| H04L67/02 | involving the use of web-based technology e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861) | 2.346 |
| G06F8/76 | Adapting program code to run in a different environment| Porting | 2.323 |
| G06F9/445 | Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57) | 2.323 |
| G06F21/629 | to features or functions of an application | 2.083 |
| G06F21/44 | Program or device authentication | 2.083 |
| G06F9/44568 | Immediately runnable code | 2.083 |
| G06F9/44505 | Configuring for program initiating e.g. using registry configuration files | 1.919 |
| G06Q20/3227 | Use of a security embedded in M-devices | 1.803 |
| G06K5/04 | Verifying the alignment of markings | 1.703 |
| G07F7/0893 | the card reader reading the card in a contactless manner | 1.703 |
| H04W12/06 | Authentication | 1.703 |
| H04L9/3242 | involving keyed hash functions e.g. message authentication codes [MACs] CBC-MAC or HMAC | 1.703 |
| H04L63/0428 | wherein the data content is protected e.g. by encrypting or encapsulating the payload | 1.703 |
| H04W12/12 | Fraud detection | 1.703 |
| H04L9/3271 | using challenge-response | 1.703 |
| H04L9/3234 | involving additional secure or trusted devices e.g. TPM smartcard USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853) | 1.703 |
| H04L9/0861 | Generation of secret information including derivation or calculation of cryptographic keys or passwords | 1.703 |
| G06F13/385 | for adaptation of a particular data processing system to different peripheral devices | 1.655 |
| G06K7/10297 | arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs e.g. ISO/IEC 14443 and 18092 | protocols for data communication in general | see| | (ref: H04L29/06) | 1.655 |
| H04L9/0866 | involving user or device identifiers e.g. serial number physical or biometrical information DNA hand-signature or measurable physical characteristics | 1.643 |
| G06F21/602 | Providing cryptographic facilities or services | 1.643 |
| G06F21/57 | Certifying or maintaining trusted computer platforms e.g. secure boots or power-downs version controls system software checks secure updates or assessing vulnerabilities | 1.643 |
| H04L63/0281 | Proxies | 1.636 |
| H04L63/0853 | using an additional device e.g. smartcard SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234) | 1.633 |
| G06F21/128 | involving web programs i.e. using technology especially used in internet generally interacting with a web browser e.g. hypertext markup language [HTML] applets java | 1.633 |
| H04L67/1097 | for distributed storage of data in a network e.g. network file system [NFS] transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601) | 1.624 |
| H04L63/168 | above the transport layer | 1.616 |
| H04L63/20 | for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227) | 1.616 |
| H04L43/14 | using software i.e. software packages | network security related monitoring | (ref: H04L63/1408) | 1.610 |
| G06F9/54 | Interprogram communication | 1.606 |
| G06F3/0483 | interaction with page-structured environments e.g. book metaphor | 1.600 |
| G06F9/451 | Execution arrangements for user interfaces | 1.600 |
| G06F8/41 | Compilation | 1.599 |
| G06F9/4552 | Involving translation to a different instruction set architecture e.g. just-in-time translation in a JVM | 1.599 |
| H04L67/34 | involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445) | 1.599 |
| G06F21/33 | using certificates | 1.599 |
| H04L67/10 | in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46) | 1.574 |
| H04L67/141 | provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069) | 1.574 |
| G06F9/485 | Task life-cycle e.g. stopping restarting resuming execution | (ref: G06F9/4881)| takes precedence | 1.574 |
| H04L67/143 | provided for session termination e.g. event controlled end of session | 1.574 |
| H04L67/025 | for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125) | 1.573 |
| G06F9/452 | Remote windowing e.g. X-Window System desktop virtualisation | protocols for telewriting | (ref: H04L67/38) | 1.572 |
| H04L63/0884 | by delegation of authentication e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-Ã -vis an authentication entity | 1.566 |
| H04L63/10 | for controlling access to network resources | restricting network management access | (ref: H04L41/28) | 1.566 |
| G06F21/606 | by securing the transmission between two devices or processes | 1.565 |
| H04L63/0823 | using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263) | 1.562 |
| H04L9/30 | Public key i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy | 1.562 |
| H04L67/148 | provided for migration or transfer of sessions | in-session procedures in real-time communications | (ref: H04L65/1083)| | control or signalling for completing the hand-off in wireless networks | (ref: H04W36/0005) | 1.558 |
| G06F3/0482 | interaction with lists of selectable items e.g. menus | 1.555 |
| G06F21/50 | Monitoring users programs or devices to maintain the integrity of platforms e.g. of processors firmware or operating systems | 1.555 |
| G06F8/31 | Programming languages or programming paradigms | 1.540 |
| G06F9/45508 | Runtime interpretation or emulation e g. emulator loops bytecode interpretation | 1.540 |
| H04L63/0807 | using tickets e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213) | 1.538 |
| G06Q20/38215 | Use of certificates or encrypted proofs of transaction rights | 1.535 |
| H04W24/02 | Arrangements for optimising operational condition | 1.520 |
| H04W48/18 | Selecting a network or a communication service | 1.520 |
| H04L63/0263 | Rule management | 1.518 |
| H04L47/10 | Flow control or congestion control | 1.518 |
| H04L45/24 | Multipath | 1.515 |
| H04L9/0894 | Escrow recovery or storing of secret information e.g. secret key escrow or cryptographic key storage | 1.508 |
| H04N21/8456 | by decomposing the content in the time domain e.g. in time segments | 1.507 |
| H04N21/23106 | involving caching operations | prefetching while addressing of a memory level in which the access to the desired data or data block requires associative addressing means within memory systems or architectures | (ref: G06F12/0862)| | caching at an intermediate stage in a data network | (ref: H04L29/08801) | 1.507 |
| G06F21/71 | to assure secure computing or processing of information | 1.506 |
| G06F12/0811 | with multilevel cache hierarchies | 1.506 |
| G06F12/0866 | for peripheral storage systems e.g. disk cache | 1.506 |
| G06Q30/0283 | Price estimation or determination | 1.502 |
| H04L9/3239 | involving non-keyed hash functions e.g. modification detection codes [MDCs] MD5 SHA or RIPEMD | 1.502 |
| H04N21/4335 | Housekeeping operations e.g. prioritizing content for deletion because of storage space restrictions | storage management e.g. defragmentation | (ref: G06F3/0604)| | unloading stored programs | (ref: G06F9/445)| | storage management in file systems | (ref: G06F17/30067)| | buffering arrangements in a network node or in an end terminal in packet networks | (ref: H04L49/90) | 1.495 |
| G06F21/53 | by executing in a restricted environment e.g. sandbox or secure virtual machine | 1.495 |
| H04L63/1458 | Denial of Service | 1.492 |
| H04L63/1416 | Event detection e.g. attack signature detection | 1.492 |
| H04L63/1408 | by monitoring network traffic | monitoring network traffic | per se| | (ref: H04L43/00) | 1.487 |
| G06F12/0882 | Page mode | 1.483 |
| G06F12/0862 | with prefetch | 1.483 |
| H04L63/0815 | providing single-sign-on or federations | 1.481 |
| H04L41/0803 | Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34) | 1.479 |
| H04L41/0226 | Mapping or translation of multiple network management protocols | 1.479 |
| H04L41/0806 | for initial configuration or provisioning | 1.479 |
| G06F21/335 | for accessing specific resources e.g. using Kerberos tickets | 1.478 |
| H04L45/22 | Alternate routing | 1.472 |
| G06T11/00 | 2D [Two Dimensional] image generation | 1.469 |
| G06F21/10 | Protecting distributed programs or content e.g. vending or licensing of copyrighted material | 1.469 |
| G06F9/5005 | to service a request | 1.467 |
| G06F9/5061 | Partitioning or combining of resources | 1.467 |
| G06F3/04817 | using icons | graphical programming languages using iconic symbols | (ref: G06F8/34) | 1.463 |
| G06F3/0481 | based on specific properties of the displayed interaction object or a metaphor-based environment e.g. interaction with desktop elements like windows or icons or assisted by a cursor's changing behaviour or appearance | 1.463 |
| G06F8/71 | Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management | 1.462 |
| G06F8/30 | Creation or generation of source code | 1.462 |
| G06F3/0238 | Programmable keyboards | key guide holders | (ref: G06F3/0224) | 1.460 |
| G06F11/3684 | for test design e.g. generating new test cases | 1.460 |
| G06F8/656 | while running | 1.459 |
| G06F8/658 | Incremental updates| Differential updates | 1.459 |
| G06F21/6209 | to a single file or object e.g. in a secure envelope encrypted and accessed using a key or with access control rules appended to the object itself | 1.457 |
| G06F21/6218 | to a system of files or objects e.g. local or distributed file system or database | 1.457 |
| H04L9/3268 | using certificate validation registration distribution or revocation e.g. certificate revocation list [CRL] | 1.452 |
| G06F9/44542 | Retargetable | 1.445 |
| H04L63/166 | at the transport layer | 1.436 |
| H04L63/029 | Firewall traversal e.g. tunnelling or creating pinholes | 1.435 |
| G06F21/6245 | Protecting personal data e.g. for financial or medical purposes | 1.433 |
| G06Q20/354 | Card activation or deactivation | 1.432 |
| G06Q20/352 | Contactless payments by cards | 1.431 |
| H04L63/0236 | Filtering by address protocol port number or service e.g. IP-address or URL | 1.431 |
| H04L63/0272 | Virtual private networks | 1.431 |
| H04L63/0876 | based on the identity of the terminal or configuration e.g. MAC address hardware or software configuration or device fingerprint | 1.430 |
| G06F12/0868 | Data transfer between cache memory and other subsystems e.g. storage devices or host systems | 1.429 |
| G06F12/084 | with a shared cache | 1.429 |
| H04L63/062 | for key distribution e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819) | 1.428 |
| G06Q20/4014 | Identity check for transaction | 1.428 |
| H04L63/083 | using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226) | 1.427 |
| G06F9/4881 | Scheduling strategies for dispatcher e.g. round robin multi-level priority queues | 1.424 |
| G06F9/5027 | the resource being a machine e.g. CPUs Servers Terminals | 1.424 |
| G06F21/54 | by adding security routines or objects to programs | 1.422 |
| H04L67/1095 | for supporting replication or mirroring of data e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056) | 1.421 |
| G06T1/20 | Processor architectures| Processor configuration e.g. pipelining | 1.417 |
| G06Q20/3276 | using a pictured code e.g. barcode or QR-code being read by the M-device | 1.416 |
| H04L63/102 | Entity profiles | 1.416 |
| G06F9/5077 | Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455) | 1.409 |
| G16H30/20 | for handling medical images e.g. DICOM HL7 or PACS | 1.409 |
| G06F9/5072 | Grid computing | 1.405 |
| H04W4/70 | Services for machine-to-machine communication [M2M] or machine type communication [MTC] | 1.401 |
| H04L65/4076 | Multicast or broadcast | data switching systems for broadcast or conference | (ref: H04L12/18)| | analog television systems in general | (ref: H04N7/00)| | creating video channels for a dedicated end-user group | (ref: H04N21/2668)| | arrangements for broadcast or distribution combined with broadcast | (ref: H04H20/00)| | arrangements for broadcast applications with a direct linkage of broadcast information | (ref: H04H60/00)| | arrangements for push based network services | (ref: H04L67/26) | 1.395 |
| H04N21/222 | Secondary servers e.g. proxy server cable television Head-end | intermediate processing or storage in data networks | (ref: H04L29/08702) | 1.395 |
| G06F21/6254 | by anonymising data e.g. decorrelating personal data from the owner's identification | 1.395 |
| G06F11/3428 | Benchmarking | 1.392 |
| H04L9/3263 | involving certificates e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823) | 1.391 |
| H04L41/0896 | Bandwidth or capacity management i.e. automatically increasing or decreasing capacities e.g. bandwidth on demand | reallocation of resources renegotiation of resources e.g. in-call | (ref: H04L47/76) | 1.387 |
| H04L9/3213 | using tickets or tokens e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807) | 1.387 |
| H04L63/08 | for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32) | 1.387 |
| H04W12/02 | Protecting privacy or anonymity | 1.386 |
| H04L63/0435 | wherein the sending and receiving network entities apply symmetric encryption i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06) | 1.386 |
| G06Q20/341 | Active cards i.e. cards including their own processing means e.g. including an IC or chip | 1.386 |
| G06Q20/3674 | involving authentication | 1.386 |
| G06F9/45558 | Hypervisor-specific management and integration aspects | 1.385 |
| H04L41/046 | Aspects of network management agents | 1.384 |
| H04L63/061 | for key exchange e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838) | 1.383 |
| H04L63/0485 | Networking architectures for enhanced packet encryption processing e.g. offloading of IPsec packet processing or efficient security association look-up | 1.383 |
| G06F8/458 | Synchronisation e.g. post-wait barriers locks | synchronisation among tasks | (ref: G06F9/52) | 1.377 |
| G06F11/3636 | by tracing the execution of the program | 1.377 |
| H04L9/0825 | using asymmetric-key encryption or public key infrastructure [PKI] e.g. key signature or public key certificates | 1.376 |
| H04N21/44016 | involving splicing one content stream with another content stream e.g. for substituting a video clip | 1.375 |
| H04N21/2187 | Live feed | 1.375 |
| H04L9/3265 | using certificate chains trees or paths| Hierarchical trust model | 1.373 |
| H04L9/3236 | using cryptographic hash functions | 1.366 |
| H04N21/2183 | Cache memory | caches in web servers or browsers | (ref: G06F17/30902)| | intermediate storage and caching in data networks | (ref: H04L29/08801) | 1.365 |
| H04N21/4331 | Caching operations e.g. of an advertisement for later insertion during playback | 1.365 |
| H04L67/14 | for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54) | 1.357 |
| G06F8/33 | Intelligent editors | 1.357 |
| G06F9/453 | Help systems | 1.357 |
| H04L63/1425 | Traffic logging e.g. anomaly detection | 1.355 |
| H04L63/1441 | Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002) | 1.355 |
| G06F11/3624 | by performing operations on the source code e.g. via a compiler | 1.354 |
| G06F11/3604 | Software analysis for verifying properties of programs | byte-code verification | (ref: G06F9/44589) | 1.354 |
| G06F9/5055 | considering software capabilities i.e. software resources associated or available to the machine | 1.353 |
| G06F9/505 | considering the load | 1.353 |
| H04L63/108 | when the policy decisions are valid for a limited amount of time | 1.353 |
| G06F21/52 | during program execution e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow | 1.351 |
| H04L67/289 | where the intermediate processing is functionally located closer to the data consumer application e.g. in same machine in same home or in same subnetwork | 1.348 |
| G06Q10/101 | Collaborative creation of products or services | 1.347 |
| H04L45/308 | Route determination based on user's profile e.g. premium users | 1.347 |
| H04W40/34 | Modification of an existing route | 1.347 |
| G06F21/64 | Protecting data integrity e.g. using checksums certificates or signatures | 1.345 |
| H04L9/3247 | involving digital signatures | 1.345 |
| G06F12/0646 | Configuration or reconfiguration | 1.342 |
| H04W4/02 | Services making use of location information | 1.338 |
| G06F9/5016 | the resource being the memory | 1.338 |
| H04L9/3228 | One-time or temporary data i.e. information which is sent for every authentication or authorization e.g. one-time-password one-time-token or one-time-key | 1.335 |
| H04L63/0869 | for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273) | 1.330 |
| G06Q20/385 | Use of an alias or a single-use code | 1.330 |
| G06Q20/405 | Establishing or using transaction specific rules | 1.330 |
| H04L41/082 | due to updating or upgrading of network functionality e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02) | 1.330 |
| G06Q20/401 | Transaction verification | 1.330 |
| H04L41/0893 | Assignment of logical groupings to network elements| Policy based network management or configuration | 1.330 |
| G06F8/61 | Installation | 1.330 |
| G06F8/65 | Updates | security arrangements therefor | (ref: G06F21/57) | 1.329 |
| H04L63/205 | involving negotiation or determination of the one or more network security mechanisms to be used e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24) | 1.327 |
| H04L12/1818 | Conference organisation arrangements e.g. handling schedules setting up parameters needed by nodes to attend a conference booking network resources notifying involved parties | 1.327 |
| G06Q10/10 | Office automation e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)| | | arrangements for user-to-user messaging in packet-switching networks e.g. e-mail or instant messages | (ref: H04L41/00)| Time management e.g. calendars reminders meetings or time accounting | organizing planning scheduling or allocating time | (ref: G06Q10/06) | 1.327 |
| G06F8/60 | Software deployment | 1.325 |
| H04W4/60 | Subscription-based services using application servers or record carriers e.g. SIM application toolkits | 1.325 |
| H04L67/306 | User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867) | 1.324 |
| G06Q30/0185 | Product service or business identity fraud | 1.323 |
| A61F5/566 | Intra-oral devices | 1.322 |
| G06Q50/30 | Transportation| Communications | 1.315 |
| G06F3/038 | Control and interface arrangements therefor e.g. drivers or device-embedded control circuitry | 1.315 |
| A63F13/355 | Performing operations on behalf of clients with restricted processing capabilities e.g. servers transform changing game scene into an MPEG-stream for transmitting to a mobile phone or a thin client | 1.315 |
| H04L67/125 | involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025) | 1.311 |
| H04L63/105 | Multiple levels of security | 1.311 |
| H04N21/23406 | involving management of server-side video buffer | 1.309 |
| G06Q30/0233 | Method of redeeming a frequent usage reward | 1.307 |
| G06Q30/0207 | Discounts or incentives e.g. coupons rebates offers or upsales | 1.307 |
| G06F21/85 | interconnection devices e.g. bus-connected or in-line devices | 1.307 |
| G06Q20/20 | Point-of-sale [POS] network systems | POS | per se| | (ref: G07F)| or | (ref: G07G) | 1.306 |
| G06Q20/18 | involving self- service terminals [SSTs] vending machines kiosks or multimedia terminals | 1.306 |
| H04N21/64738 | Monitoring network characteristics e.g. bandwidth congestion level | data switched network analysis | (ref: H04L41/14)| | monitoring functioning in data switched networks | (ref: H04L43/0817)| | flow control in packet networks | (ref: H04L47/10) | 1.306 |
| G06F21/6263 | during internet communication e.g. revealing personal data from cookies | 1.303 |
| G06F21/6227 | where protection concerns the structure of data e.g. records types queries | 1.303 |
| H04L67/1021 | based on client or server locations | 1.302 |
| G06F12/123 | with age lists e.g. queue most recently used [MRU] list or least recently used [LRU] list | 1.299 |
| G06F21/305 | by remotely controlling device operation | 1.297 |
| H04N21/4622 | Retrieving content or additional data from different sources e.g. from a broadcast channel and the Internet | web site content organization and management for information retrieval from the Internet | (ref: G06F17/3089)| | transmission by internet of broadcast information | (ref: H04H60/82)| | stock exchange data over packet-switching network | (ref: H04L12/1804)| | push services including data channel over packet-switching network | (ref: H04L12/1859) | 1.296 |
| H04L63/0892 | by using authentication-authorization-accounting [AAA] servers or protocols | 1.295 |
| G06Q20/3829 | involving key management | 1.293 |
| H04L9/0637 | Modes of operation e.g. cipher block chaining [CBC] electronic codebook [ECB] or Galois/counter mode [GCM] | 1.293 |
| H04L67/1046 | Joining mechanisms | 1.291 |
| H04L67/1074 | for supporting resource transmission mechanisms | routing over an overlay routing layer | (ref: H04L45/64)| | file transfer | (ref: H04L67/06) | 1.291 |
| G06F9/4856 | resumption being on a different machine e.g. task migration virtual machine migration | (ref: G06F9/5088)| takes precedence | 1.290 |
| G06F8/35 | Model driven | 1.288 |
| G06F8/36 | Software reuse | 1.288 |
| H04L9/08 | Key distribution | or management e.g. generation sharing or updating of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06) | 1.287 |
| H04L51/046 | interacting with other applications or services | 1.286 |
| G06Q50/01 | Social networking | 1.286 |
| G06F21/564 | by virus signature recognition | 1.284 |
| H04L67/08 | adapted for terminal emulation e.g. telnet | protocols for telewriting or protocols for networked simulations virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455) | 1.282 |
| A63F13/71 | using secure communication between game devices and game servers e.g. by encrypting game data or authenticating players | 1.281 |
| A63F13/216 | using geographical information e.g. location of the game device or player using GPS | 1.281 |
| A63F13/65 | automatically by game devices or servers from real world data e.g. measurement in live racing competition | 1.281 |
| G06F9/547 | Remote procedure calls [RPC]| Web services | 1.280 |
| H04L63/0245 | Filtering by information in the payload | 1.279 |
| H04L63/067 | using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863) | 1.278 |
| H04L9/008 | involving homomorphic encryption | 1.277 |
| H04L9/0877 | using additional device e.g. trusted platform module [TPM] smartcard USB or hardware security module [HSM] | 1.276 |
| H04L9/0897 | involving additional devices e.g. trusted platform module [TPM] smartcard or USB | 1.276 |
| G06F21/45 | Structures or tools for the administration of authentication | 1.273 |
| H04L41/0843 | based on generic templates | 1.273 |
| H04N21/4312 | involving specific graphical features e.g. screen layout special fonts or colors blinking icons highlights or animations | 1.270 |
| G06Q20/045 | characterized in that the payment protocol involves at least one ticket | 1.270 |
| H04L67/12 | adapted for proprietary or special purpose networking environments e.g. medical networks sensor networks networks in a car or remote metering networks | digital computing or data processing equipment or methods specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30) | 1.269 |
| G06F9/541 | via adapters e.g. between incompatible applications | 1.269 |
| H04L69/16 | Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility e.g. mobile IP | (ref: H04W80/04) | 1.269 |
| H04L9/3226 | using a predetermined code e.g. password passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083) | 1.269 |
| H04L41/5096 | wherein the managed service relates to distributed or central networked applications | management of file systems | (ref: G06F17/30067)| | management of structured data stores | (ref: G06F17/30286) | 1.268 |
| G06F9/4843 | by program e.g. task dispatcher supervisor operating system | 1.268 |
| G06F11/0721 | within a central processing unit [CPU] | 1.266 |
| G06Q30/0257 | User requested | 1.264 |
| G06Q30/0275 | Auctions | 1.264 |
| H04L12/283 | Processing of data at an internetworking point of a home automation network | 1.264 |
| G10L15/30 | Distributed recognition e.g. in client-server systems for mobile phones or network applications | 1.264 |
| H04N21/234363 | by altering the spatial resolution e.g. for clients with a lower screen resolution | 1.261 |
| G06F9/44 | Arrangements for executing specific programs | 1.260 |
| H04L9/3273 | for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869) | 1.260 |
| H04N21/2347 | involving video stream encryption | arrangements for secret or secure communication | (ref: H04L9/00)| analogue secrecy systems | (ref: H04N7/16)| | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)| | arrangements for preventing the taking of data from a data transmission channel without authorisation | (ref: H04L12/22)| | security arrangements in wireless networks | (ref: H04W12/00) | 1.259 |
| G06Q10/0834 | Choice of carriers | 1.259 |
| G06N5/022 | Knowledge engineering knowledge acquisition | 1.258 |
| G06F21/62 | Protecting access to data via a platform e.g. using keys or access control rules | 1.257 |
| G06K9/6267 | Classification techniques | 1.257 |
| G01S19/05 | providing aiding information | 1.256 |
| G06Q10/063 | Operations research or analysis | 1.256 |
| H04L9/0819 | Key transport or distribution i.e. key establishment techniques where one party creates or otherwise obtains a secret value and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062) | 1.254 |
| G06Q10/06316 | Sequencing of tasks or work | 1.254 |
| H04L9/002 | Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441) | 1.254 |
| G06F21/577 | Assessing vulnerabilities and evaluating computer system security | 1.253 |
| G06F11/26 | Functional testing | 1.253 |
| G06F21/72 | in cryptographic circuits | 1.253 |
| H04L69/161 | Implementation details of TCP/IP or UDP/IP stack architecture| Specification of modified or new header fields | protocols engines in general | (ref: H04L69/12)| | OSI stack based layering aspects | (ref: H04L69/32)| | protocol header analysis in general | (ref: H04L69/22)| | addressing aspects in multiple interfaces involving dual-stack hosts | (ref: H04L61/6086) | 1.252 |
| H04L41/0645 | by additionally acting on or stimulating the network after receiving notifications | 1.252 |
| H04L63/0471 | applying encryption by an intermediary e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding | 1.251 |
| H04L65/1069 | Setup | computer conference organisation arrangements e.g. handling schedules setting up parameters needed by nodes to attend a conference booking network resources or notifying involved parties | (ref: H04L12/1818)| | admission control or resource reservation in packet switching networks | (ref: H04L47/70)| | arrangements for peer-to-peer networking in network applications | (ref: H04L67/104)| | session management in network applications | (ref: H04L67/14)| | negotiation of communication capabilities | (ref: H04L69/24) | 1.250 |
| H04L69/40 | Techniques for recovering from a failure of a protocol instance or entity e.g. failover routines service redundancy protocols protocol state redundancy or protocol service redirection in case of a failure or disaster recovery | network fault management | (ref: H04L41/06)| | route fault recovery in network routing | (ref: H04L45/28)| | fault recovery in packet switches | (ref: H04L49/557)| | reactions to failures of replicated servers by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | intermediate processing of oper | 1.248 |
| G06F8/427 | Parsing | 1.248 |
| G06F21/56 | Computer malware detection or handling e.g. anti-virus arrangements | 1.248 |
| H04L63/0209 | Architectural arrangements e.g. perimeter networks or demilitarized zones | 1.247 |
| G05B19/4184 | characterised by fault tolerance reliability of production system | 1.247 |
| H04L67/146 | Markers provided for unambiguous identification of a particular session e.g. session identifier session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08) | 1.245 |
| H04L69/03 | Protocol definition or specification | protocol conformance testing | (ref: H04L1/244)| | specification techniques | (ref: G06F8/10) | 1.245 |
| G06F9/4416 | Network booting| Remote initial program loading [RIPL] | 1.245 |
| G06F9/5038 | considering the execution order of a plurality of tasks e.g. taking priority or time dependency constraints into consideration | scheduling strategies | (ref: G06F9/4881)| and subgroups | 1.244 |
| G06Q30/0209 | Incentive being awarded or redeemed in connection with the playing of a video game | 1.242 |
| H04L63/12 | Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32) | 1.240 |
| G06F21/105 | Tools for software license management or administration e.g. managing licenses at corporate level | 1.240 |
| H04L41/5016 | based on statistics of service availability e.g. in percentage or over a given time | 1.240 |
| H04N7/147 | Communication arrangements e.g. identifying the communication as a video-communication intermediate storage of the signals | selecting | (ref: H04Q) | 1.239 |
| H04L65/403 | Arrangements for multiparty communication e.g. conference | television conferencing systems | (ref: H04N7/15)| | telephonic conference systems | (ref: H04M3/56)| | data switching systems for computer conference | (ref: H04L12/1813) | 1.239 |
| G06F12/0864 | using pseudo-associative means e.g. set-associative or hashing | 1.239 |
| G06F12/1027 | using associative or pseudo-associative address translation means e.g. translation look-aside buffer [TLB] | 1.239 |
| H04L49/90 | Queuing arrangements | 1.239 |
| G06F13/1694 | Configuration of memory controller to different memory types | 1.238 |
| H04W4/021 | Services related to particular areas e.g. point of interest [POI] services venue services or geofences | 1.238 |
| G06Q40/12 | Accounting | 1.237 |
| H04L67/1082 | involving incentive schemes | 1.237 |
| G06Q10/105 | Human resources | 1.236 |
| G06F12/0842 | for multiprocessing or multitasking | 1.234 |
| H04L47/82 | Miscellaneous aspects | 1.234 |
| H04L67/1014 | based on the content of a request | 1.233 |
| G06Q20/3226 | Use of secure elements separate from M-devices | 1.232 |
| H03M13/09 | Error detection only e.g. using cyclic redundancy check [CRC] codes or single parity bit | error detection or correction by redundancy in data representation | (ref: G06F11/08) | 1.231 |
| H03M13/154 | Error and erasure correction e.g. by using the error and erasure locator or Forney polynomial | 1.231 |
| G06N3/082 | modifying the architecture e.g. adding or deleting nodes or connections pruning | 1.229 |
| G06Q20/02 | involving a neutral party e.g. certification authority notary or trusted third party [TTP] | 1.227 |
| G06F21/6272 | by registering files or documents with a third party | 1.226 |
| H04L9/0844 | with user authentication or key authentication e.g. ElGamal MTI MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys | 1.226 |
| H04W4/029 | Location-based management or tracking services | 1.224 |
| G06F21/31 | User authentication | 1.224 |
| G06F3/167 | Audio in a user interface e.g. using voice commands for navigating audio feedback | 1.224 |
| G06F21/552 | involving long-term monitoring or reporting | 1.223 |
| H04W4/44 | for communication between vehicles and infrastructures e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H] | 1.223 |
| G06F9/30101 | Special purpose registers | 1.223 |
| G06F9/30145 | Instruction analysis e.g. decoding instruction word fields | 1.223 |
| A63F13/75 | Enforcing rules e.g. detecting foul play or generating lists of cheating players | 1.222 |
| A63F13/792 | for payment purposes e.g. monthly subscriptions | 1.222 |
| H04L9/3221 | interactive zero-knowledge proofs | 1.222 |
| H04L9/085 | Secret sharing or secret splitting e.g. threshold schemes | 1.222 |
| H04W12/10 | Integrity | 1.222 |
| G06Q10/103 | Workflow collaboration or project management | 1.221 |
| G06F3/1204 | resulting in reduced user or operator actions e.g. presetting automatic actions using hardware token storing data | 1.221 |
| G06F3/1203 | Improving or facilitating administration e.g. print management | 1.221 |
| G06F3/1288 | in client-server-printer device configuration | 1.221 |
| G06F15/00 | Digital computers in general | details | (ref: G06F1/00)| – | (ref: G06F13/00)| Data processing equipment in general | 1.220 |
| H04L12/4641 | Virtual LANs VLANs e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00) | 1.220 |
| G06F11/3093 | Configuration details thereof e.g. installation enabling spatial arrangement of the probes | 1.219 |
| H04L67/06 | adapted for file transfer e.g. file transfer protocol [FTP] | 1.219 |
| G06F9/4812 | by interrupt e.g. masked | 1.219 |
| G06F21/554 | involving event detection and direct action | 1.219 |
| H04L51/00 | Arrangements for user-to-user messaging in packet-switching networks e.g. e-mail or instant messages | 1.218 |
| G06F8/20 | Software design | 1.217 |
| G06F8/433 | Dependency analysis| Data or control flow analysis | 1.217 |
| H04L63/14 | for detecting or protecting against malicious traffic | 1.217 |
| H04L67/2885 | Hierarchically arranged intermediate devices e.g. hierarchical caching | 1.216 |
| G06F21/572 | Secure firmware programming e.g. of basic input output system [BIOS] | 1.216 |
| G06Q20/3567 | Software being in the reader | 1.215 |
| G06F8/4443 | Inlining | 1.215 |
| H04L63/0861 | using biometrical features e.g. fingerprint retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231) | 1.215 |
| G06K9/628 | Multiple classes | 1.215 |
| G06T19/20 | Editing of 3D images e.g. changing shapes or colours aligning objects or positioning parts | 1.215 |
| H04L67/1004 | Server selection in load balancing | 1.215 |
| H04L12/189 | in combination with wireless systems | selective distribution or broadcast in wireless communication networks | (ref: H04W4/06) | 1.215 |
| H04L41/0853 | by actively collecting or retrieving configuration information | 1.214 |
| G06F21/74 | operating in dual or compartmented mode i.e. at least one secure mode | 1.213 |
| H04W76/45 | for Push-to-Talk [PTT] or Push-to-Talk over cellular [PoC] services | 1.212 |
| H04W4/10 | Push-to-Talk [PTT] or Push-On-Call services | 1.212 |
| A63F13/358 | Adapting the game course according to the network or server load e.g. for reducing latency due to different connection speeds between clients | 1.212 |
| G06F9/30047 | Prefetch instructions| cache control instructions | 1.212 |
| G06F12/0817 | using directory methods | 1.212 |
| G06F12/0828 | with concurrent directory accessing i.e. handling multiple concurrent coherency transactions | 1.212 |
| G06F21/6281 | at program execution time where the protection is within the operating system | 1.212 |
| H04L67/101 | based on network conditions | 1.212 |
| H04L65/80 | QoS aspects | monitoring of the downstream path of a video distribution network | (ref: H04N21/2402)| | (ref: H04N21/44209)| | network service management ensuring proper service fulfillment according to an agreement or contract between two parties e.g. between an IT-provider and a customer | (ref: H04L41/50)| | monitoring arrangements testing arrangements with monitoring of QoS metrics | (ref: H04L43/08)| | traffic-type related flow control in packet switching networks e.g. priorities or QoS | (ref: H04L47/24)| | admission control/resource reservation in packet switching networks based | 1.212 |
| H04L45/34 | Source routing | 1.212 |
| G06Q20/4016 | involving fraud or risk level assessment in transaction processing | 1.211 |
| H04L67/1008 | based on parameters of servers e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505) | 1.210 |
| G10L15/22 | Procedures used during a speech recognition process e.g. man-machine dialogue | 1.208 |
| B60W50/06 | Improving the dynamic response of the control system e.g. improving the speed of regulation or avoiding hunting or overshoot | 1.208 |
| G06F9/44526 | Plug-ins| Add-ons | 1.208 |
| H04L63/126 | the source of the received data | 1.208 |
| G06F9/44521 | Dynamic linking or loading| Link editing at or after load time e.g. Java class loading | 1.208 |
| H04N21/632 | using a connection between clients on a wide area network e.g. setting up a peer-to-peer communication via Internet for retrieving video segments from the hard-disk of other client devices | broadcast-related systems characterised by transmission among terminal devices | (ref: H04H60/80)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306) | 1.208 |
| H04N21/466 | Learning process for intelligent management e.g. learning user preferences for recommending movies | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | computer systems using learning methods | (ref: G06N3/08)| | services using the results of monitoring in broadcast systems | (ref: H04H60/61) | 1.208 |
| G06T19/006 | Mixed reality | object pose determination tracking or camera calibration for mixed reality | (ref: G06T7/00) | 1.208 |
| G06F8/443 | Optimisation | 1.207 |
| G06F9/455 | Emulation| Interpretation| Software simulation e.g. virtualisation or emulation of application or operating system execution engines | 1.207 |
| G06F9/45533 | Hypervisors| Virtual machine monitors | 1.207 |
| G06F3/0622 | in relation to access | 1.207 |
| G06Q50/18 | Legal services| Handling legal documents | 1.207 |
| G06F21/30 | Authentication i.e. establishing the identity or authorisation of security principals | 1.206 |
| G06F21/445 | by mutual authentication e.g. between devices or programs | 1.206 |
| H04M15/51 | for resellers retailers or service providers | 1.206 |
| H04L45/121 | Minimizing delay | 1.206 |
| H04L43/0864 | Round trip delays | 1.206 |
| H04L47/781 | Centralized allocation of resource | 1.205 |
| H04L12/2834 | Switching of information between an external network and a home network | access arrangements | (ref: H04L12/2856) | 1.205 |
| H04W88/16 | Gateway arrangements | 1.205 |
| H04L9/083 | involving central third party e.g. key distribution center [KDC] or trusted third party [TTP] | 1.205 |
| G06F11/3409 | for performance assessment | 1.205 |
| G06F9/548 | Object oriented| Remote method invocation [RMI] | non-remote method invocation | (ref: G06F9/449) | 1.204 |
| G06F9/5011 | the resources being hardware resources other than CPUs Servers and Terminals | 1.203 |
| G06T13/40 | of characters e.g. humans animals or virtual beings | 1.203 |
| H04L51/04 | Real-time or near real-time messaging e.g. instant messaging [IM] | network arrangements or protocols for real-time communications | (ref: H04L65/00) | 1.202 |
| G06F12/1072 | Decentralised address translation e.g. in distributed shared memory systems | 1.202 |
| G06F13/404 | with address mapping | 1.202 |
| G06F9/48 | Program initiating| Program switching e.g. by interrupt | 1.202 |
| H04L63/123 | received data contents e.g. message integrity | 1.201 |
| G06F12/126 | with special data handling e.g. priority of data or instructions handling errors or pinning | 1.201 |
| G06F12/0808 | with cache invalidating means | (ref: G06F12/0815)| takes precedence | 1.201 |
| G06F21/121 | Restricting unauthorised execution of programs | 1.199 |
| G06F9/5066 | Algorithms for mapping a plurality of inter-dependent sub-tasks onto a plurality of physical CPUs | mappping at compile time | see| | (ref: G06F8/451) | 1.198 |
| H04M15/64 | On-line charging system [OCS] | 1.197 |
| H04N21/4782 | Web browsing | e.g. WebTV | information retrieval from the Internet | (ref: G06F17/30861)| | protocols for network applications involving the use of web-based technology | (ref: H04L29/0809) | 1.197 |
| H04L43/0811 | Connectivity | 1.196 |
| H04N21/84 | Generation or processing of descriptive data e.g. content descriptors | systems specially adapted for using meta-information in broadcast systems | (ref: H04H60/73) | 1.196 |
| H04L45/02 | Topology update or discovery | topology discovery for network management | (ref: H04L41/12)| | LAN interconnection over a backbone network | (ref: H04L12/4604)| | node-based peer discovery mechanisms in peer-to-peer networks | (ref: H04L67/1061) | 1.195 |
| H04N21/23418 | involving operations for analysing video streams e.g. detecting features or characteristics | filtering for image enhancement | (ref: G06T5/00)| | methods or arrangements for recognising scenes | (ref: G06K9/00624)| | arrangements characterised by components specially adapted for monitoring identification or recognition of video in broadcast systems | (ref: H04H60/59)| | television picture signal circuitry for scene change detection | (ref: H04N5/147) | 1.195 |
| H04N21/2225 | Local VOD servers | 1.195 |
| H04N21/2393 | involving handling client requests | scheduling and organising the servicing of requests in data switching networks | (ref: H04L29/08945) | 1.195 |
| G06Q10/107 | Computer aided management of electronic mail | electronic mail protocols | (ref: H04L29/06)| | arrangements for user-to-user messaging in packet-switching networks e.g. e-mail or instant messages | (ref: H04L41/00) | 1.192 |
| H04L9/0618 | Block ciphers i.e. encrypting groups of characters of a plain text message using fixed encryption transformation | 1.190 |
| G06F3/062 | Securing storage systems | 1.190 |
| G06F21/55 | Detecting local intrusion or implementing counter-measures | 1.190 |
| G06F21/51 | at application loading time e.g. accepting rejecting starting or inhibiting executable software based on integrity or source reliability | 1.189 |
| H04L63/101 | Access control lists [ACL] | 1.188 |
| G06F9/4403 | Processor initialisation | 1.188 |
| H04W12/08 | Access security | 1.185 |
| H04L12/4604 | LAN interconnection over a backbone network e.g. Internet Frame Relay | 1.184 |
| H04L41/12 | network topology discovery or management | topology discovery for routing | (ref: H04L45/02) | 1.184 |
| H04W4/50 | Service provisioning or reconfiguring | 1.184 |
| G06F11/1433 | during software upgrading | 1.184 |
| G06T1/60 | Memory management | 1.184 |
| G06N7/02 | using fuzzy logic | (ref: G06N3/00)| | (ref: G06N5/00)| take precedence| for adaptive control | (ref: G05B13/00) | 1.184 |
| H04L9/3218 | using proof of knowledge e.g. Fiat-Shamir GQ Schnorr ornon-interactive zero-knowledge proofs | 1.184 |
| G05B19/41845 | characterised by system universality reconfigurability modularity | 1.183 |
| H04L41/142 | using statistical or mathematical methods | 1.182 |
| H04L41/14 | involving network analysis or design e.g. simulation network model or planning | network monitoring | (ref: H04L43/00) | 1.182 |
| G06F9/4482 | Procedural | 1.182 |
| H04W8/183 | Processing at user equipment or user record carrier | 1.182 |
| H04N21/23439 | for generating different versions | 1.182 |
| G06Q10/06313 | Resource planning in a project environment | 1.182 |
| G06Q10/1095 | Meeting or appointment | 1.182 |
| H04L67/1023 | based on other criteria e.g. hash applied to IP address specific algorithms or cost | 1.181 |
| H04L12/4633 | Interconnection of networks using encapsulation techniques e.g. tunneling | 1.180 |
| G06F3/1454 | involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays e.g. teledisplay | 1.180 |
| G06Q30/0201 | Market data gathering market analysis or market modelling | 1.180 |
| G06F9/465 | Distributed object oriented systems | remote method invocation [RMI] | (ref: G06F9/548) | 1.179 |
| G06F21/60 | Protecting data | 1.179 |
| G06F8/4452 | Software pipelining | 1.177 |
| G06Q50/265 | Personal security identity or safety | 1.177 |
| G08G1/0112 | from the vehicle e.g. floating car data [FCD] | 1.177 |
| G06F21/88 | Detecting or preventing theft or loss | 1.177 |
| G06F12/1425 | the protection being physical e.g. cell word block | 1.176 |
| G06Q10/00 | Administration| Management | 1.176 |
| B60W30/08 | Active safety systems| predicting or avoiding probable or impending collision | or attempting to minimise its consequences | 1.176 |
| H04L12/1827 | Network arrangements for conference optimisation or adaptation | 1.175 |
| H04L47/828 | Allocation of resources per group of connections e.g. per group of users | 1.175 |
| G06Q10/0631 | Resource planning allocation or scheduling for a business operation | 1.175 |
| G06F15/16 | Combinations of two or more digital computers each having at least an arithmetic unit a program unit and a register e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B) | 1.175 |
| G06Q30/06 | Buying selling or leasing transactions | 1.174 |
| G07C5/0808 | Diagnosing performance data | testing of vehicles | (ref: G01M17/00)| | testing of electrical installation on vehicles | (ref: G01R31/005) | 1.174 |
| G06F12/1045 | associated with a data cache | 1.174 |
| G06F21/604 | Tools and structures for managing or administering access control systems | 1.173 |
| G06F11/3079 | the data filtering being achieved by reporting only the changes of the monitored data | 1.173 |
| G05B19/4185 | characterised by the network communication | 1.173 |
| G06T19/00 | Manipulating 3D models or images for computer graphics | 1.172 |
| G06N3/0454 | using a combination of multiple neural nets | 1.172 |
| H04N21/8549 | Creating video summaries e.g. movie trailer | retrieval in video databases by using presentations in form of a video summary | (ref: G06F17/30843) | 1.171 |
| H04N21/23424 | involving splicing one content stream with another content stream e.g. for inserting or substituting an advertisement | 1.171 |
| G06F12/0238 | Memory management in non-volatile memory e.g. resistive RAM or ferroelectric memory | 1.171 |
| G06F12/0253 | Garbage collection i.e. reclamation of unreferenced memory | 1.171 |
| H04L41/0246 | exchanging or transporting network management information using Internet e.g. aspects relating to embedding network management web servers in network elements web service for network management purposes aspects related to Internet applications or services or web-based protocols simple object access protocol [SOAP] | web-based network application protocols | (ref: H04L67/02)| | web-based network application protocols for remote control of end-devices or monitoring of remote application data | (ref: H04L67/025)| | proprietary application protocols for remote control of end-devices in special | 1.171 |
| H04L41/0866 | Checking configuration | 1.171 |
| B25J9/1671 | characterised by simulation either to verify existing program or to create and verify new program CAD/CAM oriented graphic oriented programming systems | 1.171 |
| G06F15/161 | Computing infrastructure e.g. computer clusters blade chassis or hardware partitioning | casings cabinets racks or drawers for data centers | (ref: H05K5/00) | 1.170 |
| H04B7/088 | using beam selection | 1.169 |
| G06Q20/3224 | Transactions dependent on location of M-devices | 1.169 |
| G06F21/12 | Protecting executable software | 1.167 |
| H04L47/283 | Network and process delay e.g. jitter or round trip time [RTT] | 1.167 |
| G06F21/645 | using a third party | 1.166 |
| H04L67/288 | Distributed intermediate devices i.e. intermediate device interaction with other intermediate devices on the same level | 1.166 |
| H04N21/2541 | Rights Management | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08) | 1.166 |
| H04N21/25841 | involving the geographical location of the client | retrieval from the Internet by querying based on geographical locations | (ref: G06F17/3087)| | arrangements for identifying locations of receiving stations in broadcast systems | (ref: H04H60/51)| | protocols in which the network application is adapted for the location of the user terminal in communication control or processing | (ref: H04L29/08657)| | services making use of the location of users or terminals in wireless networks | (ref: H04W4/02)| | locating users or terminals in wireless networks | (ref: H04W64/00) | 1.166 |
| G06F8/52 | Binary to binary | 1.164 |
| H04W4/08 | User group management | 1.164 |
| H04W8/26 | Network addressing or numbering for mobility support | 1.164 |
| H04W8/186 | Processing of subscriber group data | 1.164 |
| H04L43/026 | using flow generation | 1.164 |
| G06K7/1417 | 2D bar codes | 1.163 |
| G06Q10/087 | Inventory or stock management e.g. order filling procurement balancing against orders | 1.163 |
| H04L65/1083 | In-session procedures | computer conferences network arrangements for conference optimisation or adaptation | (ref: H04L12/1827)| | reactions to resource unavailability in packet switching networks | (ref: H04L47/74)| | reallocation or renegotiation of resources in packet switching networks | (ref: H04L47/76) | 1.163 |
| G06F21/32 | using biometric data e.g. fingerprints iris scans or voiceprints | 1.162 |
| H04L61/2514 | between local and global IP addresses | 1.162 |
| B60R25/252 | Fingerprint recognition | 1.162 |
| B60R25/25 | using biometry | 1.162 |
| G06Q50/10 | Services | 1.161 |
| G06F11/1658 | Data re-synchronization of a redundant component or initial sync of replacement additional or spare unit | 1.161 |
| A63F13/35 | Details of game servers | 1.161 |
| H04L63/145 | the attack involving the propagation of malware through the network e.g. viruses trojans or worms | 1.160 |
| G06Q30/018 | Business or product certification or verification | 1.160 |
| G06F21/36 | by graphic or iconic representation | 1.160 |
| H04L65/4053 | without floor control | 1.160 |
| G06F12/0895 | of parts of caches e.g. directory or tag array | 1.159 |
| G06F12/1441 | for a range | 1.159 |
| G06F8/751 | Code clone detection | 1.159 |
| H04L9/321 | involving a third party or a trusted authority | 1.158 |
| G07C9/00174 | Electronically operated locks| Circuits therefor| Nonmechanical keys therefor e.g. passive or active electrical keys or other data carriers without mechanical keys | mechanical locks with electric permutation | (ref: E05B49/00)| | arrangements for sensing or reading record carriers | (ref: G06K7/00)| | (ref: G06K9/00)| | electronic switching | (ref: H03K17/00) | 1.158 |
| H04L63/104 | Grouping of entities | 1.158 |
| G06F9/50 | Allocation of resources e.g. of the central processing unit [CPU] | 1.156 |
| G06Q20/389 | Keeping log of transactions for guaranteeing non-repudiation of a transaction | 1.155 |
| G06Q20/3274 | using a pictured code e.g. barcode or QR-code being displayed on the M-device | 1.155 |
| G06F9/542 | Event management| Broadcasting| Multicasting| Notifications | 1.155 |
| H04L43/0876 | Network utilization | 1.154 |
| H04L41/0816 | due to adaptation e.g. in response to network events | 1.154 |
| H04L63/1491 | using deception as countermeasure e.g. honeypots honeynets decoys or entrapment | 1.154 |
| G06Q30/0243 | Comparative campaigns | 1.153 |
| G06Q20/3827 | Use of message hashing | 1.152 |
| G09B7/02 | of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student | 1.152 |
| H04L45/44 | Distributed routing | 1.151 |
| G05B19/418 | Total factory control i.e. centrally controlling a plurality of machines e.g. direct or distributed numerical control [DNC] flexible manufacturing systems [FMS] integrated manufacturing systems [IMS] computer integrated manufacturing [CIM] | 1.151 |
| G05B19/41865 | characterised by job scheduling process planning material flow | 1.151 |
| G05D1/0088 | characterized by the autonomous decision making process e.g. artificial intelligence predefined behaviours | using knowledge based models | (ref: G06N5/00) | 1.151 |
| G06F8/34 | Graphical or visual programming | 1.151 |
| G06F8/70 | Software maintenance or management | 1.151 |
| G06N5/04 | Inference methods or devices | 1.150 |
| G06F3/0484 | for the control of specific functions or operations e.g. selecting or manipulating an object or an image setting a parameter value or selecting a range | 1.150 |
| G06F12/0871 | Allocation or management of cache space | 1.149 |
| G06F12/0886 | Variable-length word access | 1.149 |
| G06F21/78 | to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00) | 1.149 |
| G11C11/40603 | Arbitration priority and concurrent access to memory cells for read/write or refresh operations | 1.149 |
| G06F3/067 | Distributed or networked storage systems e.g. storage area networks [SAN] network attached storage [NAS] | 1.149 |
| G06F7/57 | Arithmetic logic units [ALU] i.e. arrangements or devices for performing two or more of the operations covered by groups | (ref: G06F7/483)| - | (ref: G06F7/556)| or for performing logical operations | instruction execution | (ref: G06F9/30)| | (ref: G06F7/49)| | (ref: G06F7/491)| take precedence| logic gate circuits | (ref: H03K19/00) | 1.147 |
| G06F9/3001 | Arithmetic instructions | 1.147 |
| G06F7/483 | Computations with numbers represented by a non-linear combination of denominational numbers e.g. rational numbers logarithmic number system floating-point numbers | conversion to or from floating-point codes | (ref: H03M7/24)| | (ref: G06F7/4806)| | (ref: G06F7/4824)| | (ref: G06F7/49)| | (ref: G06F7/491)| | (ref: G06F7/544)| take precedence | 1.147 |
| H04N21/47202 | for requesting content on demand e.g. video on demand | 1.145 |
| H04N21/25808 | Management of client data | protocols involving terminal profiles for network applications in communication control or processing | (ref: H04L29/08927) | 1.143 |
| G06F15/167 | using a common memory e.g. mailbox | 1.141 |
| H04L41/0886 | Fully automatic configuration | 1.140 |
| G16H30/40 | for processing medical images e.g. editing | 1.140 |
| G16H10/20 | for electronic clinical trials or questionnaires | 1.140 |
| H04W36/18 | for allowing seamless reselection e.g. soft reselection | 1.139 |
| H04W84/12 | WLAN [Wireless Local Area Networks] | 1.139 |
| H04W36/06 | Reselecting a communication resource in the serving access point | 1.139 |
| G06Q20/12 | specially adapted for electronic shopping systems | 1.138 |
| G06Q20/3821 | Electronic credentials | 1.138 |
| G06F12/0897 | with two or more cache hierarchy levels | with multilevel cache hierarchies | (ref: G06F12/0811) | 1.138 |
| G06F12/0804 | with main memory updating | (ref: G06F12/0806)| takes precedence | 1.138 |
| G06F9/546 | Message passing systems or structures e.g. queues | 1.137 |
| G06Q10/0832 | Special goods or special handling procedures | 1.137 |
| G06Q20/145 | Payments according to the detected use or quantity | 1.137 |
| G06F3/0613 | in relation to throughput | 1.137 |
| G05B23/0291 | Switching into safety or degraded mode e.g. protection and supervision after failure | 1.135 |
| H04L67/104 | for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer upload download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r | 1.131 |
| H04L49/356 | Storage area network switches | 1.131 |
| G06F15/17331 | Distributed shared memory [DSM] e.g. remote direct memory access [RDMA] | 1.131 |
| H04L49/9063 | Intermediate storage in different physical parts of a node or terminal | 1.131 |
| G06F11/3414 | Workload generation e.g. scripts playback | 1.131 |
| G06Q30/0621 | Item configuration or customization | 1.131 |
| G06F13/20 | for access to input/output bus | 1.131 |
| G06F8/38 | for implementing user interfaces | 1.130 |
| G06F11/362 | Software debugging | 1.129 |
| G10L17/00 | Speaker identification or verification | 1.129 |
| G10L17/04 | Training enrolment or model building | 1.129 |
| H04L63/04 | for providing a confidential data exchange among entities communicating through data packet networks | 1.128 |
| G06F13/1689 | Synchronisation and timing concerns | synchronisation on a memory bus | (ref: G06F13/4234) | 1.128 |
| H04M3/42042 | Notifying the called party of information on the calling party | details within substation equipment | (ref: H04M1/57)| signalling details | (ref: H04Q3/72) | 1.128 |
| G06F9/522 | Barrier synchronisation | 1.128 |
| G06Q20/4018 | using the card verification value [CVV] associated with the card | 1.128 |
| G06F21/41 | where a single sign-on provides access to a plurality of computers | 1.128 |
| G06F21/562 | Static detection | 1.127 |
| G06Q20/065 | using e-cash | 1.126 |
| H04W64/00 | Locating users or terminals | or network equipment| for network management purposes e.g. mobility management | 1.125 |
| H04W36/08 | Reselecting an access point | 1.125 |
| H04L63/1483 | service impersonation e.g. phishing pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12) | 1.125 |
| G16H10/60 | for patient-specific data e.g. for electronic patient records | 1.124 |
| G16H20/10 | relating to drugs or medications e.g. for ensuring correct administration to patients | 1.124 |
| H04N21/23892 | involving embedding information at multiplex stream level e.g. embedding a watermark at packet level | 1.123 |
| H04N21/4353 | involving decryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23) | 1.123 |
| G06F21/16 | Program or content traceability e.g. by watermarking | digital watermarking on images | (ref: H04N1/32) | 1.123 |
| G06F9/468 | Specific access rights for resources e.g. using capability register | 1.123 |
| G06F12/1081 | for peripheral access to main memory e.g. direct memory access [DMA] | 1.123 |
| H04L63/065 | for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833) | 1.123 |
| G06Q20/42 | Confirmation e.g. check or permission by the legal debtor of payment | 1.123 |
| G06F3/017 | Gesture based interaction e.g. based on a set of recognized hand gestures | interaction based on gestures traced on a digitiser | (ref: G06F3/04883) | 1.123 |
| G06F3/0346 | with detection of the device orientation or free movement in a 3D space e.g. 3D mice 6-DOF [six degrees of freedom] pointers using gyroscopes accelerometers or tilt-sensors | 1.123 |
| G06F11/3644 | by instrumenting at runtime | 1.123 |
| H04L69/165 | involving combined use or selection criteria between TCP and UDP protocols | multi-protocol arrangements in general | (ref: H04L69/18)| | multilink protocols in general | (ref: H04L69/14) | 1.122 |
| H04L45/00 | Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00) | 1.122 |
| H04L63/0442 | wherein the sending and receiving network entities apply asymmetric encryption i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30) | 1.122 |
| H04L45/306 | Route determination based on the nature of the carried application | communications protocols whereby the routing of a service request to a node providing the service depends on the content or context of the request e.g. profile connectivity status | (ref: H04L67/327) | 1.122 |
| G10L15/1822 | Parsing for meaning understanding | 1.120 |
| G10L15/1815 | Semantic context e.g. disambiguation of the recognition hypotheses based on word meaning | 1.120 |
| H04L12/44 | Star or tree networks | 1.120 |
| H04M7/1295 | Details of dual tone multiple frequency signalling | 1.119 |
| H04M3/533 | Voice mail systems | 1.119 |
| G06F11/3664 | Environments for testing or debugging software | 1.118 |
| G06Q20/3825 | Use of electronic signatures | 1.118 |
| G06F21/563 | by source code analysis | 1.118 |
| G06F9/52 | Program synchronisation| Mutual exclusion e.g. by means of semaphores | 1.118 |
| G06F21/35 | communicating wirelessly | 1.117 |
| G06F8/4434 | Reducing the memory space required by the program code | 1.117 |
| G06F12/0822 | Copy directories | local copy tags for implementing a bus snooping protocol | (ref: G06F12/0831) | 1.117 |
| H04L43/04 | Processing of captured monitoring data | 1.116 |
| G06F21/00 | Security arrangements for protecting computers components thereof programs or data against unauthorised activity | 1.116 |
| H04L63/1466 | Active attacks involving interception injection modification spoofing of data unit addresses e.g. hijacking packet injection or TCP sequence number attacks | 1.116 |
| A63F13/327 | using wireless networks e.g. Wi-Fi or piconet | 1.116 |
| H04L63/045 | wherein the sending and receiving network entities apply hybrid encryption i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14) | 1.115 |
| G06F11/0793 | Remedial or corrective actions | by retry | (ref: G06F11/1402)| | recovery from an exception in an instruction pipeline | (ref: G06F9/3861)| | in a network context | (ref: H04L29/14) | 1.115 |
| G06F11/0769 | Readable error formats e.g. cross-platform generic formats human understandable formats | 1.115 |
| H04L63/02 | for separating internal from external traffic e.g. firewalls | 1.115 |
| G08G3/00 | Traffic control systems for marine craft | marking of navigational route | (ref: B63B22/16)| | (ref: B63B51/00) | 1.114 |
| G06F12/1408 | by using cryptography | for digital transmission | (ref: H04L9/00) | 1.114 |
| G06Q20/16 | Payments settled via telecommunication systems | 1.113 |
| G05B19/4183 | characterised by data acquisition e.g. workpiece identification | 1.113 |
| G05B23/0272 | Presentation of monitored results e.g. selection of status reports to be displayed| Filtering information to the user | 1.113 |
| G06Q30/02 | Marketing e.g. market research and analysis surveying promotions advertising buyer profiling customer management or rewards| Price estimation or determination | 1.113 |
| G06F9/3887 | controlled by a single instruction e.g. SIMD | 1.112 |
| G06F9/3851 | from multiple instruction streams e.g. multistreaming | initiation or dispatching of multiple tasks or threads | (ref: G06F9/48) | 1.112 |
| G06F9/45516 | Runtime code conversion or optimisation | 1.112 |
| G06F3/162 | Interface to dedicated audio devices e.g. audio drivers interface to CODECs | 1.111 |
| G06F3/0611 | in relation to response time | 1.111 |
| G06F17/40 | Data acquisition and logging | for input to computer | (ref: G06F3/00)| | | displays as computer output | (ref: G06F3/14)| | for image data processing | (ref: G06T9/00)| | compression in general | (ref: H03M7/30)| | for transmission | (ref: H04B1/66)| | for pictorial communication | (ref: H04N)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station | (ref: H04Q9/00) | 1.111 |
| G06Q20/14 | specially adapted for billing systems | 1.111 |
| G06F9/30134 | Register stacks| shift registers | 1.111 |
| H04L9/3252 | using DSA or related signature schemes e.g. elliptic based signatures ElGamal or Schnorr schemes | 1.110 |
| G06F12/1491 | in a hierarchical protection system e.g. privilege levels memory rings | 1.109 |
| G06Q10/06 | Resources workflows human or project management e.g. organising planning scheduling or allocating time human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06) | 1.109 |
| H04L63/107 | wherein the security policies are location-dependent e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals | 1.109 |
| B66B1/3461 | between the elevator control system and remote or mobile stations | 1.109 |
| G06F9/5044 | considering hardware capabilities | 1.109 |
| G06F9/30003 | Arrangements for executing specific machine instructions | 1.109 |
| H04N21/8352 | involving content or source identification data e.g. Unique Material Identifier [UMID] | 1.109 |
| H04W8/205 | Transfer to or from user equipment or user record carrier | 1.108 |
| H04W8/20 | Transfer of user or subscriber data | 1.108 |
| H04W8/24 | Transfer of terminal data | 1.108 |
| H04N21/4755 | for defining user preferences e.g. favourite actors or genre | retrieval personalisation and generation of user profiles for the retrieval of video data | (ref: G06F17/30843)| | data switching network applications using user profiles | (ref: H04L29/08936) | 1.107 |
| G06F11/079 | Root cause analysis i.e. error or fault diagnosis | in a hardware test environment | (ref: G06F11/22)| | in a software test environment | (ref: G06F11/36) | 1.106 |
| G06F11/0709 | in a distributed system consisting of a plurality of standalone computer nodes e.g. clusters client-server systems | 1.106 |
| G06F3/011 | Arrangements for interaction with the human body e.g. for user immersion in virtual reality | for handicapped people in general | (ref: A61F4/00)| | robot control | (ref: B25J)| | tactile signalling | (ref: G08B)| | blind teaching | (ref: G09B21/00)| | for electrophonic musical instruments | (ref: G10H1/344)| | electronic switches characterised by the way in which the control signals are generated | (ref: H03K17/94) | 1.106 |
| G06T17/20 | Finite element generation e.g. wire-frame surface description | tesselation | 1.106 |
| H04L41/5041 | Service implementation | 1.105 |
| H04L41/0813 | Changing of configuration | 1.105 |
| H04N21/816 | involving special video data e.g 3D video | 1.105 |
| G06F11/3612 | by runtime analysis | performance monitoring | (ref: G06F11/3466) | 1.105 |
| G06F12/109 | for multiple virtual address spaces e.g. segmentation | (ref: G06F12/1036)| takes precedence | 1.105 |
| H04N21/26258 | for generating a list of items to be played back in a given order e.g. playlist or scheduling item distribution according to such list | retrieval of multimedia data based on playlists | (ref: G06F17/30017) | 1.104 |
| H04N21/812 | involving advertisement data | advertising | per se| | (ref: G06Q30/02) | 1.104 |
| G06T7/50 | Depth or shape recovery | 1.104 |
| G06T7/536 | from perspective effects e.g. by using vanishing points | 1.104 |
| G06N3/08 | Learning methods | 1.104 |
| G06F1/3206 | Monitoring a parameter a device or an event triggering a change in power modality | 1.103 |
| G06F1/3237 | Power saving by disabling clock generation or distribution | 1.103 |
| H04W28/0268 | using specific QoS parameters for wireless networks e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR] | negotiating SLA or negotiating QoS | (ref: H04W28/24) | 1.103 |
| G05B19/056 | Programming the PLC | 1.102 |
| G06F13/4282 | on a serial bus e.g. I2C bus SPI bus | on daisy chain buses | (ref: G06F13/4247) | 1.102 |
| G06F13/4027 | using bus bridges | (ref: G06F13/4022)| takes precedence | 1.102 |
| G06F13/4295 | using an embedded synchronisation | 1.102 |
| G06F13/40 | Bus structure | for computer networks | (ref: G06F15/163)| | for optical bus networks | (ref: H04B10/25) | 1.102 |
| G06F13/4265 | on a point to point bus | (ref: G06F13/4247)| | (ref: G06F13/4282)| take precedence | 1.102 |
| H04L47/125 | Load balancing e.g. traffic engineering | load balancing among servers | (ref: H04L67/1002) | 1.102 |
| G06F13/4022 | using switching circuits e.g. switching matrix connection or expansion network | (ref: G06F13/4009)| takes precedence | 1.101 |
| H04W28/0289 | Congestion control | performing reselection for handling the traffic | (ref: H04W36/22)| | load shedding arrangements in network planning | (ref: H04W16/08)| | dynamic wireless traffic scheduling | (ref: H04W72/12) | 1.101 |
| H04L47/33 | Forward notification | 1.101 |
| H04N19/513 | Processing of motion vectors | 1.101 |
| H02J3/32 | using batteries with converting means | 1.101 |
| G05B19/41885 | characterised by modeling simulation of the manufacturing system | 1.100 |
| A63F13/34 | using peer-to-peer connections | 1.100 |
| G06F9/544 | Buffers| Shared memory| Pipes | 1.099 |
| H04W24/08 | Testing | supervising or monitoring| using real traffic | 1.099 |
| H04W48/17 | Selecting a data network PoA [Point of Attachment] | 1.099 |
| H04W36/0016 | for hand-off preparation | 1.099 |
| H04W48/16 | Discovering processing access restriction or access information | 1.099 |
| H04W4/023 | using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds | 1.099 |
| G16H40/67 | for remote operation | 1.098 |
| H04N21/4725 | using interactive regions of the image e.g. hot spots | details of information retrieval from the Internet by using URLs | (ref: G06F17/30876)| | processing chained hypermedia data for information retrieval | (ref: G06F17/30014) | 1.098 |
| H04N21/4621 | Controlling the complexity of the content stream or additional data e.g. lowering the resolution or bit-rate of the video stream for a mobile client with a small screen | arrangements for using the results of monitoring on user's side in broadcast systems | (ref: H04H60/65)| | flow control in packet networks | (ref: H04L47/10) | 1.097 |
| H04L47/783 | Distributed allocation of resources e.g. bandwidth brokers | 1.097 |
| G06F21/575 | Secure boot | 1.097 |
| H04W28/0273 | adapting protocols for flow control or congestion control to wireless environment e.g. adapting transmission control protocol [TCP] | wireless network protocols or protocol adaptations to wireless operation e.g. wireless application protocol | (ref: H04W80/00) | 1.096 |
| H04Q9/00 | Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom | 1.095 |
| H04M3/42059 | Making use of the calling party identifier | 1.095 |
| H04W28/10 | Flow control | between communication endpoints | 1.095 |
| G06F9/4451 | User profiles roaming | user profiles for network-specific applications | (ref: H04L67/306) | 1.095 |
| G06F9/45504 | Abstract machines for programme code execution e.g. Java virtual machine [JVM] interpreters emulators | 1.095 |
| H04L43/045 | for graphical visualization of monitoring data | graphical user interfaces | (ref: H04L41/22)| | display of network or application conditions affecting the network application to the application user | (ref: H04L67/36)| | visual indication of the functioning of a computing machine | (ref: G06F11/32) | 1.095 |
| H04W84/045 | using private Base Stations e.g. femto Base Stations home Node B | 1.094 |
| H04W4/40 | for vehicles e.g. vehicle-to-pedestrians [V2P] | 1.094 |
| H04L67/2866 | Architectural aspects | 1.094 |
| H04L65/103 | in the network | 1.094 |
| E21B41/00 | Equipment or details not covered by groups | (ref: E21B15/00)| Â -Â | (ref: E21B40/00) | 1.094 |
| H04W28/16 | Central resource management| Negotiation of resources | or communication parameters| e.g. negotiating bandwidth or QoS [Quality of Service] | 1.093 |
| H04L43/12 | using dedicated network monitoring probes | 1.093 |
| H04L9/3255 | using group based signatures e.g. ring or threshold signatures | 1.093 |
| H04L9/0869 | involving random numbers or seeds | 1.093 |
| G06Q50/184 | Intellectual property management | 1.092 |
| H04M3/527 | Centralised call answering arrangements not requiring operator intervention | 1.092 |
| G06Q30/0623 | Item investigation | 1.092 |
| H04L41/0823 | Configuration optimization | 1.092 |
| H04W12/04 | Key management | 1.091 |
| G06Q20/24 | Credit schemes i.e. "pay after" | 1.091 |
| G06Q20/0855 | involving a third party | 1.091 |
| G06F3/1287 | via internet | 1.090 |
| G06F3/04847 | Interaction techniques to control parameter settings e.g. interaction with sliders dials | 1.090 |
| G06F3/0635 | by changing the path e.g. traffic rerouting path reconfiguration | 1.090 |
| H02J50/80 | involving the exchange of data concerning supply or distribution of electric power between transmitting devices and receiving devices | 1.089 |
| G06F13/1668 | Details of memory controller | 1.089 |
| G06F8/54 | Link editing before load time | 1.088 |
| H04W36/0055 | Transmission and use of information for re-establishing the radio link | 1.088 |
| H04L67/1012 | based on compliance of requirements or conditions with available server resources | 1.087 |
| H04W80/12 | Application layer protocols e.g. WAP | 1.087 |
| G01C21/20 | Instruments for performing navigational calculations | (ref: G01C21/24)| | (ref: G01C21/26)| take precedence| adaptations of digital computers to a specific function or application | (ref: G06F17/00)| | (ref: G06F19/00) | 1.087 |
| G06F21/125 | by manipulating the program code e.g. source code compiled code interpreted code machine code | 1.086 |
| H04L9/0872 | using geo-location information e.g. location data time relative position or proximity to other entities | 1.086 |
| G06Q40/04 | Exchange e.g. stocks commodities derivatives or currency exchange | 1.086 |
| H04N21/2402 | Monitoring of the downstream path of the transmission network e.g. bandwidth available | traffic monitoring in data switching networks | (ref: H04L43/00)| | monitoring data switching networks utilization | (ref: H04L43/0876) | 1.085 |
| H04N21/2353 | specifically adapted to content descriptors e.g. coding compressing or processing of metadata | 1.085 |
| G06Q10/20 | Product repair or maintenance administration | 1.085 |
| G06F21/77 | in smart cards | 1.085 |
| G05B19/41835 | characterised by programme execution | 1.084 |
| G06F21/42 | using separate channels for security data | 1.084 |
| G06F21/565 | by checking file integrity | 1.083 |
| H04L45/64 | using an overlay routing layer | Peer-to-Peer networks | (ref: H04L67/104) | 1.083 |
| G06F3/0619 | in relation to data integrity e.g. data losses bit errors | 1.083 |
| H04L51/02 | with automatic reactions or user delegation e.g. automatic replies or chatbot | 1.082 |
| H04N21/2335 | involving reformatting operations of audio signals e.g. by converting from one coding standard to another | details of audio signal transcoding | (ref: G10L19/173) | 1.082 |
| H04W72/1205 | Schedule definition set-up or creation | 1.081 |
| G06Q20/322 | Aspects of commerce using mobile devices [M-devices] | 1.081 |
| G06Q20/3223 | Realising banking transactions through M-devices | 1.081 |
| H04L45/126 | minimizing geographical or physical path length | 1.081 |
| H04W4/06 | Selective distribution of broadcast services e.g. multimedia broadcast multicast service [MBMS]| Services to user groups| One-way selective calling services | 1.080 |
| H04W36/00 | Hand-off or reselection arrangements | 1.080 |
| H04M1/6075 | adapted for handsfree use in a vehicle | (ref: H04M1/6058)| takes precedence| arrangements for holding telephones in a vehicle | (ref: B60R11/0241) | 1.079 |
| G06F13/10 | Program control for peripheral devices | (ref: G06F13/14)| - | (ref: G06F13/42)| take precedence | 1.079 |
| G06F9/45537 | Provision of facilities of other operating environments e.g. WINE | I/O emulation | (ref: G06F13/105) | 1.077 |
| H04W40/00 | Communication routing or communication path finding | 1.077 |
| G06Q40/08 | Insurance e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10) | 1.076 |
| G08G1/202 | Dispatching vehicles on the basis of a location e.g. taxi dispatching | 1.076 |
| H04L67/2895 | where the intermediate processing is functionally located closer to the data provider application e.g. reverse proxies| in same machine in same cluster or subnetwork | 1.076 |
| G06F3/0659 | Command handling arrangements e.g. command buffers queues command scheduling | 1.075 |
| G06F3/0685 | Hybrid storage combining heterogeneous device types e.g. hierarchical storage hybrid arrays | 1.075 |
| G06F3/04855 | Interaction with scrollbars | 1.074 |
| G11B27/34 | Indicating arrangements | indicating measured values in general | (ref: G01D)| | indicating means incorporated in magazine or cassette | (ref: G11B23/046)| and | (ref: G11B23/0875) | 1.074 |
| G06F9/44589 | Program code verification e.g. Java bytecode verification proof-carrying code | high-level semantic checks | (ref: G06F8/43)| | testing and debugging software | (ref: G06F11/36) | 0.880 |
| G06F9/4401 | Bootstrapping | security arrangements therefor | (ref: G06F21/57) | 0.871 |
| G06F9/543 | User-generated data transfer e.g. clipboards dynamic data exchange [DDE] object linking and embedding [OLE] | 0.781 |
| G10L15/26 | Speech to text systems | (ref: G10L15/08)| takes precedence | 0.720 |
| G06Q20/3572 | Multiple accounts on card | 0.676 |
| G06Q20/102 | Bill distribution or payments | 0.676 |
| G06Q20/3672 | Intelligent token initializing or reloading | 0.676 |
| G06Q20/32 | using wireless devices | 0.639 |
| G06Q20/34 | using cards e.g. integrated circuit [IC] cards or magnetic cards | 0.639 |
| G06Q20/227 | characterized in that multiple accounts are available to the payer | 0.639 |
| H04L9/0625 | with splitting of the data block into left and right halves e.g. Feistel based algorithms DES FEAL IDEA or KASUMI | 0.639 |
| G06Q20/3563 | Software being resident on card | 0.639 |
| G06Q20/40 | Authorisation e.g. identification of payer or payee verification of customer or shop credentials| Review and approval of payers e.g. check credit lines or negative lists | 0.639 |
| G06Q20/409 | Card specific authentication in transaction processing | 0.639 |
| H04L9/0891 | Revocation or update of secret information e.g. encryption key update or rekeying | 0.639 |
| H04L9/0863 | involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067) | 0.639 |
| G06Q20/3278 | RFID or NFC payments by means of M-devices | 0.639 |
| G06Q20/3552 | Downloading or loading of personalisation data | 0.639 |
| H04B5/0056 | for use in interrogation identification or read/write systems | record carriers | (ref: G06K7/00)| | (ref: G06K19/00)| | for railways | (ref: B61L3/12) | 0.639 |
| H04L63/068 | using time-dependent keys e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088) | 0.639 |
| G07F7/122 | Online card verification | 0.639 |
| G06Q20/4097 | Mutual authentication between card and transaction partners | 0.639 |
| H04L9/0643 | Hash functions e.g. MD5 SHA HMAC or f9 MAC | 0.639 |
| H04B5/0075 | using inductive coupling | transformers or inductances adapted for inductive coupling | (ref: H01F38/14) | 0.639 |
| H04L9/0631 | Substitution permutation network [SPN] i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations e.g. AES algorithms | 0.639 |
| G06Q20/382 | insuring higher security of transaction | 0.639 |
| G06Q20/204 | comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit | 0.639 |
| H04W4/80 | Services using short range communication e.g. near-field communication [NFC] radio-frequency identification [RFID] or low energy communication | 0.639 |
| H04L9/0822 | using key encryption key | 0.639 |
| G06Q20/3823 | combining multiple encryption tools for a transaction | 0.639 |
| G06Q20/36 | using electronic wallets or electronic money safes | 0.639 |
| H04L9/14 | using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045) | 0.639 |
| G06Q20/108 | Remote banking e.g. home banking | 0.639 |
| G06Q20/40975 | Use of encryption for mutual authentication | 0.639 |
| G07F7/1008 | Active credit-cards provided with means to personalise their use e.g. with PIN-introduction/comparison system | 0.621 |
| G06Q20/4012 | Verifying personal identification number [PIN] | 0.621 |
| G06F21/34 | involving the use of external additional devices e.g. dongles or smart cards | 0.621 |
| G06Q20/3415 | Cards acting autonomously as pay-media | 0.621 |
| G06Q20/356 | Aspects of software for card payments | 0.621 |
| G06K9/6263 | based on the feedback of a supervisor | relevance feedback in information retrieval | (ref: G06F17/30) | 0.616 |
| G06F21/14 | against software analysis or reverse engineering e.g. by obfuscation | 0.616 |
| H04L9/0838 | Key agreement i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by or associated with each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061) | 0.613 |
| H04L65/1063 | Application servers | systems providing special services to telephonic subscribers | (ref: H04M3/42) | 0.610 |
| H04L47/70 | Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227) | 0.604 |
| H04L12/66 | Arrangements for connecting between networks having differing types of switching systems e.g. gateways | 0.601 |
| G06F9/45529 | Embedded in an application e.g. JavaScript in a Web browser | 0.600 |
| G06F8/43 | Checking| Contextual analysis | 0.600 |
| G06F21/566 | Dynamic detection i.e. detection performed at run-time e.g. emulation suspicious activities | 0.600 |
| H04L67/145 | provided for avoiding end of session e.g. keep-alive heartbeats resumption message wake-up for inactive or interrupted session | 0.590 |
| H04L67/142 | provided for managing session state for stateless protocols| Signalling a session state| State transitions| Keeping-state mechanisms | 0.584 |
| G06Q20/40145 | Biometric identity checks | 0.576 |
| H04L43/10 | using active monitoring e.g. heartbeat protocols polling ping trace-route | 0.570 |
| H04L69/326 | in the transport layer i.e. layer four | TCP/IP | (ref: H04L69/16)| | streaming protocols e.g. RTP | (ref: H04L65/608) | 0.568 |
| H04L12/2854 | Wide area networks e.g. public data networks | 0.568 |
| H04L69/14 | Multichannel or multilink protocols | 0.568 |
| H04N21/435 | Processing of additional data e.g. decrypting of additional data reconstructing software from modules extracted from the transport stream | 0.565 |
| H04N21/437 | Interfacing the upstream path of the transmission network e.g. for transmitting client requests to a VOD server | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing of client requests | (ref: H04L29/08945)| | flow control in data networks | (ref: H04L47/10) | 0.565 |
| H04N21/8543 | using a description language e.g. Multimedia and Hypermedia information coding Expert Group [MHEG] eXtensible Markup Language [XML] | information retrieval of semistructured data the underlying structure being taken into account e.g. mark-up language structure data | (ref: G06F17/30908) | 0.565 |
| H04N21/438 | Interfacing the downstream path of the transmission network originating from a server e.g. retrieving MPEG packets from an IP network | transmission of MPEG streams over ATM | (ref: H04L12/5601)| | processing of real-time packets | (ref: H04L29/06176)| | flow control in data networks | (ref: H04L47/10) | 0.565 |
| G06F9/4406 | Loading of operating system | 0.565 |
| G06F12/0891 | using clearing invalidating or resetting means | 0.565 |
| G06Q40/00 | Finance| Insurance| Tax strategies| Processing of corporate or income taxes | 0.563 |
| G06Q50/06 | Electricity gas or water supply | 0.563 |
| H04N21/462 | Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities | 0.561 |
| G06F21/84 | output devices e.g. displays or monitors | 0.560 |
| G06T11/20 | Drawing from basic elements e.g. lines or circles | 0.560 |
| G06F3/0485 | Scrolling or panning | 0.560 |
| G06F12/1009 | using page tables e.g. page table structures | 0.556 |
| G06F12/1054 | the data cache being concurrently physically addressed | 0.556 |
| G06F12/0292 | using tables or multilevel address translation means | (ref: G06F12/023)| takes precedence| address translation in virtual memory systems | (ref: G06F12/10) | 0.556 |
| H04L63/0838 | using one-time-passwords | 0.554 |
| H04W88/04 | adapted for relaying to or from another terminal or user | 0.552 |
| H04L41/0668 | selecting new candidate element | 0.552 |
| H04W76/15 | Setup of multiple wireless link connections | 0.552 |
| H04L41/5019 | Ensuring SLA | flow or congestion control at network level | (ref: H04L47/10) | 0.552 |
| H04W24/04 | Arrangements for maintaining operational condition | 0.552 |
| H04W36/305 | Reselection due to radio link failure | control signalling for hand-off failure | (ref: H04W36/0079) | 0.552 |
| H04L41/0681 | involving configuration of triggering conditions | 0.552 |
| H04W40/12 | based on transmission quality or channel quality | 0.552 |
| H04L45/28 | Route fault recovery | network fault recovery | (ref: H04L41/0654) | 0.552 |
| G06K9/00496 | Recognising patterns in signals and combinations thereof | signature verification | (ref: G06K9/00154)| | analysing specific medical signals e.g. bioelectric signals blood pressure | (ref: A61B5/00)| | processing radar and similar signals | (ref: G01S)| | analysis of chromatographic signals | (ref: G01N30/86)| | processing seismic signals | (ref: G01V1/28)| | (ref: G01V1/46)| | acoustic speech processing | (ref: G10L)| | transmission systems | (ref: H04B1/00) | 0.551 |
| G06T11/60 | Editing figures and text| Combining figures or text | 0.551 |
| G06F11/301 | where the computing system is a virtual computing platform e.g. logically partitioned systems | virtual machines | (ref: G06F9/45533)| | logical partitioning of resources | (ref: G06F9/5077) | 0.550 |
| G06F11/3419 | by assessing time | 0.550 |
| G06F11/302 | where the computing system component is a software system | 0.550 |
| G06F11/3495 | for systems | 0.550 |
| G06F3/0486 | Drag-and-drop | 0.548 |
| G06F11/3688 | for test execution e.g. scheduling of test suites | 0.547 |
| G06F11/3457 | Performance evaluation by simulation | 0.547 |
| H04N21/436 | Interfacing a local distribution network e.g. communicating with another STB inside the home | | Interfacing an external card to be used in combination with the client device| arrangements specially adapted plural spots in a confined site in broadcast systems | (ref: H04H20/63) | 0.546 |
| H04N21/4408 | involving video stream encryption e.g. re-encrypting a decrypted video stream for redistribution in a home network | arrangements for secret or secure communication | (ref: H04L9/00)| | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23) | 0.546 |
| H03M7/3091 | Data deduplication | 0.542 |
| H03M7/3084 | using adaptive string matching e.g. the Lempel-Ziv method | 0.542 |
| H04L69/04 | Protocols for data compression | compression in general | (ref: H03M7/30)| | reduction of the amount or size of exchanged application data at an intermediate network processing stage | (ref: H04L67/2828)| | optimizing e.g. header compression information sizing in wireless communication networks | (ref: H04W28/06) | 0.542 |
| H04L69/22 | Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483) | 0.542 |
| G06F9/44578 | Preparing or optimising for loading | 0.542 |
| G06F8/447 | Target code generation | 0.542 |
| G06F8/47 | Retargetable compilers | 0.542 |
| G06F8/53 | Decompilation| Disassembly | 0.542 |
| H04L63/0227 | Filtering policies | mail message filtering | (ref: H04L51/12) | 0.538 |
| H04L45/745 | Address table lookup or address filtering | 0.538 |
| H04L9/3297 | involving time stamps e.g. generation of time stamps | 0.538 |
| H04W12/00 | Security arrangements e.g. access security or fraud detection| Authentication e.g. verifying user identity or authorisation| Protecting privacy or anonymity | 0.537 |
| H04L63/0464 | using hop-by-hop encryption i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it | 0.536 |
| H04L12/4625 | Single bridge functionality e.g. connection of two networks over a single bridge | 0.536 |
| G06F11/1448 | Management of the data involved in backup or backup restore | 0.536 |
| G06Q20/381 | Currency conversion | 0.535 |
| G06F9/5083 | Techniques for rebalancing the load in a distributed system | 0.534 |
| G06F9/5022 | Mechanisms to release resources | 0.534 |
| G06F15/173 | using an interconnection network e.g. matrix shuffle pyramid star snowflake | 0.531 |
| G06F9/30036 | Instructions to perform operations on packed data e.g. vector operations | 0.531 |
| G06F9/3877 | using a slave processor e.g. coprocessor | peripheral processor | (ref: G06F13/12)| | vector processor | (ref: G06F15/8053) | 0.531 |
| G06K7/1095 | the scanner comprising adaptations for scanning a record carrier that is displayed on a display-screen or the like | 0.531 |
| G06Q20/367 | involving intelligent token e.g. electronic purse | 0.531 |
| G06K19/06112 | the marking being simulated using a light source e.g. a barcode shown on a display or a laser beam with time-varying intensity profile | 0.531 |
| G06F3/0631 | by allocating resources to storage systems | 0.528 |
| G06F3/068 | Hybrid storage device | 0.528 |
| G06F3/0616 | in relation to life time e.g. increasing Mean Time Between Failures [MTBF] | 0.528 |
| G06F3/0608 | Saving storage space on storage systems | 0.528 |
| H04W76/19 | Connection re-establishment | 0.525 |
| H04W60/04 | using triggered events | 0.525 |
| H04W60/06 | De-registration or detaching | 0.525 |
| H04L9/3073 | involving pairings e.g. identity based encryption [IBE] bilinear mappings or bilinear pairings e.g. Weil or Tate pairing | 0.524 |
| H04L9/006 | involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823) | 0.524 |
| H04N21/239 | Interfacing the upstream path of the transmission network e.g. prioritizing client | content| requests | hybrid Fiber Coaxial [HFC] networks for upstream channel allocation for video distribution | (ref: H04L12/2801)| | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing of client requests | (ref: H04L29/08945)| | flow control in data networks | (ref: H04L47/10) | 0.523 |
| H04N21/6408 | Unicasting | 0.523 |
| H04L67/2842 | for storing data temporarily at an intermediate stage e.g. caching | distributed storage of data in a network | (ref: H04L67/1097)| | browsing optimization of access to content by caching | (ref: G06F17/30902)| | addressing of a cache within a hierarchically structured memory system | (ref: G06F12/0802)| | disk caching | (ref: G06F12/0866) | 0.523 |
| H04N21/6437 | Real-time Transport Protocol [RTP] | 0.523 |
| H04L65/40 | Services or applications | network service management for ensuring proper service fulfilment | (ref: H04L41/50)| | information services comprising voice | (ref: H04M3/487)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | contact center services | (ref: H04M3/51) | 0.523 |
| H04L43/08 | Monitoring based on specific metrics | 0.522 |
| H04L43/028 | using filtering | alarm or event filtering | (ref: H04L41/0604) | 0.522 |
| G06F8/77 | Software metrics | 0.522 |
| G06F11/323 | Visualisation of programs or trace data | 0.522 |
| H04L41/0859 | by keeping history of different configuration generations or versions | 0.522 |
| H04L9/3249 | using RSA or related signature schemes e.g. Rabin scheme | 0.521 |
| H04L63/06 | for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08) | 0.521 |
| H04L9/3066 | involving algebraic varieties e.g. elliptic or hyper-elliptic curves | 0.521 |
| H04L41/0253 | involving a browser or web-pages for accessing management information | graphical user interface for network management | (ref: H04L41/22) | 0.520 |
| H04L9/088 | Usage controlling of secret information e.g. techniques for restricting cryptographic keys to pre-authorized uses different access levels validity of crypto-period different key- or password length or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068) | 0.520 |
| H04W76/10 | Connection setup | 0.520 |
| H04L67/303 | Terminal profiles | 0.520 |
| G06Q20/353 | Payments by additional cards plugged into M-devices | 0.520 |
| G06F11/2046 | where the redundant components share persistent storage | (ref: G06F11/2043)| takes precedence | 0.519 |
| G06F11/203 | using migration | 0.519 |
| G06F11/1484 | involving virtual machines | 0.519 |
| G06F11/2035 | without idle spare hardware | 0.519 |
| H04L47/24 | depending on the type of traffic e.g. priority or quality of service [QoS] | network arrangements for networked applications for scheduling or organising the servicing of application requests whereby quality of service or priority requirements are taken into account | (ref: H04L67/322) | 0.519 |
| G06F11/3648 | using additional hardware | 0.516 |
| G06F11/3466 | Performance evaluation by tracing or monitoring | 0.516 |
| H04N21/6125 | involving transmission via Internet | transmission by internet of broadcast information | (ref: H04H60/82) | 0.516 |
| H04N21/26216 | involving the channel capacity e.g. network bandwidth | admission control resource allocation in open networks | (ref: H04L12/5692)| | protocols for scheduling and organising the servicing of requests whereby quality of service and priority requirements are taken into account in network applications in communication control or processing | (ref: H04L29/08954)| | flow control in packet networks | (ref: H04L47/10) | 0.516 |
| H04L67/1076 | Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network | 0.514 |
| H04N21/658 | Transmission by the client directed to the server | 0.512 |
| H04N21/238 | Interfacing the downstream path of the transmission network e.g. adapting the transmission rate of a video stream to network bandwidth| Processing of multiplex streams | hybrid Fiber Coaxial HFC networks for downstream channel allocation for video distribution | (ref: H04L12/2801)| | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing | (ref: H04L29/08945)| | flow control in packet networks | (ref: H04L47/10) | 0.512 |
| H04N21/47208 | for requesting near-video-on-demand content | 0.512 |
| H04N21/8547 | involving timestamps for synchronizing content | 0.512 |
| G06Q10/0633 | Workflow analysis | 0.509 |
| H04L41/0273 | involving the use of web services for network management e.g. SOAP | 0.509 |
| H04L43/16 | using threshold monitoring | 0.508 |
| G06F11/3442 | for planning or managing the needed capacity | 0.507 |
| G06F9/5088 | involving task migration | 0.507 |
| G06F8/75 | Structural analysis for program understanding | 0.507 |
| H04L69/163 | Adaptation of TCP data exchange control procedures | generic OSI layer 4 protocols e.g. SCTP | (ref: H04L69/326)| | TCP or UDP flow control procedures | (ref: H04L47/19)| | error control procedures in general | (ref: H04L1/18) | 0.507 |
| H04L69/08 | Protocols for interworking or protocol conversion | arrangements for connecting between networks having differing types of switching systems e.g. gateways | (ref: H04L12/66)| | network management protocols conversion | (ref: H04L41/0226) | 0.507 |
| H04L61/2503 | Internet protocol [IP] address translation | 0.507 |
| G06F9/30098 | Register arrangements | 0.507 |
| G06F9/30058 | Conditional branch instructions | 0.507 |
| G06F9/3806 | using address prediction e.g. return stack branch history buffer | 0.507 |
| G06F9/4486 | Formation of subprogram jump address | 0.507 |
| H04L9/3215 | using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18) | 0.506 |
| G06Q20/202 | Interconnection or interaction of plural electronic cash registers [ECR] or to host computer e.g. network details transfer of information from host to ECR or from ECR to ECR | 0.506 |
| H04L9/0841 | involving Diffie-Hellman or related key agreement protocols | 0.506 |
| G06Q20/0655 | e-cash managed centrally | 0.506 |
| G06Q20/027 | involving a payment switch or gateway | 0.506 |
| H04L47/822 | Collecting or measuring resource availability data | 0.506 |
| H04L45/56 | Routing software | 0.505 |
| G06F12/0893 | Caches characterised by their organisation or structure | 0.503 |
| H04L41/28 | Security in network management e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00) | 0.503 |
| H04L67/30 | involving profiles | 0.501 |
| H04L63/0407 | wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00) | 0.501 |
| H04L63/0846 | using time-dependent-passwords e.g. periodically changing passwords | 0.500 |
| G06F9/4411 | Configuring for operating with peripheral devices| Loading of device drivers | 0.499 |
| H04L41/0809 | Plug-and-play configuration | 0.499 |
| H04L41/22 | using GUI [Graphical User Interface] | 0.499 |
| G06F11/1469 | Backup restoration techniques | 0.498 |
| G01S19/45 | by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement | 0.498 |
| G06F21/6236 | between heterogeneous systems | 0.498 |
| G06F3/1423 | controlling a plurality of local displays e.g. CRT and flat panel display | 0.498 |
| H04L65/4015 | where at least one of the additional parallel sessions is real time or time sensitive e.g. white board sharing collaboration or spawning of a subconference | telewriting virtual reality or network gaming | (ref: H04L67/38) | 0.498 |
| H04L12/1822 | Conducting the conference e.g. admission detection selection or grouping of participants correlating users to one or more conference sessions prioritising transmission | 0.498 |
| G06Q20/123 | Shopping for digital content | 0.497 |
| G06Q20/29 | characterised by micropayments | 0.496 |
| G06Q40/02 | Banking e.g. interest calculation credit approval mortgages home banking or on-line banking | 0.496 |
| H04L45/38 | Flow based routing | 0.496 |
| G06F12/1433 | for a module or a part of a module | 0.495 |
| G06F21/79 | in semiconductor storage media e.g. directly-addressable memories | 0.495 |
| G06F3/0383 | Signal control means within the pointing device | 0.493 |
| G06F3/048 | Interaction techniques based on graphical user interfaces [GUI] | 0.493 |
| A63F13/352 | involving special game server arrangements e.g. regional servers connected to a national server or a plurality of servers managing partitions of the game world | 0.493 |
| A63F13/77 | involving data related to game devices or game servers e.g. configuration data software version or amount of memory | 0.493 |
| H04L41/5083 | wherein the managed service relates to web hosting | web-based network application protocols | (ref: H04L67/02)| | web site content organization and management | (ref: G06F17/3089)| | video-hosting | (ref: H04N21/2743) | 0.493 |
| H04L67/1031 | Controlling of the operation of servers by a load balancer e.g. adding or removing servers that serve requests | 0.493 |
| H04N21/23109 | by placing content in organized collections e.g. EPG data repository | details of retrieval of video data and associated meta data in video databases | (ref: G06F17/30843) | 0.491 |
| H04N21/4384 | involving operations to reduce the access time e.g. fast-tuning for reducing channel switching latency | 0.491 |
| G06Q20/387 | Payment using discounts or coupons | relating to marketing | (ref: G06Q30/02) | 0.490 |
| G06Q30/0236 | Incentive or reward received by requiring registration or ID from user | 0.490 |
| H04N21/637 | Control signals issued by the client directed to the server or network components | 0.490 |
| H04N21/2351 | involving encryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23) | 0.489 |
| H04N21/26613 | for generating or managing keys in general | key distribution for secret or secure communication involving central third party e.g. key distribution center [KDC] or trusted third party [TTP] | (ref: H04L9/083)| | key management for security in wireless networks | (ref: H04L29/06707)| | key management for network security in communication control or processing | (ref: H04W12/04) | 0.489 |
| H04N21/63775 | for uploading keys e.g. for a client to communicate its public key to the server | arrangements for network security key management | (ref: H04L29/06707) | 0.489 |
| G06Q30/0241 | Advertisement | 0.489 |
| H04N21/2547 | Third Party Billing e.g. billing of advertiser | 0.489 |
| G06F11/3652 | in-circuit-emulation [ICE] arrangements | 0.488 |
| H03K19/17756 | for partial configuration or reconfiguration | 0.488 |
| G06F15/7867 | with reconfigurable architecture | 0.488 |
| H04L63/18 | using different networks or paths for security e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215) | 0.488 |
| G06F12/0888 | using selective caching e.g. bypass | 0.487 |
| G06F12/0831 | using a bus scheme e.g. with bus monitoring or watching means | 0.487 |
| H04N21/44209 | Monitoring of downstream path of the transmission network originating from a server e.g. bandwidth variations of a wireless network | arrangements for maintenance or administration in data switching networks involving bandwidth and capacity management | (ref: H04L41/0896) | 0.486 |
| H04N21/44004 | involving video buffer management e.g. video decoder buffer or video display buffer | 0.486 |
| G06N5/025 | Extracting rules from data | learning in general | (ref: G06F15/18) | 0.483 |
| A63F13/61 | using advertising information | 0.482 |
| A63F13/87 | Communicating with other players during game play e.g. by e-mail or chat | 0.482 |
| A63F13/48 | Starting a game e.g. activating a game device or waiting for other players to join a multiplayer session | 0.482 |
| A63F13/92 | Video game devices specially adapted to be hand-held while playing | 0.482 |
| G06Q30/0601 | Electronic shopping | 0.482 |
| G06F21/561 | Virus type analysis | 0.482 |
| G06F8/51 | Source to source | 0.482 |
| H04L69/162 | involving adaptations of sockets based mechanisms | secure socket layer | (ref: H04L63/168) | 0.481 |
| H04L45/72 | Routing based on the source address | 0.481 |
| H04L45/42 | Centralized routing | 0.481 |
| A63F13/533 | for prompting the player e.g. by displaying a game menu | 0.480 |
| G06T7/74 | involving reference images or patches | 0.480 |
| A63F13/655 | by importing photos e.g. of the player | 0.480 |
| A63F13/25 | Output arrangements for video game devices | 0.480 |
| G07F17/3244 | Payment aspects of a gaming system e.g. payment schemes setting payout ratio bonus or consolation prizes | 0.480 |
| G07F17/3241 | Security aspects of a gaming system e.g. detecting cheating device integrity surveillance | computer security | (ref: G06F21/00) | 0.480 |
| G07F17/3225 | Data transfer within a gaming system e.g. data sent between gaming machines and users | 0.480 |
| H04L9/3231 | Biological data e.g. fingerprint voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861) | 0.480 |
| H04L45/74 | Address processing for routing | 0.480 |
| H04L47/263 | Source rate modification after feedback | 0.480 |
| H04L63/0421 | Anonymous communication i.e. the party's identifiers are hidden from the other party or parties e.g. using an anonymizer | 0.480 |
| H04L63/0414 | during transmission i.e. party's identity is protected against eavesdropping e.g. by using temporary identifiers but is known to the other party or parties involved in the communication | 0.479 |
| H04L9/0827 | involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18) | 0.479 |
| G06Q20/3678 | e-cash details e.g. blinded divisible or detecting double spending | 0.477 |
| H04L41/0869 | by validating configuration within one network element | 0.477 |
| H04L41/0883 | Semiautomatic configuration e.g. proposals from system | 0.477 |
| H04N21/4821 | using a grid e.g. sorted out by channel and broadcast time | 0.476 |
| H04N21/4825 | using a list of items to be played back in a given order e.g. playlists | 0.476 |
| G06Q30/0235 | Including timing i.e. limited awarding or usage time constraint | 0.476 |
| G06Q30/0631 | Item recommendations | 0.476 |
| G06Q10/02 | Reservations e.g. for tickets services or events | 0.476 |
| G06Q20/0457 | characterized in that the ticket is sent electronically | 0.476 |
| G08G5/0013 | with a ground station | 0.476 |
| G08G5/0021 | located in the aircraft | 0.476 |
| G08G5/0052 | for cruising | combined instruments indicating more than one navigational value | (ref: G01C23/00) | 0.476 |
| H04N21/643 | using dedicated| Communication protocols | streaming protocols for real-time multimedia communications | (ref: H04L29/06517) | 0.476 |
| H04N21/8586 | by using a URL | processing chained hypermedia data for information retrieval | (ref: G06F17/30014)| | information retrieval from the Internet by using URLs | (ref: G06F17/30876)| | URL in broadcast information | (ref: H04H20/93)| | protocols for network applications involving the use of web-based technology | (ref: H04L29/0809) | 0.476 |
| H04L69/329 | in the application layer i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative commercial financial or managerial purposes | (ref: G06Q) | 0.475 |
| G06F9/461 | Saving or restoring of program or task context | 0.475 |
| G06F15/7807 | System on chip i.e. computer system on a single chip| System in package i.e. computer system on one or more chips in a single package | 0.475 |
| G06T15/005 | General purpose rendering architectures | 0.475 |
| G06N3/084 | Back-propagation | 0.475 |
| G06Q30/0269 | based on user profile or attribute | 0.474 |
| G06Q30/0267 | Wireless devices | 0.474 |
| G06Q30/0255 | based on user history | 0.474 |
| G10L15/04 | Segmentation| Word boundary detection | 0.474 |
| H04L12/282 | based on user interaction within the home | receiver circuitry for displaying additional information being controlled by a remote control apparatus | (ref: H04N5/44582) | 0.474 |
| H04R9/08 | Microphones | 0.474 |
| G06F3/041 | Digitisers e.g. for touch screens or touch pads characterised by the transducing means | 0.474 |
| H04L47/27 | Window size evaluation or update e.g. using information derived from ACK packets | 0.473 |
| H04L43/0882 | Utilization of link capacity | 0.473 |
| H04L47/365 | Dynamic adaptation of the packet size | 0.473 |
| G06F9/4837 | time dependent | 0.473 |
| H04N21/26606 | for generating or managing entitlement messages e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14) | 0.472 |
| H04N21/63345 | by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | arrangements for network security key management | (ref: H04L29/06707) | 0.472 |
| H04N21/23605 | Creation or processing of packetized elementary streams [PES] | 0.472 |
| H04N21/2343 | involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements | media manipulation adaptation or conversion at the source in one way streaming for real-time multimedia communications | (ref: H04L29/06489)| | video transcoding | (ref: H04N19/40) | 0.472 |
| G01C21/3461 | Preferred or disfavoured areas e.g. dangerous zones toll or emission zones intersections manoeuvre types segments such as motorways toll roads ferries | 0.472 |
| B64F1/00 | Ground or aircraft-carrier-deck installations | specially adapted for captive aircraft | (ref: B64F3/00) | 0.472 |
| B64C39/024 | of the remote controlled vehicle type i.e. RPV | 0.472 |
| G06Q50/28 | Logistics e.g. warehousing loading distribution or shipping | 0.472 |
| H04W4/024 | Guidance services | 0.472 |
| G06Q30/08 | Auctions | matching or brokerage | matching or brokerage for stock exchange | (ref: G06Q40/04) | 0.472 |
| G06N7/005 | Probabilistic networks | 0.472 |
| H04N1/00501 | Tailoring a user interface [UI] to specific requirements | 0.471 |
| G06Q30/0251 | Targeted advertisement | 0.471 |
| G06K9/6227 | Selection of pattern recognition techniques e.g. of classifiers in a multi-classifier system | 0.471 |
| G01C21/365 | Guidance using head up displays or projectors e.g. virtual vehicles or arrows projected on the windscreen or on the road itself | 0.471 |
| G01C21/3697 | output of additional non-guidance related information e.g. low fuel level fuel efficient driving gear change speeding dangerous curve ahead slippery road school zone speed traps driving behaviour feedback advertising virtual billboards or road signs | (ref: G01C21/3679)| takes precedence | 0.471 |
| H04L67/28 | for the provision of proxy services e.g. intermediate processing or storage in the network | network management provisions | (ref: H04L41/00)| | network monitoring provisions | (ref: H04L43/00)| | proxies for network security | (ref: H04L63/0281)| | media manipulation adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08) | 0.471 |
| H04L67/1027 | Persistence of sessions during load balancing | 0.470 |
| H04L67/1019 | based on random server selection | 0.470 |
| G06F21/76 | in application-specific integrated circuits [ASICs] or field-programmable devices e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs] | 0.470 |
| G06F11/2733 | Test interface between tester and unit under test | 0.470 |
| H04L41/0654 | Network fault recovery | backup route selection | (ref: H04L45/22)| | route fault recovery | (ref: H04L45/28)| | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40) | 0.469 |
| H04W72/0406 | involving control information exchange between nodes | 0.469 |
| H04L41/00 | Arrangements for maintenance or administration or management of packet switching networks | 0.469 |
| H04W40/20 | based on geographic position or location | 0.469 |
| H04L67/1078 | Resource delivery mechanisms | 0.468 |
| G06F11/3034 | where the computing system component is a storage system e.g. DASD based or network based | digital recording or reproducing | (ref: G11B20/18)| | digital input from or digital output to record carriers | (ref: G06F3/06)| | arrangements and networking functions for distributed storage of data in a network | (ref: H04L29/08549) | 0.468 |
| G06F11/0772 | Means for error signaling e.g. using interrupts exception flags dedicated error registers | 0.468 |
| G06F7/14 | Merging i.e. combining at least two sets of record carriers each arranged in the same ordered sequence to produce a single set having the same ordered sequence | 0.468 |
| G06F21/80 | in storage media based on magnetic or optical technology e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00) | 0.468 |
| H04L67/147 | provided for signalling methods or particular messages providing extensions to IETF ITU ETSI or 3GPP protocols e.g. additional proprietary messages standard messages enhanced by additional header fields or standard messages being used for purposes other than originally intended | 0.467 |
| H04L69/06 | Notations for structuring of protocol data e.g. abstract syntax notation one [ASN.1] | 0.467 |
| A63F13/80 | Special adaptations for executing a specific game genre or game mode | 0.466 |
| G06N5/003 | Dynamic search techniques heuristics branch-and-bound | (ref: G06N5/046)| take precedence| for optimisation | (ref: G06Q10/04) | 0.466 |
| A63F13/795 | for finding other players| for building a team| for providing a buddy list | 0.466 |
| A63F13/69 | by enabling or updating specific game elements e.g. unlocking hidden features items levels or versions | 0.466 |
| G06Q30/0211 | Determining discount or incentive effectiveness | 0.466 |
| H04L41/069 | involving storage or log of alarms or notifications or post-processing thereof | 0.465 |
| H04L41/5032 | Generating service level reports | 0.465 |
| H04N7/141 | between two video terminals e.g. videophone | telephonic communication systems combined with television receiver for reception of entertainment or information matter | (ref: H04M11/085) | 0.465 |
| H04N7/152 | Multipoint control units therefor | 0.465 |
| H04N7/15 | Conference systems | video terminal details | (ref: H04N7/141)| | telephonic conference arrangements | (ref: H04M3/56)| | | computer conferencing | (ref: H04L12/1813) | 0.465 |
| H04L51/10 | Messages including multimedia information | network arrangements or protocols for real-time communication | (ref: H04L65/00)| | voice messaging in telephonic communication using automatic or semi-automatic exchanges with non-audio components | (ref: H04M3/5307) | 0.465 |
| H04N21/4788 | communicating with other users e.g. chatting | arrangements for providing for computer conferences e.g. chat rooms to substation in data switching networks | (ref: H04L12/1813)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306) | 0.465 |
| H04L47/624 | Altering the ordering of packets in an individual queue | 0.464 |
| H04L47/622 | Queue service order | 0.464 |
| H04L49/254 | Centralized controller i.e. arbitration or scheduling | 0.464 |
| H04L47/6295 | Multiple queues per individual QOS connection flow or priority | 0.464 |
| H04L45/742 | Route cache and its operation | 0.464 |
| G06F12/0815 | Cache consistency protocols | 0.464 |
| G06F12/0877 | Cache access modes | 0.464 |
| G06F12/0848 | Partitioned cache e.g. separate instruction and operand caches | 0.464 |
| G06Q30/0256 | User search | 0.464 |
| H04W4/30 | Services specially adapted for particular environments situations or purposes | 0.464 |
| H04L69/28 | Timer mechanisms used in protocols | 0.464 |
| H04W4/21 | for social networking applications | 0.464 |
| H04W4/14 | Short messaging services e.g. short message services [SMS] or unstructured supplementary service data [USSD] | 0.464 |
| G06Q30/0261 | based on user location | 0.464 |
| H04L12/1428 | Invoice generation e.g. customization lay-out database processing algorithms for calculating the bill or formatting invoices as WWW pages | invoicing in general | (ref: G06Q30/04) | 0.464 |
| H04L67/1065 | Discovery involving distributed pre-established resource-based relationships among peers e.g. based on distributed hash tables [DHT] | pre-configuration of logical or physical connections | (ref: H04L67/1053) | 0.464 |
| H04W4/24 | Accounting or billing | 0.464 |
| H04L47/787 | Bandwidth trade among domains | 0.463 |
| H04L45/586 | Virtual routers | 0.463 |
| H04L41/0663 | involving offline failover planning | 0.463 |
| G06F17/16 | Matrix or vector computation | e.g. matrix-matrix or matrix-vector multiplication matrix factorization | matrix transposition | (ref: G06F7/78) | 0.463 |
| H04L41/5054 | Automatic provisioning of the service triggered by the service manager e.g. concrete service implementation by automatic configuration of network components | for initializing configuration i.e. provisioning of network or devices | (ref: H04L41/0806) | 0.463 |
| G06Q20/327 | Short range or proximity payments by means of M-devices | 0.462 |
| H03M13/373 | with erasure correction and erasure determination e.g. for packet loss recovery or setting of erasures for the decoding of Reed-Solomon codes | 0.461 |
| H03M13/2909 | Product codes | 0.461 |
| G06F11/1004 | to protect a block of data words e.g. CRC or checksum | (ref: G06F11/1076)| takes precedence| security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00) | 0.461 |
| G06F11/1076 | Parity data used in redundant arrays of independent storages e.g. in RAID systems | 0.461 |
| H04L51/18 | Messages including commands or codes to be executed either at an intermediate node or at the recipient to perform message-related actions | computer aided management of electronic mail | (ref: G06Q10/10)| | networked applications for remote control or remote monitoring of the application | (ref: H04L67/025)| | networked applications involving the movement of software or configuration parameters | (ref: H04L67/34) | 0.461 |
| G09G5/395 | Arrangements specially adapted for transferring the contents of the bit-mapped memory to the screen | (ref: G09G5/399)| takes precedence | 0.461 |
| G06Q30/0635 | Processing of requisition or of purchase orders | 0.461 |
| G06N3/04 | Architectures e.g. interconnection topology | 0.461 |
| H04L67/1091 | Interfacing with client-server systems or between P2P systems | 0.460 |
| G06F3/061 | Improving I/O performance | 0.460 |
| G06F3/0647 | Migration mechanisms | 0.460 |
| G06F3/0629 | Configuration or reconfiguration of storage systems | 0.460 |
| G06F3/06 | Digital input from or digital output to record carriers | e.g. RAID emulated record carriers networked record carriers | recording or reproducing devices | per se| | (ref: G11B)| | error detection error correction monitoring | per se| regarding storage systems | (ref: G06F11/00)| | accessing or addressing within memory systems or architectures | (ref: G06F12/00)| | information retrieval | (ref: G06F17/30) | 0.460 |
| G06N3/006 | based on simulated virtual individual or collective life forms e.g. single "avatar" social simulations virtual worlds | computer games | (ref: A63F13/00)| | medical simulations | (ref: G06F19/00)| | information retrieval | (ref: G06F17/30873)| | image processing | (ref: G06T)| | telecommunication protocols | (ref: H04L29/06034) | 0.460 |
| G06N3/004 | Artificial life i.e. computers simulating life | 0.460 |
| G06N5/046 | Forward inferencing production systems | 0.460 |
| H04L9/06 | the encryption apparatus using shift registers or memories for block-wise | or stream| coding e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators | 0.460 |
| G06F11/1464 | for networked environments | 0.459 |
| G06F11/3096 | wherein the means or processing minimize the use of computing system or of computing system component resources e.g. non-intrusive monitoring which minimizes the probe effect: sniffing intercepting indirectly deriving the monitored data from other directly available data | 0.459 |
| H04W72/04 | Wireless resource allocation | 0.459 |
| H04L63/1433 | Vulnerability analysis | 0.459 |
| G06F12/0284 | Multiple user address space allocation e.g. using different base addresses | interprocessor communication | (ref: G06F15/163) | 0.458 |
| G06F9/30189 | according to execution mode e.g. mode flag | 0.458 |
| G06F9/355 | Indexed addressing | i.e. using more than one address operand | 0.458 |
| G06F9/3842 | Speculative instruction execution | 0.458 |
| G06F9/30076 | to perform miscellaneous control operations e.g. NOP | 0.458 |
| G06F9/223 | Execution means for microinstructions irrespective of the microinstruction function e.g. decoding of microinstructions and nanoinstructions| timing of microinstructions| programmable logic arrays| delays and fan-out problems | 0.458 |
| A63F13/79 | involving player-related data e.g. identities accounts preferences or play histories | 0.458 |
| A63F13/213 | comprising photodetecting means e.g. cameras photodiodes or infrared cells | (ref: A63F13/219)| | (ref: A63F13/655)| take precedence | 0.458 |
| G06F3/1286 | via local network | 0.458 |
| G06F3/1285 | Remote printer device e.g. being remote from client or server | 0.458 |
| G06F3/1267 | Job repository e.g. non-scheduled jobs delay printing | 0.458 |
| G06F3/1236 | Connection management | 0.458 |
| G06F3/1238 | Secure printing e.g. user identification user rights for device usage unallowed content blanking portions or fields of a page releasing held jobs | 0.458 |
| G06F11/3065 | Monitoring arrangements determined by the means or processing involved in reporting the monitored data | error or fault reporting or logging | (ref: G06F11/0766) | 0.457 |
| G06F13/24 | using interrupt | (ref: G06F13/32)| takes precedence | 0.457 |
| G06F9/30043 | LOAD or STORE instructions| Clear instruction | 0.457 |
| G06F21/75 | by inhibiting the analysis of circuitry or operation | 0.457 |
| G06F9/3013 | according to data content e.g. floating-point registers address registers | 0.457 |
| G10L15/28 | Constructional details of speech recognition systems | 0.456 |
| H04N21/4586 | Content update operation triggered locally e.g. by comparing the version of software modules in a DVB carousel to the version stored locally | deployment distribution installation update of software | (ref: G06F8/65)| | program updating while running in general | (ref: G06F8/656)| | error detection or correction of the data by redundancy during software upgrading | (ref: G06F11/1433)| | arrangements for updating broadcast information or broadcast-related information | (ref: H04H60/25) | 0.456 |
| H04N21/2387 | Stream processing in response to a playback request from an end-user e.g. for trick-play | 0.456 |
| G06F8/4442 | Reducing the number of cache misses| Data prefetching | cache prefetching | (ref: G06F12/0862) | 0.456 |
| G06F8/45 | Exploiting coarse grain parallelism in compilation i.e. parallelism between groups of instructions | 0.456 |
| G06F9/3836 | Instruction issuing e.g. dynamic instruction scheduling out of order instruction execution | 0.456 |
| G06F9/3005 | to perform operations for flow control | 0.456 |
| G06F9/3838 | Dependency mechanisms e.g. register scoreboarding | 0.456 |
| G06F8/4441 | Reducing the execution time required by the program code | 0.456 |
| G06F9/545 | where tasks reside in different layers e.g. user- and kernel-space | 0.456 |
| G06F7/588 | Random number generators i.e. based on natural stochastic processes | 0.456 |
| G06F9/4484 | Executing subprograms | 0.456 |
| G10L15/32 | Multiple recognisers used in sequence or in parallel| Score combination systems therefor e.g. voting systems | 0.456 |
| G06Q20/363 | with the personal data files for a user | 0.456 |
| G06F17/15 | Correlation function computation | including computation of convolution operations | arithmetic circuits for sum of products | per se| e.g. multiply-accumulators | (ref: G06F7/5443)| | digital filters e.g. FIR IIR adaptive filters | (ref: H03H17/00) | 0.456 |
| G10L17/24 | the user being prompted to utter a password or a predefined phrase | 0.456 |
| G10L17/02 | Preprocessing operations e.g. segment selection| Pattern representation or modelling e.g. based on linear discriminant analysis [LDA] or principal components| Feature selection or extraction | 0.456 |
| G10L25/51 | for comparison or discrimination | 0.456 |
| H04W4/025 | using location based information parameters | 0.456 |
| H04L69/18 | Multi-protocol handler e.g. single device capable of handling multiple protocols | multilayer or multiprotocol switches | (ref: H04L49/602) | 0.455 |
| G06F11/3051 | Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component e.g. monitoring the presence of processing resources peripherals I/O links software programs | verification or detection of system hardware configuration | (ref: G06F11/2247) | 0.455 |
| H04L41/04 | Architectural aspects of network management arrangements | 0.455 |
| G06F11/3006 | where the computing system is distributed e.g. networked systems clusters multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50) | 0.455 |
| H04L41/20 | Network management software packages | 0.455 |
| G06F9/382 | Pipelined decoding e.g. using predecoding | 0.454 |
| G06F9/3867 | using instruction pipelines | 0.454 |
| G06F15/8069 | using a cache | 0.454 |
| H04L63/0218 | Distributed architectures e.g. distributed firewalls | 0.454 |
| G06Q20/407 | Cancellation of a transaction | 0.454 |
| G06F9/4418 | Suspend and resume| Hibernate and awake | 0.454 |
| G06F9/44594 | Unloading | 0.454 |
| A63F13/335 | using Internet | 0.454 |
| A63F13/323 | between game devices with different hardware characteristics e.g. hand-held game devices connectable to game consoles or arcade machines | 0.454 |
| A63F13/40 | Processing input control signals of video game devices e.g. signals generated by the player or derived from the environment | 0.454 |
| H04L43/0852 | Delays | 0.454 |
| H04L67/1029 | using data related to the state of servers by a load balancer | server selection based on server parameters | (ref: H04L67/1008)| | performance measurement for load balancing | (ref: G06F11/3433)| | information retrieval in structured data stores | (ref: G06F17/30286) | 0.454 |
| B60R21/01508 | detecting forces or pressure in bags or modules | 0.453 |
| B60W50/12 | Limiting control by the driver depending on vehicle state e.g. interlocking means for the control input for preventing unsafe operation | 0.453 |
| B60W50/14 | Means for informing the driver warning the driver or prompting a driver intervention | 0.453 |
| B60W50/087 | where the control system corrects or modifies a request from the driver | 0.453 |
| B60K35/00 | Arrangement of adaptations of instruments specially for vehicles| Dashboards | 0.453 |
| B60W40/08 | related to drivers or passengers | 0.453 |
| H04N21/4667 | Processing of monitored end-user data e.g. trend analysis based on the log file of viewer selections | 0.453 |
| H04N21/251 | Learning process for intelligent management e.g. learning user preferences for recommending movies | details of learning user preferences for the retrieval of video data in a video database | (ref: G06F17/30843)| | computer systems using learning methods | (ref: G06N3/08) | 0.453 |
| H04N21/2662 | Controlling the complexity of the video stream e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities | 0.453 |
| H04N21/4666 | using neural networks e.g. processing the feedback provided by the user | 0.453 |
| G06T13/20 | 3D [Three Dimensional] animation | 0.453 |
| G06T11/206 | Drawing of charts or graphs | 0.453 |
| G06T15/20 | Perspective computation | 0.453 |
| G06F3/04815 | Interaction with three-dimensional environments e.g. control of viewpoint to navigate in the environment | 0.453 |
| G06T19/003 | Navigation within 3D models or images | 0.453 |
| G02B27/017 | Head mounted | 0.453 |
| G06F3/0638 | Organizing or formatting or addressing of data | 0.453 |
| G06F3/0662 | Virtualisation aspects | 0.453 |
| G06F3/0637 | Permissions | 0.453 |
| G06F3/0605 | by facilitating the interaction with a user or administrator | 0.453 |
| H04W40/248 | Connectivity information update | 0.452 |
| H04M15/8044 | Least cost routing | 0.452 |
| H04L47/32 | Packet discarding or delaying | 0.452 |
| H04L47/808 | User-type aware | 0.452 |
| H04L47/805 | QOS or priority aware | 0.452 |
| H04L47/762 | triggered by the network | 0.452 |
| H04W76/12 | Setup of transport tunnels | 0.452 |
| H04L9/0656 | Pseudorandom key sequence combined element-for-element with data sequence e.g. one-time-pad [OTP] or Vernam's cipher | 0.452 |
| H04L43/06 | Report generation | 0.452 |
| H04W24/00 | Supervisory monitoring or testing arrangements | 0.452 |
| G06Q20/388 | Mutual authentication without cards | 0.451 |
| G06F11/3055 | Monitoring arrangements for monitoring the status of the computing system or of the computing system component e.g. monitoring if the computing system is on off available not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16) | 0.451 |
| H04L47/72 | Reservation actions | 0.451 |
| H04L47/827 | Aggregation of resource allocation or reservation requests | 0.451 |
| A63F13/53 | involving additional visual information provided to the game scene e.g. by overlay to simulate a head-up display [HUD] or displaying a laser sight in a shooting game | 0.451 |
| A63F13/56 | Computing the motion of game characters with respect to other game characters game objects or elements of the game scene e.g. for simulating the behaviour of a group of virtual soldiers or for path finding | 0.451 |
| G06T15/04 | Texture mapping | 0.451 |
| G10L15/005 | Language recognition | 0.451 |
| G06F12/0692 | Multiconfiguration e.g. local and global addressing | 0.451 |
| G06F13/1663 | Access to shared memory | 0.451 |
| G06F9/4806 | Task transfer initiation or dispatching | 0.451 |
| G06F11/3037 | where the computing system component is a memory e.g. virtual memory cache | accessing addressing or allocating within memory systems or architectures | (ref: G06F12/00)| | checking stores for correct operation | (ref: G11C29/00) | 0.450 |
| G06F12/121 | using replacement algorithms | 0.450 |
| G10L15/183 | using context dependencies e.g. language models | 0.450 |
| H04W36/14 | Reselecting a network or an air interface | 0.449 |
| H04W36/0005 | Control or signalling for completing the hand-off | 0.449 |
| H04L41/145 | involving simulating designing planning or modelling of a network | 0.449 |
| H04M15/47 | Fraud detection or prevention means | 0.449 |
| H04M15/00 | Arrangements for metering time-control or time indication | | Metering charging or billing arrangements for voice wireline or wireless communications e.g. VoIP | 0.449 |
| H04M15/44 | Augmented consolidated or itemized billing statement or bill presentation | 0.449 |
| H04N21/4668 | for recommending content e.g. movies | 0.449 |
| H04N21/4784 | receiving rewards | payment schemes architectures or protocols | (ref: G06Q20/00)| | e-commerce | (ref: G06Q30/00)| | charging arrangements in data networks | (ref: H04L12/14) | 0.449 |
| H04N21/8173 | End-user applications e.g. Web browser game | 0.449 |
| H04N21/4431 | characterized by the use of Application Program Interface [API] libraries | 0.449 |
| H04N21/858 | Linking data to content e.g. by linking an URL to a video object by creating a hotspot | 0.449 |
| H04L69/164 | Adaptation or special uses of UDP protocol | 0.448 |
| H04W80/06 | Transport layer protocols e.g. TCP [Transport Control Protocol] over wireless | transmission control protocol/Internet protocol [TCP/IP] or user datagram protocol [UDP] | (ref: H04L69/16) | 0.448 |
| H04N21/47217 | for controlling playback functions for recorded or on-demand content e.g. using progress bars mode or play-point indicators or bookmarks | specific graphical features in visual interfaces | (ref: H04N21/4312) | 0.448 |
| H04N21/6587 | Control parameters e.g. trick play commands viewpoint selection | 0.448 |
| H04N21/235 | Processing of additional data e.g. scrambling of additional data processing content descriptors | arrangements for simultaneous broadcast of plural pieces of information | (ref: H04H20/28) | 0.448 |
| H04L41/0876 | Aspects of the degree of configuration automation | 0.447 |
| H04L12/4645 | Details on frame tagging | routing of packets | (ref: H04L45/00)| | support for virtual LAN | (ref: H04L49/354) | 0.446 |
| G06F11/1435 | using file system or storage system metadata | 0.446 |
| G06F21/568 | eliminating virus restoring damaged files | 0.446 |
| G06F3/0646 | Horizontal data movement in storage systems i.e. moving data in between storage devices or systems | 0.446 |
| G06F12/0802 | Addressing of a memory level in which the access to the desired data or data block requires associative addressing means e.g. caches | 0.446 |
| G06F3/0679 | Non-volatile semiconductor memory device e.g. flash memory one time programmable memory [OTP] | 0.446 |
| H04N21/2323 | using file mapping | 0.445 |
| H04N21/2358 | for generating different versions e.g. for different recipient devices | 0.445 |
| H04N21/26283 | for associating distribution time parameters to content e.g. to generate electronic program guide data | 0.445 |
| H04W24/10 | Scheduling measurement reports | | Arrangements for measurement reports | 0.445 |
| H04L41/042 | Arrangements involving multiple distributed management centers cooperatively managing the network | 0.444 |
| H04L12/2803 | Home automation networks | 0.444 |
| H04W4/38 | for collecting sensor information | 0.444 |
| G06F9/4893 | taking into account power or heat criteria | power management in computers in general | (ref: G06F1/3203)| | thermal management in computers in general | (ref: G06F1/206) | 0.444 |
| G06F1/329 | Power saving by task scheduling | 0.444 |
| G06F1/3287 | Power saving by switching off individual functional units in a computer system i.e. selective power distribution | 0.444 |
| H04L65/1089 | by adding or removing media | 0.444 |
| G06F17/18 | for evaluating statistical data | e.g. average values frequency distributions probability functions regression analysis | forecasting specially adapted for a specific administrative business or logistic context | (ref: G06Q10/04) | 0.444 |
| H04L67/2871 | Implementation details of a single intermediate entity | 0.444 |
| H04L67/1006 | with static server selection e.g. the same server being selected for a specific client | allocation of processing resources considering data affinity | (ref: G06F9/5033) | 0.444 |
| G06F8/314 | Parallel programming languages | (ref: G06F8/313)| takes precedence | 0.443 |
| H04L41/50 | Network service management i.e. ensuring proper service fulfillment according to an agreement or contract between two parties e.g. between an IT-provider and a customer | 0.443 |
| G06Q30/0641 | Shopping interfaces | 0.443 |
| G06F8/313 | Logic programming e.g. PROLOG programming language | 0.443 |
| H04N21/64322 | IP | 0.443 |
| H04N21/6377 | directed to server | control of source by destination in one way streaming for real-time multimedia communications | (ref: H04L29/06469) | 0.443 |
| H04N21/6373 | for rate control | e.g. request to the server to modify its transmission rate | flow control in packet networks | (ref: H04L47/10) | 0.443 |
| G06Q30/016 | Customer service i.e. after purchase service | 0.443 |
| H04W4/33 | for indoor environments e.g. buildings | 0.443 |
| G01C21/206 | specially adapted for indoor navigation | 0.443 |
| H04L12/2856 | Access arrangements e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W) | 0.443 |
| G06F3/005 | Input arrangements through a video camera | 0.442 |
| G06Q30/0603 | Catalogue ordering | 0.442 |
| G06T7/00 | Image analysis | 0.442 |
| G06K9/6272 | based on distances to cluster centroïds | 0.442 |
| H04L47/286 | Time to live | 0.442 |
| G06F1/12 | Synchronisation of different clock signals | provided by a plurality of clock generators | 0.442 |
| G08G1/0133 | for classifying traffic situation | 0.441 |
| G16H50/30 | for calculating health indices| for individual health risk assessment | 0.441 |
| G08G1/012 | from other sources than vehicle or roadside beacons e.g. mobile networks | 0.441 |
| G06F12/06 | Addressing a physical block of locations e.g. base addressing module addressing memory dedication | (ref: G06F12/08)| takes precedence | 0.441 |
| G06F8/441 | Register allocation| Assignment of physical memory space to logical memory space | 0.441 |
| G06K19/06028 | using bar codes | 0.441 |
| H04L12/185 | with management of multicast group membership | 0.441 |
| G06F21/556 | involving covert channels i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755) | 0.440 |
| G06F12/10 | Address translation | 0.440 |
| G06Q20/325 | using wireless networks | 0.440 |
| G06N7/00 | Computer systems based on specific mathematical models | 0.440 |
| G06F12/0653 | with centralised address assignment | 0.440 |
| G06F12/0246 | in block erasable memory e.g. flash memory | 0.440 |
| G06F3/0641 | De-duplication techniques | 0.440 |
| H04N21/23412 | for generating or manipulating the scene composition of objects e.g. MPEG-4 objects | 0.440 |
| H04L65/1073 | Registration | arrangements for addressing or naming in data networks | (ref: H04L61/00) | 0.440 |
| G06T17/00 | Three dimensional [3D] modelling e.g. data description of 3D objects | 0.440 |
| H04N21/42653 | for processing graphics | 0.440 |
| H04N21/47205 | for manipulating displayed content e.g. interacting with MPEG-4 objects editing locally | 0.440 |
| G10L15/00 | Speech recognition | (ref: G10L17/00)| takes precedence | 0.439 |
| G10L15/222 | Barge in i.e. overridable guidance for interrupting prompts | 0.439 |
| G06N3/00 | Computer systems based on biological models | analogue computers simulating functional aspects of living beings | (ref: G06G7/60) | 0.439 |
| G06N3/02 | using neural network models | for adaptive control | (ref: G05B13/00)| | for image pattern matching | (ref: G06K9/00)| | for image data processing | (ref: G06T1/20)| | for phonetic pattern matching | (ref: G10L15/16) | 0.439 |
| G10L15/20 | Speech recognition techniques specially adapted for robustness in adverse environments e.g. in noise of stress induced speech | (ref: G10L21/02)| takes precedence | 0.439 |
| H04N21/854 | Content authoring | 0.439 |
| G06F12/128 | adapted to multidimensional cache systems e.g. set-associative multicache multiset or multilevel | 0.439 |
| G06F12/0269 | Incremental or concurrent garbage collection e.g. in real-time systems | (ref: G06F12/0261)| takes precedence | 0.439 |
| G06F21/73 | by creating or determining hardware identification e.g. serial numbers | 0.439 |
| G05B17/02 | electric | 0.439 |
| H04N21/845 | Structuring of content e.g. decomposing content into time segments | 0.439 |
| H04N21/442 | Monitoring of processes or resources e.g. detecting the failure of a recording device monitoring the downstream bandwidth the number of times a movie has been viewed the storage space available from the internal hard disk | arrangements for monitoring broadcast services or broadcast-related services | (ref: H04H60/29)| | arrangements for identifying or recognising characteristics with a direct linkage to broadcast information | (ref: H04H60/35)| | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | monitoring in wireless networks | ( | 0.439 |
| H04L65/00 | Network arrangements or protocols for real-time communications | computer conference | (ref: H04L12/1813)| | real time or near real time messaging in message switching systems e.g. instant messaging | (ref: H04L51/04)| | network applications in general | (ref: H04L67/00)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | interconnection arrangements between switching centres for working between exchanges having different types of switching equipment where the types of switching equipment comprise PSTN/ISDN equipment and equipment of networks other than PSTN/I | 0.439 |
| H04N21/44029 | for generating different versions | 0.439 |
| H04W72/0446 | the resource being a slot sub-slot or frame | 0.438 |
| H04L5/0023 | Time-frequency-space | 0.438 |
| H04L5/0048 | Allocation of pilot signals i.e. of signals known to the receiver | 0.438 |
| H04B7/0695 | using beam selection | 0.438 |
| H04L5/0053 | Allocation of signaling i.e. of overhead other than pilot signals | 0.438 |
| H04B7/0456 | Selection of precoding matrices or codebooks e.g. using matrices antenna weighting | 0.438 |
| H04B7/0408 | using two or more beams i.e. beam diversity | 0.438 |
| G01S19/13 | Receivers | 0.438 |
| H04N21/23116 | involving data replication e.g. over plural servers | synchronization of replicated data | (ref: G06F11/1658)| | error detection or correction by means of data replication | (ref: G06F11/2053)| | replication in distributed file systems | (ref: G06F17/30067)| | replication in distributed file systems | (ref: G06F17/30283)| | replication or mirroring of data in data networks | (ref: H04L29/0854) | 0.438 |
| H04N21/41407 | embedded in a portable device e.g. video client on a mobile phone PDA laptop | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)| | arrangements specially adapted for mobile receivers in broadcast systems | (ref: H04H20/57) | 0.438 |
| H04L47/12 | Congestion avoidance or recovery | 0.438 |
| H04L9/00 | Cryptographic mechanisms or cryptographic| arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)| or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00) | 0.437 |
| G06Q20/10 | specially adapted for electronic funds transfer [EFT] systems| specially adapted for home banking systems | 0.437 |
| H04L43/0823 | Errors | management of events faults or alarms in networks or network elements | (ref: H04L41/06) | 0.437 |
| H04N21/6334 | for authorisation e.g. by transmitting a key | arrangements for secret or secure communication | (ref: H04L9/00)| | | wireless communications network key management | (ref: H04W12/04)| | wireless communications network access security | (ref: H04W12/08) | 0.437 |
| H04N21/6582 | Data stored in the client e.g. viewing habits hardware capabilities credit card number | arrangements where receivers interact with the broadcast | (ref: H04H20/38) | 0.437 |
| H04N21/42684 | Client identification by a unique number or address e.g. serial number MAC address socket ID | addressing and naming in data networks | (ref: H04L29/12009) | 0.437 |
| H04N21/4532 | involving end-user characteristics e.g. viewer profile preferences | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protocols involving user profiles for network applications in communication control or processing | (ref: H04L29/08936)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18) | 0.437 |
| H04N21/25875 | involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06) | 0.437 |
| H04N21/42204 | User interfaces specially adapted for controlling a client device through a remote control device| Remote control devices therefor | interaction techniques for graphical user interfaces in general | see| | (ref: G06F3/048)| | computer pointing devices in general | see| | (ref: G06F3/033)| | user interfaces for controlling a tuning device of a television receiver through a remote control | (ref: H03J9/00)| | constructive details of casings for the remote control device | (ref: H01H9/0235)| | remote control of peripheral devices connected to a television receiver through the remote control d | 0.437 |
| H04W8/22 | Processing or transfer of terminal data e.g. status or physical capabilities | 0.437 |
| H04L61/30 | Arrangements for managing names e.g. use of aliases or nicknames | retrieval from the Internet by using information identifiers e.g. uniform resource locators [URLs] | (ref: G06F17/30876)| | name-to-address mapping | (ref: H04L61/15) | 0.436 |
| H04W4/16 | Communication-related supplementary services e.g. call-transfer or call-hold | 0.436 |
| H04W68/02 | Arrangements for increasing efficiency of notification or paging channel | 0.436 |
| H04W76/11 | Allocation or use of connection identifiers | 0.436 |
| H04L43/0894 | Packet rate | 0.436 |
| H04W4/00 | Services specially adapted for wireless communication networks| Facilities therefor | 0.436 |
| G06Q10/0833 | Tracking | 0.436 |
| G06K19/06037 | multi-dimensional coding | 0.436 |
| G06K7/10366 | the interrogation device being adapted for miscellaneous applications | 0.436 |
| G06Q30/0205 | Location or geographical consideration | 0.436 |
| G06Q30/0639 | Item locations | 0.436 |
| H04L43/067 | for time frame related reporting | 0.436 |
| H04L12/5601 | Transfer mode dependent e.g. ATM | 0.436 |
| B60R25/255 | Eye recognition | 0.436 |
| B60R25/257 | Voice recognition | 0.436 |
| G08G1/005 | including pedestrian guidance indicator | 0.436 |
| H04N21/21815 | comprising local storage units | 0.435 |
| H04N21/8133 | specifically related to the content e.g. biography of the actors in a movie detailed information about an article seen in a video program | 0.435 |
| H04N21/2407 | Monitoring of transmitted content e.g. distribution time number of downloads | arrangements for monitoring programmes for broadcast or for distribution combined with broadcast | (ref: H04H20/14) | 0.435 |
| H04N21/6332 | directed to client | 0.435 |
| G06F11/1407 | Checkpointing the instruction stream | 0.435 |
| G06F11/2097 | maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)| and subgroups | 0.435 |
| G06F11/28 | by checking the correct order of processing | (ref: G06F11/08)| Â -Â | (ref: G06F11/26)| take precedence| monitoring patterns of pulse trains | (ref: H03K5/19) | 0.435 |
| H04N21/2405 | Monitoring of the internal components or processes of the server e.g. server load | allocation of resources in multiprogramming arrangements | (ref: G06F9/50)| | performance measurement of computer activity | (ref: G06F11/34) | 0.435 |
| H04N19/164 | Feedback from the receiver or from the transmission channel | 0.435 |
| H04N19/132 | Sampling masking or truncation of coding units e.g. adaptive resampling frame skipping frame interpolation or high-frequency transform coefficient masking | 0.435 |
| H04N21/234381 | by altering the temporal resolution e.g. decreasing the frame rate by frame skipping | 0.435 |
| H04N21/4781 | Games | 0.435 |
| H04N19/172 | the region being a picture frame or field | 0.435 |
| H04N21/25825 | involving client display capabilities e.g. screen resolution of a mobile phone | optimising the visualisation of content during browsing in the Internet | (ref: G06F17/30905)| | processing of terminal status or physical abilities in wireless networks | (ref: H04W8/22)| | authentication in wireless network security | (ref: H04W12/06) | 0.435 |
| H04N19/16 | for a given display mode e.g. for interlaced or progressive display mode | 0.435 |
| H04N21/4302 | Content synchronization processes e.g. decoder synchronization | 0.435 |
| H04N19/587 | involving temporal sub-sampling or interpolation e.g. decimation or subsequent interpolation of pictures in a video sequence | 0.435 |
| G06T15/06 | Ray-tracing | 0.435 |
| G06F3/04845 | for image manipulation e.g. dragging rotation | 0.435 |
| G06Q30/0609 | Buyer or seller confidence or verification | 0.435 |
| H04N21/43615 | Interfacing a Home Network e.g. for connecting the client to a plurality of peripherals | home Audio Video Interoperability [HAVI] data switching networks | (ref: H04L12/2805) | 0.435 |
| G06F3/165 | Management of the audio stream e.g. setting of volume audio stream path | 0.435 |
| G06F12/0837 | with software control e.g. non-cacheable data | 0.435 |
| G06F9/3891 | organised in groups of units sharing resources e.g. clusters | 0.435 |
| G06F21/567 | using dedicated hardware | 0.435 |
| H04W88/06 | adapted for operation in multiple networks | or having at least two operational modes| e.g. multi-mode terminals | 0.435 |
| G16H15/00 | ICT specially adapted for medical reports e.g. generation or transmission thereof | 0.435 |
| G07C9/00571 | operated by interacting with a central unit | 0.434 |
| G06F12/0875 | with dedicated cache e.g. instruction or stack | 0.434 |
| G06F1/3275 | Power saving in memory e.g. RAM cache | 0.434 |
| G06F1/3225 | of memory devices | 0.434 |
| H04N21/8455 | involving pointers to the content e.g. pointers to the I-frames of the video stream | 0.434 |
| H04N21/4728 | for selecting a Region Of Interest [ROI] e.g. for requesting a higher resolution version of a selected region | 0.434 |
| H04N21/85406 | involving a specific file format e.g. MP4 format | 0.434 |
| H04N21/21805 | enabling multiple viewpoints e.g. using a plurality of cameras | 0.434 |
| G06Q20/023 | characterized in that the neutral party is a clearing house | 0.433 |
| G06F21/755 | with measures against power attack | 0.433 |
| G07F7/0833 | Card having specific functional components | 0.433 |
| H04W48/02 | Access restriction performed under specific conditions | 0.432 |
| G06F11/3672 | Test management | 0.432 |
| G06F11/3452 | Performance evaluation by statistical analysis | 0.432 |
| G06F11/3692 | for test results analysis | 0.432 |
| G06F11/3438 | monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22) | 0.432 |
| H04L1/16 | in which the return channel carries supervisory signals e.g. repetition request signals | 0.432 |
| G06Q50/04 | Manufacturing | 0.432 |
| G06Q10/06375 | Prediction of business process outcome or impact based on a proposed change | 0.432 |
| G06N3/0445 | Feedback networks e.g. hopfield nets associative networks | 0.432 |
| G06N3/063 | using electronic means | 0.432 |
| G06Q10/06395 | Quality analysis or management | 0.431 |
| G10L17/06 | Decision making techniques| Pattern matching strategies | 0.431 |
| G06N3/0472 | using probabilistic elements e.g. p-rams stochastic processors | 0.431 |
| H04W92/18 | between terminal devices | 0.431 |
| G06F15/1735 | Network adapters e.g. SCI Myrinet | protocol engines | (ref: H04L29/06081) | 0.431 |
| H04L69/12 | Protocol engines e.g. VLSIs or transputers | 0.431 |
| G06F12/0846 | Cache with multiple tag or data arrays being simultaneously accessible | 0.431 |
| G06F13/1642 | with request queuing | 0.431 |
| G11C7/1087 | Data input latches | 0.431 |
| G11C7/106 | Data output latches | 0.431 |
| G06F12/1466 | Key-lock mechanism | 0.431 |
| G06F13/18 | based on priority control | (ref: G06F13/1605)| takes precedence | 0.431 |
| G06F9/526 | Mutual exclusion algorithms | 0.431 |
| G08B13/19667 | Details realated to data compression encryption or encoding e.g. resolution modes for reducing data volume to lower transmission bandwidth or memory requirements | 0.430 |
| G08B13/196 | using television cameras | recognition of scenes under surveillance | (ref: G06K9/00771)| | image analysis | per se| | (ref: G06T7/00)| | television cameras | (ref: H04N5/225)| | CCTV systems | (ref: H04N7/18) | 0.430 |
| H04L9/065 | Encryption by serially and continuously modifying data stream elements e.g. stream cipher systems RC4 SEAL or A5/3 | 0.430 |
| G06F9/30014 | with variable precision | 0.430 |
| G09G5/393 | Arrangements for updating the contents of the bit-mapped memory | 0.430 |
| G06F7/5443 | Sum of products | for applications thereof | see| the relevant places e.g. | (ref: G06F17/10)| | (ref: H03H17/00) | 0.430 |
| G06F3/04812 | interaction techniques based on cursor appearance or behaviour being affected by the presence of displayed objects e.g. visual feedback during interaction with elements of a graphical user interface through change in cursor appearance constraint movement or attraction/repulsion with respect to a displayed object | interaction techniques based on cursor behaviour involving tactile or force feedback | (ref: G06F3/016) | 0.430 |
| H04L41/085 | Keeping track of network configuration | 0.430 |
| H04N21/6581 | Reference data e.g. a movie identifier for ordering a movie or a product identifier in a home shopping application | 0.429 |
| G06Q40/06 | Investment e.g. financial instruments portfolio management or fund management | 0.429 |
| H04N21/482 | End-user interface for program selection | systems specially adapted for using EPGs in broadcast systems | (ref: H04H60/72) | 0.429 |
| H04W8/08 | Mobility data transfer | 0.429 |
| H04W76/30 | Connection release | 0.429 |
| H04W76/27 | Transitions between radio resource control [RRC] states | 0.429 |
| H04W76/25 | Maintenance of established connections | 0.429 |
| G05B19/4155 | characterised by programme execution i.e. part programme or machine function execution e.g. selection of a programme | 0.429 |
| G06F9/38 | Concurrent instruction execution e.g. pipeline look ahead | 0.428 |
| G06F9/30 | Arrangements for executing machine instructions e.g. instruction decode | for executing microinstructions | (ref: G06F9/22) | 0.428 |
| H04L61/2517 | involving port numbers | 0.428 |
| H04L45/54 | Organization of routing tables | 0.428 |
| H04W72/10 | where an allocation plan is defined| based on priority criteria | 0.428 |
| H04L5/0055 | Physical resource allocation for ACK/NACK | for physical mapping arrangements in ARQ protocols | (ref: H04L1/1861) | 0.428 |
| H04W72/0433 | between access point and access point controlling device | 0.428 |
| G16H50/20 | for computer-aided diagnosis e.g. based on medical expert systems | 0.427 |
| H04W36/0094 | Definition of hand-off measurement parameters | 0.427 |
| H04B17/318 | Received signal strength | 0.427 |
| H04W36/38 | by fixed network equipment | 0.427 |
| G06Q20/127 | Shopping or accessing services according to a time-limitation | 0.427 |
| G06F3/1462 | with means for detecting differences between the image stored in the host and the images displayed on the remote displays | 0.427 |
| G06F3/0683 | Plurality of storage devices | 0.427 |
| G06F3/065 | Replication mechanisms | 0.427 |
| G06F1/30 | Means for acting in the event of power-supply failure or interruption e.g. power-supply fluctuations | for resetting only | (ref: G06F1/24) | 0.427 |
| G06F12/122 | of the least frequently used [LFU] type e.g. with individual count value | 0.427 |
| H04L45/122 | Minimizing distance e.g. ? number of hops | 0.427 |
| G06Q30/0277 | Online advertisement | 0.426 |
| G06Q10/08355 | Routing methods | 0.426 |
| G07F17/0092 | for assembling and dispensing of pharmaceutical articles | medical dispensers for private use | (ref: A61J7/00)| | data processing for medical purposes | (ref: G06F19/00) | 0.426 |
| G06Q30/0607 | Regulated | 0.426 |
| G06Q30/0282 | Business establishment or product rating or recommendation | 0.426 |
| G06F3/0656 | Data buffering arrangements | 0.426 |
| G06F3/0604 | Improving or facilitating administration e.g. storage management | 0.426 |
| G06F3/064 | Management of blocks | 0.426 |
| G06Q10/08 | Logistics e.g. warehousing loading distribution or shipping| Inventory or stock management e.g. order filling procurement or balancing against orders | 0.426 |
| G06Q10/04 | Forecasting or optimisation e.g. linear programming "travelling salesman problem" or "cutting stock problem" | data collection specially adapted for marketing price determination or demand forecasting | (ref: G06Q30/02) | 0.426 |
| H04L47/821 | Prioritising resource allocation or reservation requests | 0.425 |
| H04L47/788 | Autonomous allocation of resources | 0.425 |
| G06F11/0718 | in an object-oriented system | 0.425 |
| G06F11/0736 | in functional embedded systems i.e. in a data processing system designed as a combination of hardware and software dedicated to performing a certain function | testing or monitoring of automated control systems | (ref: G05B23/02) | 0.425 |
| H04N1/444 | to a particular document or image or part thereof | 0.425 |
| G06F12/1483 | using an access-table e.g. matrix or list | 0.424 |
| G06F21/123 | by using dedicated hardware e.g. dongles smart cards cryptographic processors global positioning systems [GPS] devices | 0.424 |
| H04L49/30 | Peripheral units e.g. input or output ports | 0.424 |
| H04L49/103 | using shared central buffer shared memory e.g. time switching | 0.424 |
| H04L12/10 | Current supply arrangements | 0.424 |
| G06F12/0813 | with a network or matrix configuration | 0.424 |
| H04L49/351 | LAN switches e.g. ethernet switches | 0.424 |
| G06F11/3485 | for I/O devices | 0.424 |
| G06F9/454 | Multi-language systems| Localisation| Internationalisation | 0.424 |
| H04L45/123 | Evaluation of link metrics | techniques for monitoring network metrics | (ref: H04L43/08) | 0.423 |
| G10L17/22 | Interactive procedures| Man-machine interfaces | 0.423 |
| G10L15/06 | Creation of reference templates| Training of speech recognition systems e.g. adaptation to the characteristics of the speaker's voice | (ref: G10L15/14)| takes precedence | 0.423 |
| G10L17/08 | Use of distortion metrics or a particular distance between probe pattern and reference templates | 0.423 |
| H04L9/0816 | Key establishment i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties for subsequent use | 0.423 |
| H04L63/00 | Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00) | 0.423 |
| H04W8/005 | Discovery of network devices e.g. terminals | 0.423 |
| H04W52/0229 | where the received signal is a wanted signal | 0.423 |
| H04W88/02 | Terminal devices | 0.423 |
| H04W4/12 | Messaging| Mailboxes| Announcements | 0.423 |
| H04W8/04 | Registration at HLR or HSS [Home Subscriber Server] | 0.423 |
| H04W28/08 | Load balancing or load distribution | 0.423 |
| G06F13/28 | using burst mode transfer e.g. direct memory access | DMA| cycle steal | (ref: G06F13/32)| takes precedence | 0.423 |
| H04L67/00 | Network-specific arrangements or communication protocols supporting networked applications | message switching systems | (ref: H04L51/00)| | network management protocols | (ref: H04L41/00)| | routing or path finding of packets in data switching networks | (ref: H04L45/00)| | protocols for real-time multimedia communication | (ref: H04L65/00)| | information retrieval | (ref: G06F17/30)| | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)| | network structures or processes for video distribution between server and client or between remote clients | (r | 0.423 |
| H04B1/3816 | Mechanical arrangements for accommodating identification devices e.g. cards or chips| with connectors for programming identification devices | 0.423 |
| H04M3/42102 | Making use of the called party identifier | 0.423 |
| H04M3/42008 | Systems for anonymous communication between parties e.g. by use of disposal contact identifiers | 0.423 |
| G06F9/3009 | Thread control instructions | 0.423 |
| G10L15/18 | using natural language modelling | 0.423 |
| H04M3/42348 | Location-based services which utilize the location information of a target | 0.423 |
| G16H40/20 | for the management or administration of healthcare resources or facilities e.g. managing hospital staff or surgery rooms | 0.422 |
| H04W8/12 | between location registers or mobility servers | 0.422 |
| H04W36/32 | by location or mobility data e.g. speed data | 0.422 |
| G06F15/17375 | One dimensional e.g. linear array ring | 0.422 |
| H04L63/0492 | by using a location-limited connection e.g. near-field communication or limited proximity of entities | 0.422 |
| G16H80/00 | ICT specially adapted for facilitating communication between medical practitioners or patients e.g. for collaborative diagnosis therapy or health monitoring | 0.421 |
| H04N21/2355 | involving reformatting operations of additional data e.g. HTML pages | optimising the visualization of content for information retrieval from the Internet | (ref: G06F17/30905)| | media manipulation adaptation or conversion at the source in one way streaming for real-time multimedia communications | (ref: H04L29/06489)| | message adaptation based on network or terminal capabilities in stored and forward packet switching | (ref: H04L51/34) | 0.421 |
| H04N21/8358 | involving watermark | protecting executable software by watermarking | (ref: G06F21/16)| | image watermarking in general | (ref: G06T1/0021)| | watermarks inserted in still images for transmission purposes | (ref: H04N1/32144)| | inserting watermarks during video coding | (ref: H04N19/467) | 0.421 |
| G06T1/0021 | Image watermarking | 0.421 |
| G06F12/1036 | for multiple virtual address spaces e.g. segmentation | (ref: G06F12/1045)| takes precedence | 0.421 |
| G06F3/04883 | for entering handwritten data e.g. gestures text | 0.421 |
| H04L9/32 | including means for verifying the identity or authority of a user of the system | or for message authentication e.g. authorization entity authentication data integrity or data verification non-repudiation key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | | computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08) | 0.421 |
| G06F21/46 | by designing passwords or checking the strength of passwords | 0.421 |
| H04W60/00 | Registration e.g. affiliation to network| De-registration e.g. terminating affiliation | 0.421 |
| H04L61/00 | Network arrangements or network protocols for addressing or naming | 0.421 |
| G08B21/0415 | detecting absence of activity | per se | 0.421 |
| H04L43/065 | for device related reporting | reporting of sensed information of home appliances | (ref: H04L12/2803) | 0.421 |
| H04W52/383 | power control in peer-to-peer links | 0.421 |
| H04L12/2823 | Reporting information sensed by appliance or service execution status of appliance services in a home automation network | device-related reporting | (ref: H04L43/065)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom | (ref: H04Q9/00) | 0.421 |
| H04W76/14 | Direct-mode setup | 0.421 |
| H04L12/2814 | Exchanging control software or macros for controlling appliance services in a home automation network | arrangements for maintenance or administration involving configuration of the network and network elements | (ref: H04L41/08) | 0.421 |
| H04W52/0212 | managed by the network e.g. network or access point is master and terminal is slave | 0.421 |
| H04W72/0493 | where an allocation plan is defined based on a resource usage policy | 0.421 |
| H04L12/2827 | Reporting to a device within the home network| wherein the reception of the information reported automatically triggers the execution of a home appliance functionality | 0.421 |
| H04L12/28 | characterised by path configuration e.g. local area networks [LAN] wide area networks [WAN] | 0.421 |
| H04W40/246 | Connectivity information discovery | 0.421 |
| H04L47/2441 | Flow classification | 0.421 |
| H04L47/2475 | Application aware | 0.421 |
| H04L47/2483 | Flow identification | 0.421 |
| H04L41/0604 | Alarm or event filtering e.g. for reduction of information | 0.420 |
| G06F3/16 | Sound input| Sound output | conversion of speech into digital information or | vice versa| | (ref: G10L) | 0.420 |
| G10L15/16 | using artificial neural networks | 0.420 |
| G10L13/027 | Concept to speech synthesisers| Generation of natural phrases from machine-based concepts | generation of parameters for speech synthesis out of text | (ref: G10L13/08) | 0.420 |
| G10L13/047 | Architecture of speech synthesisers | 0.420 |
| G06F8/10 | Requirements analysis| Specification techniques | 0.420 |
| G06N5/02 | Knowledge representation | (ref: G06N5/04)| takes precedence | 0.420 |
| H04M7/0069 | comprising a residential gateway e.g. those which provide an adapter for POTS or ISDN terminals | 0.419 |
| G06F11/366 | using diagnostics | (ref: G06F11/0703)| takes precedence | 0.419 |
| G06Q20/3229 | Use of the SIM of a M-device as secure element | 0.419 |
| H04W36/0011 | for data session or connection | 0.419 |
| G06F12/0833 | in combination with broadcast means (e.g. for invalidation or updating) | 0.419 |
| G06F12/0215 | with look ahead addressing means | 0.419 |
| A63F13/822 | Strategy games| Role-playing games | (ref: A63F13/825)| | (ref: A63F13/828)| take precedence | 0.418 |
| G06T17/005 | Tree description e.g. octree quadtree | 0.418 |
| G06Q10/0635 | Risk analysis | 0.418 |
| G06F11/0751 | Error or fault detection not based on redundancy | power supply failures | (ref: G06F1/30)| | network fault management | (ref: H04L41/06) | 0.418 |
| H04N7/0117 | involving conversion of the spatial resolution of the incoming video signal | for graphics images | (ref: G09G2340/0407) | 0.418 |
| H04N21/4223 | Cameras | (ref: H04N5/225)| takes precedence | 0.418 |
| H04N21/4402 | involving reformatting operations of video signals for household redistribution storage or real-time display | adapting incoming signals to the display format of the display terminal | (ref: G09G5/005)| | media manipulation adaptation or conversion at the destination in one way streaming for real-time multimedia communications | (ref: H04L29/06496)| | details of conversion of video standards at pixel level | (ref: H04N7/01)| | video transcoding | (ref: H04N19/40) | 0.418 |
| H04N7/181 | for receiving images from a plurality of remote sources | 0.418 |
| H04N19/40 | using video transcoding i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream | 0.418 |
| G08B13/19656 | Network used to communicate with a camera e.g. WAN LAN Internet | 0.418 |
| G05B19/0428 | Safety monitoring | (ref: G05B19/0423)| takes precedence | 0.417 |
| G05B23/0216 | Human interface functionality e.g. monitoring system providing help to the user in the selection of tests or in its configuration | 0.417 |
| G05B23/027 | Alarm generation e.g. communication protocol| Forms of alarm | 0.417 |
| H04L41/5009 | Determining service level performance e.g. measuring SLA quality parameters determining contract or guarantee violations response time or mean time between failure [MTBF] | monitoring performance metrics on a simple network level | (ref: H04L43/08) | 0.417 |
| H01H13/14 | Operating parts e.g. push-button | 0.417 |
| G06F11/3082 | the data filtering being achieved by aggregating or compressing the monitored data | 0.417 |
| G06F11/3058 | Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component e.g. monitoring of power currents temperature humidity position vibrations | thermal management in cooling arrangements of a computing system | (ref: G06F1/206) | 0.417 |
| G09C1/00 | Apparatus or methods whereby a given sequence of signs e.g. an intelligible text is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00) | 0.417 |
| G06Q30/04 | Billing or invoicing | e.g. tax processing in connection with a sale | 0.417 |
| G06F9/30116 | Shadow registers e.g. coupled registers not forming part of the register space | 0.417 |
| H04W76/40 | for selective distribution or broadcast | 0.416 |
| H04W4/90 | Services for handling of emergency or hazardous situations e.g. earthquake and tsunami warning systems [ETWS] | 0.416 |
| H04L65/4061 | "Push-to-X" services | push-to-talk services in wireless networks | (ref: H04W4/10)| | connection management e.g. connection set-up manipulation or release for push-to-talk or push-on-call services in wireless communication networks | (ref: H04W76/45) | 0.416 |
| G06F12/145 | the protection being virtual e.g. for virtual blocks or segments before a translation mechanism | 0.416 |
| H04B7/18519 | Operations control administration or maintenance | 0.416 |
| G10L13/00 | Speech synthesis| Text to speech systems | 0.416 |
| H04N21/44204 | Monitoring of content usage e.g. the number of times a movie has been viewed copied or the amount which has been watched | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protecting generic digital content where the protection is independent of the precise nature of the content | (ref: G06F21/10)| | arrangements for monitoring the use made of the broadcast services in broadcast systems | (ref: H04H60/31) | 0.416 |
| H04N21/2668 | Creating a channel for a dedicated end-user group e.g. insertion of targeted commercials based on end-user profiles | information retrieval from the Internet by querying with filtering and personalisation | (ref: G06F17/30867)| | arrangements for replacing or switching information during the broadcast | (ref: H04H20/10)| | push services over packet-switching network | (ref: H04L12/1859)| | adaptation of message content in packet-switching networks | (ref: H04L51/063) | 0.416 |
| H04W48/20 | Selecting an access point | 0.415 |
| H04W8/245 | from a network towards a terminal | 0.415 |
| H04N21/233 | Processing of audio elementary streams | details of formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes | (ref: G10L19/167)| | arrangements characterised by components specially adapted for monitoring identification or recognition of audio in broadcast systems | (ref: H04H60/58) | 0.415 |
| H04N21/26241 | involving the time of distribution e.g. the best time of the day for inserting an advertisement or airing a children program | 0.415 |
| H04N21/458 | Scheduling content for creating a personalised stream e.g. by combining a locally stored advertisement with an incoming stream| Updating operations e.g. for OS modules | | time-related management operations | arrangements for replacing or switching information during the broadcast or during the distribution | (ref: H04H20/10) | 0.415 |
| H04N21/2368 | Multiplexing of audio and video streams | 0.415 |
| G10L25/78 | Detection of presence or absence of voice signals | switching of direction of transmission by voice frequency in two-way loud-speaking telephone systems | (ref: H04M9/10) | 0.415 |
| H04L12/2832 | Interconnection of the control functionalities between home networks | single bridge functionality | (ref: H04L12/4625) | 0.415 |
| H04L12/2829 | involving user profiles according to which the execution of a home appliance functionality is automatically triggered | 0.415 |
| G06F3/1247 | by conversion to printer ready format | 0.415 |
| G06F3/1211 | Improving printing performance | 0.415 |
| G06F3/1228 | Printing driverless or using generic drivers | 0.415 |
| G06F11/0787 | Storage of error reports e.g. persistent data storage storage using memory protection | 0.415 |
| G06F11/3072 | where the reporting involves data filtering e.g. pattern matching time or event triggered adaptive or policy-based reporting | 0.415 |
| G06F11/2294 | by remote test | 0.415 |
| G05B19/4186 | by protocol e.g. MAP TOP | 0.415 |
| A63F13/26 | having at least one additional display device e.g. on the game controller or outside a game booth | 0.415 |
| H04N21/472 | End-user interface for requesting content additional data or services| End-user interface for interacting with content e.g. for content reservation or setting reminders for requesting event notification for manipulating displayed content | end-user interfaces for retrieving video data from a database | (ref: G06F17/30843)| | content on demand in one way streaming for real-time multimedia communications | (ref: H04L29/06462) | 0.414 |
| H04L65/60 | Media handling encoding streaming or conversion | 0.414 |
| H04N21/44 | Processing of video elementary streams e.g. splicing a video clip retrieved from local storage with an incoming video stream rendering scenes according to MPEG-4 scene graphs | 0.414 |
| H04J3/0661 | using timestamps | 0.414 |
| G06F12/0615 | Address space extension | 0.414 |
| H04N21/254 | Management at additional data server e.g. shopping server rights management server | protocols involving third party service providers for network applications in communication control or processing | (ref: H04L29/08666)| | arrangements for maintenance or administration in data networks | (ref: H04L41/00) | 0.414 |
| G06Q20/04 | Payment circuits | 0.414 |
| G06Q30/0633 | Lists e.g. purchase orders compilation or processing | 0.414 |
| H04L41/0873 | by checking configuration conflicts with other network elements | 0.414 |
| H04L41/0213 | using standardized network management protocols e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP] | 0.414 |
| H04L41/16 | Network management using artificial intelligence | 0.414 |
| H04L49/208 | Port mirroring | 0.414 |
| G06N3/0481 | Non-linear activation functions e.g. sigmoids thresholds | 0.414 |
| H04W28/24 | Negotiating SLA [Service Level Agreement]| Negotiating QoS [Quality of Service] | 0.413 |
| G06F12/1458 | by checking the subject access rights | 0.413 |
| G06Q30/0615 | Anonymizing | 0.413 |
| H04W28/0278 | using buffer status reports | dynamic wireless traffic scheduling definition | (ref: H04W72/1205) | 0.413 |
| G06F12/0806 | Multiuser multiprocessor or multiprocessing cache systems | 0.413 |
| G06F13/4221 | being an input/output bus e.g. ISA bus EISA bus PCI bus SCSI bus | 0.413 |
| H04L61/256 | Network address translation [NAT] traversal | 0.413 |
| H04L45/7453 | using hashing | 0.413 |
| G06F13/4063 | Device-to-bus coupling | 0.413 |
| H04W28/0284 | detecting congestion or overload during communication | monitoring arrangements | (ref: H04L43/00) | 0.413 |
| H04N19/52 | by predictive encoding | 0.413 |
| H04N19/523 | with sub-pixel accuracy | 0.413 |
| H04N19/102 | characterised by the element parameter or selection affected or controlled by the adaptive coding | 0.413 |
| H04N19/98 | Adaptive-dynamic-range coding [ADRC] | 0.413 |
| H04N19/70 | characterised by syntax aspects related to video coding e.g. related to compression standards | 0.413 |
| H04N19/157 | Assigned coding mode i.e. the coding mode being predefined or preselected to be further used for selection of another element or parameter | 0.413 |
| H04N19/159 | Prediction type e.g. intra-frame inter-frame or bidirectional frame prediction | 0.413 |
| H04N19/13 | Adaptive entropy coding e.g. adaptive variable length coding [AVLC] or context adaptive binary arithmetic coding [CABAC] | 0.413 |
| G06T7/12 | Edge-based segmentation | 0.413 |
| G06Q30/0643 | Graphical representation of items or shoppers | 0.413 |
| G06T7/70 | Determining position or orientation of objects or cameras | camera calibration | (ref: G06T7/80) | 0.413 |
| G06T15/503 | Blending e.g. for anti-aliasing | 0.413 |
| G06T7/13 | Edge detection | 0.413 |
| G05B15/02 | electric | 0.413 |
| H02J3/381 | Dispersed generators | 0.413 |
| G05B19/41875 | characterised by quality surveillance of production | 0.413 |
| A63F13/86 | Watching games played by other players | 0.412 |
| A63F13/42 | by mapping the input signals into game commands e.g. mapping the displacement of a stylus on a touch screen to the steering angle of a virtual vehicle | 0.412 |
| H04N21/2743 | Video hosting of uploaded data from client | 0.412 |
| A63F13/847 | Cooperative playing e.g. requiring coordinated actions from several players to achieve a common goal | 0.412 |
| H04L69/32 | High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks | 0.412 |
| H04W4/23 | for mobile advertising | 0.412 |
| H04W72/085 | using measured or perceived quality | 0.412 |
| H04W16/14 | Spectrum sharing arrangements | between different networks | 0.412 |
| H04W74/0808 | using carrier sensing e.g. as in CSMA | 0.412 |
| H04W72/0453 | the resource being a frequency carrier or frequency band | 0.412 |
| H04W74/04 | Scheduled | or contention-free| access | 0.412 |
| G11C11/2293 | Timing circuits or methods | 0.412 |
| H04B17/336 | Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR] | 0.412 |
| G11C11/2259 | Cell access | 0.412 |
| H04B17/373 | Predicting channel quality parameters | 0.412 |
| G11C11/2297 | Power supply circuits | 0.412 |
| H04B17/27 | for locating or positioning the transmitter | 0.412 |
| H04L1/0018 | based on latency requirement | 0.412 |
| G11C11/2273 | Reading or sensing circuits or methods | 0.412 |
| G01V3/12 | operating with electromagnetic waves | operating with millimetre waves | (ref: G01V8/005) | 0.412 |
| G11C11/2257 | Word-line or row circuits | 0.412 |
| H04L5/006 | Quality of the received signal e.g. BER SNR water filling | 0.412 |
| G05B23/0208 | characterized by the configuration of the monitoring system | 0.412 |
| A61B5/1126 | using a particular sensing technique | 0.412 |
| A61B5/4833 | Assessment of subject's compliance to treatment | 0.412 |
| G04F10/00 | Apparatus for measuring unknown time intervals by electric means | timing devices for clocks or watches for comparing the rate of the oscillating member with a standard | (ref: G04D7/12)| | radar systems analogous systems | (ref: G01S7/00)| | measuring frequency | (ref: G01R23/00)| | measuring phase angle | (ref: G01R25/00) | 0.412 |
| A61B5/742 | using visual displays | (ref: A61B5/044)| takes precedence | 0.412 |
| A61B5/6843 | Monitoring or controlling sensor contact pressure | 0.412 |
| A61F5/02 | Orthopaedic corsets | arm-rests for use as writing aids | (ref: B43L15/00) | 0.412 |
| A61B5/6831 | Straps bands or harnesses | 0.412 |
| G16H20/30 | relating to physical therapies or activities e.g. physiotherapy acupressure or exercising | 0.412 |
| G06F11/008 | Reliability or availability analysis | 0.412 |
| H03M7/6023 | Parallelization | 0.412 |
| G06F7/24 | Sorting i.e. extracting data from one or more carriers rearranging the data in numerical or other ordered sequence and rerecording the sorted data on the original carrier or on a different carrier or set of carriers | sorting methods in general| (ref: G06F7/36)| takes precedence | 0.412 |
| H03M7/30 | Compression | speech analysis-synthesis for redundancy reduction | (ref: G10L19/00)| | for image communication | (ref: H04N)| Expansion| Suppression of unnecessary data e.g. redundancy reduction | for data acquisition | (ref: G06F17/40)| | for image data processing | (ref: G06T9/00)| | redundancy reduction in data recording | (ref: G11B20/14)| | for transmission | (ref: H04B1/66) | 0.412 |
| H03M7/3064 | Segmenting | 0.412 |
| G06F11/1044 | with specific ECC/EDC distribution | 0.412 |
| G06F9/466 | Transaction processing | 0.411 |
| H04L47/745 | Reaction in network | 0.411 |
| H04L41/5051 | Service on demand i.e. services are defined and provided in real time as requested by the user | 0.411 |
| H04W28/04 | Error control | 0.411 |
| G01D21/00 | Measuring or testing not otherwise provided for | 0.411 |
| H04M3/02 | Ringing or otherwise calling substations | selective calling | (ref: H04Q) | 0.411 |
| B41F33/00 | Indicating counting warning control or safety devices | arrangements of counting devices in platen presses | (ref: B41F1/00)| | | (ref: B41F1/58)| | arrangements of counting devices| in cylinder presses | (ref: B41F3/84)| | ink supply or metering devices | (ref: B41F31/02) | 0.410 |
| H04L43/0817 | functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803) | 0.410 |
| G10L15/063 | Training | 0.410 |
| G10L15/083 | Recognition networks | (ref: G10L15/142)| | (ref: G10L15/16)| take precedence | 0.410 |
| H04L9/12 | Transmitting and receiving encryption devices synchronised or initially set up in a particular manner | 0.410 |
| H04J3/0658 | Clock or time synchronisation among packet nodes | 0.410 |
| H04L41/5058 | Service discovery by the service manager | automatically determining the actual topology of a network | (ref: H04L41/12)| | topology discovery for routing | (ref: H04L45/02)| | arrangements for service discovery e.g. service location protocol | (ref: H04L67/16) | 0.410 |
| H04W88/18 | Service support| Network management devices | 0.410 |
| H04N21/6405 | Multicasting | data broadcast and multicast in packet switching networks | (ref: H04L12/18) | 0.410 |
| G01V99/005 | Geomodels or geomodelling not related to particular measurements | 0.410 |
| H04W48/14 | using user query | or user detection | 0.410 |
| G05B13/0265 | the criterion being a learning criterion | 0.410 |
| A01B79/005 | Precision agriculture | 0.410 |
| H04M3/4931 | Directory assistance systems | 0.410 |
| H04M3/4936 | Speech interaction details | speech recognition | per se| | (ref: G10L15/00) | 0.410 |
| H04L41/08 | Configuration management of network or network elements | proprietary application protocols for remote control of end-devices in special networking environments | (ref: H04L67/125)| | automatic configuration specially adapted for wireless networks | (ref: H04W24/02) | 0.410 |
| G09C5/00 | Ciphering apparatus or methods not provided for in the preceding groups e.g. involving the concealment or deformation of graphic data such as designs written or printed messages | 0.409 |
| G07B15/02 | taking into account a variable factor such as distance or time e.g. for passenger transport parking systems or car rental systems | (ref: G07B15/06)| takes precedence| taximeters | (ref: G07B13/00)| | parking meters | per se| | (ref: G07F17/24)| | | car rental systems | per se| | (ref: G07B15/00) | 0.409 |
| G07F15/005 | dispensed for the electrical charging of vehicles | electrical charging as such | (ref: B60L11/00) | 0.409 |
| G06Q20/4033 | Local solvency checks | 0.409 |
| G07F7/125 | Offline card verification | 0.409 |
| H04W84/18 | Self-organising networks e.g. ad-hoc networks or sensor networks | 0.409 |
| G06F9/30029 | Logical and Boolean instructions e.g. XOR NOT | 0.409 |
| G06F3/1296 | Printer job scheduling or printer resource handling | 0.409 |
| G06F3/1268 | Job submission e.g. submitting print job order or request not the print data itself | 0.409 |
| G06F3/1222 | Increasing security of the print job | 0.409 |
| G06F11/2023 | Failover techniques | 0.409 |
| G16H20/00 | ICT specially adapted for therapies or health-improving plans e.g. for handling prescriptions for steering therapy or for monitoring patient compliance | 0.408 |
| H02J50/12 | of the resonant type | 0.408 |
| H04L12/18 | for broadcast or conference | e.g. multicast | multicast or broadcast switches | (ref: H04L49/201) | 0.408 |
| G06N3/105 | Shells for specifying net layout | 0.408 |
| G06N3/10 | Simulation on general purpose computers | 0.408 |
| H04L12/46 | Interconnection of networks | 0.408 |
| G06F9/449 | Object-oriented method invocation or resolution | 0.408 |
| H04L61/2521 | Special translation architecture i.e. being different from a single network address translation [NAT] server | 0.408 |
| H04L49/70 | Virtual switches | 0.408 |
| G06F15/177 | Initialisation or configuration control | processor initialisation | (ref: G06F9/4405) | 0.408 |
| H04L41/0889 | Techniques to speed-up the configuration process | 0.408 |
| H04L67/1036 | Load balancing of requests to servers for services different from user content provisioning e.g. load balancing to DNS servers or firewalls | internet service provider selection | (ref: H04L12/5691) | 0.408 |
| G08C17/02 | using a radio link | 0.408 |
| B63B49/00 | Arrangements of nautical instruments or navigational aids | nautical measuring instruments | (ref: G01C)| | radio navigation analogous arrangements using other waves | (ref: G01S) | 0.408 |
| G01S19/48 | by combining or switching between position solutions derived from the satellite radio beacon positioning system and position solutions derived from a further system | 0.408 |
| G06F3/0652 | Erasing e.g. deleting data cleaning moving of data to a wastebasket | 0.407 |
| G06F3/0655 | Vertical data movement i.e. input-output transfer| data movement between one or more hosts and one or more storage devices | 0.407 |
| G06F3/0667 | at data level e.g. file record or object virtualisation | 0.407 |
| G06F3/0614 | Improving the reliability of storage systems | 0.407 |
| G06F3/0665 | at area level e.g. provisioning of virtual or logical volumes | 0.407 |
| G06F3/0664 | at device level e.g. emulation of a storage device or system | 0.407 |
| G06F3/0653 | Monitoring storage devices or systems | 0.407 |
| H04N21/6543 | for forcing some client operations e.g. recording | remote booting in general | (ref: G06F9/4416) | 0.407 |
| H04N21/242 | Synchronization processes e.g. processing of Program Clock References [PCR] | synchronisation arrangements in time-division multiplex systems | (ref: H04J3/06)| | arrangements for synchronising broadcast or distribution via plural systems in broadcast distribution systems | (ref: H04H20/18)| | arrangements for synchronising receiver with transmitter | (ref: H04L7/00)| | synchronising circuits with arrangements for extending range of synchronisation at the transmitter end | (ref: H04N5/067) | 0.407 |
| G07F19/20 | Automatic teller machines [ATMs] | 0.407 |
| G06F3/04842 | Selection of a displayed object | (ref: G06F3/0482)| takes precedence | 0.406 |
| G06F21/43 | wireless channels | 0.406 |
| G10L25/54 | for retrieval | 0.406 |
| H04N21/4398 | involving reformatting operations of audio signals | details of audio signal transcoding | (ref: G10L19/173) | 0.406 |
| H04N21/8106 | involving special audio data e.g. different tracks for different languages | 0.406 |
| H04L65/1059 | End-user terminal functionality | substation equipment for use by subscribers | (ref: H04M1/00)| | terminal profiles | (ref: H04L67/303)| | terminal emulation | (ref: H04L67/08)| | adaptation for terminals with limited resources or for terminal portability | (ref: H04L67/04)| | management of video client characteristics | (ref: H04N21/258)| | (ref: H04N21/4516) | 0.406 |
| H04N5/76 | Television signal recording | diagnosis testing or measuring for television signal recorders | (ref: H04N17/06)| | recording in connection with measuring | (ref: G01D)| | information storage | in which the television signal is not involved driving starting stopping head switching editing indexing| in general | (ref: G11)| e.g. | (ref: G11B) | 0.406 |
| H04N7/17318 | Direct or substantially direct transmission and handling of requests | 0.406 |
| H04N5/783 | Adaptations for reproducing at a rate different from the recording rate | 0.406 |
| G06Q20/403 | Solvency checks | 0.405 |
| G06Q20/38 | Payment protocols| Details thereof | 0.405 |
| H04L9/302 | involving the integer factorization problem e.g. RSA or quadratic sieve [QS] schemes | 0.405 |
| G06Q10/083 | Shipping | 0.405 |
| H04W4/022 | with dynamic range variability | 0.405 |
| H04L12/4675 | Dynamic sharing of VLAN information amongst network nodes | configuration of the network or of network elements | (ref: H04L41/08) | 0.405 |
| H04L45/245 | Link aggregation e.g. trunking | 0.405 |
| G06F11/3476 | Data logging | (ref: G06F11/14)| | (ref: G06F11/2205)| take precedence | 0.405 |
| H04M15/66 | Policy and charging system | 0.405 |
| H04W28/0257 | the individual bearer or channel having a maximum bit rate or a bit rate guarantee | 0.405 |
| G06F3/01 | Input arrangements or combined input and output arrangements for interaction between user and computer | (ref: G06F3/16)| takes precedence | 0.405 |
| G06Q99/00 | Subject matter not provided for in other groups of this subclass | 0.405 |
| G06F9/44536 | Selecting among different versions | 0.404 |
| H04L45/563 | Software download or update | software deployment in general | (ref: G06F8/60) | 0.404 |
| H04W88/182 | Network node acting on behalf of an other network entity e.g. proxy | 0.404 |
| G06Q10/0838 | Historical data | 0.404 |
| G09F19/22 | Advertising or display means on roads walls or similar surfaces e.g. illuminated | illuminated signs in general | (ref: G09F13/00) | 0.404 |
| G06F3/0661 | Format or protocol conversion arrangements | 0.403 |
| G06F9/44584 | Portable applications i.e. making applications self-contained e.g. U3 standard | 0.403 |
| G11B27/031 | Electronic editing of digitised analogue information signals e.g. audio or video signals | 0.403 |
| G11B27/005 | Reproducing at a different information rate from the information rate of recording | for television signals | (ref: H04N5/783) | 0.403 |
| H04L2209/56 | Financial cryptography e.g. electronic payment or e-cash | 0.106 |
| H04L2209/805 | Lightweight hardware e.g. radio-frequency identification [RFID] or sensor | 0.106 |
| H04L2463/102 | applying security measure for e-commerce | data processing systems or methods specially adapted for e-commerce | (ref: G06Q30/00) | 0.106 |
| G06F2209/549 | Remote execution | 0.102 |
| G06F2209/5015 | Service provider selection | 0.100 |
| H04L61/35 | involving non-standard use of addresses for implementing network functionalities e.g. coding subscription information within the address or functional addressing i.e. assigning an address to a function | 0.099 |
| G06F2009/45595 | Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00) | 0.098 |
| G06F2009/45587 | Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00) | 0.098 |
| H04L67/1038 | Load balancing arrangements to avoid a single path through a load balancer | 0.098 |
| H04L2463/081 | applying self-generating credentials e.g. instead of receiving credentials from an authority or from another peer the credentials are generated at the entity itself | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861) | 0.098 |
| H04L47/2408 | Different services e.g. type of service [ToS] | 0.095 |
| G06F2212/151 | Emulated environment e.g. virtual machine | 0.094 |
| G06F2009/45583 | Memory management e.g. access allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016) | 0.094 |
| G06F2212/6042 | Allocation of cache space to multiple users or processors | 0.094 |
| G06F2009/45575 | Starting stopping suspending resuming virtual machine instances | program initiating | (ref: G06F9/445)| | task life-cycle in general | (ref: G06F9/485) | 0.094 |
| G06F2009/45562 | Creating deleting cloning virtual machine instances | 0.094 |
| H04N21/81 | Monomedia components thereof | 0.093 |
| H04N21/4627 | Rights management | associated to the content | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08) | 0.093 |
| G06F2221/032 | Protect output to user by software means | 0.093 |
| Y02D10/00 | Energy efficient computing | 0.093 |
| H04W4/18 | Information format or content conversion e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals | 0.093 |
| H04L2463/082 | applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32) | 0.092 |
| G06F2221/034 | Test or assess a computer or a system | 0.092 |
| G06F2221/0748 | Hiding | 0.092 |
| G06F2201/88 | Monitoring involving counting | 0.092 |
| G06F2209/521 | Atomic | 0.092 |
| G06F2221/033 | Test or assess software | 0.092 |
| G06F2209/502 | Proximity | 0.092 |
| G06F2201/865 | Monitoring of software | 0.092 |
| G06F2009/45591 | Monitoring or debugging support | monitoring and debugging in general in | (ref: G06F11/30)| | (ref: G06F11/36) | 0.091 |
| G06F2221/2143 | Clearing memory e.g. to prevent the data from being stolen | 0.091 |
| G06F2212/1021 | Hit rate improvement | 0.089 |
| G06F2212/1032 | Reliability improvement data loss prevention degraded operation etc | 0.089 |
| G06F2212/313 | In storage device | 0.089 |
| G06F2212/6028 | Prefetching based on hints or prefetch instructions | 0.089 |
| G06F2209/547 | Messaging middleware | 0.089 |
| G06F2209/484 | Precedence | 0.089 |
| G06F2209/5011 | Pool | 0.089 |
| G06F2209/544 | Remote | 0.089 |
| G06F2209/508 | Monitor | 0.089 |
| G06T2200/28 | involving image processing hardware | 0.089 |
| G06Q2220/00 | Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05) | 0.089 |
| G06F2209/501 | Performance criteria | 0.088 |
| G06F2009/4557 | Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)| | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856) | 0.088 |
| G06F2209/506 | Constraint | 0.088 |
| H04L2209/127 | Trusted platform modules [TPM] | 0.088 |
| G06F2221/2135 | Metering | 0.088 |
| G06F2221/2103 | Challenge-response | 0.088 |
| G06F2201/875 | Monitoring of systems including the internet | 0.087 |
| H04L2209/76 | Proxy i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464) | 0.087 |
| G06F2221/2137 | Time limited access e.g. to a computer or data | 0.087 |
| G06F2221/2145 | Inheriting rights or properties e.g. propagation of permissions or restrictions within a hierarchy | 0.087 |
| H04L45/302 | Route determination based on requested QoS | 0.086 |
| H04L47/825 | Involving tunnels e.g. MPLS | 0.086 |
| G06F2221/0713 | User | 0.086 |
| G06F2209/5016 | Session | 0.085 |
| H04L2463/144 | Detection or countermeasures against botnets | 0.085 |
| G06F11/0706 | the processing taking place on a specific hardware platform or in a specific software environment | 0.085 |
| G06F11/0763 | by bit configuration check e.g. of formats or tags | 0.085 |
| G06F9/45554 | Instruction set architectures of guest OS and hypervisor or native processor differ e.g. Bochs or VirtualPC on PowerPC MacOS | 0.085 |
| G06F2201/81 | Threshold | 0.085 |
| H04L2209/80 | Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00) | 0.084 |
| G06F2221/2151 | Time stamp | 0.084 |
| G06F2221/2107 | File encryption | 0.084 |
| G06F2212/282 | Partitioned cache | 0.084 |
| G06F2212/152 | Virtualized environment e.g. logically partitioned system | 0.084 |
| G06F2212/1008 | Correctness of operation e.g. memory ordering | 0.084 |
| H04L2463/121 | Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297) | 0.084 |
| G09G2370/022 | Centralised management of display operation e.g. in a server instead of locally | 0.083 |
| G06F3/1446 | display composed of modules e.g. video walls | 0.083 |
| H04L67/1017 | based on a round robin mechanism | 0.083 |
| G06F2221/2141 | Access rights e.g. capability lists access control lists access tables access matrices | 0.082 |
| H04L2463/062 | applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822) | 0.081 |
| G06F2221/2101 | Auditing as a secondary aspect | 0.081 |
| G06F2221/2115 | Third party | 0.081 |
| G06F2209/505 | Clust | 0.081 |
| G06F8/74 | Reverse engineering| Extracting design information from source code | 0.081 |
| G06F8/436 | Semantic checking | 0.081 |
| B82Y10/00 | Nanotechnology for information processing storage or transmission e.g. quantum computing or single electron logic | 0.080 |
| G06F2221/2111 | Location-sensitive e.g. geographical location GPS | 0.080 |
| G06Q50/34 | Betting or bookmaking e.g. Internet betting | 0.080 |
| G06F2209/5017 | Task decomposition | 0.080 |
| H04L2209/04 | Masking or blinding | 0.080 |
| G06F2206/1012 | Load balancing | 0.080 |
| G06F2221/2131 | Lost password e.g. recovery of lost or forgotten passwords | 0.080 |
| G06F2209/545 | Gui | 0.079 |
| H04L2463/061 | applying further key derivation e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861) | 0.079 |
| G06F2209/509 | Offload | 0.079 |
| G10L2015/223 | Execution procedure of a spoken command | 0.079 |
| G10L2015/226 | Taking into account non-speech caracteristics | 0.079 |
| G06F2221/0753 | Distribution | 0.079 |
| B64C2201/027 | Flying platforms | 0.079 |
| B64C2201/141 | autonomous i.e. by navigating independently from ground or air stations e.g. by using inertial navigation systems [INS] | 0.079 |
| B64C2201/128 | for transporting goods other than bombs | 0.079 |
| B64C2201/146 | Remote controls | 0.079 |
| G06F2221/2125 | Just-in-time application of countermeasures e.g. on-the-fly decryption just-in-time obfuscation or de-obfuscation | 0.079 |
| G06T2200/24 | involving graphical user interfaces [GUIs] | 0.078 |
| G06F2209/504 | Resource capping | 0.078 |
| H04W88/12 | Access point controller devices | 0.078 |
| H04W88/14 | Backbone network devices | 0.078 |
| H04W36/0033 | with transfer of context information | 0.078 |
| G05B2219/31362 | Verify correct configuration of system | 0.078 |
| Y02P90/02 | Total factory control e.g. smart factories flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS] | 0.078 |
| H04L69/02 | Protocol performance | 0.078 |
| H04L2463/101 | applying security measures for digital rights management | data processing systems or methods specially adapted for commerce e.g. marketing shopping billing auctions or e-commerce | (ref: G06Q30/00) | 0.078 |
| G06F2221/0773 | Recurrent authorisation | 0.078 |
| G06F2221/0711 | Token | 0.078 |
| G06F2221/0775 | Logging | 0.078 |
| G06F2221/2149 | Restricted operating environment | 0.078 |
| G06F2212/401 | Compressed data | 0.077 |
| G06F2212/656 | Address space sharing | 0.077 |
| G06F2212/1024 | Latency reduction | 0.077 |
| G06F2212/1016 | Performance improvement | 0.077 |
| G06F2212/6046 | Using a specific cache allocation policy other than replacement policy | 0.077 |
| H04L61/103 | across network layers e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP] | 0.077 |
| G06F2201/815 | Virtual | middleware or OS functionality using virtual machines to implement generic software techniques for error detection or fault masking | (ref: G06F11/1484) | 0.077 |
| G06F2221/2153 | Using hardware token as a secondary aspect | 0.077 |
| G06F2212/1052 | Security improvement | 0.076 |
| H04L2209/46 | Secure multiparty computation e.g. millionaire problem | 0.076 |
| H04L2209/50 | Oblivious transfer | 0.076 |
| H04L2012/5626 | Network management e.g. Intelligent nets | 0.076 |
| G10L2015/088 | Word spotting | 0.076 |
| H04L2209/08 | Randomization e.g. dummy operations or using noise | 0.076 |
| H04L2212/00 | Encapsulation of packets | 0.076 |
| H04L43/087 | Jitter | 0.076 |
| H04L61/2528 | Translation at a proxy | 0.076 |
| H04L43/0805 | Availability | 0.076 |
| H04W76/50 | for emergency connections | 0.076 |
| H04W92/02 | Inter-networking arrangements | 0.076 |
| H04W84/005 | Moving wireless networks | 0.076 |
| A63F2300/535 | for monitoring e.g. of user parameters terminal parameters application parameters network parameters | 0.076 |
| A63F2300/534 | for network load management e.g. bandwidth optimization latency reduction | 0.076 |
| B60W2050/065 | by reducing the computational load on the digital processor of the control computer | 0.076 |
| B60Y2400/30 | Sensors | 0.076 |
| G10L2015/228 | of application context | 0.076 |
| B60W2420/00 | Indexing codes relating to the type of sensors based on the principle of their operation | 0.076 |
| B60W2050/146 | Display means | 0.076 |
| Y10S707/99939 | Privileged access | 0.076 |
| Y10S707/99943 | Generating database or data structure e.g. via user interface | 0.076 |
| G06T2219/2012 | Colour editing changing or manipulating| Use of colour codes | 0.076 |
| G06T2219/028 | Multiple view windows (top-side-front-sagittal-orthogonal) | 0.076 |
| G06T2219/024 | Multi-user collaborative environment | 0.076 |
| G06F2221/2133 | Verifying human interaction e.g. Captcha | 0.075 |
| G06F2209/5014 | Reservation | 0.075 |
| H04L63/0457 | wherein the sending and receiving network entities apply dynamic encryption e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065) | 0.075 |
| G06F2201/87 | Monitoring of transactions | 0.075 |
| A63F2300/6615 | using models with different levels of detail [LOD] | 0.075 |
| G06T2219/2008 | Assembling disassembling | 0.075 |
| G06T2210/36 | Level of detail | 0.075 |
| G06F2212/1048 | Scalability | 0.075 |
| H04L2209/60 | Digital content management e.g. content distribution | 0.075 |
| G06F2212/502 | using adaptive policy | 0.075 |
| G06F2212/683 | Invalidation | 0.075 |
| H04L41/0631 | Alarm or event or notifications correlation| Root cause analysis | 0.075 |
| G06F2212/602 | Details relating to cache prefetching | 0.075 |
| Y02D30/00 | High level techniques for reducing energy consumption in communication networks | 0.075 |
| G06F2207/7219 | Countermeasures against side channel or fault attacks | 0.074 |
| G06F2212/653 | Page colouring | 0.074 |
| G05B2219/2614 | HVAC heating ventillation climate control | 0.074 |
| G05B2219/13119 | Compiler | 0.074 |
| G05B2219/32137 | Configure connect combine different program modules | 0.074 |
| G06T2200/21 | involving computational photography | 0.074 |
| G06F2216/15 | Synchronised browsing | 0.074 |
| B60W2030/082 | Vehicle operation after collision | 0.073 |
| B60W2050/0075 | Automatic parameter input automatic initialising or calibrating means | 0.073 |
| B60W2050/0004 | In digital systems e.g. discrete-time systems involving sampling | 0.073 |
| H04L2209/603 | Digital right managament [DRM] | 0.073 |
| G06F2221/0759 | Conversion | 0.073 |
| H04N2007/145 | Handheld terminals | 0.073 |
| G06F2212/657 | Virtual address space management | 0.073 |
| G07C5/008 | communicating information to a remotely located station | transmission systems for measured values | (ref: G08C) | 0.073 |
| G07B15/063 | using wireless information transmission between the vehicle and a fixed station | identification of vehicles | (ref: G08G) | 0.073 |
| G06F2212/652 | Page size control | 0.073 |
| G06F2212/7201 | Logical to physical mapping or translation of blocks or pages | 0.073 |
| G05B2219/34263 | OLE object linking and embedding OPC ole for process control | 0.073 |
| G06F2212/402 | Encrypted data | 0.073 |
| G06T2200/16 | involving adaptation to the client's capabilities | 0.073 |
| G06N5/027 | Frames | 0.073 |
| G06F2209/482 | Application | 0.073 |
| G06F2212/1044 | Space efficiency improvement | 0.073 |
| G06F2212/464 | Multimedia object e.g. image video | 0.073 |
| G05B2219/40323 | Modeling robot environment for sensor based robot system | 0.073 |
| G06T2210/52 | Parallel processing | 0.073 |
| H04L5/0044 | allocation of payload | 0.073 |
| G07C2209/63 | Comprising locating means for detecting the position of the data carrier i.e. within the vehicle or within a certain distance from the vehicle | 0.073 |
| H04L2012/5635 | Backpressure e.g. for ABR | 0.073 |
| G05D1/021 | specially adapted to land vehicles | 0.073 |
| B60R2325/108 | Encryption | 0.073 |
| B60R2325/101 | Bluetooth | 0.073 |
| G05D2201/0213 | Road vehicle e.g. car or truck | 0.073 |
| G06F2201/84 | Using snapshots i.e. a logical point-in-time copy of the data | 0.073 |
| G06F11/2048 | where the redundant components share neither address space nor persistent storage | 0.073 |
| A63F2300/538 | for performing operations on behalf of the game client e.g. rendering | 0.073 |
| G06F3/0607 | by facilitating the process of upgrading existing storage systems e.g. for improving compatibility between host and storage device | 0.072 |
| G06F2212/1041 | Resource optimization | 0.072 |
| G06F2212/6022 | Using a prefetch buffer or dedicated prefetch cache | 0.072 |
| G06F2212/1028 | Power efficiency | 0.072 |
| G06F2212/171 | Portable consumer electronics e.g. mobile phone | 0.072 |
| G06F2212/452 | Instruction code | 0.072 |
| G05B2219/31088 | Network communication between supervisor and cell machine group | 0.072 |
| G06Q30/0242 | Determination of advertisement effectiveness | 0.072 |
| G05B2219/32252 | Scheduling production machining job shop | 0.072 |
| G05B2219/31449 | Monitor workflow to optimize business industrial processes | 0.072 |
| G05B2219/32128 | Gui graphical user interface | 0.072 |
| G06F9/46 | Multiprogramming arrangements | 0.072 |
| G06N3/088 | Non-supervised learning e.g. competitive learning | 0.072 |
| H04L41/5067 | Customer-centric quality of service [QoS] measurement | 0.072 |
| H04L41/5048 | Automatic or semi-automatic definitions e.g. definition templates | 0.072 |
| H04L41/0863 | by rolling back to previous configuration versions | 0.072 |
| H04L41/0233 | using object oriented techniques e.g. common object request broker architecture [CORBA] for representation of network management data | 0.072 |
| G06F2209/541 | Client-server | 0.072 |
| G06F2212/465 | Structured object e.g. database record | 0.072 |
| G06F2212/604 | Details relating to cache allocation | 0.072 |
| G06F2212/608 | Details relating to cache mapping | 0.072 |
| H04L2209/601 | Broadcast encryption | 0.072 |
| G06F2207/3824 | Accepting both fixed-point and floating-point numbers | 0.072 |
| G06F9/30025 | Format conversion instructions e.g. Floating-Point to Integer decimal conversion | 0.072 |
| H04L41/06 | involving management of faults or events or alarms | 0.072 |
| G05B2219/31094 | Data exchange between modules cells devices processors | 0.071 |
| H04L1/188 | Time-out mechanisms | 0.071 |
| H04W88/08 | Access point devices | 0.071 |
| G09G2340/02 | Handling of images in compressed format e.g. JPEG MPEG | 0.071 |
| G09G2320/103 | Detection of image changes e.g. determination of an index representative of the image change | 0.071 |
| G09G2310/04 | Partial updating of the display screen | 0.071 |
| G09G2370/027 | Arrangements and methods specific for the display of internet documents | 0.071 |
| G06F2212/3042 | being part of a memory device e.g. cache DRAM | 0.071 |
| G06F2201/885 | Monitoring specific for caches | 0.071 |
| G06F2212/283 | Plural cache memories | 0.071 |
| G06F2212/205 | Hybrid memory e.g. using both volatile and non-volatile memory | 0.071 |
| G06F11/3471 | Address tracing | 0.071 |
| H04N1/4413 | involving the use of passwords ID codes or the like e.g. PIN | 0.071 |
| G06Q2220/18 | Licensing | 0.071 |
| G06F2221/0797 | using dedicated hardware at the client | 0.071 |
| G06F2209/5022 | Workload threshold | 0.071 |
| G06F2213/0026 | PCI express | 0.071 |
| G06F2212/7208 | Multiple device management e.g. distributing data over multiple flash devices | 0.071 |
| G06F12/04 | Addressing variable-length words or parts of words | 0.071 |
| G06F2212/154 | Networked environment | 0.071 |
| G06F2212/163 | Server or database system | 0.071 |
| H04M2203/6081 | Service authorization mechanisms | 0.070 |
| G06F2212/271 | Non-uniform cache access [NUCA] architecture | 0.070 |
| G06F2212/6024 | History based prefetching | 0.070 |
| H04L2209/608 | Watermarking | 0.070 |
| G06F2212/651 | Multi-level translation tables | 0.070 |
| G06F2212/684 | TLB miss handling | 0.070 |
| G06F2209/483 | Multiproc | 0.070 |
| H04L2209/84 | Vehicles | 0.070 |
| G06F2221/2119 | Authenticating web pages e.g. with suspicious links | 0.070 |
| H04L12/56 | Packet switching systems | 0.070 |
| Y04S40/18 | Network protocols supporting networked applications e.g. including control of end-device applications over a network | 0.070 |
| Y04S40/20 | Information technology specific aspects | 0.070 |
| H04W80/045 | involving different protocol versions e.g. MIPv4 and MIPv6 | 0.070 |
| H04L63/0254 | Stateful filtering | 0.070 |
| G06F11/0778 | Dumping i.e. gathering error/state information after a fault for later diagnosis | 0.070 |
| G06F2221/2123 | Dummy operation | 0.070 |
| G06F2212/621 | Coherency control relating to peripheral accessing e.g. from DMA or I/O device | 0.070 |
| G06F2221/2113 | Multi-level security e.g. mandatory access control | 0.070 |
| H04L43/062 | for traffic related reporting | 0.070 |
| A63F2300/807 | Role playing or strategy games | 0.070 |
| A63F2300/405 | being a wireless ad hoc network e.g. Bluetooth Wi-Fi Pico net | 0.070 |
| G08B19/00 | Alarms responsive to two or more different undesired or abnormal conditions e.g. burglary and fire abnormal temperature and abnormal rate of flow | 0.070 |
| G06F2221/2129 | Authenticate client device independently of the user | 0.070 |
| H04M2201/39 | using speech synthesis | speech synthesis | per se| | (ref: G10L13/00) | 0.070 |
| H04M2203/6009 | Personal information e.g. profiles or personal directories being only provided to authorised persons | 0.070 |
| H04M2203/252 | where a voice mode is enhanced with visual information | 0.070 |
| H04M2203/306 | Prerecordings to be used during a voice call | 0.070 |
| G05B2219/34121 | Edge generator | 0.070 |
| G05B2219/24215 | Scada supervisory control and data acquisition | 0.070 |
| G05B2219/31472 | Graphical display of process | 0.070 |
| G05B2219/32411 | Derive control data from displayed element logic for it and feedback data | 0.070 |
| H04M3/4938 | comprising a voice browser which renders and interprets e.g. VoiceXML | 0.069 |
| H04M2201/40 | using speech recognition | speech recognition | per se| | (ref: G10L15/00) | 0.069 |
| G06F2221/0751 | Key | not used | 0.069 |
| H04M2215/7846 | Transaction based | 0.069 |
| H04M2215/78 | Metric aspects | 0.069 |
| Y10S707/99953 | Recoverability | 0.069 |
| G05B2219/31083 | In server store virtual nodes for controlled machines with states for map | 0.069 |
| G05B2219/33148 | CLS client server architecture client consumes server provides services | 0.069 |
| G05B2219/31161 | Java programcode or simular active agents programs applets | 0.069 |
| G02B2027/014 | comprising information/image processing systems | 0.069 |
| G02B2027/0134 | of stereoscopic type | 0.069 |
| G06T2210/08 | Bandwidth reduction | 0.069 |
| G06F2009/45566 | Nested virtual machines | 0.069 |
| G06F12/0207 | with multidimensional access e.g. row/column matrix | 0.069 |
| H04L41/147 | for prediction of network behaviour | 0.069 |
| G06T2207/10028 | Range image| Depth image| 3D point clouds | 0.069 |
| G06T2207/20084 | Artificial neural networks [ANN] | 0.069 |
| G06T2207/20081 | Training| Learning | 0.069 |
| H04L2209/42 | Anonymization e.g. involving pseudonyms | 0.069 |
| H04M2250/06 | including a wireless LAN interface | 0.069 |
| G06F2213/0058 | Bus-related hardware virtualisation | 0.069 |
| G06T2219/2004 | Aligning objects relative positioning of parts | 0.069 |
| G06T2219/2016 | Rotation translation scaling | 0.069 |
| G06T2207/10016 | Video| Image sequence | 0.069 |
| G06T2207/30168 | Image quality inspection | 0.069 |
| G06T2210/04 | Architectural design interior design | 0.069 |
| G05B2219/2639 | Energy management use maximum of cheap power keep peak load low | 0.069 |
| Y04S20/222 | Demand response systems e.g. load shedding peak shaving | 0.069 |
| Y02B70/3225 | Demand response systems e.g. load shedding peak shaving | 0.069 |
| G06Q50/00 | Systems or methods specially adapted for specific business sectors e.g. utilities or tourism | healthcare informatics | (ref: G16H) | 0.069 |
| G05B2219/32339 | Object oriented modeling design analysis implementation simulation language | 0.069 |
| G01V1/001 | Acoustic presence detection | measurement of sonic vibrations | (ref: G01H)| | alarm systems | (ref: G08B) | 0.069 |
| G11C11/221 | using ferroelectric capacitors | 0.069 |
| A61B2562/0271 | Thermal or temperature sensors | 0.069 |
| A61B2562/0247 | Pressure sensors | 0.069 |
| A61B2560/028 | Arrangements to prevent overuse e.g. by counting the number of uses | 0.069 |
| G06F11/004 | Error avoidance | (ref: G06F11/07)| and subgroups take precedence | 0.069 |
| G06F2211/1011 | Clustered RAID i.e. clustered or de-clustered RAID where data and parity are spread over more disks than blocks in a parity group | 0.069 |
| H04Q2209/40 | using a wireless architecture | 0.068 |
| Y02E60/7807 | characterised by data transport means between the monitoring controlling or managing units and monitored controlled or operated electrical equipment | 0.068 |
| G01D7/00 | Indicating measured values | 0.068 |
| Y02E60/00 | Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation | 0.068 |
| H04Q2209/823 | where the data is sent when the measured values exceed a threshold e.g. sending an alarm | 0.068 |
| Y04S10/30 | Systems characterised by state monitoring e.g. fault temperature monitoring insulator monitoring corona discharge | 0.068 |
| H04Q2209/88 | Providing power supply at the sub-station | 0.068 |
| H04M2207/18 | wireless networks | 0.068 |
| G10L2015/0635 | updating or merging of old and new templates| Mean values| Weighting | 0.068 |
| H04M2203/655 | Combination of telephone service and social networking | messaging within social networks | (ref: H04L51/32) | 0.068 |
| Y02T90/12 | Electric charging stations | 0.068 |
| G06Q2240/00 | Transportation facility access e.g. fares tolls or parking | 0.068 |
| G06F3/1219 | with regard to consumables e.g. ink toner paper | 0.068 |
| G06F2211/006 | E-Mail | 0.068 |
| G06F2201/805 | Real-time | 0.068 |
| G06F11/2038 | with a single idle spare processing component | 0.068 |
| G06F11/2041 | with more than one idle spare processing component | 0.068 |
| H04L2209/88 | Medical equipments | 0.068 |
| Y02T10/72 | Electric energy management in electromobility | 0.068 |
| Y02T10/7072 | Electromobility specific charging systems or methods for batteries ultracapacitors supercapacitors or double-layer capacitors | efficient charging systems for batteries ultracapacitors supercapacitors or double-layer capacitors in road transportation in general | (ref: Y02T10/92) | 0.068 |
| Y04S30/12 | Remote or cooperative charging | 0.068 |
| Y02T90/167 | Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV] | power aggregation of EV or HEV | (ref: Y02E60/721) | 0.068 |
| Y02T90/16 | Information or communication technologies improving the operation of electric vehicles | 0.068 |
| Y02T90/14 | Plug-in electric vehicles | 0.068 |
| B60L2240/70 | Interactions with external data bases e.g. traffic centres | 0.068 |
| Y02T10/70 | Energy storage for electromobility | hydrogen internal combustion engines | (ref: Y02T90/42)| | fuel cell powered electric vehicles | (ref: Y02T90/34) | 0.068 |
| H04L49/15 | Interconnection of switching modules | 0.068 |
| G06F2209/5019 | Workload prediction | 0.068 |
| H04W88/10 | adapted for operation in multiple networks e.g. multi-mode access points | 0.068 |
| G06F2009/45579 | I/O management (device drivers storage access) | internal functioning of device drivers | (ref: G06F13/102)| loading of device drivers | (ref: G06F9/4411) | 0.068 |
| G05B2219/32331 | Network of coordinating planning systems for each cell factory | 0.068 |
| Y02P90/82 | Energy audits or management systems therefor | 0.068 |
| G07C9/00 | Individual entry or exit registers | 0.068 |
| G07C2009/00769 | with data transmission performed by wireless means | 0.068 |
| G07C2009/00761 | with data transmission performed by connected means e.g. mechanical contacts plugs connectors | 0.068 |
| H04W72/005 | Resource management for broadcast services | 0.067 |
| G10L13/086 | Detection of language | 0.067 |
| G10L13/033 | Voice editing e.g. manipulating the voice of the synthesiser | 0.067 |
| H04M2250/04 | including near field communication means e.g. RFID | 0.067 |
| G06F2213/40 | Bus coupling | 0.067 |
| Y10S707/99944 | Object-oriented database structure | 0.067 |
| Y10S707/99945 | Object-oriented database structure processing | 0.067 |
| H04W4/027 | using movement velocity acceleration information | 0.067 |
| G06F2213/28 | DMA | 0.067 |