Validity Report
Full Report
US6928166B2 — Radio communication device and user authentication method for use therewith
Priority Date: 2000-04-28, Publication Date: 2005-08-09, Current Assignee: 2bcom LLCReport Generated: 2022-05-25

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
US6731731B11.355Authentication method  authentication system and recording mediumGRANT2004-05-041999-07-3016696444GreatComsquare Co LtdComsquare Co Ltd
EP0929025A11.294Password updating apparatus and recording medium used thereforGRANT1999-07-141998-01-1311592434GreatNEC CorpNEC Corp
US7150038B11.286Facilitating single sign-on by using authenticated code to access a password storeGRANT2006-12-122000-04-0637497446GreatOracle International CorpOracle International Corp
EP1075161A21.280Method and devices for controlling access of a user from a user's computer to an access computerGRANT2001-02-071999-08-057916840GreatAlcatel CIT SA, Alcatel SAAlcatel CIT SA, Alcatel Lucent SAS
EP0976017B11.279METHOD AND SYSTEM FOR PROVIDING PASSWORD PROTECTIONGRANT2003-01-221996-03-2724506089GreatSiemens Information and Communication Networks IncSiemens Communications Inc
US5812764A1.257Password management system over a communications networkGRANT1998-09-221997-01-3025154656GreatInternational Business Machines CorpInternational Business Machines Corp
EP0773489B11.212System for providing password synchronization and integrity in a DCE environmentGRANT2002-01-021995-11-1327415727GreatInternational Business Machines CorpInternational Business Machines Corp
EP0752636A21.210NIS+ password update protocolGRANT1997-01-081995-07-0523981207GreatSun Microsystems IncSun Microsystems Inc
EP1008023B11.202PROCEDURE FOR ACCESSING A SERVICE IN A DATA COMMUNICATION SYSTEM  AND A DATA COMMUNICATION SYSTEMGRANT2008-02-061997-08-278549436GreatTeliaSonera Finland OyjTeliaSonera Finland Oyj
EP1096358B11.199System for authenticating online content referenced in hardcopy documentsGRANT2006-03-291999-10-2823703692GreatXerox CorpXerox Corp
US6182229B11.196Password helper using a client-side master password which automatically presents the appropriate server-side password in a particular remote serverGRANT2001-01-301996-03-1324466318GreatSun Microsystems IncSun Microsystems Inc
EP1264490B11.193METHOD FOR ESTABLISHING THE AUTHENTICITY OF THE IDENTITY OF A SERVICE USER AND DEVICE FOR CARRYING OUT THE METHODGRANT2007-07-112000-02-217631680GreatE Plus Mobilfunk GmbH and Co KGE Plus Mobilfunk GmbH and Co KG
EP0683907A11.182METHOD FOR PROVIDING MUTUAL AUTHENTICATION OF A USER AND A SERVER ON A NETWORKGRANT1995-11-291993-12-1422608028GreatHughes Aircraft Co, HE Holdings IncDirecTV Group Inc, Raytheon Co
EP1190549A21.170METHOD AND SYSTEM FOR SECURELY ACCESSING A COMPUTER SERVERGRANT2002-03-271999-06-169546866Great
EP0780805B11.168Open metering system with super password vault accessGRANT2004-03-101995-12-1924297476GreatPitney Bowes IncPitney Bowes Inc
EP1038210B11.158METHOD  AND ASSOCIATED APPARATUS  FOR SELECTIVELY PERMITTING ACCESS BY A MOBILE TERMINAL TO A PACKET DATA NETWORKGRANT2004-04-281997-11-1925521634GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
EP0460216A11.155SECURITY MANAGEMENT METHOD IN A DECENTRALIZED DATA BASE SYSTEMGRANT1991-12-111989-09-1227582025GreatFujitsu LtdFujitsu Ltd
US4800590A1.023Computer key and computer lock systemGRANT1989-01-241985-01-1424775650GreatHIGGINS WILLIS EHIGGINS WILLIS E
US6067621A1.013User authentication system for authenticating an authorized user of an IC cardGRANT2000-05-231996-10-0519476333GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US6148404A0.922Authentication system using authentication information valid one-timeGRANT2000-11-141997-05-2815228678GreatNihon Unisys LtdNihon Unisys Ltd
US6678731B10.919Controlling access to a network server using an authentication ticketGRANT2004-01-131999-07-0829780487GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US6928558B10.918Method and arrangement for reliably identifying a user in a computer systemGRANT2005-08-091999-10-298555528GreatNokia Mobile Phones LtdNokia Oyj
WO1995010823A10.917PERSONAL IDENTIFICATION SYSTEMSAPPLICATION1995-04-201993-10-1510743650Great
US6904526B10.855System and method of authenticating individualsGRANT2005-06-072000-04-284578197Great
US20020015175A10.812Image forming systemAPPLICATION2002-02-071999-12-2818504245GreatMinolta Co LtdMinolta Co Ltd
US6092196A0.787HTTP distributed remote user authentication systemGRANT2000-07-181997-11-2525525542GreatNortel Networks LtdRPX Clearinghouse LLC
US7174564B10.763Secure wireless local area networkGRANT2007-02-061999-09-0323538265GreatIntel CorpIntel Corp
US5572193A0.737Method for authentication and protection of subscribers in telecommunications systemsGRANT1996-11-051990-12-0726728893GreatMotorola IncMotorola Mobility LLC
US6178511B10.735Coordinating user target logons in a single sign-on (SSO) environmentGRANT2001-01-231998-04-3022095422GreatInternational Business Machines CorpInternational Business Machines Corp
US5818936A0.727System and method for automically authenticating a user in a distributed network systemGRANT1998-10-061996-03-1524475690GreatMicro Focus Software IncEMC Corp
US20020026590A10.710System for authenticating access to a network  storage medium  program and method for authenticating access to a networkAPPLICATION2002-02-282000-03-1326587343GreatYahoo Japan CorpYahoo Japan Corp
US6539481B10.707Computer resource assignment of a temporary user from a computer pool of available identifiersGRANT2003-03-251997-11-0417904016GreatToshiba CorpToshiba Corp
US7290288B20.706Method and system for controlling access  by an authentication server  to protected computer resources provided via an internet protocol networkGRANT2007-10-301997-06-1141118015GreatPrism Technologies LLCPrism Technologies LLC
US6584454B10.700Method and apparatus for community management in remote system servicingGRANT2003-06-241999-12-3123894258GreatGE Medical Technology Services IncGeneral Electric Co, GE Medical Technology Services Inc
US6657538B10.697Method  system and devices for authenticating personsGRANT2003-12-021997-11-074550909GreatSwisscom Mobile AGIPR PARTNER AG
WO1999037055A10.675SYSTEM AND METHOD FOR PROVIDING SECURE REMOTE ACCESS TO A COMPUTER NETWORKAPPLICATION1999-07-221998-01-1621732101Great
US4802217A0.672Method and apparatus for securing access to a computer facilityGRANT1989-01-311985-06-0726821794GreatSiemens Corporate Research and Support IncSiemens Corporate Research and Support Inc
US4599489A0.667Solid state key for controlling access to computer softwareGRANT1986-07-081984-02-2224328614GreatGordian Systems IncVASCO Corp 1919 S HIGHLAND SUITE 118-C LOMBARD ILLINOIS 60148 A UTAH CORP, THUMBSCAN Inc
US6516416B20.659Subscription access system for use with an untrusted networkGRANT2003-02-041997-06-1125360154GreatPrism ResourcesPrism Technologies LLC
US6665530B10.651System and method for preventing replay attacks in wireless communicationGRANT2003-12-161998-07-3129711614GreatQualcomm IncQualcomm Inc
US6772331B10.649Method and apparatus for exclusively pairing wireless devicesGRANT2004-08-031999-05-2123230199GreatInternational Business Machines CorpInternational Business Machines Corp
US7085382B20.646Communication device  communication device set  authentication method and method of wireless-connecting terminalsGRANT2006-08-011999-12-2718495120GreatNEC CorpNEC Personal Computers Ltd
US6246871B10.642Method and apparatus for providing access of messages to multiple recipients in cellular networksGRANT2001-06-121999-09-2423601748GreatNokia Networks OyNokia Technologies Oy
US6678683B10.640Document management system using an access-limited character train and password  and a method and computer-readable medium thereforGRANT2004-01-131996-12-2734680498GreatCanon IncCanon Inc
US6889328B10.639Method and apparatus for secure communicationGRANT2005-05-031999-05-2826834309GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6766160B10.629Apparatus  and associated method  for facilitating authentication of communication stations in a mobile communication systemGRANT2004-07-202000-04-1124181056GreatNokia OyjNokia Solutions and Networks Oy
US5825300A0.622Method of protected distribution of keying and certificate materialGRANT1998-10-201993-11-0822527020GreatHughes Aircraft CoALLEN SYSTEMS GROUP Inc, KK SPJC & Co
US5347580A0.621Authentication method and system with a smartcardGRANT1994-09-131992-04-238211910GreatInternational Business Machines CorpInternational Business Machines Corp
US6075860A0.618Apparatus and method for authentication and encryption of a remote terminal over a wireless linkGRANT2000-06-131997-02-1925182762Great3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US6148406A0.617Access control password generated as a function of random numbersGRANT2000-11-141995-04-2725662979Great
US5960085A0.601Security badge for automated access control and secure data gatheringGRANT1999-09-281997-04-1425267411GreatSouthwest Technology Innovations LLCSOUTHWEST TECHNOLOGY INNOIVATIONS LLC
US6182142B10.590Distributed access management of information resourcesGRANT2001-01-301998-07-1022350479GreatEncommerce IncEntrust Ltd
US20030208684A10.587Method and apparatus for reducing on-line fraud using personal digital identificationAPPLICATION2003-11-062000-03-0822691055GreatAURORA WIRELESS TECHNOLOGIES LtdAURORA WIRELESS TECHNOLOGIES Ltd
US5163147A0.586Computer system with file security functionGRANT1992-11-101989-08-3116828805GreatToshiba CorpToshiba Corp
US7024690B10.584Protected mutual authentication over an unsecured wireless communication channelGRANT2006-04-042000-04-2836102176Great3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US6084967A0.582Radio telecommunication device and method of authenticating a user with a voice authentication tokenGRANT2000-07-041997-10-2925503208GreatMotorola IncGoogle Technology Holdings LLC
US5884312A0.582System and method for securely accessing information from disparate data sources through a networkGRANT1999-03-161997-02-2825203997GreatElectronic Data Systems LLCEDS OF CANADA Ltd Corp OF PROVINCE OF ONTARIO CANADA, Ent Services Development Corp LP
US5729537A0.567Method and apparatus for providing anonymous data transfer in a communication systemGRANT1998-03-171996-06-1424666524GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6157826A0.566Authentication key generation method and apparatusGRANT2000-12-051998-04-2819536804GreatDaewoo Telecom LtdMercury Corp
US6775782B10.565System and method for suspending and resuming digital certificates in a certificate-based user authentication application systemGRANT2004-08-101999-03-3132823618GreatInternational Business Machines CorpSnap Inc
US6212635B10.562Network security system allowing access and modification to a security subsystem after initial installation when a master token is in placeGRANT2001-04-031997-07-1827359054GreatVortex Pathway LLCVortex Pathway LLC
US6128389A0.560Authentication key management system and methodGRANT2000-10-031997-01-3125157157GreatSynacom Tech IncSynacom Tech Inc
US6734886B10.548Method of customizing a browsing experience on a world-wide-web siteGRANT2004-05-111999-12-2123862426GreatPersonalPath Systems IncPersonalPath Systems Inc
US6513117B20.542Certificate handling for digital rights management systemGRANT2003-01-281998-03-0446203459GreatGemstar Development CorpRovi Technologies Corp, Gemstar Development Corp
US20010017712A10.532Output terminal apparatus for printing data by emailAPPLICATION2001-08-302000-02-1627481039GreatRicoh Co LtdRicoh Co Ltd
US6742116B10.529Security method  security software and security system for electronic communicationsGRANT2004-05-251998-09-3017577002GreatFujitsu LtdFujitsu Ltd
US7912856B20.528Adaptive encryptionGRANT2011-03-221998-06-2939618538GreatSonicWall LLCMARSHMAN RESEARCH LLC, Quest Software Inc, PSM Merger Sub Delaware Inc
US6735429B10.524Methods and systems to substantially prevent fraudulent use of a wireless unit roaming in a visited systemGRANT2004-05-111998-11-0522315520GreatBellSouth Intellectual Property CorpFar North Patents LLC, Xylon LLC
US5602916A0.504Method and apparatus for preventing unauthorized monitoring of wireless data transmissionsGRANT1997-02-111994-10-0523234737GreatMotorola IncGoogle Technology Holdings LLC
US6556819B20.504Safe zones for portable electronic devicesGRANT2003-04-291999-09-1723574991GreatEricsson IncEricsson Inc
US6202157B10.500Computer network security system and method having unilateral enforceable security policy provisionGRANT2001-03-131997-12-0825532442GreatEntrust LtdEntrust Ltd
US5745576A0.491Method and apparatus for initialization of cryptographic terminalGRANT1998-04-281996-05-1724610710GreatVisa International Service AssociationVisa International Service Association
US6185567B10.488Authenticated access to internet based research and data servicesGRANT2001-02-061998-05-2922203592GreatUniversity of Pennsylvania PennUniversity of Pennsylvania Penn
US6321094B10.486Access method through radio mobile communication systemGRANT2001-11-201997-01-3111959142GreatNEC CorpLenovo Innovations Ltd Hong Kong
US4888800A0.480Secure messaging systemsGRANT1989-12-191987-03-0310613228GreatHewlett Packard CoHP Inc
US4799061A0.476Secure component authentication systemGRANT1989-01-171985-11-1825175720GreatInternational Business Machines CorpInternational Business Machines Corp
US7403510B10.472Communication terminal apparatus  communication method thereof  and connected destination selection method in wireless LANGRANT2008-07-221999-11-1037745034GreatFujifilm CorpFujifilm Corp
US5553143A0.469Method and apparatus for electronic licensingGRANT1996-09-031994-02-0422708531GreatMicro Focus Software IncRPX Corp
US7382882B10.465Secure session set up based on the wireless application protocolGRANT2008-06-031998-07-038098428GreatNokia OyjNokia Oyj, Nokia Technologies Oy
WO2001074011A10.464A SHORT RANGE RADIO TRANSCEIVER DEVICEAPPLICATION2001-10-042000-03-299888665Great
US5742905A0.463Personal communications internetworkingGRANT1998-04-211994-09-1923197780GreatTelcordia Technologies IncAccess Co Ltd
US6510349B10.461Adaptive data security system and methodGRANT2003-01-211997-10-2822049973GreatGeorgia Tech Research CorpGeorgia Tech Research Corp
US6052787A0.460Process for group-based cryptographic code management between a first computer unit and group computer unitsGRANT2000-04-181996-06-057796259GreatSiemens AGSiemens AG
US7322041B20.458Authentication and security in wireless communication systemGRANT2008-01-221997-12-1025534194GreatIntel CorpIntel Corp
US5790548A0.457Universal access multimedia data networkGRANT1998-08-041996-04-1824544227GreatBell Atlantic Network Services IncIntellectual Ventures II LLC
US6470447B10.457Enabling conformance to legislative requirements for mobile devicesGRANT2002-10-221999-03-3110850641GreatInternational Business Machines CorpInternational Business Machines Corp
US7171662B10.456System and method for software licensingGRANT2007-01-301998-03-1834555086GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US20050154730A10.453Systems and methods for managing database authentication and sessionsAPPLICATION2005-07-142000-04-2736588375GreatProquest LLCProquest LLC
US20010034846A10.452Digital data and software security protectionAPPLICATION2001-10-252000-02-2826881153Great
US20050144437A10.450System and method for assigning an identity to an intelligent electronic deviceAPPLICATION2005-06-301994-12-3036087561GreatPower Measurement LtdPower Measurement Ltd
US7305475B20.449System and method for enabling a client application to operate offline from a serverGRANT2007-12-041999-10-1232033167GreatWebMD Health CorpWebMD Health Corp
US6675208B10.449Registration scheme for networkGRANT2004-01-061997-10-1426741648GoodLucent Technologies IncNokia of America Corp
WO1997034429A10.448METHOD AND SYSTEM FOR SUPPORTING PACS USING A GSM MOBILE SWITCHING CENTERAPPLICATION1997-09-181996-03-1324389125Good
US6990591B10.447Method and system for remotely configuring and monitoring a communication deviceGRANT2006-01-241999-11-1826862122GoodSecureWorks IncSecureWorks Inc, LURHQ Corp
US7606936B20.444System and method for redirecting data to a wireless device over a plurality of communication pathsGRANT2009-10-201998-05-2927375718GoodResearch in Motion LtdBlackBerry Ltd
WO2000001187A10.444SUBSCRIBER VALIDATION METHOD IN CELLULAR COMMUNICATION SYSTEMAPPLICATION2000-01-061998-06-2622304658Good
US6868403B10.442Secure online music distribution systemGRANT2005-03-151998-02-0621796331GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5910987A0.440Systems and methods for secure transaction management and electronic rights protectionGRANT1999-06-081995-02-1323532729GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7680819B10.439Managing digital identity informationGRANT2010-03-161999-11-1241819595GoodMicro Focus Software IncEMC Corp, Micro Focus Software Inc
US7225333B20.436Secure processor architecture for use with a digital rights management (DRM) system on a computing deviceGRANT2007-05-291999-03-2726824866GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6219652B10.436Network license authenticationGRANT2001-04-171998-06-0122209431GoodMicro Focus Software IncRPX Corp
US6189146B10.436System and method for software licensingGRANT2001-02-131998-03-1821913104GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6760324B10.435Method  system  and computer program product for providing voice over the internet communicationGRANT2004-07-061999-09-1032595030GoodArray Telecom CorpChemtron Research LLC
US5214789A0.434Radio channel allocation based on location of mobile usersGRANT1993-05-251989-11-1723737448GoodUniden America CorpUniden America Corp
US6169976B10.432Method and apparatus for regulating the use of licensed productsGRANT2001-01-021998-07-0222328586GoodEncommerce IncEntrust Ltd
US5703949A0.428Method for establishing secure communications among processing devicesGRANT1997-12-301994-04-2822881494GoodCitibank NACitibank NA
EP1037482A20.426Apparatus and method for location-dependent setting of air interface parameters of a mobile radio deviceGRANT2000-09-201998-12-2418488740GoodToshiba CorpToshiba Corp
US20020032853A10.426Secure dynamic link allocation system for mobile data communicationAPPLICATION2002-03-142000-04-1727393833GoodAirbiquity IncAirbiquity Inc
US6625455B10.423Portable telephone system and communication control method for portable telephone set in a restricted zoneGRANT2003-09-231997-08-1116854264GoodNEC CorpNEC Corp
US7613659B10.422System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouseGRANT2009-11-031994-11-2823577333GoodYOU Technology IncINDIVOS Corp A DELAWARE CORPORATION, Open Invention Network LLC, Excel Innovations Inc
US5574979A0.421Periodic interference avoidance in a wireless radio frequency communication systemGRANT1996-11-121994-06-0322961717GoodNorand CorpAvago Technologies International Sales Pte Ltd
US5023907A0.420Network license serverGRANT1991-06-111988-09-3022956512GoodApollo Computer IncHP Inc, Apollo Computer Inc
US6493550B10.417System proximity detection by mobile stationsGRANT2002-12-101998-11-2022724340GoodEricsson IncEricsson Inc
US20020010681A10.416Method and system for licensing digital worksAPPLICATION2002-01-242000-04-2826895558GoodJ RIVER IncJ RIVER Inc
EP0964560A10.415Method and system for terminal mobilityGRANT1999-12-151998-06-1222258435GoodNortel Networks CorpNortel Networks Ltd
US6091956A0.415Situation information systemGRANT2000-07-181997-06-1225362705GoodLBS INNOVATIONS LLCLBS INNOVATIONS LLC
US20020064149A10.415System and method for providing requested quality of service in a hybrid networkAPPLICATION2002-05-301996-11-1825024073GoodVerizon Patent and Licensing IncVerizon Patent and Licensing Inc
US5949776A0.414Hierarchical communication system using premises  peripheral and vehicular local area networkingGRANT1999-09-071990-01-1827586167GoodNorand CorpAvago Technologies International Sales Pte Ltd
US20050187883A10.412METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONS USING BIOMETRICSAPPLICATION2005-08-251999-08-3146304546GoodAmerican Express Travel Related Services Co IncLiberty Peak Ventures LLC
US6393271B10.410System and method for wireline based registration of wireless deviceGRANT2002-05-211999-03-0122986578GoodQwest Communications International IncQwest Communications International Inc
WO2001008435A10.408METHOD AND ASSOCIATED DEVICES FOR SETTING THE SECURITY LEVEL OF CRYPTOGRAPHIC FUNCTIONSAPPLICATION2001-02-011999-07-214551702Good
US8949456B20.406System and method for redirecting data to a wireless device over a plurality of communication pathsGRANT2015-02-031998-05-2946329580GoodBlackBerry LtdBlackBerry Ltd
US20010029832A10.405Information processing device  information processing method  and recording mediumAPPLICATION2001-10-182000-02-1518560449GoodSony CorpSony Corp
US20050120082A10.405Managed peer-to-peer applications  systems and methods for distributed data access and storageAPPLICATION2005-06-021999-12-0234619471GoodSenvid IncWestern Digital Technologies Inc
US7035410B10.404Method and apparatus for enhanced security in a broadband telephony networkGRANT2006-04-251999-03-0136191112GoodAT&T CorpAT&T Corp
WO1997014258A10.403METHOD AND SYSTEM FOR OVER-THE-AIR (OTA) SERVICE PROGRAMMINGAPPLICATION1997-04-171995-10-1021713679Good
EP1071253A10.403Securing feature activation in a telecommunication systemGRANT2001-01-241999-07-2023406598GoodLucent Technologies IncNokia of America Corp
US5126728A0.402ADP security device for labeled dataGRANT1992-06-301989-06-0723426437Good
US5771352A0.399Communication control apparatus and methodGRANT1998-06-231994-04-1427301928GoodToshiba CorpToshiba Corp
US5960086A0.398Unified end-to-end security methods and systems for operating on insecure networksGRANT1999-09-281995-11-0224203660GoodTri Strata Security IncATALLA Ltd LLC, TRI-STRATA SECURITY Inc, Comdisco Inc, Tri Strata Security Inc
EP0830046A20.397Transmission restriction for a mobile stationGRANT1998-03-181996-09-1317097758GoodNEC CorpNEC Electronics Corp
US5629980A0.395System for controlling the distribution and use of digital worksGRANT1997-05-131994-11-2323348793GoodXerox CorpContentguard Holdings Inc
US6421544B10.395Radio communication system  control method thereof  and radio communication terminalGRANT2002-07-161997-10-2417784700GoodCasio Computer Co LtdCasio Computer Co Ltd
US7035625B20.395Adaptive communication data retrieval systemGRANT2006-04-252000-01-2823963416GoodLeap Wireless International IncIntel Corp
US7016666B20.395Method for verifying in a mobile device the authenticity of electronic certificates issued by a certification authority and corresponding identification moduleGRANT2006-03-211999-10-014218971GoodSwisscom Mobile AGVl Collective Ip LLC, Vl Ip Holdings LLC
US5864620A0.393Method and system for controlling distribution of software in a multitiered distribution chainGRANT1999-01-261996-04-2424562118GoodCyberSource CorpInternet Commerce Services Corp
US5230020A0.393Algorithm independent cryptographic key managementGRANT1993-07-201991-10-1627119376GoodMotorola IncGeneral Dynamics Mission Systems Inc
US7319874B20.390Dual mode terminal for accessing a cellular network directly or via a wireless intranetGRANT2008-01-151998-03-1827444261GoodNokia OyjNokia Technologies Oy
US6557105B10.390Apparatus and method for cryptographic-based license managementGRANT2003-04-291999-04-1423122430GoodTut Systems IncArris Technology Inc
US6832093B10.389Method and system for restricting the operation of a radio device within a certain areaGRANT2004-12-141998-10-308552821GoodNokia Mobile Phones LtdNokia Oyj
US20020160806A10.389Wireless private branch exchange (WPBX) and communicating between mobile units and base stationsAPPLICATION2002-10-312000-04-0727393413GoodCommil LtdCommil USA LLC
US5179591A0.387Method for algorithm independent cryptographic key managementGRANT1993-01-121991-10-1625111562GoodMotorola IncGeneral Dynamics Mission Systems Inc
US7032113B20.387Network enabled application software system and methodGRANT2006-04-182000-04-2822742533GoodMoldflow Ireland LtdMoldflow Netherlands Ltd
EP1059766A20.387Network device managing apparatus and methodGRANT2000-12-131999-06-1115814863GoodCanon IncCanon Inc
EP1079648A10.386International roaming service for permitting a cellular/wireless telephone instrument to access different wireless telephone network/systemsGRANT2001-02-281999-08-2723517376GoodAT&T Corp, AT&T Wireless Services IncAT&T Corp, AT&T Mobility II LLC, AT&T Wireless Services Inc
US6621809B10.386Device and method for gating transmission in a CDMA mobile communication systemGRANT2003-09-161998-12-0727349862GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US6957344B10.385Manufacturing trusted devicesGRANT2005-10-181999-07-0935066307GoodDigital Video Express LPGoogle LLC
US6047242A0.385Computer system for protecting software and a method for protecting softwareGRANT2000-04-041997-05-288230130GoodSiemens AGFujitsu Technology Solutions GmbH
US6343280B20.385Distributed execution software license serverGRANT2002-01-291998-12-1522790737Good
US5790664A0.383Automated system for management of licensed softwareGRANT1998-08-041996-02-2624430733GoodNetwork Engr Software IncSCIENTIFIC RESEARCH MANAGEMENT Corp, GraphOn Corp
WO1995032592A10.383PROCESS FOR SUBSCRIBER DATA TRANSMISSION WHEN CHANGING THE RADIOCOMMUNICATION SYSTEMAPPLICATION1995-11-301994-05-206518638Good
US6026165A0.382Secure communications in a wireless systemGRANT2000-02-151996-06-2024679903GoodPittway CorpHoneywell International Inc
US6163695A0.381Mobile communication system and mobile communication method thereofGRANT2000-12-191997-04-1614239643GoodNEC CorpRenesas Electronics Corp
US6597895B10.381Radio terminal and method for controlling the sameGRANT2003-07-221999-06-0815726488GoodNEC CorpLenovo Innovations Ltd Hong Kong
US6023766A0.377Software license control system and software license control equipmentGRANT2000-02-081997-02-1412317034GoodFujitsu LtdSocionext Inc
US5968176A0.376Multilayer firewall systemGRANT1999-10-191997-05-2925345607Good3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US8230088B20.376Remote computer system management through an FTP internet connectionGRANT2012-07-241999-10-1840118798GoodCisco Technology IncCisco Technology Inc
US6615041B20.373Methods and systems for providing information to a home system regarding a wireless unit roaming in a visited systemGRANT2003-09-021998-11-0526804543GoodBellSouth Intellectual Property CorpFar North Patents LLC
US7073063B20.373Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the likeGRANT2006-07-041999-03-2725399856GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5629710A0.372Apparatus for acquiring the position of a mobile stationGRANT1997-05-131994-03-1612722063GoodFujitsu LtdFujitsu Ltd
US6438385B10.370Mobile communication devicesGRANT2002-08-201996-06-178546232GoodNokia Mobile Phones LtdNokia Technologies Oy
US6498791B20.370Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for performing telephony and data functions using the sameGRANT2002-12-241998-04-0327568094GoodVertical Networks IncRPX Corp, Vertical Networks Inc
US6920567B10.370System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content filesGRANT2005-07-191999-04-0734742619GoodViatech Tech IncViatech Tech Inc
US6370380B10.370Method for secure handoverGRANT2002-04-091999-02-1722951794GoodTelefonaktiebolaget LM Ericsson ABWi-Fi One LLC
US4651157A0.370Security monitoring and tracking systemGRANT1987-03-171985-05-0724938845GoodMETS IncHarris Corp
EP0874300A20.369Information transmission  reception and recordingGRANT1998-10-281997-04-2327310657GoodSony CorpSony Corp
US6223291B10.369Secure wireless electronic-commerce system with digital product certificates and digital license certificatesGRANT2001-04-241999-03-2623060280GoodMotorola IncGoogle Technology Holdings LLC
US6463534B10.368Secure wireless electronic-commerce system with wireless network domainGRANT2002-10-081999-03-2623058927GoodMotorola IncGoogle Technology Holdings LLC
US5956505A0.368Remote activation of software features in a data processing deviceGRANT1999-09-211991-12-2425211406GoodPitney Bowes IncPitney Bowes Inc
US6820063B10.368Controlling access to content based on certificates and access predicatesGRANT2004-11-161998-10-2633422442GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US4471216A0.368System and process for identification of persons requesting access to particular facilitiesGRANT1984-09-111979-11-099231507GoodBull SAINTERNATIONALE POUR L'INFORMATIQUE CII-HONEYWELL BULL A CORP OF FRANCE Cie, Bull SA
US5708709A0.366System and method for managing try-and-buy usage of application programsGRANT1998-01-131995-12-0824276928GoodSun Microsystems IncOracle America Inc
US5768510A0.366Object-oriented system  method and article of manufacture for a client-server application enabler systemGRANT1998-06-161996-07-0124709605GoodSun Microsystems IncOracle America Inc
US5940504A0.366Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's siteGRANT1999-08-171991-07-0127110940GoodInfologic Software IncIntertrust Technologies Corp
US6356192B10.365Bi-directional wireless detection systemGRANT2002-03-121998-10-2346203675GoodRoyal Thoughts LLCKoninklijke Philips NV, Royal Thoughts LLC
US5943610A0.364Transmission power control with dynamic step valuesGRANT1999-08-241996-04-0513801928GoodNEC CorpNEC Corp
US6816842B10.364Method and apparatus for automatically processing business contract information into licensed end-user applicationGRANT2004-11-091999-12-3123890174GoodGE Medical Technology Services IncGeneral Electric Co, GE Medical Technology Services Inc
US5758068A0.363Method and apparatus for software license managementGRANT1998-05-261995-09-1924112239GoodInternational Business Machines CorpInternational Business Machines Corp
US9924216B20.363System and process for distribution of information on a communication networkGRANT2018-03-202000-03-2122703716GoodGEOCOM LLCGEOCOM LLC
US6314565B10.361System and method for automated identification  retrieval  and installation of multimedia software componentsGRANT2001-11-061997-05-1922100792GoodIntervu IncIntervu Inc
US5717604A0.361Network monitoring system for tracking  billing and recovering licensesGRANT1998-02-101995-05-2523788831Good
US20010001268A10.359Wireless local loop system supporting voice/IPAPPLICATION2001-05-171998-12-2322819675GoodOpuswave Networks IncOpuswave Networks Inc
US20050060549A10.357Controlling access to content based on certificates and access predicatesAPPLICATION2005-03-171998-10-2646303145GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5758069A0.353Electronic licensing systemGRANT1998-05-261996-03-1524485467GoodMicro Focus Software IncRPX Corp
US5678194A0.353Method for providing geographic dependent instructions to a user of a communications unitGRANT1997-10-141994-03-1022780235GoodMotorola IncGoogle Technology Holdings LLC
US6865608B20.352Method and system for simplified access to internet content on a wireless deviceGRANT2005-03-082000-03-3127393247GoodNeomedia Technologies IncNm LLC
US6381747B10.350Method for controlling copy protection in digital video networksGRANT2002-04-301996-04-0121767032GoodMacrovision CorpRovi Solutions Corp
US6417933B10.349Teleconferencing and facsimile communications system and methodGRANT2002-07-091996-12-2625099936GoodLucent Technologies IncNokia of America Corp
US7460859B20.349System and method for obtaining a status of an authorization device over a network for administration of theatrical performancesGRANT2008-12-021997-11-0346323736GoodRobelight LLC, Intellectual Ventures Fund 30 LLCFar North Patents LLC, Robelight LLC
US6799036B20.348Communication controller  base station controller and communication systemGRANT2004-09-281999-12-0814237517GoodFujitsu LtdFujitsu Ltd
US7110983B20.348Methods for matching  selecting  narrowcasting  and/or classifying based on rights management and/or other informationGRANT2006-09-191997-11-0627052814GoodIntertrust Technologies CorpIntertrust Technologies Corp
US20050154877A10.347Creating and storing one or more digital certificates assigned to subscriber for efficient access using a chip cardAPPLICATION2005-07-141999-10-2726858051GoodVisa International Service AssociationVisa International Service Association
US6009401A0.347Relicensing of electronically purchased softwareGRANT1999-12-281998-04-0621996784GoodPreview Systems IncSafeNet Data Security Israel Ltd
US4550443A0.347Method and apparatus for dynamically selecting transmitters for communications between a primary station and remote stations of a data communications systemGRANT1985-10-291982-11-1227032766GoodMotorola IncMotorola Solutions Inc
US8464359B20.345System and method for obtaining a status of an authorization device over a networkGRANT2013-06-111997-11-0336763072GoodIntellectual Ventures Fund 30 LLCFar North Patents LLC, Robelight LLC
US5956716A0.345System and method for delivery of video data over a computer networkGRANT1999-09-211995-06-0723932199GoodIntervu IncIntervu Inc
US6865609B10.345Multimedia extensions for wireless local area networkGRANT2005-03-081999-08-1734222258GoodSharewave IncCirrus Logic Inc
US6904529B10.345Method and system for protecting a security parameter negotiation server against denial-of-service attacksGRANT2005-06-072000-04-2834619690GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5905860A0.344Fault tolerant electronic licensing systemGRANT1999-05-181996-03-1546253299GoodMicro Focus Software IncRPX Corp
US6643517B10.343Method of using location information for interference protectionGRANT2003-11-041999-10-1529270836GoodNortel Networks LtdApple Inc
US6201973B10.342Mobile communication apparatusGRANT2001-03-131997-03-2813654570GoodNEC CorpNEC Corp
US6246891B10.342Active prevention of radio frequency emissions from a mobile communications unit in restricted areasGRANT2001-06-121996-12-2020405096GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
EP0779760A10.340Method for indicating enciphering of data transmission between a mobile communication network and a mobile stationGRANT1997-06-181995-12-158544551GoodNokia Mobile Phones LtdNokia Oyj
US7280642B20.340Status monitoring system utilizing an RFID monitoring systemGRANT2007-10-091997-11-0336201481GoodIntellectual Ventures Fund 30 LLCFar North Patents LLC, Robelight LLC, Xylon LLC
US6687506B10.337Radiotelephone filtering apparatusGRANT2004-02-031997-06-0226233589Good
US6463289B10.337System and method for providing restricting positioning of a target mobile station based on the calculated location estimateGRANT2002-10-081999-08-0923461848GoodEricsson IncEricsson Inc
US5790074A0.336Automated location verification and authorization system for electronic devicesGRANT1998-08-041996-08-1524770284GoodEricsson IncEricsson Business Networks AB
US5442805A0.336Location-based adaptive radio controlGRANT1995-08-151988-10-0526943339GoodMotorola IncMotorola Solutions Inc
US7213048B10.335Context aware computing devices and methodsGRANT2007-05-012000-04-0524166394GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20010021980A10.334Method for entering a key code in an electronic device  and an electronic deviceAPPLICATION2001-09-132000-03-088557871GoodNokia Mobile Phones LtdNokia Oyj
US7743074B10.333Context aware systems and methods utilizing hierarchical tree structuresGRANT2010-06-222000-04-0524171410GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7076255B20.333Context-aware and location-aware cellular phones and methodsGRANT2006-07-112000-04-0525002905GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US4993068A0.333Unforgeable personal identification systemGRANT1991-02-121989-11-2723753427GoodMotorola IncMotorola Solutions Inc
US6115390A0.333Bandwidth reservation and collision resolution method for multiple access communication networks where remote hosts send reservation requests to a base station for randomly chosen minislotsGRANT2000-09-051997-10-1427370127GoodLucent Technologies IncNokia of America Corp
US6345294B10.331Methods and apparatus for remote configuration of an appliance on a networkGRANT2002-02-051999-04-1923135150GoodCisco Technology IncCisco Technology Inc
US6141531A0.331Local wireless communication system with external communications linkGRANT2000-10-311997-11-2626741760GoodDirect Wireless CorpDirect Wireless Corp, Wahoo Communications Corp
US7383205B10.331Structure of a digital content packageGRANT2008-06-031999-03-2727383450GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6981222B20.329End-to-end transaction processing and statusing system and methodGRANT2005-12-271998-10-2227379896GoodMade2Manage Systems IncConsona Corp, E2E Processing Inc
US5903832A0.329Mobile terminal having enhanced system selection capabilityGRANT1999-05-111995-12-2124303644GoodNokia Mobile Phones LtdNokia Technologies Oy
US6973444B10.328Method for interdependently validating a digital content package and a corresponding digital licenseGRANT2005-12-061999-03-2727383451GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20060089912A10.327Updating usage conditions in lieu of download digital rights management protected contentAPPLICATION2006-04-271998-08-1336974618GoodInternational Business Machines CorpInternational Business Machines Corp
US5329570A0.326Copy protection of software for use in a private branch exchange switchGRANT1994-07-121992-12-0325530895GoodAT&T Bell Laboratories IncAT&T Corp, Avaya Inc
US7421486B10.326Context translation methods and systemsGRANT2008-09-022000-04-0539718476GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6567416B10.326Method for access control in a multiple access system for communications networksGRANT2003-05-201997-10-1427370132GoodLucent Technologies IncNokia of America Corp, WSOU Investments LLC
US6134660A0.324Method for revoking computer backup files using cryptographic techniquesGRANT2000-10-171997-06-3025386827GoodTelcordia Technologies IncTumbleweed Holdings LLC, Xylon LLC
US6006016A0.323Network fault correlationGRANT1999-12-211994-11-1026990533GoodBay Networks IncNortel Networks Ltd, Nortel Networks NA Inc
US6070245A0.319Application interface method and system for encryption controlGRANT2000-05-301997-11-2525525974GoodInternational Business Machines CorpInternational Business Machines Corp
US6292900B10.318Multilevel security attribute passing methods  apparatuses  and computer program products in a streamGRANT2001-09-181996-12-1822752084GoodSun Microsystems IncOracle America Inc
WO2000014980A10.316METHOD IN WIRELESS TELECOMMUNICATION SYSTEM| SYSTEM  TRANSMITTER AND RECEIVERAPPLICATION2000-03-161998-09-088552443Good
US6728784B10.316Collaborative multimedia architecture for packet-switched data networksGRANT2004-04-271996-08-2132110690GoodNetSpeak CorpNet2phone Inc
US6360320B20.314INFORMATION PROCESSING APPARATUS  INFORMATION PROCESSING METHOD  INFORMATION PROCESSING SYSTEM AND RECORDING MEDIUM USING AN APPARATUS ID AND PROVIDED LICENSE KEY FOR AUTHENTICATION OF EACH INFORMATION TO BE PROCESSEDGRANT2002-03-191997-04-2327310656GoodSony CorpSony Corp
US6151309A0.314Service provision system for communications networksGRANT2000-11-211994-04-288217672GoodBritish Telecommunications PLCBritish Telecommunications PLC
US20030055816A10.314Recommending search terms using collaborative filtering and web spideringAPPLICATION2003-03-201999-05-2821800117GoodOverture Services IncYahoo Inc, R2 Solutions LLC
US5678182A0.314Self-locating radio system that automatically configures to the radio regulations for the locationGRANT1997-10-141995-06-1923953008GoodTrimble Navigation LtdTrimble Inc
US5563946A0.312Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systemsGRANT1996-10-081994-04-2522897809GoodInternational Business Machines CorpActivision Publishing Inc
US5428663A0.312Incoming communications forwarding technique utilizing a called party location indicatorGRANT1995-06-271991-10-0925098384GoodAT&T CorpAT&T Corp, Avaya Inc
US7206849B10.311Communication in a wireless communications network when a mobile computer terminal may be unreachableGRANT2007-04-171998-10-0537914226GoodSymbol Technologies LLCSymbol Technologies LLC
US6904523B20.310Method and system for enforcing access to a computing resource using a licensing attribute certificateGRANT2005-06-071999-03-0823005610GoodSpyrus IncSPEX TECHNOLOGIES Inc
US6230017B10.309Geographical restriction in cellular telecommunications networkGRANT2001-05-081997-07-3126733100GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6718175B10.307Method and a system relating to a mobile communication deviceGRANT2004-04-061999-06-0820415970GoodTelefonaktiebolaget LM Ericsson ABOptis Wireless Technology LLC, Cluster LLC
US6085096A0.307Mobile communication systemGRANT2000-07-041996-09-1317093761GoodNEC CorpNEC Corp
US5671412A0.306License management system for software applicationsGRANT1997-09-231995-07-2824024258GoodGlobetrotter Software IncFlexera Software LLC
US5958005A0.304Electronic mail securityGRANT1999-09-281997-07-1725405009GoodBell Atlantic Network Services IncSnapchat Inc
US5935243A0.304Licensee notification systemGRANT1999-08-101995-08-3116812194GoodFujitsu LtdFujitsu Ltd
US6374078B10.304Wireless communication system with multiple external communication linksGRANT2002-04-161998-04-1724334800GoodDirect Wireless CorpDirect Wireless Corp, Wahoo Communications Corp
US6574612B10.303License management systemGRANT2003-06-031999-02-1910848078GoodInternational Business Machines CorpInternational Business Machines Corp
US6633757B10.302Adjacency-bound service discoveryGRANT2003-10-141999-01-298237469GoodInternational Business Machines CorpWistron Corp
US6615347B10.301Digital certificate cross-referencingGRANT2003-09-021998-06-3027765473GoodVerisign IncDigicert Inc
WO2001063843A10.299A METHOD AND EQUIPMENT FOR ACCESSING A TELECOMMUNICATION NETWORKAPPLICATION2001-08-302000-02-248557714Good
US5926546A0.299Communication device and system for mobile encrypted communicationGRANT1999-07-201995-10-1917497015GoodDenso CorpDenso Corp
US7733885B20.299Extending access to a device in a limited connectivity network to devices residing outside the limited connectivity networkGRANT2010-06-082000-02-1834280014GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5809142A0.298Method and system for calculating a user account balance in a recognition systemGRANT1998-09-151996-08-1424797567GoodTexas Instruments IncTexas Instruments Inc
US4780821A0.296Method for multiple programs management within a network having a server computer and a plurality of remote computersGRANT1988-10-251986-07-2925396610GoodInternational Business Machines CorpInternational Business Machines Corp
US6772133B10.295Information recording device and information reproducting deviceGRANT2004-08-031999-03-0513097388GoodToshiba CorpToshiba Corp
WO1993011646A10.294APPARATUS FOR DETECTING AND PREVENTING SUBSCRIBER NUMBER TUMBLING IN A CELLULAR MOBILE TELEPHONE SYSTEMAPPLICATION1993-06-101991-12-0325182451Good
US10361802B10.293Adaptive pattern recognition based control system and methodGRANT2019-07-231999-02-0167300558GoodBlanding Hovenweep LLCHOFFBERG FAMILY TRUST 1, STEVEN M HOFFBERG 2004-1 GRAT, Blanding Hovenweep LLC
US5956626A0.293Wireless communication device having an electromagnetic wave proximity sensorGRANT1999-09-211996-06-0324634728GoodMotorola IncGoogle Technology Holdings LLC
US5765106A0.293Authorized cellular telephone communication access and verification control systemGRANT1998-06-091995-12-2224310175GoodPitney Bowes IncPitney Bowes Inc
US5579222A0.293Distributed license administration system using a local policy server to communicate with a license server and control execution of computer programsGRANT1996-11-261991-11-2725174631GoodIntergraph CorpUniloc Luxembourg SA
EP0880296A10.292Transmission restricting device  radio communication terminal equipment and transmission restricting system using theseGRANT1998-11-251997-05-2115028615GoodNEC CorpNEC Corp
US5493677A0.292Generation  archiving  and retrieval of digital images with evoked suggestion-set captions and natural language interfaceGRANT1996-02-201994-06-0822968060GoodSystems Research and Applications CorpApple Inc
EP0881850A20.292Utilization management system of portable telephoneGRANT1998-12-021997-05-3015660155GoodOki Electric Industry Co LtdOki Electric Industry Co Ltd
US6496930B10.292Message receiving apparatus and message transmitting apparatusGRANT2002-12-171997-12-1826507637GoodMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US5778304A0.291Method for providing communication services based on geographic locationGRANT1998-07-071994-03-1022780229GoodMotorola IncMotorola Solutions Inc
US5408649A0.290Distributed data access system including a plurality of database access processors with one-for-N redundancyGRANT1995-04-181993-04-3022000560GoodQuotron Systems IncThomson Reuters Global Resources ULC
US7792297B10.289System and process for limiting distribution of information on a communication network based on geographic locationGRANT2010-09-071998-03-3142670339GoodOpenTV IncNagravision SA
US20030163428A10.288System for controlling access and distribution of digital propertyAPPLICATION2003-08-281996-01-1124337542GoodVeridian Information Solutions IncHanger Solutions LLC
US6915123B10.288Method and system for monitoring an operational area of a subscriber stationGRANT2005-07-052000-03-0234699840GoodLucent Technologies IncNokia of America Corp
US6314282B10.288Transmitting group ID information to exclude a group of mobile terminals from changing their operation modeGRANT2001-11-061999-03-1226070355GoodSony International Europe GmbHSony Deutschland GmbH
US20010049275A10.287Automated alert state change of user devices for time-based and location-based eventsAPPLICATION2001-12-062000-02-1422667981GoodAction Engine CorpAction Engine Corp
US20030095542A10.287Apparatus and method for integrated voice gatewayAPPLICATION2003-05-221997-07-2527489583GoodTRINAD CAPITAL MASTER FUND Ltd (35%)DKR SOUNDSHORE OASIS HOLDING FUND Ltd (65%), DKR SOUNDSHORE OASIS HOLDING FUND Ltd WITH COPIES OF NOTICES TO ITS INVESTMENT MANAGER DKR OASIS MANAGEMENT Co LP
US6343212B10.287Outputting a warning signal when approaching a protected area warning of an impending mode changeGRANT2002-01-291999-03-128237985GoodSony International Europe GmbHSony Deutschland GmbH
US5926761A0.286Method and apparatus for mitigating the effects of interference in a wireless communication systemGRANT1999-07-201996-06-1124665074GoodMotorola IncMotorola Solutions Inc
US5390297A0.285System for controlling the number of concurrent copies of a program in a network based on the number of available licensesGRANT1995-02-141987-11-1022381483GoodAuto Trol Tech CorpFlexera Software LLC
US6343313B10.285Computer conferencing system with real-time multipoint  multi-speed  multi-stream scalabilityGRANT2002-01-291996-03-2626685840GoodPixion IncPixion Inc
WO1999029126A10.283INTEGRATING COMMUNICATIONS NETWORKSAPPLICATION1999-06-101997-12-0310823085Good
US5532690A0.283Apparatus and method for monitoring and bounding the path of a ground vehicleGRANT1996-07-021995-04-0423648930GoodITT CorpExelis Inc
US5603084A0.281Method and apparatus for remotely programming a cellular radiotelephoneGRANT1997-02-111995-03-0223571788GoodEricsson IncEricsson Inc
US5963864A0.280Method and system for automatically connecting telephone calls to multiple devices having different directory numbersGRANT1999-10-051996-05-3124633578GoodBellSouth Intellectual Property Management CorpAT&T Delaware Intellectual Property Inc
US7031954B10.279Document retrieval system with access controlGRANT2006-04-181997-09-1036147548GoodGoogle LLCGoogle LLC
US6640305B20.278Digital content protection method and apparatusGRANT2003-10-281999-09-0223537553GoodCryptography Research IncCryptography Research Inc
US6968384B10.278License management system and method for commuter licensingGRANT2005-11-221999-09-0335355275GoodSafeNet IncRAVENS ACQUISTION CORP, Thales DIS CPL USA Inc
US6343213B10.277Method to protect against interference from mobile radiosGRANT2002-01-291997-10-2425498980GoodNortel Networks LtdMicrosoft Technology Licensing LLC
US20010055319A10.277Robust techniques for optimal upstream communication between cable modem subscribers and a headendAPPLICATION2001-12-271998-10-3027568651GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US6539230B20.275Dynamic maintenance of location dependent operating parameters in a wireless terminalGRANT2003-03-251999-08-1923489740GoodLucent Technologies IncAlcatel Lucent SAS, Sound View Innovations LLC
US7139737B20.275Apparatus and method for managing software licenses and storage medium storing a program for managing software licensesGRANT2006-11-212000-02-0818555021GoodFujitsu LtdFujitsu Ltd
US5005122A0.273Arrangement with cooperating management server node and network service nodeGRANT1991-04-021987-09-0822243567GoodDigital Equipment CorpHewlett Packard Development Co LP
US5745879A0.273Method and system for managing execution of licensed programsGRANT1998-04-281991-05-0824801966GoodDigital Equipment CorpHewlett Packard Development Co LP
US5699431A0.272Method for efficient management of certificate revocation lists and update informationGRANT1997-12-161995-11-1324221031GoodNorthern Telecom LtdEntrust Ltd
US6658392B20.269Automatic toll collection system for automotive vehicleGRANT2003-12-021997-09-0517074785GoodDenso CorpDenso Corp
US6496703B10.269System for disabling wireless communication devicesGRANT2002-12-171999-12-1323802359GoodLucent Technologies IncNokia of America Corp
US6198931B10.267Method for prioritizing a communication in a wireless communication systemGRANT2001-03-061999-07-2823426697GoodMotorola IncGoogle Technology Holdings LLC
US5857016A0.267System and method for automatically delivering an incoming calling line identification to a paging systemGRANT1999-01-051996-09-1724889512GoodLucent Technologies IncNokia of America Corp
US6828986B20.265Image display device and method for displaying an image on the basis of a plurality of image signalsGRANT2004-12-072000-01-3118549172GoodCanon IncCanon Inc
US5742757A0.265Automatic software license managerGRANT1998-04-211996-05-3024627658GoodMitsubishi Semiconductor America IncHewlett Packard Laboratories, Mitsubishi Electric US Inc, Renesas Technology America Inc
US4445118A0.264Navigation system and methodGRANT1984-04-241981-05-2223013813GoodNational Aeronautics and Space Administration NASANational Aeronautics and Space Administration NASA
US6222458B10.264Automatic cell phone detection at a combustible delivery stationGRANT2001-04-241999-11-1523744468GoodHarris Technology LLCHarris Technology LLC
WO1999045454A10.263METHOD AND AGENT FOR THE PROTECTION AGAINST THE UNAUTHORISED USE OF COMPUTER RESOURCESAPPLICATION1999-09-101998-03-0211071290Good
US4405829A0.262Cryptographic communications system and methodGRANT1983-09-201977-12-1425333547GoodMassachusetts Institute of TechnologyMassachusetts Institute of Technology
US7263367B10.261Systems and methods for setting a mode of operation of electronic devicesGRANT2007-08-281999-04-2838433200GoodSabot Assoc IncPayPal Inc
US5260999A0.261Filters in license management systemGRANT1993-11-091991-06-2827110811GoodDigital Equipment CorpHewlett Packard Development Co LP
US5204897A0.260Management interface for license management systemGRANT1993-04-201991-06-2827110669GoodDigital Equipment CorpHewlett Packard Development Co LP
US5386369A0.260License metering system for software applicationsGRANT1995-01-311993-07-1222219807GoodGlobetrotter Software IncFlexera Software LLC
US5978672A0.260Mobility extended telephone application programming interface and method of useGRANT1999-11-021996-09-2724892595GoodGlobal Mobility Systems IncUnwired Planet LLC
US8369967B20.259Alarm system controller and a method for controlling an alarm systemGRANT2013-02-051999-02-0146323947GoodSTEVEN M HOFFBERG 2004-1 GRAT, Blanding Hovenweep LLC, STEVEN M HOFFBERG 2004-1 GRATHOFFBERG FAMILY TRUST 1
US6842896B10.259System and method for selecting a server in a multiple server license management systemGRANT2005-01-111999-09-0333567007GoodRainbow Technologies IncThales DIS CPL USA Inc
US4288659A0.259Method and means for securing the distribution of encoding keysGRANT1981-09-081979-05-2121912374GoodAtalla Technovations CorpAtalla Technovations Corp
US6400996B10.257Adaptive pattern recognition based control system and methodGRANT2002-06-041999-02-0122909404GoodSTEVEN M HOFFBERG 2004-1 GRAT, Blanding Hovenweep LLCHOFFBERG FAMILY TRUST 1
US6356772B10.257Method of restricting the call of a moving subscriber in a switched radio telephone system according to international standard protocol IS-41CGRANT2002-03-121998-08-2619548355GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US6141000A0.257Projection display system with touch sensing on screen  computer assisted alignment correction and network conferencingGRANT2000-10-311991-10-2125118421GoodSmart Technologies ULCSmart Technologies ULC
US7047088B20.255Management system for devices connecting with networkGRANT2006-05-162000-03-2718602669GoodSeiko Epson CorpSeiko Epson Corp
US7035918B10.255License management system and method with multiple license serversGRANT2006-04-251999-09-0336191180GoodSafenet Canada IncThales DIS CPL USA Inc, Thales DIS CPL Canada Inc
US20010055283A10.253Multiple wireless local area networks occupying overlapping physical spacesAPPLICATION2001-12-272000-03-1724106775GoodSymbol Technologies LLCSymbol Technologies LLC
US5757271A0.252Portable computer and method of providing security for an electronic deviceGRANT1998-05-261996-11-1225004557GoodInternational Business Machines CorpLenovo PC International Ltd
US5157663A0.250FAULT TOLERANT COMPUTER SYSTEMGRANT1992-10-201990-09-2424347179GoodMicro Focus Software IncMicro Focus Software Inc
US20010037366A10.250System and method for providing remote expert communications and video capabilities for use during a medical procedureAPPLICATION2001-11-011997-03-2727366114GoodMedtronic IncMedtronic Inc
US5646992A0.249Assembly  distribution  and use of digital informationGRANT1997-07-081993-09-2322423643GoodDigital Delivery IncMicrosemi Frequency and Time Corp, Digital Delivery Inc
US7552166B20.249Method of queuing requests to access a communications networkGRANT2009-06-231999-02-2232072716GoodAspect Software IncAlvaria Inc, Wilmington Trust NA
US7716348B10.249License management system and method with license balancingGRANT2010-05-111999-09-0322544433GoodSafeNet IncThales DIS CPL USA Inc
US5857155A0.247Method and apparatus for geographic based control in a communication systemGRANT1999-01-051996-07-1024709952GoodMotorola IncGoogle Technology Holdings LLC
US6326982B10.247Method and apparatus for automatically accessing web pages based on television programming informationGRANT2001-12-041999-06-2423349305GoodEnreach Technology IncHanger Solutions LLC
US6424839B10.246Mobile communicationGRANT2002-07-231998-06-239527733GoodKoninklijke Philips Electronics NVCellon France SAS
US6002334A0.246Automated item coupling system and method thereforGRANT1999-12-141998-07-0622332476GoodMotorola IncMotorola Solutions Inc
EP1035748A10.246Switching a mobile terminal to a silent ring modeGRANT2000-09-131999-03-1226070350GoodSony International Europe GmbHSony Deutschland GmbH
US6826597B10.244Providing clients with services that retrieve data from data sources that do not necessarily support the format required by the clientsGRANT2004-11-301999-03-1726822938GoodOracle International CorpOracle International Corp
US5781628A0.244System and method for selective restriction of cipheringGRANT1998-07-141997-08-1925434520GoodEricsson IncEricsson Inc
US6959291B10.241Management of a concurrent use license in a logically-partitioned computerGRANT2005-10-251999-05-1923219510GoodInternational Business Machines CorpInternational Business Machines Corp
US5963642A0.240Method and apparatus for secure storage of dataGRANT1999-10-051996-12-3025110198GoodLONG CORNER SECURITY LLCLONG CORNER SECURITY LLC
US6233448B10.238System  method and apparatus for automatic feature activation/deactivation based upon positioningGRANT2001-05-151998-07-2222393609GoodEricsson IncEricsson Inc
US6023763A0.238Method of and apparatus for protecting and upgrading software using a removable hardlockGRANT2000-02-081997-04-2325286409GoodFisher Controls International LLCFisher Controls International LLC
US5758059A0.238In-circuit emulator in which abrupt and deferred arming and disarming of several events on a microprocessor chip are controlled using a single-input pinGRANT1998-05-261992-12-0325531586GoodIntel CorpIntel Corp
US6421726B10.235System and method for selection and retrieval of diverse types of video data on a computer networkGRANT2002-07-161997-03-1421903595GoodAkamai Technologies IncAkamai Technologies Inc
US8892495B20.235Adaptive pattern recognition based controller apparatus and method and human-interface thereforeGRANT2014-11-181991-12-2346332596GoodBlanding Hovenweep LLCHOFFBERG FAMILY TRUST 1, STEVEN M HOFFBERG 2004-1 GRAT, Blanding Hovenweep LLC
US5758079A0.235Call control in video conferencing allowing acceptance and identification of participants in a new incoming call during an active teleconferenceGRANT1998-05-261993-10-0122449822GoodVicor IncPragmatus AV LLC
US6889365B20.235Terminal operation apparatusGRANT2005-05-031998-08-1016842995GoodFujitsu LtdFujitsu Ltd
EP1562378A10.233Pay broadcasting system with enhanced security against illegal access to a downloaded program in a subscriber terminalGRANT2005-08-101998-07-0216435238GoodMatsushita Electric Industrial Co LtdPanasonic Corp, Panasonic Holdings Corp
US6901386B10.232Electronic asset lending library method and apparatusGRANT2005-05-312000-03-3134590501GoodIntel CorpIntel Corp
US6255800B10.229Bluetooth enabled mobile device charging cradle and systemGRANT2001-07-032000-01-0323894035GoodTexas Instruments IncTexas Instruments Inc
US6765492B20.229Automatic electronic device detectionGRANT2004-07-201999-11-1527032025Good
US6397058B10.228System and method for providing roaming incoming screening (RIS) in a wireless intelligent networkGRANT2002-05-281998-09-0926796257GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6167268A0.228Method and apparatus for controlling scanning of a subscriber unitGRANT2000-12-261999-02-1622933092GoodMotorola IncGoogle Technology Holdings LLC
US6275707B10.228Method and apparatus for assigning location estimates from a first transceiver to a second transceiverGRANT2001-08-141999-10-0823646333GoodMotorola IncMotorola Solutions Inc
US6148415A0.226Backup switching control system and methodGRANT2000-11-141993-06-1115268887GoodHitachi Ltd, Hitachi Computer Engineering Co LtdHitachi Ltd, Hitachi Computer Engineering Co Ltd
US5978565A0.226Method for rapid recovery from a network file server failure including method for operating co-standby serversGRANT1999-11-021993-07-2026789202GoodVinca CorpEMC Corp
US6198542B10.223Network control method and systemGRANT2001-03-061996-01-1811647338GoodRicoh Co LtdRicoh Co Ltd
US6208376B10.222Communication system and method and storage medium for storing programs in communication systemGRANT2001-03-271996-04-2226441259GoodCanon IncCanon Inc
US5995625A0.219Electronic cryptographic packingGRANT1999-11-301997-03-2425236820GoodCertco LLCCertco LLC
US20030225641A10.218Integrated digital production line for full-motion visual productsAPPLICATION2003-12-042000-03-2424137187GoodNorthrop Grumman Systems CorpNorthrop Grumman Systems Corp
US6091408A0.218Method for presenting information units on multiple presentation unitsGRANT2000-07-181997-08-1325429479GoodZ Axis CorpZ Axis Corp
US8463839B20.218Distributed computing environmentGRANT2013-06-112000-03-2826888555GoodCybernet Systems CorpCybernet Systems Corp
US20010042075A10.218DOCUMENT SHARING MANAGEMENT METHOD FOR A DISTRIBUTED SYSTEMAPPLICATION2001-11-151997-02-1412772304GoodNEC CorpNEC Corp
US5751949A0.217Data security system and methodGRANT1998-05-121995-05-2323777194GoodMCI CorpMCI Corp, OL Security LLC
US5745569A0.217Method for stega-cipher protection of computer codeGRANT1998-04-281996-01-1724351816GoodDice CoWistaria Trading Ltd
US6654888B10.216Installing and controlling trial softwareGRANT2003-11-251999-12-3123892729GoodInternational Business Machines CorpInternational Business Machines Corp
US5905793A0.215Waiting-call selection based on anticipated wait timesGRANT1999-05-181997-03-0725212601GoodLucent Technologies IncAvaya Inc
US5754761A0.215Universal sofeware key processGRANT1998-05-191995-03-0623577365Good
US5724428A0.215Block encryption algorithm with data-dependent rotationsGRANT1998-03-031995-11-0124188322GoodRSA Data Security IncEMC Corp
US6556810B20.214Communication inhibiting device and communication inhibiting systemGRANT2003-04-291999-07-2714236322GoodMitsubishi Electric CorpMitsubishi Electric Corp
US5712658A0.207Information presentation apparatus and information display apparatusGRANT1998-01-271993-12-2827293230GoodHitachi LtdHitachi Ltd
US5982873A0.206Waiting-call selection based on objectivesGRANT1999-11-091997-03-0725210135GoodLucent Technologies IncAvaya Inc
US4811393A0.204Method and system for diversification of a basic key and for authentication of a thus-diversified keyGRANT1989-03-071986-07-179337515GoodBull SABull SA, CP8 Technologies SA
US5987129A0.204Method of sharing cryptokeyGRANT1999-11-161996-02-2127300451GoodCard Call Service Co LtdCard Call Service Co Ltd
US20030055749A10.204INFORMATION TECHNOLOGY ASSET MANAGEMENTAPPLICATION2003-03-201999-05-0323172068GoodPRC IncPRC Inc
US4593409A0.203Transceiver protection arrangementGRANT1986-06-031984-04-0424388538GoodMotorola IncMotorola Solutions Inc
US6192122B10.202Call center agent selection that optimizes call wait timesGRANT2001-02-201998-02-1221812313GoodAvaya Technology LLCAvaya Inc
US7584120B10.201Method and apparatus for defining data of interestGRANT2009-09-011999-04-0723102288GoodCBS Interactive Inc1worldsync Inc
US4430526A0.199Interactive graphics transmission system employing an adaptive stylus for reduced bandwidthGRANT1984-02-071982-01-2523340375GoodBell Telephone Laboratories IncAT&T Corp, NCR Corp
US4937863A0.197Software licensing management systemGRANT1990-06-261988-03-0722596763GoodDigital Equipment CorpHewlett Packard Development Co LP
US6484029B20.192Apparatus and methods for adapting mobile unit to wireless LANGRANT2002-11-191998-10-1322626674GoodSymbol Technologies LLCSymbol Technologies LLC
US6108703A0.191Global hosting systemGRANT2000-08-221998-07-1426785963GoodMassachusetts Institute of TechnologyMassachusetts Institute of Technology
US5673315A0.189Method and system for software asset usage detection and managementGRANT1997-09-301994-02-1522727260GoodInternational Business Machines CorpInternational Business Machines Corp
US5235633A0.189CELLULAR TELEPHONE SYSTEM THAT USES POSITION OF A MOBILE UNIT TO MAKE CALL MANAGEMENT DECISIONSGRANT1993-08-101991-12-2625212546GoodSygnet Communications IncEMSAT ADVANCED GEO-LOCATION TECHNOLOGY LLC
US5877747A0.186Remote control system with a pointing deviceGRANT1999-03-021995-06-0215175591GoodMatsushita Electric Industrial Co LtdPanasonic Holdings Corp
US5515079A0.186Computer input system and method of using sameGRANT1996-05-071989-11-0723718574GoodProxima CorpStraight Signals LLC
US6434125B10.185Automatic data service selection method and apparatus for digital wireless communication networksGRANT2002-08-131997-10-2425499891GoodLucent Technologies IncNokia of America Corp, RPX Corp, Nokia USA Inc
EP0737911A10.182Image projection system and method of controlling a projected pointerGRANT1996-10-161995-04-0714473833GoodSeiko Epson CorpSeiko Epson Corp
US6502079B10.175Method and system for enforcing floating licensesGRANT2002-12-311997-12-0825532920GoodAprisma Management Technology IncCA Inc, Concord Communications LLC
US20060167944A10.173System and method for the automated notification of compatibility between real-time network participantsAPPLICATION2006-07-272000-02-2946150480GoodJEDI TECHNOLOGIES IncJEDI TECHNOLOGIES Inc
US5717856A0.173Method of operating multiple computers by identical software running on every computer with the exception of the host computer which runs shared program in additionGRANT1998-02-101993-03-1921880595GoodNCR CorpNCR Corp
US7986770B20.172Method and apparatus for obtaining telephone status over a networkGRANT2011-07-261997-11-0346257422GoodIntellectual Ventures Fund 30 LLCFar North Patents LLC
US5307481A0.168Highly reliable online systemGRANT1994-04-261990-02-2827550189GoodHitachi Ltd, Sanwa Bank LtdHitachi Ltd, Sanwa Bank Ltd
EP0656581A10.161Method and apparatus for optimal network printer selectionGRANT1995-06-071993-12-0122579326GoodInternational Business Machines CorpInternational Business Machines Corp
US5838277A0.159GPS-based controller moduleGRANT1998-11-171994-05-2022927381GoodTrimble Navigation LtdTrimble Inc
US6163607A0.154Optimizing call-center performance by using predictive data to distribute agents among callsGRANT2000-12-191998-04-0922013066GoodAvaya Technology LLCAvaya Inc
US20020188658A10.152Distributed control system and filtering method used in the distributed control systemAPPLICATION2002-12-121998-07-1516418233Good
US20020016730A10.149Method system  and computer program product for employment market statistics generation and analysisAPPLICATION2002-02-072000-04-2522737246GoodICPlanet Acquisition CorpICPlanet Acquisition Corp, Benhov GmbH LLC
US5206903A0.142Automatic call distribution based on matching required skills with agents skillsGRANT1993-04-271990-12-2624541681GoodAT&T Bell Laboratories IncAT&T Corp, Avaya Inc
US5796941A0.140Method for supervising software execution in a license restricted environmentGRANT1998-08-181996-09-0624847797GoodCatalyst Semiconductor IncCatalyst Semiconductor Inc
US6769063B10.123Data converter and recording medium on which program for executing data conversion is recordedGRANT2004-07-271998-01-2727280324GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US5987482A0.118Computer system and method of displaying hypertext documents with internal hypertext link definitionsGRANT1999-11-161997-09-0825451915GoodInternational Business Machines CorpInternational Business Machines Corp
US5828747A0.110Call distribution based on agent occupancyGRANT1998-10-271997-01-2825149764GoodLucent Technologies IncAvaya Inc
US5448639A0.102Digital signature deviceGRANT1995-09-051992-04-1611063555GoodFortress U&T LtdWestern Digital Israel Ltd
US6571268B10.081Multiplier accumulator circuitsGRANT2003-05-271998-10-0626151710GoodTexas Instruments IncTexas Instruments Inc
JPH11298532ANRMETHOD TO PERMIT NEW CONNECTION BASED ON MEASURED QUANTITY IN MULTIPLEX ACCESS SYSTEM FOR COMMUNICATION NETWORKGRANT1999-10-291997-10-1427370129Good
JPH09116534ANRSECURITY LEVEL CONTROLLER AND NETWORK COMMUNICATION SYSTEMGRANT1997-05-021995-10-1917502036Good
JPH0816514ANRCOOPPERATION SUPPORT SYSTEMGRANT1996-01-191994-07-0115504519Good
GB2350971ANRSecurity ArchitectureGRANT2000-12-131999-06-0710854872GoodNokia Mobile Phones LtdNokia Oyj
GB2342821ANRNetwork based method and apparatus for restricting operation of cellular telephones to delineated geographical areasGRANT2000-04-191997-06-1025359159GoodEricsson IncEricsson Inc
GB2334859ANRMethod and apparatus for restricting operation of cellular telephones to well delineated geographical areasGRANT1999-09-011996-12-0525057736GoodEricsson IncEricsson Inc
GB2300787ANRMethod of Disabling a Portable Terminal of a Communication SystemGRANT1996-11-131995-05-1227312717GoodNEC CorpNEC Corp
FR2803162A1NRMobile phone  with variable geographic configuration  having memory containing three tables  one for defining geographic position  one for configuration and one for programmingGRANT2001-06-291999-12-229553605GoodSagem SASagem SA
FR2775862A1NRNo titleGRANT1999-09-101998-03-059523674Good
DE19812215A1NRControlling link related security functionsGRANT1999-09-231998-03-197861637GoodSiemens AGBenQ Corp
US6745326B10.562Authentication process including setting up a secure channel between a subscriber and a service provider accessible through a telecommunications operatorGRANT2004-06-011999-01-229541282FairSociete Francaise du Radiotelephone SFR SASociete Francaise du Radiotelephone SFR SA
WO1997026769A10.410METHOD AND SYSTEM FOR REDUCING FRAUD IN A CELLULAR TELECOMMUNICATIONS SYSTEMAPPLICATION1997-07-241996-01-1824352517Fair
US6338020B20.386Vehicle information acquisition system including capability to obtain information in blind spotsGRANT2002-01-081997-11-2018110900FairToyota Motor CorpToyota Motor Corp
US7287214B10.381System and method for providing a searchable library of electronic documents to a userGRANT2007-10-231999-12-1038607164FairBooks24x7 com IncBOOKS 24X7COM Inc, SKILLSOFT IRELAND Ltd, Credit Suisse AG Cayman Islands Branch
US6301584B10.361System and method for retrieving entities and integrating dataGRANT2001-10-091997-08-2127239341FairHome Information Services IncIntellectual Ventures Assets 43 LLC, Relativity Display LLC
US7076243B20.356Context aware computing devices having a common interface and related methodsGRANT2006-07-112000-04-0534079518FairMicrosoft CorpMicrosoft Technology Licensing LLC
US5826186A0.354Method for terminating a wireless communication of a mobile communication unitGRANT1998-10-201996-10-2524961653FairMotorola IncMotorola Solutions Inc
US5615261A0.350Method and apparatus for detecting illicit RF data transmissionsGRANT1997-03-251994-10-0523238097FairMotorola IncMotorola Solutions Inc
US5774787A0.341Interference mitigation system for protecting radio astronomy and method of using sameGRANT1998-06-301994-12-0523373005FairMotorola IncCDC Propriete Intellectuelle
US4476582A0.330Mobile broadcast receiver with channels selectable according to reception locationGRANT1984-10-091982-04-176161123FairBlaupunkt Werke GmbHBlaupunkt Werke GmbH
US6389288B10.311Mobile communication terminal capable of executing location-related servicesGRANT2002-05-141997-06-2715937311FairFujitsu LtdFujitsu Ltd
US6414630B10.311Position detection apparatus used for a mobile objectGRANT2002-07-021995-08-0216379542FairSony CorpSony Corp
US4817192A0.286Dual-mode AFC circuit for an SSB radio transceiverGRANT1989-03-281986-10-3125452018FairMotorola IncMotorola Solutions Inc
US4430753A0.276Radio receiverGRANT1984-02-071980-07-2427309601FairMitsubishi Electric CorpMitsubishi Electric Corp
US5983101A0.274Point to multipoint radio access systemGRANT1999-11-091996-11-2626707435FairTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6192026B10.260Medium access control protocol for OFDM wireless networksGRANT2001-02-201998-02-0621795881FairCisco Systems IncNOVAK ALBERT, Cisco Technology Inc, Cisco Systems Inc, Pelletier Hermel
US5822310A0.257High power short message service using broadcast control channelGRANT1998-10-131995-12-2724315238FairEricsson IncEricsson Inc
US6438393B10.256Integrated motion detector in a mobile communications deviceGRANT2002-08-201998-06-258552076FairNokia Mobile Phones LtdWSOU Investments LLC
US20050015466A10.256Peer-to-peer automated anonymous asynchronous file sharingAPPLICATION2005-01-201999-10-1434069300FairAI Acquisitions IncMec Management LLC, F Poszat HU LLC
US7113939B20.253Architecture to enable search gateways as part of federated searchGRANT2006-09-261999-09-2123580555FairInternational Business Machines CorpInternational Business Machines Corp
US6356897B10.249Associative database model for electronic-based informational assembliesGRANT2002-03-121998-06-1722273758Fair
US6094649A0.235Keyword searches of structured databasesGRANT2000-07-251997-12-2225542117FairPartnet IncHanger Solutions LLC
US20070016625A10.227Method and Apparatus for Providing a Central Dictionary and Glossary ServerAPPLICATION2007-01-181999-06-1732907571Fair
US4560978A0.226Communication system and methodGRANT1985-12-241980-01-0826808133Fair
US6006217A0.219Technique for providing enhanced relevance information for documents retrieved in a multi database searchGRANT1999-12-211997-11-0725510954FairInternational Business Machines CorpInternational Business Machines Corp
US6377946B10.211Document search method and apparatus and portable medium used thereforGRANT2002-04-231998-02-2512656924FairHitachi LtdHitachi Ltd
US6012053A0.197Computer system with user-controlled relevance ranking of search resultsGRANT2000-01-041997-06-2325377404FairLycos IncRPX Corp
US6631369B10.196Method and system for incremental web crawlingGRANT2003-10-071999-06-3028675236FairMicrosoft CorpMicrosoft Technology Licensing LLC
US7437351B20.196Method for searching mediaGRANT2008-10-141997-01-1032601026FairGoogle LLCGoogle LLC
US6424973B10.194Search system and method based on multiple ontologiesGRANT2002-07-231998-07-2426788436FairJarg CorpJARG Corp A CORP OF DELAWARE, Jarg Corp
US6236991B10.192Method and system for providing access for categorized information from online internet and intranet sourcesGRANT2001-05-221997-11-2625527190FairInternational Business Machines CorpInternational Business Machines Corp
US4218773A0.191Superheterodyne receiver of scanning type with indicator means to display received frequency and frequency being stored in memoryGRANT1980-08-191976-01-1927547973FairSanyo Electric Co LtdSanyo Electric Co Ltd
US6757669B10.190Self-contained indexing system for an intranetGRANT2004-06-292000-01-2832508212FairXerox CorpXerox Corp
USRE36727E0.185Method of indexing and retrieval of electronically-stored documentsGRANT2000-06-061989-12-2627038282Fair
US6735585B10.184Method for search engine generating supplemented search not included in conventional search result identifying entity data related to portion of located web pageGRANT2004-05-111998-08-1732232913FairAltaVista CoYahoo Inc, R2 Solutions LLC
US6493467B10.182Image processor  data processor  and their methodsGRANT2002-12-101996-12-2527466546FairSony CorpSony Corp
US5845278A0.174Method for automatically selecting collections to search in full text searchesGRANT1998-12-011997-09-1225456389FairInfoseek CorpGoogle LLC
US20010003479A10.167Presentation support system and projector systemAPPLICATION2001-06-141999-12-0918409488FairSeiko Epson CorpSeiko Epson Corp
US5926808A0.164Displaying portions of text from multiple documents over multiple databases related to a search query in a computer networkGRANT1999-07-201997-07-2525412850FairClaritech CorpJustSystems Evans Research Inc
US6711568B10.164Method for estimating coverage of web search enginesGRANT2004-03-231997-11-2531979060FairOverture Services IncYahoo Inc, R2 Solutions LLC
US7647555B10.160System and method for video access from notes or summariesGRANT2010-01-122000-04-1324189943FairFuji Xerox Co Ltd, Xerox CorpFujifilm Business Innovation Corp, Xerox Corp
US5148415A0.160Magneto-optical disc apparatus having head-disc distance controlGRANT1992-09-151990-09-2017239174FairMitsubishi Electric CorpMitsubishi Electric Corp
US6442708B10.140Fault localization and health indication for a controller area networkGRANT2002-08-271999-12-1423833454FairHoneywell International IncHoneywell International Inc
US4635296A0.126Wide bandwidth ultra high stability FM telemetry transmitterGRANT1987-01-061985-02-2224830378FairTRANSKINETIC SYSTEMS IncTRANSKINETIC SYSTEMS Inc
US6754873B10.124Techniques for finding related hyperlinked documents using link-based analysisGRANT2004-06-221999-09-2032474007FairGoogle LLCGoogle LLC
US20030040771A10.115Methods for creating woven devicesAPPLICATION2003-02-271999-02-0127382122Fair
US5475879A0.109Swimming pool overflow protectorGRANT1995-12-191994-07-1123041430Fair
US6356891B10.101Identifying indexes on materialized views for database workloadGRANT2002-03-122000-04-2046276918FairMicrosoft CorpMicrosoft Technology Licensing LLC
US5385369A0.099Vehicle having structure for fitting suspension to vehicle bodyGRANT1995-01-311992-05-0912504400FairMazda Motor CorpMazda Motor Corp
US5883095A0.016Formulations and methods to treat and prevent equine protozoal myeloencephalitisGRANT1999-03-161997-08-0725425459FairUniversity of Kentucky Research FoundationUniversity of Kentucky Research Foundation
JPH11220462ANRCIPHER PROCESSING UNIT  DECODING PROCESSING UNIT AND STORAGE MEDIUMGRANT1999-08-101998-01-3011986921Fair
JPH09330064ANRPRESENTATION ASSISTING SYSTEMGRANT1997-12-221996-06-1015422255Fair
JPH09252320ANRDATA TRANSMITTER AND ITS METHODGRANT1997-09-221996-03-1513122087Fair
JPH09233223ANRCOMMUNICATION EQUIPMENTGRANT1997-09-051996-02-2312461520Fair
JPH0715692ANRPICTURE CORRECTION DEVICE FOR PROJECTION TYPE DISPLAYGRANT1995-01-171993-06-2415557947Fair
JPH06244833ANRCOMMUNICATION SECURITY SYSTEMGRANT1994-09-021991-08-3016746217Fair
JPH04260165ANRCONFERENCE SUPPORTING SYSTEMGRANT1992-09-161991-02-1512075438Fair
JP2001175602ANRMETHOD FOR ESTABLISHING COMMUNICATION TERMINAL CONNECTION AND COMMUNICATION SYSTEMAPPLICATION2001-06-291999-12-2018468088Fair
JP2000222163ANRDATA DISPLAY SYSTEM AND DATA DISPLAY CONTROL METHOD IN DATA DISPLAY SYSTEMAPPLICATION2000-08-111999-01-2912060080Fair
JP2000122944ANRNETWORK DEVICE CONTROLLER AND CONTROL METHODAPPLICATION2000-04-281998-10-1517799793Fair
FR2765753A1NRNo titleGRANT1999-01-081997-07-019508909Fair

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeLOW
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityBROAD
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
1,576
Recommended Classes
394
Government Assigned Classes
4
CPC
Title
Score
H04W12/06Authentication2.063
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards1.885
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage1.885
G06F21/31User authentication1.828
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key1.828
G06F21/40by quorum  i.e. whereby two or more security principals are required1.823
G06F21/46by designing passwords or checking the strength of passwords1.823
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)1.733
G06F21/45Structures or tools for the administration of authentication1.732
G06F21/629to features or functions of an application1.732
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints1.732
G10L17/24the user being prompted to utter a password or a predefined phrase1.673
G06F21/602Providing cryptographic facilities or services1.644
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)1.629
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)1.602
G06F21/335for accessing specific resources  e.g. using Kerberos tickets1.602
H04Q11/0067Provisions for optical access or distribution networks  e.g. Gigabit Ethernet Passive Optical Network (GE-PON)  ATM-based Passive Optical Network (A-PON)  PON-Ring1.593
G06K19/07309Means for preventing undesired reading or writing from or onto record carriers1.524
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)1.484
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity1.484
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint1.484
H04W12/02Protecting privacy or anonymity1.467
G06F21/41where a single sign-on provides access to a plurality of computers1.466
H04L63/0815providing single-sign-on or federations1.466
H04L63/0838using one-time-passwords1.466
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]1.462
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL1.451
G01S1/68Marker  boundary  call-sign  or like beacons transmitting signals not carrying directional information1.450
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner1.450
H04L63/101Access control lists [ACL]1.445
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords1.445
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)1.434
H04L9/3271using challenge-response1.425
H04L9/321involving a third party or a trusted authority1.422
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)1.422
H04W4/029Location-based management or tracking services1.422
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)1.419
G06F21/44Program or device authentication1.419
G06F21/36by graphic or iconic representation1.415
G06F21/42using separate channels for security data1.409
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries1.409
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)1.405
G06Q20/363with the personal data files for a user1.405
G06Q20/4014Identity check for transaction1.405
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)1.391
H04W8/183Processing at user equipment or user record carrier1.384
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits1.384
G06Q20/3829involving key management1.379
G06Q20/401Transaction verification1.379
H04W12/04Key management1.372
G06Q20/3674involving authentication1.372
G06Q20/36using electronic wallets or electronic money safes1.372
G06F21/608Secure printing1.368
G06F3/1238Secure printing  e.g. user identification  user rights for device usage  unallowed content  blanking portions or fields of a page  releasing held jobs1.368
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.366
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)1.361
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)1.361
G06Q40/02Banking  e.g. interest calculation  credit approval  mortgages  home banking or on-line banking1.359
G06Q20/38215Use of certificates or encrypted proofs of transaction rights1.353
G06F21/33using certificates1.347
H04W12/12Fraud detection1.346
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC1.346
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.346
G07F7/0893the card reader reading the card in a contactless manner1.346
G06K5/04Verifying the alignment of markings1.346
G06Q20/3226Use of secure elements separate from M-devices1.340
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules1.337
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)1.337
H04R1/1091Details not provided for in groups | (ref: H04R1/1008)|  - | (ref: H04R1/1083)1.336
G10L17/06Decision making techniques| Pattern matching strategies1.336
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates1.335
H04L63/108when the policy decisions are valid for a limited amount of time1.335
H04L9/085Secret sharing or secret splitting  e.g. threshold schemes1.334
G06Q20/4012Verifying personal identification number [PIN]1.330
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)1.329
H04L41/0806for initial configuration or provisioning1.323
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)1.322
G06Q10/107Computer aided management of electronic mail | electronic mail protocols | (ref: H04L29/06)| | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)1.321
H04L63/126the source of the received data1.321
G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data | for medical reports | (ref: G16H15/00)| | for therapies or health-improving plans | (ref: G16H20/00)| | for the handling or processing of medical images | (ref: G16H30/00)1.320
G16H10/60for patient-specific data  e.g. for electronic patient records1.320
G06Q20/40145Biometric identity checks1.315
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.315
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)1.314
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)1.309
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour1.308
H04L67/104for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer  upload  download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r1.304
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)1.304
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself1.301
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database1.301
G06Q20/4016involving fraud or risk level assessment in transaction processing1.301
G07G1/0018Constructional details  e.g. of drawer  printing means  input means1.300
G06Q20/18involving self- service terminals [SSTs]  vending machines  kiosks or multimedia terminals1.300
G06F21/445by mutual authentication  e.g. between devices or programs1.298
G06F21/70Protecting specific internal or peripheral components  in which the protection of a component leads to protection of the entire computer1.295
G06F21/81by operating on the power supply  e.g. enabling or disabling power-on  sleep or resume operations1.295
B60R25/252Fingerprint recognition1.294
B60R25/25using biometry1.294
G16H20/40relating to mechanical  radiation or invasive therapies  e.g. surgery  laser therapy  dialysis or acupuncture1.284
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD1.281
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)1.279
H04L63/1416Event detection  e.g. attack signature detection1.279
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols1.269
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.267
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)1.265
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)1.263
H04K3/42characterized by the control of the jamming frequency or wavelength1.261
G06Q20/354Card activation or deactivation1.257
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)1.256
H04L63/0281Proxies1.256
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics1.253
G06Q20/352Contactless payments by cards1.253
G06F21/35communicating wirelessly1.252
G06F21/305by remotely controlling device operation1.245
G06Q20/3224Transactions dependent on location of M-devices1.244
H04W48/18Selecting a network or a communication service1.242
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]1.241
H04L9/3247involving digital signatures1.241
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks1.241
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]1.240
G06Q10/02Reservations  e.g. for tickets  services or events1.238
G06Q50/14Travel agencies1.238
H04L45/22Alternate routing1.238
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.238
H04L63/104Grouping of entities1.236
G06F21/645using a third party1.233
H04L9/0869involving random numbers or seeds1.230
G06F21/87by means of encapsulation  e.g. for integrated circuits1.229
H04M3/382using authorisation codes or passwords1.226
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks1.226
H04W48/08Access restriction or access information delivery  e.g. discovery data delivery1.225
H04L12/2832Interconnection of the control functionalities between home networks | single bridge functionality | (ref: H04L12/4625)1.225
A24F47/002Simulated smoking devices  e.g. imitation cigarettes | inhaling appliances for medical use shaped like cigars  cigarettes or pipes | (ref: A61M15/06)1.225
H04W24/02Arrangements for optimising operational condition1.225
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding1.221
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)1.221
H04L63/102Entity profiles1.217
G06Q30/0185Product  service or business identity fraud1.208
H04W4/24Accounting or billing1.205
H04L12/1407Policy-and-charging control [PCC] architecture1.205
G06F21/79in semiconductor storage media  e.g. directly-addressable memories1.202
G11C16/0483comprising cells having several storage transistors connected in series1.202
G06F9/54Interprogram communication1.202
G06F8/656while running1.201
H04L9/0833involving conference or group key | network architectures or network communication protocols for key management in group communication in a packet data network | (ref: H04L63/065)1.198
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB1.195
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)1.195
G05B19/4155characterised by programme execution  i.e. part programme or machine function execution  e.g. selection of a programme1.192
H04N1/00307with a mobile telephone apparatus | constructional features of portable telephone sets | (ref: H04M1/0202)| | mobile radio systems | (ref: H04W84/00)1.192
H04W12/08Access security1.192
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)1.190
G06Q20/3276using a pictured code  e.g. barcode or QR-code  being read by the M-device1.190
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys1.189
H04L9/0841involving Diffie-Hellman or related key agreement protocols1.189
G08B25/008Alarm setting and unsetting  i.e. arming or disarming of the security system1.188
G06Q20/3223Realising banking transactions through M-devices1.188
G06Q20/322Aspects of commerce using mobile devices [M-devices]1.188
G06F13/385for adaptation of a particular data processing system to different peripheral devices1.186
G06K7/10297arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs  e.g. ISO/IEC 14443 and 18092 | protocols for data communication in general  | see|  | (ref: H04L29/06)1.186
G06F21/128involving web programs  i.e. using technology especially used in internet  generally interacting with a web browser  e.g. hypertext markup language [HTML]  applets  java1.186
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.183
F03D7/047characterised by the controller architecture  e.g. multiple processors or data communications1.178
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)1.175
G07C9/00571operated by interacting with a central unit1.174
G07C9/00857where the code of the data carrier can be programmed1.174
G07C9/00563using personal physical data of the operator  e.g. finger prints  retinal images  voicepatterns1.174
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)1.171
H04L9/0827involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18)1.171
G06F3/04817using icons | graphical programming languages using iconic symbols | (ref: G06F8/34)1.169
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance1.169
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords1.166
G06F15/00Digital computers in general | details | (ref: G06F1/00)|  â€“ | (ref: G06F13/00)| Data processing equipment in general1.166
G06F21/575Secure boot1.161
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying1.161
G06F3/0483interaction with page-structured environments  e.g. book metaphor1.160
G06F9/451Execution arrangements for user interfaces1.160
G06F21/60Protecting data1.159
H04L67/148provided for migration or transfer of sessions | in-session procedures in real-time communications | (ref: H04L65/1083)| | control or signalling for completing the hand-off in wireless networks | (ref: H04W36/0005)1.158
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)1.158
G06Q20/3823combining multiple encryption tools for a transaction1.157
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals1.156
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)1.150
H04L63/123received data contents  e.g. message integrity1.149
G06F9/4881Scheduling strategies for dispatcher  e.g. round robin  multi-level priority queues1.149
H04L63/105Multiple levels of security1.149
G06F3/0482interaction with lists of selectable items  e.g. menus1.148
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems1.148
G06F9/5072Grid computing1.143
G07C9/00174Electronically operated locks| Circuits therefor| Nonmechanical keys therefor  e.g. passive or active electrical keys or other data carriers without mechanical keys | mechanical locks with electric permutation | (ref: E05B49/00)| | arrangements for sensing or reading record carriers | (ref: G06K7/00)|   | (ref: G06K9/00)| | electronic switching | (ref: H03K17/00)1.143
G06F21/6245Protecting personal data  e.g. for financial or medical purposes1.140
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.140
H02J50/80involving the exchange of data  concerning supply or distribution of electric power  between transmitting devices and receiving devices1.139
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)1.139
H04B7/088using beam selection1.134
H04L9/3278using physically unclonable functions [PUF]1.131
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)1.131
G06F21/606by securing the transmission between two devices or processes1.126
G06F3/04842Selection of a displayed object | (ref: G06F3/0482)|  takes precedence1.125
G06Q10/00Administration| Management1.125
H04L63/0272Virtual private networks1.124
G06Q20/385Use of an alias or a single-use code1.123
G06Q20/405Establishing or using transaction specific rules1.123
H04N7/15Conference systems | video terminal details | (ref: H04N7/141)|  | telephonic conference arrangements | (ref: H04M3/56)| | | computer conferencing | (ref: H04L12/1813)1.122
G06F3/1205resulting in increased flexibility in print job configuration  e.g. job settings  print requirements  job tickets1.121
G06Q10/1091Recording time for administrative purposes1.121
G07C1/10together with the recording  indicating or registering of other data  e.g. of signs of identity | together with the recording of a continuously-varying variable | (ref: G01D)|  or the appropriate other subclass of | (ref: G01)|   dependent on the variable1.121
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds1.121
H04L9/3006underlying computational problems or public-key parameters1.121
H04B13/005Transmission systems in which the medium consists of the human body1.120
H04W76/14Direct-mode setup1.120
G06F15/0225User interface arrangements  e.g. keyboard  display| Interfaces to other computer systems1.118
G06Q10/101Collaborative creation of products or services1.118
H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation | means for verifying the identity or the authority of a user of a secure or secret communication system | (ref: H04L9/32)1.117
H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence  e.g. one-time-pad [OTP] or Vernam's cipher1.117
H04W76/10Connection setup1.115
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)1.115
G06F21/6254by anonymising data  e.g. decorrelating personal data from the owner's identification1.114
H04W4/50Service provisioning or reconfiguring1.111
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)1.110
G01S13/76wherein pulse-type signals are transmitted1.109
B60R25/246characterised by the challenge triggering1.109
B33Y50/00Data acquisition or data processing for additive manufacturing1.109
E05B47/026the bolt moving rectilinearly1.109
G07C9/00309operated with bidirectional data transmission between data carrier and locks1.107
G07C9/00182operated with unidirectional data transmission between data carrier and locks1.107
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)1.106
G06Q20/0658e-cash managed locally1.106
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms1.106
H04W8/04Registration at HLR or HSS [Home Subscriber Server]1.105
H04W16/14Spectrum sharing arrangements | between different networks1.104
H04W4/08User group management1.104
H04L9/0872using geo-location information  e.g. location data  time  relative position or proximity to other entities1.103
G06F21/552involving long-term monitoring or reporting1.102
G06K7/12using a selected wavelength  e.g. to sense red marks and ignore blue marks1.101
H04W36/0038of security context information1.101
G06F3/167Audio in a user interface  e.g. using voice commands for navigating  audio feedback1.099
G06F8/61Installation1.098
G06F8/654using techniques specially adapted for alterable solid state memories  e.g. for EEPROM or flash memories1.098
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system1.098
H04L45/24Multipath1.097
H04L43/14using software  i.e. software packages | network security related monitoring | (ref: H04L63/1408)1.097
H04L67/143provided for session termination  e.g.  event controlled end of session1.095
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence1.095
H04L63/162at the data link layer1.095
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals1.095
B60R25/102a signal being sent to a remote location  e.g. a radio signal being transmitted to a police station  a security company or the owner1.095
B62H5/20indicating unauthorised use  e.g. acting on signalling devices | alarm locks in general | (ref: E05B45/00)|   e.g. alarm cable or chain lock | (ref: E05B45/005)1.095
H04N7/147Communication arrangements  e.g. identifying the communication as a video-communication  intermediate storage of the signals | selecting | (ref: H04Q)1.094
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)1.094
G06F9/4451User profiles  roaming | user profiles for network-specific applications | (ref: H04L67/306)1.094
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files1.094
G06F21/121Restricting unauthorised execution of programs1.091
G06F9/452Remote windowing  e.g. X-Window System  desktop virtualisation | protocols for telewriting | (ref: H04L67/38)1.084
H04W4/025using location based information parameters1.083
G06F21/12Protecting executable software1.083
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level1.083
G06Q20/3278RFID or NFC payments by means of M-devices1.082
G06Q20/351Virtual cards1.082
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)1.082
G06T11/002D [Two Dimensional] image generation1.082
H04W48/20Selecting an access point1.081
F25D29/00Arrangement or mounting of control or safety devices1.081
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC1.080
H04W60/005Multiple registrations  e.g. multihoming1.080
H04W8/02Processing of mobility data  e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]| Transfer of mobility data  e.g. between HLR  VLR or external networks1.080
G06Q30/0609Buyer or seller confidence or verification1.079
G06Q20/123Shopping for digital content1.079
H04W4/16Communication-related supplementary services  e.g. call-transfer or call-hold1.079
H04W4/12Messaging| Mailboxes| Announcements1.079
H04W8/18Processing of user or subscriber data  e.g. subscribed services  user preferences or user profiles| Transfer of user or subscriber data1.079
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]1.078
H04W28/0289Congestion control | performing reselection for handling the traffic | (ref: H04W36/22)| | load shedding arrangements in network planning | (ref: H04W16/08)| | dynamic wireless traffic scheduling | (ref: H04W72/12)1.077
G10L17/00Speaker identification or verification1.077
G10L17/04Training  enrolment or model building1.077
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)1.076
B67D1/0888Means comprising electronic circuitry (e.g. control panels  switching or controlling means)1.076
B67D1/0022the apparatus comprising means for automatically controlling the amount to be dispensed1.076
G06F11/3684for test design  e.g. generating new test cases1.074
G06F3/0238Programmable keyboards | key guide holders | (ref: G06F3/0224)1.074
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)1.074
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes1.074
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)1.074
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy1.073
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)1.073
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)1.073
H04W36/14Reselecting a network or an air interface1.072
H04W36/08Reselecting an access point1.072
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)1.070
G07C9/00896specially adapted for particular uses1.070
G06Q20/3567Software being in the reader1.069
H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card | arrangements for secret or secure communication | (ref: H04L9/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)|  | | security arrangements in wireless networks | (ref: H04W12/00)1.069
H04W4/02Services making use of location information1.069
G06Q50/18Legal services| Handling legal documents1.066
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity1.066
G06K7/10by electromagnetic radiation  e.g. optical sensing| by corpuscular radiation1.064
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists1.061
H04W8/20Transfer of user or subscriber data1.061
H04W8/205Transfer to or from user equipment or user record carrier1.061
G06F21/604Tools and structures for managing or administering access control systems1.061
H04L63/168above the transport layer1.061
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model1.060
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)1.059
G06F21/85interconnection devices  e.g. bus-connected or in-line devices1.059
H04L9/0822using key encryption key1.057
H04M15/00Arrangements for metering  time-control or time indication | | Metering  charging or billing arrangements for voice wireline or wireless communications  e.g. VoIP1.057
H04L41/082due to updating or upgrading of network functionality  e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02)1.057
H04W40/22using selective relaying for reaching a BTS [Base Transceiver Station] or an access point1.057
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones1.056
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences1.055
G10L15/22Procedures used during a speech recognition process  e.g. man-machine dialogue1.054
G10L15/26Speech to text systems | (ref: G10L15/08)|  takes precedence1.054
G06Q20/20Point-of-sale [POS] network systems | POS | per se|  | (ref: G07F)|  or | (ref: G07G)1.052
B60R25/24using electronic identifiers containing a code not memorised by the user1.052
H04L69/165involving combined use or selection criteria between TCP and UDP protocols | multi-protocol arrangements in general | (ref: H04L69/18)| | multilink protocols in general | (ref: H04L69/14)1.052
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)1.052
H04W48/16Discovering  processing access restriction or access information1.051
G06F17/40Data acquisition and logging | for input to computer | (ref: G06F3/00)|   | | displays as computer output | (ref: G06F3/14)| | for image data processing | (ref: G06T9/00)| | compression in general | (ref: H03M7/30)| | for transmission | (ref: H04B1/66)| | for pictorial communication | (ref: H04N)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station | (ref: H04Q9/00)1.050
H04R25/55using an external connection  either wireless or wired1.049
H04B5/0031for data transfer1.048
G06F13/14Handling requests for interconnection or transfer1.048
G06F3/1253Configuration of print job parameters  e.g. using UI at the client1.047
G06F3/1204resulting in reduced user or operator actions  e.g. presetting  automatic actions  using hardware token storing data1.047
G06F1/1656Details related to functional adaptations of the enclosure  e.g. to provide protection against EMI  shock  water  or to host detachable peripherals like a mouse or removable expansions units like PCMCIA cards  or to provide access to internal components for maintenance or to removable storage supports like CDs or DVDs  or to mechanically mount accessories | mounting of accessories to a computer display | (ref: G06F1/1607)| | display hoods | (ref: G06F1/1603)| | cooling arrangements for portable computers | (ref: G06F1/203)1.047
A61B5/1171based on the shapes or appearances of their bodies or parts thereof1.046
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)1.043
H04L12/46Interconnection of networks1.042
H04L12/4675Dynamic sharing of VLAN information amongst network nodes | configuration of the network or of network elements | (ref: H04L41/08)1.042
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)1.042
H04W12/10Integrity1.042
G06Q40/025Credit processing or loan processing  e.g. risk analysis for mortgages1.041
H04N1/00127Connection or combination of a still picture apparatus with another apparatus  e.g. for storage  processing or transmission of still picture signals or of information associated with a still picture1.040
H04N1/217Interfaces allowing access to a single user1.040
H04N1/00106using land mobile radio networks  e.g. mobile telephone1.040
H04M3/42042Notifying the called party of information on the calling party | details within substation equipment | (ref: H04M1/57)|   signalling details | (ref: H04Q3/72)1.039
H04W76/12Setup of transport tunnels1.039
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]1.039
A24F47/008with electrical heating means1.035
H04L12/14Metering |  charging | or billing|  arrangements | specially adapted for data wireline or wireless communications | payment schemes  architectures or protocols | per se|  | (ref: G06Q20/00)1.035
H04W8/005Discovery of network devices  e.g. terminals1.035
H04W4/44for communication between vehicles and infrastructures  e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]1.033
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)1.033
G06F3/04886by partitioning the screen or tablet into independently controllable areas  e.g. virtual keyboards  menus | (ref: G06F3/04883)|  takes precedence1.033
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation1.032
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]1.032
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode1.030
G06K9/00496Recognising patterns in signals and combinations thereof | signature verification | (ref: G06K9/00154)| | analysing specific medical signals  e.g. bioelectric signals  blood pressure | (ref: A61B5/00)| | processing radar and similar signals | (ref: G01S)| | analysis of chromatographic signals | (ref: G01N30/86)| | processing seismic signals | (ref: G01V1/28)|   | (ref: G01V1/46)| | acoustic speech processing | (ref: G10L)| | transmission systems | (ref: H04B1/00)1.030
H04R25/558Remote control  e.g. of amplification  frequency | remote control of amplifications  tone  or bandwidth | (ref: H03G1/02)| | remote control  e.g. for Hi-Fi systems or audio/video combinations | (ref: H04B1/202)| | remote control in general | (ref: G05F)1.029
H04R25/50Customised settings for obtaining desired overall acoustical characteristics1.029
G06Q20/02involving a neutral party  e.g. certification authority  notary or trusted third party [TTP]1.028
H04L12/1818Conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources  notifying involved parties1.027
H04L67/306User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867)1.027
G06F21/43wireless channels1.026
E05B3/06by means arranged in or on the rose | or escutcheon1.026
A61N1/37276characterised by means for reducing power consumption during telemetry1.026
A61N1/37254Pacemaker or defibrillator security  e.g. to prevent or inhibit programming alterations by hackers or unauthorised individuals1.026
G06F12/1458by checking the subject access rights1.025
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)1.023
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication1.023
H04W88/12Access point controller devices1.022
A61N1/37235Aspects of the external programmer1.021
G16H40/40for the management of medical equipment or devices  e.g. scheduling maintenance or upgrades1.021
G06Q30/018Business or product certification or verification1.021
H04W76/19Connection re-establishment1.020
H04N7/186Video door telephones1.020
H04L9/3297involving time stamps  e.g. generation of time stamps1.019
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]1.019
G01S5/0294Tracking  i.e. predictive filtering  e.g. Kalman filtering1.018
G08G5/0095Aspects of air-traffic control not provided for in the other subgroups of this main group1.017
G08G5/0013with a ground station1.017
H04L12/4604LAN interconnection over a backbone network  e.g. Internet  Frame Relay1.017
H04L41/12network topology discovery or management | topology discovery for routing | (ref: H04L45/02)1.017
H04W48/14using user query | or user detection1.017
H04L9/16the keys or algorithms being changed during operation1.016
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication1.014
G06Q20/382insuring higher security of transaction1.014
G06Q20/12specially adapted for electronic shopping systems1.014
G06F8/658Incremental updates| Differential updates1.013
G06Q20/208Input by product or record sensing  e.g. weighing or scanner processing1.012
G06F9/542Event management| Broadcasting| Multicasting| Notifications1.012
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip1.010
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)1.008
G06K19/07with integrated circuit chips1.006
G06Q20/206comprising security or user identification provision  e.g. password entry1.006
G06F3/011Arrangements for interaction with the human body  e.g. for user immersion in virtual reality | for handicapped people in general | (ref: A61F4/00)| | robot control | (ref: B25J)| | tactile signalling | (ref: G08B)| | blind teaching | (ref: G09B21/00)| | for electrophonic musical instruments | (ref: G10H1/344)| | electronic switches characterised by the way in which the control signals are generated | (ref: H03K17/94)1.005
G06T19/003Navigation within 3D models or images1.005
G06F21/83input devices  e.g. keyboards  mice or controllers thereof1.005
G06Q20/16Payments settled via telecommunication systems1.005
H04W56/001Synchronization between nodes1.004
H04Q3/0029Provisions for intelligent networking1.004
G06F21/725operating on a secure reference time value1.004
G06F3/1287via internet1.003
G06F3/1288in client-server-printer device configuration1.003
G06F1/00Details not covered by groups | (ref: G06F3/00)|  â€“ | (ref: G06F13/00)|  and | (ref: G06F21/00)|  | architectures of general purpose stored program computers | (ref: G06F15/76)1.002
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM] | network arrangements or protocols for real-time communications | (ref: H04L65/00)1.001
H04W60/00Registration  e.g. affiliation to network| De-registration  e.g. terminating affiliation0.997
H04W52/0219where the power saving management affects multiple terminals0.996
G06Q20/327Short range or proximity payments by means of M-devices0.995
H04L9/3236using cryptographic hash functions0.994
E03B9/02Hydrants| Arrangements of valves therein| Keys for hydrants0.993
H04L63/0485Networking architectures for enhanced packet encryption processing  e.g. offloading of IPsec packet processing or efficient security association look-up0.993
G06K19/06037multi-dimensional coding0.993
G06K7/1486Setting the threshold-width for bar codes to be decoded0.993
G07F7/1075PIN is checked remotely0.992
G06F21/71to assure secure computing or processing of information0.992
H04M15/51for resellers  retailers or service providers0.991
H04N7/181for receiving images from a plurality of remote sources0.990
G06Q30/0601Electronic shopping0.990
G06Q10/30Product recycling or disposal administration0.990
G06F3/0416Control and interface arrangements for touch screen0.990
G06F3/044by capacitive means0.990
H04W76/25Maintenance of established connections0.990
H04W36/0033with transfer of context information0.990
H04M11/025Door telephones | adapted for television | (ref: H04N7/186)0.989
G10H1/0033Recording/reproducing or transmission of music for electrophonic musical instruments | of accompaniment | (ref: G10H1/361)0.988
H04B5/0037for power transfer0.988
H04W88/04adapted for relaying to or from another terminal or user0.988
G06Q50/06Electricity  gas or water supply0.987
H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom0.987
A63F13/23for interfacing with the game device  e.g. specific interfaces between game controller and console0.987
A63F13/31Communication aspects specific to video games  e.g. between several handheld game devices at close range0.987
H04N21/63Control signaling | related to video distribution|  between client  server and network components| Network processes for video distribution between server and clients | or between remote clients|   e.g. transmitting basic layer and enhancement layers over different transmission paths  setting up a peer-to-peer communication via Internet between remote STB's| Communication protocols| Addressing | signalling  control or architecture for real-time multimedia communications | (ref: H04L29/06183)| | arrangements for peer-to-peer communications | (ref: H04L29/08306)0.987
G06Q10/1095Meeting or appointment0.987
G06Q10/103Workflow collaboration or project management0.987
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities0.986
G06Q30/0645Rental  i.e. leasing0.986
H04W4/35for the management of goods or merchandise0.985
H04L65/403Arrangements for multiparty communication  e.g. conference | television conferencing systems | (ref: H04N7/15)| | telephonic conference systems | (ref: H04M3/56)| | data switching systems for computer conference | (ref: H04L12/1813)0.984
G06F21/577Assessing vulnerabilities and evaluating computer system security0.984
G09B19/0053Computers  e.g. programming0.984
G07D7/0043using barcodes0.983
G06F9/547Remote procedure calls [RPC]| Web services0.983
G06F21/72in cryptographic circuits0.982
G05B19/0428Safety  monitoring | (ref: G05B19/0423)|  takes precedence0.982
H04M1/23Construction or mounting of dials or of equivalent devices| Means for facilitating the use thereof | by improving visibility | (ref: H04M1/22)0.982
H04N21/25875involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.982
H04W76/23Manipulation of direct-mode connections0.980
H04W72/0413in uplink direction of a wireless link  i.e. towards network0.980
A61N1/37217characterised by the communication link  e.g. acoustic or tactile0.979
G16H20/13delivered from dispensers0.978
H04M3/42059Making use of the calling party identifier0.978
G07C13/00Voting apparatus0.978
H04W12/00Security arrangements  e.g. access security or fraud detection| Authentication  e.g. verifying user identity or authorisation| Protecting privacy or anonymity0.978
G11B20/10Digital recording or reproducing | digital computers in which at least part of the computation is effected electrically  arrangements for handling digital data | (ref: G06F)| | transmission of digital information | (ref: H04L)0.978
G11B19/122involving the detection of an identification or authentication mark | record carriers indicating unauthorised or prior use | (ref: G11B23/28)0.978
G06F13/1689Synchronisation and timing concerns | synchronisation on a memory bus | (ref: G06F13/4234)0.977
A61B5/0015characterised by features of the telemetry system0.976
G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station  e.g. relaying alarm signals in order to extend communication range0.975
H04W16/02Resource partitioning among network components  e.g. reuse partitioning0.975
H04L12/413with random access  e.g. carrier-sense multiple-access with collision detection (CSMA-CD)0.974
G06Q20/3274using a pictured code  e.g. barcode or QR-code  being displayed on the M-device0.974
G06Q20/3221Access to banking information through M-devices0.973
G06Q30/0282Business establishment or product rating or recommendation0.973
G06F21/84output devices  e.g. displays or monitors0.972
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine0.972
G05B19/406characterised by monitoring or safety | (ref: G05B19/19)|  takes precedence0.971
G08B21/00Alarms responsive to a single specified undesired or abnormal operating condition and not elsewhere provided for | alarms on gas pipes | (ref: F17D3/01)0.971
G06Q90/205Building evacuation0.971
G05D1/0287involving a plurality of land vehicles  e.g. fleet or convoy travelling | traffic control systems for road vehicles | (ref: G08G1/00)|   particularly anticollision systems | (ref: G08G1/16)0.970
G05D1/00Control of position  course or altitude of land  water  air  or space vehicles  e.g. automatic pilot | steering applicable only to other than landborne vehicles  e.g. three-dimensional steering applicable to both aircraft and submarines | (ref: B60K)|  | construction or disposition of steering means on land vehicles | (ref: B62)|   on waterborne vessels | (ref: B63)|  | manual or automatic control of aircraft  e.g. using automatic pilot or radiated signal | (ref: B64C)|  | radio navigation systems or analogous systems using other waves | (ref: G01S)0.970
G06Q50/30Transportation| Communications0.970
G07B17/0008Communication details outside or between apparatus | coin-freed apparatus for franking | per se|  | (ref: G07F17/26)0.969
G06Q20/1085involving automatic teller machines [ATMs]0.969
G06Q40/12Accounting0.968
H04L67/1082involving incentive schemes0.968
G05B13/042in which a parameter or coefficient is automatically adjusted to optimise the performance0.967
H04W24/10Scheduling measurement reports | | Arrangements for measurement reports0.967
H04M7/0012Details of application programming interfaces [API] for telephone networks| Arrangements which combine a telephonic communication equipment and a computer  i.e. computer telephony integration [CPI] arrangements0.966
G06Q20/3827Use of message hashing0.965
G08G1/167Driving aids for lane monitoring  lane changing  e.g. blind spot detection0.964
G08G1/096725where the received information generates an automatic action on the vehicle control0.964
H04L63/1458Denial of Service0.963
G06F3/1454involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays  e.g. teledisplay0.963
G06F3/165Management of the audio stream  e.g. setting of volume  audio stream path0.963
G06Q10/087Inventory or stock management  e.g. order filling  procurement  balancing against orders0.963
G06F21/73by creating or determining hardware identification  e.g. serial numbers0.962
H04W76/27Transitions between radio resource control [RRC] states0.961
H04L12/1403Architecture for metering  charging or billing0.961
H04M3/00Automatic or semi-automatic exchanges | constructional details of telephone exchanges | (ref: H04Q1/02)0.961
G10L15/30Distributed recognition  e.g. in client-server systems  for mobile phones or network applications0.959
H04W76/11Allocation or use of connection identifiers0.959
H04W60/04using triggered events0.959
G06Q20/3825Use of electronic signatures0.959
G06Q40/04Exchange  e.g. stocks  commodities  derivatives or currency exchange0.959
G06Q30/0635Processing of requisition or of purchase orders0.958
G06Q20/201Price look-up processing  e.g. updating0.958
G06Q30/0639Item locations0.958
H04W76/15Setup of multiple wireless link connections0.958
H04L41/0816due to adaptation  e.g. in response to network events0.953
G05B19/4184characterised by fault tolerance  reliability of production system0.953
G06F21/88Detecting or preventing theft or loss0.952
G06F17/00Digital computing or data processing equipment or methods  specially adapted for specific functions0.952
H04L63/14for detecting or protecting against malicious traffic0.952
H04L67/08adapted for terminal emulation  e.g. telnet | protocols for telewriting or protocols for networked simulations  virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455)0.952
H04B1/40Circuits0.952
G06F11/3409for performance assessment0.951
G06F21/6281at program execution time  where the protection is within the operating system0.950
G06Q20/32using wireless devices0.950
G06Q20/24Credit schemes  i.e. "pay after"0.950
H04L63/0263Rule management0.950
H04L9/3252using DSA or related signature schemes  e.g. elliptic based signatures  ElGamal or Schnorr schemes0.950
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)0.950
H04L67/00Network-specific arrangements or communication protocols supporting networked applications | message switching systems | (ref: H04L51/00)| | network management protocols | (ref: H04L41/00)| | routing or path finding of packets in data switching networks | (ref: H04L45/00)| | protocols for real-time multimedia communication | (ref: H04L65/00)| | information retrieval | (ref: G06F17/30)| | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)| | network structures or processes for video distribution between server and client or between remote clients | (r0.950
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities0.950
H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof0.950
H04L65/4053without floor control0.949
H04L12/283Processing of data at an internetworking point of a home automation network0.948
H04L41/22using GUI [Graphical User Interface]0.948
G06Q10/20Product repair or maintenance administration0.948
G06Q20/3678e-cash details  e.g. blinded  divisible or detecting double spending0.948
G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer  e.g. network details  transfer of information from host to ECR or from ECR to ECR0.947
G06F3/16Sound input| Sound output | conversion of speech into digital information or | vice versa|  | (ref: G10L)0.627
G10L25/78Detection of presence or absence of voice signals | switching of direction of transmission by voice frequency in two-way loud-speaking telephone systems | (ref: H04M9/10)0.627
G10L25/51for comparison or discrimination0.627
H04Q11/0003Details0.597
G02B6/255Splicing of light guides  e.g. by fusion or bonding0.597
G06K19/07354by biometrically sensitive means  e.g. fingerprint sensitive | fingerprint sensors in general | (ref: G06K9/00006)| | biometrically activated access control | (ref: G07C9/00071)0.572
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities0.564
H04W4/14Short messaging services  e.g. short message services [SMS] or unstructured supplementary service data [USSD]0.550
G06F21/6236between heterogeneous systems0.544
G01S19/48by combining or switching between position solutions derived from the satellite radio beacon positioning system and position solutions derived from a further system0.544
G01S5/02using radio waves | (ref: G01S19/00)|  takes precedence0.544
G09C1/00Apparatus or methods whereby a given sequence of signs  e.g. an intelligible text  is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00)0.544
G01S19/10providing dedicated supplementary positioning signals0.544
A61N1/37223Circuits for electromagnetic coupling0.540
A61B5/0031Implanted circuitry0.540
A61B5/117Identification of persons | methods or arrangements for recognising patterns  e.g. fingerprints  | (ref: G06K9/00)| | identification of persons by analysing their voice or speech | (ref: G10L17/00)0.540
A61N1/37247User interfaces  e.g. input or presentation means0.540
G16H40/67for remote operation0.540
G01S5/14Determining absolute distances from a plurality of spaced points of known location0.533
H04W64/00Locating users or terminals | or network equipment|  for network management purposes  e.g. mobility management0.533
H04B17/318Received signal strength0.533
G01S11/06using intensity measurements0.533
G06K7/14172D bar codes0.531
G06T7/00Image analysis0.531
G07F7/0866by active credit-cards adapted therefor | (ref: G07F7/1008)|  takes precedence0.527
G06Q20/10specially adapted for electronic funds transfer [EFT] systems| specially adapted for home banking systems0.527
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.527
G06Q20/3552Downloading or loading of personalisation data0.527
G07F7/0833Card having specific functional components0.527
G07F7/0846On-card display means0.527
G07F7/08by coded identity card or credit card | or other personal identification means | without personal verification means | (ref: G07F7/02)0.527
G07F7/10together with a coded signal |   e.g. in the form of personal identification information  like personal identification number [PIN] or biometric data0.527
G07G1/0036Checkout procedures0.520
G06Q20/3821Electronic credentials0.520
H04W88/06adapted for operation in multiple networks | or having at least two operational modes|   e.g. multi-mode terminals0.519
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)0.517
G06Q20/409Card specific authentication in transaction processing0.517
H04W48/02Access restriction performed under specific conditions0.515
H04L9/3066involving algebraic varieties  e.g. elliptic or hyper-elliptic curves0.515
G06Q20/023characterized in that the neutral party is a clearing house0.514
G06Q20/0655e-cash managed centrally0.514
G06Q20/108Remote banking  e.g. home banking0.514
H04L65/4015where at least one of the additional parallel sessions is real time or time sensitive  e.g. white board sharing  collaboration or spawning of a subconference | telewriting  virtual reality or network gaming | (ref: H04L67/38)0.514
G06F3/1222Increasing security of the print job0.513
B41J3/4075Tape printers| Label printers | tape cartridges | (ref: B41J15/044)0.513
B41J29/38Drives  motors  controls or automatic cut-off devices for the entire printing mechanism0.513
G06Q20/0855involving a third party0.510
H04L9/0625with splitting of the data block into left and right halves  e.g. Feistel based algorithms  DES  FEAL  IDEA or KASUMI0.505
H04B5/0075using inductive coupling | transformers or inductances adapted for inductive coupling | (ref: H01F38/14)0.505
H04B5/0056for use in interrogation  identification or read/write systems | record carriers | (ref: G06K7/00)|   | (ref: G06K19/00)| | for railways | (ref: B61L3/12)0.505
G07F7/122Online card verification0.505
G06F21/77in smart cards0.505
G06Q20/204comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit0.505
G06Q20/227characterized in that multiple accounts are available to the payer0.505
G06Q20/4097Mutual authentication between card and transaction partners0.505
G06Q20/3563Software being resident on card0.505
G06Q20/40975Use of encryption for mutual authentication0.505
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.505
H04L9/3013involving the discrete logarithm problem  e.g. ElGamal or Diffie-Hellman systems0.502
G07F19/211Software architecture within ATMs or in relation to the ATM network0.499
G07F7/1041PIN input keyboard gets new key allocation at each use0.499
G06Q20/353Payments by additional cards plugged into M-devices0.499
G07F7/1091Use of an encrypted form of the PIN0.499
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)0.498
H04L41/085Keeping track of network configuration0.496
H04L41/0886Fully automatic configuration0.496
G16H40/60for the operation of medical equipment or devices0.495
A61B5/0022Monitoring a patient using a global network  e.g. telephone networks  internet0.495
A61B5/1172using fingerprinting0.495
A61B5/002Monitoring the patient using a local or closed circuit  e.g. in a room or building | (ref: A61B5/0017)|  takes precedence0.495
G16H80/00ICT specially adapted for facilitating communication between medical practitioners or patients  e.g. for collaborative diagnosis  therapy or health monitoring0.495
G16H10/65stored on portable record carriers  e.g. on smartcards  RFID tags or CD0.495
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]0.495
A61B5/6898Portable consumer electronic devices  e.g. music players  telephones  tablet computers0.495
A61B5/1176Recognition of faces0.495
G06Q20/4033Local solvency checks0.493
G06Q20/065using e-cash0.493
H04W8/26Network addressing or numbering for mobility support0.492
H04M3/493Interactive information services  e.g. directory enquiries | | Arrangements therefor  e.g. interactive voice response [IVR] systems or voice portals0.491
H04L63/308retaining data  e.g. retaining successful  unsuccessful communication attempts  internet access  or e-mail  internet telephony  intercept related information or call content0.490
G06K9/6218Clustering techniques0.490
G06F17/16Matrix or vector computation |   e.g. matrix-matrix or matrix-vector multiplication  matrix factorization | matrix transposition | (ref: G06F7/78)0.490
H04L12/44Star or tree networks0.489
H04L67/1042involving topology management mechanisms0.489
H04L12/185with management of multicast group membership0.489
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.489
G06F9/45558Hypervisor-specific management and integration aspects0.488
H04N21/4408involving video stream encryption  e.g. re-encrypting a decrypted video stream for redistribution in a home network | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.488
H04N21/8456by decomposing the content in the time domain  e.g. in time segments0.488
H04N21/436Interfacing a local distribution network  e.g. communicating with another STB  inside the home | | Interfacing an external card to be used in combination with the client device| arrangements specially adapted plural spots in a confined site in broadcast systems | (ref: H04H20/63)0.488
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)0.488
H04N21/4331Caching operations  e.g. of an advertisement for later insertion during playback0.488
G06Q20/367involving intelligent token  e.g. electronic purse0.488
G06Q20/4093Monitoring of card authentication0.488
G07G5/00Receipt-giving machines | cash registers giving receipts | (ref: G07G1/00)0.488
G06Q20/3227Use of a security embedded in M-devices0.488
G06Q20/425using two different networks  one for transaction and one for security confirmation0.488
B60R25/31of human presence inside or outside the vehicle0.485
B60R25/23using manual input of alphanumerical codes0.485
A61B34/25User interfaces for surgical systems0.481
G16H40/63for local operation0.481
G06K7/10366the interrogation device being adapted for miscellaneous applications0.481
A61B18/1233with circuits for assuring patient safety0.481
A61B90/00Instruments  implements or accessories specially adapted for surgery or diagnosis and not covered by any of the groups | (ref: A61B1/00)|  - | (ref: A61B50/00)|   e.g. for luxation treatment or for protecting wound edges | protective face masks | (ref: A41D13/11)| | surgeon's or patient's gowns or dresses | (ref: A41D13/12)| | devices for carrying-off  for treatment of  or for carrying-over  body liquids | (ref: A61M1/00)0.481
A61B18/042using additional gas becoming plasma0.481
A61B18/14Probes or electrodes therefor0.481
A61B90/98using electromagnetic means  e.g. transponders0.481
A61B18/1206Generators therefor0.481
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.481
H04R25/00Deaf-aid sets | providing an auditory perception| Electric tinnitus maskers providing an auditory perception| constructions of transducers | per se|  | (ref: H04R9/00)|  - | (ref: H04R23/00)| | | non-electric hearing aids | (ref: A61F11/008)| | replacing direct auditory perception by another kind of perception | (ref: A61F11/04)| | electrical stimulation of auditory nerves to promote the auditory function | (ref: A61N1/36036)| | structural combination with spectacle frames | (ref: G02C11/06)| | processing of speech signals | (ref: G10L21/00)0.478
H04M15/8044Least cost routing0.476
H04M15/8055Selecting cheaper transport technology for a given service0.476
H04M15/8038Roaming or handoff0.476
H04M15/8214Data or packet based0.476
H04M15/8228Session based0.476
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)0.476
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme0.475
G07F19/20Automatic teller machines [ATMs]0.474
H04K3/41characterized by the control of the jamming activation or deactivation time | control of jamming activation and deactivation time only for the purpose of alternating between jamming mode and target monitoring mode | (ref: H04K3/45)0.473
G06F21/75by inhibiting the analysis of circuitry or operation0.473
H04K3/28with jamming and anti-jamming mechanisms both included in a same device or system  e.g. wherein anti-jamming includes prevention of undesired self-jamming resulting from jamming0.473
G06F21/554involving event detection and direct action0.473
H04W24/00Supervisory  monitoring or testing arrangements0.473
H04W84/12WLAN [Wireless Local Area Networks]0.472
H04W8/24Transfer of terminal data0.472
G06Q20/4018using the card verification value [CVV] associated with the card0.471
G06F9/4418Suspend and resume| Hibernate and awake0.471
H04L43/0811Connectivity0.471
G06Q20/3415Cards acting autonomously as pay-media0.470
G06Q20/102Bill distribution or payments0.470
G06Q20/383Anonymous user system0.470
H04L63/064Hierarchical key distribution  e.g. by multi-tier trusted parties0.469
G06N3/0454using a combination of multiple neural nets0.467
G06N3/08Learning methods0.467
G06N3/082modifying the architecture  e.g. adding or deleting nodes or connections  pruning0.467
G06N3/0472using probabilistic elements  e.g. p-rams  stochastic processors0.467
H04W4/46for vehicle-to-vehicle communication [V2V]0.465
H04L51/18Messages including commands or codes to be executed either at an intermediate node or at the recipient to perform message-related actions | computer aided management of electronic mail | (ref: G06Q10/10)| | networked applications for remote control or remote monitoring of the application | (ref: H04L67/025)| | networked applications involving the movement of software or configuration parameters | (ref: H04L67/34)0.465
H04L9/3073involving pairings  e.g. identity based encryption [IBE]  bilinear mappings or bilinear pairings  e.g. Weil or Tate pairing0.465
G06Q20/407Cancellation of a transaction0.464
G06Q10/025Coordination of plural reservations  e.g. plural trip segments  transportation combined with accommodation0.464
H04L41/0668selecting new candidate element0.464
H04L41/0681involving configuration of triggering conditions0.464
H04W40/12based on transmission quality or channel quality0.464
H04L45/121Minimizing delay0.464
H04L45/28Route fault recovery | network fault recovery | (ref: H04L41/0654)0.464
H04W40/34Modification of an existing route0.464
H04L41/5019Ensuring SLA | flow or congestion control at network level | (ref: H04L47/10)0.464
H04W36/305Reselection due to radio link failure | control signalling for hand-off failure | (ref: H04W36/0079)0.464
H04W24/04Arrangements for maintaining operational condition0.464
H04L63/1425Traffic logging  e.g. anomaly detection0.463
G06N3/084Back-propagation0.462
H04W4/38for collecting sensor information0.462
G06F21/755with measures against power attack0.462
H04L9/0662with particular pseudorandom sequence generator0.461
G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component  e.g. monitoring of power  currents  temperature  humidity  position  vibrations | thermal management in cooling arrangements of a computing system | (ref: G06F1/206)0.461
G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component  e.g. monitoring the presence of processing resources  peripherals  I/O links  software programs | verification or detection of system hardware configuration | (ref: G06F11/2247)0.461
H04L65/1079of unsolicited session attempts  e.g. SPIT | message switching systems  e.g. electronic mail systems  with filtering and selective blocking capabilities | (ref: H04L51/12)0.460
H04M3/2281Call monitoring  e.g. for law enforcement purposes| Call tracing| Detection or prevention of malicious calls0.460
H04L65/1069Setup | computer conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources or notifying involved parties | (ref: H04L12/1818)| | admission control or resource reservation in packet switching networks | (ref: H04L47/70)| | arrangements for peer-to-peer networking in network applications | (ref: H04L67/104)| | session management in network applications | (ref: H04L67/14)| | negotiation of communication capabilities | (ref: H04L69/24)0.460
H04M3/2272Subscriber line supervision circuits  e.g. call detection circuits0.460
H04L12/2807Exchanging configuration information on appliance services in a home automation network | adress allocation | (ref: H04L29/12207)| | arrangements for maintenance or administration involving network analysis for automatically determining the actual topology of a network | (ref: H04L41/12)| | hardware or software tools for network management using graphical user interfaces | (ref: H04L41/22)0.460
H04L12/2803Home automation networks0.460
H04L43/10using active monitoring  e.g. heartbeat protocols  polling  ping  trace-route0.459
H04L41/0893Assignment of logical groupings to network elements| Policy based network management or configuration0.459
H04L43/12using dedicated network monitoring probes0.459
G08B3/00Audible signalling systems| Audible personal calling systems | signalling devices actuated by tyre pressure | (ref: B60C23/02)| | alarm locks | (ref: E05B45/00)|   e.g. with mechanically-operated bells | (ref: E05B45/02)|   electric | (ref: E05B45/06)| | sound producing devices  e.g. hooter  buzzer  | (ref: G10K)| | telephonic systems provided with personal calling arrangements | (ref: H04M11/022)0.456
G08B5/36using visible light sources0.456
G06F3/04815Interaction with three-dimensional environments  e.g. control of viewpoint to navigate in the environment0.455
G06F3/012Head tracking input arrangements0.455
G06F3/013Eye tracking input arrangements | (ref: G06F3/015)|  takes precedence0.455
G06F3/017Gesture based interaction  e.g. based on a set of recognized hand gestures | interaction based on gestures traced on a digitiser | (ref: G06F3/04883)0.455
G06Q20/29characterised by micropayments0.453
G06Q20/42Confirmation  e.g. check or permission by the legal debtor of payment0.453
G06Q50/01Social networking0.453
H04M15/853Calculate maximum communication time or volume0.452
H04M15/854Available credit0.452
H04M15/83Notification aspects0.452
H04M15/8066According to the number of recipients0.452
H04M15/8022Determining tariff or charge band0.452
H04W88/16Gateway arrangements0.452
H04M15/8011using class of subscriber0.452
H04M15/755Account identification0.452
H04M15/80Rating or billing plans| Tariff determination aspects0.452
H04M15/66Policy and charging system0.452
H04M15/85characterised by the type of condition triggering a notification0.452
G07F17/3244Payment aspects of a gaming system  e.g. payment schemes  setting payout ratio  bonus or consolation prizes0.452
G07F17/3225Data transfer within a gaming system  e.g. data sent between gaming machines and users0.452
G07F17/3241Security aspects of a gaming system  e.g. detecting cheating  device integrity  surveillance | computer security | (ref: G06F21/00)0.452
H04L9/0819Key transport or distribution  i.e. key establishment techniques where one party creates or otherwise obtains a secret value  and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062)0.452
G06F12/1483using an access-table  e.g. matrix or list0.451
G06F21/805using a security table for the storage sub-system0.451
G06F12/0246in block erasable memory  e.g. flash memory0.451
G06F12/0238Memory management in non-volatile memory  e.g. resistive RAM or ferroelectric memory0.451
G05B19/058Safety  monitoring0.450
G05B19/056Programming the PLC0.450
H04L9/3255using group based signatures  e.g. ring or threshold signatures0.449
H04L47/82Miscellaneous aspects0.449
H04L43/0852Delays0.449
H04L69/28Timer mechanisms used in protocols0.448
H04L41/5003Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]0.447
H04N1/00225details of image data generation  e.g. scan-to-email or network scanners | using an image reading device as a local input to a computer | (ref: H04N1/00241)0.447
H04N1/00949Combining applications  e.g. to create workflows | allocation of computer machine resources considering the execution order of a plurality of tasks | (ref: G06F9/5038)0.447
G06F1/1632External expansion units  e.g. docking stations0.447
G06F1/1628Carrying enclosures containing additional elements  e.g. case for a laptop and a printer0.447
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements0.447
H04M1/22Illuminating| Arrangements for improving visibility of characters on dials0.447
G06K7/1095the scanner comprising adaptations for scanning a record carrier that is displayed on a display-screen or the like0.446
G06T11/60Editing figures and text| Combining figures or text0.446
G06K19/06112the marking being simulated using a light source  e.g. a barcode shown on a display or a laser beam with time-varying intensity profile0.446
G06Q20/403Solvency checks0.445
G06Q20/356Aspects of software for card payments0.445
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)0.445
G06F11/0709in a distributed system consisting of a plurality of standalone computer nodes  e.g. clusters  client-server systems0.444
G06F11/0793Remedial or corrective actions | by retry | (ref: G06F11/1402)| | recovery from an exception in an instruction pipeline | (ref: G06F9/3861)| | in a network context | (ref: H04L29/14)0.444
F03D80/50Maintenance or repair0.442
H04L41/5096wherein the managed service relates to distributed or central networked applications | management of file systems | (ref: G06F17/30067)| | management of structured data stores | (ref: G06F17/30286)0.441
G07C9/00904for hotels  motels  office buildings or the like0.440
G06Q50/12Hotels or restaurants0.440
G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction0.439
G06F3/0486Drag-and-drop0.438
G06T7/40Analysis of texture | depth or shape recovery from texture | (ref: G06T7/529)0.438
G07F7/127in which both online and offline card verification can take place0.437
H04L69/163Adaptation of TCP data exchange control procedures | generic OSI layer 4 protocols  e.g. SCTP | (ref: H04L69/326)| | TCP or UDP flow control procedures | (ref: H04L47/19)| | error control procedures in general | (ref: H04L1/18)0.436
H04L65/1063Application servers | systems providing special services to telephonic subscribers | (ref: H04M3/42)0.435
G06F21/556involving covert channels  i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755)0.434
G07F7/1025Identification of user by a PIN code0.434
H04L67/142provided for managing session state for stateless protocols| Signalling a session state| State transitions| Keeping-state mechanisms0.434
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.432
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow0.431
G06F9/5038considering the execution order of a plurality of tasks  e.g. taking priority or time dependency constraints into consideration | scheduling strategies | (ref: G06F9/4881)|  and subgroups0.431
G06F3/0484for the control of specific functions or operations  e.g. selecting or manipulating an object or an image  setting a parameter value or selecting a range0.431
H04L43/0876Network utilization0.430
G06F3/0485Scrolling or panning0.429
G06F9/468Specific access rights for resources  e.g. using capability register0.429
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling0.429
G06F3/04883for entering handwritten data  e.g. gestures  text0.428
G06F3/0488using a touch-screen or digitiser  e.g. input of commands through traced gestures0.428
G06F3/0412Integrated displays and digitisers0.428
G06Q20/388Mutual authentication without cards0.427
H02J7/0047with indicating devices | (ref: H02J7/0021)|  takes precedence0.427
H02J50/10using inductive coupling0.427
G06F9/453Help systems0.427
G06F9/541via adapters  e.g. between incompatible applications0.427
H04L5/0023Time-frequency-space0.425
H04W72/0446the resource being a slot  sub-slot or frame0.425
H04B7/0408using two or more beams  i.e. beam diversity0.425
H04B7/0695using beam selection0.425
H04L5/0053Allocation of signaling  i.e. of overhead other than pilot signals0.425
G01S19/13Receivers0.425
H04L5/0048Allocation of pilot signals  i.e. of signals known to the receiver0.425
H04B7/0456Selection of precoding matrices or codebooks  e.g. using matrices antenna weighting0.425
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]0.423
G06F9/543User-generated data transfer  e.g. clipboards  dynamic data exchange [DDE]  object linking and embedding [OLE]0.422
H04L63/166at the transport layer0.422
G06Q10/109Time management  e.g. calendars  reminders  meetings  time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)0.422
G06F11/2023Failover techniques0.422
G06F3/1232Transmitting printer device capabilities  e.g. upon request or periodically0.420
G06F3/1279Controller construction  e.g. aspects of the interface hardware0.420
G06F3/1285Remote printer device  e.g. being remote from client or server0.420
G06F3/1258by updating job settings at the printer0.420
G06F3/1257by using pre-stored settings  e.g. job templates  presets  print styles0.420
H04W4/30Services specially adapted for particular environments  situations or purposes0.420
H04L65/1073Registration | arrangements for addressing or naming in data networks | (ref: H04L61/00)0.420
H04L9/3218using proof of knowledge  e.g. Fiat-Shamir  GQ  Schnorr  ornon-interactive zero-knowledge proofs0.419
H04W80/02Data link layer protocols0.418
G10L15/01Assessment or evaluation of speech recognition systems0.417
G06K9/6277based on a parametric (probabilistic) model  e.g. based on Neyman-Pearson lemma  likelihood ratio  Receiver Operating Characteristic [ROC] curve plotting a False Acceptance Rate [FAR] versus a False Reject Rate [FRR] | segmentation of touching or overlapping patterns involving probabilistic approaches | (ref: G06K9/34)| | image connectivity analysis involving probabilistic approaches  e.g. Markov Random Fields techniques  | (ref: G06K9/4638)| | segmentation involving probabilistic approaches for general image processing | (ref: G06T7/143)0.417
H04W4/026using orientation information  e.g. compass0.416
H04L69/18Multi-protocol handler  e.g. single device capable of handling multiple protocols | multilayer or multiprotocol switches | (ref: H04L49/602)0.416
G01S13/0209Systems with very large relative bandwidth  i.e. larger than 10 %  e.g. baseband  pulse  carrier-free  ultrawideband0.416
G01S13/08Systems for measuring distance only | indirect measurement | (ref: G01S13/46)0.416
H04W4/40for vehicles  e.g. vehicle-to-pedestrians [V2P]0.416
G06K19/10at least one kind of marking being used for authentication  e.g. of credit or identity cards | identification cards not to be read by a machine | (ref: B42D25/00)| | |  verification of coded identity or credit cards in mechanisms actuated by them | (ref: G07F7/12)|  | | printed identity or similar identification-bearing cards not for use with a machine | (ref: B42D25/00)0.416
E05B73/0082for office machines  e.g. PC's  portable computers  typewriters  calculators0.416
E05B65/006for covers or panels | for manholes | (ref: E02D29/1427)| | for holes enabling access to installations in buildings | (ref: E04F19/08)| | for pressure vessels | (ref: F16J13/00)0.416
H04N1/4426involving separate means  e.g. a server  a magnetic card0.416
E05B47/0002with electromagnets0.416
H04N1/4433to an apparatus  part of an apparatus or an apparatus function0.416
E05B47/0046Electric or magnetic means in the striker or on the frame| Operating or controlling the striker plate | (ref: E05B47/0696)|   | (ref: E05B63/248)|  take precedence0.416
E05B49/00Electric permutation locks| Circuits therefor | | Mechanical aspects of electronic locks| Mechanical keys therefor | arrangements for sensing or reading record carriers | (ref: G06K7/00)|   | (ref: G06K9/00)| | mechanisms including electronic locks actuated by nonmechanical keys such as passive and active electrical keys and other data carriers | (ref: G07C9/00)|   | (ref: G07F7/00)| | electronic switching | (ref: H03K17/00)0.416
G06F21/6272by registering files or documents with a third party0.415
B65F1/02without removable inserts0.415
G07C9/00912for safes  strong-rooms  vaults or the like0.415
B65F1/1615with means for locking  fastening or permanently closing thereof0.415
H04L63/1433Vulnerability analysis0.415
H04W72/0453the resource being a frequency  carrier or frequency band0.414
H04W72/082using the level of interference0.414
H04L9/3257using blind signatures0.414
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability0.413
G06F21/565by checking file integrity0.413
B42D25/23Identity cards0.413
H04W36/0069in case of dual connectivity  e.g. CoMP  decoupled uplink/downlink or carrier aggregation | allocation of physical resources in CoMP or in carrier aggregation | (ref: H04L5/0035)0.413
H04L5/0091Signaling for the administration of the divided path0.413
H04W16/32Hierarchical cell structures0.413
H04W84/045using private Base Stations  e.g. femto Base Stations  home Node B0.413
H04M1/67by electronic means0.412
H04W4/20Services signaling| Auxiliary data signalling  i.e. transmitting data via a non-traffic channel0.412
G06F15/7807System on chip  i.e. computer system on a single chip| System in package  i.e. computer system on one or more chips in a single package0.412
G06F13/28using burst mode transfer  e.g. direct memory access | DMA|   cycle steal | (ref: G06F13/32)|  takes precedence0.412
G06F8/71Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management0.412
G06F3/04812interaction techniques based on cursor appearance or behaviour being affected by the presence of displayed objects  e.g. visual feedback during interaction with elements of a graphical user interface through change in cursor appearance  constraint movement or attraction/repulsion with respect to a displayed object | interaction techniques based on cursor behaviour involving tactile or force feedback | (ref: G06F3/016)0.412
G06Q20/347Passive cards0.412
G07F7/1066PIN data being compared to data on card0.412
H04L69/326in the transport layer  i.e. layer four | TCP/IP | (ref: H04L69/16)| | streaming protocols  e.g. RTP  | (ref: H04L65/608)0.411
H04L12/2854Wide area networks  e.g. public data networks0.411
H04L69/14Multichannel or multilink protocols0.411
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)0.411
H04L67/145provided for avoiding end of session  e.g. keep-alive  heartbeats  resumption message  wake-up for inactive or interrupted session0.411
B60R25/33of global position  e.g. by providing GPS coordinates0.411
G01S19/16Anti-theft| Abduction0.411
G06F9/4411Configuring for operating with peripheral devices| Loading of device drivers0.410
G06F21/313using a call-back technique via a telephone network0.410
H04B1/3816Mechanical arrangements for accommodating identification devices  e.g. cards or chips| with connectors for programming identification devices0.409
H04L67/303Terminal profiles0.409
G06F7/588Random number generators  i.e. based on natural stochastic processes0.409
H04L9/0618Block ciphers  i.e. encrypting groups of characters of a plain text message using fixed encryption transformation0.409
G08G1/202Dispatching vehicles on the basis of a location  e.g. taxi dispatching0.409
G08G1/005including pedestrian guidance indicator0.409
B60R25/257Voice recognition0.409
B60R25/255Eye recognition0.409
G06F3/048Interaction techniques based on graphical user interfaces [GUI]0.409
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)0.409
G06Q20/38Payment protocols| Details thereof0.408
H04L9/302involving the integer factorization problem  e.g. RSA or quadratic sieve [QS] schemes0.408
H04W76/18Management of setup rejection or failure0.408
G06F9/44526Plug-ins| Add-ons0.406
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.406
H04N21/458Scheduling content for creating a personalised stream  e.g. by combining a locally stored advertisement with an incoming stream| Updating operations  e.g. for OS modules | | time-related management operations | arrangements for replacing or switching information during the broadcast or during the distribution | (ref: H04H20/10)0.405
H04N21/4436Power management  e.g. shutting down unused components of the receiver | power management in computer systems | (ref: G06F1/3203)| | hibernate or awake process in computer systems | (ref: G06F9/4418)0.405
H04N21/252Processing of multiple end-users' preferences to derive collaborative data0.405
H04N21/4781Games0.405
H04N21/6582Data stored in the client  e.g. viewing habits  hardware capabilities  credit card number | arrangements where receivers interact with the broadcast | (ref: H04H20/38)0.405
H04N21/2543Billing |   e.g. for subscription services | payment schemes  architectures or protocols | (ref: G06Q20/00)| | e-commerce | (ref: G06Q30/00)| | arrangements for billing for the use of broadcast information or broadcast-related information | (ref: H04H60/21)| | charging arrangements in data networks | (ref: H04L12/14)0.405
H04N21/25891being end-user preferences | retrieval of video data in a video database based on user preferences | (ref: G06F17/30843)| | arrangements for recognizing users' preferences | (ref: H04H60/46)| | protocols involving user profiles for network applications in communication control or processing | (ref: H04L29/08936)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)0.405
H04N21/4122additional display device  e.g. video projector | digital output for controlling a plurality of local displays | (ref: G06F3/1423)0.405
H04N21/63345by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | arrangements for network security key management | (ref: H04L29/06707)0.405
H04N21/43615Interfacing a Home Network  e.g. for connecting the client to a plurality of peripherals | home Audio Video Interoperability [HAVI] data switching networks | (ref: H04L12/2805)0.405
H04N21/42204User interfaces specially adapted for controlling a client device through a remote control device| Remote control devices therefor | interaction techniques for graphical user interfaces in general  | see|  | (ref: G06F3/048)| | computer pointing devices in general  | see|  | (ref: G06F3/033)| | user interfaces for controlling a tuning device of a television receiver through a remote control | (ref: H03J9/00)| | constructive details of casings for the remote control device | (ref: H01H9/0235)| | remote control of peripheral devices connected to a television receiver through the remote control d0.405
H04W92/08between user and terminal device0.405
F25D29/005Mounting of control devices0.405
H04L51/046interacting with other applications or services0.405
H04W76/28Discontinuous transmission [DTX]| Discontinuous reception [DRX]0.404
H04W88/02Terminal devices0.404
H04W88/18Service support| Network management devices0.404
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)0.404
H04W48/06based on traffic conditions0.404
H04W60/06De-registration or detaching0.404
G10L17/22Interactive procedures| Man-machine interfaces0.404
G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates0.404
G10L15/06Creation of reference templates| Training of speech recognition systems  e.g. adaptation to the characteristics of the speaker's voice | (ref: G10L15/14)|  takes precedence0.404
G06F21/80in storage media based on magnetic or optical technology  e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00)0.404
B67D1/0871Level gauges for beverage storage containers | level indicators in general | (ref: G01F)0.404
G07F9/026for alarm  monitoring and auditing in vending machines or means for indication  e.g. when empty0.404
G07F13/065for drink preparation0.404
H04L41/0809Plug-and-play configuration0.403
G06F11/3664Environments for testing or debugging software0.403
G06F11/3457Performance evaluation by simulation0.403
G06F11/3688for test execution  e.g. scheduling of test suites0.403
H04L47/2483Flow identification0.403
H04L47/32Packet discarding or delaying0.403
H04L63/306intercepting packet switched data communications  e.g. Web  Internet or IMS communications0.403
H04B10/116Visible light communication0.402
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals0.402
H04W36/0011for data session or connection0.402
H04W36/0005Control or signalling for completing the hand-off0.402
G07C9/00817where the code of the lock can be programmed0.401
G06Q10/0836Central recipient pick-ups0.401
G06Q10/08Logistics  e.g. warehousing  loading  distribution or shipping| Inventory or stock management  e.g. order filling  procurement or balancing against orders0.401
H04N21/4222Remote control device emulator integrated into a non-television apparatus  e.g. a PDA  media center or smart toy | remote control device for a television receiver integrated into a mobile phone | (ref: H04M1/72533)0.401
H04N21/485End-user interface for client configuration0.401
H04N21/42209for displaying non-command information  e.g. electronic program guide [EPG]  e-mail  messages or a second television channel0.401
H04N21/41407embedded in a portable device  e.g. video client on a mobile phone  PDA  laptop | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)| | arrangements specially adapted for mobile receivers in broadcast systems | (ref: H04H20/57)0.401
H04N21/4753for user identification  e.g. by entering a PIN or password | authentication mechanisms using passwords for network security | (ref: H04L29/06782)0.401
H04N21/4131home appliance  e.g. lighting  air conditioning system  metering devices | home automation data switching networks exchanging configuration information on appliance services | (ref: H04L12/2807)0.401
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer0.400
G06K7/10237the reader and the record carrier being capable of selectively switching between reader and record carrier appearance  e.g. in near field communication [NFC] devices where the NFC device may function as an RFID reader or as an RFID tag0.399
G06K7/146the method including quality enhancement steps0.399
H04W8/245from a network towards a terminal0.398
H04M1/66with means for preventing unauthorised or fraudulent calling | verifying user identity or authority in secret or secure digital communications | (ref: H04L9/32)0.398
G06F11/3438monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22)0.398
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence0.398
G06F11/3006where the computing system is distributed  e.g. networked systems  clusters  multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50)0.398
H04L63/0245Filtering by information in the payload0.398
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.398
G06T19/006Mixed reality | object pose determination  tracking or camera calibration for mixed reality | (ref: G06T7/00)0.397
H04M15/8083involving reduced rates or discounts  e.g. time-of-day reductions or volume discounts0.396
H04N5/225Television cameras | | Cameras comprising an electronic image sensor  e.g. digital cameras  video cameras  camcorders  webcams  camera modules specially adapted for being embedded in other devices  e.g. mobile phones  computers or vehicles | constructional details of electronic still picture cameras or digital still picture cameras not peculiar to the presence or use of the electronic image sensor | (ref: G03B)0.396
H04L61/106across networks  e.g. mapping telephone numbers to data network addresses0.396
G07F7/0886the card reader being portable for interacting with a POS or ECR in realizing a payment transaction0.395
H04W72/0493where an allocation plan is defined based on a resource usage policy0.394
H04L12/2814Exchanging control software or macros for controlling appliance services in a home automation network | arrangements for maintenance or administration involving configuration of the network and network elements | (ref: H04L41/08)0.394
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.394
H04L12/2827Reporting to a device within the home network| wherein the reception of the information reported automatically triggers the execution of a home appliance functionality0.394
H04L43/065for device related reporting | reporting of sensed information of home appliances | (ref: H04L12/2803)0.394
H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network | device-related reporting | (ref: H04L43/065)| | arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom | (ref: H04Q9/00)0.394
H04W40/246Connectivity information discovery0.394
G08B21/0415detecting absence of activity | per se0.394
H04W52/0212managed by the network  e.g. network or access point is master and terminal is slave0.394
H04L61/00Network arrangements or network protocols for addressing or naming0.394
H04L49/254Centralized controller  i.e. arbitration or scheduling0.394
H04L12/28characterised by path configuration  e.g. local area networks [LAN]  wide area networks [WAN]0.394
H04L45/74Address processing for routing0.394
H04W52/383power control in peer-to-peer links0.394
H04W48/10using broadcasted information0.394
H04L1/0018based on latency requirement0.394
H04B17/27for locating or positioning the transmitter0.394
G11C11/2273Reading or sensing circuits or methods0.394
G11C11/2297Power supply circuits0.394
H04L5/006Quality of the received signal  e.g. BER  SNR  water filling0.394
H04B17/336Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]0.394
H04B17/373Predicting channel quality parameters0.394
G11C11/2257Word-line or row circuits0.394
G11C11/2259Cell access0.394
G01V3/12operating with electromagnetic waves | operating with millimetre waves | (ref: G01V8/005)0.394
G11C11/2293Timing circuits or methods0.394
H04W4/33for indoor environments  e.g. buildings0.394
H04R25/70Adaptation of deaf aid to hearing loss  e.g. initial electronic fitting0.393
G06F1/26Power supply means  e.g. regulation thereof | for memories | (ref: G11C)0.393
H04L49/351LAN switches  e.g. ethernet switches0.393
G06F3/1229Printer resources management or printer maintenance  e.g. device status  power levels0.393
G06F3/1292Mobile client  e.g. wireless printing0.393
G06F1/1626with a single-body enclosure integrating a flat display  e.g. Personal Digital Assistants [PDAs]0.392
H04L9/06the encryption apparatus using shift registers or memories for block-wise | or stream|  coding  e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators0.392
H04L51/066with adaptation of format0.391
H04L12/4666Operational details on the addition or the stripping of a tag in a frame  e.g. at a provider edge node0.391
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)0.391
H04L45/66Layer 2 routing  e.g. in Ethernet based MAN's0.391
H04L12/4645Details on frame tagging | routing of packets | (ref: H04L45/00)| | support for virtual LAN | (ref: H04L49/354)0.391
G06Q30/06Buying  selling or leasing transactions0.390
H04N1/00344with a management  maintenance  service or repair apparatus | monitoring | (ref: H04N1/00002)0.390
H04N1/2166for mass storage  e.g. in document filing systems | information retrieval | (ref: G06F17/30)0.390
H04N1/32778using a mark-sheet or machine-readable code request0.390
H04N1/32122in a separate device  e.g. in a memory or on a display separate from image data0.390
H04N1/04Scanning arrangements  | i.e. arrangements for the displacement of active reading or reproducing elements relative to the original or reproducing medium  or | vice versa| (ref: H04N1/387)|  takes precedence| | scanning by varying the direction of light in general | (ref: G02B26/10)0.390
H04N1/00137Transmission0.390
H04N1/00464using browsers  i.e. interfaces based on mark-up languages0.390
H04N1/00244with a server  e.g. an internet server | fax-servers or the like for store and forward | (ref: H04N1/324)0.390
H04L51/08Messages including annexed information  e.g. attachments0.390
H04M3/42102Making use of the called party identifier0.390
H04M3/42008Systems for anonymous communication between parties  e.g. by use of disposal contact identifiers0.390
H04W84/042Public Land Mobile systems  e.g. cellular systems0.390
G01N35/00623of instruments0.390
G01N35/00871Communications between instruments or with remote terminals0.390
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it0.388
H04L65/40Services or applications | network service management for ensuring proper service fulfilment | (ref: H04L41/50)| | information services comprising voice | (ref: H04M3/487)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | contact center services | (ref: H04M3/51)0.388
G06Q50/10Services0.388
H04L67/1076Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network0.388
G06Q30/0261based on user location0.388
H04M15/41Billing record details  i.e. parameters  identifiers  structure of call data record [CDR]0.388
H04M15/8033location-dependent  e.g. business or home0.388
H04L69/24Negotiation of communication capabilities0.388
G06Q40/00Finance| Insurance| Tax strategies| Processing of corporate or income taxes0.388
G06Q20/223based on the use of peer-to-peer networks0.388
G06Q30/0241Advertisement0.387
H04N21/4126portable device  e.g. remote control with a display  PDA  mobile phone | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)0.387
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.387
H04N21/42212Specific keyboard arrangements0.387
G06F3/04895Guidance during keyboard input operation  e.g. prompting | help systems | (ref: G06F9/453)0.387
G05B23/0283Predictive maintenance  e.g. involving the monitoring of a system and  based on the monitoring results  taking decisions on the maintenance schedule of the monitored system| Estimating remaining useful life [RUL] | preventive maintenance  i.e. planning maintenance according to the available resources without monitoring the system | (ref: G06Q10/06)0.387
G05B23/0254based on a quantitative model  e.g. mathematical relationships between inputs and outputs| functions: observer  Kalman filter  residual calculation  Neural Networks0.387
H04L43/50Testing arrangements0.387
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.387
H04W76/50for emergency connections0.387
H04W4/10Push-to-Talk [PTT] or Push-On-Call services0.387
H04W8/08Mobility data transfer0.387
H04W8/265for initial activation of new user0.387
G06K9/6293of classification results relating to different input data  e.g. multimodal recognition0.386
H04L9/007involving hierarchical structures0.386
H04R25/554using a wireless connection  e.g. between microphone and amplifier or using T-coils | near-field transmission in general | (ref: H04B5/00)0.386
H04R25/505using digital signal processing0.386
H04L12/189in combination with wireless systems | selective distribution or broadcast in wireless communication networks | (ref: H04W4/06)0.385
H04L65/1016IMS | wireless communication networks | (ref: H04W)0.385
H04L69/164Adaptation or special uses of UDP protocol0.385
H04L69/162involving adaptations of sockets based mechanisms | secure socket layer | (ref: H04L63/168)0.385
H04W80/06Transport layer protocols  e.g. TCP [Transport Control Protocol] over wireless | transmission control protocol/Internet protocol [TCP/IP] or user datagram protocol [UDP] | (ref: H04L69/16)0.385
A61N1/37282characterised by communication with experts in remote locations using a network0.385
A61N1/37258Alerting the patient0.385
H04W76/00Connection management0.383
H04W24/08Testing  | supervising or monitoring|  using real traffic0.383
G16H20/17delivered via infusion or injection0.383
A61M5/172electrical or electronic | (ref: A61M5/16804)|   | (ref: A61M5/16831)|  take precedence0.383
A61N1/025Digital circuitry features of electrotherapy devices  e.g. memory  clocks  processors0.383
A61N1/37264Changing the program| Upgrading firmware0.383
A61M5/14276specially adapted for implantation0.383
G16H40/20for the management or administration of healthcare resources or facilities  e.g. managing hospital staff or surgery rooms0.383
A61N1/0553Paddle shaped electrodes  e.g. for laminotomy0.383
A61N1/36128Control systems0.383
A61N1/362Heart stimulators | heart defibrillators | (ref: A61N1/39)0.383
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)0.383
H04W92/18between terminal devices0.383
H04M1/0291Door telephones0.383
H04W52/0209in terminal devices | terminal devices | per se|  | (ref: H04W88/02)0.383
H04N7/188Capturing isolated or intermittent images triggered by the occurrence of a predetermined event  e.g. an object reaching a predetermined position | signal generation from motion picture films | (ref: H04N5/253)0.383
H04N7/185from a mobile camera  e.g. for remote control0.383
G06K7/14131D bar codes0.382
G01S5/0221of receivers or network of receivers0.382
G01S5/10Position of receiver fixed by co-ordinating a plurality of position lines defined by path-difference measurements |   e.g. omega or decca systems| (ref: G01S5/12)|  takes precedence | | beacons and receivers cooperating therewith | (ref: G01S1/306)|   | (ref: G01S1/308)0.382
G01S5/0036of measured values  i.e. measurement on mobile and position calculation on base station0.382
G01S5/0027of actual mobile position  i.e. position determined on mobile0.382
G01S5/0072Transmission between mobile stations  e.g. anti-collision systems0.382
H04W48/12using downlink control channel0.381
G07C9/00944Details of construction or manufacture0.381
G08G5/0021located in the aircraft0.381
G08G1/096872where instructions are given per voice0.381
G08G5/0026located on the ground0.381
H04W4/42for mass transport vehicles  e.g. buses  trains or aircraft0.381
H04W36/0022for transferring sessions between adjacent core network technologies0.381
G06F1/163Wearable computers  e.g. on a belt0.381
G07C5/0858wherein the data carrier is removable0.380
G07C5/008communicating information to a remotely located station | transmission systems for measured values | (ref: G08C)0.380
G07C5/0808Diagnosing performance data | testing of vehicles | (ref: G01M17/00)| | testing of electrical installation on vehicles | (ref: G01R31/005)0.380
G06F11/1464for networked environments0.380
G06F11/3096wherein the means or processing minimize the use of computing system or of computing system component resources  e.g. non-intrusive monitoring which minimizes the probe effect: sniffing  intercepting  indirectly deriving the monitored data from other directly available data0.380
G07G1/14Systems including one or more distant stations co-operating with a central processing unit | data transmission in general | (ref: H04L)| | telemetry systems for selectively calling a substation from a main station | (ref: H04Q9/00)0.380
G06Q30/0236Incentive or reward received by requiring registration or ID from user0.380
G06Q30/0238at point-of-sale [POS]0.380
G06Q20/3672Intelligent token initializing or reloading0.379
G06K19/0723the record carrier comprising an arrangement for non-contact communication  e.g. wireless communication circuits on transponder cards  non-contact smart cards or RFIDs0.377
G06T17/05Geographic models0.377
G06T19/00Manipulating 3D models or images for computer graphics0.377
G06Q20/3272using an audio code0.376
G07F7/084Additional components relating to data transfer and storing  e.g. error detection  self-diagnosis0.376
G06Q20/346Cards serving only as information carrier of service0.376
G06F1/12Synchronisation of different clock signals | provided by a plurality of clock generators0.376
G06F3/1268Job submission  e.g. submitting print job order or request not the print data itself0.376
G06F3/1267Job repository  e.g. non-scheduled jobs  delay printing0.376
G06F3/1296Printer job scheduling or printer resource handling0.376
H04W28/18Negotiating wireless communication parameters0.376
H04W28/04Error control0.376
H04W84/20Master-slave | selection or change|  arrangements0.376
H04W74/00Wireless channel access  e.g. scheduled or random access0.376
H04W76/30Connection release0.376
G06F13/4068Electrical coupling0.375
H04W8/22Processing or transfer of terminal data  e.g. status or physical capabilities0.375
G06Q30/0615Anonymizing0.375
G06Q20/027involving a payment switch or gateway0.374
H04W52/0216using a pre-established activity schedule  e.g. traffic indication frame0.373
G06Q20/22Payment schemes or models0.373
H04L41/0883Semiautomatic configuration  e.g. proposals from system0.373
B62H5/02for locking the steering mechanism0.373
E03B7/072Arrangement of flowmeters0.373
A62C37/50Testing or indicating devices for determining the state of readiness of the equipment0.373
H03M7/3059Digital compression and data reduction techniques where the original information is represented by a subset or similar information  e.g. lossy compression0.373
H04L47/24depending on the type of traffic  e.g. priority or quality of service [QoS] | network arrangements for networked applications for scheduling or organising the servicing of application requests whereby quality of service or priority requirements are taken into account | (ref: H04L67/322)0.373
G06K7/1434Barcodes with supplemental or add-on codes0.372
G06K7/1456determining the orientation of the optical code with respect to the reader and correcting therefore0.372
G06K19/06056the marking comprising a further embedded marking  e.g. a 1D bar code with the black bars containing a smaller sized coding0.372
H04W76/38triggered by timers0.372
G06F8/60Software deployment0.372
H04W40/248Connectivity information update0.372
H04L61/10Mapping of addresses of different types| Address resolution0.372
H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries0.371
G06Q30/08Auctions |   matching or brokerage | matching or brokerage for stock exchange | (ref: G06Q40/04)0.371
G06Q30/0611Request for offers or quotes0.371
G07F7/06by returnable containers |   i.e. reverse vending systems in which a user is rewarded for returning a container that serves as a token of value|   e.g. bottles0.371
H04W68/005Transmission of information for alerting of incoming communication0.371
H04W4/024Guidance services0.371
G07F9/023for display  data presentation or advertising arrangements in payment activated and coin-freed apparatus0.371
G10H1/0008Associated control or indicating means | teaching of music | per se|  | (ref: G09B15/00)0.371
G10H1/0041in coded form | see|  also | (ref: G10H7/002)0.371
H04B5/0081with antenna coils | loop aerials | (ref: H01Q7/00)0.371
H04B5/00Near-field transmission systems  e.g. inductive loop type0.371
H04W48/04based on user or terminal location or mobility data  e.g. moving direction  speed0.370
A61B5/14503invasive  e.g. introduced into the body by a catheter or needle or using implanted sensors | (ref: A61B5/1459)|   | (ref: A61B5/1464)|   | (ref: A61B5/1473)|   | (ref: A61B5/1482)|   | (ref: A61B5/14865)|  take precedence0.370
A61B5/0004characterised by the type of physiological signal transmitted0.370
A61B5/14532for measuring glucose  e.g. by tissue impedance measurement0.370
A63F13/71using secure communication between game devices and game servers  e.g. by encrypting game data or authenticating players0.370
H04N21/8173End-user applications  e.g. Web browser  game0.370
A63F13/79involving player-related data  e.g. identities  accounts  preferences or play histories0.370
A63F13/77involving data related to game devices or game servers  e.g. configuration data  software version or amount of memory0.370
G09C5/00Ciphering apparatus or methods not provided for in the preceding groups  e.g. involving the concealment or deformation of graphic data such as designs  written or printed messages0.370
G10L17/02Preprocessing operations  e.g. segment selection| Pattern representation or modelling  e.g. based on linear discriminant analysis [LDA] or principal components| Feature selection or extraction0.369
G10L15/1822Parsing for meaning understanding0.369
H04N7/152Multipoint control units therefor0.369
H04L65/1083In-session procedures | computer conferences  network arrangements for conference optimisation or adaptation | (ref: H04L12/1827)| | reactions to resource unavailability in packet switching networks | (ref: H04L47/74)| | reallocation or renegotiation of resources in packet switching networks | (ref: H04L47/76)0.369
H04N7/141between two video terminals  e.g. videophone | telephonic communication systems combined with television receiver for reception of entertainment or information matter | (ref: H04M11/085)0.369
H04L51/10Messages including multimedia information | network arrangements or protocols for real-time communication | (ref: H04L65/00)| | voice messaging in telephonic communication using automatic or semi-automatic exchanges with non-audio components | (ref: H04M3/5307)0.369
H04N21/4788communicating with other users  e.g. chatting | arrangements for providing for computer conferences  e.g. chat rooms  to substation in data switching networks | (ref: H04L12/1813)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)0.369
H04N21/632using a connection between clients on a wide area network  e.g. setting up a peer-to-peer communication via Internet for retrieving video segments from the hard-disk of other client devices | broadcast-related systems characterised by transmission among terminal devices | (ref: H04H60/80)| | protocols for peer-to-peer networking in communication control or processing | (ref: H04L29/08306)0.369
H04N21/6437Real-time Transport Protocol [RTP]0.369
G09B19/00Teaching not covered by other main groups of this subclass | teaching or practice apparatus for gun-aiming or gun-laying | (ref: F41G3/26)0.369
G09B5/125the stations being mobile0.369
G06Q50/20Education0.369
G09B5/065Combinations of audio and video presentations  e.g. videotapes  videodiscs  television systems0.369
H04W4/48for in-vehicle communication0.369
H04B1/7156Arrangements for sequence synchronisation0.369
G07D7/003using security elements | using digital security elements | (ref: G07D7/004)0.369
G07D7/1205Testing spectral properties0.369
G06F9/546Message passing systems or structures  e.g. queues0.369
B25J13/06Control stands  e.g. consoles  switchboards0.368
B25J13/00Controls for manipulators | programme controls | (ref: B25J9/16)| | control in general | (ref: G05)0.368
B25J13/02Hand grip control means | handles or pedals for crane control | (ref: B66C13/56)| | for measuring the force applied to control members | (ref: G01L5/22)| | hand-held casings for switching devices  e.g. joy-sticks | (ref: H01H9/0214)0.368
A61B34/75Manipulators having means for prevention or compensation of hand tremors0.368
G06F3/02Input arrangements using manually operated switches  e.g. using keyboards or dials | keyboard switches | per se|  | (ref: H01H13/70)| | electronic switches characterised by the way in which the control signals are generated | (ref: H03K17/94)0.368
H04N21/254Management at additional data server  e.g. shopping server  rights management server | protocols involving third party service providers for network applications in communication control or processing | (ref: H04L29/08666)| | arrangements for maintenance or administration in data networks | (ref: H04L41/00)0.368
H04N21/6125involving transmission via Internet | transmission by internet of broadcast information | (ref: H04H60/82)0.368
H04N21/64322IP0.368
H04N21/441Acquiring end-user identification | authentication in wireless communication networks | (ref: H04W12/06)| e.g. using personal code sent by the remote control or by inserting a card | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)0.368
H04M1/673the user being required to key in a code0.368
H04M1/247Telephone sets including user guidance or features selection means facilitating their use| | Fixed telephone terminals for accessing a variety of communication services via the PSTN network0.368
H04W72/048where an allocation plan is defined based on terminal or device properties0.368
H04W72/087using requested quality0.368
H04W72/02Selection of wireless resources by user or terminal0.368
H04W72/042in downlink direction of a wireless link  i.e. towards terminal0.368
H04W28/0268using specific QoS parameters for wireless networks  e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR] | negotiating SLA or negotiating QoS | (ref: H04W28/24)0.368
A61N1/36067Movement disorders  e.g. tremor or Parkinson disease | stimulating motor muscle | (ref: A61N1/36003)0.367
A61N1/0551Spinal or peripheral nerve electrodes0.367
A61N1/36062Spinal stimulation0.367
G11B19/02Control of operating function  e.g. switching from recording to reproducing0.367
G11B20/00086Circuits for prevention of unauthorised reproduction or copying  e.g. piracy | indicating unauthorised use of record carriers in general | (ref: G11B23/28)| | scrambling for television signal recording | (ref: H04N5/913)| | network architectures or network protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)0.367
G11B20/00702said measures preventing that data are recorded on the recording medium0.367
G11B20/00695said measures preventing that data are read from the recording medium0.367
G11B20/00137involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users0.367
H04W52/0229where the received signal is a wanted signal0.366
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.366
G06F13/4027using bus bridges | (ref: G06F13/4022)|  takes precedence0.366
H04W28/08Load balancing or load distribution0.366
G06F9/4401Bootstrapping | security arrangements therefor | (ref: G06F21/57)0.366
G06F9/44Arrangements for executing specific programs0.366
H04W88/10adapted for operation in multiple networks  e.g. multi-mode access points0.366
H04W36/0061of neighbor cell information0.366
A61B5/0026characterised by the transmission medium0.366
H04W72/0406involving control information exchange between nodes0.366
H04W28/24Negotiating SLA [Service Level Agreement]| Negotiating QoS [Quality of Service]0.366
H04W28/20Negotiating bandwidth0.366
H04W72/1247based on priority of the information source or recipient0.366
H04L12/1822Conducting the conference  e.g. admission  detection  selection or grouping of participants  correlating users to one or more conference sessions  prioritising transmission0.366
G06F3/1423controlling a plurality of local displays  e.g. CRT and flat panel display0.366
H04W40/24Connectivity information management  e.g. connectivity discovery or connectivity update0.365
H04L12/42Loop networks0.365
H04L47/808User-type aware0.365
H04L41/147for prediction of network behaviour0.365
G07G1/0054with control of supplementary check-parameters  e.g. weight or number of articles0.365
G07F7/1016Devices or methods for securing the PIN and other transaction-data  e.g. by encryption | arrangements for secret communication  | see|  | (ref: H04L9/00)0.365
G06Q20/3229Use of the SIM of a M-device as secure element0.365
G07F7/1033Details of the PIN pad0.365
G06F7/582Pseudo-random number generators0.365
G06F3/0489using dedicated keyboard keys or combinations thereof0.365
H04W68/08using multi-step notification by increasing the notification area0.365
G06K9/6215Proximity measures  i.e. similarity or distance measures0.365
G01S5/0009Transmission of position information to remote stations | transmission of measured values in general  | (ref: G08C)| | services making use of location of users or terminals  | (ref: H04W4/02)0.365
G06F21/54by adding security routines or objects to programs0.365
G06Q20/209Specified transaction journal output feature  e.g. printed receipt or voice output0.365
G08B25/14Central alarm receiver or annunciator arrangements0.364
G06Q50/163Property management0.364
G08B25/08using communication transmission lines | (ref: G08B13/19658)|   | (ref: G08B21/0286)|   | (ref: G08B25/016)|  take precedence| specific aspects of telephone communication systems adapted for combination with alarm systems | (ref: H04M11/04)0.364
G08B21/02Alarms for ensuring the safety of persons0.364
H04L65/102Gateways | arrangements for connecting between networks having differing types of switching systems  e.g. gateways | (ref: H04L12/66)0.363
G07B17/00733Cryptography or similar special procedures in a franking system0.363
G06F3/04847Interaction techniques to control parameter settings  e.g. interaction with sliders  dials0.363
H04L12/1428Invoice generation  e.g. customization  lay-out  database processing  algorithms for calculating the bill or formatting invoices as WWW pages | invoicing in general | (ref: G06Q30/04)0.363
H04L67/1065Discovery involving distributed pre-established resource-based relationships among peers  e.g. based on distributed hash tables [DHT] | pre-configuration of logical or physical connections | (ref: H04L67/1053)0.363
G06Q30/02Marketing  e.g. market research and analysis  surveying  promotions  advertising  buyer profiling  customer management or rewards| Price estimation or determination0.362
H04L9/0836using tree structure or hierarchical structure0.362
G06F9/06using stored programs  i.e. using an internal store of processing equipment to receive or retain programs0.362
G08G1/161Decentralised systems  e.g. inter-vehicle communication0.361
G08G1/096791where the origin of the information is another vehicle0.361
G08G1/096783where the origin of the information is a roadside individual element0.361
H04L67/04adapted for terminals or networks with limited resources or for terminal portability  e.g. wireless application protocol [WAP] | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)0.361
G09G5/006Details of the interface to the display terminal | specific for a display terminal using a CRT | (ref: G09G1/167)| | using a flat panel | (ref: G09G3/2096)| | circuits for interfacing with colour displays | (ref: G09G5/04)0.361
H04L67/1078Resource delivery mechanisms0.361
G09G5/14Display of multiple viewports0.361
G06Q10/06315Needs-based resource requirements planning or analysis0.361
H04L1/1854Scheduling and prioritising arrangements0.361
H04M15/61based on the service used0.360
H04M15/62based on trigger specification0.360
H04W16/26Cell enhancers | or enhancement|   e.g. for tunnels  building shadow0.360
H04N1/4406Restricting access  e.g. according to user identity | mechanisms actuated y cards  PIN or the like in apparatus for dispensing | (ref: G07F7/08)0.360
G06K17/0022arrangements or provisious for transferring data to distant stations  e.g. from a sensing device | "transfer between computer elements | (ref: G06F13/00)|  "| data-transmission | (ref: H04L)0.360
G06F9/44552Conflict resolution  i.e. enabling coexistence of conflicting executables0.360
H04W76/40for selective distribution or broadcast0.360
G06F3/14Digital output to display device| | Cooperation and interconnection of the display device with other functional units| control of display in general | (ref: G09G)| | arrangements for producing a permanent visual presentation of the output data | (ref: G06K15/00)0.360
G10L25/72for transmitting results of analysis0.360
G10L15/04Segmentation| Word boundary detection0.360
G06F3/041Digitisers  e.g. for touch screens or touch pads  characterised by the transducing means0.360
H04W76/34Selective release of ongoing connections0.360
G06Q30/0201Market data gathering  market analysis or market modelling0.359
G06Q30/0633Lists  e.g. purchase orders  compilation or processing0.359
G06Q30/0607Regulated0.359
G06Q30/0623Item investigation0.359
H04J3/0658Clock or time synchronisation among packet nodes0.359
G07F15/005dispensed for the electrical charging of vehicles | electrical charging as such  | (ref: B60L11/00)0.359
G07F15/003for electricity0.359
G06K9/6201Matching| Proximity measures0.359
H04W36/0027for a plurality of sessions or connections  e.g. multi-call  multi-bearer connections0.358
G06K19/07758arrangements for adhering the record carrier to further objects or living beings  functioning as an identification tag0.358
H04L69/04Protocols for data compression | compression in general | (ref: H03M7/30)| | reduction of the amount or size of exchanged application data at an intermediate network processing stage | (ref: H04L67/2828)| | optimizing  e.g. header compression  information sizing in wireless communication networks | (ref: H04W28/06)0.358
G06F3/0236using selection techniques to select from displayed items0.358
G07C5/0841Registering performance data | recording measured values | (ref: G01D)| | information storage | (ref: G11B)0.358
B60K35/00Arrangement of adaptations of instruments specially for vehicles| Dashboards0.358
G07C5/08Registering or indicating performance data other than driving  working  idle  or waiting time  with or without registering driving  working  idle or waiting time0.358
G06Q20/3255using an SMS for payment0.357
G06Q20/085involving remote charge determination or related payment systems0.357
G06Q20/14specially adapted for billing systems0.357
G07G1/06with provision for the noting of the money to be paid0.357
G05B19/4185characterised by the network communication0.357
G06Q10/0875Itemization of parts  supplies  or services  e.g. bill of materials0.357
H04L45/42Centralized routing0.357
H04L45/02Topology update or discovery | topology discovery for network management | (ref: H04L41/12)| | LAN interconnection over a backbone network | (ref: H04L12/4604)| | node-based peer discovery mechanisms in peer-to-peer networks | (ref: H04L67/1061)0.357
H04L45/72Routing based on the source address0.357
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.357
G16H10/40for data related to laboratory analysis  e.g. patient specimen analysis0.357
H04L63/16Implementing security features at a particular protocol layer0.357
G16H20/00ICT specially adapted for therapies or health-improving plans  e.g. for handling prescriptions  for steering therapy or for monitoring patient compliance0.357
H04L5/0055Physical resource allocation for ACK/NACK | for physical mapping arrangements in ARQ protocols | (ref: H04L1/1861)0.357
H04B1/385Transceivers carried on the body  e.g. in helmets0.357
H04L43/0858One way delays0.357
H04L43/06Report generation0.357
G06F11/3495for systems0.357
H04L43/04Processing of captured monitoring data0.357
G06F9/4416Network booting| Remote initial program loading [RIPL]0.356
G06F9/45533Hypervisors| Virtual machine monitors0.356
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines0.356
G06Q20/045characterized in that the payment protocol involves at least one ticket0.356
G06Q20/342Cards defining paid or billed services or quantities0.356
H04B1/3827Portable transceivers0.356
G16H30/20for handling medical images  e.g. DICOM  HL7 or PACS0.356
G07F7/105Only a part of the PIN is required to be input0.356
H04L65/1089by adding or removing media0.356
H04W76/16Involving different core network technologies  e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer0.356
G05B15/02electric0.356
H04L12/2836Protocol conversion between an external network and a home network | protocol conversion | (ref: H04L29/06068)| | adaptation of digital video signals for transport over a specific home network | (ref: H04N7/24)| | controlling appliance services of a home automation network from a device located outside the home and the home network | (ref: H04L12/2818)0.356
H04L12/281indicating a format for calling an appliance service function in a home automation network | protocols for network applications involving the use of web-based technology | (ref: H04L29/08099)0.356
H04L12/2809indicating that an appliance service is present in a home automation network | arrangements for service discovery | (ref: H04L29/08648)| | monitoring functionality | (ref: H04L43/0817)0.356
G06Q10/06311Scheduling  planning or task assignment for a person or group0.355
G06Q40/08Insurance  e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10)0.355
G07C5/006Indicating maintenance0.355
H04W72/14using a grant | or specific|  channel0.355
G06Q20/06Private payment circuits  e.g. involving electronic currency used among participants of a common payment scheme0.355
G06F2221/2129Authenticate client device independently of the user0.118
G06F2221/2131Lost password  e.g. recovery of lost or forgotten passwords0.118
G06F2221/2115Third party0.118
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.118
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.114
H04L2209/84Vehicles0.113
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.105
H04L2209/46Secure multiparty computation  e.g. millionaire problem0.103
G06F2221/2107File encryption0.103
H04Q2011/0088Signalling aspects0.100
H04Q2011/0015using splitting combining0.100
G06F2221/033Test or assess software0.091
G01S5/0205Details0.091
G07C2009/00412the transmitted data signal being encrypted0.090
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.090
G07C2209/63Comprising locating means for detecting the position of the data carrier  i.e. within the vehicle or within a certain distance from the vehicle0.090
G07C2009/00388code verification carried out according to the challenge/response method0.090
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.090
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.090
G01S5/021Calibration  monitoring or correction | (ref: G01S5/0252)|  takes precedence0.089
G06F2221/2103Challenge-response0.089
G06F2221/2117User registration0.088
H04W4/18Information format or content conversion  e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals0.088
G01R22/00Arrangements for measuring time integral of electric power or current  e.g. by electricity meters | electromechanical arrangements therefor | (ref: G01R11/00)| | monitoring electric consumption of electrically-propelled vehicles | (ref: B60L3/00)| | coin freed devices | (ref: G07F15/00)0.087
H04W88/182Network node acting on behalf of an other network entity  e.g. proxy0.087
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.086
G06F2221/0708Location0.086
G06F2221/2113Multi-level security  e.g. mandatory access control0.086
H04W84/06Airborne or Satellite Networks0.085
G06F2221/2133Verifying human interaction  e.g.  Captcha0.085
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.084
H04L2209/42Anonymization  e.g. involving pseudonyms0.084
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.084
A61B5/6817Ear canal0.083
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.083
H04L41/0869by validating configuration within one network element0.083
H04L2209/88Medical equipments0.083
Y04S40/18Network protocols supporting networked applications  e.g. including control of end-device applications over a network0.083
G06K7/0013by galvanic contacts  e.g. card connectors for ISO-7816 compliant smart cards or memory cards  e.g. SD card readers | connectors in general | (ref: H01R13/00)| | connectors for SIM cards used in mobile phones or the like | (ref: H04B1/3816)0.082
G06Q2220/10Usage protection of distributed data files0.082
H04L2209/122Hardware reduction or efficient architectures0.082
G06F2009/45562Creating  deleting  cloning virtual machine instances0.081
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.081
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.081
G06F2221/2139Recurrent verification0.081
A61B2018/00178Electrical connectors0.080
A61M13/003Blowing gases other than for carrying powders  e.g. for inflating  dilating or rinsing0.080
A61B2018/1246characterised by the output polarity0.080
A61B2018/00744Fluid flow0.080
A61B2017/00203with speech control or speech recognition0.080
A61B2090/064for measuring force  pressure or mechanical tension0.080
A61B2018/00583Coblation  i.e. ablation using a cold plasma0.080
A61B2090/0814Preventing re-use0.080
A61B2018/00988Means for storing information  e.g. calibration constants  or for preventing excessive use  e.g. usage  service life counter0.080
A61B2018/00607Coagulation and cutting with the same instrument0.080
H04R2225/55Communication between hearing aids and external devices via a network for data exchange0.080
H04L63/0218Distributed architectures  e.g. distributed firewalls0.079
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.079
H04L41/0866Checking configuration0.079
G06N7/005Probabilistic networks0.078
G06N3/006based on simulated virtual individual or collective life forms  e.g. single "avatar"  social simulations  virtual worlds | computer games | (ref: A63F13/00)| | medical simulations | (ref: G06F19/00)| | information retrieval | (ref: G06F17/30873)| | image processing | (ref: G06T)| | telecommunication protocols | (ref: H04L29/06034)0.078
G06N3/0445Feedback networks  e.g. hopfield nets  associative networks0.078
G06N3/088Non-supervised learning  e.g. competitive learning0.078
G06F2221/2101Auditing as a secondary aspect0.078
H04L43/08Monitoring based on specific metrics0.077
G06F2221/034Test or assess a computer or a system0.077
G06N3/04Architectures  e.g. interconnection topology0.077
G06Q10/0833Tracking0.077
G06F17/10Complex mathematical operations | function generation by table look-up | (ref: G06F1/03)| | evaluation of elementary functions by calculation | (ref: G06F7/544)0.077
G06F2221/2149Restricted operating environment0.077
H04L2012/2841Wireless0.077
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.076
G06Q50/34Betting or bookmaking  e.g. Internet betting0.075
G06F2221/2147Locking files0.075
G06F2212/7207management of metadata or control data0.075
H04L63/0478applying multiple layers of encryption  e.g. nested tunnels or encrypting the content with a first key and then with at least a second key | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.075
H04W92/02Inter-networking arrangements0.075
G05B2219/34274Connect pc card to industrial bus  with additional timing and adapting logic0.075
H04M2250/22including a touch pad  a touch sensor or a touch detector | digitizers for touch screens | (ref: G06F3/041)0.074
Y02E10/72Wind turbines with rotation axis in wind direction0.074
H04L2209/04Masking or blinding0.073
G07C2009/00793by Hertzian waves0.073
G07C2009/0088centrally0.073
G07C2009/00865remotely by wireless communication0.073
G07C2209/08With time considerations  e.g. temporary activation  valid time window or time limitations0.073
G06F21/123by using dedicated hardware  e.g. dongles  smart cards  cryptographic processors  global positioning systems [GPS] devices0.073
H04L2209/16Obfuscation or hiding  e.g. involving white box0.073
G06N5/04Inference methods or devices0.073
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.073
G06F2009/45591Monitoring or debugging support | monitoring and debugging in general in | (ref: G06F11/30)|   | (ref: G06F11/36)0.073
H04L2209/127Trusted platform modules [TPM]0.072
G07C2209/64using a proximity sensor0.072
G07C2209/06Involving synchronization or resynchronization between transmitter and receiver| reordering of codes0.072
G06F2209/5015Service provider selection0.072
H04L67/289where the intermediate processing is functionally located closer to the data consumer application  e.g. in same machine  in same home or in same subnetwork0.072
H04L2209/08Randomization  e.g. dummy operations or using noise0.072
G06F2221/0751Key | not used0.072
H04L61/35involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address or functional addressing  i.e. assigning an address to a function0.072
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.071
H04L5/0044allocation of payload0.071
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.070
G06F2201/815Virtual | middleware or OS functionality using virtual machines to implement generic software techniques for error detection or fault masking | (ref: G06F11/1484)0.070
G06F11/2048where the redundant components share neither address space nor persistent storage0.070
G06F11/2038with a single idle spare processing component0.070
G06F11/2097maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)|  and subgroups0.070
G06F11/2041with more than one idle spare processing component0.070
G06F2201/805Real-time0.070
H04L61/30Arrangements for managing names  e.g. use of aliases or nicknames | retrieval from the Internet by using information identifiers  e.g. uniform resource locators [URLs] | (ref: G06F17/30876)| | name-to-address mapping | (ref: H04L61/15)0.070
H04W4/027using movement velocity  acceleration information0.070
Y02T10/7072Electromobility specific charging systems or methods for batteries  ultracapacitors  supercapacitors or double-layer capacitors | efficient charging systems for batteries  ultracapacitors  supercapacitors or double-layer capacitors in road transportation in general | (ref: Y02T10/92)0.070
Y02T10/70Energy storage for electromobility | hydrogen internal combustion engines | (ref: Y02T90/42)| | fuel cell powered electric vehicles | (ref: Y02T90/34)0.070
Y04S30/14Details associated with the interoperability  e.g. vehicle recognition  authentication  identification or billing0.070
Y02T90/16Information or communication technologies improving the operation of electric vehicles0.070
Y02T90/12Electric charging stations0.070
Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles  i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV] | power aggregation of EV or HEV | (ref: Y02E60/721)0.070
Y04S30/12Remote or cooperative charging0.070
G06F2221/2135Metering0.070
G06K9/6262Validation  performance evaluation or active pattern learning techniques0.069
G05B2219/2614HVAC  heating  ventillation  climate control0.069
B60R2325/205Mobile phones0.069
B60R2325/101Bluetooth0.069
B60R2325/108Encryption0.069
E05B2047/0071Connecting lockparts by electronic communication means only  e.g. bus systems  time multiplexing0.069
E05B2073/0088being lockable or unlockable by means of the office machine itself  e.g. by its keyboard0.069
E05B2047/0054using microprocessor  printed circuits  or the like0.069
G05B19/042using digital processors | (ref: G05B19/05)|  takes precedence0.069
B29C64/386Data acquisition or data processing for additive manufacturing0.069
G07C2009/00769with data transmission performed by wireless means0.069
G07C2009/00198the keyless data carrier having more than one limited data transmission ranges0.069
G07C2009/00357and the lock having more than one limited data transmission ranges0.069
G07C2009/00333and the lock having more than one limited data transmission ranges0.069
H04W88/08Access point devices0.069
B65F2210/168Sensing means0.069
B65F2210/1443Electrical0.069
B65F2210/184Weighing means0.069
B65F2210/128Data transmitting means0.069
B65F2210/108Authorization means0.069
B65F2210/138Identification means0.069
H04L2463/144Detection or countermeasures against botnets0.069
H04W52/367Power values between minimum and maximum limits  e.g. dynamic range0.069
H04L2209/24Key scheduling  i.e. generating round keys or sub-keys for block encryption0.069
H04L45/306Route determination based on the nature of the carried application | communications protocols whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status | (ref: H04L67/327)0.069
H04L47/2408Different services  e.g. type of service [ToS]0.069
H04M3/42323PBX's with CTI arrangements0.068
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.068
G06F2209/544Remote0.068
G07C2209/62Comprising means for indicating the status of the lock0.068
G05D2201/0213Road vehicle  e.g. car or truck0.068
G05D1/021specially adapted to land vehicles0.068
G07C9/00Individual entry or exit registers0.068
G06F2221/0713User0.068
G06F2221/0704Device0.068
G06F2221/0748Hiding0.068
F25D2400/361Interactive visual displays0.068
G06T2207/30201Face0.068
H04W8/186Processing of subscriber group data0.067
H04W8/065involving selection of the user mobility server0.067
G10L2015/223Execution procedure of a spoken command0.067
G06F2212/1052Security improvement0.067
G06F2221/2137Time limited access  e.g. to a computer or data0.067
H04L67/1004Server selection in load balancing0.067
H04L67/1038Load balancing arrangements to avoid a single path through a load balancer0.067
G06Q2220/18Licensing0.067
G06F2221/0795Transaction with ACID [Atomicity  Consistency  Isolation and Durability] properties0.066
G06F2221/0784Fragments0.066
H04L41/0859by keeping history of different configuration generations or versions0.066
H04L47/286Time to live0.066
H04M2250/74with voice recognition means | voice activated dialling | (ref: H04M1/271)| | voice recognition algorithms | (ref: G10L15/00)0.066
H04L51/00Arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages0.066
Y04S40/20Information technology specific aspects0.066
H04W80/045involving different protocol versions  e.g. MIPv4 and MIPv60.066
H04L12/56Packet switching systems0.066
G01V1/001Acoustic presence detection | measurement of sonic vibrations | (ref: G01H)| | alarm systems | (ref: G08B)0.066
G11C11/221using ferroelectric capacitors0.066
G07C2009/005whereby the code is a random code0.066
G07C2009/00555comprising means to detect or avoid relay attacks0.066
H04L69/06Notations for structuring of protocol data  e.g. abstract syntax notation one [ASN.1]0.066
G06F1/16Constructional details or arrangements0.065
A61B5/112Gait analysis0.065
A61B5/1113Local tracking of patients  e.g. in a hospital or private home0.065
A61B5/107Measuring physical dimensions  e.g. size of the entire body or parts thereof0.065
A61B5/0077Devices for viewing the surface of the body  e.g. camera  magnifying lens0.065
H04L2463/103applying security measure for protecting copy right | protecting software against unauthorised usage in a vending or licensing environment  e.g. protection the software providers copyright | (ref: G06F21/10)| | data processing systems or methods  specially adapted for payment schemes  architectures or protocols | (ref: G06Q20/00)| | secrecy systems or subscription systems | (ref: H04N7/16)0.065
G06F2221/0737Traceability0.065
H04L2209/603Digital right managament [DRM]0.065
G06F2221/0722Content | not used0.065
H04L2209/60Digital content management  e.g. content distribution0.065
H04N2201/3208of an e-mail or network address0.065
H04N2201/3269of machine readable codes or marks  e.g. bar codes or glyphs0.065
H04N2201/0094Multifunctional device  i.e. a device capable of all of reading  reproducing  copying  facsimile transception  file transception0.065
H04M2203/6081Service authorization mechanisms0.065
A61B5/150862intermediate range  e.g. within room or building0.065
G01N2035/00881network configurations0.065
G06F3/014Hand-worn input/output arrangements  e.g. data gloves0.065
G06F2221/2105Dual mode as a secondary aspect0.065
H04L67/1061involving node-based peer discovery mechanisms | access to replicated servers | (ref: H04L67/1002)| | service discovery | (ref: H04L67/16)| | topology discovery for routing | (ref: H04L45/02)| | information retrieval in distributed file systems | (ref: G06F17/30067)| | information retrieval in structured data stores  indexing  querying | (ref: G06F17/30286)0.065
G06Q30/00Commerce  e.g. shopping or e-commerce0.065
H04L67/1019based on random server selection0.065
H04L67/1017based on a round robin mechanism0.065
H04W76/45for Push-to-Talk [PTT] or Push-to-Talk over cellular [PoC] services0.064
G06F2212/402Encrypted data0.064
H04M15/715Activating new subscriber or card0.064
H04R2225/43Signal processing in hearing aids to enhance the speech intelligibility0.064
H04M3/567Multimedia conference systems0.064
A61M2205/50with microprocessors or computers0.064
A61M2205/3553remote  e.g. between patient's home and doctor's office0.064
A61M2205/3584using modem  internet or bluetooth0.064
A61M2205/52with memories providing a history of measured variating parameters of apparatus or patient0.064
H04W92/20between access points0.064
G08B13/19684Portable terminal  e.g. mobile phone  used for viewing video remotely0.064
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.064
H04L2209/463Electronic voting0.064
G01S5/0284Relative positioning0.064
G07C2009/00785by light0.064
H04W36/03Reselecting a link using a direct mode connection0.063
G06F2211/007Encryption  En-/decode  En-/decipher  En-/decypher  Scramble  (De-)compress0.063
G06F2201/875Monitoring of systems including the internet0.063
G06F11/3082the data filtering being achieved by aggregating or compressing the monitored data0.063
G06F2221/2153Using hardware token as a secondary aspect0.063
G06F2201/865Monitoring of software0.063
G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component  e.g. monitoring if the computing system is on  off  available  not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16)0.063
G06F11/3079the data filtering being achieved by reporting only the changes of the monitored data0.063
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.063
G06F2221/2151Time stamp0.063
H04W92/045between access point and backbone network device0.063
H04W88/14Backbone network devices0.063
G06T2200/04involving 3D image data0.063
G06T2219/024Multi-user  collaborative environment0.063
G06T2210/04Architectural design  interior design0.063
G06T2200/24involving graphical user interfaces [GUIs]0.063
G06T2219/004Annotating  labelling0.063
H04M2203/306Prerecordings to be used during a voice call0.063
H04M2203/6009Personal information  e.g. profiles or personal directories being only provided to authorised persons0.063
H04M2201/39using speech synthesis | speech synthesis | per se|  | (ref: G10L13/00)0.063
H04M2203/252where a voice mode is enhanced with visual information0.063
H04Q2213/13095PIN / Access code  authentication0.063
H04Q2213/13345Intelligent networks  SCP0.063
G06F3/1219with regard to consumables  e.g. ink  toner  paper0.063
G06F2211/006E-Mail0.063
H04W84/005Moving wireless networks0.062
H04M2250/02including a Bluetooth interface0.062
H04N21/2743Video hosting of uploaded data from client0.062
G08B13/19621Portable camera0.062
G08B13/19671Addition of non-video data  i.e. metadata  to video stream0.062
Y02E10/30Energy from the sea | tidal stream | (ref: Y02E10/28)0.062
F03B17/061with rotation axis substantially in flow direction0.062
H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP  | (ref: H04W80/04)0.062
H04L45/302Route determination based on requested QoS0.062
H04L45/7453using hashing0.062
H04L47/825Involving tunnels  e.g. MPLS0.062
G06F7/58Random or pseudo-random number generators0.062
G06F11/1004to protect a block of data words  e.g. CRC or checksum | (ref: G06F11/1076)|  takes precedence| security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.062
G06Q30/0237at kiosk0.062
G06Q30/0278Product appraisal0.062
Y02W90/00Enabling technologies or technologies with a potential or indirect contribution to greenhouse gas [GHG] emissions mitigation0.062
Y02W30/82Recycling of waste of electrical or electronic equipment [WEEE]0.062
G10H2240/101User identification0.062
G10H2240/125Library distribution  i.e. distributing musical pieces from a central or master library0.062
G10H2240/145Sound library  i.e. involving the specific use of a musical database as a sound bank or wavetable| indexing  interfacing  protocols or processing therefor0.062
H02J50/60responsive to the presence of foreign objects  e.g. detection of living beings0.062
H02J50/40using two or more transmitting or receiving devices | (ref: H02J50/50)|  takes precedence0.062
H02J50/50using additional energy repeaters between transmitting devices and receiving devices0.062
H02J50/12of the resonant type0.062
H04W84/047using dedicated repeater stations0.062
G08C2201/20Binding and programming of remote control devices0.062
Y02A90/10Information and communication technologies [ICT] supporting adaptation to climate change.0.062
A61B5/14546for measuring analytes not otherwise provided for  e.g. ions  cytochromes0.062
H04Q2209/826where the data is sent periodically0.062
H04Q2209/40using a wireless architecture0.062
H04Q2209/43using wireless personal area networks [WPAN]  e.g. 802.15  802.15.1  802.15.4  Bluetooth or ZigBee0.062
H04Q2209/86Performing a diagnostic of the sensing device0.062
H04Q2209/88Providing power supply at the sub-station0.062
G06Q2240/00Transportation facility access  e.g. fares  tolls or parking0.062
G10L2015/088Word spotting0.062
H04L2463/081applying self-generating credentials  e.g. instead of receiving credentials from an authority or from another peer  the credentials are generated at the entity itself | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.062
H04B2201/71346Bluetooth0.061
G06F2209/5017Task decomposition0.061
A61B34/74Manipulators with manual electric input means0.061
A61B34/35for telesurgery0.061
G05B2219/25428Field device0.061
H04M1/665by checking the validity of a code0.061
G07C2209/02Access control comprising means for the enrolment of users0.061
H04M2201/41using speaker recognition | speaker recognition | per se|  | (ref: G10L17/00)0.061
H04M2203/6045Identity confirmation0.061
H04M2203/6054Biometric subscriber identification0.061
Y02D10/00Energy efficient computing0.061
G06F19/3418Telemedicine  e.g. remote diagnosis  remote control of instruments or remote monitoring of patient carried devices0.061
G08B17/10Actuation by presence of smoke or gases | automatic alarm devices for analysing flowing fluid materials by the use of optical means | turbidimetric analysis of gases  e.g. of smoke | (ref: G01N21/534)0.061
G09G2370/022Centralised management of display operation  e.g. in a server instead of locally0.061
G06F3/1446display composed of modules  e.g. video walls0.061
B60R16/0373Voice control | in general | (ref: G10L)0.061
H04W4/21for social networking applications0.061
G01S19/42Determining position0.061
G06F2221/031Protect user input by software means0.061
G09B21/006using audible presentation of the information0.061
G05B2219/50193Safety in general0.061
B64C2201/141autonomous  i.e. by navigating independently from ground or air stations  e.g. by using inertial navigation systems [INS]0.061
B60W30/00Purposes of road vehicle drive control systems not related to the control of a particular sub-unit  e.g. of systems using conjoint control of vehicle sub-units |   or advanced driver assistance systems for ensuring comfort  stability and safety or drive control systems for propelling or retarding the vehicle | anti-lock brake systems [ABS] | (ref: B60T8/00)0.061
G07B2017/0033Communication with software component  e.g. dll or object0.061
G07B2017/00169from a franking apparatus  e.g. for verifying accounting0.061
G07B2017/00177from a portable device  e.g. a card or a PCMCIA0.061
G07B2017/00201Open franking system  i.e. the printer is not dedicated to franking only  e.g. PC (Personal Computer)0.061
G07B2017/00935Passwords0.061
G07B2017/00161from a central  non-user location  e.g. for updating rates or software  or for refilling funds0.061
H04L41/0213using standardized network management protocols  e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]0.061
G05B2219/33004Manual control of manipulator  machine0.060
H04M3/487Arrangements for providing information services  e.g. recorded voice services  time announcements0.060
H04M2242/04for emergency applications0.060
H04M3/533Voice mail systems0.060
H04L2463/142Denial of service attacks against network infrastructure0.060
G09G2340/0492Change of orientation of the displayed image  e.g. upside-down  mirrored0.060
G09G2370/16Use of wireless transmission of display information0.060
G09G2350/00Solving problems of bandwidth in display systems0.060
G09G2370/20Details of the management of multiple sources of image data0.060
G09G2358/00Arrangements for display data security0.060
G09G2370/025LAN communication management0.060
H04W48/00Access restriction| Network selection| Access point selection0.060
G06K2207/1017Programmable0.060
G07C2209/14With a sequence of inputs of different identification information0.060
G10L2015/225Feedback of the input speech0.060
G10L2015/227of the speaker|  Human-factor methodology0.060
Y02T10/72Electric energy management in electromobility0.060
Y02T90/169Aspects supporting the interoperability of electric or hybrid vehicles  e.g. recognition  authentication  identification or billing0.060
B60L2240/627by WLAN0.060
B60L2240/622by satellite navigation0.060
Y02T90/14Plug-in electric vehicles0.060
B60L2240/625by GSM0.060
H04L2209/20Manipulating the length of blocks of bits  e.g. padding or block truncation0.060
G05B2219/31088Network communication between supervisor and cell  machine group0.060
H04W92/12between access points and access point controllers0.060
G06F2221/2119Authenticating web pages  e.g. with suspicious links0.059
G06F2201/87Monitoring of transactions0.059
H04W80/00Wireless network protocols or protocol adaptations to wireless operation  e.g. WAP [Wireless Application Protocol]0.059
H04L63/0254Stateful filtering0.059
H04W84/04Large scale networks| Deep hierarchical networks0.059
G05B2219/2642Domotique  domestic  home control  automation  smart house0.059
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.