Validity Report
Full Report
US8056075B2 — Server request management
Priority Date: 1998-03-18, Publication Date: 2011-11-08, Current Assignee: IMPLICIT LLCReport Generated: 2022-05-25

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
US5922044A1.782System and method for providing information to applets in a virtual machineGRANT1999-07-131996-12-1326717546Great3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
EP0878768B11.782Method and system for portably enabling awareness  touring  and conferencing over the world-wide web using proxies and shared-state serversGRANT2002-02-271997-05-1325320735GreatInternational Business Machines CorpInternational Business Machines Corp
US5805829A1.759Process for running applets over non-IP networksGRANT1998-09-081996-10-0124910493GreatInternational Business Machines CorpInternational Business Machines Corp
US5987523A1.649Applet redirection for controlled access to non-orginating hostsGRANT1999-11-161997-06-0425352006GreatInternational Business Machines CorpInternational Business Machines Corp
EP0817046A21.646CORBA and Java-based distributed object oriented systemGRANT1998-01-071996-07-0124705707GreatSun Microsystems IncOracle America Inc
EP0903675B11.600Method and apparatus for providing increased content from a resource constrained deviceGRANT2004-10-271997-09-1825463167GreatHewlett Packard CoHP Inc
EP0817031A21.530Using a distributed object system to find and download java-based applicationsGRANT1998-01-071996-07-0324711744GreatSun Microsystems IncSun Microsystems Inc
EP0825506B11.469Methods and apparatus for remote process controlGRANT2013-03-061996-08-2024812561GreatInvensys Systems IncSchneider Electric Systems USA Inc
US6032150A1.443Secure graphical objects in web documents with a program applet placed to present further information upon selected conditionsGRANT2000-02-291997-08-2525439795GreatPlanetweb IncTumbleweed Holdings LLC
EP0853279B11.412Method and apparatus for controlling software access to system resourcesGRANT2006-09-201997-01-0925120818GreatSun Microsystems IncSun Microsystems Inc
EP0824236A21.379Computer systemGRANT1998-02-181996-08-0810798197GreatInternational Business Machines CorpInternational Business Machines Corp
US5983348A1.370Computer network malicious code scannerGRANT1999-11-091997-09-1025453461GreatTrend Micro IncTrend Micro Inc, Jaco Inc
US7251679B11.356Active electronic mailGRANT2007-07-311997-08-2125440790GreatBeryl Technical Assays LLCTumbleweed Holdings LLC
US5742768A1.341System and method for providing and displaying a web page having an embedded menuGRANT1998-04-211996-07-1624732720GreatSilicon Graphics IncMicrosoft Technology Licensing LLC
US6456388B11.333Printer enclosing network computer and computer network system employing the sameGRANT2002-09-241997-08-0116552312GreatSharp CorpSharp Corp
US6253228B11.287Method and apparatus for updating and synchronizing information between a client and a serverGRANT2001-06-261997-03-3125244265GreatApple Computer IncApple Inc
US6754693B11.267Method and apparatus to allow users and representatives to conduct simultaneous voice and joint browsing sessionsGRANT2004-06-221996-05-0721780317GreatCisco Technology IncCisco Technology Inc
US6351816B11.265System and method for securing a program's execution in a network environmentGRANT2002-02-261996-05-3024617824GreatSun Microsystems IncSun Microsystems Inc
US5761421A1.252System and method for secure peer-to-peer communication between downloaded programsGRANT1998-06-021996-03-2524494257GreatSun Microsystems IncOracle America Inc
US5870544A1.214Method and apparatus for creating a secure connection between a java applet and a web serverGRANT1999-02-091997-10-2025495688GreatInternational Business Machines CorpInternational Business Machines Corp
US6119165A1.195Controlled distribution of application programs in a computer networkGRANT2000-09-121997-11-1725519023GreatTrend Micro IncTrend Micro Inc
EP0834818B11.182System  method  apparatus and article of manufacture for identity based cachingGRANT2004-04-141996-07-0224709610GreatSun Microsystems IncSun Microsystems Inc
EP1021753B11.161SECURITY ENHANCEMENT FOR UNTRUSTED EXECUTABLE CODEGRANT2001-12-051997-08-2825442736GreatMicrosoft CorpMicrosoft Corp
US8224998B21.063Micro-client for internet appliancesGRANT2012-07-171997-08-2137574662GreatIntellectual Ventures I LLCIntellectual Ventures I LLC
US6438578B11.062System and method for generating a modified web page in response to an information request from a client computerGRANT2002-08-201996-06-1226792198GreatEducation Networks of AmericaSMOOTH RIDE SERIES 53 OF ALLIED SECURITY TRUST I
US5919247A1.062Method for the distribution of code and data updatesGRANT1999-07-061996-07-2424771752GreatMarimba IncBMC Software Inc
US5901286A1.041Method and apparatus for communicating with a network peripheralGRANT1999-05-041996-11-1525014556GreatCanon Information Systems IncCanon Inc
US8812702B21.008System and method for globally and securely accessing unified information in a computer networkGRANT2014-08-191996-12-1336933085GreatGood Technology CorpGood Technology Corp
US6138141A0.992Server to client cache protocol for improved web performanceGRANT2000-10-241996-10-1824947802GreatAT&T CorpAT&T Corp
US6301583B10.986Method and apparatus for generating data files for an applet-based content menu using an open hierarchical data structureGRANT2001-10-091997-05-1626724442Great
US5848246A0.977Object-oriented system  method and article of manufacture for a client-server session manager in an interprise computing framework systemGRANT1998-12-081996-07-0124709597GreatSun Microsystems IncOracle America Inc
US6167441A0.975Customization of web pages based on requester typeGRANT2000-12-261997-11-2125524066GreatInternational Business Machines CorpPayPal Inc
US6424991B10.973Object-oriented system  method and article of manufacture for a client-server communication frameworkGRANT2002-07-231996-07-0124700941GreatSun Microsystems IncOracle America Inc
US5923885A0.971Acquisition and operation of remotely loaded software using applet modification of browser softwareGRANT1999-07-131996-10-3124982941GreatSun Microsystems IncOracle America Inc
US5754774A0.968Client/server communication systemGRANT1998-05-191996-02-1524408840GreatInternational Business Machines CorpInternational Business Machines Corp
US5802292A0.967Method for predictive prefetching of information over a communications networkGRANT1998-09-011995-04-2823709966GreatDigital Equipment CorpHewlett Packard Development Co LP
US6272555B10.963Object-oriented system  method and article of manufacture for a client-server-centric interprise computing framework systemGRANT2001-08-071996-07-0124704723GreatSun Microsystems IncOracle America Inc
US7043537B10.962System and method for remote device managementGRANT2006-05-091997-09-0536272441GreatCisco Technology IncCisco Technology Inc
US5706502A0.959Internet-enabled portfolio manager system and methodGRANT1998-01-061996-03-2524490754GreatSun Microsystems IncOracle America Inc
US6272556B10.958Object-oriented system  method and article of manufacture for migrating a client-server application (#5)GRANT2001-08-071996-07-0124704729GreatSun Microsystems IncOracle America Inc
US5999972A0.955System  method and article of manufacture for a distributed computer system frameworkGRANT1999-12-071996-07-0124709718GreatSun Microsystems IncSun Microsystems Inc
US6253282B10.950Object-oriented system  method and article of manufacture for a client-server with a client program cacheGRANT2001-06-261996-07-0124709592GreatSun Microsystems IncOracle America Inc
US6434598B10.943Object-oriented system  method and article of manufacture for a client-server graphical user interface (#9) framework in an interprise computing framework systemGRANT2002-08-131996-07-0124709732GreatSun Microsystems IncOracle America Inc
US6304893B10.942Object-oriented system  method and article of manufacture for a client-server event driven message framework in an interprise computing framework systemGRANT2001-10-161996-07-0124709683GreatSun Microsystems IncOracle America Inc
US6266709B10.940Object-oriented system  method and article of manufacture for a client-server failure reporting processGRANT2001-07-241996-07-0124709667GreatSun Microsystems IncOracle America Inc
US5805442A0.932Distributed interface architecture for programmable industrial control systemsGRANT1998-09-081996-05-3024629009GreatControl Tech CorpSchneider Electric USA Inc
US5894554A0.929System for managing dynamic web page generation requests by intercepting request at web server and routing to page server thereby releasing web server to process other requestsGRANT1999-04-131996-04-2324552072GreatInfoSpinner IncPARALLEL NETWORKS LICENSING LLC
US20010055492A10.921ESTABLISHMENT AT A REMOTE LOCATION OF AN INTERNET/INTRANET USER INTERFACE TO A COPIER/PRINTERAPPLICATION2001-12-271997-09-2625470682GreatEastman Kodak CoCommercial Copy Innovations Inc, Individual
US6292827B10.918Information transfer systems and method with dynamic distribution of data  control and management of informationGRANT2001-09-181997-06-2025375029GreatShore Tech 1999 IncGOLDEN SCREENS INTERACTIVE TECHNOLOGIES Inc, SHORE TECHNOLOGIES (1999) Inc, Shore Tech 1999 Inc
US5920725A0.906Run-time object-synthesis and transparent client/server updating of distributed objects using a meta server of all object descriptorsGRANT1999-07-061997-07-0225390969GreatAdaptivity IncAPEX INVESTMENT FUND V LP, NEW ENTERRISE ASSOCIATES 8A LP, NOKIA VENTURES LP, STAR BAY ASSOCIATES FUND LP, STAR BAY PARTNERS LP, STAR BAY TECHNOLOGY VENTURES IV LP, New Enterprise Associates VIII LP
US5734898A0.898Client-server computer system and method for updating the client  server  and objectsGRANT1998-03-311994-06-2415323046GreatInternational Business Machines CorpInternational Business Machines Corp
US6820125B10.888Method for coordinating actions among a group of serversGRANT2004-11-161997-05-0825317497GreatInternational Business Machines CorpInternational Business Machines Corp
US5944784A0.880Operating methods for a universal client device permittting a computer to receive and display information from several special applications simultaneouslyGRANT1999-08-311997-09-3025476669GreatUS Department of NavyNAVY SECRETARY OF AS REPRESENTED BY United States,, US Department of Navy
US6374305B10.855Web applications interface system in a mobile-based client-server systemGRANT2002-04-161997-07-2125408410GreatOracle CorpOracle International Corp
US6029175A0.854Automatic retrieval of changed files by a network software agentGRANT2000-02-221995-10-2626674900GreatTeknowledge CorpTeknowledge Corp
US6074434A0.842Selection of code updates  data updates or new data for clientGRANT2000-06-131996-06-0736659277GreatInternational Business Machines CorpLenovo PC International Ltd
US6122666A0.830Method for collaborative transformation and caching of web objects in a proxy networkGRANT2000-09-191998-02-2321840028GreatInternational Business Machines CorpSnapchat Inc
US5915112A0.816Remote procedure interface with support for multiple versionsGRANT1999-06-221996-01-0224328007GreatInternational Business Machines CorpInternational Business Machines Corp
US5757925A0.810Secure platform independent cross-platform remote execution computer system and methodGRANT1998-05-261996-07-2324752296GreatSun Microsystems IncSun Microsystems Inc
US5848233A0.808Method and apparatus for dynamic packet filter assignmentGRANT1998-12-081996-12-0925064938GoodSun Microsystems IncOracle America Inc, Motorola Solutions Inc
US6766366B10.807Method for loading a function provided by a first computer (server) onto a second computer (client)GRANT2004-07-201997-08-077838285GoodSiemens AGUnify GmbH and Co KG
US6865735B10.800Process for rewriting executable content on a network server or desktop machine in order to enforce site specific propertiesGRANT2005-03-081997-10-0734220923GoodUniversity of WashingtonUniversity of Washington
US5918013A0.789Method of transcoding documents in a network environment using a proxy serverGRANT1999-06-291996-06-0324635137GoodWebTV Networks IncRovi Technologies Corp
US6125372A0.786Server system and method of updating server softwareGRANT2000-09-261997-10-0325480431GoodHewlett Packard CoHP Inc
US5996022A0.778Transcoding data in a proxy computer prior to transmitting the audio data to a clientGRANT1999-11-301996-06-0327097296GoodWebTV Networks IncRovi Technologies Corp
US5926631A0.774Network computer emulator systems  methods and computer program products for personal computersGRANT1999-07-201997-08-1525430922GoodInternational Business Machines CorpLenovo Singapore Pte Ltd
US5764235A0.772Computer implemented method and system for transmitting graphical images from server to client at user selectable resolutionGRANT1998-06-091996-03-2524494523GoodInsight Dev CorpRakuten Group Inc
US5619716A0.768Information processing system having a configuration management system for managing the software of the information processing systemGRANT1997-04-081991-11-0527308058GoodHitachi LtdHitachi Ltd
US5872915A0.758Computer apparatus and method for providing security checking for software applications accessed via the World-Wide WebGRANT1999-02-161996-12-2325096070GoodInternational Business Machines CorpInternational Business Machines Corp
US6240450B10.757Network data visualization system and method for downloading visualization software to a user station after user authenticationGRANT2001-05-291995-10-1626140399GoodBritish Telecommunications PLCBritish Telecommunications PLC
US6360366B10.739Systems and methods for automatic application version upgrading and maintenanceGRANT2002-03-191996-09-0524842436GoodManageSoft CorpFlexera Software LLC
US5790796A0.726Polymorphic package files to update software componentsGRANT1998-08-041996-06-1424665792GoodSymantec CorpNortonLifeLock Inc
US6718540B10.724Data processing system and method for storing data in a communication networkGRANT2004-04-061997-11-1732031260GoodInternational Business Machines CorpInternational Business Machines Corp
US5761499A0.721Method for managing globally distributed software componentsGRANT1998-06-021995-12-2124305343GoodMicro Focus Software IncEMC Corp
US5544320A0.716Remote information service access system based on a client-server-service modelGRANT1996-08-061993-01-0821698695Good
US6094679A0.713Distribution of software in a computer network environmentGRANT2000-07-251998-01-1621732072GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6119167A0.712Pushing and pulling data in networksGRANT2000-09-121997-07-1125525290GoodPhone Com IncUnwired Planet LLC, Unwired Planet IP Manager LLC
US5497463A0.698Ally mechanism for interconnecting non-distributed computing environment (DCE) and DCE systems to operate in a network systemGRANT1996-03-051992-09-2525491216GoodBull HN Information Systems IncBull HN Information Systems Inc
US6347398B10.698Automatic software downloading from a computer networkGRANT2002-02-121996-12-1225069524GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6714976B10.694Systems and methods for monitoring distributed applications using diagnostic informationGRANT2004-03-301997-03-2031998914GoodConcord Communications LLCGoogle LLC, Concord Communications LLC
US6802061B10.691Automatic software downloading from a computer networkGRANT2004-10-051996-12-1233032661GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5995756A0.672System for internet-based delivery of computer applicationsGRANT1999-11-301997-02-1425177156GoodBorland Software CorpBorland Software Corp
US5742829A0.671Automatic software installation on heterogeneous networked client computer systemsGRANT1998-04-211995-03-1023595069GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5692047A0.670System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sourcesGRANT1997-11-251995-12-0824275287GoodSun Microsystems IncOracle America Inc
US5548723A0.661Object-oriented network protocol configuration system utilizing a dynamically configurable protocol stackGRANT1996-08-201993-12-1722617510GoodTaligent IncApple Inc
US6446081B10.658Data input and retrieval apparatusGRANT2002-09-031997-12-1710823759GoodBritish Telecommunications PLCBritish Telecommunications PLC
US5835712A0.658Client-server system using embedded hypertext tags for application and database developmentGRANT1998-11-101996-05-0324576502GoodWebmate Tech IncOpen Invention Network LLC
US5392400A0.657Collaborative computing system using pseudo server process to allow input from different server processes individually and sequence number map for maintaining received data sequenceGRANT1995-02-211992-07-0225427336GoodInternational Business Machines CorpInternational Business Machines Corp
US5613124A0.649Method and system for generating and storing multiple representations of a source object in object storageGRANT1997-03-181994-04-1522855214GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5926816A0.648Database SynchronizerGRANT1999-07-201996-10-0924922099GoodOracle CorpOracle International Corp
US6112250A0.647Recompression of files at an intermediate node in a network systemGRANT2000-08-291996-04-1124528800GoodAmerica Online IncMeta Platforms Inc
US5973696A0.644Embedded web serverGRANT1999-10-261996-08-0821814714GoodAgranat Systems IncConexant Systems LLC
US5815718A0.644Method and system for loading classes in read-only memoryGRANT1998-09-291996-05-3024629025GoodSun Microsystems IncOracle America Inc
US6067575A0.642System and method for generating trusted  architecture specific  compiled versions of architecture neutral programsGRANT2000-05-231995-12-0824275282GoodSun Microsystems IncOracle America Inc
US5499343A0.636Object-oriented networking system with dynamically configurable communication linksGRANT1996-03-121993-12-1722617546GoodTaligent IncApple Inc
US5884078A0.635System  method and article of manufacture for creating an object oriented component having multiple bidirectional ports for use in association with a java application or appletGRANT1999-03-161997-01-3125156234GoodSun Microsystems IncOracle America Inc
US5968121A0.629Method and apparatus for representing and applying network topological dataGRANT1999-10-191997-08-1325428746GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6356931B20.624Method and system for remotely browsing objectsGRANT2002-03-121997-10-0625481290GoodSun Microsystems IncOracle America Inc
US5636376A0.622System and method for selectively and contemporaneously monitoring processes in a multiprocessing serverGRANT1997-06-031993-07-2722263721GoodInternational Business Machines CorpInternational Business Machines Corp
US5943496A0.620Methods for developing and instantiating object classes using a java virtual machine extensionGRANT1999-08-241997-05-1725327464GoodIntertop CorpIntertop Corp
US6349301B10.618Virtual environment bystander updating in client server architectureGRANT2002-02-191998-02-2421843375GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6141684A0.617Multimedia public communication services distribution method and apparatus with distribution of configuration filesGRANT2000-10-311997-09-1225456347GoodNortel Networks LtdRPX Clearinghouse LLC
US5717923A0.616Method and apparatus for dynamically customizing electronic information to individual end usersGRANT1998-02-101994-11-0323304974GoodIntel CorpIntel Corp
US6009410A0.605Method and system for presenting customized advertising to a user on the world wide webGRANT1999-12-281997-10-1625491537GoodAT&T CorpAT&T Corp
US20030005151A10.600Enhanced video programming system and method for providing a distributed community networkAPPLICATION2003-01-021996-03-0823568274GoodACTV IncACTV Inc
US6453334B10.594Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure  time-limited manner  with persistent cachingGRANT2002-09-171997-06-1626727510GoodStreamTheory IncNumecent Holdings Inc
US6226642B10.594Content modification of internet web pages for a television class displayGRANT2001-05-011997-09-1125454963GoodInternational Business Machines CorpWistron Corp
US5475817A0.594Object oriented distributed computing system processing request to other object model with code mapping by object managers located by manager of object managersGRANT1995-12-121991-02-2524649693GoodHewlett Packard CoHewlett Packard Development Co LP
US5802518A0.588Information delivery system and methodGRANT1998-09-011996-06-0424643491GoodMultex Systems IncThomson Reuters Global Resources ULC
US6009457A0.587Distributed real-time communications systemGRANT1999-12-281996-04-0124508675GoodRocket Network IncAVATAR ONTOLOGY Ltd, Avid Technology Inc
US6530080B20.584Method and apparatus for pre-processing and packaging class filesGRANT2003-03-041997-10-3125505128GoodSun Microsystems IncSun Microsystems Inc
US6295645B10.582Method and apparatus for providing downloadable functionality to an embedded coprocessorGRANT2001-09-251997-12-2225541986GoodTexas Instruments IncTexas Instruments Inc
US5835727A0.581Method and apparatus for controlling access to services within a computer networkGRANT1998-11-101996-12-0925064911GoodSun Microsystems IncAmazon com Inc
US6343377B10.581System and method for rendering content received via the internet and world wide web via delegation of rendering processesGRANT2002-01-291997-12-3021691868GoodNetscape Communications CorpMeta Platforms Inc
US6269481B10.580Automatic selecting and downloading device drivers from a server system to a client system that includes one or more devicesGRANT2001-07-311997-05-0225309261GoodWebTV Networks IncMicrosoft Technology Licensing LLC
US6212673B10.577Component-neutral builder interfaceGRANT2001-04-031997-03-3127584610GoodInternational Business Machines CorpInternational Business Machines Corp
US5793965A0.576Method and apparatus for determining the type of an object in a distributed object systemGRANT1998-08-111995-03-2223617076GoodSun Microsystems IncSun Microsystems Inc
US6363433B10.575Method and mechanism for client-side handling of extensions originally written for serversGRANT2002-03-261997-03-1225216327GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6049827A0.575Network management tool for causing network equipment to display information of a network relevant to the network equipmentGRANT2000-04-111997-02-2012468108GoodHitachi LtdHitachi Ltd
US5987256A0.574System and process for object rendering on thin client platformsGRANT1999-11-161997-09-0325447739GoodEnreach Technology IncHanger Solutions LLC
US5438508A0.572License document interchange format for license management systemGRANT1995-08-011991-06-2824906350GoodDigital Equipment CorpHewlett Packard Development Co LP
US5522077A0.567Object oriented network system for allocating ranges of globally unique object identifiers from a server process to client processes which release unused identifiersGRANT1996-05-281994-05-1922929196GoodOntos IncDATATERN Inc
US5204897A0.566Management interface for license management systemGRANT1993-04-201991-06-2827110669GoodDigital Equipment CorpHewlett Packard Development Co LP
US5260999A0.566Filters in license management systemGRANT1993-11-091991-06-2827110811GoodDigital Equipment CorpHewlett Packard Development Co LP
US5835601A0.565File editing system and shared file editing system with file content secrecy  file version management  and asynchronous editingGRANT1998-11-101994-03-1527291911GoodToshiba CorpToshiba Corp
US5787413A0.563C++ classes for a digital libraryGRANT1998-07-281996-07-2924763198GoodInternational Business Machines CorpInternational Business Machines Corp
US5974428A0.559Method and apparatus for class version naming and mappingGRANT1999-10-261997-08-2925443774GoodInternational Business Machines CorpInternational Business Machines Corp
US5864871A0.559Information delivery system and method including on-line entitlementsGRANT1999-01-261996-06-0425148628GoodMultex SystemsThomson Reuters Global Resources ULC
US6243700B10.557Method and apparatus for generating a hypertext-based content menu using an open hierarchical data structureGRANT2001-06-051997-05-1626724444Good
US5146568A0.553REMOTE BOOTSTRAPPING A NODE OVER COMMUNICATION LINK BY INITIALLY REQUESTING REMOTE STORAGE ACCESS PROGRAM WHICH EMULATES LOCAL DISK TO LOAD OTHER PROGRAMSGRANT1992-09-081988-09-0622908614GoodDigital Equipment CorpHewlett Packard Development Co LP
US5911776A0.552Automatic format conversion system and publishing methodology for multi-user networkGRANT1999-06-151996-12-1825082354GoodUnisys CorpUnisys Corp
US5945989A0.551Method and apparatus for adding and altering content on websitesGRANT1999-08-311997-03-2525240347GoodPremiere Communications IncVOICECOM TELECOMMUNICATIONS LLC
US5960189A0.549Automatic computer upgradingGRANT1999-09-281994-09-0823170839GoodCompaq Computer CorpHewlett Packard Development Co LP
US6083279A0.546Platform independent technique for transferring software programs over a networkGRANT2000-07-041996-10-1024925925GoodInternational Business Machines CorpInternational Business Machines Corp
US5781909A0.545Supervised satellite kiosk management system with combined local and remote data storageGRANT1998-07-141996-02-1324405562GoodMicroTouch Systems Inc3M Innovative Properties Co
US5511197A0.538Method and system for network marshalling of interface pointers for remote procedure callsGRANT1996-04-231992-11-1325523380GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5548506A0.534Automated  electronic network based  project management server system  for managing multiple work-groupsGRANT1996-08-201994-03-1722781855Good
US5732275A0.521Method and apparatus for managing and automatically updating software programsGRANT1998-03-241996-01-1124336945GoodApple Computer IncApple Inc
US6279151B10.518Method and apparatus for remote source code inclusionGRANT2001-08-211998-01-2021736767GoodInternational Business Machines CorpInternational Business Machines Corp
US7139759B20.515Method and a device for managing a computer networkGRANT2006-11-211996-03-2214153098GoodHitachi LtdHitachi Ltd
US5163131A0.515PARALLEL I/O NETWORK FILE SERVER ARCHITECTUREGRANT1992-11-101989-09-0823601721GoodAuspex Systems IncNetApp Inc
US6513040B10.513Method and apparatus for a model data structure for accessing and manipulating java beansGRANT2003-01-281997-11-1225514667GoodInternational Business Machines CorpInternational Business Machines Corp
US6470375B10.510System and method for managing the execution of system management tasksGRANT2002-10-221995-12-2924325019GoodHewlett Packard CoHewlett Packard Development Co LP
US6185590B10.510Process and architecture for use on stand-alone machine and in distributed computer architecture for client server and/or intranet and/or internet operating environmentsGRANT2001-02-061996-10-1827567747GoodImagination SoftwareMPHJ Tech Investments LLC
US5819251A0.507System and apparatus for storage retrieval and analysis of relational and non-relational dataGRANT1998-10-061996-02-0624385201GoodOracle CorpOracle International Corp
US7925898B20.505Systems and methods using cryptography to protect secure computing environmentsGRANT2011-04-121996-08-1224769786GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6585779B10.502Method and apparatus for determining and categorizing Java Bean names and sub-elements filesGRANT2003-07-011997-11-2025522462GoodInternational Business Machines CorpInternational Business Machines Corp
US5602992A0.500System for synchronizing data stream transferred from server to client by initializing clock when first packet is received and comparing packet time information with clockGRANT1997-02-111993-11-2922574382GoodIntel CorpIntel Corp
US5901228A0.497Commercial online backup service that provides transparent extended storage to remote customers over telecommunications linksGRANT1999-05-041993-11-0422514726GoodCarbonite IncOASIS RESEARCH LLC, Iomega Corp, EMC Corp, Autonomy Inc, Mozy Inc, Pro Softnet Corp
US6324682B10.495Organicware applications for computer systemsGRANT2001-11-271997-02-1427487175GoodVelocity com IncINSTANCIA Inc
US5692183A0.493Methods and apparatus for providing transparent persistence in a distributed object operating environmentGRANT1997-11-251995-03-3123642891GoodSun Microsystems IncSun Microsystems Inc
US5708796A0.485Method of retrieving continuous and non-continuous media data from a file systemGRANT1998-01-131994-11-1823339191GoodLucent Technologies IncAlcatel Lucent SAS, AT&T Corp, Sound View Innovations LLC
US6415319B10.485Intelligent network browser using incremental conceptual indexerGRANT2002-07-021997-02-0725171379GoodSun Microsystems IncOracle America Inc
US5748980A0.483System for configuring a computer systemGRANT1998-05-051994-05-2746251266GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6407996B10.473Processing device networkGRANT2002-06-181996-07-1710797074GoodBritish Telecommunications PLCMeta Platforms Inc
US5842040A0.473Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of related data unitsGRANT1998-11-241996-06-1824674843GoodStorage Technology CorpStorage Technology Corp
US5712976A0.469Video data streamer for simultaneously conveying same one or different ones of data blocks stored in storage node to each of plurality of communication nodesGRANT1998-01-271994-09-0823168552GoodInternational Business Machines CorpInternational Business Machines Corp
US6308204B10.463Method of communications for an intelligent digital audiovisual playback systemGRANT2001-10-231994-10-129459706GoodTouchTunes Music CorpTouchTunes Music Corp
US5838918A0.458Distributing system configuration information from a manager machine to subscribed endpoint machines in a distrubuted computing environmentGRANT1998-11-171993-12-1322616276GoodInternational Business Machines CorpInternational Business Machines Corp
US5500890A0.450Point-of-sale system using multi-threaded transactions and interleaved file transferGRANT1996-03-191993-08-1922326147GoodExxon Research and Engineering CoExxonMobil Research and Engineering Co
US5727159A0.448System in which a Proxy-Server translates information received from the Internet into a form/format readily usable by low power portable computersGRANT1998-03-101996-04-1024523142GoodHanger Solutions LLCHanger Solutions LLC
WO1997046955A10.444INTERNET ACCESS SYSTEM AND METHOD WITH ACTIVE LINK STATUS INDICATORSAPPLICATION1997-12-111996-06-0726691689Good
US6286051B10.444Method and apparatus for extending a java archive fileGRANT2001-09-041997-11-1225514670GoodInternational Business Machines CorpInternational Business Machines Corp
US6170002B10.440Workflow systems and methodsGRANT2001-01-021997-07-2825414388GoodSolectron CorpJuniper Networks Inc
US7546346B20.437Workflow systems and methods for project management and information managementGRANT2009-06-091997-07-2821894908GoodJuniper Networks IncJuniper Networks Inc
US6163805A0.435Distributed automated testing systemGRANT2000-12-191997-10-0725484356GoodHewlett Packard CoHP Inc
US5917489A0.435System and method for creating  editing  and distributing rules for processing electronic messagesGRANT1999-06-291997-01-3125155089GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5848274A0.435Incremental byte code compilation systemGRANT1998-12-081996-02-2924591135GoodSupercede IncOpen Invention Network LLC
US5764992A0.434Method and apparatus for automatic software replacementGRANT1998-06-091995-06-0623872515GoodApple Computer IncApple Inc
US6035339A0.428Network information delivery system for delivering information based on end user terminal requirementsGRANT2000-03-071997-03-1325220036GoodAT&T CorpAT&T Corp
WO1999035799A20.423A METHOD FOR PACKET AUTHENTICATION IN THE PRESENCE OF NETWORK ADDRESS TRANSLATIONS AND PROTOCOL CONVERSIONSAPPLICATION1999-07-151997-12-318550255Good
US5893905A0.422Automated SLA performance analysis monitor with impact alerts on downstream jobsGRANT1999-04-131996-12-2425096457GoodMCI Communications CorpVerizon Patent and Licensing Inc
US6308247B10.419Page table entry management method and apparatus for a microkernel data processing systemGRANT2001-10-231994-09-0923173783GoodInternational Business Machines CorpInternational Business Machines Corp
US6618854B10.406Remotely accessible integrated debug environmentGRANT2003-09-091997-02-1825183576GoodAdvanced Micro Devices IncAdvanced Micro Devices Inc
US5500881A0.406Language scoping for modular  flexible  concise  configuration descriptionsGRANT1996-03-191993-07-1222224593GoodDigital Equipment CorpHewlett Packard Development Co LP
US5581764A0.398Distributed computer network including hierarchical resource information structure and related method of distributing resourcesGRANT1996-12-031993-04-3022003720GoodNovadigm IncHP Inc, Hewlett Packard Development Co LP
US5925123A0.398Processor for executing instruction sets received from a network or from a local memoryGRANT1999-07-201996-01-2426681281GoodSun Microsystems IncOracle America Inc
US5517645A0.397Method and system for interfacing components via aggregate components formed by aggregating the components each with an instance of a component managerGRANT1996-05-141993-11-0522522490GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6073129A0.393Method and apparatus for improving the performance of a database management system through a central cache mechanismGRANT2000-06-061997-12-2925546085GoodBull HN Information Systems IncBull HN Information Systems Inc
US6173421B10.388Centrally handling runtime errorsGRANT2001-01-091997-04-1825292602GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6367077B10.369Method of upgrading a software application in the presence of user modificationsGRANT2002-04-021997-02-2721905620GoodSiebel Systems IncOracle America Inc
US6346951B10.368Process for selecting a recording on a digital audiovisual reproduction system  for implementing the processGRANT2002-02-121996-09-259496051GoodTouchTunes Music CorpTouchTunes Music Corp
US6101495A0.363Method of executing partition operations in a parallel database systemGRANT2000-08-081994-11-1623339707GoodHitachi LtdHitachi Ltd
US8184508B20.362Intelligent digital audiovisual reproduction systemGRANT2012-05-221994-10-129480894GoodTouchTunes Music CorpTouchTunes Music Corp
US6289334B10.358Apparatus and method for decomposing database queries for database management system including multiprocessor digital data processing systemGRANT2001-09-111994-01-3122697584GoodSun Microsystems IncSun Microsystems Inc
US5581758A0.358Computer program product for object specification  generation  and management in a distributed databaseGRANT1996-12-031992-10-0525498883GoodInternational Business Machines CorpInternational Business Machines Corp
US5519866A0.354Method and apparatus of incrementally linking components of a modeled computer programGRANT1996-05-211993-06-2822191952GoodTaligent IncINCREMENTAL LINKER SYSTEM, Apple Inc
US6047323A0.354Creation and migration of distributed streams in clusters of networked computersGRANT2000-04-041995-10-1946202931GoodHewlett Packard CoHewlett Packard Development Co LP
US5754864A0.352Software piracy detection systemGRANT1998-05-191992-04-1025348604GoodCharles E Hill and Assoc IncCharles E Hill and Assoc Inc
US5835749A0.351Method and apparatus for providing dynamically linked librariesGRANT1998-11-101995-05-0523727156GoodApple Computer IncApple Inc
US5581706A0.346Method forming an audio/video interactive data signalGRANT1996-12-031994-06-3023026634GoodRCA Licensing CorpCompaq Computer Corp, OpenTV Inc
US5761477A0.345Methods for safe and efficient implementations of virtual machinesGRANT1998-06-021995-12-0424263626GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6195794B10.341Method and apparatus for distributing templates in a component systemGRANT2001-02-271997-08-1225428359GoodInternational Business Machines CorpInternational Business Machines Corp
US8661477B20.335System for distributing and selecting audio and video information and method implemented by said systemGRANT2014-02-251994-10-1256290650GoodTouchTunes Music CorpTouchTunes Music Corp
US6199095B10.329System and method for achieving object method transparency in a multi-code execution environmentGRANT2001-03-061996-01-2924375332GoodCompaq Computer CorpHewlett Packard Enterprise Development LP
US6035120A0.327Method and apparatus for converting executable computer programs in a heterogeneous computing environmentGRANT2000-03-071997-05-2825345275GoodSun Microsystems IncOracle America Inc
US5802373A0.327Method for providing a pipeline interpreter for a variable length instruction setGRANT1998-09-011996-01-2924372865GoodDigital Equipment CorpHewlett Packard Enterprise Development LP
WO1999005597A10.320VISUALISATION IN A MODULAR SOFTWARE SYSTEMAPPLICATION1999-02-041997-07-2526147533Good
US5481718A0.319Object-oriented system having object models containing plural objects with instantiation following static classification by class relationships  dynamic classification by temporal instantiation  and causality restrictionsGRANT1996-01-021993-05-2114761847GoodFujitsu LtdFujitsu Ltd
US6122628A0.317Multidimensional data clustering and dimension reduction for indexing and searchingGRANT2000-09-191997-10-3125503305GoodInternational Business Machines CorpInternational Business Machines Corp
US5297279A0.315System and method for database management supporting object-oriented programmingGRANT1994-03-221990-05-3024117859GoodTexas Instruments IncTexas Instruments Inc
US5727164A0.315Apparatus for and method of managing the availability of itemsGRANT1998-03-101991-12-1325194489GoodMax Software IncMAX SOFTWARE Inc A Corp OF NY, Max Software Inc
US5991299A0.313High speed header translation processingGRANT1999-11-231997-09-1125455043Good3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US5369766A0.311Object-oriented loader system with support for different load formatsGRANT1994-11-291993-03-2521892194GoodTaligent IncApple Inc
US6996533B20.308Information processing systemGRANT2006-02-071997-03-2113350210GoodFujitsu LtdFujitsu Ltd
US5555427A0.306Distributed processing in a system of computers at terminals connected by a communication networkGRANT1996-09-101989-12-2626575654GoodFujitsu LtdFujitsu Ltd
US5339419A0.304ANDF compiler using the HPcode-plus compiler intermediate languageGRANT1994-08-161990-06-2524166377GoodHewlett Packard CoHP Inc
US6429881B10.303Method and system for transitioning graphic elements of a network interface description documentGRANT2002-08-061997-12-0325529454GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6473899B10.295Field configurable embedded computer systemGRANT2002-10-291996-08-2824829461GoodExtended Systems IncExtended Systems Inc
US8225369B20.294Home digital audiovisual information recording and playback systemGRANT2012-07-171994-10-1239764688GoodTouchTunes Music CorpTouchTunes Music Corp
US5189608A0.293Method and apparatus for storing and generating financial information employing user specified input and output formatsGRANT1993-02-231987-06-0126734661GoodIMRS Operations IncCORPORATE CLASS SOFTWARE Inc A CORP OF, Oracle International Corp
US4885770A0.292Boot system for distributed digital data processing systemGRANT1989-12-051987-09-0422240861GoodDigital Equipment CorpHewlett Packard Development Co LP
US5729748A0.292Call template builder and methodGRANT1998-03-171995-04-0323652420GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6182082B10.291Method and system for managing object-oriented databaseGRANT2001-01-301994-07-2515942850GoodHitachi Software Engineering Co Ltd, Hitachi LtdHitachi Software Engineering Co Ltd, Hitachi Ltd
US6338074B10.290System for enterprise-wide work flow automationGRANT2002-01-081997-07-2325410910GoodFileNet CorpServiceNow Inc
US5978788A0.283System and method for generating multi-representations of a data cubeGRANT1999-11-021997-04-1425289554GoodInternational Business Machines CorpGoogle LLC
US5519868A0.283Compilation of information contained in GDMO name bindingsGRANT1996-05-211993-12-3022642161GoodInternational Business Machines CorpInternational Business Machines Corp
US5535407A0.277Data processing system for locally updating customer data distributed by a host computer to a remote facility and for returning the updated customer data to the host computerGRANT1996-07-091989-05-3015129917GoodOki Electric Industry Co LtdOki Electric Industry Co Ltd
US5786816A0.274Method and apparatus for graphical user interface-based and variable result healthcare planGRANT1998-07-281995-10-2024178645GoodAraxsys IncQUOVADX Inc GEORGIA Corp, Infor US LLC
US5715441A0.274Method and system for storing and accessing data in a compound document using object linkingGRANT1998-02-031992-07-0625427396GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5787284A0.268Improving memory layout based on connectivity considerationsGRANT1998-07-281995-12-284157251GoodInternational Business Machines CorpInternational Business Machines Corp
US5778227A0.267System for adding attributes to an object at run time in an object oriented computer environmentGRANT1998-07-071995-08-0124028326GoodIntergraph CorpIntergraph Software Technologies Co
US5590331A0.266Method and apparatus for generating platform-standard object files containing machine-independent codeGRANT1996-12-311994-12-2323431532GoodSun Microsystems IncOracle America Inc
US5339438A0.258Version independence for object oriented programsGRANT1994-08-161991-12-1225192155GoodInternational Business Machines CorpInternational Business Machines Corp
US6934945B10.255Method and apparatus for controlling communicationsGRANT2005-08-231997-03-143804175GoodCardsoft IncCardsoft Inc
US4724521A0.254Method for operating a local terminal to execute a downloaded application programGRANT1988-02-091986-01-1425227435GoodVerifone IncHP Inc
US5937411A0.253Method and apparatus for creating storage for java archive manifest fileGRANT1999-08-101997-11-2125523938GoodInternational Business Machines CorpInternational Business Machines Corp
US5487167A0.253Personal computer with generalized data streaming apparatus for multimedia devicesGRANT1996-01-231991-12-3125220858GoodInternational Business Machines CorpLenovo Singapore Pte Ltd
US5710920A0.250Object extending methodGRANT1998-01-201993-12-2818314465GoodHitachi LtdHitachi Ltd
US5900870A0.249Object-oriented computer user interfaceGRANT1999-05-041989-06-3046252823GoodMassachusetts Institute of TechnologyMassachusetts Institute of Technology
US5754858A0.245Customizable application project generation process and systemGRANT1998-05-191996-05-0124572557GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6272672B10.243Dataflow processing with eventsGRANT2001-08-071995-09-0624088062Good
US5850548A0.241System and methods for visual programming based on a high-level hierarchical data flow modelGRANT1998-12-151994-11-1423324243GoodBorland Software CorpCODEGEAR LLC
US8752010B10.236Dynamic interface synthesizerGRANT2014-06-101997-12-3121698132GoodHoneywell International IncHoneywell Inc, Honeywell International Inc
US4939507A0.233Virtual and emulated objects for use in the user interface of a display screen of a display processorGRANT1990-07-031986-04-2826925653GoodXerox CorpXerox Corp
US5584035A0.229Object based system comprising user interface permitting manipulation of objects by usersGRANT1996-12-101990-07-318205505GoodHewlett Packard CoHewlett Packard Development Co LP
US5537630A0.218Method and system for specifying method parameters in a visual programming systemGRANT1996-07-161994-12-0523371694GoodInternational Business Machines CorpInternational Business Machines Corp
US5500802A0.217System and method for creating configurators using templatesGRANT1996-03-191994-05-3122949285GoodPantheon Solutions IncPantheon Solutions Inc
US5461714A0.217Apparatus for synthesizing an object described in an object-oriented language on the basis of a predetermined specificationGRANT1995-10-241990-09-2817298506GoodToshiba CorpToshiba Corp
US6053951A0.215Man/machine interface graphical code generation wizard for automatically creating MMI graphical programsGRANT2000-04-251997-07-1026730187GoodNational Instruments CorpNational Instruments Corp
US5765164A0.212Apparatus and method for management of discontinuous segments of multiple audio  video  and data streamsGRANT1998-06-091995-12-2124302578GoodIntel CorpIntel Corp
US5933644A0.208Method and apparatus for conflict-based block reorderingGRANT1999-08-031997-06-1825372029GoodSun Microsystems IncOracle America Inc
US5771347A0.208Apparatus and method to allow a user a trial period before licensing a software program productGRANT1998-06-231994-05-2022931588GoodInternational Business Machines CorpInternational Business Machines Corp
US5410688A0.207Distributed object based systems for communicating object data among different storage domainsGRANT1995-04-251989-07-218202740GoodHewlett Packard CoHP Inc
US5367573A0.206Signature data objectGRANT1994-11-221993-07-0222201912GoodDigital Equipment CorpHewlett Packard Development Co LP
US5873069A0.205System and method for automatic updating and display of retail pricesGRANT1999-02-161995-10-1324165824GoodAmerican TV and Appliance of Madison IncMURPHY USA Inc, American TV and Appliance of Madison Inc
US6130917A0.203Instant protocol selection scheme for electronic data transmissionGRANT2000-10-101997-03-1425220483Goode-Watch Ince-Watch Inc
US5850535A0.192Roll-back during regeneration on a computer-aided design systemGRANT1998-12-151995-10-1224163902GoodComputervision CorpComputervision Corp, PTC Inc
US5819283A0.191Method and system for the extensibility of objectsGRANT1998-10-061993-05-1122043692GoodApple Computer IncApple Inc
US6363436B10.188Method and system for loading libraries into embedded systemsGRANT2002-03-261997-01-2725153763GoodInternational Business Machines CorpInternational Business Machines Corp
US4935888A0.187Computer keyboard template systemGRANT1990-06-191988-05-0922705488GoodWink Data Products CorpWINK DATA PRODUCTS Corp A CORP OF WASHINGTON, Wink Data Products Corp
US5353401A0.187Automatic interface layout generator for database systemsGRANT1994-10-041992-11-0625520443GoodRicoh Co Ltd, Ricoh Americas CorpRicoh Co Ltd, Ricoh Americas Corp
US5896383A0.187System and method for encoding instruction fields within data packetsGRANT1999-04-201997-05-0125295736GoodAdvanced Micro Devices IncGlobalFoundries Inc
US5724589A0.185Development system with a property-method-event programming model for developing context-free reusable software componentsGRANT1998-03-031995-10-1324164110GoodBorland Software CorpCODEGEAR LLC
US5745380A0.172Priority controlled transmission of multimedia streams via a telecommunication lineGRANT1998-04-281995-01-308218943GoodInternational Business Machines CorpInternational Business Machines Corp
US5560014A0.169Dynamic object management method in object oriented languageGRANT1996-09-241994-06-0214802394GoodAgency of Industrial Science and Technology, Japan International Trade and Industry Ministry ofJapan International Trade and Industry Ministry of, National Institute of Advanced Industrial Science and Technology AIST
US5867709A0.169Method and system for reusing customizations to a software productGRANT1999-02-021995-10-1824173593GoodKaPRE Software IncSilicon Valley Bank Inc, KaPRE Software Inc
US6173291B10.168Method and apparatus for recovering data from damaged or corrupted file storage mediaGRANT2001-01-091997-09-2625472522GoodPowerquest CorpIMPERIAL BANK, Veritas Technologies LLC
US6609133B20.145Integrating both modifications to an object model and modifications to a database into source code by an object-relational mapping toolGRANT2003-08-191997-12-2226748950GoodBaan Development BV, Sun Microsystems IncBaan Development BV, Sun Microsystems Inc
US6105004A0.140Product monitoring system particularly useful in merchandising and inventory controlGRANT2000-08-151996-04-1837450863GoodEldat Communication LtdEldat Communication Ltd
US5710926A0.137Developers tool for object-oriented programmingGRANT1998-01-201993-09-0322368840GoodOpen Invention Network LLCOpen Invention Network LLC
US5740430A0.939Method and apparatus for server-independent caching of dynamically-generated customized pagesGRANT1998-04-141995-11-0624212293FairC NET IncC/NET Inc, Open Text SA, CBS Interactive Inc, C NET Inc
US5828840A0.921Server for starting client application on client if client is network terminal and initiating client application on server if client is non network terminalGRANT1998-10-271996-08-0624780790FairVerifone IncHewlett Packard Enterprise Development LP
US5878223A0.919System and method for predictive caching of information pagesGRANT1999-03-021997-05-0725314128FairInternational Business Machines CorpInternational Business Machines Corp
US5953005A0.808System and method for on-line multimedia accessGRANT1999-09-141996-06-2824695100FairSun Microsystems IncOracle America Inc
US7647550B10.791Dynamic preloading of web pagesGRANT2010-01-121996-09-1324862752FairBeryl Technical Assays LLCApple Inc, MAGICWEB COMMUNICATIONS Inc
US6128701A0.782Adaptive and predictive cache refresh policyGRANT2000-10-031997-10-2825501625FairCache Flow IncCA Inc, Cache Flow Inc
US5754772A0.778Transaction service independent HTTP server-to-transaction gatewayGRANT1998-05-191996-03-2624492937FairUnisys CorpUnisys Corp
US7103836B10.708Method and system for generating materials for presentation on a non-frame capable web browserGRANT2006-09-051997-07-1525400596FairInternational Business Machines CorpInternational Business Machines Corp
US6434578B10.674Generating instruction sequences using independently executable pane renderersGRANT2002-08-131996-06-2624687709FairMicrosoft CorpMicrosoft Technology Licensing LLC
US5491820A0.652Distributed  intermittently connected  object-oriented database and management systemGRANT1996-02-131994-11-1023319026FairAT&T CorpAT&T Corp
US5758355A0.545Synchronization of server database with client database using distribution tablesGRANT1998-05-261996-08-0724792211FairAurum Software IncAurum Software Inc
US6263352B10.516Automated web site creation using template driven generation of active server page applicationsGRANT2001-07-171997-11-1425516600FairMicrosoft CorpMicrosoft Technology Licensing LLC
US5761656A0.495Interaction between databases and graphical user interfacesGRANT1998-06-021995-06-2623965826FairNetDynamics IncOracle America Inc
US6266684B10.472Creating and saving multi-frame web pagesGRANT2001-07-241997-08-0625423623FairAdobe Systems IncAdobe Inc
US5978791A0.461Data processing system using substantially unique identifiers to identify data items  whereby identical data items have the same identifiersGRANT1999-11-021995-04-1123685427FairKinetech IncMOUNT SHASTA ACQUISITION LLC, Personalweb Technologies LLC, Level 3 Communications LLC
US6003046A0.416Automatic development and display of context information in structured documents on the world wide webGRANT1999-12-141996-04-1524541668FairSun Microsystems IncOracle America Inc
US5870742A0.416Method and apparatus for enabling persistent attributes in an object oriented environmentGRANT1999-02-091996-03-2024480247FairInternational Business Machines CorpInternational Business Machines Corp
US6658624B10.393Method and system for processing documents controlled by active documents with embedded instructionsGRANT2003-12-021996-09-2446203593FairRicoh Co LtdRicoh Co Ltd
US6003042A0.379Systems  methods and computer programs products for storing a new version of an Envy Library file in a teamconnection object oriented programming environmentGRANT1999-12-141997-09-3025475486FairInternational Business Machines CorpInternational Business Machines Corp
US5542078A0.343Object oriented data store integration environment for integration of object oriented databases and non-object oriented data facilitiesGRANT1996-07-301994-09-2923224208FairOntos IncFireStar Software Inc
US5974129A0.339Distributed virtual cache method for use in a database query control systemGRANT1999-10-261997-05-2125335593FairLucent Technologies IncAlcatel Lucent SAS, Sound View Innovations LLC
US5991776A0.323Database system with improved methods for storing free-form data objects of data recordsGRANT1999-11-231992-08-2025464047FairBorland Software CorpBorland Software Corp
US8600910B20.296System and method for remote postage meteringGRANT2013-12-031996-10-0224913234FairStamps com IncE-Stamp Corp, Stamps com Inc
US5577266A0.275Broadcast system with associated data capabilitiesGRANT1996-11-191993-04-0824193902FairDigital DJ IncDigital DJ Inc
US8428273B20.274Wireless digital transmission system for loudspeakersGRANT2013-04-231997-09-269511523FairTouchTunes Music CorpTouchTunes Music Corp
US20050256811A10.269Virtual security deviceAPPLICATION2005-11-171996-10-0234525761FairStamps com IncStamps com Inc
US5504886A0.254System and method for applying user supplied relation definitions to application files for a relational databaseGRANT1996-04-021993-07-0222200900FairInternational Business Machines CorpInternational Business Machines Corp
USRE43751E10.240Browser system having simplified URL address registering methodGRANT2012-10-161997-04-3014604367FairSony CorpSony Corp
US6799301B10.239Methods and systems for objects supporting structured language persistent stateGRANT2004-09-281997-07-1425400166FairMicrosoft CorpTARGET APPLICATORS Inc, Microsoft Technology Licensing LLC
US5706455A0.190Distributed database configuration with graphical representations having prelinked parameters for devices within a networked control systemGRANT1998-01-061994-09-0223159024FairSquare D CoSchneider Electric USA Inc
US5603021A0.168Methods for composing formulas in an electronic spreadsheet systemGRANT1997-02-111994-09-0223160692FairBorland Software CorpBorland Software Corp
US6088524A0.163Method and apparatus for optimizing database queries involving aggregation predicatesGRANT2000-07-111995-12-2724317318FairLucent Technologies IncAT&T Corp, Nokia of America Corp
US5454046A0.151Universal symbolic handwriting recognition systemGRANT1995-09-261993-09-1722409697FairPenkey CorpFFICIENCY SOFTWARE Inc
JPH1074153ANRFILE MANAGING DEVICE AND METHOD FOR TRANSFERRING FILEGRANT1998-03-171996-08-3016919134Fair
JPH1055279ANRDISTRIBUTED PROCESSORGRANT1998-02-241996-08-0916597985Fair
JPH1049354ANRINFORMATION PROCESSING SYSTEMGRANT1998-02-201996-08-0516514219Fair
JPH10289215ANRCOMPUTER SYSTEM HAVING CURRENT AND SPARE SWITCHING FUNCTION IN APPLICATION PROGRAM UNIT AND MACHINE READABLE RECORDING MEDIUM RECORDING PROGRAMGRANT1998-10-271997-04-1514614718Fair

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeLOW
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityBROAD
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
2,031
Recommended Classes
508
Government Assigned Classes
8
CPC
Title
Score
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)2.346
G06F8/76Adapting program code to run in a different environment| Porting2.323
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)2.323
G06F21/629to features or functions of an application2.083
G06F21/44Program or device authentication2.083
G06F9/44568Immediately runnable code2.083
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files1.919
G06Q20/3227Use of a security embedded in M-devices1.803
G06K5/04Verifying the alignment of markings1.703
G07F7/0893the card reader reading the card in a contactless manner1.703
H04W12/06Authentication1.703
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC1.703
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.703
H04W12/12Fraud detection1.703
H04L9/3271using challenge-response1.703
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)1.703
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords1.703
G06F13/385for adaptation of a particular data processing system to different peripheral devices1.655
G06K7/10297arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs  e.g. ISO/IEC 14443 and 18092 | protocols for data communication in general  | see|  | (ref: H04L29/06)1.655
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics1.643
G06F21/602Providing cryptographic facilities or services1.643
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities1.643
H04L63/0281Proxies1.636
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)1.633
G06F21/128involving web programs  i.e. using technology especially used in internet  generally interacting with a web browser  e.g. hypertext markup language [HTML]  applets  java1.633
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)1.624
H04L63/168above the transport layer1.616
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.616
H04L43/14using software  i.e. software packages | network security related monitoring | (ref: H04L63/1408)1.610
G06F9/54Interprogram communication1.606
G06F3/0483interaction with page-structured environments  e.g. book metaphor1.600
G06F9/451Execution arrangements for user interfaces1.600
G06F8/41Compilation1.599
G06F9/4552Involving translation to a different instruction set architecture  e.g. just-in-time translation in a JVM1.599
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)1.599
G06F21/33using certificates1.599
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)1.574
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)1.574
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence1.574
H04L67/143provided for session termination  e.g.  event controlled end of session1.574
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)1.573
G06F9/452Remote windowing  e.g. X-Window System  desktop virtualisation | protocols for telewriting | (ref: H04L67/38)1.572
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity1.566
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.566
G06F21/606by securing the transmission between two devices or processes1.565
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.562
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy1.562
H04L67/148provided for migration or transfer of sessions | in-session procedures in real-time communications | (ref: H04L65/1083)| | control or signalling for completing the hand-off in wireless networks | (ref: H04W36/0005)1.558
G06F3/0482interaction with lists of selectable items  e.g. menus1.555
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems1.555
G06F8/31Programming languages or programming paradigms1.540
G06F9/45508Runtime interpretation or emulation  e g. emulator loops  bytecode interpretation1.540
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)1.538
G06Q20/38215Use of certificates or encrypted proofs of transaction rights1.535
H04W24/02Arrangements for optimising operational condition1.520
H04W48/18Selecting a network or a communication service1.520
H04L63/0263Rule management1.518
H04L47/10Flow control or congestion control1.518
H04L45/24Multipath1.515
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage1.508
H04N21/8456by decomposing the content in the time domain  e.g. in time segments1.507
H04N21/23106involving caching operations | prefetching while addressing of a memory level in which the access to the desired data or data block requires associative addressing means within memory systems or architectures | (ref: G06F12/0862)| | caching at an intermediate stage in a data network | (ref: H04L29/08801)1.507
G06F21/71to assure secure computing or processing of information1.506
G06F12/0811with multilevel cache hierarchies1.506
G06F12/0866for peripheral storage systems  e.g. disk cache1.506
G06Q30/0283Price estimation or determination1.502
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD1.502
H04N21/4335Housekeeping operations  e.g. prioritizing content for deletion because of storage space restrictions | storage management  e.g. defragmentation | (ref: G06F3/0604)| | unloading stored programs | (ref: G06F9/445)| | storage management in file systems | (ref: G06F17/30067)| | buffering arrangements in a network node or in an end terminal in packet networks | (ref: H04L49/90)1.495
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine1.495
H04L63/1458Denial of Service1.492
H04L63/1416Event detection  e.g. attack signature detection1.492
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)1.487
G06F12/0882Page mode1.483
G06F12/0862with prefetch1.483
H04L63/0815providing single-sign-on or federations1.481
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)1.479
H04L41/0226Mapping or translation of multiple network management protocols1.479
H04L41/0806for initial configuration or provisioning1.479
G06F21/335for accessing specific resources  e.g. using Kerberos tickets1.478
H04L45/22Alternate routing1.472
G06T11/002D [Two Dimensional] image generation1.469
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.469
G06F9/5005to service a request1.467
G06F9/5061Partitioning or combining of resources1.467
G06F3/04817using icons | graphical programming languages using iconic symbols | (ref: G06F8/34)1.463
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance1.463
G06F8/71Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management1.462
G06F8/30Creation or generation of source code1.462
G06F3/0238Programmable keyboards | key guide holders | (ref: G06F3/0224)1.460
G06F11/3684for test design  e.g. generating new test cases1.460
G06F8/656while running1.459
G06F8/658Incremental updates| Differential updates1.459
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself1.457
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database1.457
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]1.452
G06F9/44542Retargetable1.445
H04L63/166at the transport layer1.436
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes1.435
G06F21/6245Protecting personal data  e.g. for financial or medical purposes1.433
G06Q20/354Card activation or deactivation1.432
G06Q20/352Contactless payments by cards1.431
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL1.431
H04L63/0272Virtual private networks1.431
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint1.430
G06F12/0868Data transfer between cache memory and other subsystems  e.g. storage devices or host systems1.429
G06F12/084with a shared cache1.429
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)1.428
G06Q20/4014Identity check for transaction1.428
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)1.427
G06F9/4881Scheduling strategies for dispatcher  e.g. round robin  multi-level priority queues1.424
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals1.424
G06F21/54by adding security routines or objects to programs1.422
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)1.421
G06T1/20Processor architectures| Processor configuration  e.g. pipelining1.417
G06Q20/3276using a pictured code  e.g. barcode or QR-code  being read by the M-device1.416
H04L63/102Entity profiles1.416
G06F9/5077Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455)1.409
G16H30/20for handling medical images  e.g. DICOM  HL7 or PACS1.409
G06F9/5072Grid computing1.405
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]1.401
H04L65/4076Multicast or broadcast | data switching systems for broadcast or conference | (ref: H04L12/18)| | analog television systems in general | (ref: H04N7/00)| | creating video channels for a dedicated end-user group | (ref: H04N21/2668)| | arrangements for broadcast or distribution combined with broadcast | (ref: H04H20/00)| | arrangements for broadcast applications with a direct linkage of broadcast information | (ref: H04H60/00)| | arrangements for push based network services | (ref: H04L67/26)1.395
H04N21/222Secondary servers  e.g. proxy server  cable television Head-end | intermediate processing or storage in data networks | (ref: H04L29/08702)1.395
G06F21/6254by anonymising data  e.g. decorrelating personal data from the owner's identification1.395
G06F11/3428Benchmarking1.392
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.391
H04L41/0896Bandwidth or capacity management  i.e. automatically increasing or decreasing capacities  e.g. bandwidth on demand | reallocation of resources  renegotiation of resources  e.g. in-call | (ref: H04L47/76)1.387
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)1.387
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)1.387
H04W12/02Protecting privacy or anonymity1.386
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)1.386
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip1.386
G06Q20/3674involving authentication1.386
G06F9/45558Hypervisor-specific management and integration aspects1.385
H04L41/046Aspects of network management agents1.384
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)1.383
H04L63/0485Networking architectures for enhanced packet encryption processing  e.g. offloading of IPsec packet processing or efficient security association look-up1.383
G06F8/458Synchronisation  e.g. post-wait  barriers  locks | synchronisation among tasks | (ref: G06F9/52)1.377
G06F11/3636by tracing the execution of the program1.377
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates1.376
H04N21/44016involving splicing one content stream with another content stream  e.g. for substituting a video clip1.375
H04N21/2187Live feed1.375
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model1.373
H04L9/3236using cryptographic hash functions1.366
H04N21/2183Cache memory | caches in web servers or browsers | (ref: G06F17/30902)| | intermediate storage and caching in data networks | (ref: H04L29/08801)1.365
H04N21/4331Caching operations  e.g. of an advertisement for later insertion during playback1.365
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)1.357
G06F8/33Intelligent editors1.357
G06F9/453Help systems1.357
H04L63/1425Traffic logging  e.g. anomaly detection1.355
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)1.355
G06F11/3624by performing operations on the source code  e.g. via a compiler1.354
G06F11/3604Software analysis for verifying properties of programs | byte-code verification | (ref: G06F9/44589)1.354
G06F9/5055considering software capabilities  i.e. software resources associated or available to the machine1.353
G06F9/505considering the load1.353
H04L63/108when the policy decisions are valid for a limited amount of time1.353
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow1.351
H04L67/289where the intermediate processing is functionally located closer to the data consumer application  e.g. in same machine  in same home or in same subnetwork1.348
G06Q10/101Collaborative creation of products or services1.347
H04L45/308Route determination based on user's profile  e.g. premium users1.347
H04W40/34Modification of an existing route1.347
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.345
H04L9/3247involving digital signatures1.345
G06F12/0646Configuration or reconfiguration1.342
H04W4/02Services making use of location information1.338
G06F9/5016the resource being the memory1.338
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key1.335
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)1.330
G06Q20/385Use of an alias or a single-use code1.330
G06Q20/405Establishing or using transaction specific rules1.330
H04L41/082due to updating or upgrading of network functionality  e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02)1.330
G06Q20/401Transaction verification1.330
H04L41/0893Assignment of logical groupings to network elements| Policy based network management or configuration1.330
G06F8/61Installation1.330
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)1.329
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)1.327
H04L12/1818Conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources  notifying involved parties1.327
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)1.327
G06F8/60Software deployment1.325
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits1.325
H04L67/306User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867)1.324
G06Q30/0185Product  service or business identity fraud1.323
A61F5/566Intra-oral devices1.322
G06Q50/30Transportation| Communications1.315
G06F3/038Control and interface arrangements therefor  e.g. drivers or device-embedded control circuitry1.315
A63F13/355Performing operations on behalf of clients with restricted processing capabilities  e.g. servers transform changing game scene into an MPEG-stream for transmitting to a mobile phone or a thin client1.315
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)1.311
H04L63/105Multiple levels of security1.311
H04N21/23406involving management of server-side video buffer1.309
G06Q30/0233Method of redeeming a frequent usage reward1.307
G06Q30/0207Discounts or incentives  e.g. coupons  rebates  offers or upsales1.307
G06F21/85interconnection devices  e.g. bus-connected or in-line devices1.307
G06Q20/20Point-of-sale [POS] network systems | POS | per se|  | (ref: G07F)|  or | (ref: G07G)1.306
G06Q20/18involving self- service terminals [SSTs]  vending machines  kiosks or multimedia terminals1.306
H04N21/64738Monitoring network characteristics  e.g. bandwidth  congestion level | data switched network analysis | (ref: H04L41/14)| | monitoring functioning in data switched networks | (ref: H04L43/0817)| | flow control in packet networks | (ref: H04L47/10)1.306
G06F21/6263during internet communication  e.g. revealing personal data from cookies1.303
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries1.303
H04L67/1021based on client or server locations1.302
G06F12/123with age lists  e.g. queue  most recently used [MRU] list or least recently used [LRU] list1.299
G06F21/305by remotely controlling device operation1.297
H04N21/4622Retrieving content or additional data from different sources  e.g. from a broadcast channel and the Internet | web site content organization and management for information retrieval from the Internet | (ref: G06F17/3089)| | transmission by internet of broadcast information | (ref: H04H60/82)| | stock exchange data over packet-switching network | (ref: H04L12/1804)| | push services including data channel over packet-switching network | (ref: H04L12/1859)1.296
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols1.295
G06Q20/3829involving key management1.293
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]1.293
H04L67/1046Joining mechanisms1.291
H04L67/1074for supporting resource transmission mechanisms | routing over an overlay routing layer | (ref: H04L45/64)| | file transfer | (ref: H04L67/06)1.291
G06F9/4856resumption being on a different machine  e.g. task migration  virtual machine migration | (ref: G06F9/5088)|  takes precedence1.290
G06F8/35Model driven1.288
G06F8/36Software reuse1.288
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)1.287
H04L51/046interacting with other applications or services1.286
G06Q50/01Social networking1.286
G06F21/564by virus signature recognition1.284
H04L67/08adapted for terminal emulation  e.g. telnet | protocols for telewriting or protocols for networked simulations  virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455)1.282
A63F13/71using secure communication between game devices and game servers  e.g. by encrypting game data or authenticating players1.281
A63F13/216using geographical information  e.g. location of the game device or player using GPS1.281
A63F13/65automatically by game devices or servers from real world data  e.g. measurement in live racing competition1.281
G06F9/547Remote procedure calls [RPC]| Web services1.280
H04L63/0245Filtering by information in the payload1.279
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)1.278
H04L9/008involving homomorphic encryption1.277
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]1.276
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB1.276
G06F21/45Structures or tools for the administration of authentication1.273
H04L41/0843based on generic templates1.273
H04N21/4312involving specific graphical features  e.g. screen layout  special fonts or colors  blinking icons  highlights or animations1.270
G06Q20/045characterized in that the payment protocol involves at least one ticket1.270
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)1.269
G06F9/541via adapters  e.g. between incompatible applications1.269
H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP  | (ref: H04W80/04)1.269
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)1.269
H04L41/5096wherein the managed service relates to distributed or central networked applications | management of file systems | (ref: G06F17/30067)| | management of structured data stores | (ref: G06F17/30286)1.268
G06F9/4843by program  e.g. task dispatcher  supervisor  operating system1.268
G06F11/0721within a central processing unit [CPU]1.266
G06Q30/0257User requested1.264
G06Q30/0275Auctions1.264
H04L12/283Processing of data at an internetworking point of a home automation network1.264
G10L15/30Distributed recognition  e.g. in client-server systems  for mobile phones or network applications1.264
H04N21/234363by altering the spatial resolution  e.g. for clients with a lower screen resolution1.261
G06F9/44Arrangements for executing specific programs1.260
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)1.260
H04N21/2347involving video stream encryption | arrangements for secret or secure communication | (ref: H04L9/00)|   analogue secrecy systems | (ref: H04N7/16)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)| | arrangements for preventing the taking of data from a data transmission channel without authorisation | (ref: H04L12/22)| | security arrangements in wireless networks | (ref: H04W12/00)1.259
G06Q10/0834Choice of carriers1.259
G06N5/022Knowledge engineering  knowledge acquisition1.258
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules1.257
G06K9/6267Classification techniques1.257
G01S19/05providing aiding information1.256
G06Q10/063Operations research or analysis1.256
H04L9/0819Key transport or distribution  i.e. key establishment techniques where one party creates or otherwise obtains a secret value  and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062)1.254
G06Q10/06316Sequencing of tasks or work1.254
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)1.254
G06F21/577Assessing vulnerabilities and evaluating computer system security1.253
G06F11/26Functional testing1.253
G06F21/72in cryptographic circuits1.253
H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture| Specification of modified or new header fields | protocols engines in general | (ref: H04L69/12)| | OSI stack based layering aspects | (ref: H04L69/32)| | protocol header analysis in general | (ref: H04L69/22)| | addressing aspects in multiple interfaces involving dual-stack hosts | (ref: H04L61/6086)1.252
H04L41/0645by additionally acting on or stimulating the network after receiving notifications1.252
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding1.251
H04L65/1069Setup | computer conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources or notifying involved parties | (ref: H04L12/1818)| | admission control or resource reservation in packet switching networks | (ref: H04L47/70)| | arrangements for peer-to-peer networking in network applications | (ref: H04L67/104)| | session management in network applications | (ref: H04L67/14)| | negotiation of communication capabilities | (ref: H04L69/24)1.250
H04L69/40Techniques for recovering from a failure of a protocol instance or entity  e.g. failover routines  service redundancy protocols  protocol state redundancy or protocol service redirection in case of a failure or disaster recovery | network fault management | (ref: H04L41/06)| | route fault recovery in network routing | (ref: H04L45/28)| | fault recovery in packet switches | (ref: H04L49/557)| | reactions to failures of replicated servers by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | intermediate processing of oper1.248
G06F8/427Parsing1.248
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements1.248
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones1.247
G05B19/4184characterised by fault tolerance  reliability of production system1.247
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)1.245
H04L69/03Protocol definition or specification | protocol conformance testing | (ref: H04L1/244)| | specification techniques | (ref: G06F8/10)1.245
G06F9/4416Network booting| Remote initial program loading [RIPL]1.245
G06F9/5038considering the execution order of a plurality of tasks  e.g. taking priority or time dependency constraints into consideration | scheduling strategies | (ref: G06F9/4881)|  and subgroups1.244
G06Q30/0209Incentive being awarded or redeemed in connection with the playing of a video game1.242
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)1.240
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level1.240
H04L41/5016based on statistics of service availability  e.g. in percentage or over a given time1.240
H04N7/147Communication arrangements  e.g. identifying the communication as a video-communication  intermediate storage of the signals | selecting | (ref: H04Q)1.239
H04L65/403Arrangements for multiparty communication  e.g. conference | television conferencing systems | (ref: H04N7/15)| | telephonic conference systems | (ref: H04M3/56)| | data switching systems for computer conference | (ref: H04L12/1813)1.239
G06F12/0864using pseudo-associative means  e.g. set-associative or hashing1.239
G06F12/1027using associative or pseudo-associative address translation means  e.g. translation look-aside buffer [TLB]1.239
H04L49/90Queuing arrangements1.239
G06F13/1694Configuration of memory controller to different memory types1.238
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences1.238
G06Q40/12Accounting1.237
H04L67/1082involving incentive schemes1.237
G06Q10/105Human resources1.236
G06F12/0842for multiprocessing or multitasking1.234
H04L47/82Miscellaneous aspects1.234
H04L67/1014based on the content of a request1.233
G06Q20/3226Use of secure elements separate from M-devices1.232
H03M13/09Error detection only  e.g. using cyclic redundancy check [CRC] codes or single parity bit | error detection or correction by redundancy in data representation | (ref: G06F11/08)1.231
H03M13/154Error and erasure correction  e.g. by using the error and erasure locator or Forney polynomial1.231
G06N3/082modifying the architecture  e.g. adding or deleting nodes or connections  pruning1.229
G06Q20/02involving a neutral party  e.g. certification authority  notary or trusted third party [TTP]1.227
G06F21/6272by registering files or documents with a third party1.226
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys1.226
H04W4/029Location-based management or tracking services1.224
G06F21/31User authentication1.224
G06F3/167Audio in a user interface  e.g. using voice commands for navigating  audio feedback1.224
G06F21/552involving long-term monitoring or reporting1.223
H04W4/44for communication between vehicles and infrastructures  e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]1.223
G06F9/30101Special purpose registers1.223
G06F9/30145Instruction analysis  e.g. decoding  instruction word fields1.223
A63F13/75Enforcing rules  e.g. detecting foul play or generating lists of cheating players1.222
A63F13/792for payment purposes  e.g. monthly subscriptions1.222
H04L9/3221interactive zero-knowledge proofs1.222
H04L9/085Secret sharing or secret splitting  e.g. threshold schemes1.222
H04W12/10Integrity1.222
G06Q10/103Workflow collaboration or project management1.221
G06F3/1204resulting in reduced user or operator actions  e.g. presetting  automatic actions  using hardware token storing data1.221
G06F3/1203Improving or facilitating administration  e.g. print management1.221
G06F3/1288in client-server-printer device configuration1.221
G06F15/00Digital computers in general | details | (ref: G06F1/00)|  â€“ | (ref: G06F13/00)| Data processing equipment in general1.220
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)1.220
G06F11/3093Configuration details thereof  e.g. installation  enabling  spatial arrangement of the probes1.219
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]1.219
G06F9/4812by interrupt  e.g. masked1.219
G06F21/554involving event detection and direct action1.219
H04L51/00Arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages1.218
G06F8/20Software design1.217
G06F8/433Dependency analysis| Data or control flow analysis1.217
H04L63/14for detecting or protecting against malicious traffic1.217
H04L67/2885Hierarchically arranged intermediate devices  e.g. hierarchical caching1.216
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]1.216
G06Q20/3567Software being in the reader1.215
G06F8/4443Inlining1.215
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)1.215
G06K9/628Multiple classes1.215
G06T19/20Editing of 3D images  e.g. changing shapes or colours  aligning objects or positioning parts1.215
H04L67/1004Server selection in load balancing1.215
H04L12/189in combination with wireless systems | selective distribution or broadcast in wireless communication networks | (ref: H04W4/06)1.215
H04L41/0853by actively collecting or retrieving configuration information1.214
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode1.213
H04W76/45for Push-to-Talk [PTT] or Push-to-Talk over cellular [PoC] services1.212
H04W4/10Push-to-Talk [PTT] or Push-On-Call services1.212
A63F13/358Adapting the game course according to the network or server load  e.g. for reducing latency due to different connection speeds between clients1.212
G06F9/30047Prefetch instructions| cache control instructions1.212
G06F12/0817using directory methods1.212
G06F12/0828with concurrent directory accessing  i.e. handling multiple concurrent coherency transactions1.212
G06F21/6281at program execution time  where the protection is within the operating system1.212
H04L67/101based on network conditions1.212
H04L65/80QoS aspects | monitoring of the downstream path of a video distribution network | (ref: H04N21/2402)|   | (ref: H04N21/44209)| | network service management  ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer | (ref: H04L41/50)| | monitoring arrangements  testing arrangements  with monitoring of QoS metrics | (ref: H04L43/08)| | traffic-type related flow control in packet switching networks  e.g. priorities or QoS | (ref: H04L47/24)| | admission control/resource reservation in packet switching networks based 1.212
H04L45/34Source routing1.212
G06Q20/4016involving fraud or risk level assessment in transaction processing1.211
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)1.210
G10L15/22Procedures used during a speech recognition process  e.g. man-machine dialogue1.208
B60W50/06Improving the dynamic response of the control system  e.g. improving the speed of regulation or avoiding hunting or overshoot1.208
G06F9/44526Plug-ins| Add-ons1.208
H04L63/126the source of the received data1.208
G06F9/44521Dynamic linking or loading| Link editing at or after load time  e.g. Java class loading1.208
H04N21/632using a connection between clients on a wide area network  e.g. setting up a peer-to-peer communication via Internet for retrieving video segments from the hard-disk of other client devices | broadcast-related systems characterised by transmission among terminal devices | (ref: H04H60/80)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)1.208
H04N21/466Learning process for intelligent management  e.g. learning user preferences for recommending movies | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | computer systems using learning methods | (ref: G06N3/08)| | services using the results of monitoring in broadcast systems | (ref: H04H60/61)1.208
G06T19/006Mixed reality | object pose determination  tracking or camera calibration for mixed reality | (ref: G06T7/00)1.208
G06F8/443Optimisation1.207
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines1.207
G06F9/45533Hypervisors| Virtual machine monitors1.207
G06F3/0622in relation to access1.207
G06Q50/18Legal services| Handling legal documents1.207
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals1.206
G06F21/445by mutual authentication  e.g. between devices or programs1.206
H04M15/51for resellers  retailers or service providers1.206
H04L45/121Minimizing delay1.206
H04L43/0864Round trip delays1.206
H04L47/781Centralized allocation of resource1.205
H04L12/2834Switching of information between an external network and a home network | access arrangements | (ref: H04L12/2856)1.205
H04W88/16Gateway arrangements1.205
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]1.205
G06F11/3409for performance assessment1.205
G06F9/548Object oriented| Remote method invocation [RMI] | non-remote method invocation | (ref: G06F9/449)1.204
G06F9/5011the resources being hardware resources other than CPUs  Servers and Terminals1.203
G06T13/40of characters  e.g. humans  animals or virtual beings1.203
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM] | network arrangements or protocols for real-time communications | (ref: H04L65/00)1.202
G06F12/1072Decentralised address translation  e.g. in distributed shared memory systems1.202
G06F13/404with address mapping1.202
G06F9/48Program initiating| Program switching  e.g. by interrupt1.202
H04L63/123received data contents  e.g. message integrity1.201
G06F12/126with special data handling  e.g. priority of data or instructions  handling errors or pinning1.201
G06F12/0808with cache invalidating means | (ref: G06F12/0815)|  takes precedence1.201
G06F21/121Restricting unauthorised execution of programs1.199
G06F9/5066Algorithms for mapping a plurality of inter-dependent sub-tasks onto a plurality of physical CPUs | mappping at compile time  | see|  | (ref: G06F8/451)1.198
H04M15/64On-line charging system [OCS]1.197
H04N21/4782Web browsing |   e.g. WebTV | information retrieval from the Internet | (ref: G06F17/30861)| | protocols for network applications involving the use of web-based technology | (ref: H04L29/0809)1.197
H04L43/0811Connectivity1.196
H04N21/84Generation or processing of descriptive data  e.g. content descriptors | systems specially adapted for using meta-information in broadcast systems | (ref: H04H60/73)1.196
H04L45/02Topology update or discovery | topology discovery for network management | (ref: H04L41/12)| | LAN interconnection over a backbone network | (ref: H04L12/4604)| | node-based peer discovery mechanisms in peer-to-peer networks | (ref: H04L67/1061)1.195
H04N21/23418involving operations for analysing video streams  e.g. detecting features or characteristics | filtering for image enhancement | (ref: G06T5/00)| | methods or arrangements for recognising scenes | (ref: G06K9/00624)| | arrangements characterised by components specially adapted for monitoring  identification or recognition of video in broadcast systems | (ref: H04H60/59)| | television picture signal circuitry for scene change detection | (ref: H04N5/147)1.195
H04N21/2225Local VOD servers1.195
H04N21/2393involving handling client requests | scheduling and organising the servicing of requests in data switching networks | (ref: H04L29/08945)1.195
G06Q10/107Computer aided management of electronic mail | electronic mail protocols | (ref: H04L29/06)| | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)1.192
H04L9/0618Block ciphers  i.e. encrypting groups of characters of a plain text message using fixed encryption transformation1.190
G06F3/062Securing storage systems1.190
G06F21/55Detecting local intrusion or implementing counter-measures1.190
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability1.189
H04L63/101Access control lists [ACL]1.188
G06F9/4403Processor initialisation1.188
H04W12/08Access security1.185
H04L12/4604LAN interconnection over a backbone network  e.g. Internet  Frame Relay1.184
H04L41/12network topology discovery or management | topology discovery for routing | (ref: H04L45/02)1.184
H04W4/50Service provisioning or reconfiguring1.184
G06F11/1433during software upgrading1.184
G06T1/60Memory management1.184
G06N7/02using fuzzy logic | (ref: G06N3/00)|   | (ref: G06N5/00)|  take precedence| for adaptive control | (ref: G05B13/00)1.184
H04L9/3218using proof of knowledge  e.g. Fiat-Shamir  GQ  Schnorr  ornon-interactive zero-knowledge proofs1.184
G05B19/41845characterised by system universality  reconfigurability  modularity1.183
H04L41/142using statistical or mathematical methods1.182
H04L41/14involving network analysis or design  e.g. simulation  network model or planning | network monitoring | (ref: H04L43/00)1.182
G06F9/4482Procedural1.182
H04W8/183Processing at user equipment or user record carrier1.182
H04N21/23439for generating different versions1.182
G06Q10/06313Resource planning in a project environment1.182
G06Q10/1095Meeting or appointment1.182
H04L67/1023based on other criteria  e.g. hash applied to IP address  specific algorithms or cost1.181
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling1.180
G06F3/1454involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays  e.g. teledisplay1.180
G06Q30/0201Market data gathering  market analysis or market modelling1.180
G06F9/465Distributed object oriented systems | remote method invocation [RMI] | (ref: G06F9/548)1.179
G06F21/60Protecting data1.179
G06F8/4452Software pipelining1.177
G06Q50/265Personal security  identity or safety1.177
G08G1/0112from the vehicle  e.g. floating car data [FCD]1.177
G06F21/88Detecting or preventing theft or loss1.177
G06F12/1425the protection being physical  e.g. cell  word  block1.176
G06Q10/00Administration| Management1.176
B60W30/08Active safety systems|  predicting or avoiding probable or impending collision | or attempting to minimise its consequences1.176
H04L12/1827Network arrangements for conference optimisation or adaptation1.175
H04L47/828Allocation of resources per group of connections  e.g. per group of users1.175
G06Q10/0631Resource planning  allocation or scheduling for a business operation1.175
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)1.175
G06Q30/06Buying  selling or leasing transactions1.174
G07C5/0808Diagnosing performance data | testing of vehicles | (ref: G01M17/00)| | testing of electrical installation on vehicles | (ref: G01R31/005)1.174
G06F12/1045associated with a data cache1.174
G06F21/604Tools and structures for managing or administering access control systems1.173
G06F11/3079the data filtering being achieved by reporting only the changes of the monitored data1.173
G05B19/4185characterised by the network communication1.173
G06T19/00Manipulating 3D models or images for computer graphics1.172
G06N3/0454using a combination of multiple neural nets1.172
H04N21/8549Creating video summaries  e.g. movie trailer | retrieval in video databases by using presentations in form of a video summary | (ref: G06F17/30843)1.171
H04N21/23424involving splicing one content stream with another content stream  e.g. for inserting or substituting an advertisement1.171
G06F12/0238Memory management in non-volatile memory  e.g. resistive RAM or ferroelectric memory1.171
G06F12/0253Garbage collection  i.e. reclamation of unreferenced memory1.171
H04L41/0246exchanging or transporting network management information using Internet  e.g. aspects relating to embedding network management web servers in network elements  web service for network management purposes  aspects related to Internet applications or services or web-based protocols  simple object access protocol [SOAP] | web-based network application protocols | (ref: H04L67/02)| | web-based network application protocols for remote control of end-devices or monitoring of remote application data | (ref: H04L67/025)| | proprietary application protocols for remote control of end-devices in special1.171
H04L41/0866Checking configuration1.171
B25J9/1671characterised by simulation  either to verify existing program or to create and verify new program  CAD/CAM oriented  graphic oriented programming systems1.171
G06F15/161Computing infrastructure  e.g. computer clusters  blade chassis or hardware partitioning | casings  cabinets  racks or drawers for data centers | (ref: H05K5/00)1.170
H04B7/088using beam selection1.169
G06Q20/3224Transactions dependent on location of M-devices1.169
G06F21/12Protecting executable software1.167
H04L47/283Network and process delay  e.g. jitter or round trip time [RTT]1.167
G06F21/645using a third party1.166
H04L67/288Distributed intermediate devices  i.e. intermediate device interaction with other intermediate devices on the same level1.166
H04N21/2541Rights Management | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)1.166
H04N21/25841involving the geographical location of the client | retrieval from the Internet by querying based on geographical locations | (ref: G06F17/3087)| | arrangements for identifying locations of receiving stations in broadcast systems | (ref: H04H60/51)| | protocols in which the network application is adapted for the location of the user terminal in communication control or processing | (ref: H04L29/08657)| | services making use of the location of users or terminals in wireless networks | (ref: H04W4/02)| | locating users or terminals in wireless networks | (ref: H04W64/00)1.166
G06F8/52Binary to binary1.164
H04W4/08User group management1.164
H04W8/26Network addressing or numbering for mobility support1.164
H04W8/186Processing of subscriber group data1.164
H04L43/026using flow generation1.164
G06K7/14172D bar codes1.163
G06Q10/087Inventory or stock management  e.g. order filling  procurement  balancing against orders1.163
H04L65/1083In-session procedures | computer conferences  network arrangements for conference optimisation or adaptation | (ref: H04L12/1827)| | reactions to resource unavailability in packet switching networks | (ref: H04L47/74)| | reallocation or renegotiation of resources in packet switching networks | (ref: H04L47/76)1.163
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints1.162
H04L61/2514between local and global IP addresses1.162
B60R25/252Fingerprint recognition1.162
B60R25/25using biometry1.162
G06Q50/10Services1.161
G06F11/1658Data re-synchronization of a redundant component  or initial sync of replacement  additional or spare unit1.161
A63F13/35Details of game servers1.161
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms1.160
G06Q30/018Business or product certification or verification1.160
G06F21/36by graphic or iconic representation1.160
H04L65/4053without floor control1.160
G06F12/0895of parts of caches  e.g. directory or tag array1.159
G06F12/1441for a range1.159
G06F8/751Code clone detection1.159
H04L9/321involving a third party or a trusted authority1.158
G07C9/00174Electronically operated locks| Circuits therefor| Nonmechanical keys therefor  e.g. passive or active electrical keys or other data carriers without mechanical keys | mechanical locks with electric permutation | (ref: E05B49/00)| | arrangements for sensing or reading record carriers | (ref: G06K7/00)|   | (ref: G06K9/00)| | electronic switching | (ref: H03K17/00)1.158
H04L63/104Grouping of entities1.158
G06F9/50Allocation of resources  e.g. of the central processing unit [CPU]1.156
G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction1.155
G06Q20/3274using a pictured code  e.g. barcode or QR-code  being displayed on the M-device1.155
G06F9/542Event management| Broadcasting| Multicasting| Notifications1.155
H04L43/0876Network utilization1.154
H04L41/0816due to adaptation  e.g. in response to network events1.154
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment1.154
G06Q30/0243Comparative campaigns1.153
G06Q20/3827Use of message hashing1.152
G09B7/02of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student1.152
H04L45/44Distributed routing1.151
G05B19/418Total factory control  i.e. centrally controlling a plurality of machines  e.g. direct or distributed numerical control [DNC]  flexible manufacturing systems [FMS]  integrated manufacturing systems [IMS]  computer integrated manufacturing [CIM]1.151
G05B19/41865characterised by job scheduling  process planning  material flow1.151
G05D1/0088characterized by the autonomous decision making process  e.g. artificial intelligence  predefined behaviours | using knowledge based models | (ref: G06N5/00)1.151
G06F8/34Graphical or visual programming1.151
G06F8/70Software maintenance or management1.151
G06N5/04Inference methods or devices1.150
G06F3/0484for the control of specific functions or operations  e.g. selecting or manipulating an object or an image  setting a parameter value or selecting a range1.150
G06F12/0871Allocation or management of cache space1.149
G06F12/0886Variable-length word access1.149
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)1.149
G11C11/40603Arbitration  priority and concurrent access to memory cells for read/write or refresh operations1.149
G06F3/067Distributed or networked storage systems  e.g. storage area networks [SAN]  network attached storage [NAS]1.149
G06F7/57Arithmetic logic units [ALU]  i.e. arrangements or devices for performing two or more of the operations covered by groups | (ref: G06F7/483)|  - | (ref: G06F7/556)|  or for performing logical operations | instruction execution | (ref: G06F9/30)|  | (ref: G06F7/49)|   | (ref: G06F7/491)|  take precedence| logic gate circuits | (ref: H03K19/00)1.147
G06F9/3001Arithmetic instructions1.147
G06F7/483Computations with numbers represented by a non-linear combination of denominational numbers  e.g. rational numbers  logarithmic number system  floating-point numbers | conversion to or from floating-point codes | (ref: H03M7/24)|  | (ref: G06F7/4806)|   | (ref: G06F7/4824)|   | (ref: G06F7/49)|   | (ref: G06F7/491)|   | (ref: G06F7/544)|  take precedence1.147
H04N21/47202for requesting content on demand  e.g. video on demand1.145
H04N21/25808Management of client data | protocols involving terminal profiles for network applications in communication control or processing | (ref: H04L29/08927)1.143
G06F15/167using a common memory  e.g. mailbox1.141
H04L41/0886Fully automatic configuration1.140
G16H30/40for processing medical images  e.g. editing1.140
G16H10/20for electronic clinical trials or questionnaires1.140
H04W36/18for allowing seamless reselection  e.g. soft reselection1.139
H04W84/12WLAN [Wireless Local Area Networks]1.139
H04W36/06Reselecting a communication resource in the serving access point1.139
G06Q20/12specially adapted for electronic shopping systems1.138
G06Q20/3821Electronic credentials1.138
G06F12/0897with two or more cache hierarchy levels | with multilevel cache hierarchies | (ref: G06F12/0811)1.138
G06F12/0804with main memory updating | (ref: G06F12/0806)|  takes precedence1.138
G06F9/546Message passing systems or structures  e.g. queues1.137
G06Q10/0832Special goods or special handling procedures1.137
G06Q20/145Payments according to the detected use or quantity1.137
G06F3/0613in relation to throughput1.137
G05B23/0291Switching into safety or degraded mode  e.g. protection and supervision after failure1.135
H04L67/104for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer  upload  download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r1.131
H04L49/356Storage area network switches1.131
G06F15/17331Distributed shared memory [DSM]  e.g. remote direct memory access [RDMA]1.131
H04L49/9063Intermediate storage in different physical parts of a node or terminal1.131
G06F11/3414Workload generation  e.g. scripts  playback1.131
G06Q30/0621Item configuration or customization1.131
G06F13/20for access to input/output bus1.131
G06F8/38for implementing user interfaces1.130
G06F11/362Software debugging1.129
G10L17/00Speaker identification or verification1.129
G10L17/04Training  enrolment or model building1.129
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks1.128
G06F13/1689Synchronisation and timing concerns | synchronisation on a memory bus | (ref: G06F13/4234)1.128
H04M3/42042Notifying the called party of information on the calling party | details within substation equipment | (ref: H04M1/57)|   signalling details | (ref: H04Q3/72)1.128
G06F9/522Barrier synchronisation1.128
G06Q20/4018using the card verification value [CVV] associated with the card1.128
G06F21/41where a single sign-on provides access to a plurality of computers1.128
G06F21/562Static detection1.127
G06Q20/065using e-cash1.126
H04W64/00Locating users or terminals | or network equipment|  for network management purposes  e.g. mobility management1.125
H04W36/08Reselecting an access point1.125
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)1.125
G16H10/60for patient-specific data  e.g. for electronic patient records1.124
G16H20/10relating to drugs or medications  e.g. for ensuring correct administration to patients1.124
H04N21/23892involving embedding information at multiplex stream level  e.g. embedding a watermark at packet level1.123
H04N21/4353involving decryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)1.123
G06F21/16Program or content traceability  e.g. by watermarking | digital watermarking on images | (ref: H04N1/32)1.123
G06F9/468Specific access rights for resources  e.g. using capability register1.123
G06F12/1081for peripheral access to main memory  e.g. direct memory access [DMA]1.123
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)1.123
G06Q20/42Confirmation  e.g. check or permission by the legal debtor of payment1.123
G06F3/017Gesture based interaction  e.g. based on a set of recognized hand gestures | interaction based on gestures traced on a digitiser | (ref: G06F3/04883)1.123
G06F3/0346with detection of the device orientation or free movement in a 3D space  e.g. 3D mice  6-DOF [six degrees of freedom] pointers using gyroscopes  accelerometers or tilt-sensors1.123
G06F11/3644by instrumenting at runtime1.123
H04L69/165involving combined use or selection criteria between TCP and UDP protocols | multi-protocol arrangements in general | (ref: H04L69/18)| | multilink protocols in general | (ref: H04L69/14)1.122
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)1.122
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)1.122
H04L45/306Route determination based on the nature of the carried application | communications protocols whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status | (ref: H04L67/327)1.122
G10L15/1822Parsing for meaning understanding1.120
G10L15/1815Semantic context  e.g. disambiguation of the recognition hypotheses based on word meaning1.120
H04L12/44Star or tree networks1.120
H04M7/1295Details of dual tone multiple frequency signalling1.119
H04M3/533Voice mail systems1.119
G06F11/3664Environments for testing or debugging software1.118
G06Q20/3825Use of electronic signatures1.118
G06F21/563by source code analysis1.118
G06F9/52Program synchronisation| Mutual exclusion  e.g. by means of semaphores1.118
G06F21/35communicating wirelessly1.117
G06F8/4434Reducing the memory space required by the program code1.117
G06F12/0822Copy directories | local copy tags for implementing a bus snooping protocol | (ref: G06F12/0831)1.117
H04L43/04Processing of captured monitoring data1.116
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity1.116
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks1.116
A63F13/327using wireless networks  e.g. Wi-Fi or piconet1.116
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)1.115
G06F11/0793Remedial or corrective actions | by retry | (ref: G06F11/1402)| | recovery from an exception in an instruction pipeline | (ref: G06F9/3861)| | in a network context | (ref: H04L29/14)1.115
G06F11/0769Readable error formats  e.g. cross-platform generic formats  human understandable formats1.115
H04L63/02for separating internal from external traffic  e.g. firewalls1.115
G08G3/00Traffic control systems for marine craft | marking of navigational route | (ref: B63B22/16)|   | (ref: B63B51/00)1.114
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)1.114
G06Q20/16Payments settled via telecommunication systems1.113
G05B19/4183characterised by data acquisition  e.g. workpiece identification1.113
G05B23/0272Presentation of monitored results  e.g. selection of status reports to be displayed| Filtering information to the user1.113
G06Q30/02Marketing  e.g. market research and analysis  surveying  promotions  advertising  buyer profiling  customer management or rewards| Price estimation or determination1.113
G06F9/3887controlled by a single instruction  e.g. SIMD1.112
G06F9/3851from multiple instruction streams  e.g. multistreaming | initiation or dispatching of multiple tasks or threads | (ref: G06F9/48)1.112
G06F9/45516Runtime code conversion or optimisation1.112
G06F3/162Interface to dedicated audio devices  e.g. audio drivers  interface to CODECs1.111
G06F3/0611in relation to response time1.111
G06F17/40Data acquisition and logging | for input to computer | (ref: G06F3/00)|   | | displays as computer output | (ref: G06F3/14)| | for image data processing | (ref: G06T9/00)| | compression in general | (ref: H03M7/30)| | for transmission | (ref: H04B1/66)| | for pictorial communication | (ref: H04N)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station | (ref: H04Q9/00)1.111
G06Q20/14specially adapted for billing systems1.111
G06F9/30134Register stacks| shift registers1.111
H04L9/3252using DSA or related signature schemes  e.g. elliptic based signatures  ElGamal or Schnorr schemes1.110
G06F12/1491in a hierarchical protection system  e.g. privilege levels  memory rings1.109
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)1.109
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals1.109
B66B1/3461between the elevator control system and remote or mobile stations1.109
G06F9/5044considering hardware capabilities1.109
G06F9/30003Arrangements for executing specific machine instructions1.109
H04N21/8352involving content or source identification data  e.g. Unique Material Identifier [UMID]1.109
H04W8/205Transfer to or from user equipment or user record carrier1.108
H04W8/20Transfer of user or subscriber data1.108
H04W8/24Transfer of terminal data1.108
H04N21/4755for defining user preferences  e.g. favourite actors or genre | retrieval personalisation and generation of user profiles for the retrieval of video data | (ref: G06F17/30843)| | data switching network applications using user profiles | (ref: H04L29/08936)1.107
G06F11/079Root cause analysis  i.e. error or fault diagnosis | in a hardware test environment | (ref: G06F11/22)| | in a software test environment | (ref: G06F11/36)1.106
G06F11/0709in a distributed system consisting of a plurality of standalone computer nodes  e.g. clusters  client-server systems1.106
G06F3/011Arrangements for interaction with the human body  e.g. for user immersion in virtual reality | for handicapped people in general | (ref: A61F4/00)| | robot control | (ref: B25J)| | tactile signalling | (ref: G08B)| | blind teaching | (ref: G09B21/00)| | for electrophonic musical instruments | (ref: G10H1/344)| | electronic switches characterised by the way in which the control signals are generated | (ref: H03K17/94)1.106
G06T17/20Finite element generation  e.g. wire-frame surface description  | tesselation1.106
H04L41/5041Service implementation1.105
H04L41/0813Changing of configuration1.105
H04N21/816involving special video data  e.g 3D video1.105
G06F11/3612by runtime analysis | performance monitoring | (ref: G06F11/3466)1.105
G06F12/109for multiple virtual address spaces  e.g. segmentation | (ref: G06F12/1036)|  takes precedence1.105
H04N21/26258for generating a list of items to be played back in a given order  e.g. playlist  or scheduling item distribution according to such list | retrieval of multimedia data based on playlists | (ref: G06F17/30017)1.104
H04N21/812involving advertisement data | advertising | per se|  | (ref: G06Q30/02)1.104
G06T7/50Depth or shape recovery1.104
G06T7/536from perspective effects  e.g. by using vanishing points1.104
G06N3/08Learning methods1.104
G06F1/3206Monitoring a parameter  a device or an event triggering a change in power modality1.103
G06F1/3237Power saving by disabling clock generation or distribution1.103
H04W28/0268using specific QoS parameters for wireless networks  e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR] | negotiating SLA or negotiating QoS | (ref: H04W28/24)1.103
G05B19/056Programming the PLC1.102
G06F13/4282on a serial bus  e.g. I2C bus  SPI bus | on daisy chain buses | (ref: G06F13/4247)1.102
G06F13/4027using bus bridges | (ref: G06F13/4022)|  takes precedence1.102
G06F13/4295using an embedded synchronisation1.102
G06F13/40Bus structure | for computer networks | (ref: G06F15/163)| | for optical bus networks | (ref: H04B10/25)1.102
G06F13/4265on a point to point bus | (ref: G06F13/4247)|   | (ref: G06F13/4282)|  take precedence1.102
H04L47/125Load balancing  e.g. traffic engineering | load balancing among servers | (ref: H04L67/1002)1.102
G06F13/4022using switching circuits  e.g. switching matrix  connection or expansion network | (ref: G06F13/4009)|  takes precedence1.101
H04W28/0289Congestion control | performing reselection for handling the traffic | (ref: H04W36/22)| | load shedding arrangements in network planning | (ref: H04W16/08)| | dynamic wireless traffic scheduling | (ref: H04W72/12)1.101
H04L47/33Forward notification1.101
H04N19/513Processing of motion vectors1.101
H02J3/32using batteries with converting means1.101
G05B19/41885characterised by modeling  simulation of the manufacturing system1.100
A63F13/34using peer-to-peer connections1.100
G06F9/544Buffers| Shared memory| Pipes1.099
H04W24/08Testing  | supervising or monitoring|  using real traffic1.099
H04W48/17Selecting a data network PoA [Point of Attachment]1.099
H04W36/0016for hand-off preparation1.099
H04W48/16Discovering  processing access restriction or access information1.099
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds1.099
G16H40/67for remote operation1.098
H04N21/4725using interactive regions of the image  e.g. hot spots | details of information retrieval from the Internet by using URLs | (ref: G06F17/30876)| | processing chained hypermedia data for information retrieval | (ref: G06F17/30014)1.098
H04N21/4621Controlling the complexity of the content stream or additional data  e.g. lowering the resolution or bit-rate of the video stream for a mobile client with a small screen | arrangements for using the results of monitoring on user's side in broadcast systems | (ref: H04H60/65)| | flow control in packet networks | (ref: H04L47/10)1.097
H04L47/783Distributed allocation of resources  e.g. bandwidth brokers1.097
G06F21/575Secure boot1.097
H04W28/0273adapting protocols for flow control or congestion control to wireless environment  e.g. adapting transmission control protocol [TCP] | wireless network protocols or protocol adaptations to wireless operation  e.g. wireless application protocol | (ref: H04W80/00)1.096
H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom1.095
H04M3/42059Making use of the calling party identifier1.095
H04W28/10Flow control | between communication endpoints1.095
G06F9/4451User profiles  roaming | user profiles for network-specific applications | (ref: H04L67/306)1.095
G06F9/45504Abstract machines for programme code execution  e.g. Java virtual machine [JVM]  interpreters  emulators1.095
H04L43/045for graphical visualization of monitoring data | graphical user interfaces | (ref: H04L41/22)| | display of network or application conditions affecting the network application to the application user | (ref: H04L67/36)| | visual indication of the functioning of a computing machine | (ref: G06F11/32)1.095
H04W84/045using private Base Stations  e.g. femto Base Stations  home Node B1.094
H04W4/40for vehicles  e.g. vehicle-to-pedestrians [V2P]1.094
H04L67/2866Architectural aspects1.094
H04L65/103in the network1.094
E21B41/00Equipment or details not covered by groups | (ref: E21B15/00)|  - | (ref: E21B40/00)1.094
H04W28/16Central resource management| Negotiation of resources | or communication parameters|   e.g. negotiating bandwidth or QoS [Quality of Service]1.093
H04L43/12using dedicated network monitoring probes1.093
H04L9/3255using group based signatures  e.g. ring or threshold signatures1.093
H04L9/0869involving random numbers or seeds1.093
G06Q50/184Intellectual property management1.092
H04M3/527Centralised call answering arrangements not requiring operator intervention1.092
G06Q30/0623Item investigation1.092
H04L41/0823Configuration optimization1.092
H04W12/04Key management1.091
G06Q20/24Credit schemes  i.e. "pay after"1.091
G06Q20/0855involving a third party1.091
G06F3/1287via internet1.090
G06F3/04847Interaction techniques to control parameter settings  e.g. interaction with sliders  dials1.090
G06F3/0635by changing the path  e.g. traffic rerouting  path reconfiguration1.090
H02J50/80involving the exchange of data  concerning supply or distribution of electric power  between transmitting devices and receiving devices1.089
G06F13/1668Details of memory controller1.089
G06F8/54Link editing before load time1.088
H04W36/0055Transmission and use of information for re-establishing the radio link1.088
H04L67/1012based on compliance of requirements or conditions with available server resources1.087
H04W80/12Application layer protocols  e.g. WAP1.087
G01C21/20Instruments for performing navigational calculations | (ref: G01C21/24)|   | (ref: G01C21/26)|  take precedence| adaptations of digital computers to a specific function or application | (ref: G06F17/00)|   | (ref: G06F19/00)1.087
G06F21/125by manipulating the program code  e.g. source code  compiled code  interpreted code  machine code1.086
H04L9/0872using geo-location information  e.g. location data  time  relative position or proximity to other entities1.086
G06Q40/04Exchange  e.g. stocks  commodities  derivatives or currency exchange1.086
H04N21/2402Monitoring of the downstream path of the transmission network  e.g. bandwidth available | traffic monitoring in data switching networks | (ref: H04L43/00)| | monitoring data switching networks utilization | (ref: H04L43/0876)1.085
H04N21/2353specifically adapted to content descriptors  e.g. coding  compressing or processing of metadata1.085
G06Q10/20Product repair or maintenance administration1.085
G06F21/77in smart cards1.085
G05B19/41835characterised by programme execution1.084
G06F21/42using separate channels for security data1.084
G06F21/565by checking file integrity1.083
H04L45/64using an overlay routing layer | Peer-to-Peer networks | (ref: H04L67/104)1.083
G06F3/0619in relation to data integrity  e.g. data losses  bit errors1.083
H04L51/02with automatic reactions or user delegation  e.g. automatic replies or chatbot1.082
H04N21/2335involving reformatting operations of audio signals  e.g. by converting from one coding standard to another | details of audio signal transcoding | (ref: G10L19/173)1.082
H04W72/1205Schedule definition  set-up or creation1.081
G06Q20/322Aspects of commerce using mobile devices [M-devices]1.081
G06Q20/3223Realising banking transactions through M-devices1.081
H04L45/126minimizing geographical or physical path length1.081
H04W4/06Selective distribution of broadcast services  e.g. multimedia broadcast multicast service [MBMS]| Services to user groups| One-way selective calling services1.080
H04W36/00Hand-off or reselection arrangements1.080
H04M1/6075adapted for handsfree use in a vehicle | (ref: H04M1/6058)|  takes precedence| arrangements for holding telephones in a vehicle | (ref: B60R11/0241)1.079
G06F13/10Program control for peripheral devices | (ref: G06F13/14)|  - | (ref: G06F13/42)|  take precedence1.079
G06F9/45537Provision of facilities of other operating environments  e.g. WINE | I/O emulation | (ref: G06F13/105)1.077
H04W40/00Communication routing or communication path finding1.077
G06Q40/08Insurance  e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10)1.076
G08G1/202Dispatching vehicles on the basis of a location  e.g. taxi dispatching1.076
H04L67/2895where the intermediate processing is functionally located closer to the data provider application  e.g. reverse proxies| in same machine  in same cluster or subnetwork1.076
G06F3/0659Command handling arrangements  e.g. command buffers  queues  command scheduling1.075
G06F3/0685Hybrid storage combining heterogeneous device types  e.g. hierarchical storage  hybrid arrays1.075
G06F3/04855Interaction with scrollbars1.074
G11B27/34Indicating arrangements | indicating measured values in general | (ref: G01D)|  | indicating means incorporated in magazine or cassette | (ref: G11B23/046)|  and | (ref: G11B23/0875)1.074
G06F9/44589Program code verification  e.g. Java bytecode verification  proof-carrying code | high-level semantic checks | (ref: G06F8/43)| | testing and debugging software | (ref: G06F11/36)0.880
G06F9/4401Bootstrapping | security arrangements therefor | (ref: G06F21/57)0.871
G06F9/543User-generated data transfer  e.g. clipboards  dynamic data exchange [DDE]  object linking and embedding [OLE]0.781
G10L15/26Speech to text systems | (ref: G10L15/08)|  takes precedence0.720
G06Q20/3572Multiple accounts on card0.676
G06Q20/102Bill distribution or payments0.676
G06Q20/3672Intelligent token initializing or reloading0.676
G06Q20/32using wireless devices0.639
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.639
G06Q20/227characterized in that multiple accounts are available to the payer0.639
H04L9/0625with splitting of the data block into left and right halves  e.g. Feistel based algorithms  DES  FEAL  IDEA or KASUMI0.639
G06Q20/3563Software being resident on card0.639
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists0.639
G06Q20/409Card specific authentication in transaction processing0.639
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.639
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)0.639
G06Q20/3278RFID or NFC payments by means of M-devices0.639
G06Q20/3552Downloading or loading of personalisation data0.639
H04B5/0056for use in interrogation  identification or read/write systems | record carriers | (ref: G06K7/00)|   | (ref: G06K19/00)| | for railways | (ref: B61L3/12)0.639
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.639
G07F7/122Online card verification0.639
G06Q20/4097Mutual authentication between card and transaction partners0.639
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC0.639
H04B5/0075using inductive coupling | transformers or inductances adapted for inductive coupling | (ref: H01F38/14)0.639
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.639
G06Q20/382insuring higher security of transaction0.639
G06Q20/204comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit0.639
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.639
H04L9/0822using key encryption key0.639
G06Q20/3823combining multiple encryption tools for a transaction0.639
G06Q20/36using electronic wallets or electronic money safes0.639
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.639
G06Q20/108Remote banking  e.g. home banking0.639
G06Q20/40975Use of encryption for mutual authentication0.639
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system0.621
G06Q20/4012Verifying personal identification number [PIN]0.621
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards0.621
G06Q20/3415Cards acting autonomously as pay-media0.621
G06Q20/356Aspects of software for card payments0.621
G06K9/6263based on the feedback of a supervisor | relevance feedback in information retrieval | (ref: G06F17/30)0.616
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation0.616
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)0.613
H04L65/1063Application servers | systems providing special services to telephonic subscribers | (ref: H04M3/42)0.610
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)0.604
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.601
G06F9/45529Embedded in an application  e.g. JavaScript in a Web browser0.600
G06F8/43Checking| Contextual analysis0.600
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities0.600
H04L67/145provided for avoiding end of session  e.g. keep-alive  heartbeats  resumption message  wake-up for inactive or interrupted session0.590
H04L67/142provided for managing session state for stateless protocols| Signalling a session state| State transitions| Keeping-state mechanisms0.584
G06Q20/40145Biometric identity checks0.576
H04L43/10using active monitoring  e.g. heartbeat protocols  polling  ping  trace-route0.570
H04L69/326in the transport layer  i.e. layer four | TCP/IP | (ref: H04L69/16)| | streaming protocols  e.g. RTP  | (ref: H04L65/608)0.568
H04L12/2854Wide area networks  e.g. public data networks0.568
H04L69/14Multichannel or multilink protocols0.568
H04N21/435Processing of additional data  e.g. decrypting of additional data  reconstructing software from modules extracted from the transport stream0.565
H04N21/437Interfacing the upstream path of the transmission network  e.g. for transmitting client requests to a VOD server | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing of client requests | (ref: H04L29/08945)| | flow control in data networks | (ref: H04L47/10)0.565
H04N21/8543using a description language  e.g. Multimedia and Hypermedia information coding Expert Group [MHEG]  eXtensible Markup Language [XML] | information retrieval of semistructured data  the underlying structure being taken into account  e.g. mark-up language structure data | (ref: G06F17/30908)0.565
H04N21/438Interfacing the downstream path of the transmission network originating from a server  e.g. retrieving MPEG packets from an IP network | transmission of MPEG streams over ATM | (ref: H04L12/5601)| | processing of real-time packets | (ref: H04L29/06176)| | flow control in data networks | (ref: H04L47/10)0.565
G06F9/4406Loading of operating system0.565
G06F12/0891using clearing  invalidating or resetting means0.565
G06Q40/00Finance| Insurance| Tax strategies| Processing of corporate or income taxes0.563
G06Q50/06Electricity  gas or water supply0.563
H04N21/462Content or additional data management  e.g. creating a master electronic program guide from data received from the Internet and a Head-end  controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities0.561
G06F21/84output devices  e.g. displays or monitors0.560
G06T11/20Drawing from basic elements  e.g. lines or circles0.560
G06F3/0485Scrolling or panning0.560
G06F12/1009using page tables  e.g. page table structures0.556
G06F12/1054the data cache being concurrently physically addressed0.556
G06F12/0292using tables or multilevel address translation means | (ref: G06F12/023)|  takes precedence| address translation in virtual memory systems | (ref: G06F12/10)0.556
H04L63/0838using one-time-passwords0.554
H04W88/04adapted for relaying to or from another terminal or user0.552
H04L41/0668selecting new candidate element0.552
H04W76/15Setup of multiple wireless link connections0.552
H04L41/5019Ensuring SLA | flow or congestion control at network level | (ref: H04L47/10)0.552
H04W24/04Arrangements for maintaining operational condition0.552
H04W36/305Reselection due to radio link failure | control signalling for hand-off failure | (ref: H04W36/0079)0.552
H04L41/0681involving configuration of triggering conditions0.552
H04W40/12based on transmission quality or channel quality0.552
H04L45/28Route fault recovery | network fault recovery | (ref: H04L41/0654)0.552
G06K9/00496Recognising patterns in signals and combinations thereof | signature verification | (ref: G06K9/00154)| | analysing specific medical signals  e.g. bioelectric signals  blood pressure | (ref: A61B5/00)| | processing radar and similar signals | (ref: G01S)| | analysis of chromatographic signals | (ref: G01N30/86)| | processing seismic signals | (ref: G01V1/28)|   | (ref: G01V1/46)| | acoustic speech processing | (ref: G10L)| | transmission systems | (ref: H04B1/00)0.551
G06T11/60Editing figures and text| Combining figures or text0.551
G06F11/301where the computing system is a virtual computing platform  e.g. logically partitioned systems | virtual machines | (ref: G06F9/45533)| | logical partitioning of resources | (ref: G06F9/5077)0.550
G06F11/3419by assessing time0.550
G06F11/302where the computing system component is a software system0.550
G06F11/3495for systems0.550
G06F3/0486Drag-and-drop0.548
G06F11/3688for test execution  e.g. scheduling of test suites0.547
G06F11/3457Performance evaluation by simulation0.547
H04N21/436Interfacing a local distribution network  e.g. communicating with another STB  inside the home | | Interfacing an external card to be used in combination with the client device| arrangements specially adapted plural spots in a confined site in broadcast systems | (ref: H04H20/63)0.546
H04N21/4408involving video stream encryption  e.g. re-encrypting a decrypted video stream for redistribution in a home network | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.546
H03M7/3091Data deduplication0.542
H03M7/3084using adaptive string matching  e.g. the Lempel-Ziv method0.542
H04L69/04Protocols for data compression | compression in general | (ref: H03M7/30)| | reduction of the amount or size of exchanged application data at an intermediate network processing stage | (ref: H04L67/2828)| | optimizing  e.g. header compression  information sizing in wireless communication networks | (ref: H04W28/06)0.542
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.542
G06F9/44578Preparing or optimising for loading0.542
G06F8/447Target code generation0.542
G06F8/47Retargetable compilers0.542
G06F8/53Decompilation| Disassembly0.542
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)0.538
H04L45/745Address table lookup or address filtering0.538
H04L9/3297involving time stamps  e.g. generation of time stamps0.538
H04W12/00Security arrangements  e.g. access security or fraud detection| Authentication  e.g. verifying user identity or authorisation| Protecting privacy or anonymity0.537
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it0.536
H04L12/4625Single bridge functionality  e.g. connection of two networks over a single bridge0.536
G06F11/1448Management of the data involved in backup or backup restore0.536
G06Q20/381Currency conversion0.535
G06F9/5083Techniques for rebalancing the load in a distributed system0.534
G06F9/5022Mechanisms to release resources0.534
G06F15/173using an interconnection network  e.g. matrix  shuffle  pyramid  star  snowflake0.531
G06F9/30036Instructions to perform operations on packed data  e.g. vector operations0.531
G06F9/3877using a slave processor  e.g. coprocessor | peripheral processor | (ref: G06F13/12)| | vector processor | (ref: G06F15/8053)0.531
G06K7/1095the scanner comprising adaptations for scanning a record carrier that is displayed on a display-screen or the like0.531
G06Q20/367involving intelligent token  e.g. electronic purse0.531
G06K19/06112the marking being simulated using a light source  e.g. a barcode shown on a display or a laser beam with time-varying intensity profile0.531
G06F3/0631by allocating resources to storage systems0.528
G06F3/068Hybrid storage device0.528
G06F3/0616in relation to life time  e.g. increasing Mean Time Between Failures [MTBF]0.528
G06F3/0608Saving storage space on storage systems0.528
H04W76/19Connection re-establishment0.525
H04W60/04using triggered events0.525
H04W60/06De-registration or detaching0.525
H04L9/3073involving pairings  e.g. identity based encryption [IBE]  bilinear mappings or bilinear pairings  e.g. Weil or Tate pairing0.524
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.524
H04N21/239Interfacing the upstream path of the transmission network  e.g. prioritizing client | content|  requests | hybrid Fiber Coaxial [HFC] networks for upstream channel allocation for video distribution | (ref: H04L12/2801)| | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing of client requests | (ref: H04L29/08945)| | flow control in data networks | (ref: H04L47/10)0.523
H04N21/6408Unicasting0.523
H04L67/2842for storing data temporarily at an intermediate stage  e.g. caching | distributed storage of data in a network | (ref: H04L67/1097)| | browsing optimization of access to content by caching | (ref: G06F17/30902)| | addressing of a cache within a hierarchically structured memory system | (ref: G06F12/0802)| | disk caching | (ref: G06F12/0866)0.523
H04N21/6437Real-time Transport Protocol [RTP]0.523
H04L65/40Services or applications | network service management for ensuring proper service fulfilment | (ref: H04L41/50)| | information services comprising voice | (ref: H04M3/487)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | contact center services | (ref: H04M3/51)0.523
H04L43/08Monitoring based on specific metrics0.522
H04L43/028using filtering | alarm or event filtering | (ref: H04L41/0604)0.522
G06F8/77Software metrics0.522
G06F11/323Visualisation of programs or trace data0.522
H04L41/0859by keeping history of different configuration generations or versions0.522
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme0.521
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.521
H04L9/3066involving algebraic varieties  e.g. elliptic or hyper-elliptic curves0.521
H04L41/0253involving a browser or web-pages for accessing management information | graphical user interface for network management | (ref: H04L41/22)0.520
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)0.520
H04W76/10Connection setup0.520
H04L67/303Terminal profiles0.520
G06Q20/353Payments by additional cards plugged into M-devices0.520
G06F11/2046where the redundant components share persistent storage | (ref: G06F11/2043)|  takes precedence0.519
G06F11/203using migration0.519
G06F11/1484involving virtual machines0.519
G06F11/2035without idle spare hardware0.519
H04L47/24depending on the type of traffic  e.g. priority or quality of service [QoS] | network arrangements for networked applications for scheduling or organising the servicing of application requests whereby quality of service or priority requirements are taken into account | (ref: H04L67/322)0.519
G06F11/3648using additional hardware0.516
G06F11/3466Performance evaluation by tracing or monitoring0.516
H04N21/6125involving transmission via Internet | transmission by internet of broadcast information | (ref: H04H60/82)0.516
H04N21/26216involving the channel capacity  e.g. network bandwidth | admission control  resource allocation in open networks | (ref: H04L12/5692)| | protocols for scheduling and organising the servicing of requests  whereby quality of service and priority requirements are taken into account in network applications in communication control or processing | (ref: H04L29/08954)| | flow control in packet networks | (ref: H04L47/10)0.516
H04L67/1076Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network0.514
H04N21/658Transmission by the client directed to the server0.512
H04N21/238Interfacing the downstream path of the transmission network  e.g. adapting the transmission rate of a video stream to network bandwidth| Processing of multiplex streams | hybrid Fiber Coaxial HFC networks for downstream channel allocation for video distribution | (ref: H04L12/2801)| | formation of RTP packets | (ref: H04L29/06176)| | application layer Quality of Service and content dependent routing | (ref: H04L29/08945)| | flow control in packet networks | (ref: H04L47/10)0.512
H04N21/47208for requesting near-video-on-demand content0.512
H04N21/8547involving timestamps for synchronizing content0.512
G06Q10/0633Workflow analysis0.509
H04L41/0273involving the use of web services for network management  e.g. SOAP0.509
H04L43/16using threshold monitoring0.508
G06F11/3442for planning or managing the needed capacity0.507
G06F9/5088involving task migration0.507
G06F8/75Structural analysis for program understanding0.507
H04L69/163Adaptation of TCP data exchange control procedures | generic OSI layer 4 protocols  e.g. SCTP | (ref: H04L69/326)| | TCP or UDP flow control procedures | (ref: H04L47/19)| | error control procedures in general | (ref: H04L1/18)0.507
H04L69/08Protocols for interworking or protocol conversion | arrangements for connecting between networks having differing types of switching systems  e.g. gateways  | (ref: H04L12/66)| | network management protocols conversion | (ref: H04L41/0226)0.507
H04L61/2503Internet protocol [IP] address translation0.507
G06F9/30098Register arrangements0.507
G06F9/30058Conditional branch instructions0.507
G06F9/3806using address prediction  e.g. return stack  branch history buffer0.507
G06F9/4486Formation of subprogram jump address0.507
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.506
G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer  e.g. network details  transfer of information from host to ECR or from ECR to ECR0.506
H04L9/0841involving Diffie-Hellman or related key agreement protocols0.506
G06Q20/0655e-cash managed centrally0.506
G06Q20/027involving a payment switch or gateway0.506
H04L47/822Collecting or measuring resource availability data0.506
H04L45/56Routing software0.505
G06F12/0893Caches characterised by their organisation or structure0.503
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.503
H04L67/30involving profiles0.501
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)0.501
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords0.500
G06F9/4411Configuring for operating with peripheral devices| Loading of device drivers0.499
H04L41/0809Plug-and-play configuration0.499
H04L41/22using GUI [Graphical User Interface]0.499
G06F11/1469Backup restoration techniques0.498
G01S19/45by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement0.498
G06F21/6236between heterogeneous systems0.498
G06F3/1423controlling a plurality of local displays  e.g. CRT and flat panel display0.498
H04L65/4015where at least one of the additional parallel sessions is real time or time sensitive  e.g. white board sharing  collaboration or spawning of a subconference | telewriting  virtual reality or network gaming | (ref: H04L67/38)0.498
H04L12/1822Conducting the conference  e.g. admission  detection  selection or grouping of participants  correlating users to one or more conference sessions  prioritising transmission0.498
G06Q20/123Shopping for digital content0.497
G06Q20/29characterised by micropayments0.496
G06Q40/02Banking  e.g. interest calculation  credit approval  mortgages  home banking or on-line banking0.496
H04L45/38Flow based routing0.496
G06F12/1433for a module or a part of a module0.495
G06F21/79in semiconductor storage media  e.g. directly-addressable memories0.495
G06F3/0383Signal control means within the pointing device0.493
G06F3/048Interaction techniques based on graphical user interfaces [GUI]0.493
A63F13/352involving special game server arrangements  e.g. regional servers connected to a national server or a plurality of servers managing partitions of the game world0.493
A63F13/77involving data related to game devices or game servers  e.g. configuration data  software version or amount of memory0.493
H04L41/5083wherein the managed service relates to web hosting | web-based network application protocols | (ref: H04L67/02)| | web site content organization and management | (ref: G06F17/3089)| | video-hosting | (ref: H04N21/2743)0.493
H04L67/1031Controlling of the operation of servers by a load balancer  e.g. adding or removing servers that serve requests0.493
H04N21/23109by placing content in organized collections  e.g. EPG data repository | details of retrieval of video data and associated meta data in video databases | (ref: G06F17/30843)0.491
H04N21/4384involving operations to reduce the access time  e.g. fast-tuning for reducing channel switching latency0.491
G06Q20/387Payment using discounts or coupons | relating to marketing | (ref: G06Q30/02)0.490
G06Q30/0236Incentive or reward received by requiring registration or ID from user0.490
H04N21/637Control signals issued by the client directed to the server or network components0.490
H04N21/2351involving encryption of additional data | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.489
H04N21/26613for generating or managing keys in general | key distribution for secret or secure communication involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP] | (ref: H04L9/083)| | key management for security in wireless networks | (ref: H04L29/06707)| | key management for network security in communication control or processing | (ref: H04W12/04)0.489
H04N21/63775for uploading keys  e.g. for a client to communicate its public key to the server | arrangements for network security key management | (ref: H04L29/06707)0.489
G06Q30/0241Advertisement0.489
H04N21/2547Third Party Billing  e.g. billing of advertiser0.489
G06F11/3652in-circuit-emulation [ICE] arrangements0.488
H03K19/17756for partial configuration or reconfiguration0.488
G06F15/7867with reconfigurable architecture0.488
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)0.488
G06F12/0888using selective caching  e.g. bypass0.487
G06F12/0831using a bus scheme  e.g. with bus monitoring or watching means0.487
H04N21/44209Monitoring of downstream path of the transmission network originating from a server  e.g. bandwidth variations of a wireless network | arrangements for maintenance or administration in data switching networks involving bandwidth and capacity management | (ref: H04L41/0896)0.486
H04N21/44004involving video buffer management  e.g. video decoder buffer or video display buffer0.486
G06N5/025Extracting rules from data | learning in general | (ref: G06F15/18)0.483
A63F13/61using advertising information0.482
A63F13/87Communicating with other players during game play  e.g. by e-mail or chat0.482
A63F13/48Starting a game  e.g. activating a game device or waiting for other players to join a multiplayer session0.482
A63F13/92Video game devices specially adapted to be hand-held while playing0.482
G06Q30/0601Electronic shopping0.482
G06F21/561Virus type analysis0.482
G06F8/51Source to source0.482
H04L69/162involving adaptations of sockets based mechanisms | secure socket layer | (ref: H04L63/168)0.481
H04L45/72Routing based on the source address0.481
H04L45/42Centralized routing0.481
A63F13/533for prompting the player  e.g. by displaying a game menu0.480
G06T7/74involving reference images or patches0.480
A63F13/655by importing photos  e.g. of the player0.480
A63F13/25Output arrangements for video game devices0.480
G07F17/3244Payment aspects of a gaming system  e.g. payment schemes  setting payout ratio  bonus or consolation prizes0.480
G07F17/3241Security aspects of a gaming system  e.g. detecting cheating  device integrity  surveillance | computer security | (ref: G06F21/00)0.480
G07F17/3225Data transfer within a gaming system  e.g. data sent between gaming machines and users0.480
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)0.480
H04L45/74Address processing for routing0.480
H04L47/263Source rate modification after feedback0.480
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer0.480
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication0.479
H04L9/0827involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.479
G06Q20/3678e-cash details  e.g. blinded  divisible or detecting double spending0.477
H04L41/0869by validating configuration within one network element0.477
H04L41/0883Semiautomatic configuration  e.g. proposals from system0.477
H04N21/4821using a grid  e.g. sorted out by channel and broadcast time0.476
H04N21/4825using a list of items to be played back in a given order  e.g. playlists0.476
G06Q30/0235Including timing  i.e. limited awarding or usage time constraint0.476
G06Q30/0631Item recommendations0.476
G06Q10/02Reservations  e.g. for tickets  services or events0.476
G06Q20/0457characterized in that the ticket is sent electronically0.476
G08G5/0013with a ground station0.476
G08G5/0021located in the aircraft0.476
G08G5/0052for cruising | combined instruments indicating more than one navigational value | (ref: G01C23/00)0.476
H04N21/643using dedicated|  Communication protocols | streaming protocols for real-time multimedia communications | (ref: H04L29/06517)0.476
H04N21/8586by using a URL | processing chained hypermedia data for information retrieval | (ref: G06F17/30014)| | information retrieval from the Internet by using URLs | (ref: G06F17/30876)| | URL in broadcast information | (ref: H04H20/93)| | protocols for network applications involving the use of web-based technology | (ref: H04L29/0809)0.476
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.475
G06F9/461Saving or restoring of program or task context0.475
G06F15/7807System on chip  i.e. computer system on a single chip| System in package  i.e. computer system on one or more chips in a single package0.475
G06T15/005General purpose rendering architectures0.475
G06N3/084Back-propagation0.475
G06Q30/0269based on user profile or attribute0.474
G06Q30/0267Wireless devices0.474
G06Q30/0255based on user history0.474
G10L15/04Segmentation| Word boundary detection0.474
H04L12/282based on user interaction within the home | receiver circuitry for displaying additional information being controlled by a remote control apparatus | (ref: H04N5/44582)0.474
H04R9/08Microphones0.474
G06F3/041Digitisers  e.g. for touch screens or touch pads  characterised by the transducing means0.474
H04L47/27Window size evaluation or update  e.g. using information derived from ACK packets0.473
H04L43/0882Utilization of link capacity0.473
H04L47/365Dynamic adaptation of the packet size0.473
G06F9/4837time dependent0.473
H04N21/26606for generating or managing entitlement messages  e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14)0.472
H04N21/63345by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | arrangements for network security key management | (ref: H04L29/06707)0.472
H04N21/23605Creation or processing of packetized elementary streams [PES]0.472
H04N21/2343involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements | media manipulation  adaptation or conversion at the source in one way streaming for real-time multimedia communications | (ref: H04L29/06489)| | video transcoding | (ref: H04N19/40)0.472
G01C21/3461Preferred or disfavoured areas  e.g. dangerous zones  toll or emission zones  intersections  manoeuvre types  segments such as motorways  toll roads  ferries0.472
B64F1/00Ground or aircraft-carrier-deck installations | specially adapted for captive aircraft | (ref: B64F3/00)0.472
B64C39/024of the remote controlled vehicle type  i.e. RPV0.472
G06Q50/28Logistics  e.g. warehousing  loading  distribution or shipping0.472
H04W4/024Guidance services0.472
G06Q30/08Auctions |   matching or brokerage | matching or brokerage for stock exchange | (ref: G06Q40/04)0.472
G06N7/005Probabilistic networks0.472
H04N1/00501Tailoring a user interface [UI] to specific requirements0.471
G06Q30/0251Targeted advertisement0.471
G06K9/6227Selection of pattern recognition techniques  e.g. of classifiers in a multi-classifier system0.471
G01C21/365Guidance using head up displays or projectors  e.g. virtual vehicles or arrows projected on the windscreen or on the road itself0.471
G01C21/3697output of additional  non-guidance related information  e.g. low fuel level  fuel efficient driving  gear change  speeding  dangerous curve ahead  slippery road  school zone  speed traps  driving behaviour feedback  advertising  virtual billboards or road signs | (ref: G01C21/3679)|  takes precedence0.471
H04L67/28for the provision of proxy services  e.g. intermediate processing or storage in the network | network management provisions | (ref: H04L41/00)| | network monitoring provisions | (ref: H04L43/00)| | proxies for network security | (ref: H04L63/0281)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)0.471
H04L67/1027Persistence of sessions during load balancing0.470
H04L67/1019based on random server selection0.470
G06F21/76in application-specific integrated circuits [ASICs] or field-programmable devices  e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs]0.470
G06F11/2733Test interface between tester and unit under test0.470
H04L41/0654Network fault recovery | backup route selection | (ref: H04L45/22)| | route fault recovery | (ref: H04L45/28)| | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)0.469
H04W72/0406involving control information exchange between nodes0.469
H04L41/00Arrangements for maintenance or administration or management of packet switching networks0.469
H04W40/20based on geographic position or location0.469
H04L67/1078Resource delivery mechanisms0.468
G06F11/3034where the computing system component is a storage system  e.g. DASD based or network based | digital recording or reproducing | (ref: G11B20/18)| | digital input from or digital output to record carriers | (ref: G06F3/06)| | arrangements and networking functions for distributed storage of data in a network | (ref: H04L29/08549)0.468
G06F11/0772Means for error signaling  e.g. using interrupts  exception flags  dedicated error registers0.468
G06F7/14Merging  i.e. combining at least two sets of record carriers each arranged in the same ordered sequence to produce a single set having the same ordered sequence0.468
G06F21/80in storage media based on magnetic or optical technology  e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00)0.468
H04L67/147provided for signalling methods or particular messages providing extensions to IETF  ITU  ETSI or 3GPP protocols  e.g.  additional proprietary messages  standard messages enhanced by additional header fields or standard messages being used for purposes other than originally intended0.467
H04L69/06Notations for structuring of protocol data  e.g. abstract syntax notation one [ASN.1]0.467
A63F13/80Special adaptations for executing a specific game genre or game mode0.466
G06N5/003Dynamic search techniques  heuristics  branch-and-bound | (ref: G06N5/046)|  take precedence| for optimisation | (ref: G06Q10/04)0.466
A63F13/795for finding other players| for building a team| for providing a buddy list0.466
A63F13/69by enabling or updating specific game elements  e.g. unlocking hidden features  items  levels or versions0.466
G06Q30/0211Determining discount or incentive effectiveness0.466
H04L41/069involving storage or log of alarms or notifications or post-processing thereof0.465
H04L41/5032Generating service level reports0.465
H04N7/141between two video terminals  e.g. videophone | telephonic communication systems combined with television receiver for reception of entertainment or information matter | (ref: H04M11/085)0.465
H04N7/152Multipoint control units therefor0.465
H04N7/15Conference systems | video terminal details | (ref: H04N7/141)|  | telephonic conference arrangements | (ref: H04M3/56)| | | computer conferencing | (ref: H04L12/1813)0.465
H04L51/10Messages including multimedia information | network arrangements or protocols for real-time communication | (ref: H04L65/00)| | voice messaging in telephonic communication using automatic or semi-automatic exchanges with non-audio components | (ref: H04M3/5307)0.465
H04N21/4788communicating with other users  e.g. chatting | arrangements for providing for computer conferences  e.g. chat rooms  to substation in data switching networks | (ref: H04L12/1813)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)0.465
H04L47/624Altering the ordering of packets in an individual queue0.464
H04L47/622Queue service order0.464
H04L49/254Centralized controller  i.e. arbitration or scheduling0.464
H04L47/6295Multiple queues per individual QOS  connection  flow or priority0.464
H04L45/742Route cache and its operation0.464
G06F12/0815Cache consistency protocols0.464
G06F12/0877Cache access modes0.464
G06F12/0848Partitioned cache  e.g. separate instruction and operand caches0.464
G06Q30/0256User search0.464
H04W4/30Services specially adapted for particular environments  situations or purposes0.464
H04L69/28Timer mechanisms used in protocols0.464
H04W4/21for social networking applications0.464
H04W4/14Short messaging services  e.g. short message services [SMS] or unstructured supplementary service data [USSD]0.464
G06Q30/0261based on user location0.464
H04L12/1428Invoice generation  e.g. customization  lay-out  database processing  algorithms for calculating the bill or formatting invoices as WWW pages | invoicing in general | (ref: G06Q30/04)0.464
H04L67/1065Discovery involving distributed pre-established resource-based relationships among peers  e.g. based on distributed hash tables [DHT] | pre-configuration of logical or physical connections | (ref: H04L67/1053)0.464
H04W4/24Accounting or billing0.464
H04L47/787Bandwidth trade among domains0.463
H04L45/586Virtual routers0.463
H04L41/0663involving offline failover planning0.463
G06F17/16Matrix or vector computation |   e.g. matrix-matrix or matrix-vector multiplication  matrix factorization | matrix transposition | (ref: G06F7/78)0.463
H04L41/5054Automatic provisioning of the service triggered by the service manager  e.g. concrete service implementation by automatic configuration of network components | for initializing configuration  i.e. provisioning of network or devices | (ref: H04L41/0806)0.463
G06Q20/327Short range or proximity payments by means of M-devices0.462
H03M13/373with erasure correction and erasure determination  e.g. for packet loss recovery or setting of erasures for the decoding of Reed-Solomon codes0.461
H03M13/2909Product codes0.461
G06F11/1004to protect a block of data words  e.g. CRC or checksum | (ref: G06F11/1076)|  takes precedence| security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.461
G06F11/1076Parity data used in redundant arrays of independent storages  e.g. in RAID systems0.461
H04L51/18Messages including commands or codes to be executed either at an intermediate node or at the recipient to perform message-related actions | computer aided management of electronic mail | (ref: G06Q10/10)| | networked applications for remote control or remote monitoring of the application | (ref: H04L67/025)| | networked applications involving the movement of software or configuration parameters | (ref: H04L67/34)0.461
G09G5/395Arrangements specially adapted for transferring the contents of the bit-mapped memory to the screen | (ref: G09G5/399)|  takes precedence0.461
G06Q30/0635Processing of requisition or of purchase orders0.461
G06N3/04Architectures  e.g. interconnection topology0.461
H04L67/1091Interfacing with client-server systems or between P2P systems0.460
G06F3/061Improving I/O performance0.460
G06F3/0647Migration mechanisms0.460
G06F3/0629Configuration or reconfiguration of storage systems0.460
G06F3/06Digital input from or digital output to record carriers  | e.g. RAID  emulated record carriers  networked record carriers | recording or reproducing devices | per se|  | (ref: G11B)| | error detection  error correction  monitoring | per se|  regarding storage systems | (ref: G06F11/00)| | accessing or addressing within memory systems or architectures | (ref: G06F12/00)| | information retrieval | (ref: G06F17/30)0.460
G06N3/006based on simulated virtual individual or collective life forms  e.g. single "avatar"  social simulations  virtual worlds | computer games | (ref: A63F13/00)| | medical simulations | (ref: G06F19/00)| | information retrieval | (ref: G06F17/30873)| | image processing | (ref: G06T)| | telecommunication protocols | (ref: H04L29/06034)0.460
G06N3/004Artificial life  i.e. computers simulating life0.460
G06N5/046Forward inferencing  production systems0.460
H04L9/06the encryption apparatus using shift registers or memories for block-wise | or stream|  coding  e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators0.460
G06F11/1464for networked environments0.459
G06F11/3096wherein the means or processing minimize the use of computing system or of computing system component resources  e.g. non-intrusive monitoring which minimizes the probe effect: sniffing  intercepting  indirectly deriving the monitored data from other directly available data0.459
H04W72/04Wireless resource allocation0.459
H04L63/1433Vulnerability analysis0.459
G06F12/0284Multiple user address space allocation  e.g. using different base addresses | interprocessor communication | (ref: G06F15/163)0.458
G06F9/30189according to execution mode  e.g. mode flag0.458
G06F9/355Indexed addressing |   i.e. using more than one address operand0.458
G06F9/3842Speculative instruction execution0.458
G06F9/30076to perform miscellaneous control operations  e.g. NOP0.458
G06F9/223Execution means for microinstructions irrespective of the microinstruction function  e.g. decoding of microinstructions and nanoinstructions| timing of microinstructions| programmable logic arrays| delays and fan-out problems0.458
A63F13/79involving player-related data  e.g. identities  accounts  preferences or play histories0.458
A63F13/213comprising photodetecting means  e.g. cameras  photodiodes or infrared cells | (ref: A63F13/219)|   | (ref: A63F13/655)|  take precedence0.458
G06F3/1286via local network0.458
G06F3/1285Remote printer device  e.g. being remote from client or server0.458
G06F3/1267Job repository  e.g. non-scheduled jobs  delay printing0.458
G06F3/1236Connection management0.458
G06F3/1238Secure printing  e.g. user identification  user rights for device usage  unallowed content  blanking portions or fields of a page  releasing held jobs0.458
G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data | error or fault reporting or logging | (ref: G06F11/0766)0.457
G06F13/24using interrupt | (ref: G06F13/32)|  takes precedence0.457
G06F9/30043LOAD or STORE instructions| Clear instruction0.457
G06F21/75by inhibiting the analysis of circuitry or operation0.457
G06F9/3013according to data content  e.g. floating-point registers  address registers0.457
G10L15/28Constructional details of speech recognition systems0.456
H04N21/4586Content update operation triggered locally  e.g. by comparing the version of software modules in a DVB carousel to the version stored locally | deployment  distribution  installation  update of software | (ref: G06F8/65)| | program updating while running in general | (ref: G06F8/656)| | error detection or correction of the data by redundancy during software upgrading | (ref: G06F11/1433)| | arrangements for updating broadcast information or broadcast-related information | (ref: H04H60/25)0.456
H04N21/2387Stream processing in response to a playback request from an end-user  e.g. for trick-play0.456
G06F8/4442Reducing the number of cache misses| Data prefetching | cache prefetching | (ref: G06F12/0862)0.456
G06F8/45Exploiting coarse grain parallelism in compilation  i.e. parallelism between groups of instructions0.456
G06F9/3836Instruction issuing  e.g. dynamic instruction scheduling  out of order instruction execution0.456
G06F9/3005to perform operations for flow control0.456
G06F9/3838Dependency mechanisms  e.g. register scoreboarding0.456
G06F8/4441Reducing the execution time required by the program code0.456
G06F9/545where tasks reside in different layers  e.g. user- and kernel-space0.456
G06F7/588Random number generators  i.e. based on natural stochastic processes0.456
G06F9/4484Executing subprograms0.456
G10L15/32Multiple recognisers used in sequence or in parallel| Score combination systems therefor  e.g. voting systems0.456
G06Q20/363with the personal data files for a user0.456
G06F17/15Correlation function computation | including computation of convolution operations | arithmetic circuits for sum of products | per se|   e.g. multiply-accumulators | (ref: G06F7/5443)| | digital filters  e.g. FIR  IIR  adaptive filters | (ref: H03H17/00)0.456
G10L17/24the user being prompted to utter a password or a predefined phrase0.456
G10L17/02Preprocessing operations  e.g. segment selection| Pattern representation or modelling  e.g. based on linear discriminant analysis [LDA] or principal components| Feature selection or extraction0.456
G10L25/51for comparison or discrimination0.456
H04W4/025using location based information parameters0.456
H04L69/18Multi-protocol handler  e.g. single device capable of handling multiple protocols | multilayer or multiprotocol switches | (ref: H04L49/602)0.455
G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component  e.g. monitoring the presence of processing resources  peripherals  I/O links  software programs | verification or detection of system hardware configuration | (ref: G06F11/2247)0.455
H04L41/04Architectural aspects of network management arrangements0.455
G06F11/3006where the computing system is distributed  e.g. networked systems  clusters  multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50)0.455
H04L41/20Network management software packages0.455
G06F9/382Pipelined decoding  e.g. using predecoding0.454
G06F9/3867using instruction pipelines0.454
G06F15/8069using a cache0.454
H04L63/0218Distributed architectures  e.g. distributed firewalls0.454
G06Q20/407Cancellation of a transaction0.454
G06F9/4418Suspend and resume| Hibernate and awake0.454
G06F9/44594Unloading0.454
A63F13/335using Internet0.454
A63F13/323between game devices with different hardware characteristics  e.g. hand-held game devices connectable to game consoles or arcade machines0.454
A63F13/40Processing input control signals of video game devices  e.g. signals generated by the player or derived from the environment0.454
H04L43/0852Delays0.454
H04L67/1029using data related to the state of servers by a load balancer | server selection based on server parameters | (ref: H04L67/1008)| | performance measurement for load balancing | (ref: G06F11/3433)| | information retrieval in structured data stores | (ref: G06F17/30286)0.454
B60R21/01508detecting forces or pressure in bags or modules0.453
B60W50/12Limiting control by the driver depending on vehicle state  e.g. interlocking means for the control input for preventing unsafe operation0.453
B60W50/14Means for informing the driver  warning the driver or prompting a driver intervention0.453
B60W50/087where the control system corrects or modifies a request from the driver0.453
B60K35/00Arrangement of adaptations of instruments specially for vehicles| Dashboards0.453
B60W40/08related to drivers or passengers0.453
H04N21/4667Processing of monitored end-user data  e.g. trend analysis based on the log file of viewer selections0.453
H04N21/251Learning process for intelligent management  e.g. learning user preferences for recommending movies | details of learning user preferences for the retrieval of video data in a video database | (ref: G06F17/30843)| | computer systems using learning methods | (ref: G06N3/08)0.453
H04N21/2662Controlling the complexity of the video stream  e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities0.453
H04N21/4666using neural networks  e.g. processing the feedback provided by the user0.453
G06T13/203D [Three Dimensional] animation0.453
G06T11/206Drawing of charts or graphs0.453
G06T15/20Perspective computation0.453
G06F3/04815Interaction with three-dimensional environments  e.g. control of viewpoint to navigate in the environment0.453
G06T19/003Navigation within 3D models or images0.453
G02B27/017Head mounted0.453
G06F3/0638Organizing or formatting or addressing of data0.453
G06F3/0662Virtualisation aspects0.453
G06F3/0637Permissions0.453
G06F3/0605by facilitating the interaction with a user or administrator0.453
H04W40/248Connectivity information update0.452
H04M15/8044Least cost routing0.452
H04L47/32Packet discarding or delaying0.452
H04L47/808User-type aware0.452
H04L47/805QOS or priority aware0.452
H04L47/762triggered by the network0.452
H04W76/12Setup of transport tunnels0.452
H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence  e.g. one-time-pad [OTP] or Vernam's cipher0.452
H04L43/06Report generation0.452
H04W24/00Supervisory  monitoring or testing arrangements0.452
G06Q20/388Mutual authentication without cards0.451
G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component  e.g. monitoring if the computing system is on  off  available  not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16)0.451
H04L47/72Reservation actions0.451
H04L47/827Aggregation of resource allocation or reservation requests0.451
A63F13/53involving additional visual information provided to the game scene  e.g. by overlay to simulate a head-up display [HUD] or displaying a laser sight in a shooting game0.451
A63F13/56Computing the motion of game characters with respect to other game characters  game objects or elements of the game scene  e.g. for simulating the behaviour of a group of virtual soldiers or for path finding0.451
G06T15/04Texture mapping0.451
G10L15/005Language recognition0.451
G06F12/0692Multiconfiguration  e.g. local and global addressing0.451
G06F13/1663Access to shared memory0.451
G06F9/4806Task transfer initiation or dispatching0.451
G06F11/3037where the computing system component is a memory  e.g. virtual memory  cache | accessing  addressing or allocating within memory systems or architectures | (ref: G06F12/00)| | checking stores for correct operation | (ref: G11C29/00)0.450
G06F12/121using replacement algorithms0.450
G10L15/183using context dependencies  e.g. language models0.450
H04W36/14Reselecting a network or an air interface0.449
H04W36/0005Control or signalling for completing the hand-off0.449
H04L41/145involving simulating  designing  planning or modelling of a network0.449
H04M15/47Fraud detection or prevention means0.449
H04M15/00Arrangements for metering  time-control or time indication | | Metering  charging or billing arrangements for voice wireline or wireless communications  e.g. VoIP0.449
H04M15/44Augmented  consolidated or itemized billing statement or bill presentation0.449
H04N21/4668for recommending content  e.g. movies0.449
H04N21/4784receiving rewards | payment schemes  architectures or protocols | (ref: G06Q20/00)| | e-commerce | (ref: G06Q30/00)| | charging arrangements in data networks | (ref: H04L12/14)0.449
H04N21/8173End-user applications  e.g. Web browser  game0.449
H04N21/4431characterized by the use of Application Program Interface [API] libraries0.449
H04N21/858Linking data to content  e.g. by linking an URL to a video object  by creating a hotspot0.449
H04L69/164Adaptation or special uses of UDP protocol0.448
H04W80/06Transport layer protocols  e.g. TCP [Transport Control Protocol] over wireless | transmission control protocol/Internet protocol [TCP/IP] or user datagram protocol [UDP] | (ref: H04L69/16)0.448
H04N21/47217for controlling playback functions for recorded or on-demand content  e.g. using progress bars  mode or play-point indicators or bookmarks | specific graphical features in visual interfaces | (ref: H04N21/4312)0.448
H04N21/6587Control parameters  e.g. trick play commands  viewpoint selection0.448
H04N21/235Processing of additional data  e.g. scrambling of additional data  processing content descriptors | arrangements for simultaneous broadcast of plural pieces of information | (ref: H04H20/28)0.448
H04L41/0876Aspects of the degree of configuration automation0.447
H04L12/4645Details on frame tagging | routing of packets | (ref: H04L45/00)| | support for virtual LAN | (ref: H04L49/354)0.446
G06F11/1435using file system or storage system metadata0.446
G06F21/568eliminating virus  restoring damaged files0.446
G06F3/0646Horizontal data movement in storage systems  i.e. moving data in between storage devices or systems0.446
G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means  e.g. caches0.446
G06F3/0679Non-volatile semiconductor memory device  e.g. flash memory  one time programmable memory [OTP]0.446
H04N21/2323using file mapping0.445
H04N21/2358for generating different versions  e.g. for different recipient devices0.445
H04N21/26283for associating distribution time parameters to content  e.g. to generate electronic program guide data0.445
H04W24/10Scheduling measurement reports | | Arrangements for measurement reports0.445
H04L41/042Arrangements involving multiple distributed management centers cooperatively managing the network0.444
H04L12/2803Home automation networks0.444
H04W4/38for collecting sensor information0.444
G06F9/4893taking into account power or heat criteria | power management in computers in general | (ref: G06F1/3203)| | thermal management in computers in general | (ref: G06F1/206)0.444
G06F1/329Power saving by task scheduling0.444
G06F1/3287Power saving by switching off individual functional units in a computer system  i.e. selective power distribution0.444
H04L65/1089by adding or removing media0.444
G06F17/18for evaluating statistical data |   e.g. average values  frequency distributions  probability functions  regression analysis | forecasting specially adapted for a specific administrative  business or logistic context | (ref: G06Q10/04)0.444
H04L67/2871Implementation details of a single intermediate entity0.444
H04L67/1006with static server selection  e.g. the same server being selected for a specific client | allocation of processing resources considering data affinity | (ref: G06F9/5033)0.444
G06F8/314Parallel programming languages | (ref: G06F8/313)|  takes precedence0.443
H04L41/50Network service management  i.e. ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer0.443
G06Q30/0641Shopping interfaces0.443
G06F8/313Logic programming  e.g. PROLOG programming language0.443
H04N21/64322IP0.443
H04N21/6377directed to server | control of source by destination in one way streaming for real-time multimedia communications | (ref: H04L29/06469)0.443
H04N21/6373for rate control |   e.g. request to the server to modify its transmission rate | flow control in packet networks | (ref: H04L47/10)0.443
G06Q30/016Customer service  i.e. after purchase service0.443
H04W4/33for indoor environments  e.g. buildings0.443
G01C21/206specially adapted for indoor navigation0.443
H04L12/2856Access arrangements  e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W)0.443
G06F3/005Input arrangements through a video camera0.442
G06Q30/0603Catalogue ordering0.442
G06T7/00Image analysis0.442
G06K9/6272based on distances to cluster centroïds0.442
H04L47/286Time to live0.442
G06F1/12Synchronisation of different clock signals | provided by a plurality of clock generators0.442
G08G1/0133for classifying traffic situation0.441
G16H50/30for calculating health indices| for individual health risk assessment0.441
G08G1/012from other sources than vehicle or roadside beacons  e.g. mobile networks0.441
G06F12/06Addressing a physical block of locations  e.g. base addressing  module addressing  memory dedication | (ref: G06F12/08)|  takes precedence0.441
G06F8/441Register allocation| Assignment of physical memory space to logical memory space0.441
G06K19/06028using bar codes0.441
H04L12/185with management of multicast group membership0.441
G06F21/556involving covert channels  i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755)0.440
G06F12/10Address translation0.440
G06Q20/325using wireless networks0.440
G06N7/00Computer systems based on specific mathematical models0.440
G06F12/0653with centralised address assignment0.440
G06F12/0246in block erasable memory  e.g. flash memory0.440
G06F3/0641De-duplication techniques0.440
H04N21/23412for generating or manipulating the scene composition of objects  e.g. MPEG-4 objects0.440
H04L65/1073Registration | arrangements for addressing or naming in data networks | (ref: H04L61/00)0.440
G06T17/00Three dimensional [3D] modelling  e.g. data description of 3D objects0.440
H04N21/42653for processing graphics0.440
H04N21/47205for manipulating displayed content  e.g. interacting with MPEG-4 objects  editing locally0.440
G10L15/00Speech recognition | (ref: G10L17/00)|  takes precedence0.439
G10L15/222Barge in  i.e. overridable guidance for interrupting prompts0.439
G06N3/00Computer systems based on biological models | analogue computers simulating functional aspects of living beings | (ref: G06G7/60)0.439
G06N3/02using neural network models | for adaptive control | (ref: G05B13/00)| | for image pattern matching | (ref: G06K9/00)| | for image data processing | (ref: G06T1/20)| | for phonetic pattern matching | (ref: G10L15/16)0.439
G10L15/20Speech recognition techniques specially adapted for robustness in adverse environments  e.g. in noise  of stress induced speech | (ref: G10L21/02)|  takes precedence0.439
H04N21/854Content authoring0.439
G06F12/128adapted to multidimensional cache systems  e.g. set-associative  multicache  multiset or multilevel0.439
G06F12/0269Incremental or concurrent garbage collection  e.g. in real-time systems | (ref: G06F12/0261)|  takes precedence0.439
G06F21/73by creating or determining hardware identification  e.g. serial numbers0.439
G05B17/02electric0.439
H04N21/845Structuring of content  e.g. decomposing content into time segments0.439
H04N21/442Monitoring of processes or resources  e.g. detecting the failure of a recording device  monitoring the downstream bandwidth  the number of times a movie has been viewed  the storage space available from the internal hard disk | arrangements for monitoring broadcast services or broadcast-related services | (ref: H04H60/29)| | arrangements for identifying or recognising characteristics with a direct linkage to broadcast information | (ref: H04H60/35)| | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | monitoring in wireless networks | (0.439
H04L65/00Network arrangements or protocols for real-time communications | computer conference | (ref: H04L12/1813)| | real time or near real time messaging in message switching systems  e.g. instant messaging | (ref: H04L51/04)| | network applications in general | (ref: H04L67/00)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | interconnection arrangements between switching centres for working between exchanges having different types of switching equipment where the types of switching equipment comprise PSTN/ISDN equipment and equipment of networks other than PSTN/I0.439
H04N21/44029for generating different versions0.439
H04W72/0446the resource being a slot  sub-slot or frame0.438
H04L5/0023Time-frequency-space0.438
H04L5/0048Allocation of pilot signals  i.e. of signals known to the receiver0.438
H04B7/0695using beam selection0.438
H04L5/0053Allocation of signaling  i.e. of overhead other than pilot signals0.438
H04B7/0456Selection of precoding matrices or codebooks  e.g. using matrices antenna weighting0.438
H04B7/0408using two or more beams  i.e. beam diversity0.438
G01S19/13Receivers0.438
H04N21/23116involving data replication  e.g. over plural servers | synchronization of replicated data | (ref: G06F11/1658)| | error detection or correction by means of data replication | (ref: G06F11/2053)| | replication in distributed file systems | (ref: G06F17/30067)| | replication in distributed file systems | (ref: G06F17/30283)| | replication or mirroring of data in data networks | (ref: H04L29/0854)0.438
H04N21/41407embedded in a portable device  e.g. video client on a mobile phone  PDA  laptop | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)| | arrangements specially adapted for mobile receivers in broadcast systems | (ref: H04H20/57)0.438
H04L47/12Congestion avoidance or recovery0.438
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.437
G06Q20/10specially adapted for electronic funds transfer [EFT] systems| specially adapted for home banking systems0.437
H04L43/0823Errors | management of events  faults or alarms in networks or network elements | (ref: H04L41/06)0.437
H04N21/6334for authorisation  e.g. by transmitting a key | arrangements for secret or secure communication | (ref: H04L9/00)|  | | wireless communications network key management | (ref: H04W12/04)| | wireless communications network access security | (ref: H04W12/08)0.437
H04N21/6582Data stored in the client  e.g. viewing habits  hardware capabilities  credit card number | arrangements where receivers interact with the broadcast | (ref: H04H20/38)0.437
H04N21/42684Client identification by a unique number or address  e.g. serial number  MAC address  socket ID | addressing and naming in data networks | (ref: H04L29/12009)0.437
H04N21/4532involving end-user characteristics  e.g. viewer profile  preferences | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protocols involving user profiles for network applications in communication control or processing | (ref: H04L29/08936)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)0.437
H04N21/25875involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.437
H04N21/42204User interfaces specially adapted for controlling a client device through a remote control device| Remote control devices therefor | interaction techniques for graphical user interfaces in general  | see|  | (ref: G06F3/048)| | computer pointing devices in general  | see|  | (ref: G06F3/033)| | user interfaces for controlling a tuning device of a television receiver through a remote control | (ref: H03J9/00)| | constructive details of casings for the remote control device | (ref: H01H9/0235)| | remote control of peripheral devices connected to a television receiver through the remote control d0.437
H04W8/22Processing or transfer of terminal data  e.g. status or physical capabilities0.437
H04L61/30Arrangements for managing names  e.g. use of aliases or nicknames | retrieval from the Internet by using information identifiers  e.g. uniform resource locators [URLs] | (ref: G06F17/30876)| | name-to-address mapping | (ref: H04L61/15)0.436
H04W4/16Communication-related supplementary services  e.g. call-transfer or call-hold0.436
H04W68/02Arrangements for increasing efficiency of notification or paging channel0.436
H04W76/11Allocation or use of connection identifiers0.436
H04L43/0894Packet rate0.436
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.436
G06Q10/0833Tracking0.436
G06K19/06037multi-dimensional coding0.436
G06K7/10366the interrogation device being adapted for miscellaneous applications0.436
G06Q30/0205Location or geographical consideration0.436
G06Q30/0639Item locations0.436
H04L43/067for time frame related reporting0.436
H04L12/5601Transfer mode dependent  e.g. ATM0.436
B60R25/255Eye recognition0.436
B60R25/257Voice recognition0.436
G08G1/005including pedestrian guidance indicator0.436
H04N21/21815comprising local storage units0.435
H04N21/8133specifically related to the content  e.g. biography of the actors in a movie  detailed information about an article seen in a video program0.435
H04N21/2407Monitoring of transmitted content  e.g. distribution time  number of downloads | arrangements for monitoring programmes for broadcast or for distribution combined with broadcast | (ref: H04H20/14)0.435
H04N21/6332directed to client0.435
G06F11/1407Checkpointing the instruction stream0.435
G06F11/2097maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)|  and subgroups0.435
G06F11/28by checking the correct order of processing | (ref: G06F11/08)|  - | (ref: G06F11/26)|  take precedence| monitoring patterns of pulse trains | (ref: H03K5/19)0.435
H04N21/2405Monitoring of the internal components or processes of the server  e.g. server load | allocation of resources in multiprogramming arrangements | (ref: G06F9/50)| | performance measurement of computer activity | (ref: G06F11/34)0.435
H04N19/164Feedback from the receiver or from the transmission channel0.435
H04N19/132Sampling  masking or truncation of coding units  e.g. adaptive resampling  frame skipping  frame interpolation or high-frequency transform coefficient masking0.435
H04N21/234381by altering the temporal resolution  e.g. decreasing the frame rate by frame skipping0.435
H04N21/4781Games0.435
H04N19/172the region being a picture  frame or field0.435
H04N21/25825involving client display capabilities  e.g. screen resolution of a mobile phone | optimising the visualisation of content during browsing in the Internet | (ref: G06F17/30905)| | processing of terminal status or physical abilities in wireless networks | (ref: H04W8/22)| | authentication in wireless network security | (ref: H04W12/06)0.435
H04N19/16for a given display mode  e.g. for interlaced or progressive display mode0.435
H04N21/4302Content synchronization processes  e.g. decoder synchronization0.435
H04N19/587involving temporal sub-sampling or interpolation  e.g. decimation or subsequent interpolation of pictures in a video sequence0.435
G06T15/06Ray-tracing0.435
G06F3/04845for image manipulation  e.g. dragging  rotation0.435
G06Q30/0609Buyer or seller confidence or verification0.435
H04N21/43615Interfacing a Home Network  e.g. for connecting the client to a plurality of peripherals | home Audio Video Interoperability [HAVI] data switching networks | (ref: H04L12/2805)0.435
G06F3/165Management of the audio stream  e.g. setting of volume  audio stream path0.435
G06F12/0837with software control  e.g. non-cacheable data0.435
G06F9/3891organised in groups of units sharing resources  e.g. clusters0.435
G06F21/567using dedicated hardware0.435
H04W88/06adapted for operation in multiple networks | or having at least two operational modes|   e.g. multi-mode terminals0.435
G16H15/00ICT specially adapted for medical reports  e.g. generation or transmission thereof0.435
G07C9/00571operated by interacting with a central unit0.434
G06F12/0875with dedicated cache  e.g. instruction or stack0.434
G06F1/3275Power saving in memory  e.g. RAM  cache0.434
G06F1/3225of memory devices0.434
H04N21/8455involving pointers to the content  e.g. pointers to the I-frames of the video stream0.434
H04N21/4728for selecting a Region Of Interest [ROI]  e.g. for requesting a higher resolution version of a selected region0.434
H04N21/85406involving a specific file format  e.g. MP4 format0.434
H04N21/21805enabling multiple viewpoints  e.g. using a plurality of cameras0.434
G06Q20/023characterized in that the neutral party is a clearing house0.433
G06F21/755with measures against power attack0.433
G07F7/0833Card having specific functional components0.433
H04W48/02Access restriction performed under specific conditions0.432
G06F11/3672Test management0.432
G06F11/3452Performance evaluation by statistical analysis0.432
G06F11/3692for test results analysis0.432
G06F11/3438monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22)0.432
H04L1/16in which the return channel carries supervisory signals  e.g. repetition request signals0.432
G06Q50/04Manufacturing0.432
G06Q10/06375Prediction of business process outcome or impact based on a proposed change0.432
G06N3/0445Feedback networks  e.g. hopfield nets  associative networks0.432
G06N3/063using electronic means0.432
G06Q10/06395Quality analysis or management0.431
G10L17/06Decision making techniques| Pattern matching strategies0.431
G06N3/0472using probabilistic elements  e.g. p-rams  stochastic processors0.431
H04W92/18between terminal devices0.431
G06F15/1735Network adapters  e.g. SCI  Myrinet | protocol engines | (ref: H04L29/06081)0.431
H04L69/12Protocol engines  e.g. VLSIs or transputers0.431
G06F12/0846Cache with multiple tag or data arrays being simultaneously accessible0.431
G06F13/1642with request queuing0.431
G11C7/1087Data input latches0.431
G11C7/106Data output latches0.431
G06F12/1466Key-lock mechanism0.431
G06F13/18based on priority control | (ref: G06F13/1605)|  takes precedence0.431
G06F9/526Mutual exclusion algorithms0.431
G08B13/19667Details realated to data compression  encryption or encoding  e.g. resolution modes for reducing data volume to lower transmission bandwidth or memory requirements0.430
G08B13/196using television cameras | recognition of scenes under surveillance | (ref: G06K9/00771)| | image analysis | per se|  | (ref: G06T7/00)| | television cameras | (ref: H04N5/225)| | CCTV systems | (ref: H04N7/18)0.430
H04L9/065Encryption by serially and continuously modifying data stream elements  e.g. stream cipher systems  RC4  SEAL or A5/30.430
G06F9/30014with variable precision0.430
G09G5/393Arrangements for updating the contents of the bit-mapped memory0.430
G06F7/5443Sum of products | for applications thereof  | see|  the relevant places  e.g. | (ref: G06F17/10)|   | (ref: H03H17/00)0.430
G06F3/04812interaction techniques based on cursor appearance or behaviour being affected by the presence of displayed objects  e.g. visual feedback during interaction with elements of a graphical user interface through change in cursor appearance  constraint movement or attraction/repulsion with respect to a displayed object | interaction techniques based on cursor behaviour involving tactile or force feedback | (ref: G06F3/016)0.430
H04L41/085Keeping track of network configuration0.430
H04N21/6581Reference data  e.g. a movie identifier for ordering a movie or a product identifier in a home shopping application0.429
G06Q40/06Investment  e.g. financial instruments  portfolio management or fund management0.429
H04N21/482End-user interface for program selection | systems specially adapted for using EPGs in broadcast systems | (ref: H04H60/72)0.429
H04W8/08Mobility data transfer0.429
H04W76/30Connection release0.429
H04W76/27Transitions between radio resource control [RRC] states0.429
H04W76/25Maintenance of established connections0.429
G05B19/4155characterised by programme execution  i.e. part programme or machine function execution  e.g. selection of a programme0.429
G06F9/38Concurrent instruction execution  e.g. pipeline  look ahead0.428
G06F9/30Arrangements for executing machine instructions  e.g. instruction decode | for executing microinstructions | (ref: G06F9/22)0.428
H04L61/2517involving port numbers0.428
H04L45/54Organization of routing tables0.428
H04W72/10where an allocation plan is defined|  based on priority criteria0.428
H04L5/0055Physical resource allocation for ACK/NACK | for physical mapping arrangements in ARQ protocols | (ref: H04L1/1861)0.428
H04W72/0433between access point and access point controlling device0.428
G16H50/20for computer-aided diagnosis  e.g. based on medical expert systems0.427
H04W36/0094Definition of hand-off measurement parameters0.427
H04B17/318Received signal strength0.427
H04W36/38by fixed network equipment0.427
G06Q20/127Shopping or accessing services according to a time-limitation0.427
G06F3/1462with means for detecting differences between the image stored in the host and the images displayed on the remote displays0.427
G06F3/0683Plurality of storage devices0.427
G06F3/065Replication mechanisms0.427
G06F1/30Means for acting in the event of power-supply failure or interruption  e.g. power-supply fluctuations | for resetting only | (ref: G06F1/24)0.427
G06F12/122of the least frequently used [LFU] type  e.g. with individual count value0.427
H04L45/122Minimizing distance  e.g. ? number of hops0.427
G06Q30/0277Online advertisement0.426
G06Q10/08355Routing methods0.426
G07F17/0092for assembling and dispensing of pharmaceutical articles | medical dispensers for private use  | (ref: A61J7/00)| | data processing for medical purposes | (ref: G06F19/00)0.426
G06Q30/0607Regulated0.426
G06Q30/0282Business establishment or product rating or recommendation0.426
G06F3/0656Data buffering arrangements0.426
G06F3/0604Improving or facilitating administration  e.g. storage management0.426
G06F3/064Management of blocks0.426
G06Q10/08Logistics  e.g. warehousing  loading  distribution or shipping| Inventory or stock management  e.g. order filling  procurement or balancing against orders0.426
G06Q10/04Forecasting or optimisation  e.g. linear programming  "travelling salesman problem" or "cutting stock problem" | data collection specially adapted for marketing  price determination or demand forecasting | (ref: G06Q30/02)0.426
H04L47/821Prioritising resource allocation or reservation requests0.425
H04L47/788Autonomous allocation of resources0.425
G06F11/0718in an object-oriented system0.425
G06F11/0736in functional embedded systems  i.e. in a data processing system designed as a combination of hardware and software dedicated to performing a certain function | testing or monitoring of automated control systems | (ref: G05B23/02)0.425
H04N1/444to a particular document or image or part thereof0.425
G06F12/1483using an access-table  e.g. matrix or list0.424
G06F21/123by using dedicated hardware  e.g. dongles  smart cards  cryptographic processors  global positioning systems [GPS] devices0.424
H04L49/30Peripheral units  e.g. input or output ports0.424
H04L49/103using shared central buffer  shared memory  e.g. time switching0.424
H04L12/10Current supply arrangements0.424
G06F12/0813with a network or matrix configuration0.424
H04L49/351LAN switches  e.g. ethernet switches0.424
G06F11/3485for I/O devices0.424
G06F9/454Multi-language systems| Localisation| Internationalisation0.424
H04L45/123Evaluation of link metrics | techniques for monitoring network metrics | (ref: H04L43/08)0.423
G10L17/22Interactive procedures| Man-machine interfaces0.423
G10L15/06Creation of reference templates| Training of speech recognition systems  e.g. adaptation to the characteristics of the speaker's voice | (ref: G10L15/14)|  takes precedence0.423
G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates0.423
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.423
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.423
H04W8/005Discovery of network devices  e.g. terminals0.423
H04W52/0229where the received signal is a wanted signal0.423
H04W88/02Terminal devices0.423
H04W4/12Messaging| Mailboxes| Announcements0.423
H04W8/04Registration at HLR or HSS [Home Subscriber Server]0.423
H04W28/08Load balancing or load distribution0.423
G06F13/28using burst mode transfer  e.g. direct memory access | DMA|   cycle steal | (ref: G06F13/32)|  takes precedence0.423
H04L67/00Network-specific arrangements or communication protocols supporting networked applications | message switching systems | (ref: H04L51/00)| | network management protocols | (ref: H04L41/00)| | routing or path finding of packets in data switching networks | (ref: H04L45/00)| | protocols for real-time multimedia communication | (ref: H04L65/00)| | information retrieval | (ref: G06F17/30)| | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)| | network structures or processes for video distribution between server and client or between remote clients | (r0.423
H04B1/3816Mechanical arrangements for accommodating identification devices  e.g. cards or chips| with connectors for programming identification devices0.423
H04M3/42102Making use of the called party identifier0.423
H04M3/42008Systems for anonymous communication between parties  e.g. by use of disposal contact identifiers0.423
G06F9/3009Thread control instructions0.423
G10L15/18using natural language modelling0.423
H04M3/42348Location-based services which utilize the location information of a target0.423
G16H40/20for the management or administration of healthcare resources or facilities  e.g. managing hospital staff or surgery rooms0.422
H04W8/12between location registers or mobility servers0.422
H04W36/32by location or mobility data  e.g. speed data0.422
G06F15/17375One dimensional  e.g. linear array  ring0.422
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities0.422
G16H80/00ICT specially adapted for facilitating communication between medical practitioners or patients  e.g. for collaborative diagnosis  therapy or health monitoring0.421
H04N21/2355involving reformatting operations of additional data  e.g. HTML pages | optimising the visualization of content for information retrieval from the Internet | (ref: G06F17/30905)| | media manipulation  adaptation or conversion at the source in one way streaming for real-time multimedia communications | (ref: H04L29/06489)| | message adaptation based on network or terminal capabilities in stored and forward packet switching | (ref: H04L51/34)0.421
H04N21/8358involving watermark | protecting executable software by watermarking | (ref: G06F21/16)| | image watermarking in general | (ref: G06T1/0021)| | watermarks inserted in still images for transmission purposes | (ref: H04N1/32144)| | inserting watermarks during video coding | (ref: H04N19/467)0.421
G06T1/0021Image watermarking0.421
G06F12/1036for multiple virtual address spaces  e.g. segmentation | (ref: G06F12/1045)|  takes precedence0.421
G06F3/04883for entering handwritten data  e.g. gestures  text0.421
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.421
G06F21/46by designing passwords or checking the strength of passwords0.421
H04W60/00Registration  e.g. affiliation to network| De-registration  e.g. terminating affiliation0.421
H04L61/00Network arrangements or network protocols for addressing or naming0.421
G08B21/0415detecting absence of activity | per se0.421
H04L43/065for device related reporting | reporting of sensed information of home appliances | (ref: H04L12/2803)0.421
H04W52/383power control in peer-to-peer links0.421
H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network | device-related reporting | (ref: H04L43/065)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom | (ref: H04Q9/00)0.421
H04W76/14Direct-mode setup0.421
H04L12/2814Exchanging control software or macros for controlling appliance services in a home automation network | arrangements for maintenance or administration involving configuration of the network and network elements | (ref: H04L41/08)0.421
H04W52/0212managed by the network  e.g. network or access point is master and terminal is slave0.421
H04W72/0493where an allocation plan is defined based on a resource usage policy0.421
H04L12/2827Reporting to a device within the home network| wherein the reception of the information reported automatically triggers the execution of a home appliance functionality0.421
H04L12/28characterised by path configuration  e.g. local area networks [LAN]  wide area networks [WAN]0.421
H04W40/246Connectivity information discovery0.421
H04L47/2441Flow classification0.421
H04L47/2475Application aware0.421
H04L47/2483Flow identification0.421
H04L41/0604Alarm or event filtering  e.g. for reduction of information0.420
G06F3/16Sound input| Sound output | conversion of speech into digital information or | vice versa|  | (ref: G10L)0.420
G10L15/16using artificial neural networks0.420
G10L13/027Concept to speech synthesisers| Generation of natural phrases from machine-based concepts | generation of parameters for speech synthesis out of text | (ref: G10L13/08)0.420
G10L13/047Architecture of speech synthesisers0.420
G06F8/10Requirements analysis| Specification techniques0.420
G06N5/02Knowledge representation | (ref: G06N5/04)|  takes precedence0.420
H04M7/0069comprising a residential gateway  e.g. those which provide an adapter for POTS or ISDN terminals0.419
G06F11/366using diagnostics | (ref: G06F11/0703)|  takes precedence0.419
G06Q20/3229Use of the SIM of a M-device as secure element0.419
H04W36/0011for data session or connection0.419
G06F12/0833in combination with broadcast means (e.g. for invalidation or updating)0.419
G06F12/0215with look ahead addressing means0.419
A63F13/822Strategy games| Role-playing games  | (ref: A63F13/825)|   | (ref: A63F13/828)|  take precedence0.418
G06T17/005Tree description  e.g. octree  quadtree0.418
G06Q10/0635Risk analysis0.418
G06F11/0751Error or fault detection not based on redundancy | power supply failures | (ref: G06F1/30)| | network fault management | (ref: H04L41/06)0.418
H04N7/0117involving conversion of the spatial resolution of the incoming video signal | for graphics images | (ref: G09G2340/0407)0.418
H04N21/4223Cameras | (ref: H04N5/225)|  takes precedence0.418
H04N21/4402involving reformatting operations of video signals for household redistribution  storage or real-time display | adapting incoming signals to the display format of the display terminal | (ref: G09G5/005)| | media manipulation  adaptation or conversion at the destination in one way streaming for real-time multimedia communications | (ref: H04L29/06496)| | details of conversion of video standards at pixel level | (ref: H04N7/01)| | video transcoding | (ref: H04N19/40)0.418
H04N7/181for receiving images from a plurality of remote sources0.418
H04N19/40using video transcoding  i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream0.418
G08B13/19656Network used to communicate with a camera  e.g. WAN  LAN  Internet0.418
G05B19/0428Safety  monitoring | (ref: G05B19/0423)|  takes precedence0.417
G05B23/0216Human interface functionality  e.g. monitoring system providing help to the user in the selection of tests or in its configuration0.417
G05B23/027Alarm generation  e.g. communication protocol| Forms of alarm0.417
H04L41/5009Determining service level performance  e.g. measuring SLA quality parameters  determining contract or guarantee violations  response time or mean time between failure [MTBF] | monitoring performance metrics on a simple network level | (ref: H04L43/08)0.417
H01H13/14Operating parts  e.g. push-button0.417
G06F11/3082the data filtering being achieved by aggregating or compressing the monitored data0.417
G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component  e.g. monitoring of power  currents  temperature  humidity  position  vibrations | thermal management in cooling arrangements of a computing system | (ref: G06F1/206)0.417
G09C1/00Apparatus or methods whereby a given sequence of signs  e.g. an intelligible text  is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00)0.417
G06Q30/04Billing or invoicing |   e.g. tax processing in connection with a sale0.417
G06F9/30116Shadow registers  e.g. coupled registers  not forming part of the register space0.417
H04W76/40for selective distribution or broadcast0.416
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]0.416
H04L65/4061"Push-to-X" services | push-to-talk services in wireless networks | (ref: H04W4/10)| | connection management  e.g. connection set-up  manipulation or release for push-to-talk or push-on-call services in wireless communication networks | (ref: H04W76/45)0.416
G06F12/145the protection being virtual  e.g. for virtual blocks or segments before a translation mechanism0.416
H04B7/18519Operations control  administration or maintenance0.416
G10L13/00Speech synthesis| Text to speech systems0.416
H04N21/44204Monitoring of content usage  e.g. the number of times a movie has been viewed  copied or the amount which has been watched | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protecting generic digital content where the protection is independent of the precise nature of the content | (ref: G06F21/10)| | arrangements for monitoring the use made of the broadcast services in broadcast systems | (ref: H04H60/31)0.416
H04N21/2668Creating a channel for a dedicated end-user group  e.g. insertion of targeted commercials based on end-user profiles | information retrieval from the Internet by querying with filtering and personalisation | (ref: G06F17/30867)| | arrangements for replacing or switching information during the broadcast | (ref: H04H20/10)| | push services over packet-switching network | (ref: H04L12/1859)| | adaptation of message content in packet-switching networks | (ref: H04L51/063)0.416
H04W48/20Selecting an access point0.415
H04W8/245from a network towards a terminal0.415
H04N21/233Processing of audio elementary streams | details of formatting and decoding of an encoded audio signal representation into a data stream for transmission or storage purposes | (ref: G10L19/167)| | arrangements characterised by components specially adapted for monitoring  identification or recognition of audio in broadcast systems | (ref: H04H60/58)0.415
H04N21/26241involving the time of distribution  e.g. the best time of the day for inserting an advertisement or airing a children program0.415
H04N21/458Scheduling content for creating a personalised stream  e.g. by combining a locally stored advertisement with an incoming stream| Updating operations  e.g. for OS modules | | time-related management operations | arrangements for replacing or switching information during the broadcast or during the distribution | (ref: H04H20/10)0.415
H04N21/2368Multiplexing of audio and video streams0.415
G10L25/78Detection of presence or absence of voice signals | switching of direction of transmission by voice frequency in two-way loud-speaking telephone systems | (ref: H04M9/10)0.415
H04L12/2832Interconnection of the control functionalities between home networks | single bridge functionality | (ref: H04L12/4625)0.415
H04L12/2829involving user profiles according to which the execution of a home appliance functionality is automatically triggered0.415
G06F3/1247by conversion to printer ready format0.415
G06F3/1211Improving printing performance0.415
G06F3/1228Printing driverless or using generic drivers0.415
G06F11/0787Storage of error reports  e.g. persistent data storage  storage using memory protection0.415
G06F11/3072where the reporting involves data filtering  e.g. pattern matching  time or event triggered  adaptive or policy-based reporting0.415
G06F11/2294by remote test0.415
G05B19/4186by protocol  e.g. MAP  TOP0.415
A63F13/26having at least one additional display device  e.g. on the game controller or outside a game booth0.415
H04N21/472End-user interface for requesting content  additional data or services| End-user interface for interacting with content  e.g. for content reservation or setting reminders  for requesting event notification  for manipulating displayed content | end-user interfaces for retrieving video data from a database | (ref: G06F17/30843)| | content on demand in one way streaming for real-time multimedia communications | (ref: H04L29/06462)0.414
H04L65/60Media handling  encoding  streaming or conversion0.414
H04N21/44Processing of video elementary streams  e.g. splicing a video clip retrieved from local storage with an incoming video stream  rendering scenes according to MPEG-4 scene graphs0.414
H04J3/0661using timestamps0.414
G06F12/0615Address space extension0.414
H04N21/254Management at additional data server  e.g. shopping server  rights management server | protocols involving third party service providers for network applications in communication control or processing | (ref: H04L29/08666)| | arrangements for maintenance or administration in data networks | (ref: H04L41/00)0.414
G06Q20/04Payment circuits0.414
G06Q30/0633Lists  e.g. purchase orders  compilation or processing0.414
H04L41/0873by checking configuration conflicts with other network elements0.414
H04L41/0213using standardized network management protocols  e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]0.414
H04L41/16Network management using artificial intelligence0.414
H04L49/208Port mirroring0.414
G06N3/0481Non-linear activation functions  e.g. sigmoids  thresholds0.414
H04W28/24Negotiating SLA [Service Level Agreement]| Negotiating QoS [Quality of Service]0.413
G06F12/1458by checking the subject access rights0.413
G06Q30/0615Anonymizing0.413
H04W28/0278using buffer status reports | dynamic wireless traffic scheduling definition | (ref: H04W72/1205)0.413
G06F12/0806Multiuser  multiprocessor or multiprocessing cache systems0.413
G06F13/4221being an input/output bus  e.g. ISA bus  EISA bus  PCI bus  SCSI bus0.413
H04L61/256Network address translation [NAT] traversal0.413
H04L45/7453using hashing0.413
G06F13/4063Device-to-bus coupling0.413
H04W28/0284detecting congestion or overload during communication | monitoring arrangements | (ref: H04L43/00)0.413
H04N19/52by predictive encoding0.413
H04N19/523with sub-pixel accuracy0.413
H04N19/102characterised by the element  parameter or selection affected or controlled by the adaptive coding0.413
H04N19/98Adaptive-dynamic-range coding [ADRC]0.413
H04N19/70characterised by syntax aspects related to video coding  e.g. related to compression standards0.413
H04N19/157Assigned coding mode  i.e. the coding mode being predefined or preselected to be further used for selection of another element or parameter0.413
H04N19/159Prediction type  e.g. intra-frame  inter-frame or bidirectional frame prediction0.413
H04N19/13Adaptive entropy coding  e.g. adaptive variable length coding [AVLC] or context adaptive binary arithmetic coding [CABAC]0.413
G06T7/12Edge-based segmentation0.413
G06Q30/0643Graphical representation of items or shoppers0.413
G06T7/70Determining position or orientation of objects or cameras | camera calibration | (ref: G06T7/80)0.413
G06T15/503Blending  e.g. for anti-aliasing0.413
G06T7/13Edge detection0.413
G05B15/02electric0.413
H02J3/381Dispersed generators0.413
G05B19/41875characterised by quality surveillance of production0.413
A63F13/86Watching games played by other players0.412
A63F13/42by mapping the input signals into game commands  e.g. mapping the displacement of a stylus on a touch screen to the steering angle of a virtual vehicle0.412
H04N21/2743Video hosting of uploaded data from client0.412
A63F13/847Cooperative playing  e.g. requiring coordinated actions from several players to achieve a common goal0.412
H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks0.412
H04W4/23for mobile advertising0.412
H04W72/085using measured or perceived quality0.412
H04W16/14Spectrum sharing arrangements | between different networks0.412
H04W74/0808using carrier sensing  e.g. as in CSMA0.412
H04W72/0453the resource being a frequency  carrier or frequency band0.412
H04W74/04Scheduled | or contention-free|  access0.412
G11C11/2293Timing circuits or methods0.412
H04B17/336Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]0.412
G11C11/2259Cell access0.412
H04B17/373Predicting channel quality parameters0.412
G11C11/2297Power supply circuits0.412
H04B17/27for locating or positioning the transmitter0.412
H04L1/0018based on latency requirement0.412
G11C11/2273Reading or sensing circuits or methods0.412
G01V3/12operating with electromagnetic waves | operating with millimetre waves | (ref: G01V8/005)0.412
G11C11/2257Word-line or row circuits0.412
H04L5/006Quality of the received signal  e.g. BER  SNR  water filling0.412
G05B23/0208characterized by the configuration of the monitoring system0.412
A61B5/1126using a particular sensing technique0.412
A61B5/4833Assessment of subject's compliance to treatment0.412
G04F10/00Apparatus for measuring unknown time intervals by electric means | timing devices for clocks or watches for comparing the rate of the oscillating member with a standard | (ref: G04D7/12)| | radar systems  analogous systems | (ref: G01S7/00)| | measuring frequency | (ref: G01R23/00)| | measuring phase angle | (ref: G01R25/00)0.412
A61B5/742using visual displays | (ref: A61B5/044)|  takes precedence0.412
A61B5/6843Monitoring or controlling sensor contact pressure0.412
A61F5/02Orthopaedic corsets | arm-rests for use as writing aids | (ref: B43L15/00)0.412
A61B5/6831Straps  bands or harnesses0.412
G16H20/30relating to physical therapies or activities  e.g. physiotherapy  acupressure or exercising0.412
G06F11/008Reliability or availability analysis0.412
H03M7/6023Parallelization0.412
G06F7/24Sorting  i.e. extracting data from one or more carriers  rearranging the data in numerical or other ordered sequence  and rerecording the sorted data on the original carrier or on a different carrier or set of carriers | sorting methods in general| (ref: G06F7/36)|  takes precedence0.412
H03M7/30Compression | speech analysis-synthesis for redundancy reduction | (ref: G10L19/00)| | for image communication | (ref: H04N)| Expansion| Suppression of unnecessary data  e.g. redundancy reduction | for data acquisition | (ref: G06F17/40)| | for image data processing | (ref: G06T9/00)| | redundancy reduction in data recording | (ref: G11B20/14)| | for transmission | (ref: H04B1/66)0.412
H03M7/3064Segmenting0.412
G06F11/1044with specific ECC/EDC distribution0.412
G06F9/466Transaction processing0.411
H04L47/745Reaction in network0.411
H04L41/5051Service on demand  i.e. services are defined and provided in real time as requested by the user0.411
H04W28/04Error control0.411
G01D21/00Measuring or testing not otherwise provided for0.411
H04M3/02Ringing or otherwise calling substations | selective calling | (ref: H04Q)0.411
B41F33/00Indicating  counting  warning  control or safety devices | arrangements of counting devices in platen presses | (ref: B41F1/00)|  |   | (ref: B41F1/58)| | arrangements of counting devices|  in cylinder presses | (ref: B41F3/84)| | ink supply or metering devices | (ref: B41F31/02)0.410
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)0.410
G10L15/063Training0.410
G10L15/083Recognition networks | (ref: G10L15/142)|   | (ref: G10L15/16)|  take precedence0.410
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner0.410
H04J3/0658Clock or time synchronisation among packet nodes0.410
H04L41/5058Service discovery by the service manager | automatically determining the actual topology of a network | (ref: H04L41/12)| | topology discovery for routing | (ref: H04L45/02)| | arrangements for service discovery  e.g. service location protocol | (ref: H04L67/16)0.410
H04W88/18Service support| Network management devices0.410
H04N21/6405Multicasting | data broadcast and multicast in packet switching networks | (ref: H04L12/18)0.410
G01V99/005Geomodels or geomodelling  not related to particular measurements0.410
H04W48/14using user query | or user detection0.410
G05B13/0265the criterion being a learning criterion0.410
A01B79/005Precision agriculture0.410
H04M3/4931Directory assistance systems0.410
H04M3/4936Speech interaction details | speech recognition | per se|  | (ref: G10L15/00)0.410
H04L41/08Configuration management of network or network elements | proprietary application protocols for remote control of end-devices in special networking environments | (ref: H04L67/125)| | automatic configuration specially adapted for wireless networks | (ref: H04W24/02)0.410
G09C5/00Ciphering apparatus or methods not provided for in the preceding groups  e.g. involving the concealment or deformation of graphic data such as designs  written or printed messages0.409
G07B15/02taking into account a variable factor such as distance or time  e.g. for passenger transport  parking systems or car rental systems | (ref: G07B15/06)|  takes precedence| taximeters | (ref: G07B13/00)| | parking meters | per se|  | (ref: G07F17/24)| | | car rental systems | per se|  | (ref: G07B15/00)0.409
G07F15/005dispensed for the electrical charging of vehicles | electrical charging as such  | (ref: B60L11/00)0.409
G06Q20/4033Local solvency checks0.409
G07F7/125Offline card verification0.409
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.409
G06F9/30029Logical and Boolean instructions  e.g. XOR  NOT0.409
G06F3/1296Printer job scheduling or printer resource handling0.409
G06F3/1268Job submission  e.g. submitting print job order or request not the print data itself0.409
G06F3/1222Increasing security of the print job0.409
G06F11/2023Failover techniques0.409
G16H20/00ICT specially adapted for therapies or health-improving plans  e.g. for handling prescriptions  for steering therapy or for monitoring patient compliance0.408
H02J50/12of the resonant type0.408
H04L12/18for broadcast or conference |   e.g. multicast | multicast or broadcast switches | (ref: H04L49/201)0.408
G06N3/105Shells for specifying net layout0.408
G06N3/10Simulation on general purpose computers0.408
H04L12/46Interconnection of networks0.408
G06F9/449Object-oriented method invocation or resolution0.408
H04L61/2521Special translation architecture  i.e. being different from a single network address translation [NAT] server0.408
H04L49/70Virtual switches0.408
G06F15/177Initialisation or configuration control | processor initialisation | (ref: G06F9/4405)0.408
H04L41/0889Techniques to speed-up the configuration process0.408
H04L67/1036Load balancing of requests to servers for services different from user content provisioning  e.g. load balancing to DNS servers or firewalls | internet service provider selection | (ref: H04L12/5691)0.408
G08C17/02using a radio link0.408
B63B49/00Arrangements of nautical instruments or navigational aids | nautical measuring instruments | (ref: G01C)| | radio navigation  analogous arrangements using other waves | (ref: G01S)0.408
G01S19/48by combining or switching between position solutions derived from the satellite radio beacon positioning system and position solutions derived from a further system0.408
G06F3/0652Erasing  e.g. deleting  data cleaning  moving of data to a wastebasket0.407
G06F3/0655Vertical data movement  i.e. input-output transfer| data movement between one or more hosts and one or more storage devices0.407
G06F3/0667at data level  e.g. file  record or object virtualisation0.407
G06F3/0614Improving the reliability of storage systems0.407
G06F3/0665at area level  e.g. provisioning of virtual or logical volumes0.407
G06F3/0664at device level  e.g. emulation of a storage device or system0.407
G06F3/0653Monitoring storage devices or systems0.407
H04N21/6543for forcing some client operations  e.g. recording | remote booting in general | (ref: G06F9/4416)0.407
H04N21/242Synchronization processes  e.g. processing of Program Clock References [PCR] | synchronisation arrangements in time-division multiplex systems | (ref: H04J3/06)| | arrangements for synchronising broadcast or distribution via plural systems in broadcast distribution systems | (ref: H04H20/18)| | arrangements for synchronising receiver with transmitter | (ref: H04L7/00)| | synchronising circuits with arrangements for extending range of synchronisation at the transmitter end | (ref: H04N5/067)0.407
G07F19/20Automatic teller machines [ATMs]0.407
G06F3/04842Selection of a displayed object | (ref: G06F3/0482)|  takes precedence0.406
G06F21/43wireless channels0.406
G10L25/54for retrieval0.406
H04N21/4398involving reformatting operations of audio signals | details of audio signal transcoding | (ref: G10L19/173)0.406
H04N21/8106involving special audio data  e.g. different tracks for different languages0.406
H04L65/1059End-user terminal functionality | substation equipment for use by subscribers | (ref: H04M1/00)| | terminal profiles | (ref: H04L67/303)| | terminal emulation | (ref: H04L67/08)| | adaptation for terminals with limited resources or for terminal portability | (ref: H04L67/04)| | management of video client characteristics | (ref: H04N21/258)|   | (ref: H04N21/4516)0.406
H04N5/76Television signal recording | diagnosis  testing or measuring for television signal recorders | (ref: H04N17/06)| | recording in connection with measuring | (ref: G01D)| | information storage | in which the television signal is not involved  driving  starting  stopping  head switching  editing  indexing|  in general | (ref: G11)|   e.g. | (ref: G11B)0.406
H04N7/17318Direct or substantially direct transmission and handling of requests0.406
H04N5/783Adaptations for reproducing at a rate different from the recording rate0.406
G06Q20/403Solvency checks0.405
G06Q20/38Payment protocols| Details thereof0.405
H04L9/302involving the integer factorization problem  e.g. RSA or quadratic sieve [QS] schemes0.405
G06Q10/083Shipping0.405
H04W4/022with dynamic range variability0.405
H04L12/4675Dynamic sharing of VLAN information amongst network nodes | configuration of the network or of network elements | (ref: H04L41/08)0.405
H04L45/245Link aggregation  e.g. trunking0.405
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence0.405
H04M15/66Policy and charging system0.405
H04W28/0257the individual bearer or channel having a maximum bit rate or a bit rate guarantee0.405
G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer | (ref: G06F3/16)|  takes precedence0.405
G06Q99/00Subject matter not provided for in other groups of this subclass0.405
G06F9/44536Selecting among different versions0.404
H04L45/563Software download or update | software deployment in general | (ref: G06F8/60)0.404
H04W88/182Network node acting on behalf of an other network entity  e.g. proxy0.404
G06Q10/0838Historical data0.404
G09F19/22Advertising or display means on roads  walls  or similar surfaces  e.g. illuminated | illuminated signs in general | (ref: G09F13/00)0.404
G06F3/0661Format or protocol conversion arrangements0.403
G06F9/44584Portable applications  i.e. making applications self-contained  e.g. U3 standard0.403
G11B27/031Electronic editing of digitised analogue information signals  e.g. audio or video signals0.403
G11B27/005Reproducing at a different information rate from the information rate of recording | for television signals | (ref: H04N5/783)0.403
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.106
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.106
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.106
G06F2209/549Remote execution0.102
G06F2209/5015Service provider selection0.100
H04L61/35involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address or functional addressing  i.e. assigning an address to a function0.099
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.098
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.098
H04L67/1038Load balancing arrangements to avoid a single path through a load balancer0.098
H04L2463/081applying self-generating credentials  e.g. instead of receiving credentials from an authority or from another peer  the credentials are generated at the entity itself | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.098
H04L47/2408Different services  e.g. type of service [ToS]0.095
G06F2212/151Emulated environment  e.g. virtual machine0.094
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.094
G06F2212/6042Allocation of cache space to multiple users or processors0.094
G06F2009/45575Starting  stopping  suspending  resuming virtual machine instances | program initiating | (ref: G06F9/445)| | task life-cycle in general | (ref: G06F9/485)0.094
G06F2009/45562Creating  deleting  cloning virtual machine instances0.094
H04N21/81Monomedia components thereof0.093
H04N21/4627Rights management | associated to the content | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)0.093
G06F2221/032Protect output to user by software means0.093
Y02D10/00Energy efficient computing0.093
H04W4/18Information format or content conversion  e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals0.093
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.092
G06F2221/034Test or assess a computer or a system0.092
G06F2221/0748Hiding0.092
G06F2201/88Monitoring involving counting0.092
G06F2209/521Atomic0.092
G06F2221/033Test or assess software0.092
G06F2209/502Proximity0.092
G06F2201/865Monitoring of software0.092
G06F2009/45591Monitoring or debugging support | monitoring and debugging in general in | (ref: G06F11/30)|   | (ref: G06F11/36)0.091
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.091
G06F2212/1021Hit rate improvement0.089
G06F2212/1032Reliability improvement  data loss prevention  degraded operation etc0.089
G06F2212/313In storage device0.089
G06F2212/6028Prefetching based on hints or prefetch instructions0.089
G06F2209/547Messaging middleware0.089
G06F2209/484Precedence0.089
G06F2209/5011Pool0.089
G06F2209/544Remote0.089
G06F2209/508Monitor0.089
G06T2200/28involving image processing hardware0.089
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.089
G06F2209/501Performance criteria0.088
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.088
G06F2209/506Constraint0.088
H04L2209/127Trusted platform modules [TPM]0.088
G06F2221/2135Metering0.088
G06F2221/2103Challenge-response0.088
G06F2201/875Monitoring of systems including the internet0.087
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.087
G06F2221/2137Time limited access  e.g. to a computer or data0.087
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.087
H04L45/302Route determination based on requested QoS0.086
H04L47/825Involving tunnels  e.g. MPLS0.086
G06F2221/0713User0.086
G06F2209/5016Session0.085
H04L2463/144Detection or countermeasures against botnets0.085
G06F11/0706the processing taking place on a specific hardware platform or in a specific software environment0.085
G06F11/0763by bit configuration check  e.g. of formats or tags0.085
G06F9/45554Instruction set architectures of guest OS and hypervisor or native processor differ  e.g. Bochs or VirtualPC on PowerPC MacOS0.085
G06F2201/81Threshold0.085
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.084
G06F2221/2151Time stamp0.084
G06F2221/2107File encryption0.084
G06F2212/282Partitioned cache0.084
G06F2212/152Virtualized environment  e.g. logically partitioned system0.084
G06F2212/1008Correctness of operation  e.g. memory ordering0.084
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.084
G09G2370/022Centralised management of display operation  e.g. in a server instead of locally0.083
G06F3/1446display composed of modules  e.g. video walls0.083
H04L67/1017based on a round robin mechanism0.083
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.082
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.081
G06F2221/2101Auditing as a secondary aspect0.081
G06F2221/2115Third party0.081
G06F2209/505Clust0.081
G06F8/74Reverse engineering| Extracting design information from source code0.081
G06F8/436Semantic checking0.081
B82Y10/00Nanotechnology for information processing  storage or transmission  e.g. quantum computing or single electron logic0.080
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.080
G06Q50/34Betting or bookmaking  e.g. Internet betting0.080
G06F2209/5017Task decomposition0.080
H04L2209/04Masking or blinding0.080
G06F2206/1012Load balancing0.080
G06F2221/2131Lost password  e.g. recovery of lost or forgotten passwords0.080
G06F2209/545Gui0.079
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.079
G06F2209/509Offload0.079
G10L2015/223Execution procedure of a spoken command0.079
G10L2015/226Taking into account non-speech caracteristics0.079
G06F2221/0753Distribution0.079
B64C2201/027Flying platforms0.079
B64C2201/141autonomous  i.e. by navigating independently from ground or air stations  e.g. by using inertial navigation systems [INS]0.079
B64C2201/128for transporting goods other than bombs0.079
B64C2201/146Remote controls0.079
G06F2221/2125Just-in-time application of countermeasures  e.g.  on-the-fly decryption  just-in-time obfuscation or de-obfuscation0.079
G06T2200/24involving graphical user interfaces [GUIs]0.078
G06F2209/504Resource capping0.078
H04W88/12Access point controller devices0.078
H04W88/14Backbone network devices0.078
H04W36/0033with transfer of context information0.078
G05B2219/31362Verify correct configuration of system0.078
Y02P90/02Total factory control  e.g. smart factories  flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]0.078
H04L69/02Protocol performance0.078
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.078
G06F2221/0773Recurrent authorisation0.078
G06F2221/0711Token0.078
G06F2221/0775Logging0.078
G06F2221/2149Restricted operating environment0.078
G06F2212/401Compressed data0.077
G06F2212/656Address space sharing0.077
G06F2212/1024Latency reduction0.077
G06F2212/1016Performance improvement0.077
G06F2212/6046Using a specific cache allocation policy other than replacement policy0.077
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]0.077
G06F2201/815Virtual | middleware or OS functionality using virtual machines to implement generic software techniques for error detection or fault masking | (ref: G06F11/1484)0.077
G06F2221/2153Using hardware token as a secondary aspect0.077
G06F2212/1052Security improvement0.076
H04L2209/46Secure multiparty computation  e.g. millionaire problem0.076
H04L2209/50Oblivious transfer0.076
H04L2012/5626Network management  e.g. Intelligent nets0.076
G10L2015/088Word spotting0.076
H04L2209/08Randomization  e.g. dummy operations or using noise0.076
H04L2212/00Encapsulation of packets0.076
H04L43/087Jitter0.076
H04L61/2528Translation at a proxy0.076
H04L43/0805Availability0.076
H04W76/50for emergency connections0.076
H04W92/02Inter-networking arrangements0.076
H04W84/005Moving wireless networks0.076
A63F2300/535for monitoring  e.g. of user parameters  terminal parameters  application parameters  network parameters0.076
A63F2300/534for network load management  e.g. bandwidth optimization  latency reduction0.076
B60W2050/065by reducing the computational load on the digital processor of the control computer0.076
B60Y2400/30Sensors0.076
G10L2015/228of application context0.076
B60W2420/00Indexing codes relating to the type of sensors based on the principle of their operation0.076
B60W2050/146Display means0.076
Y10S707/99939Privileged access0.076
Y10S707/99943Generating database or data structure  e.g. via user interface0.076
G06T2219/2012Colour editing  changing  or manipulating| Use of colour codes0.076
G06T2219/028Multiple view windows (top-side-front-sagittal-orthogonal)0.076
G06T2219/024Multi-user  collaborative environment0.076
G06F2221/2133Verifying human interaction  e.g.  Captcha0.075
G06F2209/5014Reservation0.075
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.075
G06F2201/87Monitoring of transactions0.075
A63F2300/6615using models with different levels of detail [LOD]0.075
G06T2219/2008Assembling  disassembling0.075
G06T2210/36Level of detail0.075
G06F2212/1048Scalability0.075
H04L2209/60Digital content management  e.g. content distribution0.075
G06F2212/502using adaptive policy0.075
G06F2212/683Invalidation0.075
H04L41/0631Alarm or event or notifications correlation| Root cause analysis0.075
G06F2212/602Details relating to cache prefetching0.075
Y02D30/00High level techniques for reducing energy consumption in communication networks0.075
G06F2207/7219Countermeasures against side channel or fault attacks0.074
G06F2212/653Page colouring0.074
G05B2219/2614HVAC  heating  ventillation  climate control0.074
G05B2219/13119Compiler0.074
G05B2219/32137Configure  connect  combine different program modules0.074
G06T2200/21involving computational photography0.074
G06F2216/15Synchronised browsing0.074
B60W2030/082Vehicle operation after collision0.073
B60W2050/0075Automatic parameter input  automatic initialising or calibrating means0.073
B60W2050/0004In digital systems  e.g. discrete-time systems involving sampling0.073
H04L2209/603Digital right managament [DRM]0.073
G06F2221/0759Conversion0.073
H04N2007/145Handheld terminals0.073
G06F2212/657Virtual address space management0.073
G07C5/008communicating information to a remotely located station | transmission systems for measured values | (ref: G08C)0.073
G07B15/063using wireless information transmission between the vehicle and a fixed station | identification of vehicles | (ref: G08G)0.073
G06F2212/652Page size control0.073
G06F2212/7201Logical to physical mapping or translation of blocks or pages0.073
G05B2219/34263OLE object linking and embedding  OPC ole for process control0.073
G06F2212/402Encrypted data0.073
G06T2200/16involving adaptation to the client's capabilities0.073
G06N5/027Frames0.073
G06F2209/482Application0.073
G06F2212/1044Space efficiency improvement0.073
G06F2212/464Multimedia object  e.g. image  video0.073
G05B2219/40323Modeling robot environment for sensor based robot system0.073
G06T2210/52Parallel processing0.073
H04L5/0044allocation of payload0.073
G07C2209/63Comprising locating means for detecting the position of the data carrier  i.e. within the vehicle or within a certain distance from the vehicle0.073
H04L2012/5635Backpressure  e.g. for ABR0.073
G05D1/021specially adapted to land vehicles0.073
B60R2325/108Encryption0.073
B60R2325/101Bluetooth0.073
G05D2201/0213Road vehicle  e.g. car or truck0.073
G06F2201/84Using snapshots  i.e. a logical point-in-time copy of the data0.073
G06F11/2048where the redundant components share neither address space nor persistent storage0.073
A63F2300/538for performing operations on behalf of the game client  e.g. rendering0.073
G06F3/0607by facilitating the process of upgrading existing storage systems  e.g. for improving compatibility between host and storage device0.072
G06F2212/1041Resource optimization0.072
G06F2212/6022Using a prefetch buffer or dedicated prefetch cache0.072
G06F2212/1028Power efficiency0.072
G06F2212/171Portable consumer electronics  e.g. mobile phone0.072
G06F2212/452Instruction code0.072
G05B2219/31088Network communication between supervisor and cell  machine group0.072
G06Q30/0242Determination of advertisement effectiveness0.072
G05B2219/32252Scheduling production  machining  job shop0.072
G05B2219/31449Monitor workflow  to optimize business  industrial processes0.072
G05B2219/32128Gui graphical user interface0.072
G06F9/46Multiprogramming arrangements0.072
G06N3/088Non-supervised learning  e.g. competitive learning0.072
H04L41/5067Customer-centric quality of service [QoS] measurement0.072
H04L41/5048Automatic or semi-automatic definitions  e.g. definition templates0.072
H04L41/0863by rolling back to previous configuration versions0.072
H04L41/0233using object oriented techniques  e.g. common object request broker architecture [CORBA] for representation of network management data0.072
G06F2209/541Client-server0.072
G06F2212/465Structured object  e.g. database record0.072
G06F2212/604Details relating to cache allocation0.072
G06F2212/608Details relating to cache mapping0.072
H04L2209/601Broadcast encryption0.072
G06F2207/3824Accepting both fixed-point and floating-point numbers0.072
G06F9/30025Format conversion instructions  e.g. Floating-Point to Integer  decimal conversion0.072
H04L41/06involving management of faults or events or alarms0.072
G05B2219/31094Data exchange between modules  cells  devices  processors0.071
H04L1/188Time-out mechanisms0.071
H04W88/08Access point devices0.071
G09G2340/02Handling of images in compressed format  e.g. JPEG  MPEG0.071
G09G2320/103Detection of image changes  e.g. determination of an index representative of the image change0.071
G09G2310/04Partial updating of the display screen0.071
G09G2370/027Arrangements and methods specific for the display of internet documents0.071
G06F2212/3042being part of a memory device  e.g. cache DRAM0.071
G06F2201/885Monitoring specific for caches0.071
G06F2212/283Plural cache memories0.071
G06F2212/205Hybrid memory  e.g. using both volatile and non-volatile memory0.071
G06F11/3471Address tracing0.071
H04N1/4413involving the use of passwords  ID codes or the like  e.g. PIN0.071
G06Q2220/18Licensing0.071
G06F2221/0797using dedicated hardware at the client0.071
G06F2209/5022Workload threshold0.071
G06F2213/0026PCI express0.071
G06F2212/7208Multiple device management  e.g. distributing data over multiple flash devices0.071
G06F12/04Addressing variable-length words or parts of words0.071
G06F2212/154Networked environment0.071
G06F2212/163Server or database system0.071
H04M2203/6081Service authorization mechanisms0.070
G06F2212/271Non-uniform cache access [NUCA] architecture0.070
G06F2212/6024History based prefetching0.070
H04L2209/608Watermarking0.070
G06F2212/651Multi-level translation tables0.070
G06F2212/684TLB miss handling0.070
G06F2209/483Multiproc0.070
H04L2209/84Vehicles0.070
G06F2221/2119Authenticating web pages  e.g. with suspicious links0.070
H04L12/56Packet switching systems0.070
Y04S40/18Network protocols supporting networked applications  e.g. including control of end-device applications over a network0.070
Y04S40/20Information technology specific aspects0.070
H04W80/045involving different protocol versions  e.g. MIPv4 and MIPv60.070
H04L63/0254Stateful filtering0.070
G06F11/0778Dumping  i.e. gathering error/state information after a fault for later diagnosis0.070
G06F2221/2123Dummy operation0.070
G06F2212/621Coherency control relating to peripheral accessing  e.g. from DMA or I/O device0.070
G06F2221/2113Multi-level security  e.g. mandatory access control0.070
H04L43/062for traffic related reporting0.070
A63F2300/807Role playing or strategy games0.070
A63F2300/405being a wireless ad hoc network  e.g. Bluetooth  Wi-Fi  Pico net0.070
G08B19/00Alarms responsive to two or more different undesired or abnormal conditions  e.g. burglary and fire  abnormal temperature and abnormal rate of flow0.070
G06F2221/2129Authenticate client device independently of the user0.070
H04M2201/39using speech synthesis | speech synthesis | per se|  | (ref: G10L13/00)0.070
H04M2203/6009Personal information  e.g. profiles or personal directories being only provided to authorised persons0.070
H04M2203/252where a voice mode is enhanced with visual information0.070
H04M2203/306Prerecordings to be used during a voice call0.070
G05B2219/34121Edge generator0.070
G05B2219/24215Scada supervisory control and data acquisition0.070
G05B2219/31472Graphical display of process0.070
G05B2219/32411Derive control data from displayed element  logic for it and feedback data0.070
H04M3/4938comprising a voice browser which renders and interprets  e.g. VoiceXML0.069
H04M2201/40using speech recognition | speech recognition | per se|  | (ref: G10L15/00)0.069
G06F2221/0751Key | not used0.069
H04M2215/7846Transaction based0.069
H04M2215/78Metric aspects0.069
Y10S707/99953Recoverability0.069
G05B2219/31083In server store virtual nodes for controlled machines  with states for map0.069
G05B2219/33148CLS client server architecture  client consumes  server provides services0.069
G05B2219/31161Java programcode or simular active agents  programs  applets0.069
G02B2027/014comprising information/image processing systems0.069
G02B2027/0134of stereoscopic type0.069
G06T2210/08Bandwidth reduction0.069
G06F2009/45566Nested virtual machines0.069
G06F12/0207with multidimensional access  e.g. row/column  matrix0.069
H04L41/147for prediction of network behaviour0.069
G06T2207/10028Range image| Depth image| 3D point clouds0.069
G06T2207/20084Artificial neural networks [ANN]0.069
G06T2207/20081Training| Learning0.069
H04L2209/42Anonymization  e.g. involving pseudonyms0.069
H04M2250/06including a wireless LAN interface0.069
G06F2213/0058Bus-related hardware virtualisation0.069
G06T2219/2004Aligning objects  relative positioning of parts0.069
G06T2219/2016Rotation  translation  scaling0.069
G06T2207/10016Video| Image sequence0.069
G06T2207/30168Image quality inspection0.069
G06T2210/04Architectural design  interior design0.069
G05B2219/2639Energy management  use maximum of cheap power  keep peak load low0.069
Y04S20/222Demand response systems  e.g. load shedding  peak shaving0.069
Y02B70/3225Demand response systems  e.g. load shedding  peak shaving0.069
G06Q50/00Systems or methods specially adapted for specific business sectors  e.g. utilities or tourism | healthcare informatics | (ref: G16H)0.069
G05B2219/32339Object oriented modeling  design  analysis  implementation  simulation language0.069
G01V1/001Acoustic presence detection | measurement of sonic vibrations | (ref: G01H)| | alarm systems | (ref: G08B)0.069
G11C11/221using ferroelectric capacitors0.069
A61B2562/0271Thermal or temperature sensors0.069
A61B2562/0247Pressure sensors0.069
A61B2560/028Arrangements to prevent overuse  e.g. by counting the number of uses0.069
G06F11/004Error avoidance | (ref: G06F11/07)|  and subgroups take precedence0.069
G06F2211/1011Clustered RAID  i.e. clustered or de-clustered RAID where data and parity are spread over more disks than blocks in a parity group0.069
H04Q2209/40using a wireless architecture0.068
Y02E60/7807characterised by data transport means between the monitoring  controlling or managing units and monitored  controlled or operated electrical equipment0.068
G01D7/00Indicating measured values0.068
Y02E60/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation0.068
H04Q2209/823where the data is sent when the measured values exceed a threshold  e.g. sending an alarm0.068
Y04S10/30Systems characterised by state monitoring  e.g. fault  temperature monitoring  insulator monitoring  corona discharge0.068
H04Q2209/88Providing power supply at the sub-station0.068
H04M2207/18wireless networks0.068
G10L2015/0635updating or merging of old and new templates| Mean values| Weighting0.068
H04M2203/655Combination of telephone service and social networking | messaging within social networks | (ref: H04L51/32)0.068
Y02T90/12Electric charging stations0.068
G06Q2240/00Transportation facility access  e.g. fares  tolls or parking0.068
G06F3/1219with regard to consumables  e.g. ink  toner  paper0.068
G06F2211/006E-Mail0.068
G06F2201/805Real-time0.068
G06F11/2038with a single idle spare processing component0.068
G06F11/2041with more than one idle spare processing component0.068
H04L2209/88Medical equipments0.068
Y02T10/72Electric energy management in electromobility0.068
Y02T10/7072Electromobility specific charging systems or methods for batteries  ultracapacitors  supercapacitors or double-layer capacitors | efficient charging systems for batteries  ultracapacitors  supercapacitors or double-layer capacitors in road transportation in general | (ref: Y02T10/92)0.068
Y04S30/12Remote or cooperative charging0.068
Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles  i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV] | power aggregation of EV or HEV | (ref: Y02E60/721)0.068
Y02T90/16Information or communication technologies improving the operation of electric vehicles0.068
Y02T90/14Plug-in electric vehicles0.068
B60L2240/70Interactions with external data bases  e.g. traffic centres0.068
Y02T10/70Energy storage for electromobility | hydrogen internal combustion engines | (ref: Y02T90/42)| | fuel cell powered electric vehicles | (ref: Y02T90/34)0.068
H04L49/15Interconnection of switching modules0.068
G06F2209/5019Workload prediction0.068
H04W88/10adapted for operation in multiple networks  e.g. multi-mode access points0.068
G06F2009/45579I/O management (device drivers  storage access) | internal functioning of device drivers | (ref: G06F13/102)|   loading of device drivers | (ref: G06F9/4411)0.068
G05B2219/32331Network of coordinating planning systems for each cell  factory0.068
Y02P90/82Energy audits or management systems therefor0.068
G07C9/00Individual entry or exit registers0.068
G07C2009/00769with data transmission performed by wireless means0.068
G07C2009/00761with data transmission performed by connected means  e.g. mechanical contacts  plugs  connectors0.068
H04W72/005Resource management for broadcast services0.067
G10L13/086Detection of language0.067
G10L13/033Voice editing  e.g. manipulating the voice of the synthesiser0.067
H04M2250/04including near field communication means  e.g. RFID0.067
G06F2213/40Bus coupling0.067
Y10S707/99944Object-oriented database structure0.067
Y10S707/99945Object-oriented database structure processing0.067
H04W4/027using movement velocity  acceleration information0.067
G06F2213/28DMA0.067
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.