Validity Report
Full Report
US7765399B2 — Computer architecture for a handheld electronic device
Priority Date: 2006-02-22, Publication Date: 2010-07-27, Current Assignee: Speir Technologies LtdReport Generated: 2023-01-10

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP0649546A11.194TRUSTED PATH SUBSYSTEM FOR WORKSTATIONSGRANT1995-04-261992-07-1025431073GreatSecure Computing LLCSecure Computing LLC
EP1576762B11.113System and method for securing portable dataGRANT2014-09-032002-12-1832599709GreatSanDisk IL LtdWestern Digital Israel Ltd
EP1430374A21.108METHOD AND APPARATUS FOR A SECURE VIRTUAL MACHINEGRANT2004-06-232001-05-3026968290GreatSun Microsystems IncD'Crypt Pte Ltd, Sun Microsystems Inc, D'Crypt Pte Ltd
US7636858B21.095Management of a trusted cryptographic processorGRANT2009-12-222003-12-1137722682GreatIntel CorpIntel Corp
EP1280315B11.079Apparatus and method for providing network securityGRANT2007-08-291992-07-318215432GreatMicron Technology IncMicron Technology Inc
US7734933B11.068System for providing secure and trusted computing environments through a secure computing moduleGRANT2010-06-082005-06-1742227046GreatRockwell Collins IncRockwell Collins Inc
US8751818B21.057Method and apparatus for a trust processorGRANT2014-06-102003-12-1134657260GreatIntel CorpIntel Corp
US7716720B11.051System for providing secure and trusted computing environmentsGRANT2010-05-112005-06-1742139492GreatRockwell Collins IncRockwell Collins Inc
US7363491B21.042Resource management in security enhanced processorsGRANT2008-04-222004-03-3135426774GreatIntel CorpIntel Corp
US8347104B21.031Security interface for a mobile deviceGRANT2013-01-012001-12-2623340496GreatResearch in Motion LtdBlackBerry Ltd
EP1788507A21.018Electronic transaction terminal capable of operating in secure and non-secure mode  and method adapted to the deviceGRANT2007-05-232005-11-1637814227GreatCompagnie Industrielle et Financiere dIngenierie Ingenico SAIngenico Group SA
EP1592193B11.004Wireless communication device with securely added randomness and related methodGRANT2008-12-242004-04-3034930274GreatResearch in Motion LtdBlackBerry Ltd
EP1413157B11.002Method and system for verifying data integrityGRANT2013-11-202001-07-1625420307GreatCerticom CorpCerticom Corp
EP1512057B10.997TRUSTED USER INTERFACE FOR A SECURE MOBILE WIRELESS DEVICEGRANT2010-01-062002-05-289937593GreatNokia OyjNokia Oyj
EP0735718B10.997Method and apparatus for high bandwidth encryption/decryption using a low bandwidth cryptographic moduleGRANT1999-11-031995-03-3123644008GreatAT&T Corp, AT&T IPM CorpAT&T Corp
EP0443423B10.997Method and apparatus for executing trusted-path commandsGRANT2001-11-141990-02-1323904915GreatCompaq Computer CorpCompaq Computer Corp
EP1674963B10.995Secure license managementGRANT2008-08-132004-12-2235966461GreatSAP SE SAP SE
EP0865695B10.994AN APPARATUS AND METHOD FOR CRYPTOGRAPHIC COMPANION IMPRINTINGGRANT2006-03-011995-12-0424264918GreatIntel CorpIntel Corp
EP1181632B10.991DATA EVENT LOGGING IN COMPUTING PLATFORMGRANT2010-12-151999-05-288241419GreatHewlett Packard CoHP Inc
US7802111B10.984System and method for limiting exposure of cryptographic keys protected by a trusted platform moduleGRANT2010-09-212005-04-2742734026GreatOracle America IncOracle America Inc
EP0756397B10.984System and method for key distribution and authentication between a host and a portable deviceGRANT2003-06-251995-07-2826140276GreatAgilent Technologies Inc, Hewlett Packard CoHP Inc, Agilent Technologies Inc
EP1546896B10.977METHOD AND APPARATUS FOR MULTI-LEVEL SECURITY IMPLEMENTATIONGRANT2013-04-102002-08-2931981100GreatWisterium Development LLCCallahan Cellular LLC
EP1952253B10.972SYSTEM AND METHOD FOR PROVIDING SECURE DATA TRANSMISSIONGRANT2012-12-262005-10-1237912080GreatBloomberg Finance LPBloomberg Finance LP
US10541969B20.971System and method for implementing content and network security inside a chipGRANT2020-01-212005-12-1341119206GreatCupp Computing ASCupp Computing AS
EP1754126B10.964ENHANCING TRUSTED PLATFORM MODULE PERFORMANCEGRANT2020-05-132004-06-1034971702GreatOracle America IncOracle America Inc
EP0862301B10.964An encryption communication system using an agent and a storage medium for storing that agentGRANT2004-10-061996-11-2818088990GreatFujitsu LtdFujitsu Ltd
WO2001044899A10.963CRYPTOGRAPHIC TOKEN AND SECURITY SYSTEMAPPLICATION2001-06-211999-12-1325681390Great
US20050132226A10.963Trusted mobile platform architectureAPPLICATION2005-06-162003-12-1134657259GreatIntel CorpIntel Corp
EP1203278B10.963ENFORCING RESTRICTIONS ON THE USE OF STORED DATAGRANT2012-02-081999-08-1326153560GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
EP0825511A20.962Method and apparatus for trusted processingGRANT1998-02-251996-08-2324820785GreatHewlett Packard CoCheyenne Property Trust
US7539421B20.961Self-contained secure videoconferencing consoleGRANT2009-05-262002-12-1132600092GreatCRITICOM Critical Communication3E Technologies International Inc
EP1106000B10.952SECURE PROCESSING FOR AUTHENTICATION OF A WIRELESS COMMUNICATIONS DEVICEGRANT2005-06-221998-08-1922474879GreatQualcomm IncQualcomm Inc
EP1480410B10.946System and method for dynamically enabling components to implement data transfer security mechanismsGRANT2019-02-132003-05-2133097984GreatGula Consulting LLCGula Consulting LLC
EP1580922A20.946Methods and modular cryptographic davice with enhanched communication controlGRANT2005-09-282004-03-2334862044GreatHarris CorpHarris Corp
US7082200B20.943Establishing secure peer networking in trust webs on open networks using shared secret device keyGRANT2006-07-252001-09-0625487894GreatMicrosoft CorpMicrosoft Technology Licensing LLC
EP1580933A20.941Methods and modular cryptographic device with multi-mode WLAN operationGRANT2005-09-282004-03-2334862035GreatHarris CorpHarris Corp
WO2005020542A10.940METHOD FOR USING TRUSTED  HARDWARE-BASED IDENTITY CREDENTIALS IN RUNTIME PACKAGE SIGNATURE TO SECURE MOBILE COMMUNICATIONS AND HIGH-VALUE TRANSACTION EXECUTIONAPPLICATION2005-03-032003-08-1234135970Great
EP1076280A10.939Communications between modules of a computing apparatusGRANT2001-02-141999-08-138241576GreatHewlett Packard CoHP Inc
EP1437026B10.939METHOD AND APPARATUS FOR PROVIDING PRIVACY OF USER IDENTITY AND CHARACTERISTICS IN A COMMUNICATION SYSTEMGRANT2010-05-052001-10-1625528373GreatQualcomm IncQualcomm Inc
EP1370084A10.937System for protecting security registers and method thereofGRANT2003-12-102002-05-2929549246GreatATI Technologies ULCATI Technologies ULC
EP1728376B10.937METHOD  APPARATUSES AND COMPUTER PROGRAM PRODUCT FOR SHARING CRYPTOGRAPHIC KEY WITH AN EMBEDDED AGENT ON A NETWORK ENDPOINT IN A NETWORK DOMAINGRANT2009-07-152004-03-2434963516GreatIntel CorpIntel Corp
EP1580934A20.937Methods and modular cryptographic device with enhanced interface protocolGRANT2005-09-282004-03-2334862043GreatHarris CorpHarris Corp
EP1355218A20.934Methods and systems for authentication of components in a graphic systemGRANT2003-10-222002-04-1822418498GreatMicrosoft CorpMicrosoft Corp
EP1209563B10.933Method and system for allowing code to be securely initialized in a computerGRANT2011-08-242000-11-2224897825GreatMicrosoft CorpMicrosoft Corp
US8458801B20.932High-assurance secure boot content protectionGRANT2013-06-042004-07-3035733758GreatSafeNet IncThales DIS CPL USA Inc
EP1415231B10.931METHOD AND SYSTEM FOR VISUALISING A LEVEL OF TRUST OF NETWORK COMMUNICATION OPERATIONS AND CONNECTION OF SERVERSGRANT2019-10-162001-08-0725447416GreatNokia Technologies OyNokia Technologies Oy
EP1595381A10.929SYSTEM AND METHOD OF PROTECTING DATA ON A COMMUNICATION DEVICEGRANT2005-11-162003-02-2832913604GreatResearch in Motion LtdBlackBerry Ltd
EP1224518B10.926TRUSTED COMPUTING PLATFORM WITH BIOMETRIC AUTHENTICATIONGRANT2009-07-151999-10-0810862343GreatHewlett Packard CoHP Inc
EP1230777B10.926METHOD AND APPARATUS FOR PROVIDING REDUNDANT AND RESILIENT CRYPTOGRAPHIC SERVICESGRANT2008-10-221999-11-1026860756GreatUnisys CorpUnisys Corp
EP1580921A10.924Modular cryptographic device and related methodsGRANT2005-09-282004-03-2334862045GreatHarris CorpHarris Corp
EP0435094B10.922Uniform interface for cryptographic servicesGRANT1999-06-021989-12-2723817457GreatMotorola IncMotorola Solutions Inc
EP1629624A20.920AN IN-CURCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATAGRANT2006-03-012003-05-3033511627GreatPrivaris IncPrivaris Inc
EP1580932A20.919Methods and modular cryptographic device with status determinationGRANT2005-09-282004-03-2334862034GreatHarris CorpHarris Corp
EP1132800B10.918Non-wire contact device application for cryptographic module interfacesGRANT2006-11-292000-03-0824073262GreatRainbow Technologies IncThales DIS CPL USA Inc
EP1633155B10.917System and method for generating a secure state indicator on a displayGRANT2007-04-042004-09-0334929537GreatResearch in Motion LtdBlackBerry Ltd
EP1218841A20.916ELECTRONIC COMMERCE WITH CRYPTOGRAPHIC AUTHENTICATIONGRANT2002-07-031999-09-2026851727GreatEthentica IncEthentica Inc
EP1283630A20.915Network routing using an untrusted routerGRANT2003-02-122001-08-0725447372GreatITT Manufacturing Enterprises LLCITT Manufacturing Enterprises LLC
EP1224516A10.912TRUSTED COMPUTING PLATFORM FOR RESTRICTING USE OF DATAGRANT2002-07-241999-09-2510861565GreatHewlett Packard CoHP Inc
EP1536306A10.910Proximity authentication systemGRANT2005-06-012003-09-3034467949GreatBroadcom CorpNXP BV
EP1300842B10.910Method and system for authorized decryption of encrypted data using at least two certificatesGRANT2007-07-252001-10-058178867GreatKrempl StefanVIRTUAL PAPER EMEDIA SOLUTIONS GmbH
EP1159662B10.908SMARTCARD USER INTERFACE FOR TRUSTED COMPUTING PLATFORMGRANT2004-01-141999-03-0526315223GreatHewlett Packard CoHP Inc
EP1725924A10.908DEVICE WITH  A CRYPTOGRAPHIC COPROCESSORGRANT2006-11-292004-03-1934962060GreatNokia OyjNokia Technologies Oy
EP1161715A10.898COMMUNICATIONS BETWEEN MODULES OF A COMPUTING APPARATUSGRANT2001-12-121999-02-1526153441GreatHewlett Packard CoHP Inc
EP1514444B10.898WIRELESS COMMUNICATION SYSTEM  APPARATUS AND METHODGRANT2009-05-062002-06-019937967GreatMotorola Ltd, Motorola IncMotorola Solutions UK Ltd, Motorola Solutions Inc
US6775779B10.898Hierarchical trusted code for content protection in computersGRANT2004-08-101999-04-0632823624GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US6092202A0.898Method and system for secure transactions in a computer systemGRANT2000-07-181998-05-2222182757GreatNAble Technologies IncNAble Technologies Inc, ESW Holdings Inc
EP1580953B10.897System and method for viewing message attachmentsGRANT2011-02-092004-03-2234854579GreatResearch in Motion LtdBlackBerry Ltd
EP1343321A10.897Methods and systems for cryptographically protecting secure content in video memoryGRANT2003-09-102001-12-0427383184GreatMicrosoft CorpMicrosoft Corp
US20060195907A10.896Data processing deviceAPPLICATION2006-08-312004-12-2335841177GreatInfineon Technologies AGInfineon Technologies AG
EP1483873A10.896SYSTEM AND METHOD FOR PROVIDING SECURE MESSAGE SIGNATURE STATUS AND TRUST STATUS INDICATIONGRANT2004-12-082002-03-0127789588GreatResearch in Motion LtdBlackBerry Ltd
EP1692622B10.895INTER-PROCESSOR PARAMETER MANAGEMENT IN A MULTIPLE-PROCESSOR WIRELESS MOBILE COMMUNICATION DEVICE OPERATING ON A PROCESSOR SPECIFIC COMMUNICATION NETWORKGRANT2008-05-212003-12-0234652441GreatResearch in Motion LtdBlackBerry Ltd
EP1916614B10.892Projection of trustworthiness from a trusted environment to an untrusted environmentGRANT2011-10-262003-08-0733552981GreatMicrosoft CorpMicrosoft Corp
EP1825412A10.891SECURE DATA PARSER METHOD AND SYSTEMGRANT2007-08-292004-10-2535912925GreatDavenport Roger, O'Hare Mark S, Orsini Rick L, Winick StevenSecurity First Corp
EP1661361A10.891SYSTEM FOR INCREASING THE AVAILABILITY OF A SUBMARINE BY MEANS OF REMOTE CONTROL USING ENCODED COMMUNICATION CONNECTIONSGRANT2006-05-312003-09-0134276533GreatSiemens AGSiemens AG
US7835523B10.888Cryptographic engine abstraction layer for a software defined radioGRANT2010-11-162005-08-2643065901GreatRockwell Collins IncRockwell Collins Inc
EP1488583B10.887SYSTEM AND METHOD FOR TRANSMITTING AND UTILIZING ATTACHMENTSGRANT2009-10-072002-03-2028042033GreatResearch in Motion LtdBlackBerry Ltd
US6996547B10.886Method for purchasing items over a non-secure communication channelGRANT2006-02-072000-09-2735734337GreatMotorola IncGoogle Technology Holdings LLC
EP1880368B10.885IMPLEMENTATION OF AN INTEGRITY-PROTECTED SECURE STORAGEGRANT2021-09-292005-05-1337396218GreatNokia Technologies OyNokia Technologies Oy
EP1654850A10.885SYSTEM AND METHOD OF INDICATING THE STRENGTH OF ENCRYPTIONGRANT2006-05-102003-08-1234135351GreatResearch in Motion LtdBlackBerry Ltd
US7698739B20.883Updating code with validationGRANT2010-04-132004-03-3035055032GreatMarvell International LtdMarvell Asia Pte Ltd
US5283828A0.881Architecture for utilizing coprocessing systems to increase performance in security adapted computer systemsGRANT1994-02-011991-03-0126694000GreatHughes Training IncRaytheon Co
EP1580923A10.880Modular cryptographic device and coupling therefor and related methodsGRANT2005-09-282004-03-2334862042GreatHarris CorpHarris Corp
EP1569411B10.876Methods  apparatuses and program products for initializing a security association based on physical proximity in a wireless ad-hoc networkGRANT2007-05-022004-02-2434750457GreatNokia OyjNokia Oyj
EP1960866B10.876SYSTEM AND METHOD FOR PROVIDING NETWORK SECURITY TO MOBILE DEVICESGRANT2021-03-172005-12-1338163327GreatCupp Computing ASCupp Computing AS
EP1556992B10.872SECURE IMPLEMENTATION AND UTILIZATION OF DEVICE-SPECIFIC SECURITY DATAGRANT2016-10-192002-10-3132230364GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
EP1535444A10.870SYSTEM AND METHOD FOR SECURE CONTROL OF RESOURES OF WIRELESS MOBILE COMMUNICATION DEVICESGRANT2005-06-012002-08-1931888326GoodResearch in Motion LtdBlackBerry Ltd
EP1411709B10.869System and method of security function activation for a mobile electronic deviceGRANT2009-07-222002-10-1732043444GoodResearch in Motion LtdBlackBerry Ltd
EP1745589B10.869System and method for configuring devices for secure operationsGRANT2014-07-162004-04-3035242000GoodBlackBerry LtdBlackBerry Ltd
EP1501330B10.868Security for a mobile communications deviceGRANT2009-04-012003-07-2227772434GoodResearch in Motion LtdBlackBerry Ltd
EP1076279A10.863Computer platforms and their methods of operationGRANT2001-02-141999-08-138241575GoodHewlett Packard CoHP Inc
EP1803249B10.862SYSTEM AND METHOD FOR PROTECTING MASTER ENCRYPTION KEYSGRANT2010-04-072005-10-1437942245GoodResearch in Motion LtdBlackBerry Ltd
EP1952575A20.861SECURE DATA PARSER METHOD AND SYSTEMGRANT2008-08-062005-11-1839344759GoodDavenport Roger, O'Hare Mark S, Orsini Rick L, Winick StevenSecurity First Corp
EP2023263B10.858Method and system for supporting portable authenticators on electronic devicesGRANT2013-02-272003-04-079956344GoodResearch in Motion LtdBlackBerry Ltd
US7103782B10.858Secure memory and processing system having laser-scribed encryption keyGRANT2006-09-052000-09-2736939634GoodMotorola IncGoogle Technology Holdings LLC
EP1526456B10.858Integration of high-assurance features into an application through application factoringGRANT2011-08-032003-10-2434394598GoodMicrosoft CorpMicrosoft Corp
EP1788505A10.858System and method for application program operation on a wireless deviceGRANT2007-05-232005-11-2136282608GoodResearch in Motion LtdBlackBerry Ltd
EP1085396A10.857Operation of trusted state in computing platformGRANT2001-03-211999-09-178241625GoodHewlett Packard CoHewlett Packard Enterprise Development LP
EP1655920A20.856User authentication systemGRANT2006-05-102004-10-2035998390GoodBroadcom CorpBroadcom Corp
EP1454503B10.853STORING AND ACCESSING DATA IN A MOBILE DEVICE AND A USER MODULEGRANT2007-05-092001-12-047707903GoodGiesecke and Devrient GmbHGiesecke and Devrient GmbH
EP1031909B10.852A system and method for manipulating a computer file and/or programGRANT2005-12-141999-02-2322972212GoodSightsoundcom IncDMT Licensing LLC
EP1952298A20.850MOBILE SECURITY SYSTEM AND METHODGRANT2008-08-062005-11-1837872442GoodQualcomm IncQualcomm Inc
EP1718048B10.840Secure communications system comprising a mobile encryption/decryption unit  a fixed communications unit and a clip-on module attachable to the mobile encryption/decryption unitGRANT2010-01-202005-04-2634935745GoodSectra Communications ABSectra Communications AB
EP1004101B10.840TERMINAL AND SYSTEM FOR IMPLEMENTING SECURE ELECTRONIC TRANSACTIONSGRANT2002-02-271998-05-229526602GoodActivCard SAActivIdentity Inc
EP1792433A20.838SYSTEM AND METHOD FOR CREATING A SECURITY APPLICATION FOR PROGRAMMABLE CRYPTOGRAPHY MODULEGRANT2007-06-062004-08-2536035584GoodHarris CorpHarris Corp
EP1545084B10.836System and method for digital rights managementGRANT2011-06-012003-12-1834828551GoodResearch in Motion LtdBlackBerry Ltd
US6151677A0.836Programmable telecommunications security module for key encryption adaptable for tokenless useGRANT2000-11-211998-10-0622606322GoodL3 Communications CorpL3 Technologies Inc
EP0689120A10.836Isolation of non-secure software from secure software to limit virus infectionGRANT1995-12-271994-06-2223003500GoodAT&T CorpAT&T Corp
US6990587B20.831Cryptographic architecture for secure  private biometric identificationGRANT2006-01-242001-04-1325267307GoodSymbol Technologies LLCSymbol Technologies LLC
EP1869886B10.830SECURE CONDITIONAL ACCESS AND DIGITAL RIGHTS MANAGEMENT IN MULTIMEDIA PROCESSORGRANT2020-09-022005-04-0636694576GoodAvago Technologies International Sales Pte LtdAvago Technologies International Sales Pte Ltd
EP1846863B10.829HARDWARE MULTIMEDIA ENDPOINT AND PERSONAL COMPUTERGRANT2010-04-212005-10-3136694278GoodNero AGNero AG
EP1295261B10.828BIOMETRIC-BASED AUTHENTICATION IN A NON-VOLATILE MEMORY DEVICEGRANT2007-08-152000-06-2724420577GoodIntel CorpIntel Corp
EP1563663A10.827SYSTEM AND METHOD OF CONNECTION CONTROL FOR WIRELESS MOBILE COMMUNICATION DEVICESGRANT2005-08-172002-11-0832312861GoodResearch in Motion LtdBlackBerry Ltd
EP0851335B10.826Secure two-piece user authentication in a computer networkGRANT2003-10-291996-12-3125102373GoodCompaq Computer CorpCompaq Computer Corp
EP1745588B10.824SYSTEM AND METHOD FOR OBTAINING CERTIFICATE STATUS OF SUBKEYSGRANT2009-04-082004-04-3035241997GoodResearch in Motion LtdBlackBerry Ltd
EP1661356A10.822SYSTEM AND METHOD OF ACCESSING KEYS FOR SECURE MESSAGINGGRANT2006-05-312003-08-1234135337GoodResearch in Motion LtdBlackBerry Ltd
EP0680171A20.820Low power security mode for a cellular telephoneGRANT1995-11-021994-04-2822882854GoodMotorola IncMotorola Solutions Inc
US7698552B20.819Launching a secure kernel in a multiprocessor systemGRANT2010-04-132004-06-0333419035GoodIntel CorpIntel Corp
EP1665626A10.818SYSTEM AND METHOD FOR SECURING WIRELESS DATAGRANT2006-06-072003-08-2534216131GoodResearch in Motion LtdBlackBerry Ltd
US20030223586A10.817Method and system for secure communications over a communications networkAPPLICATION2003-12-042002-05-3029586416GoodWave Systems CorpWave Systems Corp, Individual
EP1958418B10.814PORTABLE ELECTRONIC ENTITY FOR SETTING UP SECURED VOICE COMMUNICATION OVER IPGRANT2018-02-142005-11-2536939219GoodOberthur Technologies SAIdemia France SAS
EP1300987B10.813An integrated circuit architecture for programmable wireless devicesGRANT2005-09-072001-10-0225516206GoodAgilent Technologies IncAgilent Technologies Inc
EP1743246A10.813SYSTEM AND METHOD FOR CONTENT PROTECTION ON A COMPUTING DEVICEGRANT2007-01-172004-04-3035241852GoodResearch in Motion LtdBlackBerry Ltd
EP1741245B10.806SYSTEM AND METHOD FOR HANDLING SECURE MESSAGESGRANT2012-11-282004-04-3035242024GoodResearch in Motion LtdBlackBerry Ltd
EP1410601A10.806SYSTEM AND METHOD FOR SECURE MESSAGE KEY CACHING IN A MOBILE COMMUNICATION DEVICEGRANT2004-04-212001-07-1023176341GoodResearch in Motion LtdBlackBerry Ltd
EP1101161A20.805MULTI-LEVEL SECURITY NETWORK SYSTEMGRANT2001-05-231998-08-0622442031GoodCryptek Secure Communications LLCCryptek Secure Communications LLC
EP1665846B10.801TELEPHONE COMMUNICATION SYSTEM ALLOWING DIFFERENT OPERATION MODES WITH OR WITHOUT ENCRYPTIONGRANT2007-05-092003-03-2432947228GoodSagem Defense Securite SASafran Electronics and Defense SAS
US7904730B20.800System for providing a trustworthy user interfaceGRANT2011-03-081999-05-288241417GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
WO2002017048A20.798TRUSTED DEVICEAPPLICATION2002-02-282000-08-189897860Good
EP0828208B10.794Application certification for an international cryptography frameworkGRANT2003-04-161996-08-2324820781GoodCheyenne Property TrustCheyenne Property Trust
US7139915B20.794Method and apparatus for authenticating an open system application to a portable IC deviceGRANT2006-11-211998-10-2627736876GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP1741222B10.792SYSTEM AND METHOD FOR SECURING DATAGRANT2011-02-232004-04-3035241996GoodResearch in Motion LtdBlackBerry Ltd
EP1394982B10.791Methods and apparatus for secure data communication linksGRANT2006-10-112002-08-309943244GoodToshiba CorpToshiba Corp
EP1775923B10.791Audio management in a dual processor environmentGRANT2009-04-152005-10-1435911088GoodResearch in Motion LtdBlackBerry Ltd
EP1410600A20.790A SYSTEM AND METHOD FOR SUPPORTING MULTIPLE CERTIFICATE AUTHORITIES ON A MOBILE COMMUNICATION DEVICEGRANT2004-04-212001-07-1623181798GoodResearch in Motion LtdBlackBerry Ltd
US6378072B10.787Cryptographic systemGRANT2002-04-231998-02-0321784383GoodCompaq Computer CorpMicro Focus LLC
EP1417814B10.787SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGESGRANT2008-10-292001-08-0623202023GoodResearch in Motion LtdBlackBerry Ltd
EP1633094B10.783Multiple-stage system and method for processing encoded messagesGRANT2007-03-282001-10-2535809979GoodResearch in Motion LtdBlackBerry Ltd
EP0848315B10.782Securely generating a computer system password by utilizing an external encryption algorithmGRANT2010-03-101996-12-1325075925GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
EP1754157B10.781CONTENT PROTECTION TICKET METHOD AND DEVICEGRANT2013-05-222004-04-3035241850GoodResearch in Motion LtdBlackBerry Ltd
US8254884B20.781System and method for application program operation on a wireless deviceGRANT2012-08-282005-11-2138054729GoodResearch in Motion LtdBlackBerry Ltd
EP1745593B10.776SYSTEM AND METHOD FOR CHECKING DIGITAL CERTIFICATESGRANT2009-12-022004-04-3035242005GoodResearch in Motion LtdBlackBerry Ltd
EP1613104B10.773Methods and apparatus for automatically recording push-to-talk (PTT) voice communicationsGRANT2007-01-102004-06-3034930451GoodResearch in Motion LtdBlackBerry Ltd
US7260726B10.769Method and apparatus for a secure computing environmentGRANT2007-08-212001-12-0638374125GoodAdaptec IncRPX Corp
EP2492774B10.767Secure media path methods  systems  and architecturesGRANT2019-12-042002-06-2427733935GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP1754158B10.766METHOD AND APPARATUS FOR HANDLING PERIPHERAL CONNECTIONS TO MOBILE DEVICESGRANT2013-11-272004-04-3035241851GoodBlackBerry LtdBlackBerry Ltd
EP1743447B10.764CHALLENGE RESPONSE SYSTEM AND METHODGRANT2009-03-252004-05-0435241998GoodResearch in Motion LtdBlackBerry Ltd
EP1569481B10.762Method and System for Remotely Testing a Wireless DeviceGRANT2008-06-252004-02-2434878173GoodResearch in Motion LtdBlackBerry Ltd
EP1654828B10.753SYSTEM AND METHOD FOR SENDING SECURE MESSAGESGRANT2018-09-052004-05-0535242001GoodBlackBerry LtdBlackBerry Ltd
US7940932B20.745Methods  apparatus  and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processorGRANT2011-05-102004-04-0836585458GoodTexas Instruments IncTexas Instruments Inc
US7444601B20.744Trusted computing platformGRANT2008-10-281999-02-1526153442GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
EP1741225B10.743SYSTEM AND METHOD FOR FILTERING DATA TRANSFERS WITHIN A MOBILE DEVICEGRANT2011-03-022004-04-3035242007GoodResearch in Motion LtdBlackBerry Ltd
US7028149B20.739System and method for resetting a platform configuration registerGRANT2006-04-112002-03-2928453244GoodIntel CorpIntel Corp
EP1571810B10.738Communications system providing automatic text-to-speech conversion features and related methodsGRANT2016-07-272004-03-0134746132GoodBlackBerry LtdBlackBerry Ltd
US20040015958A10.736Method and system for conditional installation and execution of services in a secure computing environmentAPPLICATION2004-01-222001-05-1525322373GoodWave Systems CorpWave Systems Corp, Individual
US5815571A0.725Computer system with secured data paths and method of protectionGRANT1998-09-291996-10-2824953296Good
US7322042B20.724Secure and backward-compatible processor and secure software execution thereonGRANT2008-01-222003-02-0732824069GoodBroadOn Communications CorpSamsung Electronics Co Ltd
US7457417B10.710Approach for configuring wireless devicesGRANT2008-11-252005-01-3140029529GoodRicoh Co LtdRicoh Co Ltd
US6084968A0.695Security token and method for wireless applicationsGRANT2000-07-041997-10-2925503210GoodMotorola IncGoogle Technology Holdings LLC
US20080016343A10.694METHODS OF OPERATING A PORTABLE COMMUNICATIONS DEVICE WITH ENHANCED SECURITYAPPLICATION2008-01-171996-07-3026825499GoodMicron Technology IncRound Rock Research LLC
EP0849657A10.691Secure data processing method and systemGRANT1998-06-241996-12-1810804616GoodNCR International IncNCR International Inc
US8479022B20.687Secure mode indicator for smart phone or PDAGRANT2013-07-022002-01-1633303962GoodTexas Instruments IncTexas Instruments Inc
US7272723B10.682USB-compliant personal key with integral input and output devicesGRANT2007-09-181999-01-1527381769GoodSafeNet IncRAVENS ACQUISITION CORP, Thales DIS CPL USA Inc
EP1806660B10.681Audio deviceGRANT2012-02-012005-11-2635601272GoodWolfson Microelectronics PLCCirrus Logic International UK Ltd
US5844986A0.679Secure BIOSGRANT1998-12-011996-09-3024909346GoodIntel CorpIntel Corp
US5802178A0.678Stand alone device for providing security within computer networksGRANT1998-09-011996-07-3024764773GoodITT Industries IncRound Rock Research LLC
US20020026576A10.673Apparatus and method for establishing trustAPPLICATION2002-02-282000-08-189897861GoodHewlett Packard CoHewlett Packard Enterprise Development LP
US7047405B20.672Method and apparatus for providing secure processing and data storage for a wireless communication deviceGRANT2006-05-162001-04-0525247413GoodQualcomm IncQualcomm Inc
US9198224B20.670Cellular modem processingGRANT2015-11-242003-10-0934422601GoodNorth Star Innovations IncNorth Star Innovations Inc
US4262329A0.666Security system for data processingGRANT1981-04-141978-03-2725396723GoodCOMPUTATION PLANNING IncCOMPUTER PLANNING Inc, COMPUTATION PLANNING Inc
US7334123B20.657Computer system including a bus bridge for connection to a security services processorGRANT2008-02-192003-05-0233434832GoodAdvanced Micro Devices IncGlobalFoundries Inc
EP1791336B10.655Digital audio device and methodGRANT2013-02-272005-11-2635601273GoodWolfson Microelectronics PLCCirrus Logic International UK Ltd
US20040103288A10.655Apparatus and method for securing data on a portable storage deviceAPPLICATION2004-05-272002-11-2732325306GoodM Systems Flash Disk Pionners LtdWestern Digital Israel Ltd
US7818574B20.651System and method for providing dynamically authorized access to functionality present on an integrated circuit chipGRANT2010-10-192004-09-1036035460GoodInternational Business Machines CorpInternational Business Machines Corp
US5896499A0.650Embedded security processorGRANT1999-04-201997-02-2125187131GoodInternational Business Machines CorpInternational Business Machines Corp
US7917752B20.650Method of controlling the processing of dataGRANT2011-03-292002-08-239942850GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20060078109A10.643Information processing apparatus  information processing method  and programAPPLICATION2006-04-132004-10-0835457528GoodFelica Networks IncFelica Networks Inc
US8020201B20.642Selecting a security format conversion for wired and wireless devicesGRANT2011-09-132001-10-2321690167GoodIntel CorpIntel Corp
US20050144477A10.641Apparatus  system  and method for shared access to secure computing resourcesAPPLICATION2005-06-302003-12-3034700836GoodLenovo Singapore Pte LtdLenovo Singapore Pte Ltd
US5615263A0.638Dual purpose security architecture with protected internal operating systemGRANT1997-03-251995-01-0623456119GoodVLSI Technology IncIntellectual Ventures II LLC
US7111324B20.636USB hub keypadGRANT2006-09-191999-01-1525071717GoodSafeNet IncThales DIS CPL USA Inc
US8438645B20.635Secure clock with grace periodsGRANT2013-05-072005-04-2737235971GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5421006A0.635Method and apparatus for assessing integrity of computer system softwareGRANT1995-05-301992-05-0725375415GoodCompaq Computer CorpHewlett Packard Development Co LP
US7761904B20.634Removable cryptographic ignition key system and methodGRANT2010-07-202002-09-3031977911GoodHarris CorpStingray IP Solutions LLC
US5805712A0.627Apparatus and method for providing secured communicationsGRANT1998-09-081994-05-3122952176GoodIntel CorpIntel Corp
US7210009B20.627Computer system employing a trusted execution environment including a memory controller configured to clear memoryGRANT2007-04-242003-09-0434225999GoodAdvanced Micro Devices IncAdvanced Micro Devices Inc
US7568114B10.625Secure transaction processorGRANT2009-07-282002-10-1740887364GoodIndividualIndividual
US7752436B20.622Exclusive access for secure audio programGRANT2010-07-062005-08-0937672353GoodIntel CorpIntel Corp
US8909555B20.620Information security systemGRANT2014-12-092001-04-2426246005GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20050114687A10.612Methods and apparatus to provide protection for firmware resourcesAPPLICATION2005-05-262003-11-2134591320GoodIntel CorpIntel Corp
WO2001017296A10.610ARRANGEMENT FOR EFFECTING SECURE TRANSACTIONS IN A COMMUNICATION DEVICEAPPLICATION2001-03-081999-08-2720416775Good
US5517568A0.603Method of detecting unauthorized use of a wireless communication channelGRANT1996-05-141994-04-2122869760GoodMotorola IncGoogle Technology Holdings LLC
US7069447B10.599Apparatus and method for secure data storageGRANT2006-06-272001-05-1136600668GoodCORDER ENGINEERING IncSoteria Encryption Ii LLC
US9363481B20.597Protected media pipelineGRANT2016-06-072005-04-2237235970GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US5473692A0.596Roving software license for a hardware agentGRANT1995-12-051994-09-0723170470GoodIntel CorpIntel Corp, Parker Hannifin Corp
US9189605B20.591Protected computing environmentGRANT2015-11-172005-04-2240754843GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US4797928A0.585Encryption printed circuit boardGRANT1989-01-101987-01-0721694897GoodMIU AutomationMIU AUTOMATION A CORP OF TEXAS, MIU INDUSTRIES Ltd 1600-609 GRANVILLE STREET
US20030188179A10.585Encrypted file system using TCPAAPPLICATION2003-10-022002-03-2828452898GoodInternational Business Machines CorpLenovo PC International Ltd
US7925894B20.583System and method for delivering versatile security  digital rights management  and privacy servicesGRANT2011-04-122001-07-2534753209GoodSeagate Technology LLCSeagate Technology LLC
US6148401A0.581System and method for providing assurance to a host that a piece of software possesses a particular propertyGRANT2000-11-141997-02-0527365289GoodAT&T CorpAT&T Corp
US9633206B20.574Demonstrating integrity of a compartment of a compartmented operating systemGRANT2017-04-252000-11-289916862GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US6895502B10.571Method and system for securely displaying and confirming request to perform operation on host computerGRANT2005-05-172000-06-0834573086GoodCurriculum CorpBcs Software D/b/a Bluebonnet Consulting Services & Software LLC
US7036020B20.570Methods and systems for promoting security in a computer system employing attached storage devicesGRANT2006-04-252001-07-2525432712GoodAntique Books IncSecureWave Storage Solutions Inc
US4918728A0.570Data cryptography operations using control vectorsGRANT1990-04-171989-08-3023587962GoodInternational Business Machines CorpInternational Business Machines Corp
US7496347B20.567Method and apparatus for providing secure wireless communicationGRANT2009-02-242004-11-1236337255GoodVelocita Wireless LLCVelocita Wireless LLC
US20020049910A10.562Unified trust model providing secure identification  authentication and validation of physical products and entities  and processing  storage and exchange of informationAPPLICATION2002-04-252000-07-2527559138Good
US20080022136A10.562Encryption load balancing and distributed policy enforcementAPPLICATION2008-01-242005-02-1838972761GoodProtegrity CorpProtegrity Corp
US7310734B20.560Method and system for securing a computer network and personal identification device used therein for controlling access to network componentsGRANT2007-12-182001-02-0125103651Good3M Innovative Properties Co3M Innovative Properties Co
US7502938B20.560Trusted biometric deviceGRANT2009-03-102002-07-2531188396GoodBIO key International IncBIO-KEY INTERNATIONAL Inc, BIO key International Inc
US8386788B20.558Method and apparatus for loading a trustable operating systemGRANT2013-02-262002-02-2527753730GoodIntel CorpTahoe Research Ltd
US9185234B20.558Automated account mapping in a wireless subscriber billing systemGRANT2015-11-102006-02-2238169729GoodQualcomm IncQualcomm Inc
US20050015604A10.558Session authentication using temporary passwordsAPPLICATION2005-01-202003-07-1634063062GoodIntel CorpIntel Corp
US8601566B20.555Mechanism supporting wired and wireless methods for client and server side authenticationGRANT2013-12-032001-10-2321940415GoodIntel CorpIntel Corp
US20050071656A10.555Secure processor-based system and methodAPPLICATION2005-03-312003-09-2534376514GoodMicron Technology IncMicron Technology Inc, Individual
US5748744A0.549Secure mass storage system for computersGRANT1998-05-051996-06-0324638801GoodVLSI Technology IncCallahan Cellular LLC
US7039809B10.548Asymmetric encrypted pinGRANT2006-05-021998-11-1236216245GoodMastercard International IncMastercard International Inc
US6081895A0.548Method and system for managing data unit processingGRANT2000-06-271997-10-1025488579GoodMotorola IncGeneral Dynamics Mission Systems Inc
US6351817B10.547Multi-level secure computer with token-based access controlGRANT2002-02-261999-10-2723694900Good
US6775778B10.544Secure computing device having boot read only memory verification of program codeGRANT2004-08-101998-05-2932829232GoodTexas Instruments IncTexas Instruments Inc
US6668326B10.541Context saving systemGRANT2003-12-231998-05-2111071533GoodNDS LtdSynamedia Ltd
US7392398B10.540Method and apparatus for protection of computer assets from unauthorized accessGRANT2008-06-242000-06-0539530116GoodATI International SRLATI Technologies ULC
EP0471538A20.539Data security systemGRANT1992-02-191990-08-1310680558GoodGEC Marconi Ltd, GEC Marconi Holdings LtdBAE Systems Electronics Ltd, Allard Way Holdings Ltd
US6671804B10.538Method and apparatus for supporting authorities in a public key infrastructureGRANT2003-12-301999-12-0126863973GoodBBNT Solutions LLCVerizon Corporate Services Group Inc, Raytheon BBN Technologies Corp, Level 3 Communications LLC
US8924728B20.538Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive informationGRANT2014-12-302004-11-3036568515GoodIntel CorpIntel Corp
US5369702A0.538Distributed cryptographic object methodGRANT1994-11-291993-10-1822483974GoodTecsec IncTecsec Inc
US7207041B20.531Open platform architecture for shared resource access managementGRANT2007-04-172001-06-2827391847GoodTranzeo Wireless Tech IncQuarterhill Inc
US9454657B20.530Security access device and methodGRANT2016-09-272004-12-0336564708GoodBCE IncBCE Inc
US7900059B20.529Sealing of data for applicationsGRANT2011-03-012005-12-1337697810GoodInternational Business Machines CorpInternational Business Machines Corp
US20040117625A10.529Attestation using both fixed token and portable tokenAPPLICATION2004-06-172002-12-1632507124GoodIntel CorpIntel Corp
US7693277B20.525Generating digital signatures using ephemeral cryptographic keyGRANT2010-04-062005-01-0736653274GoodFirst Data CorpFirst Data Corp
US5406624A0.525Data processor systemsGRANT1995-04-111992-09-0411063996GoodAlgorithmic Research LtdAlgorithmic Research Ltd
US7360253B20.524System and method to lock TPM always ‘on’ using a monitorGRANT2008-04-152004-12-2336613166GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8176564B20.523Special PC mode entered upon detection of undesired stateGRANT2012-05-082004-11-1536388008GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7003674B10.522Disk drive employing a disk with a pristine area for storing encrypted data accessible only by trusted devices or clients to facilitate secure network communicationsGRANT2006-02-212000-07-3135810819GoodWestern Digital Ventures IncWestern Digital Ventures Inc
US7509141B10.522Software defined radio computing architectureGRANT2009-03-242005-09-2940457230GoodRockwell Collins IncRockwell Collins Inc
US20090150899A10.521System and methods for dependent trust in a computer systemAPPLICATION2009-06-112004-11-1735580239GoodSun Microsystems IncOracle America Inc
US20030126442A10.521Authenticated code moduleAPPLICATION2003-07-032001-12-3121906316GoodIntel CorpIntel Corp
US20030074548A10.517Method and system for tracking a secure boot in a trusted computing environmentAPPLICATION2003-04-172001-10-1625526037GoodInternational Business Machines CorpLenovo PC International Ltd
US20060140144A10.510Method and system for providing an open gateway initiative bundle over the airAPPLICATION2006-06-292004-12-2735839024GoodMotorola IncMotorola Mobility LLC
US5825875A0.508Process for loading a protected storage zone of an information processing device  and associated deviceGRANT1998-10-201994-10-119467737GoodCP8 TransacCP8 Technologies SA
US5293424A0.507Secure memory cardGRANT1994-03-081992-10-1425503564GoodBull HN Information Systems IncCP8 Technologies SA, Bull CP8 SA
US7587607B20.506Attesting to platform configurationGRANT2009-09-082003-12-2234678852GoodIntel CorpIntel Corp
US7418344B20.506Removable computer with mass storageGRANT2008-08-262001-08-0225449832GoodSanDisk CorpSanDisk Technologies LLC
US7245927B20.505Intelligent network interfaceGRANT2007-07-172002-03-1228038985GoodScience Applications International Corp SAICLeidos Inc
US20060053426A10.505Secure mobile wireless deviceAPPLICATION2006-03-092002-05-289937596GoodSymbian LtdNokia Technologies Oy
US9350875B20.504Wireless subscriber billing and distributionGRANT2016-05-242005-05-3136972880GoodQualcomm IncQualcomm Inc
US20030126453A10.504Processor supporting execution of an authenticated code instructionAPPLICATION2003-07-032001-12-3121908314GoodIntel CorpIntel Corp
US7490239B20.503Facilitating digital signature based on ephemeral private keyGRANT2009-02-102005-01-0736654649GoodFirst Data CorpFirst Data Corp
US7278025B20.502Secure biometric verification of identityGRANT2007-10-022002-09-1031999771GoodIVI Smart Tech IncIVI Holdings Ltd
US20020026578A10.502Secure usage of digital certificates and related keys on a security tokenAPPLICATION2002-02-282000-08-228169605GoodInternational Business Machines CorpInternational Business Machines Corp
US5237616A0.501Secure computer system having privileged and unprivileged memoriesGRANT1993-08-171992-09-2125486922GoodInternational Business Machines CorpInternational Business Machines Corp
US6948061B10.500Method and device for performing secure transactionsGRANT2005-09-202000-09-2024671482GoodCerticom CorpBlackBerry Ltd
US8208517B20.500Systems and methods for a multi-mode wireless modemGRANT2012-06-262001-12-2138224267GoodNovatel Wireless IncNovatel Wireless Inc
US9436804B20.499Establishing a unique session key using a hardware functionality scanGRANT2016-09-062005-04-2237855119GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US6618855B10.497Caching untrusted modules for module-by-module verificationGRANT2003-09-091999-05-2723247045GoodSun Microsystems IncOracle America Inc
US5757919A0.496Cryptographically protected paging subsystemGRANT1998-05-261996-12-1225069838GoodIntel CorpIntel Corp
US7290288B20.496Method and system for controlling access  by an authentication server  to protected computer resources provided via an internet protocol networkGRANT2007-10-301997-06-1141118015GoodPrism Technologies LLCPrism Technologies LLC
US20030191943A10.495Methods and arrangements to register codeAPPLICATION2003-10-092002-04-0528674094GoodIntel CorpIntel Corp
US20060010079A10.494Apparatus and method for proving the denial of a direct proof signatureAPPLICATION2006-01-122004-06-1035134496GoodIntel CorpIntel Corp
US7493486B10.491Method and apparatus for supporting cryptographic-related activities in a public key infrastructureGRANT2009-02-172000-06-0940349417GoodVerizon Laboratories IncVerizon Laboratories Inc, Verizon Patent and Licensing Inc
US7457960B20.489Programmable processor supporting secure modeGRANT2008-11-252004-11-3036585639GoodAnalog Devices IncAnalog Devices Inc
US8700535B20.489Issuing a publisher use license off-line in a digital rights management (DRM) systemGRANT2014-04-152003-02-2532850467GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8347078B20.487Device certificate individualizationGRANT2013-01-012004-10-1846321725GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5007082A0.485Computer software encryption apparatusGRANT1991-04-091988-08-0327397756GoodKelly Services IncKelly Services Inc
US7302587B20.483Secure computer systemGRANT2007-11-272001-06-0825237074GoodMatra Transport InternationalMatra Transport International, Siemens Mobility SAS
US6192477B10.483Methods  software  and apparatus for secure communication over a computer networkGRANT2001-02-201999-02-0222917348GoodDagg LLCDagg LLC
US20060153369A10.483PROVIDING CRYPTOGRAPHIC KEY BASED ON USER INPUT DATAAPPLICATION2006-07-132005-01-0736653272GoodFirst Data CorpFirst Data Corp
US7809957B20.482Trusted platform module for generating sealed dataGRANT2010-10-052005-09-2937895197GoodIntel CorpTahoe Research Ltd
US8208958B20.481Methods and apparatus for a flexible wireless communication and cellular telephone systemGRANT2012-06-261999-03-2523056819GoodKantan IncWivity Inc
US20050234967A10.480System and method for providing data storage through a device management tree using non-device management agentsAPPLICATION2005-10-202004-04-1634963302GoodMotorola IncGoogle Technology Holdings LLC
US7509683B20.480System and method for authenticating digital contentGRANT2009-03-242002-08-2631887644GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US7110539B10.480Method and apparatus for encrypting and decrypting dataGRANT2006-09-191999-03-2220430193GoodKent Ridge Digital LabsKent Ridge Digital Labs
US7519558B20.478Biometrically enabled private secure information repositoryGRANT2009-04-141997-08-2729587805GoodData Treasury CorpData Treasury Corp
US7430759B20.478Method and computer system for securing communication in networksGRANT2008-09-302001-08-0726009904GoodInnominate Security Technologies AGInnominate Security Technologies AG
US7861081B20.478Security system and methodGRANT2010-12-282004-03-2634957163GoodBCE IncBCE Inc
US7171558B10.477Transparent digital rights management for extendible content viewersGRANT2007-01-302000-09-2224677593GoodInternational Business Machines CorpInternational Business Machines Corp
US9143622B20.477Prepay accounts for applications  services and content for communication devicesGRANT2015-09-222006-02-1738055489GoodQualcomm IncQualcomm Inc
WO1998039876A10.476CRYPTOGRAPHIC DIGITAL IDENTITY METHODAPPLICATION1998-09-111997-03-0621898000Good
US8725646B20.476Output protection levelsGRANT2014-05-132005-04-1537109729GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8037314B20.475Replacing blinded authentication authorityGRANT2011-10-112003-12-2234678774GoodIntel CorpIntel Corp
US6963974B10.474Method and apparatus for providing non-repudiation of transaction information that includes mark up language dataGRANT2005-11-082000-12-2835207139GoodEntrust LtdEntrust Ltd
US20040098596A10.474Driverless USB security tokenAPPLICATION2004-05-202002-11-1532302697GoodRainbow Technologies BV, Rainbow Technologies IncRainbow Technologies BV, Thales DIS CPL USA Inc
US7900038B20.472Method and apparatus for a broker entityGRANT2011-03-012003-04-2933309819GoodWells Fargo Bank NAWells Fargo Bank NA
US7733125B20.468Programmable logic device with embedded switch fabricGRANT2010-06-082002-07-1230118552GoodSCA Technica IncSCA Technica Inc
US5835594A0.464Methods and apparatus for preventing unauthorized write access to a protected non-volatile storageGRANT1998-11-101996-02-0924396977GoodIntel CorpIntel Corp
US5987140A0.463System  method and article of manufacture for secure network electronic payment and credit collectionGRANT1999-11-161996-04-2624566073GoodVerifone IncHewlett Packard Enterprise Development LP
US20060156013A10.463DIGITAL SIGNATURE SOFTWARE USING EPHEMERAL PRIVATE KEY AND SYSTEMAPPLICATION2006-07-132005-01-0736654650GoodFirst Data CorpFirst Data Corp
US7503064B20.462Framework for providing a security context and configurable firewall for computing systemsGRANT2009-03-102003-12-2234678717GoodSun Microsystems IncOracle America Inc
US7216083B20.462Automated transaction machine digital signature system and methodGRANT2007-05-082001-03-0726956548GoodDiebold IncDiebold Nixdorf Inc
US20030084285A10.461Method and system for detecting a tamper event in a trusted computing environmentAPPLICATION2003-05-012001-10-2621753703GoodInternational Business Machines CorpLenovo PC International Ltd
US7185249B20.461Method and apparatus for secure scan testingGRANT2007-02-272002-04-3029249555GoodFreescale Semiconductor IncNorth Star Innovations Inc
US6282653B10.461Royalty collection method and system for use of copyrighted digital materials on the internetGRANT2001-08-281998-05-1522154806GoodInternational Business Machines CorpAlibaba Group Holding Ltd
US6785810B10.460System and method for providing secure transmission  search  and storage of dataGRANT2004-08-311999-08-3132908227GoodeSpoc InceSpoc Inc
US6196456B10.460Automated teller machineGRANT2001-03-061998-05-2310832563GoodNCR CorpNCR Corp
US7194618B10.459Encryption and authentication systems and methodsGRANT2007-03-202001-03-0537863961GoodIndividualKioba Processing LLC
US10009743B20.459System and method for providing subscribed applications on wireless devices over a wireless networkGRANT2018-06-262001-08-1325457504GoodQualcomm IncQualcomm Inc
US4278837A0.457Crypto microprocessor for executing enciphered programsGRANT1981-07-141977-10-3126722203GoodDallas Semiconductor CorpDallas Semiconductor Corp
US20060153370A10.455GENERATING PUBLIC-PRIVATE KEY PAIR BASED ON USER INPUT DATAAPPLICATION2006-07-132005-01-0736653273GoodFirst Data CorpFirst Data Corp
US5675645A0.454Method and apparatus for securing executable programs against copyingGRANT1997-10-071995-04-1823678781GoodRicoh Co Ltd, Ricoh Americas CorpRicoh Co Ltd, Ricoh Americas Corp
US7543144B20.454System and method for lost data destruction of electronic data stored on portable electronic devicesGRANT2009-06-022004-07-2135658778GoodBEACHHEAD SOLUTIONS IncBEACHHEAD SOLUTIONS Inc
US7373518B20.454Operation of a security module in a card readerGRANT2008-05-132000-05-097641149GoodWincor Nixdorf International GmbHWincor Nixdorf International GmbH
US9203923B20.451Data synchronization interfaceGRANT2015-12-012001-08-1523212785GoodQualcomm IncQualcomm Inc
US6026293A0.450System for preventing electronic memory tamperingGRANT2000-02-151996-09-0524838185GoodEricsson IncEricsson Inc
US5548646A0.449System for signatureless transmission and reception of data packets between computer networksGRANT1996-08-201994-09-1523184846GoodSun Microsystems IncSun Microsystems Inc
US20010044886A10.448METHOD AND APPARATUS FOR CONTROLLING ACCESS TO CONFIDENTIAL DATA BY ANALYZING PROPERTY INHERENT IN DATAAPPLICATION2001-11-221997-09-2626739610GoodHughes Electronics CorpJPMorgan Chase Bank NA, Hughes Network Systems LLC
US20030221105A10.447Extensible mechanism for attaching digital signatures to different file typesAPPLICATION2003-11-272002-05-2029548389GoodAutodesk IncAutodesk Inc
US5960172A0.447Digital computer system security deviceGRANT1999-09-281995-12-3019447976GoodSamsung Electronics Co LtdJingpin Technologies LLC
US5956404A0.446Digital signature with auditing bitsGRANT1999-09-211996-09-3024911170GoodCounterpane Internet Security IncBT Americas Inc
US5901225A0.442System and method for performing software patches in embedded systemsGRANT1999-05-041996-12-0525056312GoodAdvanced Micro Devices IncMicrosemi Semiconductor US Inc
US20030159056A10.440Method and system for securing enablement access to a data security deviceAPPLICATION2003-08-212002-02-1527732594GoodInternational Business Machines CorpMicrosoft Technology Licensing LLC
US20040039924A10.440System and method for security of computing devicesAPPLICATION2004-02-262001-04-0925253451GoodKinglite Holdings IncKinglite Holdings Inc
US9185538B20.439Wireless subscriber application and content distribution and differentiated pricingGRANT2015-11-102005-05-3137238419GoodQualcomm IncQualcomm Inc
US5745574A0.439Security infrastructure for electronic transactionsGRANT1998-04-281995-12-1524290352GoodEntegrity Solutions CorpIntellectual Ventures II LLC
US4521852A0.438Data processing device formed on a single semiconductor substrate having secure memoryGRANT1985-06-041982-06-3023556929GoodTexas Instruments IncTexas Instruments Inc
US9300641B20.438Method and apparatus for providing bootstrapping procedures in a communication networkGRANT2016-03-292005-02-1136792922GoodNokia OyjNokia Technologies Oy
US5825880A0.436Multi-step digital signature method and systemGRANT1998-10-201994-01-1327391477GoodIndividualCertco Inc
US20030097582A10.435Method and system for reducing personal security device latencyAPPLICATION2003-05-222001-11-1925534022GoodActivCard SAActivIdentity Europe SA
US7107445B20.433Method and apparatus for secure processing of sensitive dataGRANT2006-09-122002-11-2032296410GoodInternational Business Machines CorpPHONENICIA INNOVATIONS SUBSIDIARY OF PENDRELL TECHNOLOGIES LLC LLC, Uniloc 2017 LLC
US4319079A0.432Crypto microprocessor using block cipherGRANT1982-03-091979-09-1326756455GoodDallas Semiconductor CorpDallas Semiconductor Corp
US20040180649A10.432Wireless device allowing for configuration of settings and method thereforAPPLICATION2004-09-162003-03-1432962125GoodMotorola IncGoogle Technology Holdings LLC
US7957534B20.432System and method for security association between communication devices within a wireless home networkGRANT2011-06-072004-08-1341646494GoodTexas Instruments IncTexas Instruments Inc
US8353046B20.430System and method for delivery of a modular operating systemGRANT2013-01-082005-06-0837525568GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20020066023A10.428Security technique for an open computing platform systemAPPLICATION2002-05-302000-11-3024924793GoodPalm IncAccess Co Ltd
US5657445A0.427Apparatus and method for limiting access to mass storage devices in a computer systemGRANT1997-08-121996-01-2624369045GoodDell USA LPDell USA LP
US5887064A0.426Cryptographic equipmentGRANT1999-03-231987-09-096335525GoodSiemens AGSiemens AG
US20070036358A10.424Secure and automatic configuration of wireless networksAPPLICATION2007-02-152005-08-1037742560GoodNetopia IncArris Technology Inc
US8336085B20.423Tuning product policy using observed evidence of customer behaviorGRANT2012-12-182004-11-1537865262GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5224160A0.421Process for securing and for checking the integrity of the secured programsGRANT1993-06-291987-02-2327433834GoodWincor Nixdorf International GmbHFujitsu Technology Solutions GmbH
US8918900B20.420Smart card for passport  electronic passport  and method  system  and apparatus for authenticating person holding smart card or electronic passportGRANT2014-12-232004-04-2634979760GoodIVI Holdings LtdIVI Holdings Ltd
US7430606B10.416Reducing certificate revocation lists at access points in a wireless access networkGRANT2008-09-302003-10-1739776565GoodArraycomm LLCIntel Corp
US20040128391A10.415Method and system for managing a validity period in association with a presence attributeAPPLICATION2004-07-012002-12-3132655196GoodMotorola IncMotorola Solutions Inc
US20030135771A10.415Novel personal electronics device with a dual core processorAPPLICATION2003-07-172001-03-1632716901GoodGCV1 IncARM Ltd
US5729760A0.414System for providing first type access to register if processor in first mode and second type access to register if processor not in first modeGRANT1998-03-171996-06-2124679650GoodIntel CorpIntel Corp
US7093122B10.414Techniques for permitting access across a context barrier in a small footprint device using shared object interfacesGRANT2006-08-151999-01-2222884344GoodSun Microsystems IncOracle America Inc
US8572392B20.412Access authentication method  information processing unit  and computer productGRANT2013-10-292004-04-0135055756GoodFujitsu LtdFujitsu Client Computing Ltd
US4910774A0.412Method and system for suthenticating electronic memory cardsGRANT1990-03-201987-07-109353051GoodSchlumberger SASCHLMBERGER INDUSTRIES, SCOTT MOTORS COMPANY, Schlumberger SA
US4227253A0.411Cryptographic communication security for multiple domain networksGRANT1980-10-071977-12-0525326207GoodInternational Business Machines CorpInternational Business Machines Corp
US20060041755A10.409Multichannel device utilizing a centralized out-of-band authentication system (COBAS)APPLICATION2006-02-232000-09-0536228237GoodNetlabs com IncSTRIKEFORCE TECHNOLOGIES Inc
US7454624B20.407Match template protection within biometric security systemsGRANT2008-11-182002-05-1529550016GoodBIO key International IncBIO-KEY INTERNATIONAL Inc, BIO key International Inc
US20060251258A10.407System  method and computer program product for updating security criteria in wireless networksAPPLICATION2006-11-092005-04-0537073920GoodMcAfee LLCMcAfee LLC
US5522075A0.407Protection ring extension for computers having distinct virtual machine monitor and virtual machine address spacesGRANT1996-05-281991-06-2824903810GoodDigital Equipment CorpHewlett Packard Development Co LP
US20020059238A10.407Data management systemAPPLICATION2002-05-161994-09-3027577654GoodMitsubishi CorpPiracy Protection LLC, Xylon LLC
US10043170B20.407Application-based value billing in a wireless subscriber networkGRANT2018-08-072004-01-2134807165GoodQualcomm IncQualcomm Inc
WO1995026000A10.402INPUT/OUTPUT EMULATION SYSTEMAPPLICATION1995-09-281994-03-2310752355Good
US7406601B20.402Secure messaging for security tokenGRANT2008-07-292003-05-2333098020GoodActivCard Ireland LtdActivCard Ireland Ltd
US5737604A0.402Method and apparatus for independently resetting processors and cache controllers in multiple processor systemsGRANT1998-04-071989-11-0323712865GoodCompaq Computer CorpHewlett Packard Development Co LP
US8490870B20.400Apparatus and method for POS processingGRANT2013-07-232004-06-1535459477GoodSix Circle LLCOL Security LLC
US7448540B20.399Electronic settlement system  settlement apparatus and terminalGRANT2008-11-111999-08-0214236373GoodSoftBank BB CorpKioba Processing LLC
US7895443B20.399Secure authentication using hardware token and computer fingerprintGRANT2011-02-222002-11-0532302604GoodSafeNet IncRainbow Technologies BV, Thales DIS CPL USA Inc
US20030126434A10.396File security system using a security class and method for managing an encryption keyAPPLICATION2003-07-032001-12-2719717658GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US7383434B20.395System and method of looking up and validating a digital certificate in one passGRANT2008-06-031998-08-2626793830GoodDiversinet CorpIqvia Inc
US20040030887A10.395System and method for providing secure communications between clients and service providersAPPLICATION2004-02-122002-08-0727804783GoodSun Microsystems IncSun Microsystems Inc
US5511217A0.394Computer system of virtual machines sharing a vector processorGRANT1996-04-231992-11-3018113815GoodHitachi LtdHitachi Ltd
US7802085B20.394Apparatus and method for distributing private keys to an entity with minimal secret  unique informationGRANT2010-09-212004-02-1834838821GoodIntel CorpIntel Corp
US20050086468A10.392Digital certificate related to user terminal hardware in a wireless networkAPPLICATION2005-04-212003-10-1734465550GoodArraycomm LLCArraycomm LLC
US20060248599A10.391Cross-domain security for data vaultAPPLICATION2006-11-022004-12-3037235974GoodOracle International CorpOracle International Corp
US9232077B20.389Automatic subscription system for applications and services provided to wireless devicesGRANT2016-01-052003-03-1232962043GoodQualcomm IncQualcomm Inc
US6983368B20.388Linking public key of device to information during manufactureGRANT2006-01-032000-08-0431495620GoodFirst Data CorpFirst Data Corp
US6978369B20.388Person-centric account-based digital signature systemGRANT2005-12-202000-08-0423347132GoodFirst Data CorpFirst Data Corp
US7082533B20.387Gauging risk in electronic communications regarding accounts in ABDS systemGRANT2006-07-252000-08-0436778387GoodFirst Data CorpFirst Data Corp
US7096354B20.387Central key authority database in an ABDS systemGRANT2006-08-222000-08-0436954265GoodFirst Data CorpFirst Data Corp
US6789189B20.385Managing account database in ABDS systemGRANT2004-09-072000-08-0432965221GoodFirst Data CorpFirst Data Corp
US9054861B20.384Enhanced key agreement and transport protocolGRANT2015-06-092005-06-1437545821GoodCerticom CorpBlackBerry Ltd
US8726022B20.381Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securelyGRANT2014-05-132002-11-064750115GoodChina Iwncomm Co LtdChina Iwncomm Co Ltd
US8539459B20.380Code obfuscation and controlling a processor by emulationGRANT2013-09-172003-08-2028460014GoodRovi Europe LtdRovi Europe Ltd
US8781969B20.380Extensible media rightsGRANT2014-07-152005-05-2037449738GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7047416B20.379Account-based digital signature (ABDS) systemGRANT2006-05-161998-11-0927392531GoodFirst Data CorpFirst Data Corp
US20040196977A10.378Conveying wireless encryption keys upon client device connecting to network in non-wireless mannerAPPLICATION2004-10-072003-04-0233097088GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US7558965B20.377Entity authentication in electronic communications by providing verification status of deviceGRANT2009-07-072000-08-0430000362GoodFirst Data CorpFirst Data Corp
US20040044623A10.375Billing system for wireless device activityAPPLICATION2004-03-042002-08-2831976826GoodQualcomm IncQualcomm Inc
US7073067B20.373Authentication system and method based upon random partial digitized path recognitionGRANT2006-07-042003-05-0733416450GoodAuthernative IncAuthernative Inc
US5533126A0.372Key protection device for smart cardsGRANT1996-07-021993-04-229446339GoodBull CP8 SACP8 Technologies SA
US6779718B10.369Method for authenticating the result of an instruction in a tokenGRANT2004-08-241999-10-299551569GoodSchlumberger Systemes SAThales DIS France SA
US7539312B20.368Program update method and serverGRANT2009-05-262002-11-1532212042GoodPanasonic CorpNuvoton Technology Corp Japan
US8755501B20.366Acoustic encoding of dynamic identification codesGRANT2014-06-171999-12-1911073612GoodEncotone LtdENCO-TONE Ltd, Encotone Ltd
US7523067B10.366Electronic settlement system  settlement apparatus  and terminalGRANT2009-04-212000-08-0240550465GoodSoftBank BB CorpKioba Processing LLC
US4881271A0.364Portable wireless communication systemsGRANT1989-11-141987-03-2026404910GoodHitachi LtdFIPA Frohwitter Intellectual Property AG
US7869593B20.364Software for providing based on shared knowledge public keys having same private keyGRANT2011-01-112005-01-0736653271GoodFirst Data CorpFirst Data Corp
US7685435B20.363Program development method  program development supporting system  and program installation methodGRANT2010-03-232002-07-2429997246GoodPanasonic CorpNuvoton Technology Corp Japan
US20060165060A10.363Method and apparatus for managing credentials through a wireless networkAPPLICATION2006-07-272005-01-2136696675GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US7051343B20.362Module-by-module verificationGRANT2006-05-231999-05-2723247007GoodSun Microsystems IncSun Microsystems Inc
US5764969A0.361Method and system for enhanced management operation utilizing intermixed user level and supervisory level instructions with partial concept synchronizationGRANT1998-06-091995-02-1023528684GoodInternational Business Machines CorpInternational Business Machines Corp
US5361375A0.360Virtual computer system having input/output interrupt control of virtual machinesGRANT1994-11-011989-02-0912303315GoodFujitsu LtdFujitsu Ltd
US8578490B20.360System and method for using timestamps to detect attacksGRANT2013-11-051999-08-3037904356GoodSymantec CorpNortonLifeLock Inc
US8549640B20.358System and method for computer securityGRANT2013-10-011999-07-1426848722GoodSymantec CorpNortonLifeLock Inc
US4403283A0.358Extended memory system and methodGRANT1983-09-061980-07-2822630989GoodNCR CorpNCR Corp
US6763397B10.356Fully lazy linkingGRANT2004-07-131999-05-2723249711GoodSun Microsystems IncOracle America Inc
US7421083B20.353System for seamlessly updating service keys with automatic recoveryGRANT2008-09-022001-04-0526815823GoodGeneral Instrument CorpGoogle Technology Holdings LLC
US7254706B20.352System and method for downloading of files to a secure terminalGRANT2007-08-072001-06-2925401604GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20040043753A10.352System and method for third party application sales and services to wireless devicesAPPLICATION2004-03-042002-08-3031976874GoodQualcomm IncQualcomm Inc
US6766521B10.352Dataflow algorithm for symbolic computation of lowest upper bound typeGRANT2004-07-201999-05-2723249729GoodSun Microsystems IncOracle America Inc
US6651131B10.349High bandwidth network and storage cardGRANT2003-11-182000-09-0629420813GoodSun Microsystems IncOracle America Inc
US5144692A0.348SYSTEM FOR CONTROLLING ACCESS BY FIRST SYSTEM TO PORTION OF MAIN MEMORY DEDICATED EXCLUSIVELY TO SECOND SYSTEM TO FACILITATE INPUT/OUTPUT PROCESSING VIA FIRST SYSTEMGRANT1992-09-011989-05-1723387812GoodInternational Business Machines CorpInternational Business Machines Corp
US5854913A0.347Microprocessor with an architecture mode control capable of supporting extensions of two distinct instruction-set architecturesGRANT1998-12-291995-06-0723906695GoodInternational Business Machines CorpInternational Business Machines Corp
US20050044292A10.347Method and apparatus to retain system control when a buffer overflow attack occursAPPLICATION2005-02-242003-08-1934194089GoodIntel CorpIntel Corp
US5668971A0.347Posted disk read operations performed by signalling a disk read complete to the system prior to completion of data transferGRANT1997-09-161992-12-0125530114GoodCompaq Computer CorpHewlett Packard Development Co LP
US7593527B20.346Providing digital signature and public key based on shared knowledgeGRANT2009-09-222005-01-0736653268GoodFirst Data CorpFirst Data Corp
US7936869B20.345Verifying digital signature based on shared knowledgeGRANT2011-05-032005-01-0736653269GoodFirst Data CorpFirst Data Corp
US5684948A0.344Memory management circuit which provides simulated privilege levelsGRANT1997-11-041995-09-0124083479GoodNational Semiconductor CorpNational Semiconductor Corp
US5255379A0.343Method for automatically transitioning from V86 mode to protected mode in a computer system using an Intel 80386 or 80486 processorGRANT1993-10-191990-12-2824550326GoodSun Microsystems IncSun Microsystems Inc
US6836787B10.342Monitor device for displaying output display images of a plurality of computersGRANT2004-12-281999-01-2611936734GoodHitachi LtdMaxell Ltd
US4276594A0.342Digital computer with multi-processor capability utilizing intelligent composite memory and input/output modules and method for performing the sameGRANT1981-06-301978-01-2727128273GoodGould IncSchneider Electric USA Inc
US5717903A0.342Method and appartus for emulating a peripheral device to allow device driver development before availability of the peripheral deviceGRANT1998-02-101995-05-1523749566GoodCompaq Computer CorpSamsung Electronics Co Ltd
US7444648B20.340Fully lazy linking with module-by-module verificationGRANT2008-10-281999-05-2723249721GoodSun Microsystems IncSun Microsystems Inc
US5263168A0.339Circuitry for automatically entering and terminating an initialization mode in a data processing system in response to a control signalGRANT1993-11-161991-06-0324850323GoodMotorola IncNXP USA Inc
US6463535B10.339System and method for verifying the integrity and authorization of software before execution in a local platformGRANT2002-10-081998-10-0522602577GoodIntel CorpIntel Corp
US6718024B10.337System and method to discriminate call content typeGRANT2004-04-061998-12-1146203861GoodSecureLogix CorpSecureLogix Corp
US7010691B20.337ABDS system utilizing security information in authenticating entity accessGRANT2006-03-072000-08-0436013394GoodFirst Data CorpFirst Data Corp
US5022077A0.331Apparatus and method for preventing unauthorized access to BIOS in a personal computer systemGRANT1991-06-041989-08-2523576925GoodInternational Business Machines CorpLenovo Singapore Pte Ltd
US7620980B10.331Secure data brokerGRANT2009-11-171999-07-2123406770GoodSun Microsystems IncOracle America Inc
US20030163740A10.331User interface systemAPPLICATION2003-08-282000-02-1525646259GoodMOLTEN MARKETS Pty LtdMOLTEN MARKETS Pty Ltd
US7969959B20.328Method and apparatus for efficient and deterministic group alertingGRANT2011-06-282004-12-1636912614GoodCritical Response Systems IncCritical Holdings Inc
US4571672A0.326Access control method for multiprocessor systemsGRANT1986-02-181982-12-1716770651GoodHitachi Ltd, Hitachi Microcomputer Engineering LtdHitachi Microcomputer System Ltd, Hitachi Ltd
US20020099950A10.326Method of maintaining integrity of an instruction or data setAPPLICATION2002-07-252001-01-2225080003GoodHewlett Packard CoHewlett Packard Development Co LP
US8538458B20.325Location sharing and tracking using mobile phones or other wireless devicesGRANT2013-09-172005-04-0437071237GoodX One IncX One Inc
US4319323A0.325Communications device for data processing systemGRANT1982-03-091980-04-0422477823GoodDigital Equipment CorpDigital Equipment Corp
US5386552A0.323Preservation of a computer system processing state in a mass storage deviceGRANT1995-01-311991-10-2125117050GoodIntel CorpIntel Corp
US6405317B10.322Security module for a transaction processing systemGRANT2002-06-111998-01-3010826121GoodInternational Business Machines CorpInternational Business Machines Corp
US20020147916A10.317Method and apparatus for securing portions of memoryAPPLICATION2002-10-102001-04-0425245202GoodAdvanced Micro Devices IncMediaTek Inc
US20040225880A10.316Strong authentication systems built on combinations of "what user knows" authentication factorsAPPLICATION2004-11-112003-05-0733416443GoodAuthenture IncAuthernative Inc
US5903752A0.316Method and apparatus for embedding a real-time multi-tasking kernel in a non-real-time operating systemGRANT1999-05-111994-10-1326983737GoodIntel CorpIntel Corp
US7188258B10.315Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects  and duplication- and duplication- and imitation-resistant objectsGRANT2007-03-061999-09-1737807273GoodInternational Business Machines CorpInternational Business Machines Corp
US5555414A0.313Multiprocessing system including gating of host I/O and external enablement to guest enablement at polling intervalsGRANT1996-09-101994-12-1423397913GoodInternational Business Machines CorpInternational Business Machines Corp
US8437345B20.312Terminal and communication systemGRANT2013-05-072003-07-0934055652GoodHitachi LtdHitachi Ltd
US20060153364A10.311ASYMMETRIC KEY CRYPTOSYSTEM BASED ON SHARED KNOWLEDGEAPPLICATION2006-07-132005-01-0736653267GoodFirst Data CorpFirst Data Corp
US6851054B20.311Account-Based digital signature (ABDS) system for authenticating entity access to controlled resourceGRANT2005-02-012000-08-0422834916GoodFirst Data CorpFirst Data Corp
US20030120607A10.303E-receipt verification system and methodAPPLICATION2003-06-262001-12-2021822292GoodKoninklijke Philips Electronics NVKoninklijke Philips NV
US5606617A0.303Secret-key certificatesGRANT1997-02-251994-10-1423252322GoodMicrosoft Technology Licensing LLCSOFIUS GREENHOUSE FUND LP, Radialpoint Inc
US4347565A0.302Address control system for software simulationGRANT1982-08-311978-12-0115461768GoodFujitsu LtdFujitsu Ltd
US20060153367A10.302DIGITAL SIGNATURE SYSTEM BASED ON SHARED KNOWLEDGEAPPLICATION2006-07-132005-01-0736653270GoodFirst Data CorpFirst Data Corp
US5564040A0.299Method and apparatus for providing a server function in a logically partitioned hardware machineGRANT1996-10-081994-11-0823312496GoodInternational Business Machines CorpInternational Business Machines Corp
US5459867A0.295Kernels  description tables  and device driversGRANT1995-10-171989-10-2023687842GoodIomega CorpXylon LLC
US5274773A0.295Flexible host interface controller architectureGRANT1993-12-281990-11-0927086452GoodSeagate Peripherals IncSeagate Technology LLC
US20070113077A10.295System and Method for Establishing Trust Without Revealing IdentityAPPLICATION2007-05-172002-11-2732325661GoodIntel CorpIntel Corp
US7693063B20.294Communication control apparatus and communication control methodGRANT2010-04-062005-06-1437524062GoodFujitsu LtdFujitsu Ltd
US4037214A0.291Key register controlled accessing systemGRANT1977-07-191976-04-3024737703GoodInternational Business Machines CorpInternational Business Machines Corp
US5633929A0.287Cryptographic key escrow system having reduced vulnerability to harvesting attacksGRANT1997-05-271995-09-1524108755GoodRSA Data Security IncEMC Corp
US4975836A0.286Virtual computer systemGRANT1990-12-041984-12-1927292019GoodHitachi LtdHitachi Ltd
US5455909A0.285Microprocessor with operation capture facilityGRANT1995-10-031991-07-0527505571GoodChips and Technologies LLCIntel Corp
US20030051152A10.285Method and device for storing and reading digital data on/from a physical mediumAPPLICATION2003-03-132001-09-118867153GoodSTMicroelectronics SASTMicroelectronics SA
US5442645A0.283Method for checking the integrity of a program or data  and apparatus for implementing this methodGRANT1995-08-151989-06-0626227369GoodBull CP8 SACP8 Technologies SA
US5319760A0.283Translation buffer for virtual machines with address space matchGRANT1994-06-071991-06-2824903754GoodDigital Equipment CorpHewlett Packard Development Co LP
US6820199B20.282Sending electronic transaction message  digital signature derived therefrom  and sender identity information in AADS systemGRANT2004-11-161998-11-0922696181GoodFirst Data CorpFirst Data Corp
US5437033A0.282System for recovery from a virtual machine monitor failure with a continuous guest dispatched to a nonguest modeGRANT1995-07-251990-11-1618009738GoodHitachi LtdHitachi Ltd
US5187802A0.282VIRTUAL MACHINE SYSTEM WITH VITUAL MACHINE RESETTING STORE INDICATING THAT VIRTUAL MACHINE PROCESSED INTERRUPT WITHOUT VIRTUAL MACHINE CONTROL PROGRAM INTERVENTIONGRANT1993-02-161988-12-2618180758GoodHitachi LtdHitachi Ltd
US5796835A0.276Method and system for writing information in a data carrier making it possible to later certify the originality of this informationGRANT1998-08-181992-10-2726229822GoodBull CP8 SACP8 Technologies SA
US5434999A0.272Safeguarded remote loading of service programs by authorizing loading in protected memory zones in a terminalGRANT1995-07-181988-11-0926226976GoodBull CP8 SACP8 Technologies SA
US20080201505A10.272Multimedia data collection device for a host with a single available input portAPPLICATION2008-08-212003-01-0839707624Goode-Watch Ince-Watch Inc, Telesis Group Inc, Individual
US5075842A0.271DISABLING TAG BIT RECOGNITION AND ALLOWING PRIVILEGED OPERATIONS TO OCCUR IN AN OBJECT-ORIENTED MEMORY PROTECTION MECHANISMGRANT1991-12-241989-12-2223809597GoodIntel CorpIntel Corp
US20040128508A10.271Method and apparatus for access authentication entityAPPLICATION2004-07-012001-08-0632655473GoodFirst Data CorpFirst Data Corp
US7343343B10.271Electronic goods-purchasing method and commercial-transaction apparatus thereforGRANT2008-03-111999-09-0117166225GoodSony CorpSony Corp
US20070083862A10.270Direct-memory access between input/output device and physical memory within virtual machine environmentAPPLICATION2007-04-122005-10-0837560747GoodInternational Business Machines CorpInternational Business Machines Corp
US5900606A0.269Method of writing information securely in a portable mediumGRANT1999-05-041995-03-109476981GoodItron Soluciones de Medida Espana SAItron Soluciones de Medida Espana SA, Thales DIS France SA
US20020107795A10.269Application distribution and billing system in a wireless networkAPPLICATION2002-08-082001-02-0226951573GoodQualcomm IncQualcomm Inc
US4162536A0.267Digital input/output system and methodGRANT1979-07-241976-01-0227094922GoodGould IncSchneider Electric USA Inc
US7240034B10.266Method for secure electronic transaction and corresponding systemGRANT2007-07-031999-10-269551349GoodFrance Telecom SAOrange SA
US5604805A0.265Privacy-protected transfer of electronic informationGRANT1997-02-181994-02-2822753072GoodMicrosoft Technology Licensing LLCSOFIUS GREENHOUSE FUND LP, Radialpoint Inc
US5752046A0.258Power management system for computer device interconnection busGRANT1998-05-121993-01-1421715482GoodApple Computer IncApple Inc
US5504922A0.257Virtual machine with hardware display controllers for base and target machinesGRANT1996-04-021989-06-3015834866GoodHitachi LtdHitachi Ltd
US7877485B20.257Maintaining session states within virtual machine environmentsGRANT2011-01-252005-12-0237831691GoodInternational Business Machines CorpDaedalus Blue LLC
US5574936A0.253Access control mechanism controlling access to and logical purging of access register translation lookaside buffer (ALB) in a computer systemGRANT1996-11-121992-01-0226945976GoodAmdahl CorpFujitsu IT Holdings Inc
US7379916B10.250System and method for private secure financial transactionsGRANT2008-05-272000-11-0324837260GoodAuthernative IncAuthernative Inc
US5737760A0.249Microcontroller with security logic circuit which prevents reading of internal memory by external programGRANT1998-04-071995-10-0624153464GoodMotorola IncNXP USA Inc
US4795893A0.247Security device prohibiting the function of an electronic data processing unit after a first cutoff of its electrical powerGRANT1989-01-031986-07-119337392GoodBull CP8 SACP8 Technologies SA
US5479509A0.244Method for signature of an information processing file  and apparatus for implementing itGRANT1995-12-261993-04-069445811GoodBull CP8 SACP8 Technologies SA
US4207609A0.238Method and means for path independent device reservation and reconnection in a multi-CPU and shared device access systemGRANT1980-06-101978-05-0825418457GoodInternational Business Machines CorpInternational Business Machines Corp
US5317705A0.238Apparatus and method for TLB purge reduction in a multi-level machine systemGRANT1994-05-311990-10-2424422613GoodInternational Business Machines CorpInternational Business Machines Corp
US20060047923A10.233Method and system for data lifecycle management in an external storage linkage environmentAPPLICATION2006-03-022004-08-3035944825GoodHitachi LtdHitachi Ltd
US5867577A0.233Method and apparatus for authenticating a data carrier intended to enable a transaction or access to a service or a location  and corresponding carrierGRANT1999-02-021994-03-099460842GoodBull CP8 SACP8 Technologies SA
US4419724A0.232Main bus interface packageGRANT1983-12-061980-04-1422490563GoodSperry CorpSperry Corp
US5295251A0.231Method of accessing multiple virtual address spaces and computer systemGRANT1994-03-151989-09-2117133891GoodHitachi Ltd, Hitachi Computer Engineering Co LtdHitachi Ltd, Hitachi Computer Engineering Co Ltd
US5890189A0.231Memory management and protection system for virtual memory in computer systemGRANT1999-03-301991-11-2927518416GoodToshiba CorpToshiba Corp
US5506975A0.231Virtual machine I/O interrupt control method compares number of pending I/O interrupt conditions for non-running virtual machines with predetermined numberGRANT1996-04-091992-12-1818326463GoodHitachi LtdHitachi Ltd
US5560013A0.229Method of using a target processor to execute programs of a source architecture that uses multiple address spacesGRANT1996-09-241994-12-0623373892GoodInternational Business Machines CorpInternational Business Machines Corp
US8136722B20.229Method guaranteeing payment for electronic commerce in particularly by mobile telephone and a system implementing itGRANT2012-03-202001-07-128865442GoodGemalto SAThales DIS France SA
US7197511B20.223Methods and apparatus for type safe  lazy  user-defined class loadingGRANT2007-03-271998-08-1422463574GoodSun Microsystems IncSun Microsystems Inc
US3996449A0.221Operating system authenticatorGRANT1976-12-071975-08-2524432146GoodInternational Business Machines CorpInternational Business Machines Corp
US4802084A0.217Address translatorGRANT1989-01-311985-03-1112750393GoodHitachi LtdHitachi Ltd
US20020166061A10.217Flash memory protection scheme for secured shared BIOS implementation in personal computers with an embedded controllerAPPLICATION2002-11-072001-05-0725308423GoodNational Semiconductor CorpNuvoton Technology Corp
US6892303B20.217Method and system for caching virus-free file certificatesGRANT2005-05-102000-01-068174204GoodInternational Business Machines CorpAkara Corp, Trend Micro Inc
US5528231A0.216Method for the authentication of a portable object by an offline terminal  and apparatus for implementing the processGRANT1996-06-181993-06-089447874GoodBull CP8 SACP8 Technologies SA
US5555385A0.215Allocation of address spaces within virtual machine compute systemGRANT1996-09-101993-10-2722503918GoodInternational Business Machines CorpInternational Business Machines Corp
US4430709A0.215Apparatus for safeguarding data entered into a microprocessorGRANT1984-02-071980-09-136111858GoodRobert Bosch GmbHRobert Bosch GmbH
US5287363A0.211System for locating and anticipating data storage media failuresGRANT1994-02-151991-07-0124908333GoodDisk Technician CorpDisk Technician Corp
US20060031456A10.210Method and apparatus for transmitting data between devices in a web networking environmentAPPLICATION2006-02-092000-07-3135758753GoodCSTONE IncCSTONE Inc
US5230069A0.210APPARATUS AND METHOD FOR PROVIDING PRIVATE AND SHARED ACCESS TO HOST ADDRESS AND DATA SPACES BY GUEST PROGRAMS IN A VIRTUAL MACHINE COMPUTER SYSTEMGRANT1993-07-201990-10-0224308531GoodInternational Business Machines CorpInternational Business Machines Corp
EP0657820A10.207Method for preventing unauthorised data modification in an apparatus with a non-volatile memoryGRANT1995-06-141993-12-086504502GoodSiemens AGSiemens AG
US5740178A0.197Software for controlling a reliable backup memoryGRANT1998-04-141996-08-2924824197GoodLucent Technologies IncNokia of America Corp
US5852717A0.195Performance optimizations for computer networks utilizing HTTPGRANT1998-12-221996-11-2025026570GoodShiva US Network CorpIntel Corp
US4366537A0.190Authorization mechanism for transfer of program control or data between different address spaces having different storage protect keysGRANT1982-12-281980-05-2322545010GoodInternational Business Machines CorpInternational Business Machines Corp
US5706469A0.186Data processing system controlling bus access to an arbitrary sized memory areaGRANT1998-01-061994-09-1216706715GoodMitsubishi Electric CorpMitsubishi Electric Corp
US5809546A0.184Method for managing I/O buffers in shared storage by structuring buffer table having entries including storage keys for controlling accesses to the buffersGRANT1998-09-151996-05-2324617920GoodInternational Business Machines CorpInternational Business Machines Corp
US20060253711A10.179Biometric safety and security systemAPPLICATION2006-11-092005-05-0937395341Good
US5459869A0.178Method for providing protected mode services for device drivers and other resident softwareGRANT1995-10-171994-02-1722731034GoodIndividualMcAfee LLC
US4907272A0.175Method for authenticating an external authorizing datum by a portable object  such as a memory cardGRANT1990-03-061986-07-119337393GoodBull CP8 SACP8 Technologies SA
US4907270A0.174Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a transmission lineGRANT1990-03-061986-07-119337390GoodBull CP8 SACP8 Technologies SA
US5628022A0.173Microcomputer with programmable ROMGRANT1997-05-061993-06-0415124853GoodHitachi LtdHitachi Ltd
US4759064A0.170Blind unanticipated signature systemsGRANT1988-07-191985-10-0725134183GoodIndividualCufer Asset Ltd LLC
US20010027511A10.1681-chop microcomputer and IC card using sameAPPLICATION2001-10-042000-03-1418589805GoodNippon Telegraph and Telephone Corp, Sharp CorpNippon Telegraph and Telephone Corp, Sharp Corp
US5079737A0.167Memory management unit for the MIL-STD 1750 busGRANT1992-01-071988-10-2522997331GoodUnited Technologies CorpUTMC Microelectronic Systems Inc
US4825052A0.159Method and apparatus for certifying services obtained using a portable carrier such as a memory cardGRANT1989-04-251985-12-319326374GoodBull CP8 SACP8 Technologies SA
US5872994A0.159Flash memory incorporating microcomputer having on-board writing functionGRANT1999-02-161995-11-1017790775GoodNEC CorpAcacia Research Group LLC
US4493031A0.107Memory write protection using timersGRANT1985-01-081982-08-2523628256GoodAT&T Bell Laboratories IncNokia Bell Labs, AT&T Corp
US4247905A0.084Memory clear systemGRANT1981-01-271977-08-2625251089GoodSharp CorpSharp Corp
US3699532ANRMULTIPROGRAMMING CONTROL FOR A DATA HANDLING SYSTEMGRANT1972-10-171970-04-2121863875GoodSinger CoSinger Co
KR20010070826ANRFIREWALL SYSTEM USING IRIS RECOGNITION AND PROCESSING METHOD THEREOFAPPLICATION2001-07-272001-06-1119710642Good
GB2414139BNRIntegrated circuit architecture for mobile radio communications deviceGRANT2006-10-182004-05-1232526929GoodNEC Technologies UK LtdNEC Technologies UK Ltd
GB2386803ANRProtecting a digital certificate stored on a physical token using biometric authenticationGRANT2003-09-242002-03-209933407GoodNEXUS LtdNEXUS Ltd
GB2336005ANRMaintaining security in development toolsGRANT1999-10-061998-03-2810829369GoodMotorola LtdMotorola Solutions UK Ltd
FR2832522A1NRProcessing of a digital signature using secure device linked to a computer  etc.  whereby the signature processing unit is maintained separate to the computer  so that external attacks on it are not possibleGRANT2003-05-232001-11-208869839GoodGemplus Card International SA, Gemplus SAGemplus SA
DE19633919C1NRProgram module updating method for mobile communications apptsGRANT1997-06-051996-08-227803380GoodSiemens AGSiemens AG
CN100358280CNRA network security appliance and realizing method thereofGRANT2007-12-262003-06-1833546184Good
US8261975B20.488Automated banking machine that operates responsive to data bearing recordsGRANT2012-09-112001-03-0742164289FairDiebold IncDiebold Nixdorf Inc
US5864853A0.485Portable file system operable under various computer environmentsGRANT1999-01-261994-09-1416738923FairToshiba CorpToshiba Corp
US6378071B10.423File access system for efficiently accessing a file having encrypted data within a storage deviceGRANT2002-04-231997-02-2812755299FairFujitsu LtdFujitsu Ltd
US20050062603A10.312Secure  networked and wireless access  storage and retrival system and method utilizing tags and modular nodesAPPLICATION2005-03-242003-08-0634316348FairGDH IncGDH Inc
US7072937B20.310Web-based common use terminal with multiple application serversGRANT2006-07-042001-03-2126796661FairNorthrop Grumman CorpNorthrop Grumman Systems Corp
US20070178946A10.301Event sequencer used for controlling the sequence and timing of events in software defined radioAPPLICATION2007-08-022006-01-3038322771FairHarris CorpHarris Global Communications Inc
US4307447A0.295Programmable controllerGRANT1981-12-221979-06-1921962309FairGould IncSchneider Electric USA Inc
US5469557A0.254Code protection in microcontroller with EEPROM fusesGRANT1995-11-211993-03-0521834884FairMicrochip Technology IncMicrochip Technology Inc
US6895104B20.151Image identification systemGRANT2005-05-172001-02-1625537362FairSAC Tech IncSAC TECHNOLOGIES Inc, SAC Tech Inc
US5566323A0.140Data processing system including programming voltage inhibitor for an electrically erasable reprogrammable nonvolatile memoryGRANT1996-10-151988-12-209373144FairBull CP8 SACP8 Technologies SA
US7330275B20.088Method and system for determining the position and alignment of a surface of an object in relation to a laser beamGRANT2008-02-122002-10-1132068758FairAMO Development LLCAMO Development LLC
US20060150740A10.066Resonating transducerAPPLICATION2006-07-132005-01-0736651890FairKulite Semiconductor Products IncKulite Semiconductor Products Inc
US5582717A0.065Water dispenser with side by side filling-stationsGRANT1996-12-101990-09-1224323587FairPure Fill CorpPure Fill Corp
US6072202A0.058II-VI compound semiconductor device with III-V buffer layerGRANT2000-06-061996-09-2617267594FairNEC CorpNEC Corp
US5796845A0.052Sound field and sound image control apparatus and methodGRANT1998-08-181994-05-2322934285FairMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US5721222A0.025Heterocyclic ketonesGRANT1998-02-241992-04-1626300737FairZeneca LtdAstraZeneca UK Ltd, Syngenta Ltd
US5720609A0.022Catalytic methodGRANT1998-02-241991-01-0946247691Fair
US4319233A0.022Device for electrically detecting a liquid levelGRANT1982-03-091978-11-3015426017FairKokusan Denki Co LtdKokusan Denki Co Ltd

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
877
Recommended Classes
220
Government Assigned Classes
5
CPC
Title
Score
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)2.386
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine2.317
G06F12/1491in a hierarchical protection system  e.g. privilege levels  memory rings1.604
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.584
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database1.557
G06F21/35communicating wirelessly1.237
G06F21/71to assure secure computing or processing of information1.237
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules1.143
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks1.131
G06F21/602Providing cryptographic facilities or services1.131
G06F21/85interconnection devices  e.g. bus-connected or in-line devices1.092
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode1.078
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints1.062
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities1.057
G06F21/445by mutual authentication  e.g. between devices or programs1.057
H04L63/1433Vulnerability analysis1.054
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.054
H04W12/02Protecting privacy or anonymity1.048
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)1.047
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)1.042
H04L9/0819Key transport or distribution  i.e. key establishment techniques where one party creates or otherwise obtains a secret value  and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062)1.037
G06F21/606by securing the transmission between two devices or processes1.031
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.022
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems1.022
H04L51/00Arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages1.022
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)1.008
H04L63/0263Rule management1.003
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics1.000
H04W12/08Access security1.000
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols1.000
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)0.997
H04W12/04Key management0.997
G06F21/44Program or device authentication0.996
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.994
H04L63/0272Virtual private networks0.991
H04L9/008involving homomorphic encryption0.985
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.985
G06F21/575Secure boot0.979
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB0.975
G06F21/83input devices  e.g. keyboards  mice or controllers thereof0.971
G06F21/121Restricting unauthorised execution of programs0.969
G06F21/12Protecting executable software0.969
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)0.969
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)0.968
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities0.968
H04N21/426Characteristics of or|  Internal components of the client | (ref: H04N5/44)|  takes precedence0.966
G06F21/72in cryptographic circuits0.965
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.964
H04W12/06Authentication0.960
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability0.957
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner0.956
G06F21/60Protecting data0.956
G06F21/84output devices  e.g. displays or monitors0.956
H04W4/16Communication-related supplementary services  e.g. call-transfer or call-hold0.952
H04L63/105Multiple levels of security0.947
G06F21/629to features or functions of an application0.947
G06F3/165Management of the audio stream  e.g. setting of volume  audio stream path0.946
H04L63/126the source of the received data0.946
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.942
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.942
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]0.941
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.940
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.939
G06Q20/382insuring higher security of transaction0.937
G06F21/42using separate channels for security data0.937
G06F21/33using certificates0.937
H04L67/04adapted for terminals or networks with limited resources or for terminal portability  e.g. wireless application protocol [WAP] | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)0.935
H04W12/12Fraud detection0.934
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.934
G06F9/4401Bootstrapping | security arrangements therefor | (ref: G06F21/57)0.934
H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card | arrangements for secret or secure communication | (ref: H04L9/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)|  | | security arrangements in wireless networks | (ref: H04W12/00)0.934
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material0.934
A61B5/0022Monitoring a patient using a global network  e.g. telephone networks  internet0.934
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)0.933
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms0.930
H04L63/0485Networking architectures for enhanced packet encryption processing  e.g. offloading of IPsec packet processing or efficient security association look-up0.929
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)0.928
H04W88/02Terminal devices0.928
G06Q20/3227Use of a security embedded in M-devices0.927
H04L9/0822using key encryption key0.926
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)0.924
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)0.924
H04L63/0815providing single-sign-on or federations0.923
G06F21/41where a single sign-on provides access to a plurality of computers0.923
H04B5/0062in RFID [Radio Frequency Identification] Systems0.922
H04W12/10Integrity0.922
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)0.921
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards0.919
G06F21/335for accessing specific resources  e.g. using Kerberos tickets0.919
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer0.918
G06F9/545where tasks reside in different layers  e.g. user- and kernel-space0.918
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.917
G06F7/588Random number generators  i.e. based on natural stochastic processes0.917
H04L9/3247involving digital signatures0.917
H04L63/162at the data link layer0.916
H04W88/06adapted for operation in multiple networks | or having at least two operational modes|   e.g. multi-mode terminals0.915
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks0.915
G06F11/1471involving logging of persistent data for recovery0.914
G06F11/1458Management of the backup or restore process0.914
G06F13/4068Electrical coupling0.914
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity0.914
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)0.912
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself0.912
G06F21/79in semiconductor storage media  e.g. directly-addressable memories0.911
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries0.910
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)0.910
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.910
G06Q20/4012Verifying personal identification number [PIN]0.909
H04K1/00Secret communication0.909
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals0.908
G06F15/173using an interconnection network  e.g. matrix  shuffle  pyramid  star  snowflake0.906
G06Q20/3278RFID or NFC payments by means of M-devices0.906
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates0.906
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords0.906
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)0.905
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes0.905
G06F11/1076Parity data used in redundant arrays of independent storages  e.g. in RAID systems0.904
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint0.904
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC0.904
G06F21/73by creating or determining hardware identification  e.g. serial numbers0.904
G06F9/441Multiboot arrangements  i.e. selecting an operating system to be loaded0.904
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)0.903
G06F15/00Digital computers in general | details | (ref: G06F1/00)|  – | (ref: G06F13/00)| Data processing equipment in general0.903
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)0.901
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.899
G06F21/556involving covert channels  i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755)0.899
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)0.896
G10L13/00Speech synthesis| Text to speech systems0.896
H04B1/3816Mechanical arrangements for accommodating identification devices  e.g. cards or chips| with connectors for programming identification devices0.894
H04L65/40Services or applications | network service management for ensuring proper service fulfilment | (ref: H04L41/50)| | information services comprising voice | (ref: H04M3/487)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | contact center services | (ref: H04M3/51)0.894
H04L9/3236using cryptographic hash functions0.894
G06F21/6281at program execution time  where the protection is within the operating system0.893
G07F7/0866by active credit-cards adapted therefor | (ref: G07F7/1008)|  takes precedence0.892
H04M1/6066including a wireless connection0.892
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)0.891
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)0.891
G06F21/577Assessing vulnerabilities and evaluating computer system security0.891
G06F9/3824Operand accessing0.891
G06Q30/0238at point-of-sale [POS]0.891
H04L9/0827involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.890
G06Q20/3674involving authentication0.890
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)0.889
G06F9/30178of compressed or encrypted instructions0.889
G06F21/552involving long-term monitoring or reporting0.889
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour0.889
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding0.888
H04M1/66with means for preventing unauthorised or fraudulent calling | verifying user identity or authority in secret or secure digital communications | (ref: H04L9/32)0.888
G06F21/45Structures or tools for the administration of authentication0.887
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]0.886
G06F21/6245Protecting personal data  e.g. for financial or medical purposes0.885
G06F21/125by manipulating the program code  e.g. source code  compiled code  interpreted code  machine code0.885
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.884
H04L63/123received data contents  e.g. message integrity0.884
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage0.884
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it0.884
G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer  e.g. network details  transfer of information from host to ECR or from ECR to ECR0.883
G06Q20/405Establishing or using transaction specific rules0.883
H04L9/085Secret sharing or secret splitting  e.g. threshold schemes0.880
G06Q10/00Administration| Management0.879
G06F1/1626with a single-body enclosure integrating a flat display  e.g. Personal Digital Assistants [PDAs]0.878
G07C9/00563using personal physical data of the operator  e.g. finger prints  retinal images  voicepatterns0.878
H04M1/2535adapted for voice communication over an Internet Protocol [IP]  network | Voice over Internet Protocol (VoIP) network equipment and services | (ref: H04M7/006)| | internet protocols | (ref: H04L29/06095)0.878
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.878
G06Q30/00Commerce  e.g. shopping or e-commerce0.878
G06F21/305by remotely controlling device operation0.877
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)0.877
H04L9/0847involving identity based encryption [IBE] schemes0.876
G06F21/31User authentication0.876
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level0.874
H04L9/321involving a third party or a trusted authority0.874
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)0.873
H04N7/147Communication arrangements  e.g. identifying the communication as a video-communication  intermediate storage of the signals | selecting | (ref: H04Q)0.873
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)0.872
G06F21/554involving event detection and direct action0.872
G06Q30/06Buying  selling or leasing transactions0.872
G06F9/45533Hypervisors| Virtual machine monitors0.872
G11B20/0021involving encryption or decryption of contents recorded on or reproduced from a record carrier0.871
G06F21/46by designing passwords or checking the strength of passwords0.870
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)0.869
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system0.869
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]0.869
G10H7/002using a common processing for different operations or calculations  and a set of microinstructions (programme) to control the sequence thereof0.868
H04M1/68Circuit arrangements for preventing eavesdropping0.866
H04L63/30for supporting lawful interception  monitoring or retaining of communications or communication related information | circuit switched telephony call monitoring | (ref: H04M3/2281)0.866
G06F1/30Means for acting in the event of power-supply failure or interruption  e.g. power-supply fluctuations | for resetting only | (ref: G06F1/24)0.866
H04L9/3271using challenge-response0.865
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]0.865
H04L63/101Access control lists [ACL]0.863
G06F21/645using a third party0.863
H04L63/16Implementing security features at a particular protocol layer0.863
G06F21/77in smart cards0.862
H04L63/104Grouping of entities0.862
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy0.861
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)0.860
G06F9/4555Para-virtualisation  i.e. guest operating system has to be modified0.859
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key0.858
H04R1/10Earpieces| Attachments therefor | | Earphones| Monophonic headphones | (ref: H04R1/28)|  takes precedence| stereophonic headphones | (ref: H04R5/033)0.858
H04B5/0006using a receiver structurally associated with a loudspeaker or an earphone0.856
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones0.856
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)0.856
G06F21/604Tools and structures for managing or administering access control systems0.855
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)0.854
H04W4/10Push-to-Talk [PTT] or Push-On-Call services0.854
H04L67/303Terminal profiles0.853
G06F15/167using a common memory  e.g. mailbox0.852
H04L63/02for separating internal from external traffic  e.g. firewalls0.852
G06F9/45558Hypervisor-specific management and integration aspects0.851
H04W52/0274by switching on or off the equipment or parts thereof0.850
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)0.850
G06F9/544Buffers| Shared memory| Pipes0.849
G06F1/1656Details related to functional adaptations of the enclosure  e.g. to provide protection against EMI  shock  water  or to host detachable peripherals like a mouse or removable expansions units like PCMCIA cards  or to provide access to internal components for maintenance or to removable storage supports like CDs or DVDs  or to mechanically mount accessories | mounting of accessories to a computer display | (ref: G06F1/1607)| | display hoods | (ref: G06F1/1603)| | cooling arrangements for portable computers | (ref: G06F1/203)0.849
H04L63/1425Traffic logging  e.g. anomaly detection0.848
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)0.848
H04N21/83Generation or processing of protective or descriptive data associated with content| Content structuring0.848
G09C1/00Apparatus or methods whereby a given sequence of signs  e.g. an intelligible text  is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00)0.848
G06Q20/04Payment circuits0.848
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)0.847
H04L29/06characterised by a protocol0.847
H04R5/04Circuit arrangements  | e.g. for selective connection of amplifier inputs/outputs to loudspeakers  for loudspeaker detection  or for adaptation of settings to personal preferences or hearing impairments | combinations of amplifiers | (ref: H03F3/68)| | stereophonic systems | (ref: H04S)0.846
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD0.845
G06F9/44526Plug-ins| Add-ons0.845
H04W8/245from a network towards a terminal0.845
G06F8/54Link editing before load time0.845
H04M1/05adapted for use on head  throat  or breast | handsfree use of portable phones | (ref: H04M1/6041)0.845
H04R1/1091Details not provided for in groups | (ref: H04R1/1008)|  - | (ref: H04R1/1083)0.845
G06F15/177Initialisation or configuration control | processor initialisation | (ref: G06F9/4405)0.845
G06F13/102where the programme performs an interfacing function  e.g. device driver | (ref: G06F13/105)|  takes precedence| scheduling within device drivers | (ref: G06F9/52)| | contention policies within device drivers | (ref: G06F9/4881)0.844
G06F21/123by using dedicated hardware  e.g. dongles  smart cards  cryptographic processors  global positioning systems [GPS] devices0.844
G06Q30/0277Online advertisement0.844
G06Q30/0241Advertisement0.844
H04M1/673the user being required to key in a code0.843
G06F11/3013where the computing system is an embedded system  i.e. a combination of hardware and software dedicated to perform a certain function in mobile devices  printers  automotive or aircraft systems | testing or monitoring of control systems or parts thereof | (ref: G05B23/02)0.842
G07C5/0808Diagnosing performance data | testing of vehicles | (ref: G01M17/00)| | testing of electrical installation on vehicles | (ref: G01R31/005)0.842
G06F21/81by operating on the power supply  e.g. enabling or disabling power-on  sleep or resume operations0.841
H04N21/42623involving specific decryption arrangements0.841
H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence | pseudo-random number generators in general | (ref: G06F7/58)0.841
G06F13/12using hardware independent of the central processor  e.g. channel or peripheral processor0.841
G06F17/00Digital computing or data processing equipment or methods  specially adapted for specific functions0.841
G06F1/3203Power Management  i.e. event-based initiation of power-saving mode0.841
G06F3/0486Drag-and-drop0.840
G06F21/36by graphic or iconic representation0.840
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)0.840
G06F12/08in hierarchically structured memory systems  e.g. virtual memory systems0.840
G06F3/0658Controller construction arrangements0.840
G06F9/4406Loading of operating system0.839
G06Q20/4014Identity check for transaction0.838
G06Q20/027involving a payment switch or gateway0.838
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]0.837
H04N7/163by receiver means only0.837
G10L19/008Multichannel audio signal coding or decoding  i.e. using interchannel correlation to reduce redundancies  e.g. joint-stereo  intensity-coding  matrixing | arrangements for reproducing spatial sound | (ref: H04R5/00)| | stereophonic systems  e.g. spatial sound capture or matrixing of audio signals in the decoded state | (ref: H04S)0.837
G06F3/162Interface to dedicated audio devices  e.g. audio drivers  interface to CODECs0.837
H04L12/5692Selection among different networks0.836
H04N21/443OS processes  e.g. booting an STB  implementing a Java virtual machine in an STB  power management in an STB | arrangements for program loading or initiating | (ref: G06F9/445)|  | | boot device selection| loading of operating system | (ref: G06F9/4406)| | program loading or initiating in general using non-volatile memory from which the program can be directly executed | (ref: G06F9/44568)0.836
G06F12/145the protection being virtual  e.g. for virtual blocks or segments before a translation mechanism0.835
G06F13/4282on a serial bus  e.g. I2C bus  SPI bus | on daisy chain buses | (ref: G06F13/4247)0.835
G06F12/1483using an access-table  e.g. matrix or list0.835
G06F8/40Transformation of program code0.835
G06T1/60Memory management0.834
G06F3/147using display panels0.834
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)0.834
G06F21/43wireless channels0.834
G01S5/0027of actual mobile position  i.e. position determined on mobile0.833
G06F8/00Arrangements for software engineering | testing or debugging | (ref: G06F11/36)| | administrative  planning or organisation aspects of software project management | (ref: G06Q10/06)0.833
G06F21/562Static detection0.832
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)0.832
H04L1/08by repeating transmission  e.g. Verdan system | (ref: H04L1/1858)|  and | (ref: H04L1/189)|  take precedence0.832
H04L9/0841involving Diffie-Hellman or related key agreement protocols0.832
H04L9/3066involving algebraic varieties  e.g. elliptic or hyper-elliptic curves0.832
H04N21/4126portable device  e.g. remote control with a display  PDA  mobile phone | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)0.832
H04L51/063with adaptation of content0.832
G10L99/00Subject matter not provided for in other groups of this subclass0.831
G10L15/26Speech to text systems | (ref: G10L15/08)|  takes precedence0.831
H04M3/42221Conversation recording systems | at the subscriber's set | (ref: H04M1/656)0.831
H04L63/1416Event detection  e.g. attack signature detection0.831
G06F11/1456Hardware arrangements for backup0.831
G09C5/00Ciphering apparatus or methods not provided for in the preceding groups  e.g. involving the concealment or deformation of graphic data such as designs  written or printed messages0.831
H04W88/08Access point devices0.831
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)0.830
H04L51/066with adaptation of format0.830
G06F21/76in application-specific integrated circuits [ASICs] or field-programmable devices  e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs]0.830
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow0.830
H04M7/0078Security| Fraud detection| Fraud prevention0.829
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)0.829
G06F13/24using interrupt | (ref: G06F13/32)|  takes precedence0.828
G06F12/0875with dedicated cache  e.g. instruction or stack0.828
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files0.828
G06Q20/401Transaction verification0.828
G06Q20/3829involving key management0.827
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model0.827
G06T1/20Processor architectures| Processor configuration  e.g. pipelining0.826
H04R3/12for distributing signals to two or more loudspeakers | specially adapted for hearing aids | (ref: H04R25/407)0.826
H04W4/50Service provisioning or reconfiguring0.826
G06F9/24Loading of the microprogram0.826
H04B1/40Circuits0.826
H04W24/00Supervisory  monitoring or testing arrangements0.825
G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups  e.g. automatic card files incorporating conveying and reading operations0.825
G06F21/82Protecting input  output or interconnection devices0.825
H04L9/0852Quantum cryptography | transmission systems employing electromagnetic waves other than radio waves  e.g. light  infra-red | (ref: H04B10/00)| | wavelength-division multiplex systems | (ref: H04J14/02)0.824
H04W8/205Transfer to or from user equipment or user record carrier0.824
H04L9/0833involving conference or group key | network architectures or network communication protocols for key management in group communication in a packet data network | (ref: H04L63/065)0.824
H04N21/4622Retrieving content or additional data from different sources  e.g. from a broadcast channel and the Internet | web site content organization and management for information retrieval from the Internet | (ref: G06F17/3089)| | transmission by internet of broadcast information | (ref: H04H60/82)| | stock exchange data over packet-switching network | (ref: H04L12/1804)| | push services including data channel over packet-switching network | (ref: H04L12/1859)0.824
H04L63/302gathering intelligence information for situation awareness or reconnaissance0.823
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)0.822
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys0.822
G06F12/14Protection against unauthorised use of memory | or access to memory0.822
H04L63/0281Proxies0.424
G06F21/86Secure or tamper-resistant housings0.403
G06F9/54Interprogram communication0.396
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)0.393
G06F21/54by adding security routines or objects to programs0.387
G07F7/0826Embedded security module0.387
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.383
G06F13/28using burst mode transfer  e.g. direct memory access | DMA|   cycle steal | (ref: G06F13/32)|  takes precedence0.378
G06F21/567using dedicated hardware0.375
H04L63/164at the network layer0.375
H04W84/12WLAN [Wireless Local Area Networks]0.375
H04W76/10Connection setup0.375
H04L63/166at the transport layer0.375
H04L9/16the keys or algorithms being changed during operation0.374
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.374
H04L9/302involving the integer factorization problem  e.g. RSA or quadratic sieve [QS] schemes0.367
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation0.363
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences0.363
G06Q20/327Short range or proximity payments by means of M-devices0.363
H04N21/42692for reading from or writing on a volatile storage medium  e.g. Random Access Memory [RAM]0.362
G06Q20/3224Transactions dependent on location of M-devices0.360
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.360
G06Q20/40145Biometric identity checks0.360
H04L51/18Messages including commands or codes to be executed either at an intermediate node or at the recipient to perform message-related actions | computer aided management of electronic mail | (ref: G06Q10/10)| | networked applications for remote control or remote monitoring of the application | (ref: H04L67/025)| | networked applications involving the movement of software or configuration parameters | (ref: H04L67/34)0.359
H04N21/4181for conditional access0.359
H04M1/6091including a wireless interface0.357
H04L63/0218Distributed architectures  e.g. distributed firewalls0.356
H04L63/102Entity profiles0.356
G06F12/0808with cache invalidating means | (ref: G06F12/0815)|  takes precedence0.356
G06F12/1027using associative or pseudo-associative address translation means  e.g. translation look-aside buffer [TLB]0.356
H04L65/1069Setup | computer conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources or notifying involved parties | (ref: H04L12/1818)| | admission control or resource reservation in packet switching networks | (ref: H04L47/70)| | arrangements for peer-to-peer networking in network applications | (ref: H04L67/104)| | session management in network applications | (ref: H04L67/14)| | negotiation of communication capabilities | (ref: H04L69/24)0.355
H04B7/18506Communications with or from aircraft  i.e. aeronautical mobile service0.353
H04L9/0869involving random numbers or seeds0.353
H04L9/0618Block ciphers  i.e. encrypting groups of characters of a plain text message using fixed encryption transformation0.353
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity0.352
G06Q20/4016involving fraud or risk level assessment in transaction processing0.351
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance0.351
H04N21/4627Rights management | associated to the content | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)0.351
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)0.351
H04N21/4408involving video stream encryption  e.g. re-encrypting a decrypted video stream for redistribution in a home network | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.350
H04N21/43635HDMI0.350
H04N21/63345by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | arrangements for network security key management | (ref: H04L29/06707)0.350
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)0.350
G16H40/67for remote operation0.350
G06Q20/12specially adapted for electronic shopping systems0.350
G06Q20/38215Use of certificates or encrypted proofs of transaction rights0.350
G06Q20/00Payment architectures  schemes or protocols | apparatus for performing or posting payment transactions | (ref: G07F7/08)|   | (ref: G07F19/00)| | electronic cash registers | (ref: G07G1/12)0.350
G06Q20/385Use of an alias or a single-use code0.350
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals0.350
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)0.350
G06F12/1466Key-lock mechanism0.350
H04W92/08between user and terminal device0.350
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL0.348
G06F3/04886by partitioning the screen or tablet into independently controllable areas  e.g. virtual keyboards  menus | (ref: G06F3/04883)|  takes precedence0.348
G06F3/04883for entering handwritten data  e.g. gestures  text0.348
G06Q20/3821Electronic credentials0.348
G06Q20/3825Use of electronic signatures0.348
G06Q20/3823combining multiple encryption tools for a transaction0.348
H04N21/47815Electronic shopping | payment schemes  payment architectures or payment protocols for electronic shopping systems | (ref: G06Q20/12)0.348
H04M1/67by electronic means0.347
G06Q20/0655e-cash managed centrally0.347
G06Q20/3827Use of message hashing0.347
G06K9/6201Matching| Proximity measures0.347
H04N21/25875involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.347
H04N21/4415using biometric characteristics of the user  e.g. by voice recognition or fingerprint scanning | methods or arrangements for recognising patterns | (ref: G06K9/00)| | restricting access to computer systems by authenticating users using biometric data | (ref: G06F21/32)| | authentication mechanisms using biometrical features for network security | (ref: H04L29/06809)| | authentication in wireless network security | (ref: H04W12/06)0.347
H04L9/06the encryption apparatus using shift registers or memories for block-wise | or stream|  coding  e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators0.347
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme0.346
H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation | means for verifying the identity or the authority of a user of a secure or secret communication system | (ref: H04L9/32)0.346
H04W52/18TPC being performed according to specific parameters0.345
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)0.344
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)0.344
H04L9/3073involving pairings  e.g. identity based encryption [IBE]  bilinear mappings or bilinear pairings  e.g. Weil or Tate pairing0.344
H04L9/0662with particular pseudorandom sequence generator0.344
G06F21/6236between heterogeneous systems0.344
G06F9/5072Grid computing0.344
H04L9/0625with splitting of the data block into left and right halves  e.g. Feistel based algorithms  DES  FEAL  IDEA or KASUMI0.343
G06F9/3834Maintaining memory consistency | cache consistency protocols | (ref: G06F12/0815)0.343
G06F9/3863using multiple copies of the architectural state  e.g. shadow registers0.343
G06F11/1453using de-duplication of the data0.343
G06F11/1469Backup restoration techniques0.343
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)0.343
H04L9/065Encryption by serially and continuously modifying data stream elements  e.g. stream cipher systems  RC4  SEAL or A5/30.343
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.343
G06F1/00Details not covered by groups | (ref: G06F3/00)|  – | (ref: G06F13/00)|  and | (ref: G06F21/00)|  | architectures of general purpose stored program computers | (ref: G06F15/76)0.343
G06F21/70Protecting specific internal or peripheral components  in which the protection of a component leads to protection of the entire computer0.342
G06F21/80in storage media based on magnetic or optical technology  e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00)0.342
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC0.341
G06Q20/3226Use of secure elements separate from M-devices0.341
G06Q20/322Aspects of commerce using mobile devices [M-devices]0.341
G07F7/1041PIN input keyboard gets new key allocation at each use0.341
G07F7/1091Use of an encrypted form of the PIN0.341
G06Q20/353Payments by additional cards plugged into M-devices0.341
G07F19/211Software architecture within ATMs or in relation to the ATM network0.341
G06F13/4221being an input/output bus  e.g. ISA bus  EISA bus  PCI bus  SCSI bus0.341
H04N21/44055by partially decrypting  e.g. decrypting a video stream that has been partially encrypted0.340
G06F3/14Digital output to display device| | Cooperation and interconnection of the display device with other functional units| control of display in general | (ref: G09G)| | arrangements for producing a permanent visual presentation of the output data | (ref: G06K15/00)0.340
H04W4/02Services making use of location information0.340
G02B27/017Head mounted0.340
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds0.340
G07F9/023for display  data presentation or advertising arrangements in payment activated and coin-freed apparatus0.340
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)0.339
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]0.339
G10L15/22Procedures used during a speech recognition process  e.g. man-machine dialogue0.338
G10L15/30Distributed recognition  e.g. in client-server systems  for mobile phones or network applications0.338
H04L63/0478applying multiple layers of encryption  e.g. nested tunnels or encrypting the content with a first key and then with at least a second key | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.338
G07F7/1016Devices or methods for securing the PIN and other transaction-data  e.g. by encryption | arrangements for secret communication  | see|  | (ref: H04L9/00)0.337
G06F21/6272by registering files or documents with a third party0.337
G02B27/0176characterised by mechanical features0.337
H04L45/24Multipath0.336
H04L45/306Route determination based on the nature of the carried application | communications protocols whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status | (ref: H04L67/327)0.336
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)0.335
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.335
H04W8/18Processing of user or subscriber data  e.g. subscribed services  user preferences or user profiles| Transfer of user or subscriber data0.335
G07F7/10together with a coded signal |   e.g. in the form of personal identification information  like personal identification number [PIN] or biometric data0.335
G06Q20/363with the personal data files for a user0.335
H04B5/0031for data transfer0.334
G06F9/223Execution means for microinstructions irrespective of the microinstruction function  e.g. decoding of microinstructions and nanoinstructions| timing of microinstructions| programmable logic arrays| delays and fan-out problems0.333
G06Q20/352Contactless payments by cards0.332
G06Q20/02involving a neutral party  e.g. certification authority  notary or trusted third party [TTP]0.332
G06Q20/105involving programming of a portable memory device  e.g. IC cards  "electronic purses"0.332
G06Q20/367involving intelligent token  e.g. electronic purse0.332
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists0.332
G06F11/3037where the computing system component is a memory  e.g. virtual memory  cache | accessing  addressing or allocating within memory systems or architectures | (ref: G06F12/00)| | checking stores for correct operation | (ref: G11C29/00)0.331
G06F12/1441for a range0.331
G06F12/1063the data cache being concurrently virtually addressed0.331
G06F12/0804with main memory updating | (ref: G06F12/0806)|  takes precedence0.331
G06F12/0871Allocation or management of cache space0.331
G06F12/0891using clearing  invalidating or resetting means0.331
G06F11/0772Means for error signaling  e.g. using interrupts  exception flags  dedicated error registers0.331
G06F12/0882Page mode0.331
G06F12/1036for multiple virtual address spaces  e.g. segmentation | (ref: G06F12/1045)|  takes precedence0.331
G06F21/55Detecting local intrusion or implementing counter-measures0.331
G06F21/40by quorum  i.e. whereby two or more security principals are required0.331
G06K9/00892Use of multiple biometrics | sensor fusion | (ref: G06K9/6289)0.331
G06K9/00557by plotting the signal segments against each other  e.g. analysing scattergrams0.331
G06Q20/20Point-of-sale [POS] network systems | POS | per se|  | (ref: G07F)|  or | (ref: G07G)0.331
G06F9/48Program initiating| Program switching  e.g. by interrupt0.331
H04B1/38Transceivers  i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving0.330
H04B1/3888Arrangements for carrying or protecting transceivers0.330
H04L63/0245Filtering by information in the payload0.330
H04L9/0836using tree structure or hierarchical structure0.330
H04L63/168above the transport layer0.330
G06F21/88Detecting or preventing theft or loss0.329
G06F1/1632External expansion units  e.g. docking stations0.329
G06F1/1684Constructional details or arrangements related to integrated I/O peripherals not covered by groups | (ref: G06F1/1635)|  - | (ref: G06F1/1675)0.329
H04M1/04Supports for telephone transmitters or receivers | for transducers in general | (ref: H04R1/00)0.329
G07C9/00571operated by interacting with a central unit0.329
H04W36/16Performing reselection for specific purposes0.329
G06Q20/085involving remote charge determination or related payment systems0.329
G06F12/1416by checking the object accessibility  e.g. type of access defined by the memory independently of subject rights | (ref: G06F12/1458)|  takes precedence0.329
H04L9/007involving hierarchical structures0.329
H04W4/029Location-based management or tracking services0.328
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]0.328
G06F11/1451by selection of backup contents0.328
G06F11/1402Saving  restoring  recovering or retrying0.328
H04L9/3218using proof of knowledge  e.g. Fiat-Shamir  GQ  Schnorr  ornon-interactive zero-knowledge proofs0.328
G06Q20/3576Multiple memory zones on card0.328
G06Q20/40975Use of encryption for mutual authentication0.328
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip0.328
H04L12/2854Wide area networks  e.g. public data networks0.327
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements0.327
G11B20/00086Circuits for prevention of unauthorised reproduction or copying  e.g. piracy | indicating unauthorised use of record carriers in general | (ref: G11B23/28)| | scrambling for television signal recording | (ref: H04N5/913)| | network architectures or network protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)0.327
G06F12/1433for a module or a part of a module0.326
H04K3/80Jamming or countermeasure characterized by its function0.326
H04M3/2281Call monitoring  e.g. for law enforcement purposes| Call tracing| Detection or prevention of malicious calls0.326
H04L63/306intercepting packet switched data communications  e.g. Web  Internet or IMS communications0.326
G10H7/004with one or more auxiliary processor in addition to the main processing unit0.326
H04W80/02Data link layer protocols0.325
H04W88/16Gateway arrangements0.325
G06F13/10Program control for peripheral devices | (ref: G06F13/14)|  - | (ref: G06F13/42)|  take precedence0.325
G06F12/1009using page tables  e.g. page table structures0.325
H04L9/003for power analysis  e.g. differential power analysis [DPA] or simple power analysis [SPA]0.325
H04M1/82Line monitoring circuits for call progress or status discrimination | for detecting caller identity | (ref: H04M1/573)0.325
H04L43/12using dedicated network monitoring probes0.325
H02J7/0013for charging several batteries simultaneously or sequentially | (ref: H02J7/1423)|  takes precedence0.325
H04W52/0261managing power supply demand  e.g. depending on battery level0.325
G06F21/725operating on a secure reference time value0.324
G06F8/61Installation0.324
H04N21/435Processing of additional data  e.g. decrypting of additional data  reconstructing software from modules extracted from the transport stream0.323
H04N21/25816involving client authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.323
H04N21/41407embedded in a portable device  e.g. video client on a mobile phone  PDA  laptop | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)| | arrangements specially adapted for mobile receivers in broadcast systems | (ref: H04H20/57)0.323
H04N21/418External card to be used in combination with the client device  e.g. for conditional access0.323
H04N21/8193dedicated tools  e.g. video decoder software or IPMP tool0.323
H04N21/4405involving video stream decryption | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.323
H04N21/436Interfacing a local distribution network  e.g. communicating with another STB  inside the home | | Interfacing an external card to be used in combination with the client device| arrangements specially adapted plural spots in a confined site in broadcast systems | (ref: H04H20/63)0.323
H04N21/4147Personal Video Recorder [PVR] | (ref: H04N5/76)|  takes precedence | | arrangements for broadcast specially adapted for accumulation-type receivers | (ref: H04H20/40)0.323
H04N21/835Generation of protective data  e.g. certificates | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)0.323
H04N21/2541Rights Management | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)0.323
G06Q20/3229Use of the SIM of a M-device as secure element0.323
H04L65/00Network arrangements or protocols for real-time communications | computer conference | (ref: H04L12/1813)| | real time or near real time messaging in message switching systems  e.g. instant messaging | (ref: H04L51/04)| | network applications in general | (ref: H04L67/00)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | interconnection arrangements between switching centres for working between exchanges having different types of switching equipment where the types of switching equipment comprise PSTN/ISDN equipment and equipment of networks other than PSTN/I0.323
H04L63/108when the policy decisions are valid for a limited amount of time0.323
G06Q50/01Social networking0.323
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines0.322
G06F9/22Microcontrol or microprogram arrangements0.322
G06F11/1464for networked environments0.322
H04L63/0838using one-time-passwords0.322
H04R5/033Headphones for stereophonic communication | details thereof  e.g. relating to batteries  cables or control elements | (ref: H04R1/10)0.322
H04R1/1041Mechanical or electronic switches  or control elements | switches in general | (ref: H01H)0.322
G06Q20/42Confirmation  e.g. check or permission by the legal debtor of payment0.321
H04M1/0258for a headset device | constructional features of headsets | (ref: H04M1/05)| | headsets for handsfree use | (ref: H04M1/6058)0.321
H04L45/38Flow based routing0.321
H04L63/0254Stateful filtering0.321
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.321
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)0.321
H04B1/385Transceivers carried on the body  e.g. in helmets0.320
H04B1/3827Portable transceivers0.320
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords0.320
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)0.320
H04M1/656for recording conversations0.320
H04L65/4061"Push-to-X" services | push-to-talk services in wireless networks | (ref: H04W4/10)| | connection management  e.g. connection set-up  manipulation or release for push-to-talk or push-on-call services in wireless communication networks | (ref: H04W76/45)0.320
H04W76/45for Push-to-Talk [PTT] or Push-to-Talk over cellular [PoC] services0.320
H04W4/14Short messaging services  e.g. short message services [SMS] or unstructured supplementary service data [USSD]0.320
G06F9/5016the resource being the memory0.319
H04M1/0289Telephone sets for operators0.319
H04N21/64715Protecting content from unauthorized alteration within the network | verifying the information received for network security in communication control or processing | (ref: H04L29/06857)| | integrity in wireless network security | (ref: H04W12/10)0.319
H04W52/0229where the received signal is a wanted signal0.319
H04B15/02Reducing interference from electric apparatus by means located at or near the interfering apparatus | structural association with dynamo-electric machines | (ref: H02K11/00)0.319
G05B19/409characterised by using manual input [MDI] or by using control panel  e.g. controlling functions with the panel| characterised by control panel details  by setting parameters | (ref: G05B19/408)|   | (ref: G05B19/4093)|  take precedence0.319
G06F9/4484Executing subprograms0.319
G06Q20/35765Access rights to memory zones0.318
G06Q20/3223Realising banking transactions through M-devices0.318
G06Q20/325using wireless networks0.318
H05K3/321by conductive adhesive | in general | (ref: H01R4/04)0.318
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities0.318
G06F21/568eliminating virus  restoring damaged files0.318
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment0.318
G06Q20/388Mutual authentication without cards0.318
H04L69/14Multichannel or multilink protocols0.318
H04L67/108characterized by resources being split in blocks or fragments0.318
G06F11/30Monitoring0.318
H04W4/24Accounting or billing0.317
H04W8/183Processing at user equipment or user record carrier0.317
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits0.317
H04R3/00Circuits for transducers |   loudspeakers or microphones0.317
G06F3/167Audio in a user interface  e.g. using voice commands for navigating  audio feedback0.317
H04B7/24for communication between two or more posts | wireless communication networks | (ref: H04W)0.317
G06F3/16Sound input| Sound output | conversion of speech into digital information or | vice versa|  | (ref: G10L)0.317
G06F9/4405Initialisation of multiprocessor systems0.317
G06F3/0659Command handling arrangements  e.g. command buffers  queues  command scheduling0.317
H04L69/12Protocol engines  e.g. VLSIs or transputers0.317
G06F3/067Distributed or networked storage systems  e.g. storage area networks [SAN]  network attached storage [NAS]0.317
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]0.317
G06F3/0646Horizontal data movement in storage systems  i.e. moving data in between storage devices or systems0.317
G06F3/0619in relation to data integrity  e.g. data losses  bit errors0.317
G06F3/061Improving I/O performance0.317
H04N21/23614Multiplexing of additional data and video streams | arrangements for simultaneous broadcast of plural pieces of information | (ref: H04H20/28)0.317
H04N21/812involving advertisement data | advertising | per se|  | (ref: G06Q30/02)0.317
H04N21/4331Caching operations  e.g. of an advertisement for later insertion during playback0.317
H04N21/458Scheduling content for creating a personalised stream  e.g. by combining a locally stored advertisement with an incoming stream| Updating operations  e.g. for OS modules | | time-related management operations | arrangements for replacing or switching information during the broadcast or during the distribution | (ref: H04H20/10)0.317
H04N21/4532involving end-user characteristics  e.g. viewer profile  preferences | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protocols involving user profiles for network applications in communication control or processing | (ref: H04L29/08936)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)0.317
G06F15/76Architectures of general purpose stored program computers | with program plugboard | (ref: G06F15/08)| | multicomputers | (ref: G06F15/16)0.316
G06F15/17343wherein the interconnection is dynamically configurable  e.g. having loosely coupled nearest neighbor architecture | reconfigurable processors arrays | (ref: G06F15/7867)0.316
G06F15/163Interprocessor communication0.316
G06F1/3278Power saving in modem or I/O interface0.316
H04W48/18Selecting a network or a communication service0.316
H04W52/0264by selectively disabling software applications0.316
H04W52/0203in the radio access network or backbone network of wireless communication networks0.316
H04W52/0267by controlling user interface components0.316
G06F1/3287Power saving by switching off individual functional units in a computer system  i.e. selective power distribution0.316
H04W28/0268using specific QoS parameters for wireless networks  e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR] | negotiating SLA or negotiating QoS | (ref: H04W28/24)0.316
H04W28/0221power availability or consumption0.316
G07C5/008communicating information to a remotely located station | transmission systems for measured values | (ref: G08C)0.316
H04N21/43853involving multiplex stream decryption | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.315
H04N21/8355involving usage data  e.g. number of copies or viewings allowed0.315
G11B20/00224wherein the key is obtained from a remote server0.315
H04N21/4433Implementing client middleware  e.g. Multimedia Home Platform [MHP]0.315
G06F1/3293Power saving by switching to a less power consuming processor  e.g. sub-CPU0.315
G06F13/14Handling requests for interconnection or transfer0.315
G06F13/124where hardware is a sequential transfer control unit  e.g. microprocessor  peripheral processor or state-machine0.315
G06F1/3237Power saving by disabling clock generation or distribution0.315
G06F3/048Interaction techniques based on graphical user interfaces [GUI]0.315
G06F3/04817using icons | graphical programming languages using iconic symbols | (ref: G06F8/34)0.315
H04W28/14using intermediate storage0.315
H04M1/006Call diverting means0.315
G06F9/00Arrangements for program control  e.g. control units | program control for peripheral devices | (ref: G06F13/10)0.315
H04L63/064Hierarchical key distribution  e.g. by multi-tier trusted parties0.315
G06F3/0673Single storage device0.315
G06F3/0623in relation to content0.315
G06F3/0677Optical disk device  e.g. CD-ROM  DVD0.315
G06F3/065Replication mechanisms0.315
G06F3/0622in relation to access0.315
G06F3/0655Vertical data movement  i.e. input-output transfer| data movement between one or more hosts and one or more storage devices0.315
G06F3/0676Magnetic disk device0.315
G06F3/0679Non-volatile semiconductor memory device  e.g. flash memory  one time programmable memory [OTP]0.315
G06F3/0661Format or protocol conversion arrangements0.315
G06F9/4843by program  e.g. task dispatcher  supervisor  operating system0.315
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.314
H04N21/4623Processing of entitlement messages  e.g. Entitlement Control Message [ECM]  Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14)0.314
H04L9/3297involving time stamps  e.g. generation of time stamps0.314
H04B7/2659for data rate control0.314
H04L5/14Two-way operation using the same type of signal  i.e. duplex | duplex repeaters | (ref: H04L25/22)|  | conditioning for two-way transmission in general | (ref: H04B3/20)| | | for interconnection between telephone switching centres | (ref: H04Q3/00)0.314
H03M1/66Digital/analogue converters | (ref: H03M1/001)|  - | (ref: H03M1/004)|  |  | (ref: H03M1/02)|  - | (ref: H03M1/10)|  take precedence0.314
H03M1/12Analogue/digital converters | (ref: H03M1/001)|  - | (ref: H03M1/004)|  |  | (ref: H03M1/02)|  - | (ref: H03M1/10)|  take precedence0.314
H04M1/0202Portable telephone sets  e.g. cordless phones  mobile phones or bar type handsets | constructional features of telephone transmitters or receivers  e.g. of speakers or microphones | (ref: H04M1/03)| | mounting of the dialing module | (ref: H04M1/23)| | with protection against RF exposure | (ref: H04B1/3838)0.314
G09B21/00Teaching  or communicating with  the blind  deaf or mute | audible presentation of material to be studied | (ref: G09B5/04)| | devices or methods for replacing direct visual or auditory perception by another kind of perception | (ref: A61F9/08)|   | (ref: A61F11/04)| | audible indication of meter readings or of colour | (ref: G01D7/12)| | watches for blind persons | (ref: G04B25/02)| | methods or arrangements for reading or recognising printed or written characters | (ref: G06K9/00)| | speech analysis  speech recognition | (ref: G10L)| | sound-recording or reproducing  | per se|  | (ref: G11B)0.314
H04M3/42391where the subscribers are hearing-impaired persons  e.g. telephone devices for the deaf0.314
H04W4/08User group management0.314
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)0.314
H04N21/8166involving executable data  e.g. software | arrangements for executing specific programs | (ref: G06F9/44)| | broadcasting computer programmes in broadcast systems | (ref: H04H20/91)| | movement of software or configuration parameters  in data networks | (ref: H04L29/08981)0.314
G06F12/1475in a virtual system  e.g. with translation means0.313
H04N21/44004involving video buffer management  e.g. video decoder buffer or video display buffer0.313
H04N21/4318by altering the content in the rendering process  e.g. blanking  blurring or masking an image region | image enhancement or restoration in general | (ref: G06T5/00)0.313
H04N21/42653for processing graphics0.313
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.313
H04W4/20Services signaling| Auxiliary data signalling  i.e. transmitting data via a non-traffic channel0.312
G01S5/0205Details0.312
H04W12/00Security arrangements  e.g. access security or fraud detection| Authentication  e.g. verifying user identity or authorisation| Protecting privacy or anonymity0.312
H04L43/50Testing arrangements0.312
H04W52/0225using monitoring of external events  e.g. the presence of a signal0.312
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)0.312
H04L41/0806for initial configuration or provisioning0.312
G06F13/4022using switching circuits  e.g. switching matrix  connection or expansion network | (ref: G06F13/4009)|  takes precedence0.312
H04N21/414Specialised client platforms  e.g. receiver in car or embedded in a mobile appliance0.312
H04N21/6543for forcing some client operations  e.g. recording | remote booting in general | (ref: G06F9/4416)0.312
H04N21/439Processing of audio elementary streams0.312
H04N21/4516involving client characteristics  e.g. Set-Top-Box type  software version  amount of memory available | allocation of resources considering hardware capabilities | (ref: G06F9/5044)| | allocation of resources considering software capabilities | (ref: G06F9/5055)| | protocols involving terminal profiles for network applications in communication control or processing | (ref: H04L29/08927)| | message adaptation based on network or terminal capabilities in packet switching networks | (ref: H04L51/06)| | processing of terminal status or physical abilities in wireless networks | (ref: H04W8/22)0.312
H04N21/4542Blocking scenes or portions of the received content  e.g. censoring scenes0.312
H04N21/4882for displaying messages  e.g. warnings  reminders | arrangements for providing short real-time information to substation in data switching networks | (ref: H04L12/1895)0.312
H04L65/104in the network0.312
H04M7/125Details of gateway equipment0.312
G10L21/0208Noise filtering0.312
G06F3/0686Libraries  e.g. tape libraries  jukebox0.312
G06F11/1474in transactions | (ref: G06F17/30286)|  takes precedence0.312
G06F3/064Management of blocks0.312
G06F3/0664at device level  e.g. emulation of a storage device or system0.312
H04W76/11Allocation or use of connection identifiers0.312
G07F7/0886the card reader being portable for interacting with a POS or ECR in realizing a payment transaction0.312
H04M3/205Eavesdropping prevention - indication of insecurity of line or network0.312
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM] | network arrangements or protocols for real-time communications | (ref: H04L65/00)0.312
G06F9/46Multiprogramming arrangements0.311
G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means  e.g. caches0.311
H04L67/00Network-specific arrangements or communication protocols supporting networked applications | message switching systems | (ref: H04L51/00)| | network management protocols | (ref: H04L41/00)| | routing or path finding of packets in data switching networks | (ref: H04L45/00)| | protocols for real-time multimedia communication | (ref: H04L65/00)| | information retrieval | (ref: G06F17/30)| | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)| | network structures or processes for video distribution between server and client or between remote clients | (r0.311
G08B13/19667Details realated to data compression  encryption or encoding  e.g. resolution modes for reducing data volume to lower transmission bandwidth or memory requirements0.311
G08B13/196using television cameras | recognition of scenes under surveillance | (ref: G06K9/00771)| | image analysis | per se|  | (ref: G06T7/00)| | television cameras | (ref: H04N5/225)| | CCTV systems | (ref: H04N7/18)0.311
G06Q40/08Insurance  e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10)0.311
H04M1/6058involving the use of a headset accessory device connected to the portable telephone0.310
H04L61/00Network arrangements or network protocols for addressing or naming0.310
H04L41/0293for accessing web services by means of a binding identification of the management service or element | aspects of naming and addressing in general | (ref: H04L61/00)0.310
H04M1/6505storing speech in digital form0.310
G06F9/468Specific access rights for resources  e.g. using capability register0.310
H04L65/60Media handling  encoding  streaming or conversion0.310
H04L65/1093by adding or removing participants0.310
G06F9/4411Configuring for operating with peripheral devices| Loading of device drivers0.310
H04B5/02using transceiver0.310
G06K7/00Methods or arrangements for sensing record carriers  | e.g. for reading patterns| (ref: G06K9/00)|  takes precedence0.310
G06Q20/3552Downloading or loading of personalisation data0.310
G06Q20/3558Preliminary personalisation for transfer to user0.310
G01D4/004Remote reading of utility meters to a fixed location0.309
G01D4/006Remote reading of utility meters to a non-fixed location  i.e. mobile location0.309
H04M1/2473Telephone terminals interfacing a personal computer  e.g. using an API (Application Programming Interface) | details of API | (ref: H04M7/0021)0.309
G06F8/63Image based installation| Cloning| Build to order0.309
H04N21/4437Implementing a Virtual Machine [VM] | virtual machines in general | (ref: G06F9/45533)0.309
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)0.309
H04N21/4353involving decryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.308
H04L2209/12Details relating to cryptographic hardware or logic circuitry0.149
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.149
G06F2221/2105Dual mode as a secondary aspect0.145
G06F2221/2113Multi-level security  e.g. mandatory access control0.100
G06F2221/2103Challenge-response0.077
G06F3/041Digitisers  e.g. for touch screens or touch pads  characterised by the transducing means0.077
G06F2221/0704Device0.071
H04L2209/127Trusted platform modules [TPM]0.071
G06F2221/2107File encryption0.071
G06F2221/2153Using hardware token as a secondary aspect0.068
H04L2209/24Key scheduling  i.e. generating round keys or sub-keys for block encryption0.066
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.066
G06F2221/033Test or assess software0.066
G06F2221/032Protect output to user by software means0.065
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.065
G06F2221/031Protect user input by software means0.065
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.065
G06F2211/009Trust0.064
G06F2221/2149Restricted operating environment0.064
G06F2211/007Encryption  En-/decode  En-/decipher  En-/decypher  Scramble  (De-)compress0.064
G06F2009/45579I/O management (device drivers  storage access) | internal functioning of device drivers | (ref: G06F13/102)|   loading of device drivers | (ref: G06F9/4411)0.063
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.063
H04L2209/26Testing cryptographic entity  e.g. testing integrity of encryption key or encryption algorithm0.063
G06F2221/034Test or assess a computer or a system0.062
H03M13/1102Codes on graphs and decoding on graphs  e.g. low-density parity check [LDPC] codes0.062
H04L2209/46Secure multiparty computation  e.g. millionaire problem0.062
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.061
H04L2209/60Digital content management  e.g. content distribution0.061
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.061
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.061
G06F2212/1052Security improvement0.061
G06F2221/0755Generation0.061
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.060
H04L63/1458Denial of Service0.059
G06F2212/1048Scalability0.059
G06F12/0897with two or more cache hierarchy levels | with multilevel cache hierarchies | (ref: G06F12/0811)0.059
G06F2212/152Virtualized environment  e.g. logically partitioned system0.059
G06F2212/1032Reliability improvement  data loss prevention  degraded operation etc0.059
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.059
G06F2221/2115Third party0.059
H04L2209/603Digital right managament [DRM]0.059
G06F2207/7219Countermeasures against side channel or fault attacks0.058
G06F2211/008Public Key  Asymmetric Key  Asymmetric Encryption0.058
G06F2211/1097Boot  Start  Initialise  Power0.058
A61B5/01Measuring temperature of body parts| | Diagnostic temperature sensing  e.g. for malignant or inflamed tissue| clinical thermometers | (ref: G01K5/22)| | thermometers for special purposes | (ref: G01K13/00)0.058
A61B5/145Measuring characteristics of blood | in vivo|   e.g. gas concentration  pH value| | Measuring characteristics of body fluids or tissues  e.g. interstitial fluid  cerebral tissue| measuring of blood pressure or blood flow | (ref: A61B5/02)| | non-radiation detecting or locating of foreign bodies in blood | (ref: A61B5/06)0.058
A61B5/1455using optical sensors  e.g. spectral photometrical oximeters0.058
A61B5/021Measuring pressure in heart or blood vessels | (ref: A61B5/0205)|  takes precedence0.058
A61B5/024Detecting  measuring or recording pulse rate or heart rate | (ref: A61B5/0205)|   | (ref: A61B5/021)|  take precedence0.058
G06F2221/2101Auditing as a secondary aspect0.058
H04W8/22Processing or transfer of terminal data  e.g. status or physical capabilities0.058
G06F2221/2117User registration0.058
G06F2221/2129Authenticate client device independently of the user0.058
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.058
H04M2203/609Secret communication0.058
Y10S707/99939Privileged access0.058
G06F2203/04803Split screen  i.e. subdividing the display area or the window area into separate subareas0.058
G06F2203/04806Zoom  i.e. interaction techniques or interactors for controlling the zooming operation0.058
H04M1/675the user being required to insert a coded card  e.g. a smart card carrying an integrated circuit chip | for constructional features in portable telephones | (ref: H04B1/3816)0.058
G06F2221/0771Revocation0.058
G06F2221/2133Verifying human interaction  e.g.  Captcha0.058
G06F2009/45562Creating  deleting  cloning virtual machine instances0.058
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.057
G06F2209/542Intercept0.057
G06F3/0489using dedicated keyboard keys or combinations thereof0.057
H04L2209/122Hardware reduction or efficient architectures0.057
G06F2201/805Real-time0.057
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.057
G06F2221/0797using dedicated hardware at the client0.057
G02B2027/014comprising information/image processing systems0.057
H04M2250/04including near field communication means  e.g. RFID0.057
G06F11/182based on mutual exchange of the output between redundant processing components0.057
G06F11/2094Redundant storage or storage space | (ref: G06F11/2056)|  takes precedence0.057
H04W88/04adapted for relaying to or from another terminal or user0.056
G06F2221/2121Chip on media  e.g. a disk or tape with a chip embedded in its case0.056
H04W74/00Wireless channel access  e.g. scheduled or random access0.056
G10L2015/088Word spotting0.056
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.056
G10L2015/223Execution procedure of a spoken command0.056
G10L15/08Speech classification or search0.056
G06F2221/03Indexing scheme relating to | (ref: G06F21/50)|   monitoring users  programs or devices to maintain the integrity of platforms0.056
G02B2027/0178Eyeglass type  eyeglass details | (ref: G02C)0.056
G10L13/033Voice editing  e.g. manipulating the voice of the synthesiser0.056
G10L13/047Architecture of speech synthesisers0.056
H04W84/042Public Land Mobile systems  e.g. cellular systems0.056
H04W8/265for initial activation of new user0.056
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.056
G06F2221/0711Token0.056
H04L2209/30Compression  e.g. Merkle-Damgard construction0.056
G10L2019/0013Codebook search algorithms0.056
G10L2019/0011Long term prediction filters  i.e. pitch estimation0.056
G06F2221/2131Lost password  e.g. recovery of lost or forgotten passwords0.055
H04L2209/125Parallelization or pipelining  e.g. for accelerating processing of cryptographic operations0.055
G06F2221/07Indexing scheme relating to | (ref: G06F21/10)|   protecting distributed programs or content0.055
G06F2212/657Virtual address space management0.055
G06F2212/151Emulated environment  e.g. virtual machine0.055
H04L2212/00Encapsulation of packets0.055
H04L2209/38Chaining  e.g. hash chain or certificate chain0.055
H04M2250/12including a sensor for measuring a physical value  e.g. temperature or motion | telephones including GPS signal receivers | (ref: H04M2250/10)0.055
H04M2250/02including a Bluetooth interface0.055
G06F2200/1633Protecting arrangement for the entire housing of the computer0.055
G07C2009/00777by induction0.055
H04M2250/06including a wireless LAN interface0.055
H04W36/24Reselection being triggered by specific parameters | used to improve the performance of a single terminal0.055
H04W84/10Small scale networks| Flat hierarchical networks0.055
H04M2250/66user interface aspects for indicating selection options for a communication line0.055
H04W84/04Large scale networks| Deep hierarchical networks0.055
H04L2209/88Medical equipments0.055
H04L2209/04Masking or blinding0.055
G06F2221/0782Backup or restore0.055
H04L2209/72Signcrypting  i.e. digital signing and encrypting simultaneously0.055
G06F2221/2147Locking files0.054
G06F2009/45575Starting  stopping  suspending  resuming virtual machine instances | program initiating | (ref: G06F9/445)| | task life-cycle in general | (ref: G06F9/485)0.054
G06F2221/0742Enhanced product0.054
H04L2209/16Obfuscation or hiding  e.g. involving white box0.054
H04M2207/185wireless packet-switched0.054
H04K2203/16for telephony0.054
H04M2203/301Management of recordings0.054
H04K2203/18for wireless local area networks or WLAN0.054
H04W76/14Direct-mode setup0.054
G10H2230/021Mobile ringtone  i.e. generation  transmission  conversion or downloading of ringing tones or other sounds for mobile telephony| Special musical data formats or protocols herefor | mobile telephone transmission specifically adapted for electrophonic musical tools or instruments | (ref: G10H2240/251)0.054
G10H2230/041Processor load management  i.e. adaptation or optimization of computational load or data throughput in computationally intensive musical processes to avoid overload artifacts  e.g. by deliberately suppressing less audible or less relevant tones or decreasing their complexity0.054
G06F2212/684TLB miss handling0.054
G06F2221/0751Key | not used0.054
H04L43/026using flow generation0.054
H04L43/062for traffic related reporting0.054
H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries0.054
H01M10/4257Smart batteries  e.g. electronic circuits inside the housing of the cells or batteries0.054
H04M1/0262for a battery compartment0.054
Y02E60/10Energy storage0.054
G06F2211/005Network  LAN  Remote Access  Distributed System0.054
H04W76/12Setup of transport tunnels0.054
G06F2213/0038System on Chip0.054
G06F2221/2125Just-in-time application of countermeasures  e.g.  on-the-fly decryption  just-in-time obfuscation or de-obfuscation0.054
H04R2420/01Input selection or mixing for amplifiers or loudspeakers | for hearing aids | (ref: H04R25/43)0.054
H04R2420/07Applications of wireless loudspeakers or wireless microphones0.054
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.054
H04L41/0246exchanging or transporting network management information using Internet  e.g. aspects relating to embedding network management web servers in network elements  web service for network management purposes  aspects related to Internet applications or services or web-based protocols  simple object access protocol [SOAP] | web-based network application protocols | (ref: H04L67/02)| | web-based network application protocols for remote control of end-devices or monitoring of remote application data | (ref: H04L67/025)| | proprietary application protocols for remote control of end-devices in special0.053
G06Q50/26Government or public services0.053
H04B2001/3861carried in a hand or on fingers0.053
G08B25/004Alarm propagated along alternative communication path or using alternative communication medium according to a hierarchy of available ways to communicate  e.g. if Wi-Fi not available use GSM0.053
H04B2001/3855carried in a belt or harness0.053
G08B25/016Personal emergency signalling and security systems | emergency non-personal manually actuated alarm activators | (ref: G08B25/12)0.053
H04M2215/2093Push to talk0.053
H04W4/12Messaging| Mailboxes| Announcements0.053
H04L65/1016IMS | wireless communication networks | (ref: H04W)0.053
H04W48/02Access restriction performed under specific conditions0.053
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.053
H04B2215/068by avoiding a reception frequency range0.053
H04M1/6075adapted for handsfree use in a vehicle | (ref: H04M1/6058)|  takes precedence| arrangements for holding telephones in a vehicle | (ref: B60R11/0241)0.053
G05B2219/33192Radio link  wireless0.053
H04M2250/16including more than one display unit0.053
Y04S40/20Information technology specific aspects0.053
H04M2250/14including a card reading device0.053
Y10T29/4913Assembling to base an electrical component  e.g.  capacitor  etc.0.053
Y10T29/53174Means to fasten electrical component to wiring board  base  or substrate0.053
G06F1/16Constructional details or arrangements0.053
H04N21/241Operating System [OS] processes  e.g. server setup | arrangements for programme control | (ref: G06F9/00)|  | | program loading or initiating in general | (ref: G06F9/445)| | multiprogramming arrangements | (ref: G06F9/46)0.053
G06F2221/0735Restriction at operating system level0.053
H04N21/23476by partially encrypting  e.g. encrypting the ending portion of a movie0.053
Y10S707/99954Version management0.053
Y10S707/99953Recoverability0.053
G06F11/1092Rebuilding  e.g. when physically replacing a failing disk0.053
G06F2221/2109Game systems0.053
H04W28/18Negotiating wireless communication parameters0.053
H04M2215/2026Wireless network  e.g. GSM  PCS  TACS0.053
H04M2215/32Involving wireless systems0.053
H04W92/18between terminal devices0.053
H04R3/005for combining the signals of two or more microphones | specially adapted for hearing aids | (ref: H04R25/407)0.053
H04R27/00Public address systems | circuits for preventing acoustic reaction | (ref: H04R3/02)| | circuits for distributing signals to loudspeakers | (ref: H04R3/12)| | | monitoring or testing arrangements for public address systems | (ref: H04R29/007)| | amplifiers | (ref: H03F)0.053
H04R2430/01Aspects of volume control  not necessarily automatic  in sound systems0.053
H04R2227/003Digital PA systems using  e.g. LAN or internet0.053
G06Q2220/10Usage protection of distributed data files0.053
G06F3/0635by changing the path  e.g. traffic rerouting  path reconfiguration0.053
G06F13/00Interconnection of  or transfer of information or other signals between  memories  input/output devices or central processing units | interface circuits for specific input/output devices  | (ref: G06F3/00)| | multiprocessor systems  | (ref: G06F15/16)|  | multiprogram control therefor  | (ref: G06F9/46)0.053
H04W28/24Negotiating SLA [Service Level Agreement]| Negotiating QoS [Quality of Service]0.053
Y02D10/00Energy efficient computing0.053
G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component  e.g. monitoring of power  currents  temperature  humidity  position  vibrations | thermal management in cooling arrangements of a computing system | (ref: G06F1/206)0.053
H04W52/26using transmission rate or quality of service QoS [Quality of Service]0.053
G07C2205/02using a vehicle scan tool0.053
H04L63/14for detecting or protecting against malicious traffic0.053
G06F2212/652Page size control0.053
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.053
H04L2209/42Anonymization  e.g. involving pseudonyms0.052
H04B7/2653for logical channel control0.052
H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set | at the operator set in a manual exchange | (ref: H04M5/20)0.052
G11C7/00Arrangements for writing information into  or reading information out from  a digital store | (ref: G11C5/00)|  takes precedence| auxiliary circuits for stores using semiconductor devices | (ref: G11C11/4063)|   | (ref: G11C11/413)|  0.052
G11C7/16Storage of analogue signals in digital stores using an arrangement comprising analogue/digital [A/D] converters  digital memories and digital/analogue [D/A] converters 0.052
G06F15/02manually operated with input through keyboard and computation using a built-in program  e.g. pocket calculators0.052
H04M1/00Substation equipment  e.g. for use by subscribers| Analogous equipment at exchanges | prepayment telephone coin boxes | (ref: H04M17/00)| | current supply arrangements | (ref: H04M19/00)| | | telephone sets particularly adapted for data transmission | (ref: H04M11/066)| | network interface devices | (ref: H04Q1/028)0.052
H04W36/14Reselecting a network or an air interface0.052
H04W52/028switching on or off only a part of the equipment circuit blocks0.052
H04W84/02Hierarchically pre-organised networks  e.g. paging networks  cellular networks  WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]0.052
G09G2358/00Arrangements for display data security0.052
H04W4/33for indoor environments  e.g. buildings0.052
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)0.052
H04M2201/60Medium conversion0.052
H04M2201/40using speech recognition | speech recognition | per se|  | (ref: G10L15/00)0.052
G06F2201/84Using snapshots  i.e. a logical point-in-time copy of the data0.052
G06F2212/60Details of cache memory0.052
G06F2212/402Encrypted data0.052
G06F2221/2137Time limited access  e.g. to a computer or data0.052
H04L2209/601Broadcast encryption0.052
G06F2221/2139Recurrent verification0.052
H04M2250/62user interface aspects of conference calls0.052
H04M2250/74with voice recognition means | voice activated dialling | (ref: H04M1/271)| | voice recognition algorithms | (ref: G10L15/00)0.052
H04M11/08adapted for optional reception of entertainment or informative matter | systems in which the information is continuously available on a carrier over the whole network | (ref: H04H20/81)0.052
H04M1/21Combinations with auxiliary equipment  e.g. with clock  with memoranda pads0.052
H04M1/27Devices whereby a plurality of signals may be stored simultaneously | devices disposed in the exchange | (ref: H04M3/424)|   | (ref: H04M3/44)0.052
H04M1/642storing speech in digital form0.052
H04L45/74Address processing for routing0.052
H04W48/06based on traffic conditions0.052
H04W76/15Setup of multiple wireless link connections0.052
G01D4/002Remote reading of utility meters0.052
H04Q2213/13095PIN / Access code  authentication0.052
G06F2221/0775Logging0.051
H04L65/1073Registration | arrangements for addressing or naming in data networks | (ref: H04L61/00)0.051
G06F2221/0728Conversion0.051
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.