSemiconductor Energy Laboratory Co Ltd, MediaTek Inc
US9633201B10.355Methods and systems for fraud containmentGRANT2017-04-252012-03-0158546448Good41st Parameter Inc41st Parameter Inc
US20100082489A10.354System and method for processing media giftsAPPLICATION2010-04-012008-09-3042058506GoodApple IncApple Inc
US20070226223A10.354METHOD AND APPARATUS FOR LOADING OF INFORMATION TO A PORTABLE DEVICEAPPLICATION2007-09-272006-03-0838534818GoodMotorola IncMotorola Solutions Inc
US20050010807A10.354Information processing apparatus used by a plurality of different operators  and method and program for use in the information processing apparatusAPPLICATION2005-01-132003-04-1432985532GoodMatsushita Electric Industrial Co LtdPanasonic Corp
US10616546B20.353Commercials on mobile devicesGRANT2020-04-072013-09-0350552875GoodPenthera Partners IncPenthera Partners Inc
US8055536B10.351Automated real-time secure user data sourcingGRANT2011-11-082007-03-2144882586GoodQurio Holdings IncQurio Holdings Inc
US20070162377A10.351System and method for an online exchange of private dataAPPLICATION2007-07-122005-12-2338233863GoodCredigy Tech IncCredigy Tech Inc
US20070079385A10.351Managing user permissions in a computer systemAPPLICATION2007-04-052005-09-2235249170GoodSoftware 2000 LtdSoftware Imaging Group Ltd
US9661468B20.349System and method for converting gestures into digital graffitiGRANT2017-05-232009-07-0743427061GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20150327131A10.349Enhanced Integration Between WI-FI and Mobile Communication NetworksAPPLICATION2015-11-122013-01-1850114513GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US9417863B20.348System and method for expedited loading of an image onto a storage deviceGRANT2016-08-162013-09-2752741488GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US8656503B20.348Security language translations with logic resolutionGRANT2014-02-182006-09-1139171320GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6243692B10.347Secure electronic software packaging using setup-external unlocking moduleGRANT2001-06-051998-05-2222174569GoodPreview SoftwareSafeNet Data Security Israel Ltd
US8745585B20.346Meta-data for single development test environmentGRANT2014-06-032011-12-2948696023GoodUnisys CorpUnisys Corp
US20090240760A10.346System and Method for Initiating ServicesAPPLICATION2009-09-242008-03-2041089937GoodCONNECTALLSERVICES IncCONNECTALLSERVICES Inc
US9258371B10.346Managing interaction with hosted servicesGRANT2016-02-092012-03-2355235728GoodAmazon Technologies IncAmazon Technologies Inc
US20150358780A10.344SIGNAL HANDLINGAPPLICATION2015-12-102013-02-1551353528GoodNokia Technologies OyRPX Corp, Nokia USA Inc
US9489687B20.341Methods and systems for managing software developmentGRANT2016-11-082003-12-0439544426GoodBlack Duck Software IncSynopsys Inc
US20120042050A10.341Representation groups for network streaming of coded multimedia dataAPPLICATION2012-02-162010-08-1044509694GoodQualcomm IncQualcomm Inc
US7526347B20.340Security for objects in a process plant configuration systemGRANT2009-04-282003-02-1833030326GoodFisher Rosemount Systems IncFisher Rosemount Systems Inc
US9679279B10.339Managing transfer of hosted service licensesGRANT2017-06-132012-02-2759009205GoodAmazon Technologies IncAmazon Technologies Inc
US9397987B10.338Managing interaction with hosted servicesGRANT2016-07-192012-03-2356381804GoodAmazon Technologies IncAmazon Technologies Inc
US9961095B20.338System and method for extracting and preserving metadata for analyzing network communicationsGRANT2018-05-012013-03-1451581439GoodFidelis Cybersecurity Solutions IncFidelis Cybersecurity Solutions Inc
US9110758B20.338Cross-platform software framework for embedded systems on data storage deviceGRANT2015-08-182013-03-1551537887GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US10944559B20.338Transmission of data including conversion of ternary data to binary dataGRANT2021-03-092005-01-2738529198GoodChamberlain Group IncChamberlain Group Inc
US8438368B20.337Processing apparatus  processing system  and computer readable mediumGRANT2013-05-072008-09-2442038804GoodFuji Xerox Co LtdFujifilm Business Innovation Corp
US8583691B20.336Method for viewing document information on a mobile communication deviceGRANT2013-11-122004-08-3135944682GoodBlackBerry LtdBlackBerry Ltd
US9971752B20.335Systems and methods for resolving privileged edits within suggested editsGRANT2018-05-152013-08-1951355647GoodGoogle LLCGoogle LLC
US20050132347A10.335System for controlling the use of a software application on a plurality of computersAPPLICATION2005-06-162003-12-1534653763GoodMacrovision Europe LtdFLEXERA SOFTWARE Inc (FORMERLY ACRESSO SOFTWARE INC), Flexera Software LLC
US20080066147A10.334Composable Security PoliciesAPPLICATION2008-03-132006-09-1139171304GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6487665B10.334Object security boundariesGRANT2002-11-261998-11-3022744318GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6192396B10.333Electronic mail with recipient-specific contentGRANT2001-02-201998-08-1122454179GoodCanon IncCanon Inc
US5732138A0.333Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic systemGRANT1998-03-241996-01-2924372461GoodSilicon Graphics IncRPX Corp, Morgan Stanley and Co LLC
US10687095B20.332Systems and methods for saving encoded media streamed using adaptive bitrate streamingGRANT2020-06-162011-09-0147753187GoodDivx LLCDivx LLC
US20080066158A10.330Authorization Decisions with Principal AttributesAPPLICATION2008-03-132006-09-0839171311GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20110047134A10.328METHOD AND SYSTEM FOR CONTROLLING MEDIA PLAYING AND METADATA EXECUTION UNITAPPLICATION2011-02-242008-05-1641318354GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US9207934B20.328Method and system for virtualization of software applicationsGRANT2015-12-082008-08-0741654123GoodCode Systems CorpCode Systems Corp
US8312292B20.327Input output access controllerGRANT2012-11-132007-07-3139832694GoodViasat IncViasat Inc
US6202066B10.326Implementation of role/group permission association using object access typeGRANT2001-03-131997-11-1926746426GoodUS Department of CommerceCOMMERCE GOVENMENT OF United States, THE, Secretary of, US Department of Commerce
US10304110B20.326Ticket listing triggered by URL linksGRANT2019-05-282013-12-2653482303GoodeBay IncStubhub Inc
US9626700B10.325Aggregation of operational data for merchandizing of network accessible servicesGRANT2017-04-182011-09-2958771956GoodAmazon Technologies IncAmazon Technologies Inc
US9229748B20.324Method and system for improving startup performance and interoperability of a virtual applicationGRANT2016-01-052010-01-2944342759GoodCode Systems CorpCode Systems Corp
US8869299B20.323Method and system for generating trusted security labels for electronic documentsGRANT2014-10-212009-03-0442935408GoodTITUS IncTITUS Inc
US20100138865A10.323PRESENTING CONTENTAPPLICATION2010-06-032007-06-2639791517GoodNDS LtdSynamedia Ltd
US20130339331A10.322TRACKING FILE CONTENT ORIGINALITYAPPLICATION2013-12-192012-06-1349756864GoodInternational Business Machines CorpInternational Business Machines Corp
US6810389B10.321System and method for flexible packaging of software application licensesGRANT2004-10-262000-11-0833160062GoodSynopsys IncSynopsys Inc
US8463236B20.321Paging signal transmission method and mobile station for the sameGRANT2013-06-112008-02-2240985626GoodNTT Docomo IncNTT Docomo Inc
US20140006967A10.320CROSS-APPLICATION TRANSFERS OF USER INTERFACE OBJECTSAPPLICATION2014-01-022012-06-2949779615GoodHewlett Packard Development Co LPQualcomm Inc
US9128952B20.318File folder transmission on networkGRANT2015-09-082008-03-2841114822GoodAlibaba Group Holding LtdAlibaba Group Holding Ltd
US7729792B20.318Version control for objects in a process plant configuration systemGRANT2010-06-012003-02-1833030327GoodFisher Rosemount Systems IncFisher Rosemount Systems Inc
US20070289028A10.318Time Bound Entitlement for Digital Content Distribution FrameworkAPPLICATION2007-12-132006-06-1238823488GoodSoftware Spectrum IncINSIGHT DIRECT USA Inc AN ILLINOIS Corp
US8776038B20.316Method and system for configuration of virtualized software applicationsGRANT2014-07-082008-08-0741654103GoodCode Systems CorpCode Systems Corp
US20100199298A10.316DATA READING METHOD  AND A VIDEO TRANSMITTER AND A VIDEO RECEIVER USING THE SAMEAPPLICATION2010-08-052008-12-1941786076GoodToshiba Corp, Hitachi Consumer Electronics Co LtdToshiba Corp, Maxell Holdings Ltd, Maxell Ltd
US7007164B10.314Method and array for authenticating a first instance and a second instanceGRANT2006-02-281998-11-037886550GoodInfineon Technologies AGInfineon Technologies AG
US20030061060A10.314Dynamic database redirection using semantic taxonomy informationAPPLICATION2003-03-272001-09-2726709082GoodI2 Technologies IncBlue Yonder Group Inc
US8954958B20.313Method of configuring a virtual applicationGRANT2015-02-102010-01-1144259516GoodCode Systems CorpCode Systems Corp
US9286619B20.311System and method for generating social summariesGRANT2016-03-152010-12-2746318553GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8413211B20.309Access control policy compliance check processGRANT2013-04-022008-05-3040740152GoodFujitsu LtdFujitsu Ltd
US20080065899A10.309Variable Expressions in Security AssertionsAPPLICATION2008-03-132006-09-0839171171GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9306974B10.308System  apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploitsGRANT2016-04-052013-12-2652395199GoodFireEye IncMandiant Inc
US6192349B10.308Smart card mechanism and method for obtaining electronic tickets for goods services over an open communications linkGRANT2001-02-201998-09-2822583799GoodInternational Business Machines CorpeBay Inc
US20110307831A10.308User-Controlled Application Access to ResourcesAPPLICATION2011-12-152010-06-1045097288GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8200246B20.306Data synchronization for devices supporting direction-based servicesGRANT2012-06-122008-06-1941430673GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20130031211A10.305FEEDBACK ORIENTED PRIVATE OVERLAY NETWORK FOR CONTENT DISTRIBUTIONAPPLICATION2013-01-312011-01-2946852312Good
US9800945B20.304Class-based intelligent multiplexing over unmanaged networksGRANT2017-10-242012-04-0353059507GoodActiveVideo Networks IncActiveVideo Networks Inc
US8666524B20.303Portable music player and transmitterGRANT2014-03-042003-01-0234966313GoodCatch Media IncCatch Media Inc
US20050050090A10.303Call method  copyright protection system and call systemAPPLICATION2005-03-032003-07-2534213268GoodSony CorpSony Corp
US8600936B20.302Export license compliance system (“ELCS”) using controlled communicationsGRANT2013-12-032005-01-0338233950Good
US7818259B20.302Prepaid licensing system and methodGRANT2010-10-192004-01-2334794888GoodSiemens AGSiemens Healthcare GmbH
US20150112813A10.301SYSTEM AND METHOD FOR PROVIDING A PRODUCT INVENTORY  INFORMATION PLATFORM WITH STANDARDS VALIDATIONAPPLICATION2015-04-232013-10-1852827029Good
US6260027B10.301Electronic ticket system  collecting terminal  service providing terminal  user terminal  electronic ticket collecting method and recording mediumGRANT2001-07-101998-01-2711847466GoodNTT Data Corp, Nippon Telegraph and Telephone CorpNTT Data Corp, Nippon Telegraph and Telephone Corp
US10073987B20.300Methods and systems for privileged execution support for file system commands on a storage deviceGRANT2018-09-112013-04-0251621889GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US20110093333A10.299Method and System for Distributing Licensed Multimedia FilesAPPLICATION2011-04-212008-04-1841199316GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US10200744B20.296Overlay rendering of user interface onto source videoGRANT2019-02-052013-06-0651210741GoodActiveVideo Networks IncActiveVideo Networks Inc
US8467991B20.296Data services based on gesture and location information of deviceGRANT2013-06-182008-06-2041432085GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US10453067B20.295Short range wireless translation methods and systems for hands-free fare validationGRANT2019-10-222011-03-1161281689GoodBytemark IncBytemark Inc
US10601895B10.294Data transfer by data storage device based on received uniform resource locator informationGRANT2020-03-242014-01-0869902728GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US9754256B20.292Variable risk engineGRANT2017-09-052010-10-1945935301Good41st Parameter Inc41st Parameter Inc
US5771459A0.290Communication system for use with stationary and second entities  via a wireless intermediate network with gateway devices  a gateway device for use with such system  and a mobile entity provided with such gateway deviceGRANT1998-06-231994-06-218216973GoodUS Philips CorpUS Philips Corp
US9525669B20.287Method and opportunistic sensingGRANT2016-12-202012-12-0647504621GoodST Ericsson SATelefonaktiebolaget LM Ericsson AB
US20160234293A10.285Downloading Media ObjectsAPPLICATION2016-08-112013-10-0152741237GoodPenthera Partners IncPenthera Partners Inc
US6044469A0.285Software publisher or distributor configurable software security mechanismGRANT2000-03-281997-08-2925445191GoodPreview SoftwareSafeNet Data Security Israel Ltd
US20070288859A10.283Method and apparatus for selective forwarding of e-mail and document contentAPPLICATION2007-12-132006-06-0738823380GoodSiemens Communications IncUnify Inc
US20090158440A10.283SYSTEM AND METHOD FOR EXPORTING LICENSEAPPLICATION2009-06-182006-10-1739313603GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US20100228612A10.283DEVICE TRANSACTION MODEL AND SERVICES BASED ON DIRECTIONAL INFORMATION OF DEVICEAPPLICATION2010-09-092009-03-0942679057GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20160275019A10.281METHOD AND APPARATUS FOR PROTECTING DYNAMIC LIBRARIESAPPLICATION2016-09-222013-10-1052813287GoodInka Entworks IncInka Entworks Inc
US7212813B20.281Telecommunication device with software componentsGRANT2007-05-012003-08-0833547801GoodMitsubishi Electric CorpMitsubishi Electric Corp
US8135481B20.281Process plant monitoring based on multivariate statistical analysis and on-line process simulationGRANT2012-03-132004-05-0438617184GoodFisher Rosemount Systems IncFisher Rosemount Systems Inc
US20100332324A10.273PORTAL SERVICES BASED ON INTERACTIONS WITH POINTS OF INTEREST DISCOVERED VIA DIRECTIONAL DEVICE INFORMATIONAPPLICATION2010-12-302009-06-2543381766GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080263542A10.271Software-Firmware Transfer SystemAPPLICATION2008-10-232005-10-1237943576GoodClevx LLCClevx LLC
US8700301B20.264Mobile computing devices  architecture and user interfaces based on dynamic direction informationGRANT2014-04-152008-06-1941430815GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080046929A10.264MEDIA CONTENT CATALOG SERVICEAPPLICATION2008-02-212006-08-0139102841GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9324112B20.264Ranking authors in social media systemsGRANT2016-04-262010-11-0946020603GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9965347B10.264Manufacturing data logging without a networkGRANT2018-05-082013-12-1862045114GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US8887301B20.256Method and system for classifying and redacting segments of electronic documentsGRANT2014-11-112009-03-0442679416GoodTITUS IncTITUS Inc
US20150170503A10.253EVACUATION SYSTEMAPPLICATION2015-06-182008-12-3053369155GoodOneEvent Technologies IncOneEvent Technologies Inc
US9300721B20.251Method  apparatus and system for file transfer based on file directoryGRANT2016-03-292009-09-1443732746GoodAlibaba Group Holding LtdAlibaba Group Holding Ltd
US8881039B20.249Scaling composite shapes for a graphical human-machine interfaceGRANT2014-11-042009-03-1342199764GoodFisher Rosemount Systems IncFisher Rosemount Systems Inc
US20090319166A10.247MOBILE COMPUTING SERVICES BASED ON DEVICES WITH DYNAMIC DIRECTION INFORMATIONAPPLICATION2009-12-242008-06-2041432080GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7620659B20.242Efficient knowledge representation in data synchronization systemsGRANT2009-11-172007-02-0939686819GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20090315775A10.241MOBILE COMPUTING SERVICES BASED ON DEVICES WITH DYNAMIC DIRECTION INFORMATIONAPPLICATION2009-12-242008-06-2041430677GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6532455B10.237Method and system for content-based document security  routing  and action executionGRANT2003-03-111999-12-2223864937GoodSequoia Software CorpCitrix Systems Inc
US9860182B20.235Data transmission device  data transmission method  and program thereforGRANT2018-01-022012-12-1950978423GoodNEC CorpNEC Corp
US9871882B10.235Optimized N-stream sequential media playback caching method and systemGRANT2018-01-162014-01-0260935103GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US7639818B20.233Structured document signature device  structured document adaptation device and structured document verification deviceGRANT2009-12-292003-09-1934191413GoodNTT Docomo IncNTT Docomo Inc
US9275697B20.233Utilizing destructive features as RAM code for a storage deviceGRANT2016-03-012013-10-0352776083GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US20140192988A10.231HEARING ASSISTANCE DEVICE EAVESDROPPING ON A BLUETOOTH DATA STREAMAPPLICATION2014-07-102013-01-1049917017GoodStarkey Laboratories IncStarkey Laboratories Inc
US9210481B20.230Systems and methods for performing smooth visual search of media encoded for adaptive bitrate streaming via hypertext transfer protocol using trick play streamsGRANT2015-12-082011-01-0546380759GoodSonic IP IncDivx LLC
US9479588B10.229Methods and devices for booting a network attached storage with two logical unitsGRANT2016-10-252013-05-2351934176GoodWestern Digital Technologies IncWestern Digital Technologies Inc, Western Digital Fremont LLC
US9213611B20.222Automatic raid mirroring when adding a second boot driveGRANT2015-12-152013-07-2452391536GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US20080104206A10.217EFFICIENT KNOWLEDGE REPRESENTATION IN DATA SYNCHRONIZATION SYSTEMSAPPLICATION2008-05-012006-10-3139331682GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20130325994A10.212ETHERNET COMMUNICATION SYSTEM AND METHOD BASED ON MMC/SD INTERFACEAPPLICATION2013-12-052010-09-1745830959GoodChina Unionpay Co Ltd, Eastcompeace Smart Card Co LtdChina Unionpay Co Ltd, Eastcompeace Smart Card Co Ltd
US20070083924A10.206System and method for multi-stage packet filtering on a networked-enabled deviceAPPLICATION2007-04-122005-10-0837912288Good
US5530750A0.204Apparatus  method  and system for compressing a digital input signal in more than one compression modeGRANT1996-06-251993-01-2912275725GoodSony CorpSony Corp
US8000814B20.203User configurable alarms and alarm trending for process control systemGRANT2011-08-162004-05-0434967121GoodFisher Rosemount Systems IncFisher Rosemount Systems Inc
US20040252967A10.198Mutlimedia play interface control deviceAPPLICATION2004-12-162003-06-1333509869GoodAVIQUEST TECHNOLOGY Co LtdAVIQUEST TECHNOLOGY Co Ltd
US9280482B20.197Methods and systems for provisioning a bootable image on to an external driveGRANT2016-03-082012-12-1350932367GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US9430031B20.189Power conservation based on cachingGRANT2016-08-302013-07-2952391529GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US20140317428A10.184Pre-processing Operation Method and Related Electronic DeviceAPPLICATION2014-10-232013-04-2351729965GoodHTC CorpHTC Corp
US20080310815A10.172Method and Apparatus For Playing VideoAPPLICATION2008-12-182005-11-2337888099GoodKoninklijke Philips Electronics NVKoninklijke Philips NV
US9001697B20.161Methods and devices for replacing and configuring a router in a networkGRANT2015-04-072012-12-1450930775GoodWestern Digital Technologies IncWestern Digital Technologies Inc
US20070288389A10.154Version Compliance SystemAPPLICATION2007-12-132006-06-1238573193GoodINSIGHT DIRECT USA Inc AN ILLINOIS CorpINSIGHT DIRECT USA Inc AN ILLINOIS Corp
US20080028412A10.148METHOD FOR THE ADMINISTRATION OF RESOURCESAPPLICATION2008-01-312006-07-2738859467GoodSIA SyncrosoftWhiteCryption Corp
US9405479B10.135Faster file compression using sliding compression window and backward compound pointersGRANT2016-08-022013-08-2656507241GoodWestern Digital Technologies IncWestern Digital Technologies Inc
KR20090000042ANRMETHOD FOR PREVENTING THE EXECUTION AVOIDANCE OF DIGITAL RIGHTS MANAGEMENT CONTENTS PROTECTION CODESAPPLICATION2009-01-072006-12-1940483282Good
KR101373032B1NRMETHOD FOR TRANSFERRING MESSAGES COMPRISING EXTENSIBLE MARKUP LANGUAGE INFORMATIONGRANT2014-03-182006-04-0436794905Good
KR101008524B1NRMETHOD OF DISTRIBUTING VERSIONS OF VARIOUS QUALITIES OF AN ELECTRONIC CONTENT  AN ELECTRONIC CONTENT MEDIUM AND AN ELECTRONIC CONTENT PLAYERGRANT2011-01-142002-12-2032682193Good
KR100734836B1NRSYSTEM AND METHOD FOR GENERATING REPRODUCIBLE SESSION KEYSGRANT2007-07-062004-05-0335242003Good
JPH0997295ANRMETHOD AND DEVICE FOR IMPULSE-PURCHASING PACKAGED INFORMATION SERVICEGRANT1997-04-081995-07-2123959937Good
JP4717509B2NRNo titleGRANT2011-07-062005-05-1737449498Good
JP4717464B2NRNo titleGRANT2011-07-062005-02-1836914395Good
JP2015503261ANRNo titleAPPLICATION2015-01-292011-10-2747178318Good
JP2005517211ANRNo titleAPPLICATION2005-06-092002-02-0527675698Good
JP2004259280ANRCONNECTION BETWEEN DIGITAL LICENSE AND USER AND CONNECTION BETWEEN USER AND TWO OR MORE COMPUTING DEVICES IN DIGITAL COPYRIGHT MANAGEMENT (DRM) SYSTEMAPPLICATION2004-09-162003-02-2732907778Good
JP2004046833ANRPUBLISHING OF CONTENTS RELATED TO DIGITAL COPYRIGHT MANAGEMENT (DRM) SYSTEMAPPLICATION2004-02-122002-06-1227612933Good
JP2003204429ANRDEVICE AND METHOD FOR GENERATING AND DECODING DIGITAL WATERMARKING CODE  PROGRAM FOR GENERATING AND DECODING DIGITAL WATERMARKING CODE  AND RECORDING MEDIUM RECORDING THE PROGRAMAPPLICATION2003-07-182001-10-2226624030Good
JP2003152698ANRCONTENTS UTILIZATION CONTROL TRANSMITTING METHOD  CONTENTS UTILIZATION CONTROL RECEIVING METHOD  CONTENTS UTILIZATION CONTROL TRANSMITTING DEVICE  CONTENTS UTILIZATION CONTROL RECEIVING DEVICE  CONTENTS UTILIZATION CONTROL TRANSMITTING PROGRAM AND CONTENTS UTILIZATION CONTROL RECEIVING PROGRAMAPPLICATION2003-05-232001-11-1519162192Good
JP2002055884ANRCONTENTS COPY MANAGEMENT SYSTEM  ITS METHOD  INFORMATION PROCESSOR  ITS METHOD  SERVER AND STORAGE MEDIUMAPPLICATION2002-02-202000-05-3126593029Good
JP2002032685ANRCONTENTS RENTAL SYSTEMAPPLICATION2002-01-312000-05-1126591723Good
GB2493496ANREncrypting portions of a content item using different encryption keysGRANT2013-02-132011-07-1244544594GoodNDS LtdSynamedia Ltd
GB2458568ANRSystem for enforcing security policies on electronic filesGRANT2009-09-302008-03-2740640049GoodCovertix LtdCovertix Ltd
GB2407236ANRDiffie-Hellman exchange of a session keyGRANT2005-04-202003-10-1729559491GoodToshiba Research Europe LtdToshiba Europe Ltd
GB2406484ANRCommunication indicating a security levelGRANT2005-03-302003-08-1933098357GoodCerticom CorpCerticom Corp
GB2328047ANRProtected storage of core data secretsGRANT1999-02-101997-06-3025385594GoodMicrosoft CorpMicrosoft Corp
FR2954985A1NRNo titleGRANT2011-07-082010-01-0542272618GoodViaccess SASViaccess SAS
FR2904903A1NRData set for multimedia file  has altered set restoring partial multimedia information flow  and mark comprising complementation data which is combined with set for restoring complete information flow GRANT2008-02-152006-08-1137866356GoodFrance Telecom SAOrange SA
FR2887098A1NRNo titleGRANT2006-12-152005-06-1435789308GoodViaccess SASViaccess SAS
FR2866168A1NRPublic key certifying process for mobile communication network  involves acquiring key using network entity from mobile terminal via network communication  and authenticating terminal by utilizing speaker authentication processGRANT2005-08-122004-02-1134778678GoodFrance Telecom SAOrange SA
DE102007016538A1NRNo titleAPPLICATION2008-10-092007-04-0539736226GoodInfineon Technologies AGApple Inc
CN105075172ANRVideo distribution and playbackGRANT2015-11-182012-10-1050478057Good
CN103714642ANRSecret key download method  management method  download management method  secret key download device  secret key management device and secret key download management systemGRANT2014-04-092013-03-1548817736Good
CN103562947ANRService for managing digital content resalesGRANT2014-02-052011-05-2447217719Good
CN103477602ANRMethod and apparatus for providing secret delegationGRANT2013-12-252011-04-1547008886Good
CN102682233ANRMethods and systems for scalable distribution of protected contentGRANT2012-09-192011-01-1346491659Good
CN101739522ANRDRM file integrity protection method and deviceGRANT2010-06-162009-12-3142462997Good
CN101587528ANRInformation processing apparatus and control method thereforGRANT2009-11-252008-05-2041343086Good
CN100430916CNRMechanism for use of conversion in multiple filesGRANT2008-11-052003-05-1733449011Good
US9146975B20.690Systems and methods for integration of business applications with enterprise content management systemsGRANT2015-09-292012-02-1748983407FairOracle International CorpOracle International Corp
WO2007106620A20.612METHOD FOR AUTHENTICATING A MOBILE NODE IN A COMMUNICATION NETWORKAPPLICATION2007-09-202006-03-1038510127Fair
US9569557B20.496Cache management in HTML eReading applicationGRANT2017-02-142011-12-2948695975FairChegg IncChegg Inc
US8417772B20.474Method and system for transferring content from the web to mobile devicesGRANT2013-04-092007-02-1240473036FairAmazon Technologies IncAmazon Technologies Inc
US8752191B20.471Generic digital rights management framework  and applications thereofGRANT2014-06-102007-05-1640472913FairBroadcom CorpAvago Technologies International Sales Pte Ltd
US9104687B20.452System and method for preventing duplicate uploads of modified photos in a synchronized content management systemGRANT2015-08-112012-12-2050975877FairDropbox IncDropbox Inc
US9824151B20.449Providing a portion of requested data based upon historical user interaction with the dataGRANT2017-11-212012-12-2753545012FairGoogle LLCGoogle LLC
US7849401B20.434Method and system for enabling collaborative authoring of hierarchical documents with lockingGRANT2010-12-072003-05-1633425239FairJustSystems Canada IncJustSystems Canada Inc
US7636891B20.432Method for paginating a document structure of a document for viewing on a mobile communication deviceGRANT2009-12-222004-08-3136033794FairResearch in Motion LtdBlackBerry Ltd
US20090163137A10.430Systems and methods for communicating and rendering electronic program guide information via digital radio broadcast transmissionAPPLICATION2009-06-252007-12-2140789228FairIbiquity Digital CorpIbiquity Digital Corp
US20080120330A10.410System and Method for Linking User Generated Data Pertaining to Sequential ContentAPPLICATION2008-05-222005-04-0746329706Fairiofy CorpIngram DV LLC
US8825183B20.362Methods for a data driven interface based on relationships between process control tagsGRANT2014-09-022010-03-2243881500FairFisher Rosemount Systems IncFisher Rosemount Systems Inc
USRE48761E10.360Use of objective quality measures of streamed content to reduce streaming bandwidthGRANT2021-09-282012-12-3151526959FairDivx LLCDivx LLC
US7707123B20.337Method and arrangement for compensating a postage machine user for printed and billed  but unusable franking imprintsGRANT2010-04-272004-07-0235207641FairFrancotyp Postalia GmbHFrancotyp Postalia GmbH
US9529785B20.324Detecting relationships between edits and acting on a subset of editsGRANT2016-12-272012-11-2750774431FairGoogle LLCGoogle LLC
US9171003B20.317Shared media crawler database method and systemGRANT2015-10-272013-03-1551533051FairWestern Digital Technologies IncWestern Digital Technologies Inc
US9348803B20.314Systems and methods for providing just-in-time preview of suggestion resolutionsGRANT2016-05-242013-10-2251688486FairGoogle LLCGoogle LLC
US9367522B20.301Time-based presentation editingGRANT2016-06-142012-04-1353511077FairGoogle LLCGoogle LLC
US9906785B20.274Systems  methods  and media for transcoding video data according to encoding parameters indicated by received metadataGRANT2018-02-272013-03-1551526955FairSonic IP IncDivx LLC
US6671424B10.251Predictive image caching algorithmGRANT2003-12-302000-07-2524506590FairChipworks IncPCMS Holdings Inc
US6446061B10.251Taxonomy generation for document collectionsGRANT2002-09-031998-07-318232379FairInternational Business Machines CorpInternational Business Machines Corp
US20110250786A10.222EXTENSIBLE MEMORY CARD-COMPATIBLE RECEPTACLE AND PORT EXPANSION DEVICEAPPLICATION2011-10-132010-04-0744761243FairApple IncApple Inc
US20100037133A10.173DOCUMENT PROCESSING DEVICE  DOCUMENT PROCESSING METHOD  AND COMPUTER READABLE MEDIUMAPPLICATION2010-02-112008-08-0741654048FairFuji Xerox Co LtdFujifilm Business Innovation Corp
US20040218552A10.122Service system for arranging conversations between people without disclosing their identities  and a telecommunication system provided therewithAPPLICATION2004-11-042003-04-1933309532Fair
US9058835B20.120Methods and systems for optimized staggered disk drive spinupGRANT2015-06-162013-03-1351526069FairWestern Digital Technologies IncWestern Digital Technologies Inc
US9701553B20.088Copper recovery apparatusGRANT2017-07-112011-06-0847292234FairToshiba CorpToshiba Corp
JPH10320478ANRCIPHERED/DECIPHERED COMMUNICATION SYSTEM AND METHOD THEREFORGRANT1998-12-041997-03-1926426961Fair
JP2014092913ANRTERMINAL DEVICE HAVING DRM(DIGITAL RIGHTS MANAGEMENT) DECODING FUNCTION AND DRM DECODING METHOD IN TERMINAL DEVICEAPPLICATION2014-05-192012-11-0250936949Fair
JP2011013714ANRCONTENT DATA MANAGEMENT SYSTEM  MANAGEMENT METHOD  UTILIZING DEVICE AND MANAGEMENT DEVICEAPPLICATION2011-01-202009-06-3043592586Fair
JP2009015766ANRUSER TERMINAL  ACCESS MANAGEMENT SYSTEM  ACCESS MANAGEMENT METHOD  AND PROGRAMAPPLICATION2009-01-222007-07-0940356568Fair
JP2008269032ANRMANAGEMENT SYSTEM  MANAGEMENT METHOD AND USE DEVICE FOR DIGITAL CONTENT DATAAPPLICATION2008-11-062007-04-1640048489Fair
JP2008139940ANRACCESS AUTHORITY DETERMINATION APPARATUS  SECURITY SYSTEM  ACCESS AUTHORITY DETERMINATION METHOD FOR SECURITY SYSTEM  AND PROGRAMAPPLICATION2008-06-192006-11-3039601362Fair
JP2007148685ANRIMAGE INFORMATION EXTRACTION METHOD  IMAGE INFORMATION RETRIEVAL METHOD  AND PROGRAMAPPLICATION2007-06-142005-11-2538210046Fair
JP2005006033ANRKEY GENERATING METHOD  KEY GENERATING DEVICE  CONTENTS DISTRIBUTING DEVICE  TERMINAL DEVICE  AND PROGRAMAPPLICATION2005-01-062003-06-1234093072Fair
JP2004193942ANRMETHOD  APPARATUS AND PROGRAM FOR TRANSMITTING CONTENT AND METHOD  APPARATUS AND PROGRAM FOR RECEIVING CONTENTAPPLICATION2004-07-082002-12-1132758647Fair
JP2004133654ANRSTORAGE DEVICE  TERMINAL DEVICE  AND SERVER SYSTEMAPPLICATION2004-04-302002-10-1032286851Fair
JP2004032307ANRMETHOD AND SERVER FOR DELIVERING CONTENT  COMPUTER-READABLE STORAGE MEDIUM RECORDING CONTENT DELIVERY PROCESSING PROGRAM AND CONTENT DELIVERY PROCESSING PROGRAMAPPLICATION2004-01-292002-06-2531180718Fair
JP2003248627ANRFILE ACCESS CONTROL METHOD  PROGRAM  AND STORAGE MEDIUMAPPLICATION2003-09-052002-02-2528661183Fair
JP2002352028ANRMETHOD  SYSTEM  AND DEVICE FOR DISTRIBUTING CONTENTSAPPLICATION2002-12-062001-05-2819001972Fair
JP2002279102ANRCONTENTS DISTRIBUTION SYSTEM  CONTENTS DECODING KEY DELIVERY SERVER  CONTENTS DELIVERY METHOD  CONTENTS REGENERATING DEVICE AND PROGRAM RECORD MEDIUMAPPLICATION2002-09-272001-03-1518931336Fair
JP2002149061ANRRENTAL CONTENTS DISTRIBUTION SYSTEM AND METHOD THEREFORAPPLICATION2002-05-222000-11-1518822098Fair
JP2001136363ANRCONTENTS USE ACCEPTANCE MANAGING METHOD AND ITS DEVICEAPPLICATION2001-05-181999-11-0218036688Fair
JP2000347566ANRCONTENTS ADMINISTRATION DEVICE  CONTENTS USER TERMINAL  AND COMPUTER-READABLE RECORDING MEDIUM RECORDING PROGRAM THEREONAPPLICATION2000-12-151999-06-0815740320Fair
JP2000215238ANRMETHOD FOR DETECTING ILLEGAL LITERARY WORKAPPLICATION2000-08-041999-01-2111813622Fair
FR2904130A1NRDocument e.g. identification card  identifying method for microcomputer  involves marking documents to make image on each of documents with variations for each document  and characterizing variations for forming imprint for each documentGRANT2008-01-252006-07-1937708274FairAdvanced Track and Trace SAAdvanced Track and Trace SA
DE102005025489A1NRNo titleAPPLICATION2006-12-072005-06-0137075166FairT Mobile International AGDeutsche Telekom AG
CN103268452ANRMethod and device for file processingGRANT2013-08-282013-05-3149012080Fair
CN102917056ANRMobile learning system and using method thereofGRANT2013-02-062012-10-1947615286Fair

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityBROAD
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
2,082
Recommended Classes
521
Government Assigned Classes
1
CPC
Title
Score
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)1.924
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys1.871
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.762
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)1.762
H04N21/2347involving video stream encryption | arrangements for secret or secure communication | (ref: H04L9/00)|   analogue secrecy systems | (ref: H04N7/16)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)| | arrangements for preventing the taking of data from a data transmission channel without authorisation | (ref: H04L12/22)| | security arrangements in wireless networks | (ref: H04W12/00)1.690
G06F21/6272by registering files or documents with a third party1.666
G06Q10/101Collaborative creation of products or services1.666
G06F21/602Providing cryptographic facilities or services1.666
G06F21/6263during internet communication  e.g. revealing personal data from cookies1.637
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.637
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries1.637
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.628
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates1.609
A63F13/35Details of game servers1.607
H04L9/0875based on channel impulse response [CIR]1.607
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)1.581
G06Q50/18Legal services| Handling legal documents1.567
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level1.555
H04L63/0281Proxies1.550
H04L67/28for the provision of proxy services  e.g. intermediate processing or storage in the network | network management provisions | (ref: H04L41/00)| | network monitoring provisions | (ref: H04L43/00)| | proxies for network security | (ref: H04L63/0281)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)1.550
G06Q20/3276using a pictured code  e.g. barcode or QR-code  being read by the M-device1.545
H04L63/102Entity profiles1.545
G06F8/658Incremental updates| Differential updates1.544
G06F8/656while running1.544
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]1.542
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)1.542
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage1.536
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards1.536
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)1.518
H04L9/0819Key transport or distribution  i.e. key establishment techniques where one party creates or otherwise obtains a secret value  and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062)1.514
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals1.505
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)1.505
G06F21/645using a third party1.503
H04N21/4353involving decryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)1.503
G06F21/16Program or content traceability  e.g. by watermarking | digital watermarking on images | (ref: H04N1/32)1.503
G06F21/6245Protecting personal data  e.g. for financial or medical purposes1.500
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD1.500
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)1.493
H04L63/0815providing single-sign-on or federations1.492
G06Q20/401Transaction verification1.492
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint1.492
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC1.489
H04W12/06Authentication1.489
G06K5/04Verifying the alignment of markings1.489
G07F7/0893the card reader reading the card in a contactless manner1.489
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords1.489
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)1.489
H04L9/3271using challenge-response1.489
H04W12/12Fraud detection1.489
H04W12/10Integrity1.489
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)1.482
G06F21/33using certificates1.482
H04W12/04Key management1.481
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding1.475
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)1.472
G06Q30/0255based on user history1.472
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)1.471
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database1.471
G06Q20/4012Verifying personal identification number [PIN]1.469
G06T11/002D [Two Dimensional] image generation1.467
H04R25/55using an external connection  either wireless or wired1.466
H04L67/32for scheduling or organising the servicing of application requests  e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources | computer conference arrangements | (ref: H04L12/1813)| | broadcast or conference with schedule organisation | (ref: H04L12/1881)| | network service management  ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | intermediate grouping or aggregating of service requests | (ref: H04L67/2833)1.466
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.465
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)1.462
H04L9/3247involving digital signatures1.462
G06F21/608Secure printing1.462
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)1.462
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints1.459
H04L61/1511using domain name system [DNS]1.459
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)1.459
H04L9/321involving a third party or a trusted authority1.458
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics1.458
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication1.458
G10L17/00Speaker identification or verification1.457
G10L17/04Training  enrolment or model building1.457
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying1.457
G06F9/44521Dynamic linking or loading| Link editing at or after load time  e.g. Java class loading1.456
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files1.456
G06F9/451Execution arrangements for user interfaces1.456
G06F9/4451User profiles  roaming | user profiles for network-specific applications | (ref: H04L67/306)1.456
H04L63/123received data contents  e.g. message integrity1.452
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself1.447
H04L67/22Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)| | e-commerce | (ref: G06Q30/00)1.446
H04L29/06characterised by a protocol1.446
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)1.446
G06Q20/3829involving key management1.444
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)1.444
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)1.444
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)1.442
H04L9/085Secret sharing or secret splitting  e.g. threshold schemes1.441
G06F9/54Interprogram communication1.439
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)1.439
G06Q20/354Card activation or deactivation1.438
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]1.435
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.435
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)1.433
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.430
H04L63/104Grouping of entities1.430
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)1.428
G06Q20/3226Use of secure elements separate from M-devices1.428
H04L67/2842for storing data temporarily at an intermediate stage  e.g. caching | distributed storage of data in a network | (ref: H04L67/1097)| | browsing optimization of access to content by caching | (ref: G06F17/30902)| | addressing of a cache within a hierarchically structured memory system | (ref: G06F12/0802)| | disk caching | (ref: G06F12/0866)1.427
H04L29/06095Special adaptations or provisions of the transmission control protocol/internet protocol [TCP/IP] or the user datagram protocol [UDP] | flow control in data switching networks in general | (ref: H04L47/10)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP | (ref: H04W80/04)1.427
H04L63/1425Traffic logging  e.g. anomaly detection1.426
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)1.422
H04N21/23406involving management of server-side video buffer1.422
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)1.421
H04L67/2819Enhancement of application control based on intercepted application data1.420
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)1.420
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)1.420
G06Q50/01Social networking1.420
H04L51/32Messaging within social networks1.420
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy1.419
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.419
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)1.418
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences1.417
G06F9/452Remote windowing  e.g. X-Window System  desktop virtualisation | protocols for telewriting | (ref: H04L67/38)1.415
H04L63/126the source of the received data1.412
G06Q20/3224Transactions dependent on location of M-devices1.407
H04L65/4053without floor control1.406
G06F21/44Program or device authentication1.405
H04L63/0485Networking architectures for enhanced packet encryption processing  e.g. offloading of IPsec packet processing or efficient security association look-up1.404
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols1.403
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity1.402
H04W12/02Protecting privacy or anonymity1.402
H04N21/2187Live feed1.398
H04N21/44016involving splicing one content stream with another content stream  e.g. for substituting a video clip1.398
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)1.397
H04W12/08Access security1.392
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine1.389
H04L9/008involving homomorphic encryption1.386
H04L9/3066involving algebraic varieties  e.g. elliptic or hyper-elliptic curves1.386
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model1.386
H04W8/183Processing at user equipment or user record carrier1.386
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits1.386
G06Q20/352Contactless payments by cards1.381
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip1.381
G06Q20/3674involving authentication1.381
H04L9/3278using physically unclonable functions [PUF]1.381
G06F21/73by creating or determining hardware identification  e.g. serial numbers1.381
G06Q20/38215Use of certificates or encrypted proofs of transaction rights1.381
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity1.380
H04L67/143provided for session termination  e.g.  event controlled end of session1.379
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence1.379
G06Q10/103Workflow collaboration or project management1.379
H04L67/16Service discovery or service management  e.g. service location protocol [SLP] or Web services | network service management for ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | address allocation to terminals or nodes connected to a network | (ref: H04L61/30)| | mobile application services specially adapted for wireless communication networks | (ref: H04W4/00)1.375
H04L67/1002for accessing one among a plurality of replicated servers  e.g. load balancing | arrangements or protocols for peer-to-peer networking | (ref: H04L67/104)| | protocols for client-server architectures | (ref: H04L67/42)| | allocation of processing resources to service requests in a distributed system | (ref: G06F9/5027)| | rebalancing the processing load in a distributed system | (ref: G06F9/5083)| | wireless network traffic load balancing | (ref: H04W28/08)| | network load balancing  traffic engineering | (ref: H04L47/125)| | video servers using load balancing strategies | (ref: H04N21/23103)|1.375
H04L67/42Protocols for client-server architectures | access to replicated servers | (ref: H04L67/1002)1.375
G06Q10/107Computer aided management of electronic mail | electronic mail protocols | (ref: H04L29/06)| | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)1.373
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)1.372
H04N21/4725using interactive regions of the image  e.g. hot spots | details of information retrieval from the Internet by using URLs | (ref: G06F17/30876)| | processing chained hypermedia data for information retrieval | (ref: G06F17/30014)1.372
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]1.372
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules1.372
H04L12/1818Conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources  notifying involved parties1.370
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)1.370
H04L51/24with notification on incoming messages1.368
H04L9/3257using blind signatures1.367
H04L51/16including conversation history  e.g. threads1.367
H04L51/046interacting with other applications or services1.366
G06F8/71Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management1.366
G06F21/575Secure boot1.365
G06F21/31User authentication1.364
H04N21/26258for generating a list of items to be played back in a given order  e.g. playlist  or scheduling item distribution according to such list | retrieval of multimedia data based on playlists | (ref: G06F17/30017)1.363
H04N21/4668for recommending content  e.g. movies1.362
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key1.359
G06F21/42using separate channels for security data1.359
G06F21/41where a single sign-on provides access to a plurality of computers1.359
H04L63/14for detecting or protecting against malicious traffic1.358
G06F21/128involving web programs  i.e. using technology especially used in internet  generally interacting with a web browser  e.g. hypertext markup language [HTML]  applets  java1.357
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)1.355
H04L51/00Arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages1.353
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)1.352
G06N5/022Knowledge engineering  knowledge acquisition1.349
H04N21/8456by decomposing the content in the time domain  e.g. in time segments1.349
H04L67/2847involving pre-fetching or pre-delivering data based on network characteristics | cache prefetching within a hierarchical structured memory system | (ref: G06F12/0862)1.349
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)1.349
G10L15/22Procedures used during a speech recognition process  e.g. man-machine dialogue1.347
H04N21/2335involving reformatting operations of audio signals  e.g. by converting from one coding standard to another | details of audio signal transcoding | (ref: G10L19/173)1.347
H04L51/02with automatic reactions or user delegation  e.g. automatic replies or chatbot1.347
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM] | network arrangements or protocols for real-time communications | (ref: H04L65/00)1.346
G06F13/385for adaptation of a particular data processing system to different peripheral devices1.346
G06K7/10297arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs  e.g. ISO/IEC 14443 and 18092 | protocols for data communication in general  | see|  | (ref: H04L29/06)1.346
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]1.346
H04L63/166at the transport layer1.345
H04L9/3236using cryptographic hash functions1.345
H04L67/26Push based network services | broadcast or multicast push services | (ref: H04L12/1859)1.344
G06F3/167Audio in a user interface  e.g. using voice commands for navigating  audio feedback1.344
H04W48/18Selecting a network or a communication service1.343
H04W24/02Arrangements for optimising operational condition1.343
G06Q20/3825Use of electronic signatures1.341
G06Q20/24Credit schemes  i.e. "pay after"1.341
G06Q20/0855involving a third party1.341
G06F3/0483interaction with page-structured environments  e.g. book metaphor1.339
H04L67/18in which the network application is adapted for the location of the user terminal | wireless application services making use of the location of users or terminals | (ref: H04W4/02)|  takes precedence| location based Web retrieval | (ref: G06F17/3087)1.338
H04L67/148provided for migration or transfer of sessions | in-session procedures in real-time communications | (ref: H04L65/1083)| | control or signalling for completing the hand-off in wireless networks | (ref: H04W36/0005)1.338
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks1.335
H04L65/403Arrangements for multiparty communication  e.g. conference | television conferencing systems | (ref: H04N7/15)| | telephonic conference systems | (ref: H04M3/56)| | data switching systems for computer conference | (ref: H04L12/1813)1.334
H04N7/147Communication arrangements  e.g. identifying the communication as a video-communication  intermediate storage of the signals | selecting | (ref: H04Q)1.334
H04L67/306User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867)1.334
G06F21/445by mutual authentication  e.g. between devices or programs1.334
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals1.334
H04L65/4076Multicast or broadcast | data switching systems for broadcast or conference | (ref: H04L12/18)| | analog television systems in general | (ref: H04N7/00)| | creating video channels for a dedicated end-user group | (ref: H04N21/2668)| | arrangements for broadcast or distribution combined with broadcast | (ref: H04H20/00)| | arrangements for broadcast applications with a direct linkage of broadcast information | (ref: H04H60/00)| | arrangements for push based network services | (ref: H04L67/26)1.333
H04N21/47202for requesting content on demand  e.g. video on demand1.331
H04N21/41422located in transportation means  e.g. personal vehicle | arrangements specially adapted for transportation systems in broadcast systems | (ref: H04H20/62)1.331
G06Q50/10Services1.328
G06Q20/4014Identity check for transaction1.328
G06Q30/0185Product  service or business identity fraud1.328
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)1.326
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)1.326
G06F21/335for accessing specific resources  e.g. using Kerberos tickets1.324
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)1.323
H04L63/1416Event detection  e.g. attack signature detection1.323
H04W76/45for Push-to-Talk [PTT] or Push-to-Talk over cellular [PoC] services1.322
H04W4/10Push-to-Talk [PTT] or Push-On-Call services1.322
H04N21/4312involving specific graphical features  e.g. screen layout  special fonts or colors  blinking icons  highlights or animations1.320
G06Q20/0658e-cash managed locally1.320
G06Q30/0214Referral award systems1.320
H04L12/185with management of multicast group membership1.320
H04W4/08User group management1.320
H04L67/2823for conversion or adaptation of application content or format | message adaptation based on network or terminal capabilities | (ref: H04L51/06)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)| | optimising visualization of content for web browsing | (ref: G06F17/30905)1.319
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)1.317
H04N21/2183Cache memory | caches in web servers or browsers | (ref: G06F17/30902)| | intermediate storage and caching in data networks | (ref: H04L29/08801)1.316
H04N21/4331Caching operations  e.g. of an advertisement for later insertion during playback1.316
H04L65/105Proxies  e.g. SIP proxies1.315
H04N21/222Secondary servers  e.g. proxy server  cable television Head-end | intermediate processing or storage in data networks | (ref: H04L29/08702)1.315
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode1.315
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems1.313
G06F3/0482interaction with lists of selectable items  e.g. menus1.313
H04L67/101based on network conditions1.311
H04L65/4084Content on demand | analog television systems using two way working | (ref: H04N7/173)| | end-user applications for requesting content  additional data or services | (ref: H04N21/472)1.311
H04L65/604at the destination | reformatting of video signals in video clients | (ref: H04N21/4402)| | reformatting of additional data in video clients | (ref: H04N21/4355)1.309
H04N21/2743Video hosting of uploaded data from client1.309
H04L67/08adapted for terminal emulation  e.g. telnet | protocols for telewriting or protocols for networked simulations  virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455)1.308
G06Q20/4018using the card verification value [CVV] associated with the card1.308
G06F21/606by securing the transmission between two devices or processes1.307
G06F17/40Data acquisition and logging | for input to computer | (ref: G06F3/00)|   | | displays as computer output | (ref: G06F3/14)| | for image data processing | (ref: G06T9/00)| | compression in general | (ref: H03M7/30)| | for transmission | (ref: H04B1/66)| | for pictorial communication | (ref: H04N)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station | (ref: H04Q9/00)1.307
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)1.305
H04L9/0833involving conference or group key | network architectures or network communication protocols for key management in group communication in a packet data network | (ref: H04L63/065)1.305
G09C5/00Ciphering apparatus or methods not provided for in the preceding groups  e.g. involving the concealment or deformation of graphic data such as designs  written or printed messages1.305
G06F7/76Arrangements for rearranging  permuting or selecting data according to predetermined rules  independently of the content of the data | according to the content of the data | (ref: G06F7/06)|   | (ref: G06F7/22)| | parallel / series conversion or | vice versa|  | (ref: H03M9/00)1.304
H04W48/08Access restriction or access information delivery  e.g. discovery data delivery1.304
H04L63/0272Virtual private networks1.303
G06F3/04886by partitioning the screen or tablet into independently controllable areas  e.g. virtual keyboards  menus | (ref: G06F3/04883)|  takes precedence1.300
H04L67/2814for data redirection | load balancing of replicated servers | (ref: H04L67/1002)| | access network selection | (ref: H04L12/5691)| | routing or path finding of packets | (ref: H04L45/00)| | content or context based routing | (ref: H04L67/327)| | network addressing or naming provisions | (ref: H04L61/00)1.300
H04L9/0869involving random numbers or seeds1.299
H04L63/168above the transport layer1.298
H04N21/8133specifically related to the content  e.g. biography of the actors in a movie  detailed information about an article seen in a video program1.294
H04L47/828Allocation of resources per group of connections  e.g. per group of users1.293
G06Q10/0631Resource planning  allocation or scheduling for a business operation1.293
H04L41/0866Checking configuration1.291
H04L1/1845Combining techniques  e.g. code combining1.291
H04L63/0478applying multiple layers of encryption  e.g. nested tunnels or encrypting the content with a first key and then with at least a second key | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)1.291
H04L12/2807Exchanging configuration information on appliance services in a home automation network | adress allocation | (ref: H04L29/12207)| | arrangements for maintenance or administration involving network analysis for automatically determining the actual topology of a network | (ref: H04L41/12)| | hardware or software tools for network management using graphical user interfaces | (ref: H04L41/22)1.290
H04L12/2803Home automation networks1.290
G06Q20/36using electronic wallets or electronic money safes1.288
G06Q20/20Point-of-sale [POS] network systems | POS | per se|  | (ref: G07F)|  or | (ref: G07G)1.287
G06F3/04817using icons | graphical programming languages using iconic symbols | (ref: G06F8/34)1.285
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance1.285
H04N21/2665Gathering content from different sources  e.g. Internet and satellite1.285
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities1.284
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB1.280
G06Q20/223based on the use of peer-to-peer networks1.280
G06Q20/3678e-cash details  e.g. blinded  divisible or detecting double spending1.280
H04L43/14using software  i.e. software packages | network security related monitoring | (ref: H04L63/1408)1.280
H04N21/441Acquiring end-user identification | authentication in wireless communication networks | (ref: H04W12/06)| e.g. using personal code sent by the remote control or by inserting a card | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)1.279
H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card | arrangements for secret or secure communication | (ref: H04L9/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)|  | | security arrangements in wireless networks | (ref: H04W12/00)1.279
H04N21/4181for conditional access1.279
H04L67/327whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status  payload or application type1.278
H04L67/20involving third party service providers | e-commerce | (ref: G06Q30/00)1.278
A63F13/69by enabling or updating specific game elements  e.g. unlocking hidden features  items  levels or versions1.276
H04N21/4542Blocking scenes or portions of the received content  e.g. censoring scenes1.276
H04N21/63345by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | arrangements for network security key management | (ref: H04L29/06707)1.275
H04N21/25891being end-user preferences | retrieval of video data in a video database based on user preferences | (ref: G06F17/30843)| | arrangements for recognizing users' preferences | (ref: H04H60/46)| | protocols involving user profiles for network applications in communication control or processing | (ref: H04L29/08936)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)1.273
H04N21/482End-user interface for program selection | systems specially adapted for using EPGs in broadcast systems | (ref: H04H60/72)1.272
H04N21/8173End-user applications  e.g. Web browser  game1.272
G06T7/536from perspective effects  e.g. by using vanishing points1.272
G06T7/50Depth or shape recovery1.272
H04N21/4394involving operations for analysing the audio stream  e.g. detecting features or characteristics in audio streams | arrangements characterised by components specially adapted for monitoring  identification or recognition of audio in broadcast systems | (ref: H04H60/58)1.271
B64D11/0015Arrangements for entertainment or communications  e.g. radio  television1.271
H04B7/18506Communications with or from aircraft  i.e. aeronautical mobile service1.271
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)1.271
H04L67/36involving the display of network or application conditions affecting the network application to the application user | graphical user interfaces for network management | (ref: H04L41/22)1.271
H04L69/03Protocol definition or specification | protocol conformance testing | (ref: H04L1/244)| | specification techniques | (ref: G06F8/10)1.271
H04L41/0853by actively collecting or retrieving configuration information1.270
G06Q20/3274using a pictured code  e.g. barcode or QR-code  being displayed on the M-device1.269
H04L45/24Multipath1.268
G06Q20/405Establishing or using transaction specific rules1.268
H04L63/108when the policy decisions are valid for a limited amount of time1.268
H04N21/431Generation of visual interfaces | for content selection or interaction| Content or additional data rendering | receiver circuitry for displaying additional information | (ref: H04N5/445)| | interaction techniques for graphical user interfaces | (ref: G06F3/048)1.268
H04W4/12Messaging| Mailboxes| Announcements1.267
H04W8/18Processing of user or subscriber data  e.g. subscribed services  user preferences or user profiles| Transfer of user or subscriber data1.267
H04W4/16Communication-related supplementary services  e.g. call-transfer or call-hold1.267
H04L67/325whereby a time schedule is established for servicing the requests1.266
G06F9/44Arrangements for executing specific programs1.266
G06Q20/42Confirmation  e.g. check or permission by the legal debtor of payment1.266
G06F3/0346with detection of the device orientation or free movement in a 3D space  e.g. 3D mice  6-DOF [six degrees of freedom] pointers using gyroscopes  accelerometers or tilt-sensors1.266
G06F3/017Gesture based interaction  e.g. based on a set of recognized hand gestures | interaction based on gestures traced on a digitiser | (ref: G06F3/04883)1.266
A63F13/533for prompting the player  e.g. by displaying a game menu1.265
H04H60/372Programme1.265
H04N21/4318by altering the content in the rendering process  e.g. blanking  blurring or masking an image region | image enhancement or restoration in general | (ref: G06T5/00)1.265
G06Q30/0215Including financial accounts1.264
G06K9/6267Classification techniques1.259
G06K7/14172D bar codes1.258
G06Q10/087Inventory or stock management  e.g. order filling  procurement  balancing against orders1.258
G06F21/121Restricting unauthorised execution of programs1.258
H04L9/3252using DSA or related signature schemes  e.g. elliptic based signatures  ElGamal or Schnorr schemes1.257
G06F21/6254by anonymising data  e.g. decorrelating personal data from the owner's identification1.257
H04W8/04Registration at HLR or HSS [Home Subscriber Server]1.257
H04W88/04adapted for relaying to or from another terminal or user1.257
H04L65/1006SIP1.256
H04L65/1066Session control | conducting a computer conference  e.g. admission  detection  selection or grouping of participants  correlating users to one or more conference session or prioritising transmission  | (ref: H04L12/1822)| | admission control/resource reservation in packet switching networks | (ref: H04L47/70)1.256
H04L65/1069Setup | computer conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources or notifying involved parties | (ref: H04L12/1818)| | admission control or resource reservation in packet switching networks | (ref: H04L47/70)| | arrangements for peer-to-peer networking in network applications | (ref: H04L67/104)| | session management in network applications | (ref: H04L67/14)| | negotiation of communication capabilities | (ref: H04L69/24)1.256
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]1.255
H04W60/04using triggered events1.255
G07F11/62in which the articles are stored in compartments in fixed receptacles1.255
G06Q10/0836Central recipient pick-ups1.255
G10L15/1822Parsing for meaning understanding1.254
H04L9/0872using geo-location information  e.g. location data  time  relative position or proximity to other entities1.252
G06Q10/02Reservations  e.g. for tickets  services or events1.252
G06F7/582Pseudo-random number generators1.252
G06F21/88Detecting or preventing theft or loss1.251
G06F21/604Tools and structures for managing or administering access control systems1.251
H04M3/527Centralised call answering arrangements not requiring operator intervention1.249
G06Q30/0283Price estimation or determination1.248
G06Q20/123Shopping for digital content1.248
G06Q20/1235with control of digital rights management [DRM]1.248
H04R25/558Remote control  e.g. of amplification  frequency | remote control of amplifications  tone  or bandwidth | (ref: H03G1/02)| | remote control  e.g. for Hi-Fi systems or audio/video combinations | (ref: H04B1/202)| | remote control in general | (ref: G05F)1.248
H04R25/50Customised settings for obtaining desired overall acoustical characteristics1.248
H04L51/28Details regarding addressing issues | arrangements and protocols for addressing and naming | (ref: H04L61/00)1.246
H04L9/0841involving Diffie-Hellman or related key agreement protocols1.246
H04N21/84Generation or processing of descriptive data  e.g. content descriptors | systems specially adapted for using meta-information in broadcast systems | (ref: H04H60/73)1.245
G06F12/0862with prefetch1.245
H04L63/1458Denial of Service1.244
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks1.243
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]1.243
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]1.243
G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction1.242
H04L9/3218using proof of knowledge  e.g. Fiat-Shamir  GQ  Schnorr  ornon-interactive zero-knowledge proofs1.242
H04L61/6054International mobile subscriber identity [IMSI] numbers1.241
G07C9/00174Electronically operated locks| Circuits therefor| Nonmechanical keys therefor  e.g. passive or active electrical keys or other data carriers without mechanical keys | mechanical locks with electric permutation | (ref: E05B49/00)| | arrangements for sensing or reading record carriers | (ref: G06K7/00)|   | (ref: G06K9/00)| | electronic switching | (ref: H03K17/00)1.241
G06F11/3684for test design  e.g. generating new test cases1.241
G06F3/0238Programmable keyboards | key guide holders | (ref: G06F3/0224)1.241
G06Q20/387Payment using discounts or coupons | relating to marketing | (ref: G06Q30/02)1.241
G07B15/02taking into account a variable factor such as distance or time  e.g. for passenger transport  parking systems or car rental systems | (ref: G07B15/06)|  takes precedence| taximeters | (ref: G07B13/00)| | parking meters | per se|  | (ref: G07F17/24)| | | car rental systems | per se|  | (ref: G07B15/00)1.241
G06Q50/30Transportation| Communications1.241
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour1.240
H04L63/105Multiple levels of security1.238
H04N21/23424involving splicing one content stream with another content stream  e.g. for inserting or substituting an advertisement1.237
B60W50/06Improving the dynamic response of the control system  e.g. improving the speed of regulation or avoiding hunting or overshoot1.237
H04L12/283Processing of data at an internetworking point of a home automation network1.237
G10L15/30Distributed recognition  e.g. in client-server systems  for mobile phones or network applications1.237
H04W28/10Flow control | between communication endpoints1.236
H04N21/454Content or additional data filtering  e.g. blocking advertisements | filtering and selective blocking of messages over packet-switching networks | (ref: H04L51/12)1.234
H04N21/4825using a list of items to be played back in a given order  e.g. playlists1.234
H04N21/2662Controlling the complexity of the video stream  e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities1.234
H04N21/25825involving client display capabilities  e.g. screen resolution of a mobile phone | optimising the visualisation of content during browsing in the Internet | (ref: G06F17/30905)| | processing of terminal status or physical abilities in wireless networks | (ref: H04W8/22)| | authentication in wireless network security | (ref: H04W12/06)1.234
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds1.234
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)1.234
G06F21/35communicating wirelessly1.234
H04L63/0838using one-time-passwords1.231
H04W48/16Discovering  processing access restriction or access information1.231
H04W36/0016for hand-off preparation1.231
G06F3/0622in relation to access1.231
G06F9/45533Hypervisors| Virtual machine monitors1.231
G06F9/45558Hypervisor-specific management and integration aspects1.231
G06Q30/0609Buyer or seller confidence or verification1.229
G06Q30/0621Item configuration or customization1.228
G06Q30/0641Shopping interfaces1.228
H04M3/42042Notifying the called party of information on the calling party | details within substation equipment | (ref: H04M1/57)|   signalling details | (ref: H04Q3/72)1.226
G06F3/04847Interaction techniques to control parameter settings  e.g. interaction with sliders  dials1.226
G06F9/542Event management| Broadcasting| Multicasting| Notifications1.226
H04L63/101Access control lists [ACL]1.225
G06F11/26Functional testing1.224
G06F21/577Assessing vulnerabilities and evaluating computer system security1.224
G06F21/72in cryptographic circuits1.224
G06Q20/322Aspects of commerce using mobile devices [M-devices]1.223
G06Q20/3223Realising banking transactions through M-devices1.223
B60R25/24using electronic identifiers containing a code not memorised by the user1.223
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]1.223
A63F13/75Enforcing rules  e.g. detecting foul play or generating lists of cheating players1.223
A63F13/792for payment purposes  e.g. monthly subscriptions1.223
G06Q30/0277Online advertisement1.223
H04L9/3255using group based signatures  e.g. ring or threshold signatures1.223
G06F21/85interconnection devices  e.g. bus-connected or in-line devices1.222
H04N21/25808Management of client data | protocols involving terminal profiles for network applications in communication control or processing | (ref: H04L29/08927)1.221
G06F9/5072Grid computing1.221
G06T19/006Mixed reality | object pose determination  tracking or camera calibration for mixed reality | (ref: G06T7/00)1.221
G06T11/60Editing figures and text| Combining figures or text1.221
H04N21/23439for generating different versions1.220
H04N21/4755for defining user preferences  e.g. favourite actors or genre | retrieval personalisation and generation of user profiles for the retrieval of video data | (ref: G06F17/30843)| | data switching network applications using user profiles | (ref: H04L29/08936)1.220
G16H80/00ICT specially adapted for facilitating communication between medical practitioners or patients  e.g. for collaborative diagnosis  therapy or health monitoring1.219
G16H20/10relating to drugs or medications  e.g. for ensuring correct administration to patients1.219
H04L12/189in combination with wireless systems | selective distribution or broadcast in wireless communication networks | (ref: H04W4/06)1.218
A63F13/34using peer-to-peer connections1.218
H04N1/00307with a mobile telephone apparatus | constructional features of portable telephone sets | (ref: H04M1/0202)| | mobile radio systems | (ref: H04W84/00)1.218
G06T13/40of characters  e.g. humans  animals or virtual beings1.217
H04N5/2628Alteration of picture size  shape  position or orientation  e.g. zooming  rotation  rolling  perspective  translation1.217
H04L9/0847involving identity based encryption [IBE] schemes1.217
G06Q30/0643Graphical representation of items or shoppers1.216
G06Q20/3278RFID or NFC payments by means of M-devices1.216
H04L51/14with selective forwarding1.214
H04L45/22Alternate routing1.213
G06Q30/06Buying  selling or leasing transactions1.213
H04L12/2834Switching of information between an external network and a home network | access arrangements | (ref: H04L12/2856)1.212
H04W88/16Gateway arrangements1.212
H04N21/23106involving caching operations | prefetching while addressing of a memory level in which the access to the desired data or data block requires associative addressing means within memory systems or architectures | (ref: G06F12/0862)| | caching at an intermediate stage in a data network | (ref: H04L29/08801)1.212
G06Q30/0246Traffic1.212
G06Q30/0251Targeted advertisement1.212
H04N21/42203sound input device  e.g. microphone1.211
H04W60/00Registration  e.g. affiliation to network| De-registration  e.g. terminating affiliation1.211
H04N21/4302Content synchronization processes  e.g. decoder synchronization1.211
H04L67/1082involving incentive schemes1.210
G06Q40/12Accounting1.210
H04N21/2146located in mass transportation means  e.g. aircraft  train or bus | flight-deck installations for entertainment or communications | (ref: B64D11/0015)| | arrangements specially adapted for transportation systems in broadcast systems | (ref: H04H20/62)| | moving wireless networks | (ref: H04W84/005)1.209
G06F3/162Interface to dedicated audio devices  e.g. audio drivers  interface to CODECs1.209
G06F9/546Message passing systems or structures  e.g. queues1.208
H04W28/08Load balancing or load distribution1.208
G06Q50/26Government or public services1.208
G06F3/165Management of the audio stream  e.g. setting of volume  audio stream path1.207
H04N5/60for the sound signals | for silent tuning  i.e. muting | (ref: H04N5/505)1.207
H04L41/0806for initial configuration or provisioning1.207
G06Q20/3823combining multiple encryption tools for a transaction1.207
G06Q20/12specially adapted for electronic shopping systems1.207
B60R25/2018Central base unlocks or authorises unlocking1.206
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)1.206
G06F21/36by graphic or iconic representation1.205
A63F13/358Adapting the game course according to the network or server load  e.g. for reducing latency due to different connection speeds between clients1.205
A63F13/355Performing operations on behalf of clients with restricted processing capabilities  e.g. servers transform changing game scene into an MPEG-stream for transmitting to a mobile phone or a thin client1.205
G06F12/0253Garbage collection  i.e. reclamation of unreferenced memory1.205
G06F12/0238Memory management in non-volatile memory  e.g. resistive RAM or ferroelectric memory1.205
G06F9/541via adapters  e.g. between incompatible applications1.204
G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data | for medical reports | (ref: G16H15/00)| | for therapies or health-improving plans | (ref: G16H20/00)| | for the handling or processing of medical images | (ref: G16H30/00)1.204
G16H10/60for patient-specific data  e.g. for electronic patient records1.204
H04N21/4316for displaying supplemental content in a region of the screen  e.g. an advertisement in a separate window1.204
H04N21/41415involving a public display  viewable by several users in a public space outside their home  e.g. movie theatre  information kiosk1.204
H04N21/8352involving content or source identification data  e.g. Unique Material Identifier [UMID]1.203
G06F21/76in application-specific integrated circuits [ASICs] or field-programmable devices  e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs]1.202
H04N21/25841involving the geographical location of the client | retrieval from the Internet by querying based on geographical locations | (ref: G06F17/3087)| | arrangements for identifying locations of receiving stations in broadcast systems | (ref: H04H60/51)| | protocols in which the network application is adapted for the location of the user terminal in communication control or processing | (ref: H04L29/08657)| | services making use of the location of users or terminals in wireless networks | (ref: H04W4/02)| | locating users or terminals in wireless networks | (ref: H04W64/00)1.202
H04N21/2541Rights Management | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)1.202
H04L9/003for power analysis  e.g. differential power analysis [DPA] or simple power analysis [SPA]1.202
H04L9/0822using key encryption key1.201
H04W8/20Transfer of user or subscriber data1.201
H04W8/205Transfer to or from user equipment or user record carrier1.201
H04N21/43635HDMI1.201
H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence  e.g. one-time-pad [OTP] or Vernam's cipher1.201
H04L63/0263Rule management1.200
H04L47/10Flow control or congestion control1.200
G06Q20/4016involving fraud or risk level assessment in transaction processing1.197
H04W76/10Connection setup1.197
H04N21/6543for forcing some client operations  e.g. recording | remote booting in general | (ref: G06F9/4416)1.197
G11B27/10Indexing| Addressing| Timing or synchronising| Measuring tape travel1.197
H04N21/8106involving special audio data  e.g. different tracks for different languages1.196
H04N21/4307Synchronizing display of multiple content streams  e.g. synchronisation of audio and video output or enabling or disabling interactive icons for a given period of time1.196
H04N21/8547involving timestamps for synchronizing content1.196
H04L65/1073Registration | arrangements for addressing or naming in data networks | (ref: H04L61/00)1.196
G06F21/12Protecting executable software1.196
G06Q20/327Short range or proximity payments by means of M-devices1.195
H04W8/26Network addressing or numbering for mobility support1.195
H04W8/186Processing of subscriber group data1.195
G06F3/147using display panels1.195
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes1.195
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)1.193
G06F1/1656Details related to functional adaptations of the enclosure  e.g. to provide protection against EMI  shock  water  or to host detachable peripherals like a mouse or removable expansions units like PCMCIA cards  or to provide access to internal components for maintenance or to removable storage supports like CDs or DVDs  or to mechanically mount accessories | mounting of accessories to a computer display | (ref: G06F1/1607)| | display hoods | (ref: G06F1/1603)| | cooling arrangements for portable computers | (ref: G06F1/203)1.193
H04R1/02Casings| Cabinets | | Supports therefor||  Mountings therein | (ref: H04R1/28)|  takes precedence | | attachments for microphones | (ref: H04R1/08)| | mounting of transducers in earpieces | (ref: H04R1/1075)1.193
H04N5/23219where the recognized objects include parts of the human body  e.g. human faces  facial parts or facial expressions1.193
G06F3/011Arrangements for interaction with the human body  e.g. for user immersion in virtual reality | for handicapped people in general | (ref: A61F4/00)| | robot control | (ref: B25J)| | tactile signalling | (ref: G08B)| | blind teaching | (ref: G09B21/00)| | for electrophonic musical instruments | (ref: G10H1/344)| | electronic switches characterised by the way in which the control signals are generated | (ref: H03K17/94)1.192
G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer  e.g. network details  transfer of information from host to ECR or from ECR to ECR1.191
H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture| Specification of modified or new header fields | protocols engines in general | (ref: H04L69/12)| | OSI stack based layering aspects | (ref: H04L69/32)| | protocol header analysis in general | (ref: H04L69/22)| | addressing aspects in multiple interfaces involving dual-stack hosts | (ref: H04L61/6086)1.190
H04L41/0645by additionally acting on or stimulating the network after receiving notifications1.190
G06F9/5038considering the execution order of a plurality of tasks  e.g. taking priority or time dependency constraints into consideration | scheduling strategies | (ref: G06F9/4881)|  and subgroups1.189
G06F9/48Program initiating| Program switching  e.g. by interrupt1.189
H04L41/0226Mapping or translation of multiple network management protocols1.189
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)1.189
H04L45/306Route determination based on the nature of the carried application | communications protocols whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status | (ref: H04L67/327)1.189
H04L29/08081Protocols for network applications | protocols for multimedia communication | (ref: H04L29/06027)| | protocols for telewriting | (ref: H04L29/06034)| | message switching systems | (ref: H04L51/00)1.188
H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof1.188
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)1.188
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities1.188
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms1.188
G06F8/20Software design1.188
G06F8/33Intelligent editors1.188
G06Q30/0623Item investigation1.187
H04L65/605intermediate1.187
G06F9/3005to perform operations for flow control1.187
H04L67/2833for grouping or aggregating service requests  e.g. for unified processing of service requests | networking arrangements or communication protocols for scheduling or organising the servicing of application requests | (ref: H04L67/32)1.187
H04W4/50Service provisioning or reconfiguring1.186
H04L51/12with filtering and selective blocking capabilities1.185
G06Q20/363with the personal data files for a user1.183
G06Q20/351Virtual cards1.182
H04N21/439Processing of audio elementary streams1.182
G11B27/034on discs | (ref: G11B27/036)|   | (ref: G11B27/038)|  take precedence1.181
A63F13/87Communicating with other players during game play  e.g. by e-mail or chat1.180
G10L13/033Voice editing  e.g. manipulating the voice of the synthesiser1.180
A63F13/54involving acoustic signals  e.g. for simulating revolutions per minute [RPM] dependent engine sounds in a driving game or reverberation against a virtual wall1.180
H04W8/24Transfer of terminal data1.179
G06F21/45Structures or tools for the administration of authentication1.179
G06F21/629to features or functions of an application1.179
H04W4/44for communication between vehicles and infrastructures  e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]1.178
H04L67/2852involving policies or rules for updating  deleting or replacing the stored data based on network characteristics | replacement control in memory systems | (ref: G06F12/12)1.176
H04N21/435Processing of additional data  e.g. decrypting of additional data  reconstructing software from modules extracted from the transport stream1.176
H04N21/2356by altering the spatial resolution1.176
H04L67/38Protocols for telewriting| Protocols for networked simulations  virtual reality or games | games using an electronically generated display | (ref: A63F13/00)| | remote windowing or X-Windows | (ref: G06F9/452)1.176
H04L67/147provided for signalling methods or particular messages providing extensions to IETF  ITU  ETSI or 3GPP protocols  e.g.  additional proprietary messages  standard messages enhanced by additional header fields or standard messages being used for purposes other than originally intended1.175
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals1.175
G11B27/34Indicating arrangements | indicating measured values in general | (ref: G01D)|  | indicating means incorporated in magazine or cassette | (ref: G11B23/046)|  and | (ref: G11B23/0875)1.174
G06F3/04855Interaction with scrollbars1.174
G16H70/20relating to practices or guidelines1.173
G06N5/04Inference methods or devices1.173
G06F9/45504Abstract machines for programme code execution  e.g. Java virtual machine [JVM]  interpreters  emulators1.172
H04L45/02Topology update or discovery | topology discovery for network management | (ref: H04L41/12)| | LAN interconnection over a backbone network | (ref: H04L12/4604)| | node-based peer discovery mechanisms in peer-to-peer networks | (ref: H04L67/1061)1.172
H04L41/22using GUI [Graphical User Interface]1.171
A63F13/79involving player-related data  e.g. identities  accounts  preferences or play histories1.170
A63F13/86Watching games played by other players1.170
G06Q20/40145Biometric identity checks1.170
G06N3/08Learning methods1.170
G06F21/552involving long-term monitoring or reporting1.169
G06F12/0811with multilevel cache hierarchies1.168
G06F12/0866for peripheral storage systems  e.g. disk cache1.168
G06Q30/0271Personalized advertisement1.167
G06Q30/0242Determination of advertisement effectiveness1.167
G06Q20/02involving a neutral party  e.g. certification authority  notary or trusted third party [TTP]1.167
G06Q20/0655e-cash managed centrally1.165
G06Q20/065using e-cash1.165
G06Q30/0275Auctions1.165
G06Q30/0257User requested1.165
G06Q20/3567Software being in the reader1.165
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL1.165
H04N21/2402Monitoring of the downstream path of the transmission network  e.g. bandwidth available | traffic monitoring in data switching networks | (ref: H04L43/00)| | monitoring data switching networks utilization | (ref: H04L43/0876)1.164
H04N21/2353specifically adapted to content descriptors  e.g. coding  compressing or processing of metadata1.164
H04L43/0876Network utilization1.164
H04L67/40Protocols for remote procedure calls [RPC] | remote procedure calls | (ref: G06F9/547)1.164
G07C9/00571operated by interacting with a central unit1.164
G07C9/00896specially adapted for particular uses1.164
H04N21/47217for controlling playback functions for recorded or on-demand content  e.g. using progress bars  mode or play-point indicators or bookmarks | specific graphical features in visual interfaces | (ref: H04N21/4312)1.163
G06F3/038Control and interface arrangements therefor  e.g. drivers or device-embedded control circuitry1.162
G06F8/61Installation1.162
H04L41/0893Assignment of logical groupings to network elements| Policy based network management or configuration1.162
G16H30/40for processing medical images  e.g. editing1.162
G16H10/20for electronic clinical trials or questionnaires1.162
G06Q30/0645Rental  i.e. leasing1.162
H04L63/0245Filtering by information in the payload1.161
G05B19/4155characterised by programme execution  i.e. part programme or machine function execution  e.g. selection of a programme1.160
G06Q30/0201Market data gathering  market analysis or market modelling1.160
G08G1/0112from the vehicle  e.g. floating car data [FCD]1.160
G06Q50/265Personal security  identity or safety1.160
G06K9/6256Obtaining sets of training patterns| Bootstrap methods  e.g. bagging  boosting1.159
G06F11/3414Workload generation  e.g. scripts  playback1.159
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC1.158
G07B15/06Arrangements for road pricing or congestion charging of vehicles or vehicle users  e.g. automatic toll systems1.158
G06Q30/0207Discounts or incentives  e.g. coupons  rebates  offers or upsales1.158
G06Q30/0233Method of redeeming a frequent usage reward1.158
G06Q10/00Administration| Management1.158
B60W30/08Active safety systems|  predicting or avoiding probable or impending collision | or attempting to minimise its consequences1.158
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it1.157
G06F21/46by designing passwords or checking the strength of passwords1.156
H04N7/15Conference systems | video terminal details | (ref: H04N7/141)|  | telephonic conference arrangements | (ref: H04M3/56)| | | computer conferencing | (ref: H04L12/1813)1.155
H04L41/082due to updating or upgrading of network functionality  e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02)1.155
G06Q30/016Customer service  i.e. after purchase service1.155
G06Q10/0875Itemization of parts  supplies  or services  e.g. bill of materials1.155
H04W88/12Access point controller devices1.154
G06T19/20Editing of 3D images  e.g. changing shapes or colours  aligning objects or positioning parts1.154
H04N21/23418involving operations for analysing video streams  e.g. detecting features or characteristics | filtering for image enhancement | (ref: G06T5/00)| | methods or arrangements for recognising scenes | (ref: G06K9/00624)| | arrangements characterised by components specially adapted for monitoring  identification or recognition of video in broadcast systems | (ref: H04H60/59)| | television picture signal circuitry for scene change detection | (ref: H04N5/147)1.154
E05B47/026the bolt moving rectilinearly1.153
B33Y50/00Data acquisition or data processing for additive manufacturing1.153
H04L51/08Messages including annexed information  e.g. attachments1.153
H04M3/42382Text-based messaging services in telephone networks such as PSTN/ISDN  e.g. User-to-User Signalling or Short Message Service for fixed networks1.153
G06Q10/063114Status monitoring or status determination for a person or group1.153
G10L17/06Decision making techniques| Pattern matching strategies1.152
G10L15/08Speech classification or search1.152
G06F3/0637Permissions1.150
G06F12/1466Key-lock mechanism1.150
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)1.150
H04L69/165involving combined use or selection criteria between TCP and UDP protocols | multi-protocol arrangements in general | (ref: H04L69/18)| | multilink protocols in general | (ref: H04L69/14)1.150
A63F13/26having at least one additional display device  e.g. on the game controller or outside a game booth1.150
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.148
G11B31/00Arrangements for the associated working of recording or reproducing apparatus with related apparatus | with cameras or projectors | (ref: G03B31/00)|   | | recording/reproducing of music for electrophonic musical instruments | (ref: G10H1/0033)| | automatic arrangements for answering calls or for recording messages for absent subscribers | (ref: H04M1/64)| | telephonic communication systems adapted for combination with dictation recording and playback systems | (ref: H04M11/10)| | connection of TV recorder with other related apparatus  e.g. TV camera or receiver  in which the TV signal is sign1.147
B60R25/25using biometry1.147
B60R25/252Fingerprint recognition1.147
G06F11/0766Error or fault reporting or storing | reporting or storing of non-error data | (ref: G06F11/30)|   | (ref: G06F11/34)1.147
G06F11/079Root cause analysis  i.e. error or fault diagnosis | in a hardware test environment | (ref: G06F11/22)| | in a software test environment | (ref: G06F11/36)1.147
H04M3/42059Making use of the calling party identifier1.147
G06F3/1423controlling a plurality of local displays  e.g. CRT and flat panel display1.147
G06F11/3428Benchmarking1.146
H04L12/1827Network arrangements for conference optimisation or adaptation1.146
G06Q10/1095Meeting or appointment1.146
G06Q10/06313Resource planning in a project environment1.146
H04N21/4782Web browsing |   e.g. WebTV | information retrieval from the Internet | (ref: G06F17/30861)| | protocols for network applications involving the use of web-based technology | (ref: H04L29/0809)1.146
H04M15/64On-line charging system [OCS]1.146
H04W4/02Services making use of location information1.145
G06Q20/3672Intelligent token initializing or reloading1.145
G06Q20/367involving intelligent token  e.g. electronic purse1.145
B60R25/246characterised by the challenge triggering1.144
G01S13/76wherein pulse-type signals are transmitted1.144
H04W60/02by periodical registration1.144
H04L69/324in the data link layer  i.e. layer two  e.g. HDLC | arrangements for detecting or preventing errors in the information received | (ref: H04L1/00)| | bus networks | (ref: H04L12/40)1.142
G06F9/547Remote procedure calls [RPC]| Web services1.142
G16H30/20for handling medical images  e.g. DICOM  HL7 or PACS1.142
G16H40/40for the management of medical equipment or devices  e.g. scheduling maintenance or upgrades1.141
A61N1/37235Aspects of the external programmer1.141
G06Q10/20Product repair or maintenance administration1.141
H04M3/436Arrangements for screening incoming calls |   i.e. evaluating the characteristics of a call before deciding whether to answer it | based on the calling party profile | (ref: H04M3/42059)| | based on location | (ref: H04M3/42348)| | based on presence | (ref: H04M3/42365)| | diversion | (ref: H04M3/54)1.141
G06F8/38for implementing user interfaces1.140
H04N21/64322IP1.140
H04L45/302Route determination based on requested QoS1.140
H04L41/5016based on statistics of service availability  e.g. in percentage or over a given time1.140
H04L67/288Distributed intermediate devices  i.e. intermediate device interaction with other intermediate devices on the same level1.140
G06Q30/0631Item recommendations1.140
G06Q30/0261based on user location1.140
H04W4/24Accounting or billing1.140
H04M15/8228Session based1.140
A63F13/23for interfacing with the game device  e.g. specific interfaces between game controller and console1.139
A63F13/31Communication aspects specific to video games  e.g. between several handheld game devices at close range1.139
H04N21/63Control signaling | related to video distribution|  between client  server and network components| Network processes for video distribution between server and clients | or between remote clients|   e.g. transmitting basic layer and enhancement layers over different transmission paths  setting up a peer-to-peer communication via Internet between remote STB's| Communication protocols| Addressing | signalling  control or architecture for real-time multimedia communications | (ref: H04L29/06183)| | arrangements for peer-to-peer communications | (ref: H04L29/08306)1.139
G06Q30/0239Online discounts or incentives1.139
G06Q30/0222During e-commerce  i.e. online transactions1.139
G06F3/1204resulting in reduced user or operator actions  e.g. presetting  automatic actions  using hardware token storing data1.139
G06F3/1253Configuration of print job parameters  e.g. using UI at the client1.139
H04W36/0079in case of hand-off failure or rejection1.139
H04W76/19Connection re-establishment1.139
G06Q40/08Insurance  e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10)1.138
H04L67/104for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer  upload  download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r1.138
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)1.138
G06Q20/3827Use of message hashing1.137
A61N1/37276characterised by means for reducing power consumption during telemetry1.137
A61N1/37254Pacemaker or defibrillator security  e.g. to prevent or inhibit programming alterations by hackers or unauthorised individuals1.137
G06F21/71to assure secure computing or processing of information1.136
G06Q30/01Customer relationship  e.g. warranty1.135
H04N21/8545for generating interactive applications1.135
G06F8/60Software deployment1.135
G06F12/0646Configuration or reconfiguration1.134
H04W56/0005synchronizing of arrival of multiple uplinks1.134
H04W56/00Synchronisation arrangements1.134
G16H40/67for remote operation1.134
G06Q90/205Building evacuation1.133
G08B21/00Alarms responsive to a single specified undesired or abnormal operating condition and not elsewhere provided for | alarms on gas pipes | (ref: F17D3/01)1.133
G05B19/406characterised by monitoring or safety | (ref: G05B19/19)|  takes precedence1.133
H04N21/4756for rating content  e.g. scoring a recommended movie1.133
G09C1/00Apparatus or methods whereby a given sequence of signs  e.g. an intelligible text  is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00)1.133
H04L43/026using flow generation1.133
G06T7/73using feature-based methods1.132
G06Q30/0276Advertisement creation1.132
H04M15/51for resellers  retailers or service providers1.132
H04L45/308Route determination based on user's profile  e.g. premium users1.131
H04W40/34Modification of an existing route1.131
G06F3/0488using a touch-screen or digitiser  e.g. input of commands through traced gestures1.131
H04N21/2407Monitoring of transmitted content  e.g. distribution time  number of downloads | arrangements for monitoring programmes for broadcast or for distribution combined with broadcast | (ref: H04H20/14)1.130
G06Q50/2057Career enhancement or continuing education service1.130
G06F3/0613in relation to throughput1.130
G06Q50/184Intellectual property management1.129
H04L41/5025by proactively reacting to service quality change  e.g. degradation or upgrade  by reconfiguration | mere recovery after a network faults | (ref: H04L41/0654)1.128
H04L41/12network topology discovery or management | topology discovery for routing | (ref: H04L45/02)1.128
G06Q30/0611Request for offers or quotes1.127
G06Q10/105Human resources1.127
H04W76/12Setup of transport tunnels1.126
H04L51/063with adaptation of content1.125
A63F13/65automatically by game devices or servers from real world data  e.g. measurement in live racing competition1.125
A63F13/216using geographical information  e.g. location of the game device or player using GPS1.125
A63F13/71using secure communication between game devices and game servers  e.g. by encrypting game data or authenticating players1.125
G06Q30/02Marketing  e.g. market research and analysis  surveying  promotions  advertising  buyer profiling  customer management or rewards| Price estimation or determination1.125
G01C21/3641Personalized guidance  e.g. limited guidance on previously travelled routes1.125
H04W48/12using downlink control channel1.125
H04W8/06Registration at serving network Location Register  VLR or user mobility server1.125
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]1.124
G06Q40/02Banking  e.g. interest calculation  credit approval  mortgages  home banking or on-line banking1.123
H04L65/4092Control of source by destination  e.g. user controlling streaming rate of server | explicit feedback from the destination to the source to modify data rate for flow control or congestion control in packet switching networks  e.g. choke packet | (ref: H04L47/26)| | end-to-end flow control in packet switching networks | (ref: H04L47/18)| | analog television systems using two way working | (ref: H04N7/173)| | control signals to video servers issued by video clients | (ref: H04N21/6377)1.123
G07C9/00563using personal physical data of the operator  e.g. finger prints  retinal images  voicepatterns1.122
G06F11/0793Remedial or corrective actions | by retry | (ref: G06F11/1402)| | recovery from an exception in an instruction pipeline | (ref: G06F9/3861)| | in a network context | (ref: H04L29/14)1.122
G06F11/0769Readable error formats  e.g. cross-platform generic formats  human understandable formats1.122
H04N21/2387Stream processing in response to a playback request from an end-user  e.g. for trick-play1.122
H04N21/6587Control parameters  e.g. trick play commands  viewpoint selection1.122
G06Q40/04Exchange  e.g. stocks  commodities  derivatives or currency exchange1.122
G06Q30/0244Optimization1.119
G06Q30/0269based on user profile or attribute1.119
G06Q30/0252based on events or environment  e.g. weather or festivals1.119
G10L25/87Detection of discrete points within a voice signal1.119
H04N5/765Interface circuits between an apparatus for recording and another apparatus | associated working of recording or reproducing apparatus with a television camera or receiver in which the television signal is not significantly involved | (ref: G11B31/00)1.119
H04M1/72Substation extension arrangements| Cordless telephones  i.e. devices for establishing wireless links to base stations without route selecting | constructional features of cordless telephones | (ref: H04M1/0202)1.119
H04N21/234345the reformatting operation being performed only on part of the stream  e.g. a region of the image or a time segment1.119
H04N21/437Interfacing the upstream path of the transmission network  e.g. for transmitting client requests to a VOD server | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing of client requests | (ref: H04L29/08945)| | flow control in data networks | (ref: H04L47/10)1.118
H04N21/44204Monitoring of content usage  e.g. the number of times a movie has been viewed  copied or the amount which has been watched | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protecting generic digital content where the protection is independent of the precise nature of the content | (ref: G06F21/10)| | arrangements for monitoring the use made of the broadcast services in broadcast systems | (ref: H04H60/31)1.118
A63F13/795for finding other players| for building a team| for providing a buddy list1.118
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)1.118
G06N3/082modifying the architecture  e.g. adding or deleting nodes or connections  pruning1.117
A61N1/37217characterised by the communication link  e.g. acoustic or tactile1.117
G06F3/1238Secure printing  e.g. user identification  user rights for device usage  unallowed content  blanking portions or fields of a page  releasing held jobs1.117
G06F8/751Code clone detection1.117
H04W36/00Hand-off or reselection arrangements1.117
H04N21/26291for providing content or additional data updates  e.g. updating software modules  stored at the client | deployment  distribution  installation  update of software | (ref: G06F8/65)| | error detection or correction during software upgrading | (ref: G06F11/1433)| | arrangements for updating broadcast information or broadcast-related information | (ref: H04H60/25)1.117
H04N21/6336directed to decoder1.117
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability1.116
H04M3/5183Call or contact centers with computer-telephony arrangements1.116
G06F9/4843by program  e.g. task dispatcher  supervisor  operating system1.116
H04L41/0246exchanging or transporting network management information using Internet  e.g. aspects relating to embedding network management web servers in network elements  web service for network management purposes  aspects related to Internet applications or services or web-based protocols  simple object access protocol [SOAP] | web-based network application protocols | (ref: H04L67/02)| | web-based network application protocols for remote control of end-devices or monitoring of remote application data | (ref: H04L67/025)| | proprietary application protocols for remote control of end-devices in special1.115
G06F3/0485Scrolling or panning1.114
G06F3/04845for image manipulation  e.g. dragging  rotation1.114
G07F17/3239Tracking of individual players1.113
H04W36/0027for a plurality of sessions or connections  e.g. multi-call  multi-bearer connections1.113
H04W24/04Arrangements for maintaining operational condition1.113
A63F13/70Game security or game management aspects1.113
G07F17/3244Payment aspects of a gaming system  e.g. payment schemes  setting payout ratio  bonus or consolation prizes1.113
G06F3/04815Interaction with three-dimensional environments  e.g. control of viewpoint to navigate in the environment1.111
G06F3/1205resulting in increased flexibility in print job configuration  e.g. job settings  print requirements  job tickets1.111
H04W48/02Access restriction performed under specific conditions1.111
A63F13/53involving additional visual information provided to the game scene  e.g. by overlay to simulate a head-up display [HUD] or displaying a laser sight in a shooting game1.111
H04N21/472End-user interface for requesting content  additional data or services| End-user interface for interacting with content  e.g. for content reservation or setting reminders  for requesting event notification  for manipulating displayed content | end-user interfaces for retrieving video data from a database | (ref: G06F17/30843)| | content on demand in one way streaming for real-time multimedia communications | (ref: H04L29/06462)1.111
H04N21/2393involving handling client requests | scheduling and organising the servicing of requests in data switching networks | (ref: H04L29/08945)1.110
H04N21/2225Local VOD servers1.110
G10L15/26Speech to text systems | (ref: G10L15/08)|  takes precedence1.110
H02J50/80involving the exchange of data  concerning supply or distribution of electric power  between transmitting devices and receiving devices1.109
G06F3/04842Selection of a displayed object | (ref: G06F3/0482)|  takes precedence1.109
H04L67/2838for integrating service provisioning from a plurality of service providers | web site content organization and management | (ref: G06F17/3089)1.108
H04L9/0836using tree structure or hierarchical structure1.108
A63F13/213comprising photodetecting means  e.g. cameras  photodiodes or infrared cells | (ref: A63F13/219)|   | (ref: A63F13/655)|  take precedence1.108
A63F13/212using sensors worn by the player  e.g. for measuring heart beat or leg activity1.108
H04W4/14Short messaging services  e.g. short message services [SMS] or unstructured supplementary service data [USSD]1.107
H04W4/029Location-based management or tracking services1.107
G06F11/3409for performance assessment1.107
F24F11/0001for ventilation | (ref: F24F11/30)|  takes precedence1.107
G01T1/178for measuring specific activity in the presence of other radioactive substances  e.g. natural  in the air or in liquids such as rain water1.107
H04W4/025using location based information parameters1.106
H04L9/3093involving Lattices or polynomial equations  e.g. NTRU scheme1.106
H04L9/3073involving pairings  e.g. identity based encryption [IBE]  bilinear mappings or bilinear pairings  e.g. Weil or Tate pairing1.106
G06F11/263Generation of test inputs  e.g. test vectors  patterns or sequences | | with adaptation of the tested hardware for testability with external testers1.106
G06F11/2294by remote test1.106
H04N21/6334for authorisation  e.g. by transmitting a key | arrangements for secret or secure communication | (ref: H04L9/00)|  | | wireless communications network key management | (ref: H04W12/04)| | wireless communications network access security | (ref: H04W12/08)1.106
H04N21/85406involving a specific file format  e.g. MP4 format1.106
G06Q30/0205Location or geographical consideration1.106
G16H50/20for computer-aided diagnosis  e.g. based on medical expert systems1.106
G06N5/003Dynamic search techniques  heuristics  branch-and-bound | (ref: G06N5/046)|  take precedence| for optimisation | (ref: G06Q10/04)1.106
H04N21/4126portable device  e.g. remote control with a display  PDA  mobile phone | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)1.106
G06F8/30Creation or generation of source code1.105
H04W4/35for the management of goods or merchandise1.104
G06F3/1203Improving or facilitating administration  e.g. print management1.104
G06F3/1288in client-server-printer device configuration1.104
H04N21/2747Remote storage of video programs received via the downstream path  e.g. from the server1.103
H04N21/4147Personal Video Recorder [PVR] | (ref: H04N5/76)|  takes precedence | | arrangements for broadcast specially adapted for accumulation-type receivers | (ref: H04H20/40)1.103
G06Q20/18involving self- service terminals [SSTs]  vending machines  kiosks or multimedia terminals1.103
H04N21/637Control signals issued by the client directed to the server or network components1.103
G06F11/0709in a distributed system consisting of a plurality of standalone computer nodes  e.g. clusters  client-server systems1.103
H04L65/1016IMS | wireless communication networks | (ref: H04W)1.102
G16H40/20for the management or administration of healthcare resources or facilities  e.g. managing hospital staff or surgery rooms1.101
H04N21/475End-user interface for inputting end-user data  e.g. personal identification number [PIN]  preference data1.101
H04N21/44222Monitoring of user selections  e.g. selection of programs  purchase activity | monitoring of user selections in data processing systems | (ref: G06F11/34)| | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | tracking the activity of the end-user | (ref: H04L29/08675)| | arrangements for monitoring the user's behaviour or opinions in broadcast systems | (ref: H04H60/33)1.101
H04K3/42characterized by the control of the jamming frequency or wavelength1.101
H04N21/812involving advertisement data | advertising | per se|  | (ref: G06Q30/02)1.101
H04N21/43615Interfacing a Home Network  e.g. for connecting the client to a plurality of peripherals | home Audio Video Interoperability [HAVI] data switching networks | (ref: H04L12/2805)1.100
G06F3/1454involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays  e.g. teledisplay1.100
H04L9/06the encryption apparatus using shift registers or memories for block-wise | or stream|  coding  e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators1.100
H04N21/2343involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements | media manipulation  adaptation or conversion at the source in one way streaming for real-time multimedia communications | (ref: H04L29/06489)| | video transcoding | (ref: H04N19/40)0.634
H04N21/26606for generating or managing entitlement messages  e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14)0.634
H04N21/23605Creation or processing of packetized elementary streams [PES]0.634
H04N21/4405involving video stream decryption | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.621
H04L9/16the keys or algorithms being changed during operation0.621
H04N21/4623Processing of entitlement messages  e.g. Entitlement Control Message [ECM]  Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14)0.621
H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible | secret communication in general | (ref: H04K1/00)0.621
H04N21/26613for generating or managing keys in general | key distribution for secret or secure communication involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP] | (ref: H04L9/083)| | key management for security in wireless networks | (ref: H04L29/06707)| | key management for network security in communication control or processing | (ref: H04W12/04)0.621
H04N21/2351involving encryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.614
G06Q30/0241Advertisement0.614
H04N21/2547Third Party Billing  e.g. billing of advertiser0.614
H04N21/63775for uploading keys  e.g. for a client to communicate its public key to the server | arrangements for network security key management | (ref: H04L29/06707)0.614
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones0.611
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme0.611
H04L9/3297involving time stamps  e.g. generation of time stamps0.611
G08B13/19667Details realated to data compression  encryption or encoding  e.g. resolution modes for reducing data volume to lower transmission bandwidth or memory requirements0.603
G08B13/196using television cameras | recognition of scenes under surveillance | (ref: G06K9/00771)| | image analysis | per se|  | (ref: G06T7/00)| | television cameras | (ref: H04N5/225)| | CCTV systems | (ref: H04N7/18)0.603
H04L9/065Encryption by serially and continuously modifying data stream elements  e.g. stream cipher systems  RC4  SEAL or A5/30.603
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.603
H04L43/0811Connectivity0.581
G06K7/1095the scanner comprising adaptations for scanning a record carrier that is displayed on a display-screen or the like0.580
G06K19/06112the marking being simulated using a light source  e.g. a barcode shown on a display or a laser beam with time-varying intensity profile0.580
G06Q20/409Card specific authentication in transaction processing0.580
H04L29/06802using an additional device  e.g. smartcard  SIM0.576
H04L29/06782Passwords0.576
H04L67/1004Server selection in load balancing0.568
H04L67/1023based on other criteria  e.g. hash applied to IP address  specific algorithms or cost0.568
H04L67/1027Persistence of sessions during load balancing0.568
H04L67/1019based on random server selection0.568
H04N21/8358involving watermark | protecting executable software by watermarking | (ref: G06F21/16)| | image watermarking in general | (ref: G06T1/0021)| | watermarks inserted in still images for transmission purposes | (ref: H04N1/32144)| | inserting watermarks during video coding | (ref: H04N19/467)0.563
H04N21/2355involving reformatting operations of additional data  e.g. HTML pages | optimising the visualization of content for information retrieval from the Internet | (ref: G06F17/30905)| | media manipulation  adaptation or conversion at the source in one way streaming for real-time multimedia communications | (ref: H04L29/06489)| | message adaptation based on network or terminal capabilities in stored and forward packet switching | (ref: H04L51/34)0.563
H04N21/23892involving embedding information at multiplex stream level  e.g. embedding a watermark at packet level0.563
G06T1/0021Image watermarking0.563
H04L9/0618Block ciphers  i.e. encrypting groups of characters of a plain text message using fixed encryption transformation0.562
H04L29/08Transmission control procedure  e.g. data link level control procedure0.560
H04L67/1076Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network0.560
G06Q20/385Use of an alias or a single-use code0.559
G06Q20/388Mutual authentication without cards0.559
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer0.559
G06Q20/40975Use of encryption for mutual authentication0.558
G06Q20/204comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit0.558
G06Q20/4097Mutual authentication between card and transaction partners0.558
G06Q20/3552Downloading or loading of personalisation data0.558
G06Q20/32using wireless devices0.558
H04B5/0056for use in interrogation  identification or read/write systems | record carriers | (ref: G06K7/00)|   | (ref: G06K19/00)| | for railways | (ref: B61L3/12)0.558
G06Q20/3563Software being resident on card0.558
G06Q20/108Remote banking  e.g. home banking0.558
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.558
H04L9/0625with splitting of the data block into left and right halves  e.g. Feistel based algorithms  DES  FEAL  IDEA or KASUMI0.558
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.558
G06F21/77in smart cards0.558
H04B5/0075using inductive coupling | transformers or inductances adapted for inductive coupling | (ref: H01F38/14)0.558
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)0.558
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.558
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists0.558
G06Q20/382insuring higher security of transaction0.558
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.558
G06Q20/227characterized in that multiple accounts are available to the payer0.558
G07F7/122Online card verification0.558
H04L69/28Timer mechanisms used in protocols0.556
G06F3/067Distributed or networked storage systems  e.g. storage area networks [SAN]  network attached storage [NAS]0.552
G07F7/1041PIN input keyboard gets new key allocation at each use0.551
G06Q20/353Payments by additional cards plugged into M-devices0.551
G07F7/1091Use of an encrypted form of the PIN0.551
G07F19/211Software architecture within ATMs or in relation to the ATM network0.551
G06K9/00496Recognising patterns in signals and combinations thereof | signature verification | (ref: G06K9/00154)| | analysing specific medical signals  e.g. bioelectric signals  blood pressure | (ref: A61B5/00)| | processing radar and similar signals | (ref: G01S)| | analysis of chromatographic signals | (ref: G01N30/86)| | processing seismic signals | (ref: G01V1/28)|   | (ref: G01V1/46)| | acoustic speech processing | (ref: G10L)| | transmission systems | (ref: H04B1/00)0.550
H04R25/70Adaptation of deaf aid to hearing loss  e.g. initial electronic fitting0.550
H04L61/609involving geographic information  e.g. room number0.550
H04L67/1014based on the content of a request0.550
H04L61/1535using an address exchange platform which sets up a session between two nodes  e.g. "rendezvous" server | address exchange for voice over internet protocol [VoIP] | (ref: H04L61/1529)0.550
H04L67/1021based on client or server locations0.550
G06K19/06037multi-dimensional coding0.548
H04L61/6013Proxying of addresses0.547
G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates0.546
G10L17/22Interactive procedures| Man-machine interfaces0.546
G10L15/06Creation of reference templates| Training of speech recognition systems  e.g. adaptation to the characteristics of the speaker's voice | (ref: G10L15/14)|  takes precedence0.546
G06F21/6281at program execution time  where the protection is within the operating system0.543
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)0.542
H04L67/30involving profiles0.542
H04L47/822Collecting or measuring resource availability data0.540
H04L29/08702involving intermediate processing or storage in the network  e.g. proxy | billing provisions | (ref: H04L12/14)| | multimedia network architectures  gateways and control entities | (ref: H04L29/0621)| | multimedia handling  encoding and conversion | (ref: H04L29/06476)| | security provisions | (ref: H04L29/06551)| | addressing provisions | (ref: H04L29/12009)| | network management provisions | (ref: H04L41/00)| | monitoring provisions | (ref: H04L43/00)0.538
G06Q20/3227Use of a security embedded in M-devices0.536
G06Q20/3821Electronic credentials0.535
H04N21/8586by using a URL | processing chained hypermedia data for information retrieval | (ref: G06F17/30014)| | information retrieval from the Internet by using URLs | (ref: G06F17/30876)| | URL in broadcast information | (ref: H04H20/93)| | protocols for network applications involving the use of web-based technology | (ref: H04L29/0809)0.535
H04N21/643using dedicated|  Communication protocols | streaming protocols for real-time multimedia communications | (ref: H04L29/06517)0.535
H04L65/608Streaming protocols  e.g. RTP or RTCP0.535
H04N21/23109by placing content in organized collections  e.g. EPG data repository | details of retrieval of video data and associated meta data in video databases | (ref: G06F17/30843)0.533
H04N21/4384involving operations to reduce the access time  e.g. fast-tuning for reducing channel switching latency0.533
H04L51/20Messaging using geographical location information | protocols for adapting network applications to user terminal location | (ref: H04L67/18)| | services specially adapted for wireless communication networks making use of the location of users or terminals | (ref: H04W4/02)0.531
H04W4/30Services specially adapted for particular environments  situations or purposes0.531
G06Q30/0256User search0.531
H04W4/21for social networking applications0.531
G06F3/0484for the control of specific functions or operations  e.g. selecting or manipulating an object or an image  setting a parameter value or selecting a range0.531
G06F9/453Help systems0.529
G01S19/13Receivers0.528
H04N21/4532involving end-user characteristics  e.g. viewer profile  preferences | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protocols involving user profiles for network applications in communication control or processing | (ref: H04L29/08936)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)0.527
H04L47/24depending on the type of traffic  e.g. priority or quality of service [QoS] | network arrangements for networked applications for scheduling or organising the servicing of application requests whereby quality of service or priority requirements are taken into account | (ref: H04L67/322)0.527
G07F19/20Automatic teller machines [ATMs]0.526
H04N21/6125involving transmission via Internet | transmission by internet of broadcast information | (ref: H04H60/82)0.524
H04N21/26216involving the channel capacity  e.g. network bandwidth | admission control  resource allocation in open networks | (ref: H04L12/5692)| | protocols for scheduling and organising the servicing of requests  whereby quality of service and priority requirements are taken into account in network applications in communication control or processing | (ref: H04L29/08954)| | flow control in packet networks | (ref: H04L47/10)0.524
G07C9/00857where the code of the data carrier can be programmed0.522
G07C9/00309operated with bidirectional data transmission between data carrier and locks0.522
H04L51/10Messages including multimedia information | network arrangements or protocols for real-time communication | (ref: H04L65/00)| | voice messaging in telephonic communication using automatic or semi-automatic exchanges with non-audio components | (ref: H04M3/5307)0.521
H04N21/235Processing of additional data  e.g. scrambling of additional data  processing content descriptors | arrangements for simultaneous broadcast of plural pieces of information | (ref: H04H20/28)0.521
H04L9/0827involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.520
H04L9/3033details relating to pseudo-prime or prime number generation  e.g. primality test0.520
H04W88/06adapted for operation in multiple networks | or having at least two operational modes|   e.g. multi-mode terminals0.520
G06Q20/356Aspects of software for card payments0.518
H04L67/24Presence management | use and manipulation of presence information in instant messaging | (ref: H04L51/043)0.517
H04L67/145provided for avoiding end of session  e.g. keep-alive  heartbeats  resumption message  wake-up for inactive or interrupted session0.517
G06Q10/08Logistics  e.g. warehousing  loading  distribution or shipping| Inventory or stock management  e.g. order filling  procurement or balancing against orders0.517
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)0.517
G06Q10/04Forecasting or optimisation  e.g. linear programming  "travelling salesman problem" or "cutting stock problem" | data collection specially adapted for marketing  price determination or demand forecasting | (ref: G06Q30/02)0.517
H04W12/00Security arrangements  e.g. access security or fraud detection| Authentication  e.g. verifying user identity or authorisation| Protecting privacy or anonymity0.516
G06Q20/3415Cards acting autonomously as pay-media0.516
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system0.516
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)0.516
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.516
H04L51/30with reliability check  e.g. acknowledgments or fault reporting0.515
G06T7/70Determining position or orientation of objects or cameras | camera calibration | (ref: G06T7/80)0.515
H04L51/066with adaptation of format0.514
H04N21/4408involving video stream encryption  e.g. re-encrypting a decrypted video stream for redistribution in a home network | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.514
H04N21/436Interfacing a local distribution network  e.g. communicating with another STB  inside the home | | Interfacing an external card to be used in combination with the client device| arrangements specially adapted plural spots in a confined site in broadcast systems | (ref: H04H20/63)0.514
H04L29/06401where at least one of the additional parallel sessions is real time or time sensitive  e.g. white board sharing  collaboration  spawning of a subconference | telewriting  virtual reality or network gaming | (ref: H04L29/06034)0.514
H04L12/1822Conducting the conference  e.g. admission  detection  selection or grouping of participants  correlating users to one or more conference sessions  prioritising transmission0.514
H04M1/67by electronic means0.513
G06Q20/38Payment protocols| Details thereof0.513
H04L9/302involving the integer factorization problem  e.g. RSA or quadratic sieve [QS] schemes0.513
G06F21/40by quorum  i.e. whereby two or more security principals are required0.513
H04L51/18Messages including commands or codes to be executed either at an intermediate node or at the recipient to perform message-related actions | computer aided management of electronic mail | (ref: G06Q10/10)| | networked applications for remote control or remote monitoring of the application | (ref: H04L67/025)| | networked applications involving the movement of software or configuration parameters | (ref: H04L67/34)0.513
G09G5/395Arrangements specially adapted for transferring the contents of the bit-mapped memory to the screen | (ref: G09G5/399)|  takes precedence0.513
H04L51/34with provisions for tracking the progress of a message0.513
G06Q30/0209Incentive being awarded or redeemed in connection with the playing of a video game0.512
A63F13/61using advertising information0.512
A63F13/48Starting a game  e.g. activating a game device or waiting for other players to join a multiplayer session0.512
G06Q30/0601Electronic shopping0.512
A63F13/92Video game devices specially adapted to be hand-held while playing0.512
G06F21/554involving event detection and direct action0.512
H04N21/2668Creating a channel for a dedicated end-user group  e.g. insertion of targeted commercials based on end-user profiles | information retrieval from the Internet by querying with filtering and personalisation | (ref: G06F17/30867)| | arrangements for replacing or switching information during the broadcast | (ref: H04H20/10)| | push services over packet-switching network | (ref: H04L12/1859)| | adaptation of message content in packet-switching networks | (ref: H04L51/063)0.511
H04N21/254Management at additional data server  e.g. shopping server  rights management server | protocols involving third party service providers for network applications in communication control or processing | (ref: H04L29/08666)| | arrangements for maintenance or administration in data networks | (ref: H04L41/00)0.511
H04N21/25866Management of end-user data | customer care in data networks | (ref: H04L41/5077)0.511
H04N21/41407embedded in a portable device  e.g. video client on a mobile phone  PDA  laptop | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)| | arrangements specially adapted for mobile receivers in broadcast systems | (ref: H04H20/57)0.511
H04N21/478Supplemental services  e.g. displaying phone caller identification  shopping application0.511
H04N21/44218Detecting physical presence or behaviour of the user  e.g. using sensors to detect if the user is leaving the room or changes his face expression during a TV program | methods or arrangements for acquiring or recognising human faces  facial parts  facial sketches  facial expressions | (ref: G06K9/00221)| | methods or arrangements for recognising movements or behaviour | (ref: G06K9/00335)| | methods or arrangements for recognising human body or animal bodies or body parts | (ref: G06K9/00362)| | arrangements for identifying users in broadcast systems | (ref: H04H60/45)0.511
H04N21/4826using recommendation lists  e.g. of programs or channels sorted out according to their score0.511
G06K9/628Multiple classes0.511
G06N3/0454using a combination of multiple neural nets0.511
G06N3/0445Feedback networks  e.g. hopfield nets  associative networks0.511
H04N21/4788communicating with other users  e.g. chatting | arrangements for providing for computer conferences  e.g. chat rooms  to substation in data switching networks | (ref: H04L12/1813)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)0.511
G06K9/6218Clustering techniques0.511
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)0.509
H04L65/80QoS aspects | monitoring of the downstream path of a video distribution network | (ref: H04N21/2402)|   | (ref: H04N21/44209)| | network service management  ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer | (ref: H04L41/50)| | monitoring arrangements  testing arrangements  with monitoring of QoS metrics | (ref: H04L43/08)| | traffic-type related flow control in packet switching networks  e.g. priorities or QoS | (ref: H04L47/24)| | admission control/resource reservation in packet switching networks based 0.508
H04L67/2809for brokering | negotiation of communication capabilities | (ref: H04L69/24)| | e-commerce | (ref: G06Q30/00)0.508
G07F17/3225Data transfer within a gaming system  e.g. data sent between gaming machines and users0.507
G07F17/3241Security aspects of a gaming system  e.g. detecting cheating  device integrity  surveillance | computer security | (ref: G06F21/00)0.507
H04N21/8146involving graphical data  e.g. 3D object  2D graphics0.506
G06N3/04Architectures  e.g. interconnection topology0.506
H04N21/4662characterized by learning algorithms0.506
H04L65/1063Application servers | systems providing special services to telephonic subscribers | (ref: H04M3/42)0.506
H04L65/601Media manipulation  adaptation or conversion | computer conferences  network arrangements for conference optimisation or adaptation | (ref: H04L12/1827)| | flow control or congestion control in packet switching networks | (ref: H04L47/10)| | message switching systems  e.g. electronic mail systems  with message adaptation based on network or terminal capabilities | (ref: H04L51/06)| | adaptation for terminals or networks with limited resources or for terminal portability | (ref: H04L67/04)| | network application being adapted for the location of the user terminal | (ref: H04L67/18)| | involving0.506
H04L41/5058Service discovery by the service manager | automatically determining the actual topology of a network | (ref: H04L41/12)| | topology discovery for routing | (ref: H04L45/02)| | arrangements for service discovery  e.g. service location protocol | (ref: H04L67/16)0.506
G10L25/54for retrieval0.505
H04N21/4398involving reformatting operations of audio signals | details of audio signal transcoding | (ref: G10L19/173)0.505
H04L51/36Unified messaging  e.g. interactions between instant messaging  e-mail or other types of messages such as converged IP messaging [CPM]0.505
H04L43/028using filtering | alarm or event filtering | (ref: H04L41/0604)0.504
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)0.504
H04L41/5096wherein the managed service relates to distributed or central networked applications | management of file systems | (ref: G06F17/30067)| | management of structured data stores | (ref: G06F17/30286)0.504
H04W76/11Allocation or use of connection identifiers0.504
H04W76/15Setup of multiple wireless link connections0.504
H04L43/10using active monitoring  e.g. heartbeat protocols  polling  ping  trace-route0.504
H04L43/12using dedicated network monitoring probes0.504
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.503
G07F7/125Offline card verification0.503
G06Q20/127Shopping or accessing services according to a time-limitation0.503
G07F15/005dispensed for the electrical charging of vehicles | electrical charging as such  | (ref: B60L11/00)0.503
G06Q20/4033Local solvency checks0.503
G06Q20/145Payments according to the detected use or quantity0.503
H04L67/142provided for managing session state for stateless protocols| Signalling a session state| State transitions| Keeping-state mechanisms0.502
G06F21/60Protecting data0.501
G06F3/048Interaction techniques based on graphical user interfaces [GUI]0.500
H04N1/00501Tailoring a user interface [UI] to specific requirements0.500
H04N7/152Multipoint control units therefor0.500
H04L65/4007Services involving a main real-time session and one or more additional parallel sessions | real time messaging  e.g. instant messaging  interacting with other applications or services | (ref: H04L51/046)| | multichannel or multilink protocols | (ref: H04L69/14)| | services and arrangements where telephone services are combined with data services | (ref: H04M7/0024)0.500
H04N7/141between two video terminals  e.g. videophone | telephonic communication systems combined with television receiver for reception of entertainment or information matter | (ref: H04M11/085)0.500
H04L69/14Multichannel or multilink protocols0.500
H04L65/1083In-session procedures | computer conferences  network arrangements for conference optimisation or adaptation | (ref: H04L12/1827)| | reactions to resource unavailability in packet switching networks | (ref: H04L47/74)| | reallocation or renegotiation of resources in packet switching networks | (ref: H04L47/76)0.500
H04N21/6437Real-time Transport Protocol [RTP]0.500
H04N21/632using a connection between clients on a wide area network  e.g. setting up a peer-to-peer communication via Internet for retrieving video segments from the hard-disk of other client devices | broadcast-related systems characterised by transmission among terminal devices | (ref: H04H60/80)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)0.500
G06F21/55Detecting local intrusion or implementing counter-measures0.500
H04N21/278Content descriptor database or directory service for end-user access | details of content or meta data based information retrieval of video data in video databases | (ref: G06F17/30843)0.499
H04N21/8549Creating video summaries  e.g. movie trailer | retrieval in video databases by using presentations in form of a video summary | (ref: G06F17/30843)0.499
H04N21/4263involving specific tuning arrangements  e.g. two tuners0.499
H04N21/4524involving the geographical location of the client | retrieval from the Internet by querying based on geographical locations | (ref: G06F17/3087)| | systems specially adapted for using geographical information in broadcast systems | (ref: H04H60/70)| | protocols in which the network application is adapted for the location of the user terminal in communication control or processing | (ref: H04L29/08657)| | services making use of the location of users or terminals in wireless networks | (ref: H04W4/02)| | locating users or terminals in wireless networks | (ref: H04W64/00)0.499
G06F21/84output devices  e.g. displays or monitors0.498
G06Q20/29characterised by micropayments0.498
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.498
G06F21/755with measures against power attack0.497
G07F7/0833Card having specific functional components0.497
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords0.496
H04L67/303Terminal profiles0.495
H04L67/2861for providing operational support to end devices by emulation  e.g. when they are unavailable  or by off-loading in the network | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)| | reactions to server failures by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | terminal emulation | (ref: H04L67/08)| | disconnected operation in file systems | (ref: G06F17/30067)| | emulation or software simulation | (ref: G06F9/455)| | input/output emulation function for peripheral devices | 0.495
H04N21/4821using a grid  e.g. sorted out by channel and broadcast time0.495
G06Q30/0217Giving input on a product or service or expressing a customer desire in exchange for an incentive or reward0.495
G06F9/44526Plug-ins| Add-ons0.494
H04L51/26Prioritized messaging | networked applications for intermediate processing whereby quality of service or priority requirements are taken into account | (ref: H04L67/322)0.494
G06F21/80in storage media based on magnetic or optical technology  e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00)0.494
H04L43/16using threshold monitoring0.494
H04N21/238Interfacing the downstream path of the transmission network  e.g. adapting the transmission rate of a video stream to network bandwidth| Processing of multiplex streams | hybrid Fiber Coaxial HFC networks for downstream channel allocation for video distribution | (ref: H04L12/2801)| | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing | (ref: H04L29/08945)| | flow control in packet networks | (ref: H04L47/10)0.493
H04N21/47208for requesting near-video-on-demand content0.493
H04N21/658Transmission by the client directed to the server0.493
H04L65/602at the source | reformatting of video signals in video distribution servers | (ref: H04N21/2343)| | reformatting of additional data in video distribution servers | (ref: H04N21/2355)0.493
H04L67/2866Architectural aspects0.493
H04L65/40Services or applications | network service management for ensuring proper service fulfilment | (ref: H04L41/50)| | information services comprising voice | (ref: H04M3/487)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | contact center services | (ref: H04M3/51)0.493
H04N21/239Interfacing the upstream path of the transmission network  e.g. prioritizing client | content|  requests | hybrid Fiber Coaxial [HFC] networks for upstream channel allocation for video distribution | (ref: H04L12/2801)| | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing of client requests | (ref: H04L29/08945)| | flow control in data networks | (ref: H04L47/10)0.493
H04N21/6408Unicasting0.493
H04L43/0864Round trip delays0.492
G07G1/0036Checkout procedures0.491
H04N21/25833involving client hardware characteristics  e.g. manufacturer  processing or storage capabilities | allocation of resources considering hardware capabilities in multiprogramming arrangements | (ref: G06F9/5044)| | allocation of resources considering software capabilities in multiprogramming arrangements | (ref: G06F9/5055)0.491
H04L65/607Stream encoding details | interfacing the downstream path of a video distribution network | (ref: H04N21/238)|   | (ref: H04N21/438)| | controlling the complexity of a video stream | (ref: H04N21/2662)|   | (ref: H04N21/4621)|   | (ref: H04N21/64792)| | protocols for data compression | (ref: H04L69/04)| | header parsing or analysis | (ref: H04L69/22)0.491
H04L69/24Negotiation of communication capabilities0.491
H04N21/6582Data stored in the client  e.g. viewing habits  hardware capabilities  credit card number | arrangements where receivers interact with the broadcast | (ref: H04H20/38)0.491
H04L45/42Centralized routing0.491
H04L45/72Routing based on the source address0.491
G06F9/543User-generated data transfer  e.g. clipboards  dynamic data exchange [DDE]  object linking and embedding [OLE]0.490
G06F11/00Error detection| Error correction| Monitoring | error detection  correction or monitoring in information storage based on relative movement between record carrier and transducer | (ref: G11B20/18)| | monitoring  i.e. supervising the progress of recording or reproducing | (ref: G11B27/36)| | in static stores | (ref: G11C29/00)0.490
G06Q20/381Currency conversion0.490
H04N1/4486using digital data encryption0.489
B42D25/333Watermarks0.489
H04W88/08Access point devices0.489
H04W84/12WLAN [Wireless Local Area Networks]0.489
G06F11/2023Failover techniques0.489
G06F3/0236using selection techniques to select from displayed items0.488
H04N21/42213for facilitating data entry0.488
G06F3/0237using prediction or retrieval techniques0.488
H04L61/2503Internet protocol [IP] address translation0.487
H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP  | (ref: H04W80/04)0.487
H04L69/163Adaptation of TCP data exchange control procedures | generic OSI layer 4 protocols  e.g. SCTP | (ref: H04L69/326)| | TCP or UDP flow control procedures | (ref: H04L47/19)| | error control procedures in general | (ref: H04L1/18)0.487
H04L69/08Protocols for interworking or protocol conversion | arrangements for connecting between networks having differing types of switching systems  e.g. gateways  | (ref: H04L12/66)| | network management protocols conversion | (ref: H04L41/0226)0.487
H04L69/326in the transport layer  i.e. layer four | TCP/IP | (ref: H04L69/16)| | streaming protocols  e.g. RTP  | (ref: H04L65/608)0.487
H04L9/0662with particular pseudorandom sequence generator0.487
H04N21/4758for providing answers  e.g. voting0.485
H04N21/4722for requesting additional data associated with the content0.485
H04N21/47End-user applications | interaction techniques for graphical user interfaces | (ref: G06F3/048)| | receiver circuitry for displaying additional information | (ref: H04N5/445)|  | | software engineering for user interfaces | (ref: G06F8/20)| | services or applications for real-time multimedia communications | (ref: H04L29/06387)0.485
H04N7/17318Direct or substantially direct transmission and handling of requests0.485
H04N21/4622Retrieving content or additional data from different sources  e.g. from a broadcast channel and the Internet | web site content organization and management for information retrieval from the Internet | (ref: G06F17/3089)| | transmission by internet of broadcast information | (ref: H04H60/82)| | stock exchange data over packet-switching network | (ref: H04L12/1804)| | push services including data channel over packet-switching network | (ref: H04L12/1859)0.485
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)0.485
H04L47/808User-type aware0.485
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.484
H04L1/0061Error detection codes0.484
G06F11/1004to protect a block of data words  e.g. CRC or checksum | (ref: G06F11/1076)|  takes precedence| security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.484
G01S19/45by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement0.484
G06F11/1469Backup restoration techniques0.484
G06F11/1433during software upgrading0.484
G06F9/45508Runtime interpretation or emulation  e g. emulator loops  bytecode interpretation0.484
G06F13/20for access to input/output bus0.484
G10L13/00Speech synthesis| Text to speech systems0.483
H04B7/18519Operations control  administration or maintenance0.483
G06Q20/023characterized in that the neutral party is a clearing house0.483
G07F7/0886the card reader being portable for interacting with a POS or ECR in realizing a payment transaction0.483
H04L47/82Miscellaneous aspects0.482
H04L43/0852Delays0.482
G06F3/0486Drag-and-drop0.482
H04N21/8113comprising music  e.g. song in MP3 format0.482
H04N21/26603for automatically generating descriptors from content  e.g. when it is not made available by its provider  using content analysis techniques0.482
H04N21/433Content storage operation  e.g. storage operation in response to a pause request  caching operations0.482
H04H60/64for providing detail information0.482
H04N7/16Analogue secrecy systems| Analogue subscription systems0.482
H04N21/4345Extraction or processing of SI  e.g. extracting service information from an MPEG stream0.482
H04H60/37for identifying segments of broadcast information  e.g. scenes or extracting programme ID0.482
H04N21/4343Extraction or processing of packetized elementary streams [PES]0.482
G06Q30/0635Processing of requisition or of purchase orders0.481
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.481
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)0.480
H04M11/00Telephonic communication systems adapted for combination with other electrical systems0.480
H04N21/43856by partial decryption  e.g. decrypting a multiplex stream that has been partially encrypted0.480
H04N21/4627Rights management | associated to the content | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)0.480
H04B1/3816Mechanical arrangements for accommodating identification devices  e.g. cards or chips| with connectors for programming identification devices0.479
G10L15/18using natural language modelling0.479
H04M3/42348Location-based services which utilize the location information of a target0.479
A63F13/47involving branching  e.g. choosing one of several possible scenarios at a given point in time0.478
H04N7/18Closed circuit television systems  i.e. systems in which the signal is not broadcast | television transmission of measured quantities | (ref: G01D5/39)| | intruder alarm or detection by television surveillance | (ref: G08B13/196)0.478
H04N21/23895involving multiplex stream encryption0.478
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner0.478
H04J3/0658Clock or time synchronisation among packet nodes0.478
H04N21/4667Processing of monitored end-user data  e.g. trend analysis based on the log file of viewer selections0.477
H04N21/4828for searching program descriptors | retrieval of video data | (ref: G06F17/30843)0.477
H04N21/44213Monitoring of end-user related data | arrangements for monitoring the users' behaviour or opinions in broadcast systems | (ref: H04H60/33)0.477
H04N21/251Learning process for intelligent management  e.g. learning user preferences for recommending movies | details of learning user preferences for the retrieval of video data in a video database | (ref: G06F17/30843)| | computer systems using learning methods | (ref: G06N3/08)0.477
H04N21/2543Billing |   e.g. for subscription services | payment schemes  architectures or protocols | (ref: G06Q20/00)| | e-commerce | (ref: G06Q30/00)| | arrangements for billing for the use of broadcast information or broadcast-related information | (ref: H04H60/21)| | charging arrangements in data networks | (ref: H04L12/14)0.477
H04N21/4314for fitting data in a restricted space on the screen  e.g. EPG data in a rectangular grid0.477
H04N21/4858for modifying screen layout parameters  e.g. fonts  size of the windows0.477
H04N21/44008involving operations for analysing video streams  e.g. detecting features or characteristics in the video stream | arrangements characterised by components specially adapted for monitoring  identification or recognition of video in broadcast systems | (ref: H04H60/59)0.477
H04N5/913for scrambling | | for copy protection| scrambling of a television signal for transmission | (ref: H04N7/167)0.477
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.476
H04W4/48for in-vehicle communication0.476
H04W4/42for mass transport vehicles  e.g. buses  trains or aircraft0.476
B64D11/00155Individual entertainment or communication system remote controls therefor  located in or connected to seat components  e.g. to seat back or arm rest0.476
H04L61/2007internet protocol [IP] addresses0.476
H04L69/06Notations for structuring of protocol data  e.g. abstract syntax notation one [ASN.1]0.476
H04L67/1012based on compliance of requirements or conditions with available server resources0.476
H04L69/18Multi-protocol handler  e.g. single device capable of handling multiple protocols | multilayer or multiprotocol switches | (ref: H04L49/602)0.476
G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component  e.g. monitoring the presence of processing resources  peripherals  I/O links  software programs | verification or detection of system hardware configuration | (ref: G06F11/2247)0.476
H04L41/04Architectural aspects of network management arrangements0.476
G06F11/3006where the computing system is distributed  e.g. networked systems  clusters  multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50)0.476
H04N21/4665involving classification methods  e.g. Decision trees0.476
H04N21/2542for selling goods  e.g. TV shopping | payment schemes  payment architectures or payment protocols for electronic shopping systems | (ref: G06Q20/12)0.476
H04N21/43637involving a wireless protocol  e.g. Bluetooth or wireless LAN | IEEE 802.11| arrangements for wireless networking or broadcasting of information in indoor or near-field type systems | (ref: H04B10/114)| | wireless local area data switching networks | (ref: H04W)| | flow control in wireless networks | (ref: H04W28/10)0.476
H04N21/25883being end-user demographical data  e.g. age  family status or address | arrangements for identifying locations of users in broadcast systems | (ref: H04H60/52)0.476
G06Q20/208Input by product or record sensing  e.g. weighing or scanner processing0.476
G07G1/0054with control of supplementary check-parameters  e.g. weight or number of articles0.476
H04L12/2854Wide area networks  e.g. public data networks0.476
G06Q30/0615Anonymizing0.476
G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer | (ref: G06F3/16)|  takes precedence0.476
G06Q99/00Subject matter not provided for in other groups of this subclass0.476
G06Q20/3676Balancing accounts0.476
H04N21/8126involving additional data  e.g. news  sports  stocks  weather forecasts0.475
G06Q30/0272Period of advertisement exposure0.475
H04N21/8166involving executable data  e.g. software | arrangements for executing specific programs | (ref: G06F9/44)| | broadcasting computer programmes in broadcast systems | (ref: H04H20/91)| | movement of software or configuration parameters  in data networks | (ref: H04L29/08981)0.475
H04W88/02Terminal devices0.475
H04W76/28Discontinuous transmission [DTX]| Discontinuous reception [DRX]0.475
H04W88/18Service support| Network management devices0.475
G06F9/4837time dependent0.475
G06F9/4881Scheduling strategies for dispatcher  e.g. round robin  multi-level priority queues0.475
H04L51/38in combination with wireless systems | mobile application service signalling using messaging  e.g. SMS  | (ref: H04W4/12)0.475
G06F3/04883for entering handwritten data  e.g. gestures  text0.475
H04N21/44Processing of video elementary streams  e.g. splicing a video clip retrieved from local storage with an incoming video stream  rendering scenes according to MPEG-4 scene graphs0.475
A63F13/5375for graphically or textually suggesting an action  e.g. by displaying an arrow indicating a turn in a driving game0.475
H04N21/4781Games0.475
A63F13/00Video games  i.e. games using an electronically generated display having two or more dimensions | gaming systems which provide a financial reward | (ref: G07F17/32)0.475
H04N21/6581Reference data  e.g. a movie identifier for ordering a movie or a product identifier in a home shopping application0.475
A63F13/67adaptively or by learning from player actions  e.g. skill level adjustment or by storing successful combat sequences for re-use0.475
G10L25/51for comparison or discrimination0.474
G10L17/02Preprocessing operations  e.g. segment selection| Pattern representation or modelling  e.g. based on linear discriminant analysis [LDA] or principal components| Feature selection or extraction0.474
G10L17/24the user being prompted to utter a password or a predefined phrase0.474
H04L9/3013involving the discrete logarithm problem  e.g. ElGamal or Diffie-Hellman systems0.473
G06K9/6227Selection of pattern recognition techniques  e.g. of classifiers in a multi-classifier system0.472
G06Q30/0639Item locations0.472
G06K7/10366the interrogation device being adapted for miscellaneous applications0.472
G06Q10/0833Tracking0.472
H04W48/04based on user or terminal location or mobility data  e.g. moving direction  speed0.471
H04W40/22using selective relaying for reaching a BTS [Base Transceiver Station] or an access point0.471
H04W76/14Direct-mode setup0.471
H04N21/8455involving pointers to the content  e.g. pointers to the I-frames of the video stream0.471
H04L65/1003Signalling or session protocols0.471
H04L65/1096Features  e.g. call-forwarding or call hold | systems providing special services to telephonic subscribers | (ref: H04M3/42)0.471
H04M3/42017Customized ring-back tones0.471
H04L47/722at the end terminals  e.g. buffer space0.471
H04N21/4438Window management  e.g. event handling following interaction with the user interface0.471
H04W76/34Selective release of ongoing connections0.471
H04W76/50for emergency connections0.471
G07F9/105Heating or cooling means  for temperature and humidity control  for the conditioning of articles and their storage | dispensers for food articles requiring a processing by temperature treatment or conditioning before they are ready for dispensing | (ref: G07F17/0064)0.471
G07F17/12comprising lockable containers  e.g. for accepting clothes to be cleaned0.471
G10L15/083Recognition networks | (ref: G10L15/142)|   | (ref: G10L15/16)|  take precedence0.470
G10L15/063Training0.470
G06Q30/0282Business establishment or product rating or recommendation0.470
G06Q10/063112Skill-based matching of a person or a group to a task0.469
H04M3/4931Directory assistance systems0.468
H04M3/4936Speech interaction details | speech recognition | per se|  | (ref: G10L15/00)0.468
G06N3/006based on simulated virtual individual or collective life forms  e.g. single "avatar"  social simulations  virtual worlds | computer games | (ref: A63F13/00)| | medical simulations | (ref: G06F19/00)| | information retrieval | (ref: G06F17/30873)| | image processing | (ref: G06T)| | telecommunication protocols | (ref: H04L29/06034)0.468
G06N5/02Knowledge representation | (ref: G06N5/04)|  takes precedence0.468
G06Q50/06Electricity  gas or water supply0.468
G06Q40/00Finance| Insurance| Tax strategies| Processing of corporate or income taxes0.468
H04M3/493Interactive information services  e.g. directory enquiries | | Arrangements therefor  e.g. interactive voice response [IVR] systems or voice portals0.468
H04R25/554using a wireless connection  e.g. between microphone and amplifier or using T-coils | near-field transmission in general | (ref: H04B5/00)0.468
H04R25/505using digital signal processing0.468
G06Q30/08Auctions |   matching or brokerage | matching or brokerage for stock exchange | (ref: G06Q40/04)0.468
H04L41/0809Plug-and-play configuration0.467
H04N21/858Linking data to content  e.g. by linking an URL to a video object  by creating a hotspot0.467
H04W60/06De-registration or detaching0.466
H04L9/3221interactive zero-knowledge proofs0.466
H04W72/005Resource management for broadcast services0.466
H04L12/18for broadcast or conference |   e.g. multicast | multicast or broadcast switches | (ref: H04L49/201)0.466
G06F11/3664Environments for testing or debugging software0.465
G06F11/3457Performance evaluation by simulation0.465
G06F11/3688for test execution  e.g. scheduling of test suites0.465
G06Q30/0284Time or distance  e.g. usage of parking meters or taximeters0.465
G07F17/24for parking meters | devices for checking parking time | (ref: G07C1/30)0.465
G06Q30/0235Including timing  i.e. limited awarding or usage time constraint0.465
G06Q30/0238at point-of-sale [POS]0.465
G06Q30/0234Rebate after completed purchase  i.e. post transaction awards0.465
G06Q30/0243Comparative campaigns0.465
H04L61/2076involving update or notification mechanisms  e.g. update of a domain name server with dynamic host configuration protocol [DHCP] assigned addresses0.464
H04L61/6009Caching of addresses | caching data temporarily at an intermediate stage in general | (ref: H04L67/2842)0.464
H04L67/2804for adding application control or application functional data  e.g. adding metadata0.464
H04N21/42684Client identification by a unique number or address  e.g. serial number  MAC address  socket ID | addressing and naming in data networks | (ref: H04L29/12009)0.464
H04N21/25875involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.464
G06Q30/018Business or product certification or verification0.464
G16H20/13delivered from dispensers0.464
B60W50/14Means for informing the driver  warning the driver or prompting a driver intervention0.464
B60W50/12Limiting control by the driver depending on vehicle state  e.g. interlocking means for the control input for preventing unsafe operation0.464
B60R21/01508detecting forces or pressure in bags or modules0.464
B60W50/087where the control system corrects or modifies a request from the driver0.464
B60W40/08related to drivers or passengers0.464
B60K35/00Arrangement of adaptations of instruments specially for vehicles| Dashboards0.464
G10L15/04Segmentation| Word boundary detection0.464
H04L12/282based on user interaction within the home | receiver circuitry for displaying additional information being controlled by a remote control apparatus | (ref: H04N5/44582)0.464
H04R9/08Microphones0.464
G06F3/041Digitisers  e.g. for touch screens or touch pads  characterised by the transducing means0.464
H04L45/38Flow based routing0.464
H04N21/432Content retrieval operation from a local storage medium  e.g. hard-disk | details of retrieval of video data and associated meta data in video databases | (ref: G06F17/30843)0.463
H04N21/458Scheduling content for creating a personalised stream  e.g. by combining a locally stored advertisement with an incoming stream| Updating operations  e.g. for OS modules | | time-related management operations | arrangements for replacing or switching information during the broadcast or during the distribution | (ref: H04H20/10)0.463
H04W4/026using orientation information  e.g. compass0.463
G01S13/08Systems for measuring distance only | indirect measurement | (ref: G01S13/46)0.463
G01S13/0209Systems with very large relative bandwidth  i.e. larger than 10 %  e.g. baseband  pulse  carrier-free  ultrawideband0.463
H04W8/005Discovery of network devices  e.g. terminals0.463
H04W24/10Scheduling measurement reports | | Arrangements for measurement reports0.462
H04W16/14Spectrum sharing arrangements | between different networks0.462
H04W74/04Scheduled | or contention-free|  access0.462
H04W36/0055Transmission and use of information for re-establishing the radio link0.462
H04W74/0808using carrier sensing  e.g. as in CSMA0.462
H04W72/085using measured or perceived quality0.462
H04W72/0453the resource being a frequency  carrier or frequency band0.462
G06F3/0638Organizing or formatting or addressing of data0.461
G06F3/0631by allocating resources to storage systems0.461
G06F9/5022Mechanisms to release resources0.461
G06F9/5077Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455)0.461
G06F3/0662Virtualisation aspects0.461
G06F3/0605by facilitating the interaction with a user or administrator0.461
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment0.461
H04N1/444to a particular document or image or part thereof0.461
G06Q30/0627using item specifications0.461
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.460
H04M3/42102Making use of the called party identifier0.460
H04M3/42008Systems for anonymous communication between parties  e.g. by use of disposal contact identifiers0.460
H04J3/0667Bidirectional timestamps  e.g. NTP or PTP for compensation of clock drift and for compensation of propagation delays | arrangements for monitoring round trip delays in packet switching networks | (ref: H04L43/0864)0.460
H04N21/4431characterized by the use of Application Program Interface [API] libraries0.460
G06F21/43wireless channels0.460
G06N5/046Forward inferencing  production systems0.459
G06F11/2733Test interface between tester and unit under test0.459
H04N21/26283for associating distribution time parameters to content  e.g. to generate electronic program guide data0.459
H04N21/2323using file mapping0.459
H04N21/2358for generating different versions  e.g. for different recipient devices0.459
G06F12/123with age lists  e.g. queue  most recently used [MRU] list or least recently used [LRU] list0.459
G06Q20/403Solvency checks0.459
G06Q20/10specially adapted for electronic funds transfer [EFT] systems| specially adapted for home banking systems0.459
H04W4/40for vehicles  e.g. vehicle-to-pedestrians [V2P]0.459
H04B17/318Received signal strength0.459
G06F9/5005to service a request0.459
A63F13/352involving special game server arrangements  e.g. regional servers connected to a national server or a plurality of servers managing partitions of the game world0.459
A63F13/25Output arrangements for video game devices0.459
H04L9/3006underlying computational problems or public-key parameters0.458
G06F9/468Specific access rights for resources  e.g. using capability register0.458
G06T7/13Edge detection0.458
G06T13/203D [Three Dimensional] animation0.458
G06T13/802D [Two Dimensional] animation  e.g. using sprites0.458
H04N21/2368Multiplexing of audio and video streams0.457
H04N21/233Processing of audio elementary streams | details of formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes | (ref: G10L19/167)| | arrangements characterised by components specially adapted for monitoring  identification or recognition of audio in broadcast systems | (ref: H04H60/58)0.457
H04N21/26241involving the time of distribution  e.g. the best time of the day for inserting an advertisement or airing a children program0.457
G06Q50/22Social work0.457
A63F13/847Cooperative playing  e.g. requiring coordinated actions from several players to achieve a common goal0.457
A63F13/42by mapping the input signals into game commands  e.g. mapping the displacement of a stylus on a touch screen to the steering angle of a virtual vehicle0.457
H04N1/00225details of image data generation  e.g. scan-to-email or network scanners | using an image reading device as a local input to a computer | (ref: H04N1/00241)0.457
H04N1/00949Combining applications  e.g. to create workflows | allocation of computer machine resources considering the execution order of a plurality of tasks | (ref: G06F9/5038)0.457
G06Q30/0268at point-of-sale [POS]0.457
G06T15/04Texture mapping0.456
A63F13/56Computing the motion of game characters with respect to other game characters  game objects or elements of the game scene  e.g. for simulating the behaviour of a group of virtual soldiers or for path finding0.456
G06T17/20Finite element generation  e.g. wire-frame surface description  | tesselation0.456
H04N21/234372for performing aspect ratio conversion0.456
H04N21/64753directed to the client0.456
H04N21/44029for generating different versions0.456
H04N21/252Processing of multiple end-users' preferences to derive collaborative data0.456
H04N21/4223Cameras | (ref: H04N5/225)|  takes precedence0.456
H04N21/854Content authoring0.455
H04L12/1859adapted to provide push services  e.g. data channels0.455
H04W68/005Transmission of information for alerting of incoming communication0.455
H04L41/0681involving configuration of triggering conditions0.455
H04L45/28Route fault recovery | network fault recovery | (ref: H04L41/0654)0.455
H04L41/0668selecting new candidate element0.455
H04W64/003locating network equipment0.455
H04L41/5019Ensuring SLA | flow or congestion control at network level | (ref: H04L47/10)0.455
H04W40/12based on transmission quality or channel quality0.455
H04L45/121Minimizing delay0.455
H04W36/305Reselection due to radio link failure | control signalling for hand-off failure | (ref: H04W36/0079)0.455
H04N21/845Structuring of content  e.g. decomposing content into time segments0.455
G06F17/18for evaluating statistical data |   e.g. average values  frequency distributions  probability functions  regression analysis | forecasting specially adapted for a specific administrative  business or logistic context | (ref: G06Q10/04)0.455
H04N21/23473by pre-encrypting0.455
H04N21/4415using biometric characteristics of the user  e.g. by voice recognition or fingerprint scanning | methods or arrangements for recognising patterns | (ref: G06K9/00)| | restricting access to computer systems by authenticating users using biometric data | (ref: G06F21/32)| | authentication mechanisms using biometrical features for network security | (ref: H04L29/06809)| | authentication in wireless network security | (ref: H04W12/06)0.454
H04W76/25Maintenance of established connections0.454
G06Q20/027involving a payment switch or gateway0.454
H04N21/4347Demultiplexing of several video streams0.454
H04N21/8451using Advanced Video Coding [AVC]0.454
H04N21/236Assembling of a multiplex stream  e.g. transport stream  by combining a video stream with other content or additional data  e.g. inserting a Uniform Resource Locator [URL] into a video stream  multiplexing software data into a video stream| Remultiplexing of multiplex streams| Insertion of stuffing bits into the multiplex stream  e.g. to obtain a constant bit-rate| Assembling of a packetised elementary stream | multiplexing of data packets for data networks  e.g. RTP/UDP | (ref: H04L65/00)0.454
H04N21/816involving special video data  e.g 3D video0.454
H04N21/44209Monitoring of downstream path of the transmission network originating from a server  e.g. bandwidth variations of a wireless network | arrangements for maintenance or administration in data switching networks involving bandwidth and capacity management | (ref: H04L41/0896)0.454
H04N21/4621Controlling the complexity of the content stream or additional data  e.g. lowering the resolution or bit-rate of the video stream for a mobile client with a small screen | arrangements for using the results of monitoring on user's side in broadcast systems | (ref: H04H60/65)| | flow control in packet networks | (ref: H04L47/10)0.454
H04N19/70characterised by syntax aspects related to video coding  e.g. related to compression standards0.454
H04L67/1065Discovery involving distributed pre-established resource-based relationships among peers  e.g. based on distributed hash tables [DHT] | pre-configuration of logical or physical connections | (ref: H04L67/1053)0.454
H04L12/1428Invoice generation  e.g. customization  lay-out  database processing  algorithms for calculating the bill or formatting invoices as WWW pages | invoicing in general | (ref: G06Q30/04)0.454
H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself  e.g. learning user preferences for recommending movies  resolving scheduling conflicts0.453
G10L15/00Speech recognition | (ref: G10L17/00)|  takes precedence0.453
H04L29/0881involving pre-fetching or pre-delivering data0.453
H04N21/2405Monitoring of the internal components or processes of the server  e.g. server load | allocation of resources in multiprogramming arrangements | (ref: G06F9/50)| | performance measurement of computer activity | (ref: G06F11/34)0.453
H04L29/08819involving policies or rules for updating  deleting or replacing the stored data0.453
H04L47/627policing0.453
H04L47/125Load balancing  e.g. traffic engineering | load balancing among servers | (ref: H04L67/1002)0.453
H04L49/3018Input queuing0.453
H04L49/90Queuing arrangements0.453
G06Q10/083Shipping0.453
G06Q10/0831Overseas transactions0.453
H03G3/3089Control of digital or coded signals0.453
H04N5/147Scene change detection0.453
H03G3/3005in amplifiers suitable for low-frequencies  e.g. audio amplifiers | (ref: H03G3/32)|   | (ref: H03G3/34)|  take precedence0.453
H03G3/24Control dependent upon ambient noise level or sound level0.453
H04L41/00Arrangements for maintenance or administration or management of packet switching networks0.453
H04W72/0406involving control information exchange between nodes0.453
H04L41/0654Network fault recovery | backup route selection | (ref: H04L45/22)| | route fault recovery | (ref: H04L45/28)| | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)0.453
H04L43/067for time frame related reporting0.453
H04L12/5601Transfer mode dependent  e.g. ATM0.453
G06Q20/206comprising security or user identification provision  e.g. password entry0.452
B60R25/04operating on the propulsion system  e.g. engine or drive motor0.452
B60R25/01operating on vehicle systems or fittings  e.g. on doors  seats or windscreens0.452
A63F13/335using Internet0.452
A63F13/323between game devices with different hardware characteristics  e.g. hand-held game devices connectable to game consoles or arcade machines0.452
A63F13/40Processing input control signals of video game devices  e.g. signals generated by the player or derived from the environment0.452
G06F12/128adapted to multidimensional cache systems  e.g. set-associative  multicache  multiset or multilevel0.452
G06F12/126with special data handling  e.g. priority of data or instructions  handling errors or pinning0.452
G06F12/0269Incremental or concurrent garbage collection  e.g. in real-time systems | (ref: G06F12/0261)|  takes precedence0.452
G06F11/3438monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22)0.452
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence0.452
G06Q50/28Logistics  e.g. warehousing  loading  distribution or shipping0.452
A61B5/0022Monitoring a patient using a global network  e.g. telephone networks  internet0.452
G16H40/60for the operation of medical equipment or devices0.452
G16H10/65stored on portable record carriers  e.g. on smartcards  RFID tags or CD0.452
A61B5/1176Recognition of faces0.452
A61B5/1172using fingerprinting0.452
A61B5/6898Portable consumer electronic devices  e.g. music players  telephones  tablet computers0.452
A61B5/002Monitoring the patient using a local or closed circuit  e.g. in a room or building | (ref: A61B5/0017)|  takes precedence0.452
G06F3/1438using more than one graphics controller0.451
G09G5/14Display of multiple viewports0.451
G06F3/1446display composed of modules  e.g. video walls0.451
G06Q10/1053Employment or hiring0.451
H04L65/4015where at least one of the additional parallel sessions is real time or time sensitive  e.g. white board sharing  collaboration or spawning of a subconference | telewriting  virtual reality or network gaming | (ref: H04L67/38)0.451
H04L67/2857involving storage of data provided by user terminals  i.e. reverse caching0.451
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.451
H04N21/42204User interfaces specially adapted for controlling a client device through a remote control device| Remote control devices therefor | interaction techniques for graphical user interfaces in general  | see|  | (ref: G06F3/048)| | computer pointing devices in general  | see|  | (ref: G06F3/033)| | user interfaces for controlling a tuning device of a television receiver through a remote control | (ref: H03J9/00)| | constructive details of casings for the remote control device | (ref: H01H9/0235)| | remote control of peripheral devices connected to a television receiver through the remote control d0.451
H04L9/004for fault attacks0.451
H04W8/245from a network towards a terminal0.450
G10L21/0208Noise filtering0.450
G10L19/008Multichannel audio signal coding or decoding  i.e. using interchannel correlation to reduce redundancies  e.g. joint-stereo  intensity-coding  matrixing | arrangements for reproducing spatial sound | (ref: H04R5/00)| | stereophonic systems  e.g. spatial sound capture or matrixing of audio signals in the decoded state | (ref: H04S)0.450
G10L25/78Detection of presence or absence of voice signals | switching of direction of transmission by voice frequency in two-way loud-speaking telephone systems | (ref: H04M9/10)0.450
H04R3/12for distributing signals to two or more loudspeakers | specially adapted for hearing aids | (ref: H04R25/407)0.450
H04L61/1541for service discovery | network applications for service discovery | (ref: H04L67/16)| | discovery of network devices in wireless communication networks | (ref: H04W8/005)0.450
G06Q20/3572Multiple accounts on card0.449
H04W80/00Wireless network protocols or protocol adaptations to wireless operation  e.g. WAP [Wireless Application Protocol]0.449
H04L69/04Protocols for data compression | compression in general | (ref: H03M7/30)| | reduction of the amount or size of exchanged application data at an intermediate network processing stage | (ref: H04L67/2828)| | optimizing  e.g. header compression  information sizing in wireless communication networks | (ref: H04W28/06)0.449
H03M7/3091Data deduplication0.449
H03M7/3084using adaptive string matching  e.g. the Lempel-Ziv method0.449
H04L63/1433Vulnerability analysis0.449
G06N7/00Computer systems based on specific mathematical models0.449
G06Q20/325using wireless networks0.449
H04N5/76Television signal recording | diagnosis  testing or measuring for television signal recorders | (ref: H04N17/06)| | recording in connection with measuring | (ref: G01D)| | information storage | in which the television signal is not involved  driving  starting  stopping  head switching  editing  indexing|  in general | (ref: G11)|   e.g. | (ref: G11B)0.449
H04N21/242Synchronization processes  e.g. processing of Program Clock References [PCR] | synchronisation arrangements in time-division multiplex systems | (ref: H04J3/06)| | arrangements for synchronising broadcast or distribution via plural systems in broadcast distribution systems | (ref: H04H20/18)| | arrangements for synchronising receiver with transmitter | (ref: H04L7/00)| | synchronising circuits with arrangements for extending range of synchronisation at the transmitter end | (ref: H04N5/067)0.449
H04N5/783Adaptations for reproducing at a rate different from the recording rate0.449
H04N21/6547comprising parameters  e.g. for client setup0.449
H04N21/64738Monitoring network characteristics  e.g. bandwidth  congestion level | data switched network analysis | (ref: H04L41/14)| | monitoring functioning in data switched networks | (ref: H04L43/0817)| | flow control in packet networks | (ref: H04L47/10)0.449
H04N21/462Content or additional data management  e.g. creating a master electronic program guide from data received from the Internet and a Head-end  controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities0.449
G06N3/0472using probabilistic elements  e.g. p-rams  stochastic processors0.449
H04L9/007involving hierarchical structures0.448
H04L61/30Arrangements for managing names  e.g. use of aliases or nicknames | retrieval from the Internet by using information identifiers  e.g. uniform resource locators [URLs] | (ref: G06F17/30876)| | name-to-address mapping | (ref: H04L61/15)0.448
H04W68/02Arrangements for increasing efficiency of notification or paging channel0.448
H04L45/745Address table lookup or address filtering0.448
H04L67/2828for reducing the amount or size of exchanged application data | protocols for data compression | (ref: H04L69/04)| | digital video compression  | (ref: H04N19/00)0.448
G08B5/36using visible light sources0.448
G08B3/00Audible signalling systems| Audible personal calling systems | signalling devices actuated by tyre pressure | (ref: B60C23/02)| | alarm locks | (ref: E05B45/00)|   e.g. with mechanically-operated bells | (ref: E05B45/02)|   electric | (ref: E05B45/06)| | sound producing devices  e.g. hooter  buzzer  | (ref: G10K)| | telephonic systems provided with personal calling arrangements | (ref: H04M11/022)0.448
G06F9/4418Suspend and resume| Hibernate and awake0.448
H04L41/0859by keeping history of different configuration generations or versions0.448
G06F9/44594Unloading0.448
G06F1/1637Details related to the display arrangement  including those related to the mounting of the display in the housing | constructional details related to the housing of computer displays in general | (ref: G06F1/1601)0.447
G06F21/83input devices  e.g. keyboards  mice or controllers thereof0.447
G06F1/1658related to the mounting of internal components  e.g. disc drive or any other functional module0.447
G06F1/1605Multimedia displays  e.g. with integrated or attached speakers  cameras  microphones0.447
H04N5/23296Control of means for changing angle of the field of view  e.g. optical zoom objective  electronic zooming or combined use of optical and electronic zooming | optical details of zoom lenses | (ref: G02B15/14)| | optical zooming only for cameras | (ref: G03B5/00)0.447
H04N7/14Systems for two-way working | (ref: H04N7/12)|   |  | (ref: H04N7/173)|  take precedence0.447
H04N5/23206Transmission of camera control signals via a network  e.g. Internet0.447
H04R1/023Screens for loudspeakers0.447
H04N5/247Arrangements of television cameras | constructional details of cameras | (ref: H04N5/2251)0.447
G06F1/1671Special purpose buttons or auxiliary keyboards  e.g. retractable mini keypads  keypads or buttons that remain accessible at closed laptop | (ref: G06F1/1666)|  takes precedence0.447
H04R1/34by using a single transducer with sound reflecting  diffracting  directing or guiding means | specially adapted for hearing aids | (ref: H04R25/402)0.447
G06F1/16Constructional details or arrangements0.447
H04N7/142Constructional details of the terminal equipment  e.g. arrangements of the camera and the display0.447
G08C23/02using infrasonic  sonic or ultrasonic waves0.447
H04R1/021incorporating only one transducer0.447
H04R1/026Supports for loudspeaker casings0.447
G06F1/203for portable computers  e.g. for laptops0.447
G06F1/1688the I/O peripheral being integrated loudspeakers0.447
H04N5/23222Computer-aided capture of images  e.g. transfer from script file into camera  check of taken image quality  advice or proposal for image composition or decision on when to take image0.447
H04N5/272Means for inserting a foreground image in a background image  i.e. inlay  outlay0.447
H04N9/8715involving the mixing of the reproduced video signal with a non-recorded signal  e.g. a text signal0.447
G11B27/031Electronic editing of digitised analogue information signals  e.g. audio or video signals0.447
G11B27/007reproducing continuously a part of the information  i.e. repeating0.447
G11B27/036Insert-editing0.447
G06F3/0304Detection arrangements using opto-electronic means | constructional details of pointing devices not related to the detection arrangement using opto-electronic means | (ref: G06F3/033)|  and subgroups| optical digitisers | (ref: G06F3/042)0.447
H04L9/0852Quantum cryptography | transmission systems employing electromagnetic waves other than radio waves  e.g. light  infra-red | (ref: H04B10/00)| | wavelength-division multiplex systems | (ref: H04J14/02)0.447
H04N21/4392involving audio buffer management0.447
H04L65/4069Services related to one way streaming0.447
H04L7/0012by comparing receiver clock with transmitter clock0.447
H04N21/4305Synchronizing client clock from received content stream  e.g. locking decoder clock with encoder clock  extraction of the PCR packets | arrangements for synchronising receiver with transmitter by comparing receiver clock with transmitter clock | (ref: H04L7/0012)| | arrangements for synchronising receiver with transmitter wherein the receiver takes measures against momentary loss of synchronisation | (ref: H04L7/0083)0.447
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines0.446
G06F9/5061Partitioning or combining of resources0.446
G06F9/4806Task transfer initiation or dispatching0.446
G06F9/50Allocation of resources  e.g. of the central processing unit [CPU]0.446
G06F9/5011the resources being hardware resources other than CPUs  Servers and Terminals0.446
G06F9/4482Procedural0.446
H04L47/2483Flow identification0.446
H04L47/2441Flow classification0.446
H04L47/2475Application aware0.446
H04B1/3827Portable transceivers0.446
H04N21/4586Content update operation triggered locally  e.g. by comparing the version of software modules in a DVB carousel to the version stored locally | deployment  distribution  installation  update of software | (ref: G06F8/65)| | program updating while running in general | (ref: G06F8/656)| | error detection or correction of the data by redundancy during software upgrading | (ref: G06F11/1433)| | arrangements for updating broadcast information or broadcast-related information | (ref: H04H60/25)0.445
G06F8/36Software reuse0.445
G06F8/34Graphical or visual programming0.445
G10L15/1815Semantic context  e.g. disambiguation of the recognition hypotheses based on word meaning0.445
G10L15/28Constructional details of speech recognition systems0.445
G06F9/3867using instruction pipelines0.445
H04L67/1044Group management mechanisms | user group management in wireless communication networks | (ref: H04W4/08)| | management of multicast group membership | (ref: H04L12/185)| | reconfiguring of node membership in a computing system to eliminate errors | (ref: G06F11/1425)0.445
G06F9/30079Pipeline control instructions0.445
H04W4/38for collecting sensor information0.445
H04L1/0003by switching between different modulation schemes0.444
H04L5/0055Physical resource allocation for ACK/NACK | for physical mapping arrangements in ARQ protocols | (ref: H04L1/1861)0.444
H04L1/1614using bitmaps0.444
H04L51/22Mailbox-related details | computer aided management of electronic mail | (ref: G06Q10/10)0.444
H04L41/145involving simulating  designing  planning or modelling of a network0.444
G07F7/0846On-card display means0.444
G07F7/08by coded identity card or credit card | or other personal identification means | without personal verification means | (ref: G07F7/02)0.444
G07F7/0866by active credit-cards adapted therefor | (ref: G07F7/1008)|  takes precedence0.444
G07F7/10together with a coded signal |   e.g. in the form of personal identification information  like personal identification number [PIN] or biometric data0.444
H04N7/04Systems for the transmission of one television signal  i.e. both picture and sound  by a single carrier | (ref: H04N7/084)|   | (ref: H04N7/087)|  take precedence0.443
G11B27/105of operating discs0.443
G10L21/06Transformation of speech into a non-audible representation  e.g. speech visualisation or speech processing for tactile aids | (ref: G10L15/26)|  takes precedence0.443
A63F13/215comprising means for detecting acoustic signals  e.g. using a microphone0.443
G10L13/02Methods for producing synthetic speech| Speech synthesisers0.442
G06F8/70Software maintenance or management0.442
H04L63/16Implementing security features at a particular protocol layer0.442
G16H20/00ICT specially adapted for therapies or health-improving plans  e.g. for handling prescriptions  for steering therapy or for monitoring patient compliance0.442
G16H10/40for data related to laboratory analysis  e.g. patient specimen analysis0.442
H04L12/46Interconnection of networks0.442
H04N21/6332directed to client0.441
H04L47/286Time to live0.441
H04N21/440245the reformatting operation being performed only on part of the stream  e.g. a region of the image or a time segment0.441
H04N21/440281by altering the temporal resolution  e.g. by frame skipping | television signal recording using magnetic recording on tape for reproducing at a rate different from the recording rate | (ref: H04N5/783)0.441
H04N21/234381by altering the temporal resolution  e.g. decreasing the frame rate by frame skipping0.441
H04L65/4023where none of the additional parallel sessions is real time or time sensitive  e.g. downloading a file in a parallel FTP session  initiating an email or combinational services | message switching systems | (ref: H04L51/00)| | instant messaging | (ref: H04L51/04)| | file transfer | (ref: H04L67/06)| | web-based applications | (ref: H04L67/02)0.441
G11B27/11by using information not detectable on the record carrier0.441
H04N21/47205for manipulating displayed content  e.g. interacting with MPEG-4 objects  editing locally0.441
G06F9/5083Techniques for rebalancing the load in a distributed system0.441
G06F3/16Sound input| Sound output | conversion of speech into digital information or | vice versa|  | (ref: G10L)0.441
G11B27/005Reproducing at a different information rate from the information rate of recording | for television signals | (ref: H04N5/783)0.440
G10L15/32Multiple recognisers used in sequence or in parallel| Score combination systems therefor  e.g. voting systems0.440
G06F12/0223User address space allocation  e.g. contiguous or non contiguous base addressing0.440
G06Q20/407Cancellation of a transaction0.440
G06Q30/0267Wireless devices0.440
G05B15/02electric0.439
H04W76/16Involving different core network technologies  e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer0.439
H04L12/2809indicating that an appliance service is present in a home automation network | arrangements for service discovery | (ref: H04L29/08648)| | monitoring functionality | (ref: H04L43/0817)0.439
H04L12/281indicating a format for calling an appliance service function in a home automation network | protocols for network applications involving the use of web-based technology | (ref: H04L29/08099)0.439
H04L12/2836Protocol conversion between an external network and a home network | protocol conversion | (ref: H04L29/06068)| | adaptation of digital video signals for transport over a specific home network | (ref: H04N7/24)| | controlling appliance services of a home automation network from a device located outside the home and the home network | (ref: H04L12/2818)0.439
A63F13/537using indicators  e.g. showing the condition of a game character on screen0.439
G06N7/005Probabilistic networks0.439
H04L67/04adapted for terminals or networks with limited resources or for terminal portability  e.g. wireless application protocol [WAP] | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)0.439
G06F21/564by virus signature recognition0.438
G06F21/54by adding security routines or objects to programs0.438
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities0.438
G06F9/5016the resource being the memory0.438
G06F12/0842for multiprocessing or multitasking0.438
G06F9/4406Loading of operating system0.438
G06F12/0804with main memory updating | (ref: G06F12/0806)|  takes precedence0.438
G06F12/0871Allocation or management of cache space0.438
G06F12/0891using clearing  invalidating or resetting means0.438
G06Q30/0264based upon schedule0.438
G06F7/02Comparing digital values | (ref: G06F7/06)|   | (ref: G06F7/22)|   |  | (ref: G06F7/38)|  take precedence| information retrieval | (ref: G06F17/30)| | comparing pulses | (ref: H03K5/22)0.437
G06F7/5443Sum of products | for applications thereof  | see|  the relevant places  e.g. | (ref: G06F17/10)|   | (ref: H03H17/00)0.437
H04W4/06Selective distribution of broadcast services  e.g. multimedia broadcast multicast service [MBMS]| Services to user groups| One-way selective calling services0.437
G01S13/765with exchange of information between interrogator and responder0.437
H04N21/6373for rate control |   e.g. request to the server to modify its transmission rate | flow control in packet networks | (ref: H04L47/10)0.436
G07C9/00817where the code of the lock can be programmed0.436
H04W60/005Multiple registrations  e.g. multihoming0.436
G05B19/056Programming the PLC0.436
G05B19/058Safety  monitoring0.436
H04N21/42201biosensors  e.g. heat sensor for presence detection  EEG sensors or any limb activity sensors worn by the user | input arrangements for interaction with the human body based on nervous system activity detection | (ref: G06F3/015)0.436
H04N21/42222Additional components integrated in the remote control device  e.g. timer  speaker  sensors for detecting position  direction or movement of the remote control  microphone or battery charging device0.436
G06F3/0383Signal control means within the pointing device0.436
H04W8/22Processing or transfer of terminal data  e.g. status or physical capabilities0.436
H04W28/16Central resource management| Negotiation of resources | or communication parameters|   e.g. negotiating bandwidth or QoS [Quality of Service]0.436
H04N21/44004involving video buffer management  e.g. video decoder buffer or video display buffer0.436
H04L45/122Minimizing distance  e.g. ? number of hops0.436
G06Q20/16Payments settled via telecommunication systems0.436
G06Q20/4093Monitoring of card authentication0.436
H04L41/5003Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]0.435
G01S13/89for mapping or imaging0.435
G01S13/878Combination of several spaced transmitters or receivers of known location for determining the position of a transponder or a reflector | (ref: G01S13/874)|  takes precedence0.435
G01S13/04Systems determining the presence of a target | based on relative movement of target | (ref: G01S13/56)0.435
G01S7/412based on a comparison between measured values and known or stored values0.435
H04L65/4061"Push-to-X" services | push-to-talk services in wireless networks | (ref: H04W4/10)| | connection management  e.g. connection set-up  manipulation or release for push-to-talk or push-on-call services in wireless communication networks | (ref: H04W76/45)0.435
G16H50/30for calculating health indices| for individual health risk assessment0.435
G08G1/012from other sources than vehicle or roadside beacons  e.g. mobile networks0.435
G08G1/0133for classifying traffic situation0.435
G07C5/08Registering or indicating performance data other than driving  working  idle  or waiting time  with or without registering driving  working  idle or waiting time0.435
G07C5/008communicating information to a remotely located station | transmission systems for measured values | (ref: G08C)0.435
G07C5/0841Registering performance data | recording measured values | (ref: G01D)| | information storage | (ref: G11B)0.435
G06F11/3447Performance evaluation by modeling0.435
G06Q20/08Payment architectures0.434
G06Q20/28Pre-payment schemes  e.g. "pay before"0.434
G06Q20/3255using an SMS for payment0.434
G06Q20/102Bill distribution or payments0.434
G06Q20/30characterised by the use of specific devices0.434
G07B15/063using wireless information transmission between the vehicle and a fixed station | identification of vehicles | (ref: G08G)0.434
G06Q30/0236Incentive or reward received by requiring registration or ID from user0.434
G06F7/588Random number generators  i.e. based on natural stochastic processes0.433
H04W76/00Connection management0.433
H04W24/08Testing  | supervising or monitoring|  using real traffic0.433
H04W4/46for vehicle-to-vehicle communication [V2V]0.433
G06T15/205Image-based rendering0.433
G06T7/194involving foreground-background segmentation0.433
G06T7/12Edge-based segmentation0.433
G06T7/11Region-based segmentation0.433
H04N21/434Disassembling of a multiplex stream  e.g. demultiplexing audio and video streams  extraction of additional data from a video stream| Remultiplexing of multiplex streams| Extraction or processing of SI| Disassembling of packetised elementary stream | demultiplexing of data packets for data networks  e.g. RTP/UDP | (ref: H04L65/00)0.433
H04L41/0663involving offline failover planning0.433
E05B47/0046Electric or magnetic means in the striker or on the frame| Operating or controlling the striker plate | (ref: E05B47/0696)|   | (ref: E05B63/248)|  take precedence0.433
H04N1/4433to an apparatus  part of an apparatus or an apparatus function0.433
E05B47/0002with electromagnets0.433
E05B49/00Electric permutation locks| Circuits therefor | | Mechanical aspects of electronic locks| Mechanical keys therefor | arrangements for sensing or reading record carriers | (ref: G06K7/00)|   | (ref: G06K9/00)| | mechanisms including electronic locks actuated by nonmechanical keys such as passive and active electrical keys and other data carriers | (ref: G07C9/00)|   | (ref: G07F7/00)| | electronic switching | (ref: H03K17/00)0.433
G07C9/00182operated with unidirectional data transmission between data carrier and locks0.433
G06K19/10at least one kind of marking being used for authentication  e.g. of credit or identity cards | identification cards not to be read by a machine | (ref: B42D25/00)| | |  verification of coded identity or credit cards in mechanisms actuated by them | (ref: G07F7/12)|  | | printed identity or similar identification-bearing cards not for use with a machine | (ref: B42D25/00)0.433
E05B65/006for covers or panels | for manholes | (ref: E02D29/1427)| | for holes enabling access to installations in buildings | (ref: E04F19/08)| | for pressure vessels | (ref: F16J13/00)0.433
E05B73/0082for office machines  e.g. PC's  portable computers  typewriters  calculators0.433
H04N1/4426involving separate means  e.g. a server  a magnetic card0.433
G06Q30/0613Third-party assisted0.432
G06Q10/063118Staff planning in a project environment0.432
G06N3/004Artificial life  i.e. computers simulating life0.432
G10L15/07to the speaker0.432
G06F21/565by checking file integrity0.432
H04L61/6086involving dual-stack hosts  e.g. in internet protocol version 4 [IPv4]/ internet protocol version 6 [IPv6] networks | implementation details of transmission control protocol [TCP]/internet protocol [IP] or user datagram protocol [UDP]/internet protocol [IP] stack architecture | (ref: H04L69/161)0.432
G06F21/79in semiconductor storage media  e.g. directly-addressable memories0.431
G06F3/0673Single storage device0.431
G06F3/0679Non-volatile semiconductor memory device  e.g. flash memory  one time programmable memory [OTP]0.431
G06F3/0653Monitoring storage devices or systems0.431
G06F3/0659Command handling arrangements  e.g. command buffers  queues  command scheduling0.431
H04L61/00Network arrangements or network protocols for addressing or naming0.431
H04W52/383power control in peer-to-peer links0.431
H04W52/0212managed by the network  e.g. network or access point is master and terminal is slave0.431
H04W72/0493where an allocation plan is defined based on a resource usage policy0.431
H04L49/254Centralized controller  i.e. arbitration or scheduling0.431
H04L12/2814Exchanging control software or macros for controlling appliance services in a home automation network | arrangements for maintenance or administration involving configuration of the network and network elements | (ref: H04L41/08)0.431
H04L61/6059Internet protocol version 6 [IPv6] addresses0.431
G08B21/0415detecting absence of activity | per se0.431
H04L43/065for device related reporting | reporting of sensed information of home appliances | (ref: H04L12/2803)0.431
H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network | device-related reporting | (ref: H04L43/065)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom | (ref: H04Q9/00)0.431
H04L12/2827Reporting to a device within the home network| wherein the reception of the information reported automatically triggers the execution of a home appliance functionality0.431
H04L45/74Address processing for routing0.431
H04W40/246Connectivity information discovery0.431
H04L12/28characterised by path configuration  e.g. local area networks [LAN]  wide area networks [WAN]0.431
H04N21/6175involving transmission via Internet | broadcast-related systems characterised by the transmission system being the Internet | (ref: H04H60/82)0.431
H04N5/232127setting of focusing region0.431
H04N21/4728for selecting a Region Of Interest [ROI]  e.g. for requesting a higher resolution version of a selected region0.431
G06F3/013Eye tracking input arrangements | (ref: G06F3/015)|  takes precedence0.431
H04R5/04Circuit arrangements  | e.g. for selective connection of amplifier inputs/outputs to loudspeakers  for loudspeaker detection  or for adaptation of settings to personal preferences or hearing impairments | combinations of amplifiers | (ref: H03F3/68)| | stereophonic systems | (ref: H04S)0.430
H04R3/04for correcting frequency response0.430
H03G5/025Equalizers| Volume or gain control in limited frequency bands0.430
H04N21/4852for modifying audio parameters  e.g. switching between mono and stereo0.430
G10L25/30using neural networks0.430
H03G5/165Equalizers| Volume or gain control in limited frequency bands0.430
H04N9/87Regeneration of colour television signals | (ref: H04N9/80)|  takes precedence0.430
G11B20/10Digital recording or reproducing | digital computers in which at least part of the computation is effected electrically  arrangements for handling digital data | (ref: G06F)| | transmission of digital information | (ref: H04L)0.430
G06N3/02using neural network models | for adaptive control | (ref: G05B13/00)| | for image pattern matching | (ref: G06K9/00)| | for image data processing | (ref: G06T1/20)| | for phonetic pattern matching | (ref: G10L15/16)0.430
G10L19/26Pre-filtering or post-filtering0.430
B60R25/257Voice recognition0.430
G08G1/005including pedestrian guidance indicator0.430
G08G1/202Dispatching vehicles on the basis of a location  e.g. taxi dispatching0.430
B60R25/255Eye recognition0.430
G06F11/0778Dumping  i.e. gathering error/state information after a fault for later diagnosis0.430
G06F11/0706the processing taking place on a specific hardware platform or in a specific software environment0.430
H04L12/1813for computer conferences  e.g. chat rooms | protocols for multimedia communication | (ref: H04L29/06027)| | signaling and real-time protocols for multimedia conference | (ref: H04L29/06414)| | instant messaging | (ref: H04L51/04)| | telephonic conference arrangements | (ref: H04M3/56)| | television conference systems | (ref: H04N7/15)0.430
H04M3/02Ringing or otherwise calling substations | selective calling | (ref: H04Q)0.430
G06F8/77Software metrics0.430
H04L43/08Monitoring based on specific metrics0.430
G06F11/323Visualisation of programs or trace data0.430
H04L43/045for graphical visualization of monitoring data | graphical user interfaces | (ref: H04L41/22)| | display of network or application conditions affecting the network application to the application user | (ref: H04L67/36)| | visual indication of the functioning of a computing machine | (ref: G06F11/32)0.430
H04N7/155involving storage of or access to video conference sessions | tracking arrangements for later retrieval of a computer conference content or participants activities | (ref: H04L12/1831)0.430
G01C21/206specially adapted for indoor navigation0.430
H04W4/024Guidance services0.430
H04W4/33for indoor environments  e.g. buildings0.430
H04N21/4784receiving rewards | payment schemes  architectures or protocols | (ref: G06Q20/00)| | e-commerce | (ref: G06Q30/00)| | charging arrangements in data networks | (ref: H04L12/14)0.430
H04M15/00Arrangements for metering  time-control or time indication | | Metering  charging or billing arrangements for voice wireline or wireless communications  e.g. VoIP0.430
H04M15/47Fraud detection or prevention means0.430
H04M15/44Augmented  consolidated or itemized billing statement or bill presentation0.430
A63F13/211using inertial sensors  e.g. accelerometers or gyroscopes0.430
G09G5/363Graphics controllers0.430
A63F13/24Constructional details thereof  e.g. game controllers with detachable joystick handles0.430
G06Q20/342Cards defining paid or billed services or quantities0.429
H04W64/00Locating users or terminals | or network equipment|  for network management purposes  e.g. mobility management0.429
G06F3/012Head tracking input arrangements0.428
G06T17/00Three dimensional [3D] modelling  e.g. data description of 3D objects0.428
H04L63/162at the data link layer0.428
G06Q50/12Hotels or restaurants0.428
G16H20/17delivered via infusion or injection0.428
A61N1/0553Paddle shaped electrodes  e.g. for laminotomy0.428
A61M5/172electrical or electronic | (ref: A61M5/16804)|   | (ref: A61M5/16831)|  take precedence0.428
A61N1/36128Control systems0.428
A61M5/14276specially adapted for implantation0.428
G16H20/40relating to mechanical  radiation or invasive therapies  e.g. surgery  laser therapy  dialysis or acupuncture0.428
A61N1/37264Changing the program| Upgrading firmware0.428
A61N1/025Digital circuitry features of electrotherapy devices  e.g. memory  clocks  processors0.428
A61N1/362Heart stimulators | heart defibrillators | (ref: A61N1/39)0.428
G07F7/127in which both online and offline card verification can take place0.428
H04N21/485End-user interface for client configuration0.428
H04N21/4823using a channel name0.428
H04L41/14involving network analysis or design  e.g. simulation  network model or planning | network monitoring | (ref: H04L43/00)0.428
H04L43/0823Errors | management of events  faults or alarms in networks or network elements | (ref: H04L41/06)0.428
H04W80/10adapted for | application|  session management  e.g. SIP [Session Initiation Protocol] | connection management | (ref: H04W76/00)| | arrangements for session management | (ref: H04L67/14)0.427
H04M15/853Calculate maximum communication time or volume0.427
H04M15/8016based on quality of service [QoS]0.427
H04M15/854Available credit0.427
H04M15/85characterised by the type of condition triggering a notification0.427
H04L65/103in the network0.427
H04L45/16Multipoint routing | arrangements for multicast or broadcast in data networks | (ref: H04L12/18)0.427
H04L47/15in relation to multipoint traffic | arrangements for broadcast or multicast in data networks | (ref: H04L12/18)0.427
A63F13/77involving data related to game devices or game servers  e.g. configuration data  software version or amount of memory0.427
A61B5/024Detecting  measuring or recording pulse rate or heart rate | (ref: A61B5/0205)|   | (ref: A61B5/021)|  take precedence0.427
A61B5/7275Determining trends in physiological measurement data| Predicting development of a medical condition based on physiological measurements  e.g. determining a risk factor0.427
A61B5/163by tracking eye movement  gaze  or pupil change0.427
A61B5/02Detecting  measuring or recording pulse  heart rate  blood pressure or blood flow| Combined pulse/heart-rate/blood pressure determination| Evaluating a cardiovascular condition not otherwise provided for  e.g. using combinations of techniques provided for in this group with electrocardiography or electroauscultation| Heart catheters for measuring blood pressure0.427
A61B5/1112Global tracking of patients  e.g. by using GPS0.427
A61B5/18for vehicle drivers | or machine operators0.427
G06F3/1257by using pre-stored settings  e.g. job templates  presets  print styles0.427
G06F3/1292Mobile client  e.g. wireless printing0.427
G06F3/1222Increasing security of the print job0.427
G06F3/1232Transmitting printer device capabilities  e.g. upon request or periodically0.427
G06F3/1229Printer resources management or printer maintenance  e.g. device status  power levels0.427
H04W36/0038of security context information0.427
H04W36/14Reselecting a network or an air interface0.427
G06Q10/0838Historical data0.427
H04L12/44Star or tree networks0.427
H04L67/1042involving topology management mechanisms0.427
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.427
G06F9/4416Network booting| Remote initial program loading [RIPL]0.427
G07C9/00912for safes  strong-rooms  vaults or the like0.426
B65F1/1615with means for locking  fastening or permanently closing thereof0.426
B65F1/02without removable inserts0.426
A61N1/37282characterised by communication with experts in remote locations using a network0.426
A61N1/37258Alerting the patient0.426
G06F11/1464for networked environments0.426
G06F11/3096wherein the means or processing minimize the use of computing system or of computing system component resources  e.g. non-intrusive monitoring which minimizes the probe effect: sniffing  intercepting  indirectly deriving the monitored data from other directly available data0.426
H04W72/0433between access point and access point controlling device0.426
H04W72/10where an allocation plan is defined|  based on priority criteria0.426
G07F9/023for display  data presentation or advertising arrangements in payment activated and coin-freed apparatus0.426
H04N21/4334Recording operations | recording of a television signal | (ref: H04N5/76)| | arrangements for recording or accumulating broadcast information or broadcast-related information | (ref: H04H60/27)0.426
G06F3/0685Hybrid storage combining heterogeneous device types  e.g. hierarchical storage  hybrid arrays0.425
G06F12/0893Caches characterised by their organisation or structure0.425
G06F3/0608Saving storage space on storage systems0.425
G08B25/14Central alarm receiver or annunciator arrangements0.425
G06Q50/163Property management0.425
G08B25/08using communication transmission lines | (ref: G08B13/19658)|   | (ref: G08B21/0286)|   | (ref: G08B25/016)|  take precedence| specific aspects of telephone communication systems adapted for combination with alarm systems | (ref: H04M11/04)0.425
G08B21/02Alarms for ensuring the safety of persons0.425
G07C9/00904for hotels  motels  office buildings or the like0.425
H04R27/00Public address systems | circuits for preventing acoustic reaction | (ref: H04R3/02)| | circuits for distributing signals to loudspeakers | (ref: H04R3/12)| | | monitoring or testing arrangements for public address systems | (ref: H04R29/007)| | amplifiers | (ref: H03F)0.425
H04L43/0894Packet rate0.425
G06F21/6236between heterogeneous systems0.425
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.425
H04W40/248Connectivity information update0.424
H04M15/8044Least cost routing0.424
G10L15/183using context dependencies  e.g. language models0.424
H04L45/56Routing software0.424
G06T11/001Texturing| Colouring| Generation of texture or colour0.424
H04N5/232933Graphical User Interface [GUI] specifically adapted for controlling image capture or setting capture parameters  e.g. using a touchscreen0.424
H04N5/23293Electronic viewfinders0.424
H04N5/23216Control of parameters  e.g. field or angle of view of camera via graphical user interface  e.g. touchscreen0.424
H04N21/266Channel or content management  e.g. generation and management of keys and entitlement messages in a conditional access system  merging a VOD unicast channel into a multicast channel0.424
H04L65/1013Network architectures  gateways  control or user entities0.424
H04L63/064Hierarchical key distribution  e.g. by multi-tier trusted parties0.424
G06F3/0604Improving or facilitating administration  e.g. storage management0.424
G06F3/064Management of blocks0.424
G06F3/0656Data buffering arrangements0.424
H04L12/4625Single bridge functionality  e.g. connection of two networks over a single bridge0.424
H04L61/6063Transport layer addresses  e.g. aspects of transmission control protocol [TCP] or user datagram protocol [UDP] ports | TCP/IP or UDP protocol aspects or techniques | (ref: H04L69/16)0.424
G06F1/163Wearable computers  e.g. on a belt0.424
G16H40/63for local operation0.424
H04L49/20Support for services or operations0.424
H04L61/2069for group-  multicast- and broadcast-communication | broadcast or conference | (ref: H04L12/18)0.424
H04L49/355Application aware switches  e.g. HTTP0.424
H04L49/15Interconnection of switching modules0.424
H04L43/0805Availability0.424
G06F11/3419by assessing time0.424
G06F11/3452Performance evaluation by statistical analysis0.424
G06Q20/425using two different networks  one for transaction and one for security confirmation0.423
H04L41/5022by giving priorities  e.g. assigning classes of service0.423
G06K9/6296Graphical models  e.g. Bayesian networks | probabilistic networks | per se|  | (ref: G06N7/005)0.423
G06K9/6274based on distances to neighbourhood prototypes  e.g. Restricted Coulomb Energy Networks0.423
H04W84/042Public Land Mobile systems  e.g. cellular systems0.422
H04W8/02Processing of mobility data  e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]| Transfer of mobility data  e.g. between HLR  VLR or external networks0.422
A63F13/46Computing the game score0.422
A63F13/58by computing conditions of game characters  e.g. stamina  strength  motivation or energy level0.422
A63F13/63by the player  e.g. authoring using a level editor0.422
A63F13/798for assessing skills or for ranking players  e.g. for generating a hall of fame | computing the game score | (ref: A63F13/46)0.422
A63F13/655by importing photos  e.g. of the player0.422
G06T7/74involving reference images or patches0.422
G06Q50/14Travel agencies0.422
G01C21/3415Dynamic re-routing  e.g. recalculating the route when the user deviates from calculated route or after detecting real-time traffic data or accidents0.422
G01C21/3644Landmark guidance  e.g. using POIs or conspicuous other objects0.422
H04W8/12between location registers or mobility servers0.422
H04L45/04Interdomain routing  e.g. hierarchical routing0.422
H04L41/0213using standardized network management protocols  e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]0.422
H04L41/142using statistical or mathematical methods0.422
H04L65/1059End-user terminal functionality | substation equipment for use by subscribers | (ref: H04M1/00)| | terminal profiles | (ref: H04L67/303)| | terminal emulation | (ref: H04L67/08)| | adaptation for terminals with limited resources or for terminal portability | (ref: H04L67/04)| | management of video client characteristics | (ref: H04N21/258)|   | (ref: H04N21/4516)0.421
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling0.421
G06Q10/0635Risk analysis0.421
G06F11/0751Error or fault detection not based on redundancy | power supply failures | (ref: G06F1/30)| | network fault management | (ref: H04L41/06)0.421
H04N21/4325by playing back content from the storage medium | reproduction of recorded television signals | (ref: H04N5/76)| | reproduction of recorded television signals | (ref: H04N9/79)0.421
G06N3/088Non-supervised learning  e.g. competitive learning0.420
G06Q30/0281Customer communication at a business location  e.g. providing product or service information  consulting0.420
G10L21/0272Voice signal separating0.420
H04R1/245of microphones0.420
H04N21/4751for defining user accounts  e.g. accounts for children0.420
H04W36/08Reselecting an access point0.420
H04W36/0033with transfer of context information0.420
H04M3/42263where the same subscriber uses different terminals  i.e. nomadism0.420
H04M3/42Systems providing special services or facilities to subscribers0.420
H04M3/42212Call pickup | comprising simultaneous alerting | (ref: H04M3/46)0.420
H04W28/06Optimizing | the usage of the radio link|   e.g. header compression  information sizing |   discarding information | system modifying transmission characteristic according to link quality by modifying frame length | (ref: H04L1/0007)| | dynamic adaptation of the packet size for flow control or congestion control | (ref: H04L47/365)0.420
H04N21/4122additional display device  e.g. video projector | digital output for controlling a plurality of local displays | (ref: G06F3/1423)0.419
H04N21/2365Multiplexing of several video streams0.419
H04L69/166IP fragmentation or TCP segmentation aspects | evaluation of maximum transfer unit [MTU] | (ref: H04L47/36)| | assembly or disassembly of packets in wireless networks | (ref: H04W28/065)0.419
H04W24/00Supervisory  monitoring or testing arrangements0.419
A61N1/36067Movement disorders  e.g. tremor or Parkinson disease | stimulating motor muscle | (ref: A61N1/36003)0.419
A61N1/0551Spinal or peripheral nerve electrodes0.419
A61N1/36062Spinal stimulation0.419
B41J3/4075Tape printers| Label printers | tape cartridges | (ref: B41J15/044)0.419
B41J29/38Drives  motors  controls or automatic cut-off devices for the entire printing mechanism0.419
G06F9/45529Embedded in an application  e.g. JavaScript in a Web browser0.419
H04W36/38by fixed network equipment0.419
H04N21/6143involving transmission via a satellite0.419
G06F21/562Static detection0.419
G07F17/0057for the hiring or rent of vehicles  e.g. cars  bicycles or wheelchairs | car rental | (ref: G07B15/00)0.418
G07C5/0808Diagnosing performance data | testing of vehicles | (ref: G01M17/00)| | testing of electrical installation on vehicles | (ref: G01R31/005)0.418
G07C5/0858wherein the data carrier is removable0.418
G07F17/3272Games involving multiple players0.417
A63F13/497Partially or entirely replaying previous game actions0.417
A63F13/493Resuming a game  e.g. after pausing  malfunction or power failure0.417
H04W76/18Management of setup rejection or failure0.417
H04W36/28involving a plurality of connections  e.g. multi-call  multi-bearer connections0.417
G06K19/06028using bar codes0.417
G07F17/3234about the performance of a gaming system  e.g. revenue  diagnosis of the gaming system0.417
G07F17/3281wherein game attributes are transferred between players  e.g. points  weapons  avatars0.417
G09B19/18Book-keeping or economics0.417
G06T19/00Manipulating 3D models or images for computer graphics0.417
G06F3/1285Remote printer device  e.g. being remote from client or server0.417
G06F3/1254Automatic configuration  e.g. by driver0.417
H04L41/0813Changing of configuration0.417
H04L41/0843based on generic templates0.417
G06F3/1297Printer code translation  conversion  emulation  compression| Configuration of printer parameters0.417
H04L41/0883Semiautomatic configuration  e.g. proposals from system0.417
A63F13/52involving aspects of the displayed game scene0.417
G09G5/397Arrangements specially adapted for transferring the contents of two or more bit-mapped memories to the screen simultaneously  e.g. for mixing or overlay | (ref: G09G5/02)|  takes precedence0.417
H04M3/5166in combination with interactive voice response systems or voice portals  e.g. as front-ends0.416
H04M3/5141Details of processing calls and other types of contacts in an unified manner | unified messaging in packet-switching networks | (ref: H04L51/36)0.416
H04W76/30Connection release0.416
H04S7/302Electronic adaptation of stereophonic sound system to listener position or orientation | (ref: H04S7/301)|  takes precedence0.416
H04S7/301Automatic calibration of stereophonic sound system  e.g. with test microphone0.416
H02J50/12of the resonant type0.416
G06Q10/109Time management  e.g. calendars  reminders  meetings  time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)0.416
G06F9/4856resumption being on a different machine  e.g. task migration  virtual machine migration | (ref: G06F9/5088)|  takes precedence0.416
G06F9/30029Logical and Boolean instructions  e.g. XOR  NOT0.416
A63F13/218using pressure sensors  e.g. generating a signal proportional to the pressure applied by the player0.415
G06F3/015Input arrangements based on nervous system activity detection  e.g. brain waves [EEG] detection  electromyograms [EMG] detection  electrodermal response detection0.415
H04W92/02Inter-networking arrangements0.415
G06N3/10Simulation on general purpose computers0.415
H04W68/08using multi-step notification by increasing the notification area0.415
G01S5/0009Transmission of position information to remote stations | transmission of measured values in general  | (ref: G08C)| | services making use of location of users or terminals  | (ref: H04W4/02)0.415
G06K9/6215Proximity measures  i.e. similarity or distance measures0.415
G06F11/3495for systems0.415
H04L43/04Processing of captured monitoring data0.415
H04L43/06Report generation0.415
G05B19/042using digital processors | (ref: G05B19/05)|  takes precedence0.415
F24F11/58using Internet communication0.415
G01T1/167Measuring radioactive content of objects  e.g. contamination | whole body counters | (ref: G01T1/163)0.415
G01T7/00Details of radiation-measuring instruments0.415
G06Q10/063Operations research or analysis0.415
G06F11/2221to test input/output devices or peripheral units0.415
G06F11/2273Test methods0.415
G06F11/261by simulating additional hardware  e.g. fault simulation0.415
G08B21/182Level alarms  e.g. alarms responsive to variables exceeding a threshold0.415
G06Q30/0204Market segmentation0.415
H04N21/4516involving client characteristics  e.g. Set-Top-Box type  software version  amount of memory available | allocation of resources considering hardware capabilities | (ref: G06F9/5044)| | allocation of resources considering software capabilities | (ref: G06F9/5055)| | protocols involving terminal profiles for network applications in communication control or processing | (ref: H04L29/08927)| | message adaptation based on network or terminal capabilities in packet switching networks | (ref: H04L51/06)| | processing of terminal status or physical abilities in wireless networks | (ref: H04W8/22)0.415
H04N21/4131home appliance  e.g. lighting  air conditioning system  metering devices | home automation data switching networks exchanging configuration information on appliance services | (ref: H04L12/2807)0.415
H04N21/4348Demultiplexing of additional data and video streams0.415
H04L67/322whereby quality of service [QoS] or priority requirements are taken into account | monitoring of QoS metrics | (ref: H04L43/08)| | QoS aspects in real-time communications | (ref: H04L65/80)0.414
G06N3/084Back-propagation0.414
G06F3/1286via local network0.414
G06F3/1236Connection management0.414
G06F3/1267Job repository  e.g. non-scheduled jobs  delay printing0.414
H04N21/2181comprising remotely distributed storage units  e.g. when movies are replicated over a plurality of video servers | distributed storage of data in a network | (ref: H04L29/08549)0.414
H04N5/775between a recording apparatus and a television receiver0.414
H04N21/4335Housekeeping operations  e.g. prioritizing content for deletion because of storage space restrictions | storage management  e.g. defragmentation | (ref: G06F3/0604)| | unloading stored programs | (ref: G06F9/445)| | storage management in file systems | (ref: G06F17/30067)| | buffering arrangements in a network node or in an end terminal in packet networks | (ref: H04L49/90)0.414
H04N21/23113involving housekeeping operations for stored content  e.g. prioritizing content for deletion because of storage space restrictions | storage management  e.g. defragmentation | (ref: G06F3/0604)| | snloading stored programs | (ref: G06F9/445)| | housekeeping operations in file systems  e.g. deletion policies | (ref: G06F17/30067)| | buffering arrangements in a network node or in an end terminal in packet networks | (ref: H04L49/90)0.414
H04N21/232Content retrieval operation | locally|  within server  e.g. reading video streams from disk arrays | storage management | (ref: G06F3/0604)| | details of querying and searching of video data from a database | (ref: G06F17/30843)0.414
G06F11/3072where the reporting involves data filtering  e.g. pattern matching  time or event triggered  adaptive or policy-based reporting0.413
G06F11/0787Storage of error reports  e.g. persistent data storage  storage using memory protection0.413
G01N33/72involving blood pigments  e.g. haemoglobin  bilirubin | or other porphyrins| involving occult blood0.413
G01N33/50Chemical analysis of biological material  e.g. blood  urine| Testing involving biospecific ligand binding methods| Immunological testing | measuring or testing processes involving enzymes or microorganisms  compositions or test papers therefor| processes for forming such compositions  condition responsive control in microbiological or enzymological processes | (ref: C12Q)0.413
G01N33/68involving proteins  peptides or amino acids | involving lipoproteins | (ref: G01N33/92)0.413
G01N33/49Blood | taking blood samples | (ref: A61B5/15)| | chemical methods for determining blood cell populations | (ref: G01N33/5094)| | chemical analysis of blood groups or blood types | (ref: G01N33/80)0.413
G01N33/573for enzymes or isoenzymes0.413
G16H20/30relating to physical therapies or activities  e.g. physiotherapy  acupressure or exercising0.413
H04L41/085Keeping track of network configuration0.413
H04N21/4221Dedicated function buttons  e.g. for the control of an EPG  subtitles  aspect ratio  picture-in-picture or teletext0.413
H04K3/28with jamming and anti-jamming mechanisms both included in a same device or system  e.g. wherein anti-jamming includes prevention of undesired self-jamming resulting from jamming0.413
H04K3/41characterized by the control of the jamming activation or deactivation time | control of jamming activation and deactivation time only for the purpose of alternating between jamming mode and target monitoring mode | (ref: H04K3/45)0.413
G06F21/75by inhibiting the analysis of circuitry or operation0.413
H04L69/327in the session layer  i.e. layer five | session initiation protocol | (ref: H04L65/1006)| | session control in real time communications | (ref: H04L65/1066)| | arrangements for session management | (ref: H04L67/14)0.413
H04W80/02Data link layer protocols0.413
H04W80/08Upper layer protocols | network arrangements or communication protocols for networked applications | (ref: H04L67/00)0.413
H04W76/27Transitions between radio resource control [RRC] states0.413
H04N21/4355involving reformatting operations of additional data  e.g. HTML pages on a television screen | optimising the visualization of content for information retrieval from the Internet | (ref: G06F17/30905)| | media manipulation  adaptation or conversion at the destination in one way streaming for real-time multimedia communications | (ref: H04L29/06496)| | adaptation of message content in packet-switching networks | (ref: H04L51/066)0.413
G09G5/12Synchronisation between the display unit and other units  e.g. other display units  video-disc players0.413
H04N21/43632involving a wired protocol  e.g. IEEE 1394 | high-speed IEEE 1394 serial bus | (ref: H04L12/40052)0.413
H04N21/4753for user identification  e.g. by entering a PIN or password | authentication mechanisms using passwords for network security | (ref: H04L29/06782)0.413
H04N21/4882for displaying messages  e.g. warnings  reminders | arrangements for providing short real-time information to substation in data switching networks | (ref: H04L12/1895)0.413
G06Q30/0254based on statistics0.412
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.117
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.110
G06F2221/0724Editing0.110
G06F2221/0753Distribution0.106
H04L2209/603Digital right managament [DRM]0.104
G06F2221/2101Auditing as a secondary aspect0.102
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.102
H04L63/0218Distributed architectures  e.g. distributed firewalls0.102
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.102
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.102
H04L2209/601Broadcast encryption0.101
H04L2209/60Digital content management  e.g. content distribution0.101
A63F2300/401Secure communication  e.g. using encryption or authentication0.100
A63F2300/572Communication between players during game play of non game information  e.g. e-mail  chat  file transfer  streaming of audio and streaming of video0.100
G06Q2220/18Licensing0.098
G06F2221/0759Conversion0.097
H04L2209/38Chaining  e.g. hash chain or certificate chain0.097
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.096
G06F2221/2129Authenticate client device independently of the user0.096
G06F2221/2131Lost password  e.g. recovery of lost or forgotten passwords0.096
G06F2221/2115Third party0.096
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.094
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.093
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.093
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.093
G06F2221/2149Restricted operating environment0.093
G06F2221/2117User registration0.093
H04L2209/42Anonymization  e.g. involving pseudonyms0.092
G06Q2220/10Usage protection of distributed data files0.092
G06F2221/0748Hiding0.092
H04R2225/55Communication between hearing aids and external devices via a network for data exchange0.092
H04L2209/20Manipulating the length of blocks of bits  e.g. padding or block truncation0.091
H04L2209/16Obfuscation or hiding  e.g. involving white box0.091
G10L2015/223Execution procedure of a spoken command0.091
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.091
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.091
H04W4/18Information format or content conversion  e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals0.091
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.090
G06F2221/2107File encryption0.090
H04L2209/46Secure multiparty computation  e.g. millionaire problem0.090
H04L2209/50Oblivious transfer0.090
H04L2209/04Masking or blinding0.089
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)0.089
G06F2221/2137Time limited access  e.g. to a computer or data0.089
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.089
H04L2463/081applying self-generating credentials  e.g. instead of receiving credentials from an authority or from another peer  the credentials are generated at the entity itself | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.089
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.089
G06F2221/0713User0.089
G07C2209/63Comprising locating means for detecting the position of the data carrier  i.e. within the vehicle or within a certain distance from the vehicle0.088
H04L47/32Packet discarding or delaying0.088
H04L47/825Involving tunnels  e.g. MPLS0.088
H04L45/7453using hashing0.088
G07C2009/00865remotely by wireless communication0.087
G07C2009/00388code verification carried out according to the challenge/response method0.087
G07C2009/00412the transmitted data signal being encrypted0.087
H04L2209/127Trusted platform modules [TPM]0.087
H04L2209/84Vehicles0.087
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.087
H04W88/182Network node acting on behalf of an other network entity  e.g. proxy0.087
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.086
H04L67/289where the intermediate processing is functionally located closer to the data consumer application  e.g. in same machine  in same home or in same subnetwork0.086
G06F2209/5015Service provider selection0.086
H04L61/3065Application layer names  e.g. buddy name  unstructured name chosen by a user or home appliance name0.086
H04L61/35involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address or functional addressing  i.e. assigning an address to a function0.086
G06F2221/0722Content | not used0.086
H04L2463/103applying security measure for protecting copy right | protecting software against unauthorised usage in a vending or licensing environment  e.g. protection the software providers copyright | (ref: G06F21/10)| | data processing systems or methods  specially adapted for payment schemes  architectures or protocols | (ref: G06Q20/00)| | secrecy systems or subscription systems | (ref: H04N7/16)0.086
G06F2221/0737Traceability0.086
G06F2009/45562Creating  deleting  cloning virtual machine instances0.086
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.086
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.086
G09G2370/022Centralised management of display operation  e.g. in a server instead of locally0.086
G07C9/00Individual entry or exit registers0.085
G06F2221/0733Watermark0.085
G06Q50/34Betting or bookmaking  e.g. Internet betting0.085
G06Q20/045characterized in that the payment protocol involves at least one ticket0.085
Y02T90/12Electric charging stations0.084
G06Q2240/00Transportation facility access  e.g. fares  tolls or parking0.084
G06F2221/2133Verifying human interaction  e.g.  Captcha0.083
H04W4/23for mobile advertising0.083
G06F2221/2113Multi-level security  e.g. mandatory access control0.083
H04L67/1038Load balancing arrangements to avoid a single path through a load balancer0.083
H04W84/005Moving wireless networks0.083
G06F2209/544Remote0.083
G06F2209/545Gui0.083
G06F2212/1052Security improvement0.082
H04L2463/144Detection or countermeasures against botnets0.082
G06F11/3013where the computing system is an embedded system  i.e. a combination of hardware and software dedicated to perform a certain function in mobile devices  printers  automotive or aircraft systems | testing or monitoring of control systems or parts thereof | (ref: G05B23/02)0.082
G06Q2220/165Having origin or program ID0.082
G06F2201/805Real-time0.081
G06F2201/815Virtual | middleware or OS functionality using virtual machines to implement generic software techniques for error detection or fault masking | (ref: G06F11/1484)0.081
G06F11/2097maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)|  and subgroups0.081
G06F11/2048where the redundant components share neither address space nor persistent storage0.081
G06F11/2038with a single idle spare processing component0.081
G06F11/2041with more than one idle spare processing component0.081
G06F2203/04801Cursor retrieval aid  i.e. visual aspect modification  blinking  colour changes  enlargement or other visual cues  for helping user do find the cursor in graphical user interfaces0.081
G06F17/10Complex mathematical operations | function generation by table look-up | (ref: G06F1/03)| | evaluation of elementary functions by calculation | (ref: G06F7/544)0.081
G06F2221/033Test or assess software0.081
G06Q30/0245Surveys0.081
H04L2012/2849Audio/video appliances0.081
H04W84/06Airborne or Satellite Networks0.081
G06F2009/45591Monitoring or debugging support | monitoring and debugging in general in | (ref: G06F11/30)|   | (ref: G06F11/36)0.080
H04H20/22Arrangements for broadcast of identical information via plural broadcast systems0.080
H04H20/14for monitoring programmes0.080
H04H2201/40characterised in that additional data relating to the broadcast data are available via a different channel than the broadcast channel0.080
H04H20/24Arrangements for distribution of identical information via broadcast system and non-broadcast system0.080
A63F2300/8023the game being played by multiple players at a common site  e.g. in an arena  theatre  shopping mall using a large public display0.080
G10L2015/088Word spotting0.080
G06F2221/2147Locking files0.079
G06T2207/20081Training| Learning0.079
G06T2207/10028Range image| Depth image| 3D point clouds0.079
G06T2207/20084Artificial neural networks [ANN]0.079
H04N2005/91335the copy protection signal being a watermark0.079
G07C2209/02Access control comprising means for the enrolment of users0.079
H04W68/00Notification of users  e.g. alerting for incoming communication or change of service0.079
H04L69/02Protocol performance0.079
H04L47/2408Different services  e.g. type of service [ToS]0.079
H04L2209/463Electronic voting0.079
G06F2221/2125Just-in-time application of countermeasures  e.g.  on-the-fly decryption  just-in-time obfuscation or de-obfuscation0.079
H04L61/20Address allocation | configuration management of network or network elements | (ref: H04L41/08)0.079
H04W84/047using dedicated repeater stations0.079
H04M3/487Arrangements for providing information services  e.g. recorded voice services  time announcements0.078
G10L2015/0635updating or merging of old and new templates| Mean values| Weighting0.078
G06F8/31Programming languages or programming paradigms0.078
H04M2203/655Combination of telephone service and social networking | messaging within social networks | (ref: H04L51/32)0.078
G10L2015/228of application context0.078
H04R2225/43Signal processing in hearing aids to enhance the speech intelligibility0.078
A63F2300/5506using advertisements0.078
G06F2221/2105Dual mode as a secondary aspect0.078
G06F2212/602Details relating to cache prefetching0.078
G08G1/14indicating individual free spaces in parking areas0.078
G06F2221/2103Challenge-response0.078
B60W2050/065by reducing the computational load on the digital processor of the control computer0.077
B60W2420/00Indexing codes relating to the type of sensors based on the principle of their operation0.077
B60Y2400/30Sensors0.077
B60W2050/146Display means0.077
G10L2015/226Taking into account non-speech caracteristics0.077
G06F2221/2151Time stamp0.077
G06F2209/509Offload0.077
H04L67/1017based on a round robin mechanism0.077
G06F2221/0751Key | not used0.077
H04M2203/6081Service authorization mechanisms0.077
H04L2209/88Medical equipments0.076
B60R2325/108Encryption0.076
B60R2325/101Bluetooth0.076
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.076
G06T2200/24involving graphical user interfaces [GUIs]0.076
B67D7/06Details or accessories0.076
B67D7/04for transferring fuels  lubricants or mixed fuels and lubricants0.076
G06T2210/36Level of detail0.076
G06T2219/2008Assembling  disassembling0.076
G06T2219/024Multi-user  collaborative environment0.076
A63F2300/6615using models with different levels of detail [LOD]0.076
G06F2221/034Test or assess a computer or a system0.076
H04N21/6405Multicasting | data broadcast and multicast in packet switching networks | (ref: H04L12/18)0.076
Y04S40/18Network protocols supporting networked applications  e.g. including control of end-device applications over a network0.076
H04M3/4938comprising a voice browser which renders and interprets  e.g. VoiceXML0.076
H04M2201/40using speech recognition | speech recognition | per se|  | (ref: G10L15/00)0.076
H04M15/66Policy and charging system0.075
H04W88/14Backbone network devices0.075
H04L2012/5635Backpressure  e.g. for ABR0.075
B60R2325/205Mobile phones0.075
B60R2325/103Near field communication [NFC]0.075
G07C2009/00793by Hertzian waves0.075
B60R16/0315using multiplexing techniques | multiplexing for transmission of signals | (ref: G08C15/00)| | multiplexing for electrical communication in general | (ref: H04J)0.075
A63F2300/534for network load management  e.g. bandwidth optimization  latency reduction0.075
A63F2300/535for monitoring  e.g. of user parameters  terminal parameters  application parameters  network parameters0.075
G06F2212/464Multimedia object  e.g. image  video0.075
G06F2212/1044Space efficiency improvement0.075
G09G2354/00Aspects of interface with display user0.075
G06F2221/0708Location0.075
G10L19/167Audio streaming  i.e. formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes0.075
H04L2209/08Randomization  e.g. dummy operations or using noise0.075
H04W48/14using user query | or user detection0.075
H04M15/715Activating new subscriber or card0.075
H04R2499/15Transducers incorporated in visual displaying devices  e.g. televisions  computer displays  laptops0.075
H04R2227/003Digital PA systems using  e.g. LAN or internet0.075
G06F2200/1631Panel PC  e.g. single housing hosting PC and display panel0.075
H04R1/345for loudspeakers0.075
H04R2227/005Audio distribution systems for home  i.e. multi-room use0.075
G06T2200/04involving 3D image data0.074
H04R2420/07Applications of wireless loudspeakers or wireless microphones0.074
H04L63/0254Stateful filtering0.074
H04W84/04Large scale networks| Deep hierarchical networks0.074
G05B2219/2614HVAC  heating  ventillation  climate control0.074
H04L1/18Automatic repetition systems  e.g. van Duuren system | | ARQ protocols0.074
H04L1/0045Arrangements at the receiver end0.074
H04L1/0041Arrangements at the transmitter end0.074
H04R3/14Cross-over networks0.074
H04L49/70Virtual switches0.073
G06F2212/1008Correctness of operation  e.g. memory ordering0.073
G06F2009/45579I/O management (device drivers  storage access) | internal functioning of device drivers | (ref: G06F13/102)|   loading of device drivers | (ref: G06F9/4411)0.073
Y02D30/00High level techniques for reducing energy consumption in communication networks0.073
H04M3/567Multimedia conference systems0.073
H04L2012/2841Wireless0.073
G05B2219/2642Domotique  domestic  home control  automation  smart house0.073
G06K19/07309Means for preventing undesired reading or writing from or onto record carriers0.073
G06K7/0013by galvanic contacts  e.g. card connectors for ISO-7816 compliant smart cards or memory cards  e.g. SD card readers | connectors in general | (ref: H01R13/00)| | connectors for SIM cards used in mobile phones or the like | (ref: H04B1/3816)0.073
G06F2212/151Emulated environment  e.g. virtual machine0.073
G06F2009/45575Starting  stopping  suspending  resuming virtual machine instances | program initiating | (ref: G06F9/445)| | task life-cycle in general | (ref: G06F9/485)0.073
G06F2212/6042Allocation of cache space to multiple users or processors0.073
G06F2207/4824Neural networks0.073
G06F2221/2135Metering0.073
G06T2207/30201Face0.073
H04L61/6022Layer 2 addresses  e.g. medium access control [MAC] addresses0.073
H04L41/08Configuration management of network or network elements | proprietary application protocols for remote control of end-devices in special networking environments | (ref: H04L67/125)| | automatic configuration specially adapted for wireless networks | (ref: H04W24/02)0.073
G05B2219/34274Connect pc card to industrial bus  with additional timing and adapting logic0.073
G01S13/52Discriminating between fixed and moving objects or between objects moving at different speeds | coherent receivers | (ref: G01S7/288)0.073
G06N5/025Extracting rules from data | learning in general | (ref: G06F15/18)0.072
G06F2206/1012Load balancing0.072
B60W2050/0075Automatic parameter input  automatic initialising or calibrating means0.072
B60W2030/082Vehicle operation after collision0.072
B60W2050/0004In digital systems  e.g. discrete-time systems involving sampling0.072
G06T2207/10016Video| Image sequence0.072
E05B2073/0088being lockable or unlockable by means of the office machine itself  e.g. by its keyboard0.072
B29C64/386Data acquisition or data processing for additive manufacturing0.072
E05B2047/0071Connecting lockparts by electronic communication means only  e.g. bus systems  time multiplexing0.072
E05B2047/0054using microprocessor  printed circuits  or the like0.072
H04M2201/60Medium conversion0.072
H04M2201/36Memories0.072
H04L61/6077Multiple interfaces  e.g. multihomed nodes0.072
H04L12/56Packet switching systems0.072
Y04S40/20Information technology specific aspects0.072
H04L61/6004Structures or formats of addresses0.072
H04L61/2038for local use  e.g. on local area networks [LAN] or on universal serial bus [USB] networks | bus addresses inside a computer | (ref: G06F13/42)0.072
H04W80/045involving different protocol versions  e.g. MIPv4 and MIPv60.072
A63F2300/8082Virtual reality0.072
H04N21/237Communication with additional data server0.072
H04R2499/11Transducers incorporated or for use in hand-held devices  e.g. mobile phones  PDA's  camera's0.072
H04R2499/13Acoustic transducers and sound field adaptation in vehicles0.072
H03F3/181Low frequency amplifiers  e.g. audio preamplifiers0.072
H04R2430/01Aspects of volume control  not necessarily automatic  in sound systems0.072
G05D1/021specially adapted to land vehicles0.072
G05D2201/0213Road vehicle  e.g. car or truck0.072
H04M2207/18wireless networks0.072
G06F2201/865Monitoring of software0.072
G06F2201/875Monitoring of systems including the internet0.072
A63F2300/609for unlocking hidden game elements  e.g. features  items  levels0.072
H04N21/23412for generating or manipulating the scene composition of objects  e.g. MPEG-4 objects0.072
A63F2300/5586for enforcing rights or rules  e.g. to prevent foul play0.072
H04N21/45452applied to an object-based stream  e.g. MPEG-4 streams0.072
H04W92/24between backbone network devices0.072
H04W80/06Transport layer protocols  e.g. TCP [Transport Control Protocol] over wireless | transmission control protocol/Internet protocol [TCP/IP] or user datagram protocol [UDP] | (ref: H04L69/16)0.072
H04W4/027using movement velocity  acceleration information0.072
G06F2209/5017Task decomposition0.071
A61M2205/50with microprocessors or computers0.071
A61M2205/3553remote  e.g. between patient's home and doctor's office0.071
A61M2205/52with memories providing a history of measured variating parameters of apparatus or patient0.071
A61M2205/3584using modem  internet or bluetooth0.071
H04M2203/6027Fraud preventions0.071
H04M2242/30Determination of the location of a subscriber0.071
H04M2203/2027Live party detection0.071
G06F2203/04803Split screen  i.e. subdividing the display area or the window area into separate subareas0.071
G06F2203/04804Transparency  e.g. transparent or translucent windows0.071
A61B2562/0247Pressure sensors0.071
A61B2560/0242adapted to measure environmental factors  e.g. temperature  pollution0.071
A61B2562/0219Inertial sensors  e.g. accelerometers  gyroscopes  tilt switches0.071
H04L2209/122Hardware reduction or efficient architectures0.071
G06F2212/402Encrypted data0.071
B65F2210/184Weighing means0.071
B65F2210/1443Electrical0.071
B65F2210/108Authorization means0.071
B65F2210/138Identification means0.071
B65F2210/168Sensing means0.071
B65F2210/128Data transmitting means0.071
A61N1/37247User interfaces  e.g. input or presentation means0.071
H04W92/045between access point and backbone network device0.071
G06F11/3079the data filtering being achieved by reporting only the changes of the monitored data0.071
G06F2221/2153Using hardware token as a secondary aspect0.071
G06F11/3082the data filtering being achieved by aggregating or compressing the monitored data0.071
G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component  e.g. monitoring if the computing system is on  off  available  not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16)0.071
G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component  e.g. monitoring of power  currents  temperature  humidity  position  vibrations | thermal management in cooling arrangements of a computing system | (ref: G06F1/206)0.071
H04L1/188Time-out mechanisms0.071
G06F7/58Random or pseudo-random number generators0.071
G06F2212/282Partitioned cache0.071
G06F2212/152Virtualized environment  e.g. logically partitioned system0.071
G05B2219/50193Safety in general0.071
G06F3/016Input arrangements with force or tactile feedback as computer generated output to the user0.071
G06T2207/30244Camera pose0.071
G06T2207/20164Salient point detection| Corner detection0.071
G06T2207/30196Human being| Person0.071
G06T2207/30181Earth observation0.071
H04L61/6018Address types0.071
H04L61/6068Internet protocol [IP] addresses subnets0.071
G06F2201/86Event-based monitoring0.071
G06F2201/88Monitoring involving counting0.071
H04L2463/142Denial of service attacks against network infrastructure0.070
G06N3/0481Non-linear activation functions  e.g. sigmoids  thresholds0.070
G08B13/19621Portable camera0.070
G08B13/19671Addition of non-video data  i.e. metadata  to video stream0.070
H04M2203/2061Language aspects0.070
G07C2009/00825remotely by lines or wireless communication0.070
H04W84/20Master-slave | selection or change|  arrangements0.070
G06T2219/2024Style variation0.069
G06T2210/16Cloth0.069
G06T2219/2012Colour editing  changing  or manipulating| Use of colour codes0.069
G06F3/1255Settings incompatibility  e.g. constraints  user requirements vs. device capabilities0.069
H04L41/0869by validating configuration within one network element0.069
H04W74/008with additional processing of random access related information at receiving side0.069
G09G2360/127Updating a frame memory using a transfer of data from a source area to a destination area0.069
G09G2360/10Display system comprising arrangements  such as a coprocessor  specific for motion video images0.069
G09G2360/08Power processing  i.e. workload management for processors involved in display operations  such as CPUs or GPUs0.069
Y02T90/16Information or communication technologies improving the operation of electric vehicles0.069
Y02T90/14Plug-in electric vehicles0.069
Y02T10/70Energy storage for electromobility | hydrogen internal combustion engines | (ref: Y02T90/42)| | fuel cell powered electric vehicles | (ref: Y02T90/34)0.069
B60L2240/70Interactions with external data bases  e.g. traffic centres0.069
Y04S30/12Remote or cooperative charging0.069
Y02T10/72Electric energy management in electromobility0.069
Y02T10/7072Electromobility specific charging systems or methods for batteries  ultracapacitors  supercapacitors or double-layer capacitors | efficient charging systems for batteries  ultracapacitors  supercapacitors or double-layer capacitors in road transportation in general | (ref: Y02T10/92)0.069
Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles  i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV] | power aggregation of EV or HEV | (ref: Y02E60/721)0.069
H04L2209/24Key scheduling  i.e. generating round keys or sub-keys for block encryption0.069
G01S5/02using radio waves | (ref: G01S19/00)|  takes precedence0.069
G01S19/42Determining position0.069
G06F2201/87Monitoring of transactions0.069
F24F2110/68Radon0.069
G06F2221/0757Licence | not used0.069
H04N2007/145Handheld terminals0.069
H04L41/06involving management of faults or events or alarms0.069
G09G2370/02Networking aspects0.069
G09G2358/00Arrangements for display data security0.069
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.