Validity Report
Full Report
US7594009B2 — Monitoring network activity
Priority Date: 2000-09-13, Publication Date: 2009-09-22, Current Assignee: Datamonitor Systems LLCReport Generated: 2022-09-30

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP1295454B10.939PACKET DATA COMMUNICATIONSGRANT2005-05-112000-06-308173095GreatBritish Telecommunications PLCBritish Telecommunications PLC
US7043759B20.929Architecture to thwart denial of service attacksGRANT2006-05-092000-09-0726924535GreatMazu Networks IncRiverbed Technology LLC
US7124440B20.911Monitoring network traffic denial of service attacksGRANT2006-10-172000-09-0726924534GreatMazu Networks IncRiverbed Technology LLC
EP1301801A10.902METHOD FOR PREVENTING DENIAL OF SERVICE ATTACKSGRANT2003-04-162000-06-2124396336GreatNetrake CorpAudioCodes Texas Inc
US7836498B20.895Device to protect victim sites during denial of service attacksGRANT2010-11-162000-09-0726924532GreatRiverbed Technology IncRiverbed Technology LLC
US7398317B20.893Thwarting connection-based denial of service attacksGRANT2008-07-082000-09-0726924536GreatMazu Networks IncRiverbed Technology LLC, Newfrey LLC
US7743134B20.889Thwarting source address spoofing-based denial of service attacksGRANT2010-06-222000-09-0726924533GreatRiverbed Technology IncRiverbed Technology LLC
US7278159B20.889Coordinated thwarting of denial of service attacksGRANT2007-10-022000-09-0726924531GreatMazu Networks IncRiverbed Technology LLC
US20020032871A10.866Method and system for detecting  tracking and blocking denial of service attacks over a computer networkAPPLICATION2002-03-142000-09-0827499608GreatUniversity of MichiganUniversity of Michigan
EP1145541B10.860APPARATUS AND METHOD FOR COLLECTING AND ANALYZING COMMUNICATIONS DATAGRANT2012-11-211998-11-2422329180GreatNiksun IncNiksun Inc
EP1297440A10.859SECURITY CAMERA FOR A NETWORKGRANT2003-04-022000-05-1222754787GreatNiksun IncNiksun Inc
EP1017203B10.853Monitoring of Internet differentiated services for transactional applicationsGRANT2007-11-141998-12-2822829352GreatNortel Networks LtdNortel Networks Ltd
EP1307999B10.848SYSTEM AND METHOD OF DETECTING EVENTSGRANT2006-01-252000-08-118173182GreatBritish Telecommunications PLCBritish Telecommunications PLC
US6725378B10.839Network protection for denial of service attacksGRANT2004-04-201998-04-1532072681GreatPurdue Research FoundationPurdue Research Foundation
EP1290852A20.827DISTRIBUTED FIREWALL SYSTEM AND METHODGRANT2003-03-122000-05-2524312336GreatSecure Computing LLCMcAfee LLC, Markham Thomas R
EP1218822B10.825INTRUSION AND MISUSE DETERRENCE SYSTEMGRANT2004-12-081999-04-1426827423GreatVerizon Corporate Services Group Inc, Genuity IncVerizon Corporate Services Group Inc, Genuity Inc
US6674743B10.821Method and apparatus for providing policy-based services for internal applicationsGRANT2004-01-061999-12-3029736867Great3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US6654373B10.820Content aware network apparatusGRANT2003-11-252000-06-1224367658GreatNetrake CorpAudioCodes Inc
US5991881A0.819Network surveillance systemGRANT1999-11-231996-11-0824994205GreatHarris CorpRPX Corp
US7120931B10.814System and method for generating filters based on analyzed flow dataGRANT2006-10-102000-08-3137072551GreatCisco Technology IncCisco Technology Inc
US6363056B10.811Low overhead continuous monitoring of network performanceGRANT2002-03-261998-07-1522361401GreatInternational Business Machines CorpInternational Business Machines Corp
US9444785B20.807Transparent provisioning of network access to an applicationGRANT2016-09-132000-06-2342117405GreatCloudshield Technologies IncLOOKINGGLASS CYBER SOLUTIONS Inc
WO2002021296A10.803STATISTICS COLLECTION FOR NETWORK TRAFFICAPPLICATION2002-03-142000-09-0726924530Great
EP1101330B10.795PACKET DATA NETWORK HAVING DISTRIBUTED DATABASEGRANT2010-12-011998-07-2422399942GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US7013482B10.789Methods for packet filtering including packet invalidation if packet validity determination not timely madeGRANT2006-03-142000-07-0735998941Great802 Systems LLC802 Systems Inc
US6279113B10.789Dynamic signature inspection-based network intrusion detectionGRANT2001-08-211998-03-1627373258GreatInternet Tools IncCA Inc
US6944673B20.786Method and system for profiling network flows at a measurement point within a computer networkGRANT2005-09-132000-09-0827398191GreatUniversity of MichiganUniversity of Michigan
US7302705B10.780Method and apparatus for tracing a denial-of-service attack back to its sourceGRANT2007-11-272000-08-3038722093GreatInternational Business Machines CorpTrend Micro Inc
US6321338B10.776Network surveillanceGRANT2001-11-201998-11-0922694340GreatSRI International IncSRI International Inc
US7181769B10.775Network security system having a device profiler communicatively coupled to a traffic monitorGRANT2007-02-202000-08-2537745156GreatNcircle Network Security IncTripwire Inc
US8204082B20.763Transparent provisioning of services over a networkGRANT2012-06-192000-06-2341201048GreatCloudshield Technologies IncLOOKINGGLASS CYBER SOLUTIONS Inc
US6453345B20.762Network security and surveillance systemGRANT2002-09-171996-11-0626706050GreatDatadirect Networks IncComerica Bank California
US6189035B10.761Method for protecting a network from data packet overloadGRANT2001-02-131998-05-0822124735GreatMotorola IncGoogle Technology Holdings LLC
US20020038339A10.761Systems and methods for packet distributionAPPLICATION2002-03-282000-09-0826924925GreatSPONTANEOUS NETWORKS IncSPONTANEOUS NETWORKS Inc
US6587438B10.755World-wide-web server that finds optimal path by sending multiple syn+ack packets to a single clientGRANT2003-07-011999-12-2223866444GreatResonate IncResonate Inc
US6519703B10.752Methods and apparatus for heuristic firewallGRANT2003-02-112000-04-1424192954GreatBandura Cyber IncBandura Cyber Inc
US5515376A0.752Communication apparatus and methodsGRANT1996-05-071993-07-1922238695GreatAlantec IncFORE SYSTEMS TECHNOLOGY Inc, Ericsson AB, Marconi Intellectual Property Ringfence Inc
US6219706B10.751Access control for networksGRANT2001-04-171998-10-1622635248GreatCisco Technology IncCisco Technology Inc
US7032031B20.749Edge adapter apparatus and methodGRANT2006-04-182000-06-2335658574GreatCloudshield Technologies IncLOOKINGGLASS CYBER SOLUTIONS Inc
US6487666B10.743Intrusion detection signature analysis using regular expressions and logical operatorsGRANT2002-11-261999-01-1522872886GreatCisco Technology IncCisco Technology Inc
EP1194876B10.742METHOD AND APPARATUS IN A COMMUNICATION NETWORKGRANT2011-07-131999-05-1026663568GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6363477B10.739Method for analyzing network application flows in an encrypted environmentGRANT2002-03-261998-08-2822503346Great3Com CorpHP Inc, Hewlett Packard Development Co LP
EP1125419B10.738AN AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS WITH ASSURED SYSTEM AVAILABILITYGRANT2009-08-261998-10-3026803485GreatVirnetX IncVirnetX Inc
US7215637B10.736Systems and methods for processing packetsGRANT2007-05-082000-04-1738001052GreatJuniper Networks IncJuniper Networks Inc
US7114008B20.732Edge adapter architecture apparatus and methodGRANT2006-09-262000-06-2346277618GreatCloudshield Technologies IncLOOKINGGLASS CYBER SOLUTIONS Inc
US7688727B10.732Filtering and route lookup in a switching deviceGRANT2010-03-302000-04-1742988395GreatJuniper Networks IncJuniper Networks Inc
EP1039694B10.730System wide flow aggregate processGRANT2005-12-211999-03-2523056134GreatNortel Networks LtdNortel Networks Ltd
US7058976B10.729Intelligent feedback loop process control systemGRANT2006-06-062000-05-1724286392GreatDeep Nines IncTrend Micro Inc
EP0841782B10.729Broadcast isolation and level 3 network switchGRANT2004-02-041996-11-0724992320GreatHewlett Packard CoHP Inc
EP1138137B10.727WIRELESS LOCAL LOOP SYSTEM AND METHOD USEFUL THEREFORGRANT2004-10-131998-12-0726323755GreatAirspan Networks Israel LtdAirspan Networks Israel Ltd
US6930978B20.721System and method for traffic management control in a data transmission networkGRANT2005-08-162000-05-1725365584GreatDeep Nines IncTrend Micro Inc
US6831893B10.714Apparatus and method for wire-speed classification and pre-processing of data packets in a full duplex networkGRANT2004-12-142000-04-0333490802GreatP Cube LtdCisco Systems Israel Ltd
EP1108316B10.711A METHOD AND SYSTEM FOR SUPPORTING THE QUALITY OF SERVICE IN WIRELESS NETWORKSGRANT2011-10-191998-08-2826314284GreatNokia OyjNokia Oyj
US6415321B10.710Domain mapping method and systemGRANT2002-07-021998-12-2922834901GreatCisco Technology IncCisco Technology Inc, Cisco Systems Inc
US6131163A0.708Network gateway mechanism having a protocol stack proxyGRANT2000-10-101998-02-1721823156GreatCisco Technology IncCisco Technology Inc
US6651099B10.706Method and apparatus for monitoring traffic in a networkGRANT2003-11-181999-06-3022497736GreatHI/FN IncAPPTITUDE Inc, PACKET INTELLIGENCE LLC
EP0895684A20.702INTERNET PROTOCOL FILTERGRANT1999-02-101996-04-2421774476GreatNorthern Telecom Ltd, Nortel Networks CorpNortel Networks Ltd
US7380272B20.702System and method for detecting and eliminating IP spoofing in a data transmission networkGRANT2008-05-272000-05-1727765212GreatDeep Nines IncTrend Micro Inc
EP1302047A20.698PROTOCOL FOR SECURE COMMUNICATIONGRANT2003-04-162000-04-2624228599GreatScience Applications International Corp SAICLARSON, VICTOR, Munger Edmund Colby, Schmidt Douglas Charles, Short Robert Durham III, Williamson Michael, VirnetX Inc, Larson Victor, Munger Edmund Colby, Schmidt Douglas Charles, Short Robert Durham III, Williamson Michael
US6894972B10.696Intelligent collaboration across network systemGRANT2005-05-171999-11-1234572690GreatInMon CorpInMon Corp
US6321264B10.695Network-performance statistics using end-node computer systemsGRANT2001-11-201998-08-2822498021Great3Com CorpHP Inc, Hewlett Packard Development Co LP
EP1040360B10.693Architecture for power line exchange protocolGRANT2009-06-171997-12-1522089217GreatThomson Licensing SASTHOMSON LICENSING
US6230271B10.688Dynamic policy-based apparatus for wide-range configurable network service authentication and access control using a fixed-path hardware configurationGRANT2001-05-081998-01-2021740514GreatPilot Network Services IncTumbleweed Holdings LLC, Pilot Network Services Inc
US5790799A0.685System for sampling network packets by only storing the network packet that its error check code matches with the reference error check codeGRANT1998-08-041995-05-1723760250GreatDigital Equipment CorpHewlett Packard Development Co LP
US6826616B20.685Method for establishing secure communication link between computers of virtual private networkGRANT2004-11-301998-10-3046300296GreatScience Applications International Corp SAICVirnetX Inc
US7934254B20.684Method and apparatus for providing network and computer system securityGRANT2011-04-261998-12-0926809096GreatInternational Business Machines CorpInternational Business Machines Corp
EP1284079A20.682SECURE DOMAIN NAME SERVICEGRANT2003-02-192000-04-2624228602GreatScience Applications International Corp SAICScience Applications International Corp SAIC, Larson Victor, Munger Edmund Colby, Schmidt Douglas Charles, Short Robert Durham III, Williamson Michael
US7043633B10.681Method and apparatus for providing adaptive self-synchronized dynamic address translationGRANT2006-05-092000-08-2836272456GreatVerizon Corporate Services Group IncRaytheon BBN Technologies Corp, Verizon Patent and Licensing Inc
US6363489B10.680Method for automatic intrusion detection and deflection in a networkGRANT2002-03-261999-11-2923784510GreatForescout Technologies IncForescout Technologies Inc
EP1234246B10.679SYSTEM AND METHOD FOR NETWORK ACCESS WITHOUT RECONFIGURATIONGRANT2015-08-121999-10-2222579976GreatNomadix IncNomadix Inc
EP1145519B10.676System and method for policy-based network management of virtual private networksGRANT2005-08-311999-06-1027585810GreatAlcatel Internetworking IncNokia of America Corp
US5539659A0.675Network analysis methodGRANT1996-07-231993-02-2210730831GreatHewlett Packard CoHP Inc, Viavi Solutions Inc, Hewlett Packard Development Co LP
US8037530B10.671Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensorGRANT2011-10-112000-08-2844730081GreatVerizon Corporate Services Group Inc, Raytheon BBN Technologies CorpRaytheon BBN Technologies Corp, Verizon Patent and Licensing Inc
US10511573B20.670Agile network protocol for secure communications using secure domain namesGRANT2019-12-171998-10-3057016364GreatVirnetX IncVirnetX Inc
EP1143661B10.668System and method for automatic reachability updating in virtual private networksGRANT2005-08-101999-06-1027585868GreatAlcatel Internetworking IncNokia of America Corp
US7418504B20.667Agile network protocol for secure communications using secure domain namesGRANT2008-08-261998-10-3032303805GreatVirnetX IncVirnetX Inc
WO2001006726A20.661SECURE NETWORK SWITCHAPPLICATION2001-01-251999-07-1523392666Good
US6772347B10.655Method  apparatus and computer program product for a network firewallGRANT2004-08-031999-04-0123087312GoodJuniper Networks IncJuniper Networks Inc
US20110258444A10.654Network Controller DecryptionAPPLICATION2011-10-201999-07-3044789107GoodIntel CorpIntel Corp
EP1775898B10.654TCP/IP packet-centric wireless transmission system architectureGRANT2013-10-021999-07-0946305046GoodIntellectual Ventures I LLCIntellectual Ventures I LLC
US7574740B10.653Method and system for intrusion detection in a computer networkGRANT2009-08-112000-04-2824242590GoodInternational Business Machines CorpInternational Business Machines Corp
US6502135B10.653Agile network protocol for secure communications with assured system availabilityGRANT2002-12-311998-10-3024007717GoodScience Applications International Corp SAICVirnetX Inc
EP1197040B10.649TCP/IP PACKET-CENTRIC WIRELESS TRANSMISSION SYSTEM ARCHITECTUREGRANT2007-01-241999-07-0927586545GoodMalibu Networks IncMalibu Networks Inc
US5444782A0.646Computer network encryption/decryption deviceGRANT1995-08-221993-03-0946248346GoodUunet Technologies IncVerizon Patent and Licensing Inc
US6771646B10.643Associative cache structure for lookups and updates of flow records in a network monitorGRANT2004-08-031999-06-3032775446GoodHI/FN IncAPPTITUDE Inc, PACKET INTELLIGENCE LLC
US6253337B10.641Information security analysis systemGRANT2001-06-261998-07-2122239553GoodRaytheon CoCA Inc
US20110164533A10.639Methods and systems using PLD-based network communication protocolsAPPLICATION2011-07-072000-07-0725001183Good802 Systems Inc802 Systems Inc
US7917393B20.638Probabilistic alert correlationGRANT2011-03-292000-09-0127403000GoodSRI International IncSRI International Inc
US7016951B10.638System and method for network securityGRANT2006-03-211999-04-3036045714GoodNetwitness LLC, MANTECH INFORMATION SYSTEMS & TECHNOLOGY CORPNETWORK FORENSICS Inc, EMC Corp
US7243143B10.634Flow probe connectivity determinationGRANT2007-07-101999-03-2538227128GoodNortel Networks LtdAvaya Inc
US5878420A0.633Network monitoring and management systemGRANT1999-03-021995-08-3124080831GoodCompuware CorpDynatrace LLC
US6331985B10.627Telecommunication network with variable address learning  switching and routingGRANT2001-12-181997-08-2122478530GoodADC Telecommunications IncCommscope EMEA Ltd, Commscope Technologies LLC
US7107612B10.626Method  apparatus and computer program product for a network firewallGRANT2006-09-121999-04-0136951985GoodJuniper Networks IncJuniper Networks Inc
WO2000005852A10.622INFORMATION SECURITY ANALYSIS SYSTEMAPPLICATION2000-02-031998-07-2122239569Good
US6304262B10.621Information security analysis systemGRANT2001-10-161998-07-2122239613GoodRaytheon CoCA Inc
US6279037B10.620Methods and apparatus for collecting  storing  processing and using network traffic dataGRANT2001-08-211998-05-2810832808Good3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US6108782A0.620Distributed remote monitoring (dRMON) for networksGRANT2000-08-221996-12-1346203135Good3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US6023508A0.617Polymorphic data structures for secure operation of a virtual cash systemGRANT2000-02-081997-05-2225336322GoodCurrency Scientific IncCurrency Scientific Inc
EP1240764A20.617SERVER AND METHOD PROVIDE ACCESS TO A NETWORKGRANT2002-09-181999-12-234164987GoodSolutionInc LtdSolutionInc Ltd
EP1055177A10.616METHOD AND APPARATUS FOR UNIVERSAL DATA EXCHANGE GATEWAYGRANT2000-11-291998-01-2222105770GoodIntelogis IncInari Inc
US6789116B10.613State processor for pattern matching in a network monitor deviceGRANT2004-09-071999-06-3032929945GoodHI/FN IncAPPTITUDE Inc, PACKET INTELLIGENCE LLC
US7089303B20.612Systems and methods for distributed network protectionGRANT2006-08-082000-05-3126902856GoodInvicta Networks IncInvicta Networks Inc
US6854063B10.612Method and apparatus for optimizing firewall processingGRANT2005-02-082000-03-0334103050GoodCisco Technology IncCisco Technology Inc
US7073196B10.612Firewall for processing a connectionless network packetGRANT2006-07-041998-08-0736613931GoodNational Security AgencyNATIONAL SECURITY AGENCY United States,, National Security Agency
US6952421B10.609Switched Ethernet path detectionGRANT2005-10-041999-10-0735005170GoodCisco Technology IncCisco Technology Inc
US5884036A0.609Method for determining the topology of an ATM network having decreased looping of topology information cellsGRANT1999-03-161996-11-0825003712GoodVirata LtdConexant Systems UK Ltd, Conexant Inc, ADVANCED TELECOMMUNICATION MODULES Ltd
US6269330B10.608Fault location and performance testing of communication networksGRANT2001-07-311997-10-0711070712GoodAttune Networks LtdCisco Technology Inc
US7917647B20.607Method and apparatus for rate limitingGRANT2011-03-292000-06-1646299346GoodMcAfee LLCMcAfee LLC
US6807667B10.606Method and system of an application program interface for abstracting network traffic control components to application programsGRANT2004-10-191998-09-2133129747GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7409541B10.603Method of transporting packets between an access interface of a subscriber installation and a shared network  and access interface implementing such methodGRANT2008-08-051998-12-149533938GoodComverse France SAMavenir France SA
US6775657B10.601Multilayered intrusion detection system and methodGRANT2004-08-101999-12-2232825491GoodCisco Technology IncCisco Technology Inc
EP1092186B10.599METHOD AND APPARATUS FOR WIRELESS INTERNET ACCESSGRANT2010-03-311998-05-2927492072GoodAccess Systems Americas IncAccess Systems Americas Inc
US7272646B20.595Network monitor internals descriptionGRANT2007-09-182000-06-1626906795GoodSecurify IncMcAfee LLC, Security Inc
US6115393A0.594Network monitoringGRANT2000-09-051991-04-1227103411GoodConcord Communications LLCCA Inc
US7072933B10.594Network access control using network address translationGRANT2006-07-042000-01-2436613879GoodMicrosoft CorpZhigu Holdings Ltd
US5442708A0.591Computer network encryption/decryption deviceGRANT1995-08-151993-03-0921843443GoodUunet Technologies IncVerizon Patent and Licensing Inc
US6615358B10.583Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented networkGRANT2003-09-021998-08-0727767351GoodNATIONAL SECURITY AGENCY United States,NATIONAL SECURITY AGENCY United States,
EP1068574A10.583PROVIDING DESIRED SERVICE POLICIES TO SUBSCRIBERS ACCESSING INTERNETGRANT2001-01-171998-12-0326900044GoodNortel Networks LtdNortel Networks Ltd
US7134141B20.582System and method for host and network based intrusion detection and responseGRANT2006-11-072000-06-1226905651GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
EP1016253B10.581DISTRIBUTED COMPUTING SYSTEM AND METHOD FOR DISTRIBUTING USER REQUESTS TO REPLICATED NETWORK SERVERSGRANT2005-06-081996-12-0926708484GoodVerizon Corporate Services Group Inc, Genuity IncVerizon Corporate Services Group Inc, Genuity Inc
US6981146B10.581Method of communications and communication network intrusion protection methods and intrusion attempt detection systemGRANT2005-12-271999-05-1734810886GoodInvicta Networks IncInvicta Networks Inc
US5473607A0.580Packet filtering for data networksGRANT1995-12-051993-08-0922296352GoodGrand Junction Networks IncCisco Technology Inc
US7315893B20.579Method and apparatus for filtering messages based on contextGRANT2008-01-011997-07-1527501066GoodComputer Associates Think IncCA Inc
US7007301B20.579Computer architecture for an intrusion detection systemGRANT2006-02-282000-06-1226905652GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US7921459B20.578System and method for managing security events on a networkGRANT2011-04-052000-04-2822741185GoodInternational Business Machines CorpInternational Business Machines Corp
US5835726A0.577System for securing the flow of and selectively modifying packets in a computer networkGRANT1998-11-101993-12-1556289696GoodCheck Point Software Technologies LtdCheck Point Software Technologies Ltd
EP1090485B10.577NETWORK APPLICATION ENGINEGRANT2010-12-081998-06-1522265473GoodIntel CorpIntel Corp
EP1903830A10.573Cellular data system security methodGRANT2008-03-261999-11-0139103384GoodWhite Cell IncWhite Cell Inc
US7266604B10.573Proxy network address translationGRANT2007-09-042000-03-3124159692GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP1273156B10.573METHODS AND SYSTEMS FOR MANAGING VIRTUAL ADDRESSES FOR VIRTUAL NETWORKSGRANT2007-08-292000-04-1226891795GoodOpenreachcomOpenreachcom
US6466976B10.571System and method for providing desired service policies to subscribers accessing the internetGRANT2002-10-151998-12-0322760545GoodNortel Networks LtdRPX Clearinghouse LLC
WO1992019054A10.569NETWORK MONITORINGAPPLICATION1992-10-291991-04-1224749175Good
US5886643A0.569Method and apparatus for discovering network topologyGRANT1999-03-231996-09-1724873008GoodConcord Communications LLCCA Inc
US6832321B10.567Public network access server having a user-configurable firewallGRANT2004-12-141999-11-0223715748GoodAmerica Online IncMeta Platforms Inc
US6170012B10.564Methods and apparatus for a computer network firewall with cache query processingGRANT2001-01-021997-09-1225456775GoodLucent Technologies IncNokia of America Corp
US7065657B10.563Extensible intrusion detection systemGRANT2006-06-201999-08-3036586551GoodSymantec CorpNortonLifeLock Inc
WO2001099373A20.562SYSTEM AND METHOD FOR SECURITY POLICYAPPLICATION2001-12-272000-06-1627395694Good
US7827605B20.562System and method for preventing detection of a selected process running on a computerGRANT2010-11-021999-07-1426841423GoodSymantec CorpCA Inc
US6826697B10.561System and method for detecting buffer overflow attacksGRANT2004-11-301999-08-3033455892GoodSymantec CorpCA Inc
US7203962B10.561System and method for using timestamps to detect attacksGRANT2007-04-101999-08-3037904356GoodSymantec CorpNortonLifeLock Inc
US7085936B10.560System and method for using login correlations to detect intrusionsGRANT2006-08-011999-08-3036710681GoodSymantec CorpNortonLifeLock Inc
US6996843B10.559System and method for detecting computer intrusionsGRANT2006-02-071999-08-3035734399GoodSymantec CorpNortonLifeLock Inc
US6647400B10.559System and method for analyzing filesystems to detect intrusionsGRANT2003-11-111999-08-3029406289GoodSymantec CorpNortonLifeLock Inc
US5684796A0.559Method and apparatus for determining and maintaining agent topology information in a multi-segment networkGRANT1997-11-041994-05-0346250132GoodBay Networks Group IncAvaya Holdings Ltd
US6795403B10.559Automatic discovery of switch devices in a networkGRANT2004-09-212000-03-3132991069GoodCisco Technology IncCisco Technology Inc
EP1131926B10.558VOICE OVER DATA TELECOMMUNICATIONS NETWORK ARCHITECTUREGRANT2014-09-031998-11-2022728451GoodLevel 3 Communications LLCLevel 3 Communications LLC
US7032114B10.557System and method for using signatures to detect computer intrusionsGRANT2006-04-182000-08-3036147576GoodSymantec CorpNortonLifeLock Inc
US5926463A0.556Method and apparatus for viewing and managing a configuration of a computer networkGRANT1999-07-201997-10-0625480228Good3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US5958010A0.553Systems and methods for monitoring distributed applications including an interface running in an operating system kernelGRANT1999-09-281997-03-2025234075GoodFirstSense Software IncGoogle LLC, Concord Communications LLC
US6098172A0.552Methods and apparatus for a computer network firewall with proxy reflectionGRANT2000-08-011997-09-1225456779GoodLucent Technologies IncNokia of America Corp
US5606668A0.547System for securing inbound and outbound data packet flow in a computer networkGRANT1997-02-251993-12-1522609848GoodCheck Point Software Technologies LtdCheck Point Software Technologies Ltd
US7143439B20.544Efficient evaluation of rulesGRANT2006-11-282000-01-0746277725GoodSecurity IncMcAfee LLC, Security Inc
US5485455A0.544Network having secure fast packet switching and guaranteed quality of serviceGRANT1996-01-161994-01-2822692312GoodCabletron Systems IncEnterasys Networks Inc
US7089428B20.543Method and system for managing computer security informationGRANT2006-08-082000-04-2822741198GoodInternet Security Systems IncInternational Business Machines Corp
US6839850B10.543Method and system for detecting intrusion into and misuse of a data processing systemGRANT2005-01-041999-03-0433538841GoodPRC IncNorthrop Grumman Systems Corp, PRC Inc
US7047288B20.543Automated generation of an english language representation of a formal network security policy specificationGRANT2006-05-162000-01-0746277724GoodSecurify IncMcAfee LLC
US6754699B20.542Content delivery and global traffic management network systemGRANT2004-06-222000-07-1937863949GoodSpeedera Networks IncHP Inc, Akamai Technologies Inc
US7854005B20.541System and method for generating fictitious content for a computerGRANT2010-12-141999-07-1437037446GoodSymantec CorpNortonLifeLock Inc
US8117296B20.541Domain name resolution using a distributed DNS networkGRANT2012-02-142000-07-1946323046GoodAkamai Technologies IncAkamai Technologies Inc, Speedera Networks Inc
US8108508B10.540Web server chip for network manageabilityGRANT2012-01-311998-06-2245508246GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US7143438B10.538Methods and apparatus for a computer network firewall with multiple domain supportGRANT2006-11-281997-09-1225454664GoodLucent Technologies IncNokia of America Corp
US6154775A0.538Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rulesGRANT2000-11-281997-09-1225456777GoodLucent Technologies IncPalo Alto Networks Inc
US6675209B10.538Method and system for assigning priority among network segmentsGRANT2004-01-061999-07-1929736013GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US6871284B20.538Credential/condition assertion verification optimizationGRANT2005-03-222000-01-0726906794GoodSecurify IncMcAfee LLC
US20050235346A10.536Method for transparently forming a connection to an element of a private network over an IP-compliant networkAPPLICATION2005-10-201996-02-0624385402Good
US8549640B20.534System and method for computer securityGRANT2013-10-011999-07-1426848722GoodSymantec CorpNortonLifeLock Inc
US7574499B10.534Global traffic management system using IP anycast routing and dynamic load-balancingGRANT2009-08-112000-07-1940934391GoodAkamai Technologies IncAkamai Technologies Inc
EP1175066B10.531Method and system for providing connection handlingGRANT2006-01-042000-07-2126914502GoodHughes Network Systems LLCHughes Network Systems LLC
US6738909B10.530Method and apparatus for automatic configuration for internet protocol security tunnels in a distributed data processing systemGRANT2004-05-181999-09-0232298201GoodInternational Business Machines CorpInternational Business Machines Corp
US5903559A0.529Method for internet protocol switching over fast ATM cell transportGRANT1999-05-111996-12-2025092222GoodNEC USA IncJuniper Networks Inc
US7912978B20.529Method for determining metrics of a content delivery and global traffic management networkGRANT2011-03-222000-07-1946332164GoodAkamai Technologies IncAkamai Technologies Inc
US7107347B10.527Method and apparatus for network deception/emulationGRANT2006-09-121999-11-1526861507GoodIndividualManagement Analytics Inc
US6678245B10.526Packet network performance managementGRANT2004-01-131998-01-3029782162GoodLucent Technologies IncNokia of America Corp
US6633563B10.526Assigning cell data to one of several processors provided in a data switchGRANT2003-10-141999-03-0228791737GoodNortel Networks LtdSHASTA NETWORKS Inc, Ericsson AB
US8194654B10.524Virtual dial-up protocol for network communicationGRANT2012-06-051996-07-2932469908GoodCisco Technology IncCisco Technology Inc
US20020112076A10.521Internet protocol-based computer network serviceAPPLICATION2002-08-152000-01-3122655398GoodTelecommunications Res LabsTelecommunications Res Labs
US20020073337A10.519Method and system for internet hosting and securityAPPLICATION2002-06-132000-08-3022859104GoodCitibank NACitibank NA
US7028182B10.518Secure network system and method for transfer of medical informationGRANT2006-04-111999-02-1936127879GoodNexsys Electronics IncNEXSYS ELECTRONICS Inc A CALIFORNIA Corp, Nexsys Electronics Inc
US6606635B10.518Data processing apparatusGRANT2003-08-121998-03-2314207869GoodMitsubishi Electric CorpMitsubishi Electric Corp
US6075776A0.516VLAN control system and methodGRANT2000-06-131996-06-0715394629GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US6175917B10.514Method and apparatus for swapping a computer operating systemGRANT2001-01-161998-04-2322065890GoodVPNet Technologies IncAvaya Inc, VPNet Technologies Inc
US20080281963A10.511DISTRIBUTED REMOTE MANAGEMENT (DRMON) FOR NETWORKSAPPLICATION2008-11-132000-03-0239970543Good
US6205473B10.511Method and system for asymmetric satellite communications for local area networksGRANT2001-03-201997-10-0325479841GoodHelius Dev CorpHelius LLC, Hughes Network Systems LLC
US7821926B20.511Generalized policy serverGRANT2010-10-261997-03-1046329251GoodSonicWall LLCMARSHMAN RESEARCH LLC, Quest Software Inc, PSM Merger Sub Delaware Inc
US7886023B10.509Method and apparatus for a minimalist approach to implementing server selectionGRANT2011-02-082000-01-2143532029GoodCisco Technology IncCisco Technology Inc
US8250357B20.507Tunnel interface for securing traffic over a networkGRANT2012-08-212000-09-1327398311GoodFortinet IncFortinet Inc
US5175732A0.506METHOD AND APPARATUS FOR CONTROLLING DATA COMMUNICATION OPERATIONS WITHIN STATIONS OF A LOCAL-AREA NETWORKGRANT1992-12-291991-02-1524634553GoodStandard Microsystems LLCStandard Microsystems LLC
US6111883A0.505Repeater and network system utilizing the sameGRANT2000-08-291996-07-1226501573GoodHitachi LtdHitachi Ltd
US6408336B10.503Distributed administration of access to informationGRANT2002-06-181997-03-1027364674GoodSonicWall LLCMARSHMAN RESEARCH LLC, Dropbox Inc
US6754212B10.502Repeater and network system utililzing the sameGRANT2004-06-221996-07-1232475068GoodHitachi LtdHitachi Ltd
US6327677B10.502Method and apparatus for monitoring a network environmentGRANT2001-12-041998-04-2722075199GoodProactive NetworksBMC Software Inc
US7743132B20.501Secure content delivery systemGRANT2010-06-222000-08-1831977451GoodAkamai Technologies IncAkamai Technologies Inc
US7716717B20.500Improving security of data communications networksGRANT2010-05-112000-07-2537526661GoodTri MBC Communications LLCCufer Asset Ltd LLC, Individual
US8914410B20.500Query interface to policy serverGRANT2014-12-161999-02-1644648059GoodSonicWall LLCMARSHMAN RESEARCH LLC, Quest Software Inc, PSM Merger Sub Delaware Inc
US7272625B10.500Generalized policy serverGRANT2007-09-181997-03-1038481892GoodSonicWall LLCMARSHMAN RESEARCH LLC, Quest Software Inc, PSM Merger Sub Delaware Inc
US7925693B20.499NAT access control with IPSecGRANT2011-04-122000-01-2438088837GoodMicrosoft CorpZhigu Holdings Ltd
US6408391B10.498Dynamic system defense for information warfareGRANT2002-06-181998-05-0622114955GoodPRC IncNorthrop Grumman Systems Corp, PRC Inc
US5297138A0.495Determining physical topology across repeaters and bridges in a computer networkGRANT1994-03-221991-04-3024786930GoodHewlett Packard CoHP Inc
US7580919B10.494Query interface to policy serverGRANT2009-08-251997-03-1040973480GoodSonicWall LLCMARSHMAN RESEARCH LLC, Quest Software Inc, PSM Merger Sub Delaware Inc
US6226751B10.493Method and apparatus for configuring a virtual private networkGRANT2001-05-011998-04-1722042931GoodVPNet Technologies IncAvaya Inc, VPNet Technologies Inc
US5682386A0.492Data/voice/fax compression multiplexerGRANT1997-10-281994-04-1922863387GoodMulti Tech Systems IncMulti Tech Systems Inc
US6009475A0.492Filter rule validation and administration for firewallsGRANT1999-12-281996-12-2325098616GoodInternational Business Machines CorpTrend Micro Inc
US7406713B20.490Systems and methods for distributed network protectionGRANT2008-07-292000-08-1822847504GoodInvicta Networks IncInvicta Networks Inc
US6959006B10.488Service delivery unit for an enterprise networkGRANT2005-10-251999-06-2934061741GoodADC Telecommunications IncRPX Corp, Commscope Connectivity LLC
US6163843A0.488Packet inspection device  mobile computer and packet transfer method in mobile computing with improved mobile computer authenticity check schemeGRANT2000-12-191996-10-2517672893GoodToshiba CorpToshiba Corp
US20040088706A10.487Firewall providing enhanced netowrk security and user transparencyAPPLICATION2004-05-061996-02-0624947298Good
US6321263B10.487Client-based application availabilityGRANT2001-11-201998-05-1122129636GoodInternational Business Machines CorpInternational Business Machines Corp
US6804778B10.485Data quality assuranceGRANT2004-10-121999-04-1527271505GoodGilian Tech LtdTrustwave Holdings Inc
US6347338B10.481Precomputed and distributed security system for a communication networkGRANT2002-02-121997-11-2625526374GoodInternational Business Machines CorpInternational Business Machines Corp
US7240364B10.479Network device identity authenticationGRANT2007-07-032000-05-2038268455GoodCiena CorpCiena Corp
EP1015986A10.479INTEGRATED CUSTOMER INTERFACE FOR WEB BASED COMMUNICATIONS NETWORK MANAGEMENTGRANT2000-07-051997-09-2622030944GoodTusa MichaelBarry B Reilly, CHODORONEK, MARK A., DEROSE, ERIC, Gonzales Mark N, JAMES, ANGELA R., Levy Lynne, Tusa Michael, Barry B Reilly, Chodoronek Mark A, Derose Eric, Gonzales Mark N, James Angela R, Levy Lynne
US5926462A0.474Method of determining topology of a network of objects which compares the similarity of the traffic sequences/volumes of a pair of devicesGRANT1999-07-201995-11-1624230734GoodLoran Network Systems LLCWhitecastle Investments Ltd, Hewlett Packard Enterprise Development LP
US6847609B10.470Shared management of a network entityGRANT2005-01-251999-06-2946301494GoodADC Telecommunications IncCommscope EMEA Ltd, RPX Corp
WO2001033889A10.467CELLULAR DATA SYSTEM SECURITY METHOD AND APPARATUSAPPLICATION2001-05-101999-11-0126859224Good
US5896499A0.466Embedded security processorGRANT1999-04-201997-02-2125187131GoodInternational Business Machines CorpInternational Business Machines Corp
US6631417B10.466Methods and apparatus for securing access to a computerGRANT2003-10-072000-03-2924148724GoodIona Technologies Ltd IrelandProgress Software Corp
US6515968B10.464Integrated interface for real time web based viewing of telecommunications network call trafficGRANT2003-02-041995-03-1727369878GoodWorldcom IncVerizon Patent and Licensing Inc
US8260918B20.463Packet routing system and methodGRANT2012-09-042000-09-1336974634GoodFortinet IncFortinet Inc
US6112241A0.462Integrated network interconnecting device and probeGRANT2000-08-291997-10-2125496600GoodInternational Business Machines CorpInternational Business Machines Corp
US6981279B10.460Method and apparatus for replicating and analyzing worm programsGRANT2005-12-272000-08-1735482822GoodInternational Business Machines CorpTrend Micro Inc
EP1210661A20.458A SYSTEM  METHOD AND ARTICLE OF MANUFACTURE FOR A HOST FRAMEWORK DESIGN IN AN E-COMMERCE ARCHITECTUREGRANT2002-06-051999-07-3023435833GoodAccenture LLPAccenture Global Services Ltd
US8006243B20.456Method and apparatus for remote installation of network drivers and softwareGRANT2011-08-231999-12-0737997861GoodInternational Business Machines CorpInternational Business Machines Corp
US20080028083A10.455Adaptively controlled resource and method for controlling the behavior of sameAPPLICATION2008-01-312000-09-0626924117Good
US6148337A0.454Method and system for monitoring and manipulating the flow of private information on public networksGRANT2000-11-141998-04-0121986825GoodBridgeway CorpBridgeway Corp
US6141755A0.452Firewall security apparatus for high-speed circuit switched networksGRANT2000-10-311998-04-1322020438GoodNational Security AgencyGOVERNMENT OF UNITED STATES AS REPRESENTED BY DIR NAT SECURITY AGENCY, National Security Agency
US6804701B20.452System and method for monitoring and analyzing internet trafficGRANT2004-10-121999-10-0426854343GoodUrchin Software CorpGoogle LLC
EP1226495A20.451ARCHITECTURES FOR NETCENTRIC COMPUTING SYSTEMSGRANT2002-07-311999-11-0326859669GoodAccenture LLPAccenture LLP
US6336141B10.449Method of collectively managing dispersive log  network system and relay computer for use in the sameGRANT2002-01-011997-01-0811504674GoodHitachi LtdHitachi Ltd
US6205122B10.446Automatic network topology analysisGRANT2001-03-201998-07-2126787767GoodMercury Interactive LLCHewlett Packard Enterprise Development LP
US5872976A0.446Client-based system for monitoring the performance of application programsGRANT1999-02-161997-04-0125258842GoodLandmark Systems CorpALLEN SYSTEMS GROUP Inc
US6519268B10.445Asynchronous data pipe for automatically managing asynchronous data transfers between an application and a bus structureGRANT2003-02-111996-03-0724452676GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US6496505B20.443Packet tunneling optimization to wireless devices accessing packet-based wired networksGRANT2002-12-171998-12-1122783100GoodLucent Technologies IncNokia of America Corp
US6484261B10.442Graphical network security policy managementGRANT2002-11-191998-02-1726756253GoodCisco Technology IncCisco Technology Inc
US6324168B10.442Method and system for computer network link with undefined termination conditionGRANT2001-11-271996-07-1026694745GoodVigilant Networks LLCCommscope EMEA Ltd, Vigilant Networks LLC, Commscope Technologies LLC
US6202156B10.440Remote access-controlled communicationGRANT2001-03-131997-09-1225456141GoodSun Microsystems IncOracle America Inc
US6523027B10.439Interfacing servers in a Java based e-commerce architectureGRANT2003-02-181999-07-3023434906GoodAccenture LLPAccenture Global Services Ltd, AC Properties BV
US7260638B20.439Method and system for enabling seamless roaming in a wireless networkGRANT2007-08-212000-07-2422823347GoodBluesocket IncBluesocket Inc
EP1269321B10.439METHOD  AND SYSTEM FOR AN AUTOMATED SCRIPTING SOLUTION FOR ENTERPRISE TESTINGGRANT2008-06-182000-03-2727415181GoodAccenture LLPAccenture LLP
US7315801B10.439Network security modeling system and methodGRANT2008-01-012000-01-1438870543GoodSecure Computing LLCMcAfee LLC
US6633878B10.438Initializing an ecommerce database frameworkGRANT2003-10-141999-07-3028791877GoodAccenture LLPAccenture Global Services Ltd, AC Properties BV
US6088796A0.438Secure middleware and server control system for querying through a network firewallGRANT2000-07-111998-08-0622441657GoodTEMPEST SOFTWARE IncTEMPEST SOFTWARE Inc
US7100195B10.438Managing user information on an e-commerce systemGRANT2006-08-291999-07-3023432969GoodAccenture LLPAccenture Global Services Ltd
US6704873B10.437Secure gateway interconnection in an e-commerce based environmentGRANT2004-03-091999-07-3031888125GoodAccenture LLPAccenture Global Services Ltd, AC Properties BV
US5557742A0.437Method and system for detecting intrusion into and misuse of a data processing systemGRANT1996-09-171994-03-0722772890GoodHaystack Labs IncMcAfee LLC
US6298445B10.437Computer securityGRANT2001-10-021998-04-3022096866GoodNetect LtdNetect Ltd, NortonLifeLock Inc
US6718535B10.436System  method and article of manufacture for an activity framework design in an e-commerce based environmentGRANT2004-04-061999-07-3032030546GoodAccenture LLPAccenture Global Services Ltd
US6601233B10.436Business components frameworkGRANT2003-07-291999-07-3027613558GoodAccenture LLPAccenture Global Services Ltd
US6609128B10.436Codes table framework design in an E-commerce architectureGRANT2003-08-191999-07-3023434751GoodAccenture LLPAccenture Global Services Ltd, Accenture LLP
US6097703A0.434Multi-hop packet radio networksGRANT2000-08-011994-12-1925584680GoodSalbu Research and Development Pty LtdIwics Inc
US6055575A0.434Virtual private network system and methodGRANT2000-04-251997-01-2821758422GoodAscend Communications IncAscend Communications Inc
US5727157A0.432Apparatus and method for determining a computer network topologyGRANT1998-03-101990-09-1726812983GoodCabletron Systems IncCA Inc, Concord Communications LLC
US6480488B10.430Method and apparatus for sorting and transmitting data packetsGRANT2002-11-121998-01-2321629406GoodAccton Technology CorpAccton Technology Corp
US20030191957A10.430DISTRIBUTED COMPUTER VIRUS DETECTION AND SCANNINGAPPLICATION2003-10-091999-02-1928675126GoodF Secure OyjWithSecure Oyj
US8694683B20.428Method and system for data demultiplexingGRANT2014-04-081999-12-2923884486GoodIMPLICIT LLCIMPLICIT LLC
WO2001097485A20.427METHOD FOR PROVIDING TRANSPARENT PUBLIC ADDRESSED NETWORKS WITHIN PRIVATE NETWORKSAPPLICATION2001-12-202000-06-1426906196Good
EP1275222B10.427A METHOD FOR CONTROLLING DATA COLLECTION  MANIPULATION AND STORAGE ON A NETWORK WITH SERVICE ASSURANCE CAPABILITIESGRANT2011-10-261999-12-2327413164GoodAccenture Global Services LtdAccenture Global Services Ltd
US20020038430A10.427System and method of data collection  processing  analysis  and annotation for monitoring cyber-threats and the notification thereof to subscribersAPPLICATION2002-03-282000-09-1326924694GoodIdefense Inc, Infrastructure Defense IncIdefense Inc, Infrastructure Defense Inc
US6160797A0.426Satellite receiver/router  system  and method of useGRANT2000-12-121998-04-0327373722GoodStarGuide Digital Networks IncRateze Remote Mgmt LLC
US20030023721A10.423Method and apparatus for generating context-descriptive messagesAPPLICATION2003-01-301997-07-1527501062GoodComputer Associates Think IncCA Inc
US7437408B20.423Information aggregation  processing and distribution systemGRANT2008-10-142000-02-1446299402GoodLockheed Martin CorpLockheed Martin Corp
US6901442B10.422Methods  system and computer program products for dynamic filtering of network performance test resultsGRANT2005-05-312000-01-0734590068GoodNetIQ CorpNetIQ Corp
US20110035491A10.420Method for Internetworked Hybrid Wireless Integrated Network Sensors (WINS)APPLICATION2011-02-101999-10-0627496316GoodBorgia Cummins LLCIntellectual Ventures I LLC
US5889943A0.418Apparatus and method for electronic mail virus detection and eliminationGRANT1999-03-301995-09-2624507652GoodTrend Micro IncTrend Micro Inc
US7650620B20.417Method and apparatus for push and pull distribution of multimediaGRANT2010-01-191998-03-0637863990GoodMegawave Audio LLCRateze Remote Mgmt LLC
US8301766B20.416System and method to publish information from servers to remote monitor devicesGRANT2012-10-302000-01-3123964940GoodTeleCommunication Systems IncTeleCommunication Systems Inc
US6604143B10.415Scalable proxy servers with plug-in filtersGRANT2003-08-051998-06-1922220580GoodSun Microsystems IncOracle America Inc
US5918018A0.414System and method for achieving network separationGRANT1999-06-291996-02-0924398807GoodSecure Computing LLCMcAfee LLC
US5842002A0.414Computer virus trapGRANT1998-11-241994-06-0122956818GoodQuantum Leap Innovations IncQuantum Leap Innovations Inc
US7836494B20.413System and method for regulating the flow of information to or from an applicationGRANT2010-11-161999-12-2936698335GoodIntel CorpIntel Corp
US6975655B20.411Method of controlling data sampling clocking of asynchronous network nodes in a frame-based communications networkGRANT2005-12-132000-04-0726891564GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US6668282B10.411System and method to monitor and determine if an active IPSec tunnel has become disabledGRANT2003-12-232000-08-0229737082GoodInternational Business Machines CorpTrend Micro Inc
US6689055B10.411Method and apparatus for acquisition and analysis of non-imaging data collected during ultrasound examGRANT2004-02-101999-12-3123892499GoodGE Medical Systems Global Technology Co LLCGeneral Electric Co, GE Medical Systems Global Technology Co LLC
EP1222532A20.410A SYSTEM  METHOD AND ARTICLE OF MANUFACTURE FOR A CONSTANT CLASS COMPONENT IN A BUSINESS LOGIC SERVICES PATTERNS ENVIRONMENTGRANT2002-07-171999-08-3123528957GoodAccenture LLPAccenture LLP
US6907396B10.410Detecting computer viruses or malicious software by patching instructions into an emulatorGRANT2005-06-142000-06-0134633045GoodMcAfee LLCMcAfee LLC
US8630942B20.407Method of billing a purchase made over a computer networkGRANT2014-01-141996-06-0546282273GoodFraud Control Systems com CorpFraud Control Systems com Corp
EP1259879A20.407A SYSTEM  METHOD AND ARTICLE OF MANUFACTURE FOR A MULTI-OBJECT FETCH COMPONENT IN AN INFORMATION SERVICES PATTERNS ENVIRONMENTGRANT2002-11-271999-08-3123524740GoodAccenture LLPAccenture Global Services Ltd
US6877041B20.406Providing secure access to network servicesGRANT2005-04-051998-03-1321904190GoodOmnesSchlumberger Technology Corp, Comcast Cable Communications LLC
US7249175B10.406Method and system for blocking e-mail having a nonexistent sender addressGRANT2007-07-241999-11-2338266973GoodESCOM CorpESCOM Corp
EP1214824A20.405A SYSTEM  METHOD FOR FIXED FORMAT STREAM COMMUNICATION IN A COMMUNICATION SERVICES PATTERNS ENVIRONMENTGRANT2002-06-191999-08-3123525538GoodAccenture LLPAccenture Global Services Ltd
US6336138B10.403Template-driven approach for generating models on network servicesGRANT2002-01-011998-08-2522489091GoodHewlett Packard CoHP Inc, Keysight Technologies Inc, Hewlett Packard Enterprise Development LP
US20050195743A10.403Real time charging of pre-paid accountsAPPLICATION2005-09-082000-04-0334915469GoodP Cube LtdCisco Systems Israel Ltd
US20020174350A10.401Computer virus screening methods and systemsAPPLICATION2002-11-211998-02-1221809963GoodSBC Properties LPIntellectual Ventures I LLC
US6763380B10.401Methods  systems and computer program products for tracking network device performanceGRANT2004-07-132000-01-0732682640GoodNetIQ CorpNetIQ Corp
US8284774B20.400Ethernet digital storage (EDS) card and satellite transmission systemGRANT2012-10-091998-04-0338444618GoodMegawave Audio LLCRateze Remote Mgmt LLC
US6266707B10.398System and method for IP network address translation and IP filtering with dynamic address resolutionGRANT2001-07-241998-08-1722466767GoodInternational Business Machines CorpInternational Business Machines Corp
US6539396B10.397Multi-object identifier system and method for information service pattern environmentGRANT2003-03-251999-08-3123526729GoodAccenture LLPAccenture Global Services Ltd
US6438591B10.396Entity management systemGRANT2002-08-201988-09-1427583818GoodCompaq Information Technologies Group LPCompaq Information Technologies Group LP
US6571282B10.396Block-based communication in a communication services patterns environmentGRANT2003-05-271999-08-3123531678GoodAccenture LLPAccenture Global Services Ltd
US6842906B10.396System and method for a refreshable proxy pool in a communication services patterns environmentGRANT2005-01-111999-08-3123524748GoodAccenture LLPAccenture Global Services Ltd
US6434568B10.396Information services patterns in a netcentric environmentGRANT2002-08-131999-08-3123528338GoodAccenture LLPAccenture Global Services Ltd
US6496850B10.395Clean-up of orphaned server contextsGRANT2002-12-171999-08-3123525564GoodAccenture LLPAccenture Global Services Ltd
US6715145B10.395Processing pipeline in a base services pattern environmentGRANT2004-03-301999-08-3131993883GoodAccenture LLPAccenture Global Services Ltd
US6615253B10.395Efficient server side data retrieval for execution of client side applicationsGRANT2003-09-021999-08-3127766277GoodAccenture LLPAccenture Global Services Ltd
US6438594B10.395Delivering service to a client via a locally addressable interfaceGRANT2002-08-201999-08-3123528309GoodAccenture LLPAccenture Global Services Ltd
US6615199B10.395Abstraction factory in a base services pattern environmentGRANT2003-09-021999-08-3127766276GoodAccenture LLPAccenture Global Services Ltd
US6578068B10.395Load balancer in environment services patternsGRANT2003-06-101999-08-3123530490GoodAccenture LLPAccenture Global Services Ltd
US6477665B10.395System  method  and article of manufacture for environment services patterns in a netcentic environmentGRANT2002-11-051999-08-3123526737GoodAccenture LLPAccenture Global Services Ltd
US6742015B10.395Base services patterns in a netcentric environmentGRANT2004-05-251999-08-3132312417GoodAccenture LLPAccenture Global Services Ltd
US6636242B20.394View configurer in a presentation services patterns environmentGRANT2003-10-211999-08-3123530511GoodAccenture LLPAccenture Global Services Ltd
US6529909B10.394Method for translating an object attribute converter in an information services patterns environmentGRANT2003-03-041999-08-3123527267GoodAccenture LLPAccenture Global Services Ltd
US6332163B10.394Method for providing communication services over a computer network systemGRANT2001-12-181999-09-0123530770GoodAccenture LLPAccenture Global Services Ltd
US6640249B10.394Presentation services patterns in a netcentric environmentGRANT2003-10-281999-08-3129251260GoodAccenture LLPAccenture Global Services Ltd
US6640238B10.394Activity component in a presentation services patterns environmentGRANT2003-10-281999-08-3129251259GoodAccenture LLPAccenture Global Services Ltd
US6477580B10.394Self-described stream in a communication services patterns environmentGRANT2002-11-051999-08-3123528333GoodAccenture LLPAccenture Global Services Ltd
US6502213B10.394System  method  and article of manufacture for a polymorphic exception handler in environment services patternsGRANT2002-12-311999-08-3123525547GoodAccenture LLPAccenture Global Services Ltd
US6442748B10.394System  method and article of manufacture for a persistent state and persistent object separator in an information services patterns environmentGRANT2002-08-271999-08-3123536049GoodAccenture LLPAccenture Global Services Ltd
US7289964B10.394System and method for transaction services patterns in a netcentric environmentGRANT2007-10-301999-08-3138623425GoodAccenture LLPAccenture Global Services Ltd
US6434628B10.394Common interface for handling exception interface name with additional prefix and suffix for handling exceptions in environment services patternsGRANT2002-08-131999-08-3123525558GoodAccenture LLPAccenture Global Services Ltd
US6640244B10.393Request batcher in a transaction services patterns environmentGRANT2003-10-281999-08-3123530485GoodAccenture LLPAccenture Global Services Ltd
US6339832B10.393Exception response table in environment services patternsGRANT2002-01-151999-08-3123531674GoodAccenture LLPAccenture Global Services Ltd
US6601234B10.393Attribute dictionary in a business logic services environmentGRANT2003-07-291999-08-3127613573GoodAccenture LLPAccenture Global Services Ltd
US6601192B10.393Assertion component in environment services patternsGRANT2003-07-291999-08-3127613572GoodAccenture LLPAccenture Global Services Ltd
US8190513B20.393Method of billing a purchase made over a computer networkGRANT2012-05-291996-06-0540793590GoodFraud Control Systems com CorpFraud Control Systems com Corp
US20040034794A10.393System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damagesAPPLICATION2004-02-192000-05-2831721986Good
US6289382B10.393System  method and article of manufacture for a globally addressable interface in a communication services patterns environmentGRANT2001-09-111999-08-3123528962GoodAndersen Consulting LLPAccenture Global Services Ltd
US6330562B10.392System and method for managing security objectsGRANT2001-12-111999-01-2922903318GoodInternational Business Machines CorpTrend Micro Inc
US6550057B10.392Piecemeal retrieval in an information services patterns environmentGRANT2003-04-151999-08-3123525551GoodAccenture LLPAccenture Global Services Ltd
US6397359B10.392Methods  systems and computer program products for scheduled network performance testingGRANT2002-05-281999-01-1922880689GoodNetIQ CorpNetIQ Corp
US6606660B10.392Stream-based communication in a communication services patterns environmentGRANT2003-08-121999-08-3123526744GoodAccenture LLPAccenture Global Services Ltd
US8117344B20.391Global server for authenticating access to remote servicesGRANT2012-02-141996-12-1336933085GoodVisto CorpGood Technology Holdings Ltd
EP1024627A20.391A method and apparatus for managing a firewallGRANT2000-08-021999-01-2922908532GoodLucent Technologies IncNokia of America Corp
US8229844B20.390Method of billing a purchase made over a computer networkGRANT2012-07-241996-06-0548095431GoodFraud Control Systems com CorpFraud Control Systems com Corp
US6424627B10.390Full-duplex medium tap apparatus and systemGRANT2002-07-231997-02-2425190839GoodMetrobility Optical Systems IncMetrobility Optical Systems Inc, Lancast Inc
US5440723A0.389Automatic immune system for computers and computer networksGRANT1995-08-081993-01-1921712935GoodInternational Business Machines CorpTrend Micro Inc
US7181486B10.389Method and apparatus for remote installation of network drivers and softwareGRANT2007-02-201998-12-0726808782GoodNetwork Ice CorpInternational Business Machines Corp
US20010000457A10.389Method and apparatus for dynamic allocation of transmission bandwidth resources and for transmission of multiple audio signals with a video signalAPPLICATION2001-04-261995-08-1621700802Good
US6484315B10.388Method and system for dynamically distributing updates in a networkGRANT2002-11-191999-02-0122912328GoodCisco Technology IncCisco Technology Inc
US6539394B10.387Method and system for performing interval-based testing of filter rulesGRANT2003-03-252000-01-0423896507GoodInternational Business Machines CorpInternational Business Machines Corp
US6546553B10.386Service installation on a base function and provision of a pass function with a service-free base function semanticGRANT2003-04-081998-10-0227493295GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6550012B10.385Active firewall system and methodologyGRANT2003-04-151998-12-1126809330GoodNetworks Associates IncMcAfee LLC
US5606664A0.385Apparatus and method for automatically determining the topology of a local area networkGRANT1997-02-251990-05-2124097856GoodBay Networks IncNortel Networks NA Inc, Constellation Technologies LLC
US6289017B10.384Method of providing redundancy and load sharing among multiple LECs in an asynchronous mode networkGRANT2001-09-111998-05-2922207229Good3Com CorpHP Inc, Hewlett Packard Development Co LP
US7680879B20.384Method and apparatus for maintaining data integrity across distributed computer systemsGRANT2010-03-161996-07-1836613040GoodComputer Associates Think IncCA Inc
US5881131A0.384Analysis and validation system for provisioning network related facilitiesGRANT1999-03-091993-11-1646253520GoodBell Atlantic Network Services IncVerizon Patent and Licensing Inc
US5889954A0.383Network manager providing advanced interconnection capabilityGRANT1999-03-301996-12-2025090425GoodEricsson IncEricsson Inc
US5751964A0.382System and method for automatic determination of thresholds in network managementGRANT1998-05-121995-09-1224098978GoodInternational Business Machines CorpInternational Business Machines Corp
US5530939A0.381Method and system for broadcasting and querying a database using a multi-function moduleGRANT1996-06-251994-09-2923221312GoodBell Communications Research IncNytell Software LLC
US7093239B10.381Computer immune system and method for detecting unwanted code in a computer systemGRANT2006-08-152000-07-1426912956GoodInternet Security Systems IncPalo Alto Networks Inc
US5809238A0.380Data server with event driven samplingGRANT1998-09-151994-06-2323005925GoodCandle Distributed Solutions IncInternational Business Machines Corp
US7003587B10.379Method and apparatus for maintaining data integrity across distributed computer systemsGRANT2006-02-211996-07-1835810810GoodComputer Associates Think IncCA Inc
US6473794B10.379System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network frameworkGRANT2002-10-291999-05-2723249325GoodAccenture LLPAccenture Global Services Ltd
US20020105955A10.379Ethernet digital storage (EDS) card and satellite transmission system including faxing capabilityAPPLICATION2002-08-081999-04-0326939092GoodSTARGUIDE DIGITAL NETWORKSDG FastChannel Inc
US6915436B10.379System and method to verify availability of a back-up secure tunnelGRANT2005-07-052000-08-0234700268GoodInternational Business Machines CorpTrend Micro Inc
US7539744B20.378Network operating system for maintaining redundant master control blade management informationGRANT2009-05-262000-09-1337895399GoodFortinet IncCisco Technology Inc
US6308276B10.377SS7 firewall systemGRANT2001-10-231999-09-0723546052GoodICom TechnologySevis Systems LLC
US6748446B20.377Communication method and apparatus with modification of routing path by intermediate relay apparatusGRANT2004-06-081996-11-2926569868GoodCanon IncCanon Inc
US6625648B10.376Methods  systems and computer program products for network performance testing through active endpoint pair based testing and passive application monitoringGRANT2003-09-232000-01-0728042184GoodNetIQ CorpNetIQ Corp
US7660983B10.373Method and apparatus for creating a secure communication channel among multiple event service nodesGRANT2010-02-091999-09-2935998924GoodCisco Technology IncCisco Technology Inc
US5097469A0.373Passive monitor for broadcast communication networkGRANT1992-03-171989-05-1926998351GoodConcord Communications LLCCA Inc
US6442696B10.370System and method for extensible positive client identificationGRANT2002-08-271999-10-0523632215GoodAuthoriszor IncAuthoriszor Inc
US7725558B20.370Distributive access controllerGRANT2010-05-252000-07-2622825289GoodSecureeden LLCSecureeden LLC
US6351811B10.370Systems and methods for preventing transmission of compromised data in a computer networkGRANT2002-02-261999-04-2223148879GoodAdapt Network Security LLCAdapt Network Security LLC
US5983350A0.369Secure firewall supporting different levels of authentication based on address or encryption statusGRANT1999-11-091996-09-1824873650GoodSecure Computing LLCMcAfee LLC
US6292844B10.369Media storage device with embedded data filter for dynamically processing data during read and write operationsGRANT2001-09-181998-02-1221812139GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US5734824A0.367Apparatus and method for discovering a topology for local area networks connected via transparent bridgesGRANT1998-03-311993-02-1021775773GoodBay Networks IncAvaya Holdings Ltd, Nortel Networks NA Inc
US5937165A0.367Systems  methods and computer program products for applications traffic based communications network performance testingGRANT1999-08-101996-09-1024857325GoodGanymede Software IncIxia
US20050021613A10.365Method and apparatus for content protection in a secure content delivery systemAPPLICATION2005-01-271998-11-1632684475GoodSoftricity IncMicrosoft Technology Licensing LLC
US6697338B10.365Determination of physical topology of a communication networkGRANT2004-02-241999-10-2831496055GoodLucent Technologies IncNokia of America Corp
US20010005889A10.363Remote computer virus scanningAPPLICATION2001-06-281999-12-2410867020GoodF Secure OyjWITHSECURE CORPORATION (A/K/A WITHSECURE OYJ)
US7693941B20.363Method and apparatus for predictively and graphically administering a networked system in a time dimensionGRANT2010-04-061996-07-1837901439Good
US8255439B20.363Desk-top  stream-based  information management systemGRANT2012-08-281996-06-2824701909GoodMirror Worlds LLCMIRROR WORLDS TECHNOLOGIES LLC
US6338141B10.362Method and apparatus for computer virus detection  analysis  and removal in real timeGRANT2002-01-081998-09-3022589140GoodCybersoft IncJATCO Corp, Cybersoft Inc
US5958012A0.361Network management system using virtual reality techniques to display and simulate navigation to network componentsGRANT1999-09-281996-07-1826695335GoodComputer Associates International IncCA Inc
US5892937A0.361Real-time data cache flushing threshold adjustment in a server computerGRANT1999-04-061993-06-0422108734GoodDigital Equipment CorpHewlett Packard Development Co LP
US7861084B20.361Authentication of data transmitted in a digital transmission systemGRANT2010-12-282000-04-038173630GoodThomson Licensing SASInterDigital CE Patent Holdings SAS
US6469987B10.360Virtual local area network with trunk stationsGRANT2002-10-221998-01-1321719973GoodEnterasys Networks IncExtreme Networks Inc
US6233637B10.359Isochronous data pipe for managing and manipulating a high-speed stream of isochronous data flowing between an application and a bus structureGRANT2001-05-151996-03-0724452679GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US20110119366A10.359GRAPHICAL USER INTERFACE AND METHOD FOR CUSTOMER CENTRIC NETWORK MANAGEMENTAPPLICATION2011-05-192000-03-3137450023GoodVerizon Laboratories IncVerizon Patent and Licensing Inc
WO2001033759A10.359METHOD OF SHARING PROPRIETARY INFORMATIONAPPLICATION2001-05-101999-11-0322589052Good
US6038570A0.359Method for allocating files in a file system integrated with a RAID disk sub-systemGRANT2000-03-141993-06-0322102622GoodNetwork Appliance IncNetApp Inc
US6577920B10.357Computer virus screeningGRANT2003-06-101998-10-0222598238GoodData Fellows OyjWithSecure Oyj
US6094678A0.357Remote control of wireless telecommunications systemsGRANT2000-07-251995-06-0226307150GoodAirspan Communications CorpMonument Bank Of Intellectual Property LLC, Airspan Networks Holdings Inc
US20050120242A10.357System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damagesAPPLICATION2005-06-022000-05-2834624183Good
US20080215742A10.356METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING RESOURCES ASSIGNED TO PLURALITY OF CUSTOMERS  FOR MEETING SERVICE LEVEL AGREEMENTS (SLAs) WITH MINIMAL RESOURCES  AND ALLOWING COMMON POOLS OF RESOURCES TO BE USED ACROSS PLURAL CUSTOMERS ON A DEMAND BASISAPPLICATION2008-09-042000-04-2836462783GoodInternational Business Machines CorpInternational Business Machines Corp
US5329623A0.356Apparatus for providing cryptographic support in a networkGRANT1994-07-121992-06-1725412059GoodUniversity of Pennsylvania PennUniversity of Pennsylvania Penn
US6088803A0.353System for virus-checking network data during download to a client deviceGRANT2000-07-111997-12-3021692997GoodIntel CorpIntel Corp
US6012087A0.351Unique-change detection of dynamic web pages using history tables of signaturesGRANT2000-01-041997-01-1446254916GoodNetMind Technologies IncIntellisync LLC
US6243783B10.351Application programming interface for managing and automating data transfer operations between applications over a bus structureGRANT2001-06-051996-02-0224379801GoodSony Corp, Sony Electronics Inc, Apple Computer IncSony Corp, Apple Inc, Sony Electronics Inc
US6643776B10.350System and method for dynamic macro placement of IP connection filtersGRANT2003-11-041999-01-2922907670GoodInternational Business Machines CorpTrend Micro Inc
US5555346A0.350Event-driven rule-based messaging systemGRANT1996-09-101991-10-0426682280GoodBeyond IncUnisys Corp, Banyan Systems Inc
US6493756B10.349System and method for dynamically sensing an asynchronous network event within a modular framework for network event processingGRANT2002-12-101999-10-2826858326GoodNetworks Associates IncMcAfee LLC
US20050027845A10.349Method and system for event impact analysisAPPLICATION2005-02-032000-01-0331188787GoodInternational Business Machines CorpInternational Business Machines Corp
US7620980B10.349Secure data brokerGRANT2009-11-171999-07-2123406770GoodSun Microsystems IncOracle America Inc
US6021331A0.344Control system for a telecommunications systemGRANT2000-02-011996-02-2226308790GoodAlcatel USA Sourcing IncMonument Bank Of Intellectual Property LLC
US5948063A0.344Control system for a telecommunications systemGRANT1999-09-071996-02-2226308789GoodAlcatel USA Sourcing IncMonument Bank Of Intellectual Property LLC
US6631435B10.341Application programming interface for data transfer and bus management over a bus structureGRANT2003-10-071996-02-0228678875GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US6519638B10.341Object-oriented framework for the generic collection of system dataGRANT2003-02-111999-06-0123258571GoodInternational Business Machines CorpInternational Business Machines Corp
US7162649B10.341Method and apparatus for network assessment and authenticationGRANT2007-01-092000-06-3024431992GoodInternet Security Systems IncInternational Business Machines Corp
US7930340B20.341Network transaction portal to control multi-service provider transactionsGRANT2011-04-191995-11-1327555543GoodWebXchange IncWebXchange Inc
US6009467A0.341System for checking status of supported functions of communication platforms at preselected intervals in order to allow hosts to obtain updated list of all supported functionsGRANT1999-12-281997-08-2925445438GoodInternational Business Machines CorpInternational Business Machines Corp
US10361802B10.340Adaptive pattern recognition based control system and methodGRANT2019-07-231999-02-0167300558GoodBlanding Hovenweep LLCSTEVEN M HOFFBERG 2004-1 GRAT, Blanding Hovenweep LLC
US7702508B20.339System and method for natural language processing of query answersGRANT2010-04-201999-11-1246299868GoodPhoenix Solutions IncNuance Communications Inc
US5819292A0.338Method for maintaining consistent states of a file system and for creating user-accessible read-only copies of a file systemGRANT1998-10-061993-06-0322102650GoodNetwork Appliance IncNetApp Inc
US5664105A0.338Method and apparatus for network analysisGRANT1997-09-021994-10-0423235065GoodFluke CorpFluke Corp
US6907531B10.336Method and system for identifying  fixing  and updating security vulnerabilitiesGRANT2005-06-142000-06-3034633059GoodInternet Security Systems IncFinjan Blue Inc
US20030018771A10.335Method and apparatus for generating and recognizing speech as a user interface element in systems and network managementAPPLICATION2003-01-231997-07-1527501063GoodComputer Associates Think IncCA Inc
US6158010A0.335System and method for maintaining security in a distributed computer networkGRANT2000-12-051998-10-2826803151GoodCrossLogix IncOracle International Corp
US7113988B20.333Proactive on-line diagnostics in a manageable networkGRANT2006-09-262000-06-2926909557GoodInternational Business Machines CorpLinkedIn Corp
US6385724B10.333Automatic object caller chain with declarative impersonation and transitive trustGRANT2002-05-071998-11-3022745201GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP1126660A10.331Method for transmitting a message  and a gatewayGRANT2001-08-222000-02-158167855GoodSiemens AGSiemens AG
US5508941A0.331Network with surveillance sensors and diagnostic system  and method of establishing diagnostics for the networkGRANT1996-04-161991-12-209420344GoodAlcatel NVAlcatel Lucent NV
US20050081059A10.331Method and system for e-mail filteringAPPLICATION2005-04-141997-07-2446302504GoodAxway IncAxway Inc
US6047323A0.330Creation and migration of distributed streams in clusters of networked computersGRANT2000-04-041995-10-1946202931GoodHewlett Packard CoHewlett Packard Development Co LP
US6424872B10.329Block oriented control systemGRANT2002-07-231996-08-2326698347GoodFieldbus FoundationFieldcomm Group Inc
US7055027B10.329System and method for trusted inspection of a data streamGRANT2006-05-301999-03-2236462794GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6628623B10.329Methods and systems for determining switch connection topology on ethernet LANsGRANT2003-09-301999-05-2428454511Good3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US8037158B20.328Multimedia transactional servicesGRANT2011-10-111995-11-1346329609GoodWebXchange IncARUNACHALAM LAKSHMI DR
US20030088663A10.327Method and apparatus for predictively and graphically administering a network system in a time dimensionAPPLICATION2003-05-081996-07-1826829054Good
US6493755B10.326Automatic notification rule definition for a network management systemGRANT2002-12-101999-01-1522868407GoodCompaq Information Technologies Group LPHewlett Packard Development Co LP
US6487665B10.325Object security boundariesGRANT2002-11-261998-11-3022744318GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5821937A0.324Computer method for updating a network designGRANT1998-10-131996-02-2327085223GoodNetSuite Development LPVisionael Corp
US5465251A0.323Network addressingGRANT1995-11-071992-06-2310717536GoodInternational Business Machines CorpInternational Business Machines Corp
US8271339B20.322Method and apparatus for enabling real-time bi-directional transactions on a networkGRANT2012-09-181995-11-1344188637GoodARUNACHALAM LAKSHMI DRARUNACHALAM LAKSHMI DR
US7107614B10.321System and method for network address translation integration with IP securityGRANT2006-09-121999-01-2936951987GoodInternational Business Machines CorpTrend Micro Inc
US6615357B10.321System and method for network address translation integration with IP securityGRANT2003-09-021999-01-2922907677GoodInternational Business Machines CorpInternational Business Machines Corp
US6108702A0.319Method and apparatus for determining accurate topology features of a networkGRANT2000-08-221998-12-0222757687GoodMicromuse IncInternational Business Machines Corp
US6189032B10.319Client-server system for controlling access rights to certain services by a user of a client terminalGRANT2001-02-131997-02-2712672129GoodHitachi LtdHitachi Ltd
US5999944A0.318Method and apparatus for implementing dynamic VRMLGRANT1999-12-071998-02-2721863095GoodOracle CorpOracle International Corp
US6272641B10.317Computer network malicious code scanner method and apparatusGRANT2001-08-071997-09-1025453461GoodTrend Micro IncTrend Micro Inc
US7363650B20.317System and method for incrementally distributing a security policy in a computer networkGRANT2008-04-221998-10-2841717768GoodBEA Systems IncOracle International Corp
US20020059425A10.316Distributed computing services platformAPPLICATION2002-05-162000-06-2226908190GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7478422B20.315Declarative language for specifying a security policyGRANT2009-01-132000-01-0723905396GoodSecure Computing LLCMcAfee LLC
US5850397A0.315Method for determining the topology of a mixed-media networkGRANT1998-12-151996-04-1024526960GoodBay Networks IncRPX Clearinghouse LLC
US5737319A0.313Dynamic network topology determinationGRANT1998-04-071996-04-1524534506GoodMCI CorpMCI Corp, Verizon Patent and Licensing Inc
US6317844B10.312File server storage arrangementGRANT2001-11-131998-03-1021895532GoodNetwork Appliance IncNetApp Inc
US6799195B10.312Method and apparatus for remote process control using appletsGRANT2004-09-281996-08-2024812561GoodInvensys Systems IncSchneider Electric Systems USA Inc
US7590688B20.312Method and system for conducting a plurality of cyber-based conventionsGRANT2009-09-151998-12-3026811848GoodSoftware Management IncD&P VENTURES Inc
US7296274B20.309Method and apparatus providing deception and/or altered execution of logic in an information systemGRANT2007-11-131999-11-1532871701GoodSandia National LaboratoriesNational Technology and Engineering Solutions of Sandia LLC
US7606861B20.308Medical network system and method for transfer of informationGRANT2009-10-201998-11-2522738285GoodNexsys Electronics IncNexsys Electronics Inc
US5185860A0.305AUTOMATIC DISCOVERY OF NETWORK ELEMENTSGRANT1993-02-091990-05-0324067244GoodHewlett Packard CoHP Inc
US7066382B20.305Method and apparatus for transferring or receiving data via the Internet securelyGRANT2006-06-272000-04-1727255674Good
US5432789A0.305Use of a single central transmit and receive mechanism for automatic topology determination of multiple networksGRANT1995-07-111994-05-0322892029GoodSynOptics Communications IncAvaya Holdings Ltd, Nortel Networks Group Inc
US8700696B20.305Method and system for conducting a plurality of cyber-based conventionsGRANT2014-04-151998-12-3039304228GoodD&P VENTURES IncD&P VENTURES Inc, Individual
US7770225B20.304Method and apparatus for auditing network securityGRANT2010-08-031999-07-2939182371GoodInternational Business Machines CorpFinjan Blue Inc
US6112181A0.304Systems and methods for matching  selecting  narrowcasting  and/or classifying based on rights management and/or other informationGRANT2000-08-291997-11-0625509597GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6636898B10.303System and method for central management of connections in a virtual private networkGRANT2003-10-211999-01-2928791692GoodInternational Business Machines CorpTrend Micro Inc
US6604118B20.301File system image transferGRANT2003-08-051998-07-3122430453GoodNetwork Appliance IncNetApp Inc
US6788980B10.300Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP networkGRANT2004-09-071999-06-1132931546GoodInvensys Systems IncSchneider Electric Systems USA Inc, Schneider Electric USA Inc
US6094677A0.300Methods  systems and computer program products for providing insertions during delays in interactive systemsGRANT2000-07-251997-05-3025348091GoodInternational Business Machines CorpGoogle LLC
US6574736B10.300Composable rolesGRANT2003-06-031998-11-3022744324GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6938021B20.299Methods for matching  selecting  narrowcasting  and/or classifying based on rights management and/or other informationGRANT2005-08-301997-11-0627052814GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5710885A0.296Network management system with improved node discovery and monitoringGRANT1998-01-201995-11-2824257529GoodNCR CorpRPX Corp
US5371852A0.296Method and apparatus for making a cluster of computers appear as a single host on a networkGRANT1994-12-061992-10-1425503557GoodInternational Business Machines CorpInternational Business Machines Corp
US5909493A0.295Method and system for diagnosis and control of machines using connectionless modes of communicationGRANT1999-06-011996-10-1624946372GoodRicoh Co Ltd, Ricoh Americas CorpRicoh Co Ltd, Ricoh Americas Corp
US20070033279A10.295Method and apparatus for intuitively administering networked computer systemsAPPLICATION2007-02-081996-07-1837718820GoodComputer Associates International IncCA Inc
US7162738B20.295E-mail firewall with stored key encryption/decryptionGRANT2007-01-091998-11-0322660234GoodTumbleweed Communications CorpTumbleweed Communications Corp
US20030033402A10.294METHOD AND APPARATUS FOR INTUITIVELY ADMINISTERING NETWORKED COMPUTER SYSTEMSAPPLICATION2003-02-131996-07-1824174568Good
US7107322B10.293Master operating software systemGRANT2006-09-121998-10-0136951932GoodAutomated Business Co IncAutomated Business Co Inc
US6167471A0.292Method of and apparatus for dispatching a processing element to a program location based on channel number of received dataGRANT2000-12-261998-10-1422630055GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US5684959A0.292Method for determining topology of a networkGRANT1997-11-041995-04-1923688665GoodHewlett Packard CoAgilent Technologies Inc
US6832256B10.292Firewalls that filter based upon protocol commandsGRANT2004-12-141996-12-2733491067GoodIntel CorpIntel Corp
US6944681B10.290Probing algorithm for foundation fieldbus protocolGRANT2005-09-132000-09-0824641939GoodFisher Rosemount Systems IncFisher Rosemount Systems Inc
US7127741B20.288Method and system for e-mail message transmissionGRANT2006-10-241998-11-0325390892GoodTumbleweed Communications CorpAxway Inc
US6108799A0.284Automated sample creation of polymorphic and non-polymorphic marcro virusesGRANT2000-08-221997-11-2126718198GoodInternational Business Machines CorpTrend Micro Inc
US7080407B10.282Virus detection and removal system and method for network-based systemsGRANT2006-07-182000-06-2736659283GoodCisco Technology IncCisco Technology Inc
US5729685A0.282Apparatus for determining the topology of an ATM network or the like Via communication of topology information between a central manager and switches in the network over a virtual service pathGRANT1998-03-171993-06-2922198531GoodBay Networks IncNortel Networks NA Inc, RPX Clearinghouse LLC
US5872973A0.281Method for managing dynamic relations between objects in dynamic object-oriented languagesGRANT1999-02-161995-10-2624189272GoodViewSoft IncViewSoft Inc
US5732086A0.279System and method for determining the topology of a reconfigurable multi-nodal networkGRANT1998-03-241995-09-2124118788GoodInternational Business Machines CorpInternational Business Machines Corp
US6173406B10.279Authentication systems  methods  and computer program productsGRANT2001-01-091997-07-1525404224GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6993448B20.277System  method and medium for certifying and accrediting requirements complianceGRANT2006-01-312000-08-0925237184GoodTelos CorpTelos Corp
US6931446B10.276Methods  systems and computer program products for policy based network control of characteristics of user sessionsGRANT2005-08-161998-12-1434825700GoodInternational Business Machines CorpInternational Business Machines Corp
US6993646B20.274Automatically configuring storage array including plurality of media storage devices for storing and providing data within a network of devicesGRANT2006-01-311999-05-1223204471GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US6925572B10.267Firewall with two-phase filteringGRANT2005-08-022000-02-2828455014GoodMicrosoft CorpPirelli Tyre SpA, Microsoft Technology Licensing LLC
US5490249A0.265Automated testing systemGRANT1996-02-061992-12-2325542454GoodTaligent IncApple Inc
US7711714B20.265Method and a device for sterilizing downloaded filesGRANT2010-05-041998-09-2237619415GoodHitachi LtdHitachi Ltd
US6229804B10.261Gatekeeper election methods for internet telephonyGRANT2001-05-081998-11-1722714626Good3Com CorpUTStarcom Inc
US6721859B10.261Multi-protocol media storage device implementing protocols optimized for storing and retrieving both asynchronous and isochronous dataGRANT2004-04-131999-10-2123676767GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US6859846B20.260Method of distributed recording whereby the need to transition to a second recording device from a first recording device is broadcast by the first recording deviceGRANT2005-02-221999-05-1226977628GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US6357008B10.258Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phasesGRANT2002-03-121997-09-2325467378GoodSymantec CorpNortonLifeLock Inc
US6179489B10.254Devices  methods  systems and software products for coordination of computer main microprocessor and second microprocessor coupled theretoGRANT2001-01-301997-04-0425263918GoodTexas Instruments IncTexas Instruments Inc
US5602998A0.253Dequeue instruction in a system architecture for improved message passing and process synchronizationGRANT1997-02-111994-12-2223426918GoodUnisys CorpUnisys Corp
US7154975B10.251Receiving apparatus and synchronizing method for a digital telecommunication systemGRANT2006-12-261999-02-248237628GoodSony Deutschland GmbHRedwood Technologies LLC
US6112192A0.250Method for providing individually customized content in a networkGRANT2000-08-291997-05-0925318095GoodInternational Business Machines CorpeBay Inc
US6609196B10.250E-mail firewall with stored key encryption/decryptionGRANT2003-08-191997-07-2421985777GoodTumbleweed Communications CorpWORLKTALK Corp, Axway Inc
US5339403A0.246Access control in a distributed computer systemGRANT1994-08-161990-05-1110675829GoodFujitsu Services LtdFujitsu Services Ltd
US6223292B10.245Authorization systems  methods  and computer program productsGRANT2001-04-241997-07-1525401350GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7342581B20.245Method and apparatus for displaying 3-D state indicatorsGRANT2008-03-111996-07-1838179482GoodComputer Associates Think IncCA Inc
US6457130B20.239File access control in a multi-protocol file serverGRANT2002-09-241998-03-0321881453GoodNetwork Appliance IncNetApp Inc
US5361385A0.233Parallel computing system for volumetric modeling  data processing and visualizationGRANT1994-11-011992-08-2625468282GoodHR Asset Holdings IncAPLICATEK HI-PERFORMANCE APPLICATIONS Ltd, Tamiras Per Pte Ltd LLC
US6473800B10.232Declarative permission requests in a computer systemGRANT2002-10-291998-07-1522367877GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6442686B10.232System and methodology for messaging server-based management and enforcement of crypto policiesGRANT2002-08-271998-07-0227376945GoodNetworks Associates Technology IncMcAfee LLC, CA Inc, Pretty Good Privacy Inc
US6121816A0.231Slave clock generation system and method for synchronous telecommunications networksGRANT2000-09-191999-04-2323150357GoodSemtech CorpSemtech Corp
US6321334B10.230Administering permissions associated with a security zone in a computer system security modelGRANT2001-11-201998-07-1522367628GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6772417B10.228Method for processing receiving message of monitor terminal in communication operating systemGRANT2004-08-031999-09-1019611093GoodLG Electronics IncEricsson LG Co Ltd
US6971097B10.228Method and apparatus for implementing concurrently running jobs on an extended virtual machine using different heaps managersGRANT2005-11-292000-06-0924365362GoodSun Microsystems IncOracle America Inc
US8209373B20.227Computers or microchips with a hardware side protected by a primary internal hardware firewall and an unprotected hardware side connected to a network  and with multiple internal hardware compartments protected by multiple secondary inner hardware firewallsGRANT2012-06-261996-11-2946278059Good
US5978475A0.227Event auditing systemGRANT1999-11-021997-07-1825406836GoodCounterpane Internet Security IncBT Americas Inc
US8561164B20.225Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a networkGRANT2013-10-151996-11-2932074875Good
US20020188887A10.224Computer with switchable componentsAPPLICATION2002-12-122000-05-1927394807GoodSelf Repairing Computers IncSelf Repairing Computers Inc
US5031178A0.223Apparatus and method for ground isolated system diagnosticsGRANT1991-07-091988-10-1222973580GoodTrane US IncTrane International Inc, JPMorgan Chase Bank NA
US8739195B20.222Microchips with an internal hardware firewall protected portion and a network portion with microprocessors which execute shared processing operations with the networkGRANT2014-05-271996-11-2936263355Good
US8225003B20.222Computers and microchips with a portion protected by an internal hardware firewallGRANT2012-07-171996-11-2936780062Good
US20020099817A10.222Managing interactions between computer users' context modelsAPPLICATION2002-07-251998-12-1833033286GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8726303B20.222Microchips with an internal hardware firewall that by its location leaves unprotected microprocessors or processing units which performs processing with a networkGRANT2014-05-131996-11-2936318275GoodIndividualIndividual
US5946487A0.222Object-oriented multi-media architectureGRANT1999-08-311996-06-1024652550GoodLSI Logic CorpAvago Technologies International Sales Pte Ltd, EMC Corp
US5657473A0.221Method and apparatus for controlling access to and corruption of information in computer systemsGRANT1997-08-121990-02-2110671370GoodArendee LtdGula Consulting LLC
US7385716B10.220Authoring tool for bayesian network troubleshootersGRANT2008-06-101999-09-0223535964GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8732230B20.220Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a networkGRANT2014-05-201996-11-2941506110Good
US8291485B20.220Computers and microchips with a faraday cage  a side protected by an internal hardware firewall and an unprotected side connected to the internet for network operations  and with internal hardware compartmentsGRANT2012-10-161996-11-2946301025Good
US8312529B20.220Global network computersGRANT2012-11-131996-11-2940296554Good
US8332924B20.220Microchips with multiple internal hardware-based firewalls and diesGRANT2012-12-111996-11-2946301663Good
US6366912B10.217Network security zonesGRANT2002-04-021998-04-0622000053GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6041363A0.217Imbedding virtual device driver (VxD) calls in a dynamic link library (DLL)GRANT2000-03-211996-03-2924495905GoodSun Microsystems IncSun Microsystems Inc
US5491691A0.217Method and apparatus for pacing asynchronous transfer mode (ATM) data cell transmissionGRANT1996-02-131994-08-1623119424GoodMotorola IncApple Inc
US6249863B10.217Host device equipped with means for starting a process in response to detecting insertion of a storage mediaGRANT2001-06-191994-07-0123027483GoodTV Interactive Data CorpTV Interactive Data Corp
US6636838B10.214Content screening with end-to-end encryptionGRANT2003-10-212000-02-2324035332GoodSun Microsystems IncOracle America Inc
US6345361B10.213Directional set operations for permission based security in a computer systemGRANT2002-02-051998-04-0626764015GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6560705B10.210Content screening with end-to-end encryption prior to reaching a destinationGRANT2003-05-062000-02-2324035326GoodSun Microsystems IncOracle America Inc
US6539101B10.209Method for identity verificationGRANT2003-03-251998-04-0727582595GoodPen One IncUnited States Cp LLC
US6278730B10.208Non-invasive digital cable test systemGRANT2001-08-211995-04-2727028825GoodWavetek Wandel Goltermann LLCDiebold Nixdorf Inc, Acterna LLC
US7961917B20.205Method for identity verificationGRANT2011-06-141999-02-1034865593GoodPEN-ONE IncUnited States Cp LLC
US6546486B10.201Content screening with end-to-end encryption within a firewallGRANT2003-04-082000-02-2324032691GoodSun Microsystems IncOracle America Inc
US7191335B10.200Method and apparatus for encrypted transmissionGRANT2007-03-131999-02-048241870GoodNagra Thomson LicensingNagra France SAS
US20080168535A10.200SYSTEMS AND METHODS FOR SITE ACCESSAPPLICATION2008-07-101997-12-0125528974GoodNetselector IncNetselector Inc
US20010047326A10.195Interface system for a mortgage loan originator compliance engineAPPLICATION2001-11-292000-03-1425190281GoodEVERBANK, OnepipelinecomALLICANCE MORTGAGE Co
US6012081A0.192Service and event synchronous/asynchronous managerGRANT2000-01-041996-07-0324711279GoodSiemens AGSiemens Healthcare GmbH
US20010042214A10.191Apparatus and methods for intercepting  examining and controlling code  data and files and their transferAPPLICATION2001-11-151999-02-0346257577GoodCybersoft IncCybersoft Inc
US6523108B10.183Method of and apparatus for extracting a string of bits from a binary bit string and depositing a string of bits onto a binary bit stringGRANT2003-02-181999-11-2323780833GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US6067575A0.176System and method for generating trusted  architecture specific  compiled versions of architecture neutral programsGRANT2000-05-231995-12-0824275282GoodSun Microsystems IncOracle America Inc
US5440749A0.169High performance  low cost microprocessor architectureGRANT1995-08-081989-08-0323537828GoodNanotronics CorpMOORE CHARLES H TTE UTD 03/21/2006 EQUINOX TRUST, Patriot Scientific Corp, Technology Properties Ltd
US5581788A0.156System for testing the functionality of video cord and monitor by using program to enable user to view list of modes and select compatible modeGRANT1996-12-031992-12-1425536734GoodAT&T Global Information Solutions Co, Hyundai Electronics America Inc, Symbios Logic IncTaiwan Semiconductor Manufacturing Co TSMC Ltd, NCR Corp, LSI Logic FSI Corp
US5241599A0.146CRYPTOGRAPHIC PROTOCOL FOR SECURE COMMUNICATIONSGRANT1993-08-311991-10-0225087362GoodAT&T Bell Laboratories IncNokia Bell Labs, AT&T Corp
US20030051162A10.130Data line interrupter switchAPPLICATION2003-03-132000-06-094166370GoodSAAFNET CANADA IncSAAFNET CANADA Inc
KR100846530B1NRMETHOD AND APPARATUS FOR PROVIDING COMPUTER SERVICESGRANT2008-07-152000-07-0522806682Good
KR100432553B1NRNo titleGRANT2004-05-242000-09-0824640678Good
KR100403737B1NRNo titleGRANT2003-11-011999-12-3023888320Good
KR100383609B1NRNo titleGRANT2003-05-161999-12-3023889043Good
FR2787267A1NRNo titleGRANT2000-06-161998-12-149533939GoodFrance Telecom SAOrange SA
US7720821B10.547Method of and apparatus for writing and reading time sensitive data within a storage deviceGRANT2010-05-182000-06-3024437278FairSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US6507804B10.398Apparatus and method for compressing measurement data corelative to machine statusGRANT2003-01-141997-10-1424002921FairBently Nevada IncBently Nevada Inc
US6285966B10.382Function block apparatus for viewing data in a process control systemGRANT2001-09-041998-06-2522305224FairFisher Controls International LLCFisher Controls International LLC
US6832367B10.367Method and system for recording and replaying the execution of distributed java programsGRANT2004-12-142000-03-0633490792FairInternational Business Machines CorpInternational Business Machines Corp
US5193178A0.353Self-testing probe system to reveal software errorsGRANT1993-03-091990-10-3124428848FairInternational Business Machines CorpInternational Business Machines Corp
US20020177914A10.314Audio distribution and production systemAPPLICATION2002-11-281995-09-0126671412Fair
US4967381A0.306Process control interface system for managing measurement dataGRANT1990-10-301985-04-3027367869FairPrometrix CorpTencor Instruments Inc
EP0691546B10.305Time-domain reflectometer for testing coaxial cablesGRANT2002-08-281994-07-0823040863FairFluke CorpFluke Corp
US20020161536A10.269Internet ready  energy meter business methodsAPPLICATION2002-10-312000-04-2524229360FairENERGY INFORMATION TECHNOLOGIES IncENERGY INFORMATION TECHNOLOGIES Inc
US6847737B10.268Methods for performing DAF data filtering and paddingGRANT2005-01-251998-03-1332072679FairIowa State University Research Foundation ISURF, University of Houston SystemIowa State University Research Foundation ISURF, University of Houston System
WO2001084746A10.260METHOD AND ARRANGEMENT FOR MEASURING THE OPTICAL SIGNAL QUALITY IN A FIBER NETWORK USING OPTICAL CROSS-CONNECTORSAPPLICATION2001-11-082000-04-2820279486Fair
US6892109B20.256Remote maintenance systemGRANT2005-05-101996-07-3127322825FairCanon IncCanon Inc
US20020169952A10.244Method and apparatus for securing e-mail attachmentsAPPLICATION2002-11-141999-06-2123318426FairITUS CorpENCRYPTED CELLULAR COMMUNICATIONS Corp
US5088033A0.239Data processing system emulation in a window with a coprocessor and I/O emulationGRANT1992-02-111986-04-2827053069FairXerox CorpXerox Corp
US6222547B10.234Monitoring and analysis of data in cyberspaceGRANT2001-04-241997-02-0725171760FairCalifornia Institute of Technology CalTechCalifornia Institute of Technology CalTech
US5978917A0.216Detection and elimination of macro virusesGRANT1999-11-021997-08-1425430047FairSymantec CorpNortonLifeLock Inc
US5247693A0.211Computer language structure for process control applications and method of translating same into program code to operate the computerGRANT1993-09-211985-10-0827496632FairFoxboro CoSchneider Electric Systems USA Inc
US4736320A0.210Computer language structure for process control applications  and translator thereforGRANT1988-04-051985-10-0825135921FairFoxboro CoSchneider Electric Systems USA Inc
US7609862B20.205Method for identity verificationGRANT2009-10-272000-01-2437035211FairPen One IncUnited States Cp LLC
US4315315A0.204Graphical automatic programmingGRANT1982-02-091971-03-0922403027FairJohns Hopkins UniversityJohns Hopkins University
US6611617B10.192Scanning apparatus and methodGRANT2003-08-261995-07-2610778272Fair3D Scanners Ltd3D Scanners Ltd
US20010001849A10.189METHOD AND APPARATUS FOR AUTOMATICALLY ACQUIRING A WAVEFORM MEASUREMENTAPPLICATION2001-05-241998-11-0222675570FairAgilent Technologies IncAgilent Technologies Inc
US5870692A0.170Effluent monitoring systemGRANT1999-02-091997-01-1025678976FairSystemes Integres ABDMF IncSystemes Integres ABDMF Inc
US6637026B10.161Instruction reducing predicate copyGRANT2003-10-212000-03-0128792234FairIntel CorpIntel Corp
US6700958B20.159Method and apparatus for transmitting coded audio signals through a transmission channel with limited bandwidthGRANT2004-03-021995-04-1027024385FairStarGuide Digital Networks IncRateze Remote Mgmt LLC
US6119175A0.149On-chip communication circuit and protocol for microcontroller-based ASICsGRANT2000-09-121996-03-2224488402FairGeneral Electric CoGeneral Electric Co
US4292580A0.145Circuit arrangement for attenuation of power oscillations in networksGRANT1981-09-291978-11-306055994FairSiemens AGSiemens AG
US5892348A0.133Matrix interpolationGRANT1999-04-061996-06-2710796017FairNidec SR Drives LtdNidec SR Drives Ltd
US5678059A0.125Technique for time-sharing a microprocessor between a computer and a modemGRANT1997-10-141994-02-1822734623FairLucent Technologies IncAvago Technologies International Sales Pte Ltd, AT&T Corp
US6120676A0.098Method of using a small volume in vitro analyte sensorGRANT2000-09-191997-02-0625166388FairTherasense IncTherasense Inc
EP0543577A20.091Local loss test set for optical fibreGRANT1993-05-261991-11-1925161621FairMinnesota Mining and Manufacturing Co3M Co
US6343984B10.077Laminar flow duct cooling systemGRANT2002-02-051998-11-3022753025FairNetwork Appliance IncNetApp Inc
US4666426A0.066Double lumen catheter for a device for in-vivo purification of bloodGRANT1987-05-191984-01-126224802Fair
US5798772A0.065Driving method ink jet headGRANT1998-08-251990-06-1515645677FairCanon IncCanon Inc
US20020018903A10.054Anti-thrombogenic material and manufacturing method thereforAPPLICATION2002-02-142000-07-2118715444FairMiwatec Co LtdMiwatec Co Ltd
US6823697B20.041Press forming machine for optical devicesGRANT2004-11-302000-06-2718691918FairToshiba Machine Co LtdShibaura Machine Co Ltd
US5876240A0.040Stacked electrical connector with visual indicatorsGRANT1999-03-021997-04-0125255904FairWhitaker LLCTyco Electronics Service GmbH

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityAVERAGE
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
1,041
Recommended Classes
261
Government Assigned Classes
3
CPC
Title
Score
H04L63/1416Event detection  e.g. attack signature detection2.906
H04L63/0272Virtual private networks1.358
H04L63/0254Stateful filtering1.311
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/212)1.297
H04L63/1458Denial of Service1.247
H04L63/0263Rule management1.236
H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation | means for verifying the identity or the authority of a user of a secure or secret communication system | (ref: H04L9/32)1.220
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks1.218
H04L63/1425Traffic logging  e.g. anomaly detection1.213
G06F21/552involving long-term monitoring or reporting1.213
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)1.213
H04L41/0631using root cause analysis| using analysis of correlation between notifications  alarms or events based on decision criteria  e.g. hierarchy  tree or time analysis1.207
G06N3/0472using probabilistic elements  e.g. p-rams  stochastic processors1.200
H04L43/026using flow identification1.192
H04L41/12Discovery or management of network topologies1.188
H04L43/045for graphical visualisation of monitoring data1.188
H04L12/18for broadcast or conference |   e.g. multicast1.188
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.165
H04L43/04Processing captured monitoring data  e.g. for logfile generation1.165
H04L63/1433Vulnerability analysis1.163
H04L41/50Network service management  e.g. ensuring pro| per se| rvice fulfilment according to agreements1.155
H04L43/06Generation of reports1.154
H04L12/28characterised by path configuration  e.g. LAN [Local Area Networks] or WAN [Wide Area Networks] | wireless communication networks | (ref: H04W)|  | | arrangements for dividing the transmission path | (ref: H04W40/00)1.150
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities1.148
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)1.145
G06F21/55Detecting local intrusion or implementing counter-measures1.142
H04L63/162at the data link layer1.130
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.130
H04L67/561Adding application-functional data or data for application control  e.g. adding metadata1.130
H04L69/22Parsing or analysis of headers1.122
H04L43/0894Packet rate1.122
H04L47/2441relying on flow classification  e.g. using integrated services [IntServ]1.122
H04L9/40Network security protocols1.117
H04L67/04specially adapted for terminals or networks with limited capabilities| specially adapted for terminal portability1.117
H04L67/025for remote control or remote monitoring of applications1.114
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it1.108
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)| | virtual private networks for security | (ref: H04L63/0272)1.105
H04L43/55Testing of service level quality  e.g. simulating service usage1.098
H04L41/40using virtualisation of network functions or resources  e.g. SDN or NFV entities1.098
H04L45/00Routing or path finding of packets in data switching networks | routing or path finding in wireless networks | (ref: H04W40/00)1.096
H04L65/403Arrangements for multi-party communication  e.g. for conferences | data switching systems for conference | (ref: H04L12/18)| | arrangements for connecting several subscribers to a common circuit  i.e. affording conference facilities | (ref: H04M3/56)| | television conferencing systems | (ref: H04N7/15)1.096
H04L69/163In-band adaptation of TCP data exchange| In-band control procedures1.091
H04L63/0245Filtering by information in the payload1.091
H04L41/00Arrangements for maintenance  administration or management of data switching networks  e.g. of packet switching networks1.091
G06F21/577Assessing vulnerabilities and evaluating computer system security1.089
H04L63/0281Proxies1.089
H04L43/0829Packet loss1.086
H04L67/568Storing data temporarily at an intermediate stage  e.g. caching1.086
H04L63/102Entity profiles1.084
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes1.083
H04L41/069using logs of notifications| Post-processing of notifications1.082
H04L41/142using statistical or mathematical methods1.082
H04L63/101Access control lists [ACL]1.080
H04L63/166at the transport layer1.078
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment1.078
H04L12/2801Broadband local area networks1.076
H04L61/5014using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]1.076
H04L63/02for separating internal from external traffic  e.g. firewalls1.074
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)1.074
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms1.073
H04L47/24Traffic characterised by specific attributes  e.g. priority or QoS1.072
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL1.071
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.071
H04L45/60Router architectures1.068
H04L41/0893Assignment of logical groups to network elements1.066
H04L63/168above the transport layer1.065
H04L63/14for detecting or protecting against malicious traffic1.064
H04L43/087Jitter1.061
G06Q40/04Exchange  e.g. stocks  commodities  derivatives or currency exchange1.061
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow1.058
H04L47/10Flow control| Congestion control1.058
H04L41/5054Automatic deployment of services triggered by the service manager  e.g. service implementation by automatic configuration of network components1.057
H04L45/38Flow based routing1.056
H04L47/2483involving identification of individual flows1.056
H04L61/4511using domain name system [DNS]1.056
H04L45/22Alternate routing1.055
H04L45/24Multipath1.054
H04L61/2539Hiding addresses| Keeping addresses anonymous1.054
H04L43/028by filtering1.053
G06F11/3688for test execution  e.g. scheduling of test suites1.051
H04L63/0218Distributed architectures  e.g. distributed firewalls1.051
H04W4/029Location-based management or tracking services1.050
H04L47/6215Individual queue per QOS  rate or priority1.048
H04J3/0658Clock or time synchronisation among packet nodes1.048
H04L47/60implementing hierarchical scheduling1.048
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements1.048
H04L47/193at the transport layer  e.g. TCP related1.047
H04L67/02based on web technology  e.g. hypertext transfer protocol [HTTP]1.046
H04L12/2803Home automation networks1.046
H04L65/1101Session protocols1.045
H04L51/066Format adaptation  e.g. format conversion or compression1.045
H04N7/16Analogue secrecy systems| Analogue subscription systems1.043
H04L41/28Restricting access to network management systems or functions  e.g. using authorisation function to access network configuration1.043
H04L69/16Implementation or adaptation of Internet protocol [IP]  of transmission control protocol [TCP] or of user datagram protocol [UDP]1.043
H04L45/70Routing based on monitoring results1.041
H04L47/12Avoiding congestion| Recovering from congestion1.041
G01R22/063related to remote communication1.041
H04L43/18Protocol analysers1.037
H04L67/10in which an application is distributed across nodes in the network | software deployment | (ref: G06F8/60)| | multiprogramming arrangements | (ref: G06F9/46)1.037
H04L47/19at layers above the network layer | network arrangements for networked applications for scheduling or organising the servicing of application requests | (ref: H04L67/60)1.037
H04L41/5012determining service availability  e.g. which services are available at a certain point in time1.037
H04L67/1095Replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes1.036
G06F21/554involving event detection and direct action1.035
H04L67/1097for distributed storage of data in networks  e.g. transport arrangements for network file system [NFS]  storage area networks [SAN] or network attached storage [NAS]1.035
H04L67/1025Dynamic adaptation of the criteria on which the server selection is based1.034
G06F11/0727in a storage system  e.g. in a DASD or network based storage system | drivers for digital recording or reproducing units | (ref: G06F3/06)| | circuits for error detection or correction within digital recording or reproducing units | (ref: G11B20/18)| | for distributed storage of data in networks  e.g. transport arrangements for network file system [NFS]  storage area networks [SAN] or network attached storage [NAS]  | (ref: H04L67/1097)1.034
H04L41/22comprising specially adapted graphical user interfaces [GUI]1.033
H04L61/10of different types1.032
H04J3/1617carrying packets or ATM cells1.031
H04L67/1017based on a round robin mechanism1.031
G06F9/46Multiprogramming arrangements1.031
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity1.031
G06F11/2089Redundant storage control functionality1.030
H04L43/12Network monitoring probes1.029
G06N5/042Backward inferencing1.028
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)1.028
H04L47/522Dynamic queue service slot or variable bandwidth allocation1.027
H04L67/06specially adapted for file transfer  e.g. file transfer protocol [FTP]1.027
H04L41/046comprising network management agents or mobile agents therefor1.025
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint1.024
H04L43/10Active monitoring  e.g. heartbeat  ping or trace-route1.024
H04L47/70Admission control| Resource allocation1.024
G06F9/5077Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455)1.024
H04L12/1895for short real-time information  e.g. alarms  notifications  alerts  updates1.022
H04L67/14Session management | for real-time applications in data packet communications networks | (ref: H04L65/1066)1.022
H04L63/0485Networking architectures for enhanced packet encryption processing  e.g. offloading of IPsec packet processing or efficient security association look-up1.022
H04L43/065related to network devices1.021
H04L43/08Monitoring or testing based on specific metrics  e.g. QoS  energy consumption or environmental parameters1.020
H04L65/80Responding to QoS1.020
H04L41/0213Standardised network management protocols  e.g. simple network management protocol [SNMP]1.019
H04L1/20using signal quality detector1.018
G06Q10/107Computer aided management of electronic mail | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L51/00)| | network security protocols | (ref: H04L63/00)| | real-time communication protocols in data switching networks | (ref: H04L65/00)| | network protocols for data switching network services | (ref: H04L67/00)1.018
H04L63/123received data contents  e.g. message integrity1.018
G06F9/5005to service a request1.016
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling1.016
H04L45/586of virtual routers1.016
H04L69/08Protocols for interworking| Protocol conversion1.015
H04K3/65using deceptive jamming or spoofing  e.g. transmission of false signals for premature triggering of RCIED  for forced connection or disconnection to/from a network or for generation of dummy target signal1.014
H04L61/2503Translation of Internet protocol [IP] addresses1.013
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communications| Network security protocols1.013
H04L43/0864Round trip delays1.013
G06F11/327Alarm or error message display1.013
H04M15/00Arrangements for metering  time-control or time indication | | Metering  charging or billing arrangements for voice wireline or wireless communications  e.g. VoIP1.012
H04L65/70Media network packetisation1.012
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC1.012
H04L47/41by acting on aggregated flows or links1.012
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.011
H04L43/00Arrangements for monitoring or testing data switching networks1.010
G06F9/465Distributed object oriented systems | remote method invocation [RMI] | (ref: G06F9/548)1.010
H04L69/168specially adapted for link layer protocols  e.g. asynchronous transfer mode [ATM]  synchronous optical network [SONET] or point-to-point protocol [PPP]1.010
G06F16/951Indexing| Web crawling techniques1.010
G06F21/561Virus type analysis1.010
H04L45/02Topology update or discovery1.009
H04L41/0609based on severity or priority1.008
G06F9/4493Object persistence1.008
H04L63/306intercepting packet switched data communications  e.g. Web  Internet or IMS communications1.008
H04L41/5022by giving priorities  e.g. assigning classes of service1.008
H04L47/30in combination with information about buffer occupancy at either end or at transit nodes1.008
H04L67/535Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)1.007
H04L47/2433Allocation of priorities to traffic types1.007
G06F9/5083Techniques for rebalancing the load in a distributed system1.006
H04L47/2491Mapping quality of service [QoS] requirements between different networks1.006
H04W28/20Negotiating bandwidth1.006
H04L49/90Buffering arrangements1.006
H04L45/16Multipoint routing1.006
H04L49/3009Header conversion  routing tables or routing tags1.006
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability1.006
G06F9/45558Hypervisor-specific management and integration aspects1.005
G06F16/95Retrieval from the web1.005
G06F9/505considering the load1.004
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine1.004
H04L69/325in the network layer [OSI layer 3]  e.g. X.25 | (ref: H04L69/16)|  takes precedence1.004
H04L67/1001for accessing one among a plurality of replicated servers1.004
H04L41/0681Configuration of triggering conditions1.004
G06F16/9574of access to content  e.g. by caching1.004
G02B5/3083Birefringent or phase retarding elements | (ref: G02B5/3008)|   | (ref: G02B5/3016)|  take precedence| systems for polarisation control | (ref: G02B27/286)| | manufacturing phase modulating patterns by lithographic processes | (ref: G03F7/001)1.003
H04L67/563Data redirection of data network streams1.003
G06F16/289Object oriented databases1.003
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | user-to-user messaging in packet switching-networks  transmitted according to store-and-forward or real-time protocols  e.g. e-mail  | (ref: H04L51/00)| Time management  e.g. calendars  reminders  meetings or time accounting1.003
G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time  e.g. start-up testing1.003
H04N21/23106involving caching operations | prefetching while addressing of a memory level in which the access to the desired data or data block requires associative addressing means within memory systems or architectures | (ref: G06F12/0862)| | caching at an intermediate stage in a data network | (ref: H04L67/568)1.002
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)1.002
G06F9/542Event management| Broadcasting| Multicasting| Notifications1.002
G06F16/258Data format conversion from or to a database1.002
G06F8/38for implementing user interfaces1.002
G06F9/466Transaction processing1.002
H04L67/56Provisioning of proxy services | store-and-forward switching systems in data switching networks | (ref: H04L12/54)1.002
G06F9/4812by interrupt  e.g. masked1.002
G06F9/547Remote procedure calls [RPC]| Web services1.001
G06F8/20Software design1.001
G06F9/451Execution arrangements for user interfaces1.001
G06F9/54Interprogram communication1.001
G06F13/387for adaptation of different data processing systems to different peripheral devices  e.g. protocol converters for incompatible systems  open system1.001
H04L67/01Protocols1.001
G06F9/449Object-oriented method invocation or resolution1.001
H04L12/417with deterministic access  e.g. token passing1.001
H04L12/4035in which slots of a TDMA packet structure are assigned based on a contention resolution carried out at a master unit | TDM/TDMA multiplex systems | per se|  | (ref: H04J3/1694)| | hybrid switching systems | (ref: H04L12/64)1.001
H04L67/34involving the movement of software or configuration parameters  | network booting or remote initial program loading [RIPL] | (ref: G06F9/4416)1.000
G06F8/24Object-oriented1.000
H04L67/288Distributed intermediate devices  i.e. intermediate devices for interaction with other intermediate devices on the same level1.000
H04L12/4604LAN interconnection over a backbone network  e.g. Internet  Frame Relay1.000
H04L63/126the source of the received data1.000
G06F9/454Multi-language systems| Localisation| Internationalisation0.999
H04L47/50Queue scheduling0.999
H04L47/125by balancing the load  e.g. traffic engineering0.997
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones0.996
A61M1/387taking into account of the needs or inventory0.996
H04L69/166IP fragmentation| TCP segmentation0.995
H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture| Specification of modified or new header fields0.995
G06F11/32with visual | or acoustical|  indication of the functioning of the machine0.994
H04L45/7453using hashing0.994
H04L41/509wherein the managed service relates to media content delivery  e.g. audio  video or TV0.994
H04M11/06Simultaneous speech and data transmission  e.g. telegraphic transmission over the same conductors0.993
H04L61/00Network arrangements  protocols or services for addressing or naming0.993
H04L61/25of the same type0.993
H04L41/5009Determining service level performance parameters or violations of service level contracts  e.g. violations of agreed response time or mean time between failures [MTBF]0.993
H04L41/065involving logical or physical relationship  e.g. grouping and hierarchies0.993
H04L61/2567for reachability  e.g. inquiring the address of a correspondent behind a NAT server0.992
H04L61/2532Clique of NAT servers0.992
H04L12/14Charging |   metering or billing|  arrangements | for data wireline or wireless communications0.992
H04L47/621Individual queue per connection or flow  e.g. per VC0.992
H04L45/54Organization of routing tables0.992
H04L65/611for multicast or broadcast | systems for broadcast or conference | (ref: H04L12/18)| | arrangements for broadcast or distribution combined with broadcast | (ref: H04H20/00)| | arrangements for broadcast applications with a direct linkage to broadcast information or to broadcast space-time | (ref: H04H60/00)| | selective distribution of broadcast services  e.g. multimedia broadcast multicast service [MBMS]  | (ref: H04W4/06)0.992
H04L67/1008based on parameters of servers  e.g. available memory or workload | monitoring of computer activity | (ref: G06F11/30)0.992
H04L43/50Testing arrangements0.991
H04L45/74Address processing for routing0.990
H04L45/745Address table lookup| Address filtering0.990
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD0.990
H04L67/101based on network conditions0.989
H04L1/1858Transmission or retransmission of more than one copy of acknowledgement message0.989
G06F12/10Address translation0.988
G06F16/20of structured data  e.g. relational data0.988
H04L45/72Routing based on the source address0.988
H04L9/3247involving digital signatures0.988
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]0.988
H04L41/06Management of faults  events  alarms or notifications0.988
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals0.987
H04L47/283in response to processing delays  e.g. caused by jitter or round trip time [RTT]0.987
H04L1/0025Transmission of mode-switching indication0.986
H04L47/25with rate being modified by the source upon detecting a change of network conditions0.986
H04L41/14Network analysis or design0.986
H04L41/5058Service discovery by the service manager0.986
H04L49/555Error detection0.986
G06F16/9535Search customisation based on user profiles and personalisation0.986
H04L43/106using time related information in packets  e.g. by adding timestamps0.985
H04L12/6418Hybrid transport0.985
G06F15/167using a common memory  e.g. mailbox0.985
H04L69/14Multichannel or multilink protocols0.985
H04W12/12Detection or prevention of fraud0.985
G06F13/385for adaptation of a particular data processing system to different peripheral devices0.985
H04L12/1886with traffic restrictions for efficiency improvement  e.g. involving subnets or subdomains0.984
G06F21/606by securing the transmission between two devices or processes0.984
G06F16/22Indexing| Data structures therefor| Storage structures0.983
G06F16/9014hash tables0.983
G06F9/5044considering hardware capabilities0.983
H04L63/105Multiple levels of security0.983
H04L69/329in the application layer [OSI layer 7]0.983
G01R21/00Arrangements for measuring electric power or power factor | (ref: G01R7/12)|  takes precedence0.983
H04L67/125involving control of end-device applications over a network0.983
H04L67/564Enhancement of application control based on intercepted application data0.983
G06F16/2471Distributed queries0.983
H04L45/42Centralised routing0.982
G06F9/4416Network booting| Remote initial program loading [RIPL]0.982
H04L69/10Streamlined  light-weight or high-speed protocols  e.g. express transfer protocol [XTP] or byte stream0.982
H04L43/062related to network traffic0.981
H04L51/224providing notification on incoming messages  e.g. pushed notifications of received messages0.981
H04L51/56Unified messaging  e.g. interactions between e-mail  instant messaging or converged IP messaging [CPM]0.981
G06F13/4004Coupling between buses0.981
G07F17/3225Data transfer within a gaming system  e.g. data sent between gaming machines and users0.981
H04L45/306Route determination based on the nature of the carried application0.981
C12Q2521/319Exonuclease0.509
C12Q2537/1373Displacement by a nucleic acid0.509
C12Q2525/143incorporating a promoter sequence0.509
C12Q1/6865Promoter-based amplification  e.g. nucleic acid sequence amplification [NASBA]  self-sustained sequence replication [3SR] or transcription-based amplification system [TAS]0.509
C12Q2525/121incorporating both deoxyribonucleotides and ribonucleotides0.509
C12Q1/6804Nucleic acid analysis using immunogens | immunoassay | (ref: G01N33/53)0.509
C12Q2521/313Type II endonucleases  i.e. cutting outside recognition site0.509
C12Q2563/179the label being a nucleic acid0.509
H04L63/108when the policy decisions are valid for a limited amount of time0.457
G06F15/173using an interconnection network  e.g. matrix  shuffle  pyramid  star  snowflake0.457
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)0.457
G06F11/30Monitoring0.457
H04L41/0604using filtering  e.g. reduction of information by using priority  element types  position or time0.453
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)0.450
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database0.438
G06F16/9017using directory or table look-up | use of a directory or look-up table in file systems | (ref: G06F16/13)0.438
G06F16/2455Query execution0.438
H04L67/141Setup of application sessions | admission control or resource allocation in data switching networks | (ref: H04L47/70)0.436
H04L67/146Markers for unambiguous identification of a particular session  e.g. session cookie or URL-encoding0.436
H04L41/5006Creating or negotiating SLA contracts  guarantees or penalties0.433
G06F16/2457with adaptation to user needs0.433
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries0.433
G06F21/54by adding security routines or objects to programs0.431
G06F21/565by checking file integrity0.431
H04L41/16using machine learning or artificial intelligence0.425
G06N7/023Learning or tuning the parameters of a fuzzy system0.425
G06N5/048Fuzzy inferencing0.425
H04L63/164at the network layer0.425
H04L61/5007Internet protocol [IP] addresses0.425
H04L61/5092by self-assignment  e.g. picking addresses at random and testing if they are already in use0.424
H04L61/5076Update or notification mechanisms  e.g. DynDNS0.424
H04L45/28using route fault recovery0.424
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication0.424
H04L61/35involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address or functional addressing  i.e. assigning an address to a function0.424
H04L9/3297involving time stamps  e.g. generation of time stamps0.424
H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks  e.g. the interfaces between the data link level and the physical level0.420
G06N7/005Probabilistic networks0.419
G06N20/00Machine learning0.419
H04L69/162involving adaptations of sockets based mechanisms | secure socket layer | (ref: H04L63/168)0.419
H04L69/165Combined use of TCP and UDP protocols| selection criteria therefor0.419
H04L69/18Multiprotocol handlers  e.g. single devices capable of handling multiple protocols0.419
H04L47/2475for supporting traffic characterised by the type of applications0.418
H04L67/108characterised by resources being split in blocks or fragments0.415
H04L9/0662with particular pseudorandom sequence generator0.415
H04L9/34Bits  or blocks of bits  of the telegraphic message being interchanged in time | for speech signals | (ref: H04K1/06)0.415
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.415
H04L45/64using an overlay routing layer0.414
H04L41/042comprising distributed management centres cooperatively managing the network0.414
H04L49/70Virtual switches0.412
H04L12/4625Single bridge functionality  e.g. connection of two networks over a single bridge0.412
H04L41/145involving simulating  designing  planning or modelling of a network0.412
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)0.411
H04L12/1428Invoice generation  e.g. customization  lay-out  database processing  algorithms for calculating the bill or formatting invoices as WWW pages | invoicing in general | (ref: G06Q30/04)0.409
H04L61/59using proxies for addressing0.409
H04L12/1439time-based0.409
H04L61/5061Pools of addresses0.409
H04L12/1453Methods or systems for payment or settlement of the charges for data transmission involving significant interaction with the data transmission network0.409
H04L12/1414in real-time0.409
H04L61/5084Providing for device mobility | network addressing or numbering for mobility support in wireless networks | (ref: H04W8/26)| | mobile IP | (ref: H04W80/04)0.409
H04M15/44Augmented  consolidated or itemized billing statement or bill presentation0.409
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)0.409
H04L12/1403Architecture for metering  charging or billing0.409
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.408
H04L61/2517using port numbers0.408
H04L61/2514between local and global IP addresses0.408
G06F11/3048where the topology of the computing system or computing system component explicitly influences the monitoring activity  e.g. serial  hierarchical systems0.407
H04L43/16Threshold monitoring0.407
H04L47/20Traffic policing0.407
H04L47/32by discarding or delaying data units  e.g. packets or frames0.406
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)0.406
H04L43/02Capturing of monitoring data0.406
H04L63/16Implementing security features at a particular protocol layer0.404
H04L12/4645Details on frame tagging | routing of packets | (ref: H04L45/00)| | support for virtual LAN | (ref: H04L49/354)0.404
H04L12/2856Access arrangements  e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W)0.404
H04L67/303Terminal profiles0.404
H04L41/0803Configuration setting0.404
H04L12/2874Processing of data for distribution to the subscribers0.404
H04L41/0866Checking the configuration0.402
G06F16/2358Change logging  detection  and notification | replication | (ref: G06F16/27)0.402
H04L67/306User profiles0.402
H04L67/63Routing a service request depending on the request content or context0.402
H04L67/62Establishing a time schedule for servicing the requests0.402
H04L1/00Arrangements for detecting or preventing errors in the information received | correcting synchronisation | (ref: H04L7/00)0.402
H04L1/1671the supervisory signal being transmitted together with control information0.402
H04L47/2416Real-time traffic0.402
H04M7/0078Security| Fraud detection| Fraud prevention0.402
H04L65/1079of unsolicited session attempts  e.g. SPIT0.402
H04M3/436Arrangements for screening incoming calls |   i.e. evaluating the characteristics of a call before deciding whether to answer it | based on the calling party profile | (ref: H04M3/42059)| | based on location | (ref: H04M3/42348)| | based on presence | (ref: H04M3/42365)| | diversion | (ref: H04M3/54)0.402
H04L67/104Peer-to-peer [P2P] networks0.400
H04L67/1091Interfacing with client-server systems or between P2P systems0.400
H04L45/04Interdomain routing  e.g. hierarchical routing0.400
G06F16/958Organisation or management of web site content  e.g. publishing  maintaining pages or automatic linking0.399
H04L41/064involving time analysis0.399
H04L43/0811by checking connectivity0.399
H04L41/5067Customer-centric QoS measurements0.398
G06F11/079Root cause analysis  i.e. error or fault diagnosis | in a hardware test environment | (ref: G06F11/22)| | in a software test environment | (ref: G06F11/36)0.398
H04L12/56Packet switching systems0.398
G06Q10/0635Risk analysis0.398
H04L49/251Cut-through or wormhole routing0.398
G06F11/0709in a distributed system consisting of a plurality of standalone computer nodes  e.g. clusters  client-server systems0.398
H04L67/61taking into account QoS or priority requirements0.397
H04L47/31by tagging of packets  e.g. using discard eligibility [DE] bits0.397
H04L67/142Managing session states for stateless protocols| Signalling session states| State transitions| Keeping-state mechanisms0.396
H04L61/58Caching of addresses or names0.396
G06F16/904Browsing| Visualisation therefor | for navigating the web | (ref: G06F16/954)| | browsing optimisation for the web | (ref: G06F16/957)0.396
H04L67/52specially adapted for the location of the user terminal0.396
H04L43/0876Network utilisation  e.g. volume of load or congestion level0.396
H04L43/0817by checking functioning0.396
H04W4/02Services making use of location information0.396
H04L67/51Discovery or management thereof  e.g. service location protocol [SLP] or web services0.396
G06F16/9537Spatial or temporal dependent retrieval  e.g. spatiotemporal queries0.396
H04W28/06Optimizing | the usage of the radio link|   e.g. header compression  information sizing |   discarding information | system modifying transmission characteristic according to link quality by modifying frame length | (ref: H04L1/0007)| | dynamic adaptation of the packet size for flow control or congestion control | (ref: H04L47/365)0.396
H04L67/5651Reducing the amount or size of exchanged application data0.396
G06F16/9577Optimising the visualization of content  e.g. distillation of HTML documents0.396
H04L67/565Conversion or adaptation of application format or content | adding application control or application functional data | (ref: H04L67/561)0.396
H04L9/065Encryption by serially and continuously modifying data stream elements  e.g. stream cipher systems  RC4  SEAL or A5/30.395
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer0.395
H04M3/42008Systems for anonymous communication between parties  e.g. by use of disposal contact identifiers0.395
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks0.395
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)0.395
H04L45/20Hop count for routing purposes  e.g. TTL0.395
H04L61/30Managing network names  e.g. use of aliases or nicknames | name-to-address mapping | (ref: H04L61/45)0.395
G06F11/3684for test design  e.g. generating new test cases0.394
H04W76/50for emergency connections0.394
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]0.394
H04W4/18Information format or content conversion  e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals0.394
H04L69/40for recovering from a failure of a protocol instance or entity  e.g. service redundancy protocols  protocol state redundancy or protocol service redirection | management of faults  events  alarms or notifications in data switching networks | (ref: H04L41/06)0.393
H04L47/6265past bandwidth allocation0.393
G06F9/00Arrangements for program control  e.g. control units | program control for peripheral devices | (ref: G06F13/10)0.393
H04L69/324in the data link layer [OSI layer 2]  e.g. HDLC0.393
G06F21/562Static detection0.393
H04W12/128Anti-malware arrangements  e.g. protection against SMS fraud or mobile malware0.393
H04W12/122Counter-measures against attacks| Protection against rogue devices0.393
H04W12/126Anti-theft arrangements  e.g. protection against subscriber identity module [SIM] cloning0.393
H04L49/205Quality of Service based0.393
G06F16/90344by using string matching techniques0.393
H04L65/103in the network0.393
H04L65/1069Session establishment or de-establishment0.393
H04L65/104in the network0.393
G06F16/183Provision of network file services by network file servers  e.g. by using NFS  CIFS | network file access protocols | (ref: H04L67/1097)0.393
H04L47/2458Modification of priorities while in transit0.393
H04L47/726Reserving resources in multiple paths to be used simultaneously | by balancing the load | (ref: H04L47/125)0.393
G06F16/178Techniques for file synchronisation in file systems0.393
H04L47/2466using signalling traffic0.393
G06F21/556involving covert channels  i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755)0.392
G06F9/4555Para-virtualisation  i.e. guest operating system has to be modified0.392
G06F8/71Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management0.392
G06F9/45545Guest-host  i.e. hypervisor is an application program itself  e.g. VirtualBox0.392
H04L67/1021based on client or server locations0.392
H04L61/2589over a relay server  e.g. traversal using relay for network address translation [TURN]0.392
G06F16/955using information identifiers  e.g. uniform resource locators [URL]0.392
H04L69/167Adaptation for transition between two IP versions  e.g. between IPv4 and IPv6 | translation of Internet protocol [IP] addresses | (ref: H04L61/2503)0.392
H04L67/5681Pre-fetching or pre-delivering data based on network characteristics0.392
H04L61/2585through application level gateway [ALG]0.392
G06F7/588Random number generators  i.e. based on natural stochastic processes0.392
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.392
H04L67/567Integrating service provisioning from a plurality of service providers0.392
G06F9/4881Scheduling strategies for dispatcher  e.g. round robin  multi-level priority queues0.392
H04L67/2885Hierarchically arranged intermediate devices  e.g. for hierarchical caching0.392
G06F7/58Random or pseudo-random number generators0.392
H04L61/2575using address mapping retrieval  e.g. simple traversal of user datagram protocol through session traversal utilities for NAT [STUN]0.392
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.392
H04L61/256NAT traversal0.392
H04W48/18Selecting a network or a communication service0.392
H04W84/10Small scale networks| Flat hierarchical networks0.392
H04L61/2592using tunnelling or encapsulation0.392
H04L67/133Protocols for remote procedure calls [RPC]0.392
H04L49/40Constructional details  e.g. power supply  mechanical construction or backplane0.392
H04N21/438Interfacing the downstream path of the transmission network originating from a server  e.g. retrieving MPEG packets from an IP network | transmission of MPEG streams over ATM | (ref: H04L12/5601)| | flow control in data networks | (ref: H04L47/10)| | real-time communication protocols in data switching networks | (ref: H04L65/00)0.392
H04N21/25858involving client software characteristics  e.g. OS identifier0.392
H04N21/235Processing of additional data  e.g. scrambling of additional data or processing content descriptors0.392
H04N21/8543using a description language  e.g. Multimedia and Hypermedia information coding Expert Group [MHEG]  eXtensible Markup Language [XML] | information retrieval of semistructured data  the underlying structure being taken into account  e.g. mark-up language structure data | (ref: G06F16/80)0.392
H04N21/238Interfacing the downstream path of the transmission network  e.g. adapting the transmission rate of a video stream to network bandwidth| Processing of multiplex streams | hybrid fiber coaxial [HFC] networks for downstream channel allocation for video distribution | (ref: H04L12/2801)| | flow control in packet networks | (ref: H04L47/10)| | real-time communication protocols in data switching networks | (ref: H04L65/00)| | scheduling or organising the servicing of application requests | (ref: H04L67/60)0.392
H04N21/84Generation or processing of descriptive data  e.g. content descriptors | systems specially adapted for using meta-information in broadcast systems | (ref: H04H60/73)0.392
H04N21/25891being end-user preferences | retrieval of video data in a video database based on user preferences | (ref: G06F16/739)| | arrangements for recognizing users' preferences | (ref: H04H60/46)| | user profiles in network data switching protocols | (ref: H04L67/306)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)0.392
H04N7/17309Transmission or handling of upstream communications0.392
H04N21/437Interfacing the upstream path of the transmission network  e.g. for transmitting client requests to a VOD server | flow control in data networks | (ref: H04L47/10)| | streaming protocols  e.g. RTP or RTCP  | (ref: H04L65/65)| | scheduling or organising the servicing of application requests in data packet switching networks | (ref: H04L67/60)0.392
H04N21/2542for selling goods  e.g. TV shopping | payment schemes  payment architectures or payment protocols for electronic shopping systems | (ref: G06Q20/12)0.392
H04N21/8126involving additional data  e.g. news  sports  stocks  weather forecasts0.392
H04N21/643Communication protocols | network streaming protocols  e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]  | (ref: H04L65/65)0.392
H04N21/25875involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | networks authentication protocols | (ref: H04L63/08)| | authentication in wireless network security | (ref: H04W12/06)0.392
H04N21/2385Channel allocation | (ref: H04N21/266)|  takes precedence| Bandwidth allocation | (ref: H04N21/24)|  takes precedence | | allocation of channels according to the instantaneous demands of the users in time-division multiplex systems | (ref: H04J3/1682)| | admission control  resource allocation in open networks | (ref: H04L12/5692)| | arrangements for maintenance or administration in data switching networks involving bandwidth and capacity management | (ref: H04L41/0896)| | negotiating bandwidth in wireless networks | (ref: H04W28/16)0.392
H04N21/812involving advertisement data | advertising | per se|  | (ref: G06Q30/02)0.392
H04N21/2668Creating a channel for a dedicated end-user group  e.g. insertion of targeted commercials based on end-user profiles | information retrieval from the Internet by querying with filtering and personalisation | (ref: G06F16/9535)| | arrangements for replacing or switching information during the broadcast | (ref: H04H20/10)| | push services over packet-switching network | (ref: H04L12/1859)| | adaptation of message content in packet-switching networks | (ref: H04L51/063)0.392
H04L65/752adapting media to network capabilities0.392
H04L65/613for the control of the source by the destination | control signals issued by the client directed to the server or network components specially adapted for selective content distribution | (ref: H04N21/637)0.392
H04N21/2402Monitoring of the downstream path of the transmission network  e.g. bandwidth available | traffic monitoring in data switching networks | (ref: H04L43/00)| | monitoring data switching networks utilization | (ref: H04L43/0876)0.392
H04N21/64707for transferring content from a first network to a second network  e.g. between IP and wireless0.392
H04N21/8545for generating interactive applications0.392
H04N21/435Processing of additional data  e.g. decrypting of additional data  reconstructing software from modules extracted from the transport stream0.392
H04L41/147for predicting network behaviour0.391
H04B7/18582Arrangements for data linking  i.e. for data framing  for error recovery  for multiple access0.391
H04L1/1848Time-out mechanisms0.391
H04L1/1832Details of sliding window management0.391
H04L47/323Discarding or blocking control packets  e.g. ACK packets0.391
H04L47/36by determining packet size  e.g. maximum transfer unit [MTU]0.391
H04L47/29using a combination of thresholds0.391
H04W8/04Registration at HLR or HSS [Home Subscriber Server]0.391
H04W28/0273adapting protocols for flow control or congestion control to wireless environment  e.g. adapting transmission control protocol [TCP] | wireless network protocols or protocol adaptations to wireless operation  e.g. wireless application protocol | (ref: H04W80/00)0.391
G06Q30/0601Electronic shopping0.391
H04L47/2408for supporting different services  e.g. a differentiated services [DiffServ] type of service0.391
H04L63/104Grouping of entities0.391
H04L47/22Traffic shaping0.391
H04L47/11Identifying congestion0.390
H04L41/0896Bandwidth or capacity management  i.e. automatically increasing or decreasing capacities | flow or congestion control using dynamic resource allocation  e.g. in-call renegotiation  | (ref: H04L47/76)0.390
H04L41/083for increasing network speed0.390
G06F16/24565Triggers| Constraints0.390
G06F16/2379Updates performed during online database operations| commit processing0.390
G06F16/24568Data stream processing| Continuous queries0.390
H04L41/20Network management software packages0.390
H04L41/04Network management architectures or arrangements0.390
H04W12/088using filters or firewalls0.390
G01R1/20Modifications of basic electric elements for use in electric measuring instruments| Structural combinations of such elements with such instruments0.390
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy0.390
H04L9/321involving a third party or a trusted authority0.390
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]0.390
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.390
H04L61/4523using lightweight directory access protocol [LDAP]0.390
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)0.390
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)0.390
G06F21/575Secure boot0.390
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)0.390
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.390
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]0.390
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)0.390
H04L67/1027Persistence of sessions during load balancing0.389
H04L67/1019Random or heuristic server selection0.389
H04L67/1023based on a hash applied to IP addresses or costs0.389
H04L69/164Adaptation or special uses of UDP protocol0.389
H04L67/2876Pairs of inter-processing entities at each side of the network  e.g. split proxies0.389
H04L69/12Protocol engines0.388
G06F11/2074Asynchronous techniques0.388
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence0.388
G06F11/2257using expert systems0.388
H04L51/212using filtering or selective blocking0.387
H04L67/131Protocols for games  networked simulations or virtual reality0.387
H04L67/562Brokering proxy services0.387
H04L41/5077wherein the managed service relates to simple transport services  i.e. providing only network infrastructure0.387
H04L41/5096wherein the managed service relates to distributed or central networked applications0.387
H04L69/169Special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks  | protocols for interworking  protocol conversion | (ref: H04L69/08)0.387
G06F16/10File systems| File servers0.387
H04L41/0886Fully automatic configuration0.387
H04L43/0882Utilisation of link capacity0.387
H04L41/0843based on generic templates0.387
G06F16/00Information retrieval| Database structures therefor| File system structures therefor0.387
H04L49/357Fibre channel switches0.386
G06F21/6245Protecting personal data  e.g. for financial or medical purposes0.386
G06F21/564by virus signature recognition0.386
H04L1/1877for semi-reliable protocols  e.g. for less sensitive applications like streaming video | buffer level management for video bitstream control arrangements | (ref: H04N21/44004)0.385
H04L1/1825Adaptation of specific ARQ protocol parameters according to transmission conditions0.385
H04L47/564Attaching a deadline to packets  e.g. earliest due date first0.385
H04L47/625for service slots or service orders0.385
H04L1/1887Scheduling and prioritising arrangements0.385
H04L41/0233Object-oriented techniques  for representation of network management data  e.g. common object request broker architecture [CORBA]0.385
H04L67/75Indicating network or usage conditions on the user display0.385
H04L47/34ensuring sequence integrity  e.g. using sequence numbers0.385
H04L47/2425for supporting services specification  e.g. SLA0.385
H04L1/1809Selective-repeat protocols0.385
H04L41/0659by isolating or reconfiguring faulty entities0.385
H04L41/0813characterised by the conditions triggering a change of settings0.385
H04L41/0806for initial configuration or provisioning  e.g. plug-and-play0.385
H04L45/48Routing tree calculation0.384
H04L43/0852Delays0.384
G06F11/008Reliability or availability analysis0.384
H04L61/5038for local use  e.g. in LAN or USB networks  or in a controller area network [CAN]0.383
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)0.383
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity0.383
H04L63/0478applying multiple layers of encryption  e.g. nested tunnels or encrypting the content with a first key and then with at least a second key | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.383
G06F8/61Installation0.383
G08B27/005with transmission via computer network0.383
G08B27/006with transmission via telephone network0.383
G08B25/004Alarm propagated along alternative communication path or using alternative communication medium according to a hierarchy of available ways to communicate  e.g. if Wi-Fi not available use GSM0.383
G08B25/005Alarm destination chosen according to a hierarchy of available destinations  e.g. if hospital does not answer send to police station0.383
H04H60/76Arrangements characterised by transmission systems other than for broadcast  e.g. the Internet | for broadcast | (ref: H04H20/65)0.383
H04H20/59for emergency or urgency0.383
H04L61/3015Name registration  generation or assignment0.383
H04L47/781Centralised allocation of resources0.383
H04L47/27Evaluation or update of window size  e.g. using information derived from acknowledged [ACK] packets0.383
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.382
H04L63/30for supporting lawful interception  monitoring or retaining of communications or communication related information | circuit switched telephony call monitoring | (ref: H04M3/2281)0.382
H04Q11/0414Details0.382
H04L12/1827Network arrangements for conference optimisation or adaptation0.382
H04W28/02Traffic management  e.g. flow control or congestion control0.382
G06F21/445by mutual authentication  e.g. between devices or programs0.382
H04L61/50Address allocation0.381
H04L49/354for supporting virtual local area networks [VLAN]0.381
H04L69/26Special purpose or proprietary protocols or architectures | network applications for proprietary or special purpose networking environments | (ref: H04L67/12)0.381
H04K3/94related to allowing or preventing testing or assessing0.380
H04W12/069using certificates or pre-shared keys0.380
H04K3/86related to preventing deceptive jamming or unauthorized interrogation or access  e.g. WLAN access or RFID reading | record carriers with integrated circuit chips including means for preventing undesired reading or writing from or to record carriers by hindering electromagnetic reading or writing | (ref: G06K19/07318)| | arrangements for sensing record carriers including arrangements for protecting the interrogation against piracy attacks | (ref: G06K7/10257)0.380
G05B23/027Alarm generation  e.g. communication protocol| Forms of alarm0.380
G05B23/024Quantitative history assessment  e.g. mathematical relationships between available data| Functions therefor| Principal component analysis [PCA]| Partial least square [PLS]| Statistical classifiers  e.g. Bayesian networks  linear regression or correlation analysis| Neural networks0.380
H04M15/58based on statistics of usage or network monitoring0.380
H04M15/56for VoIP communications0.380
H04L65/65Network streaming protocols  e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]0.380
H04L41/5003Managing SLA| Interaction between SLA and QoS0.379
H04L41/34Signalling channels for network management communication0.379
H04Q3/0075Fault management techniques0.379
G06F21/128involving web programs  i.e. using technology especially used in internet  generally interacting with a web browser  e.g. hypertext markup language [HTML]  applets  java0.379
H04L41/5032Generating service level reports0.379
G06F9/5072Grid computing0.379
G06F8/51Source to source0.379
H04L47/767after changing the attachment point  e.g. after hand-off0.379
H04L47/805QOS or priority aware0.379
H04L47/786Mapping reservation between domains0.379
H04L47/724at intermediate nodes  e.g. resource reservation protocol [RSVP]0.379
H04L47/825Involving tunnels  e.g. MPLS0.379
H04L47/824Applicable to portable or mobile terminals0.379
G06F9/30036Instructions to perform operations on packed data  e.g. vector operations0.379
G06F9/30029Logical and Boolean instructions  e.g. XOR  NOT0.379
G06N5/04Inference methods or devices0.378
H04L45/308Route determination based on user's profile  e.g. premium users0.378
H04W28/10Flow control | between communication endpoints0.378
H04L49/9042Separate storage for different parts of the packet  e.g. header and payload0.378
H04L49/901using storage descriptor  e.g. read or write pointers0.378
H04L67/566Grouping or aggregating service requests  e.g. for unified processing0.378
H04L47/40using split connections0.378
H04B7/18584Arrangements for data networking  i.e. for data packet routing  for congestion control | data switching networks | (ref: H04L12/00)0.378
H04L12/2854Wide area networks  e.g. public data networks0.378
H04L67/2871Implementation details of single intermediate entities0.378
H04L49/9094Arrangements for simultaneous transmit and receive  e.g. simultaneous reading/writing from/to the storage element0.378
H04L45/30Routing of multiclass traffic0.378
H04L45/34Source routing0.378
H04L45/18Loop-free operations0.378
H04L45/245Link aggregation  e.g. trunking0.378
H04L41/0686Additional information in the notification  e.g. enhancement of specific meta-data0.378
H04L47/326with random discard  e.g. random early discard [RED]0.377
H04L47/745Reaction in network0.377
H04L47/762triggered by the network0.377
H04W28/16Central resource management| Negotiation of resources or communication parameters  e.g. negotiating bandwidth or QoS [Quality of Service]0.377
H04L12/1813for computer conferences  e.g. chat rooms | instant messaging | (ref: H04L51/04)| | protocols for multimedia communication | (ref: H04L65/1101)| | arrangements for multi-party communication | (ref: H04L65/403)| | telephonic conference arrangements | (ref: H04M3/56)| | television conference systems | (ref: H04N7/15)0.377
H04L47/627policing0.377
H04L49/9031Wraparound memory  e.g. overrun or underrun detection0.377
H04L49/9047including multiple buffers  e.g. buffer pools0.377
G06F9/30127Register windows0.377
G06F9/30094Condition code generation  e.g. Carry  Zero flag0.377
G06F9/3885using a plurality of independent parallel functional units0.377
G06F9/30021Compare instructions  e.g. Greater-Than  Equal-To  MINMAX0.377
G06F9/30167of immediate specifier  e.g. constants0.377
G06F9/30145Instruction analysis  e.g. decoding  instruction word fields0.377
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.377
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence0.377
H04L69/06Notations for structuring of protocol data  e.g. abstract syntax notation one [ASN.1]0.377
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.377
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)0.377
G06F9/45533Hypervisors| Virtual machine monitors0.377
G06F16/972Access to data in other repository systems  e.g. legacy data or dynamic Web page generation0.377
H04L67/1038Load balancing arrangements to avoid a single path through a load balancer0.376
H04L67/1036Load balancing of requests to servers for services different from user content provisioning  e.g. load balancing across domain name servers0.376
G02B6/105having optical polarisation effects0.376
G02B6/12011characterised by the arrayed waveguides  e.g. comprising a filled groove in the array section0.376
G02B6/12023characterised by means for reducing the polarisation dependence  e.g. reduced birefringence0.376
G06Q10/063Operations research or analysis0.376
G06F16/27Replication  distribution or synchronisation of data between databases or within a distributed database system| Distributed database system architectures therefor0.376
H04N21/8456by decomposing the content in the time domain  e.g. in time segments0.376
H04N21/6437Real-time Transport Protocol [RTP]0.376
H04N21/47202for requesting content on demand  e.g. video on demand0.376
H04N21/41407embedded in a portable device  e.g. video client on a mobile phone  PDA  laptop | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)| | arrangements specially adapted for mobile receivers in broadcast systems | (ref: H04H20/57)0.376
H04N21/64784Data processing by the network | data processing in packet switching systems | (ref: H04L12/56)| | flow control in packet networks | (ref: H04L47/10)| | intermediate storage or scheduling | (ref: H04L49/90)| | provisioning of proxy services in data packet switching networks | (ref: H04L67/56)0.376
H04L9/3271using challenge-response0.376
G06F8/36Software reuse0.376
G06F9/4492Inheritance0.376
G06F11/3692for test results analysis0.376
G06F9/541via adapters  e.g. between incompatible applications0.376
H04L51/04Real-time or near real-time messaging  e.g. instant messaging [IM]0.375
G06F9/4488Object-oriented0.375
H04B3/542the information being in digital form0.375
H04L12/407with decentralised control0.375
H04L12/403with centralised control  e.g. polling0.375
H04L65/764at the destination  | reformatting of additional data in video clients | (ref: H04N21/4355)0.375
H04L65/762at the source  | reformatting of additional data in video distribution servers | (ref: H04N21/2355)0.375
G06Q10/06375Prediction of business process outcome or impact based on a proposed change0.375
G06F9/5038considering the execution order of a plurality of tasks  e.g. taking priority or time dependency constraints into consideration | scheduling strategies | (ref: G06F9/4881)|  and subgroups0.375
G06F11/3495for systems0.375
H04L43/091Measuring contribution of individual network components to actual service level0.375
G06F11/324Display of status information0.375
G06Q30/02Marketing  e.g. market research and analysis  surveying  promotions  advertising  buyer profiling  customer management or rewards| Price estimation or determination0.375
H04L41/5064Customer relationship management0.375
G06Q30/0609Buyer or seller confidence or verification0.375
G06Q99/00Subject matter not provided for in other groups of this subclass0.375
H04L41/5074Handling of user complaints or trouble tickets0.375
G06F11/0784Routing of error reports  e.g. with a specific transmission path or data flow0.375
H04M15/49Connection to several service providers0.375
H04L41/5083wherein the managed service relates to web hosting0.375
H04L43/024by adaptive sampling0.375
H04M3/5175Call or contact centers supervision arrangements0.375
G06F11/0781Error filtering or prioritizing based on a policy defined by the user or on a policy defined by a hardware/software module  e.g. according to a severity level0.375
H04M15/721using the Internet0.375
G06F11/0769Readable error formats  e.g. cross-platform generic formats  human understandable formats0.375
H04M15/84Types of notifications0.375
G06Q20/382insuring higher security of transaction0.375
H04M3/5191interacting with the Internet0.375
H04L41/5061characterised by the interaction between service providers and their network customers  e.g. customer relationship management0.375
G06F21/41where a single sign-on provides access to a plurality of computers0.375
H04M15/80Rating or billing plans| Tariff determination aspects0.375
G06Q20/102Bill distribution or payments0.375
H04M15/8351before establishing a communication0.375
H04M15/43Billing software details0.375
H04L41/18Delegation of network management function  e.g. customer network management [CNM]0.375
H04M15/83Notification aspects0.375
H04M15/705Account settings  e.g. limits or numbers or payment0.375
H04L41/0253using browsers or web-pages for accessing management information0.375
H04M15/51for resellers  retailers or service providers0.375
H04M15/41Billing record details  i.e. parameters  identifiers  structure of call data record [CDR]0.375
H04L41/0879Manual configuration through operator0.375
G06F11/0775Content or structure details of the error report  e.g. specific table structure  specific error fields0.375
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)0.375
H04M15/8044Least cost routing0.375
H04L41/024using relational databases for representation of network management data  e.g. managing via structured query language [SQL]0.375
H04L65/401wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions  e.g. white board sharing or spawning of a subconference0.375
G06Q30/06Buying  selling or leasing transactions0.375
G06Q30/0635Processing of requisition or of purchase orders0.375
H04M15/745Customizing according to wishes of subscriber  e.g. friends or family0.375
H04W4/50Service provisioning or reconfiguring0.375
H04L47/6255queue load conditions  e.g. longest queue first0.375
H04L47/6235Variable service order0.375
H04L47/37Slow start0.375
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)0.374
G06F21/36by graphic or iconic representation0.374
G06V30/10Character recognition0.374
H04L67/12specially adapted for proprietary or special-purpose networking environments  e.g. medical networks  sensor networks  networks in vehicles or remote metering networks0.374
G06N20/10using kernel methods  e.g. support vector machines [SVM]0.374
G06F40/40Processing or translation of natural language | natural language analysis | (ref: G06F40/20)| | semantic analysis | (ref: G06F40/30)0.374
G06K9/6218Clustering techniques0.374
G06F3/04842Selection of displayed objects or displayed text elements | (ref: G06F3/0482)|  takes precedence0.374
H04L51/42Mailbox-related aspects  e.g. synchronisation of mailboxes0.374
G06F3/0486Drag-and-drop0.374
G06K9/622Non-hierarchical partitioning techniques0.374
G06N5/025Extracting rules from data0.374
G06Q10/087Inventory or stock management  e.g. order filling  procurement  balancing against orders0.373
A61B5/150786Optical identification systems  e.g. bar codes  colour codes0.373
A61B5/155Devices|  specially adapted for continuous or multiple sampling  e.g. at predetermined intervals | devices loaded with multiple lancets simultaneously | (ref: A61B5/15146)0.373
G16H10/40for data related to laboratory analysis  e.g. patient specimen analysis0.373
G16H40/20for the management or administration of healthcare resources or facilities  e.g. managing hospital staff or surgery rooms0.373
G16H15/00ICT specially adapted for medical reports  e.g. generation or transmission thereof0.373
A61B5/15003for venous or arterial blood0.373
A61B5/0022Monitoring a patient using a global network  e.g. telephone networks  internet0.373
A61B5/150854long distance  e.g. between patient's home and doctor's office0.373
H04L45/50using label swapping  e.g. multi-protocol label switch [MPLS]0.373
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)0.373
G06F16/24Querying0.373
G06F16/24575using context0.373
H04L47/00Traffic control in data switching networks | arrangements for detecting or correcting errors in the information received | (ref: H04L1/00)0.373
H04L65/60Network streaming of media packets0.373
H04L67/55Push-based network services0.373
H04L67/1078Resource delivery mechanisms0.373
H04L67/289Intermediate processing functionally located close to the data consumer application  e.g. in same machine  in same home or in same sub-network0.373
H04L41/0823characterised by the purposes of a change of settings  e.g. optimising configuration for enhancing reliability | for optimising operational conditions of wireless networks | (ref: H04W24/02)0.373
H04L41/0869Validating the configuration within one network element0.373
H04L41/5041characterised by the time relationship between creation and deployment of a service0.373
H04L67/5682Policies or rules for updating  deleting or replacing the stored data0.373
H04L67/60Scheduling or organising the servicing of application requests  e.g. requests for application data transmissions using the analysis and optimisation of the required network resources | admission control or resource allocation | (ref: H04L47/70)0.373
G06F15/177Initialisation or configuration control | processor initialisation | (ref: G06F9/4405)0.373
H04L69/03Protocol definition or specification  | protocol conformance testing | (ref: H04L1/244)0.373
G06F9/5055considering software capabilities  i.e. software resources associated or available to the machine0.373
H04L41/0816the condition being an adaptation  e.g. in response to network events0.373
H04L69/04Protocols for data compression  e.g. ROHC0.373
H04L49/00Packet switching elements0.373
H04M7/006Networks other than PSTN/ISDN providing telephone service  e.g. Voice over Internet Protocol (VoIP)   including next generation networks with a packet-switched transport layer | (ref: H04L65/00)|  takes precedence| aspects not specific to the type of network | (ref: H04M3/00)| | special services in those networks | (ref: H04M3/42)0.372
H04L63/1475Passive attacks  e.g. eavesdropping or listening without modification of the traffic monitored0.372
H04L12/185with management of multicast group membership0.372
H04L12/2898Subscriber equipments | DSL modems | (ref: H04M11/062)| | cable modems | (ref: H04L12/2801)0.372
H04L61/5046Resolving address allocation conflicts| Testing of addresses | testing when self-assigning an address | (ref: H04L61/5092)0.372
H04L12/2859Point-to-point connection between the data network and the subscribers | encapsulation | (ref: H04L12/4633)| | virtual LANs | (ref: H04L12/4641)| | routing of packets | (ref: H04L45/00)0.372
H04L67/30Profiles0.372
H04L12/1432Metric aspects0.372
H04L49/9057Arrangements for supporting packet reassembly or resequencing0.372
H04L45/26Route discovery packet0.372
H04L45/06Deflection routing  e.g. hot-potato routing0.372
H04L49/25Routing or path finding in a switch fabric0.372
H04L45/74591using content-addressable memories [CAM]0.372
G06Q20/4014Identity check for transactions0.372
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system0.372
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip0.372
G07F7/1041PIN input keyboard gets new key allocation at each use0.372
G06Q20/4016involving fraud or risk level assessment in transaction processing0.372
G07F7/1083Counting of PIN attempts0.372
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour0.372
G06Q20/40145Biometric identity checks0.372
H04L12/46Interconnection of networks0.371
H04J3/0667Bidirectional timestamps  e.g. NTP or PTP for compensation of clock drift and for compensation of propagation delays | arrangements for monitoring round trip delays in packet switching networks | (ref: H04L43/0864)0.371
H04L9/50using hash chains  e.g. blockchains or hash trees0.371
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC0.371
G06K9/6281Piecewise classification  i.e. whereby each classification requires several discriminant rules0.371
G06K9/6215Proximity measures  i.e. similarity or distance measures0.371
H04L61/4552Lookup mechanisms between a plurality of directories| Synchronisation of directories  e.g. metadirectories0.371
H04L5/1438Negotiation of transmission parameters prior to communication | modified according to link quality | (ref: H04L1/0001)0.371
H04L43/0858One way delays0.370
H04L41/0809Plug-and-play configuration0.370
H04L41/082the condition being updates or upgrades of network functionality0.370
H04L41/0859by keeping history of different configuration generations or by rolling back to previous configuration versions0.370
H04L41/0853by actively collecting configuration information or by backing up configuration information0.370
H04L41/0895Configuration of virtualised networks or elements  e.g. virtualised network function or OpenFlow elements0.370
H04L47/26using explicit feedback to the source  e.g. choke packets0.370
H04L47/263Rate modification at the source after receiving feedback0.370
H04L1/0028Formatting0.370
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]0.370
G06F16/9038Presentation of query results0.370
G06F11/3072where the reporting involves data filtering  e.g. pattern matching  time or event triggered  adaptive or policy-based reporting0.370
H04L65/1106Call signalling protocols| H.323 and related0.369
H04L65/1036at the edge0.369
H04Q3/0025Provisions for signalling0.369
H04M7/1245where a network other than PSTN/ISDN interconnects two PSTN/ISDN networks0.369
H04L65/1083In-session procedures0.369
H04L65/1043Gateway controllers  e.g. media gateway control protocol [MGCP] controllers0.369
H04M7/1255where the switching fabric and the switching logic are decomposed such as in Media Gateway Control0.369
H04L65/1104Session initiation protocol [SIP]0.369
H04Q3/0045involving hybrid  i.e. a mixture of public and private  or multi-vendor systems0.369
H04L65/1026at the edge0.369
H04L65/765intermediate0.369
H04L41/052using standardised network management architectures  e.g. telecommunication management network [TMN] or unified network management architecture [UNMA]0.369
H04L65/1046Call controllers| Call servers0.369
H04W12/03Protecting confidentiality  e.g. by encryption0.369
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding0.369
H04L65/1033Signalling gateways0.369
H04L41/5025by proactively reacting to service quality change  e.g. by reconfiguration after service quality degradation or upgrade0.369
H04L65/1053IP private branch exchange [PBX] functionality entities or arrangements | circuit switched PBXs | (ref: H04M3/00)0.369
G06F15/00Digital computers in general | details | (ref: G06F1/00)|  – | (ref: G06F13/00)| Data processing equipment in general0.369
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself0.369
G06F16/9024Graphs| Linked lists | (ref: G06F16/9027)|  takes precedence0.369
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.369
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics0.369
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals0.369
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)0.369
H04L41/5029Service quality level-based billing  e.g. dependent on measured service level customer is charged more or less0.369
H04L61/4541Directories for service discovery0.369
H04L67/1034Reaction to server failures by a load balancer0.369
H04L67/1006with static server selection  e.g. the same server being selected for a specific client0.369
H04W12/08Access security0.369
G06F16/256in federated or virtual databases0.369
H04L67/1014based on the content of a request0.368
G06F16/9566URL specific  e.g. using aliases  detecting broken or misspelled links0.368
H04L61/301Name conversion0.368
G06F9/4411Configuring for operating with peripheral devices| Loading of device drivers0.368
G06F9/4494data driven0.368
H04L43/0823Errors  e.g. transmission errors0.368
H04L65/40Support for services or applications0.368
G07F17/3223Architectural aspects of a gaming system  e.g. internal configuration  master/slave  wireless communication0.368
G07F17/32for games  toys  sports  or amusements0.368
G07F17/3241Security aspects of a gaming system  e.g. detecting cheating  device integrity  surveillance | computer security | (ref: G06F21/00)0.368
G07F17/3244Payment aspects of a gaming system  e.g. payment schemes  setting payout ratio  bonus or consolation prizes0.368
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.182
H04L2463/141Denial of service attacks against endpoints in a network0.078
Y02D30/50in wire-line communication networks  e.g. low power modes or reduced link rate0.077
H04L2101/663Transport layer addresses  e.g. aspects of transmission control protocol [TCP] or user datagram protocol [UDP] ports0.077
H04L2463/121Timestamp | cryptographic mechanisms or cryptographic arrangements involving time stamps | (ref: H04L9/3297)0.076
H04L43/0888Throughput0.076
H04L2012/5603Access techniques0.076
G06F2221/2129Authenticate client device independently of the user0.076
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.076
H04L43/022by sampling0.072
Y10S706/90Fuzzy logic0.071
H04L2101/604Address structures or formats0.071
H04L2101/668Internet protocol [IP] address subnets0.071
H04L2101/659Internet protocol version 6 [IPv6] addresses0.071
H04L61/45Network directories| Name-to-address mapping0.071
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.071
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.071
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.071
G06F2221/034Test or assess a computer or a system0.070
H04L47/6275based on priority0.070
H04L2463/144Detection or countermeasures against botnets0.069
H04W8/26Network addressing or numbering for mobility support0.068
H04M2215/0104Augmented  consolidated or itemised billing statement  e.g. additional billing information  bill presentation  layout  format  e-mail  fax  printout  itemised bill per service or per account  cumulative billing  consolidated billing0.068
H04M2215/22Bandwidth or usage-sensitve billing0.068
H04W80/04Network layer protocols  e.g. mobile IP [Internet Protocol]0.068
H04M2215/0176Billing arrangements using internet0.068
G06F2221/0706Domain0.068
H04L43/067using time frame reporting0.068
H04L43/14using software  i.e. software packages | network security related monitoring | (ref: H04L63/1408)0.068
H04L2101/622Layer-2 addresses  e.g. medium access control [MAC] addresses0.067
H04L2212/00Encapsulation of packets0.067
H04L41/122of virtualised topologies  e.g. software-defined networks [SDN] or network function virtualisation [NFV]0.067
H04L41/0889Techniques to speed-up the configuration process0.067
H04L43/20the monitoring system or the monitored elements being virtualised  abstracted or software-defined entities  e.g. SDN or NFV0.067
G06N3/088Non-supervised learning  e.g. competitive learning0.067
G06F2221/2113Multi-level security  e.g. mandatory access control0.067
G06F2221/2119Authenticating web pages  e.g. with suspicious links0.067
G06F2221/2101Auditing as a secondary aspect0.067
H04L2463/146Tracing the source of attacks0.067
H04L41/5087wherein the managed service relates to voice services | management of VoIP services | (ref: H04M7/0081)0.066
H04L12/2861Point-to-multipoint connection from the data network to the subscribers0.066
H04L45/021Ensuring consistency of routing table updates  e.g. by using epoch numbers0.066
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.066
H04W4/06Selective distribution of broadcast services  e.g. multimedia broadcast multicast service [MBMS]| Services to user groups| One-way selective calling services0.066
H04W84/042Public Land Mobile systems  e.g. cellular systems0.066
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences0.066
H04L49/20Support for services0.065
H04L49/30Peripheral units  e.g. input or output ports0.065
H04L49/35Switches specially adapted for specific applications0.065
H04L43/0847Transmission error0.065
H04L49/101using crossbar or matrix0.065
H04L2101/69using geographic information  e.g. room number0.065
H04L61/2553Binding renewal aspects  e.g. using keep-alive messages0.065
H04L69/326in the transport layer [OSI layer 4] | (ref: H04L69/16)|  takes precedence0.065
G06F2009/45595Network integration| Enabling network access in virtual machine instances0.065
G06F2009/45591Monitoring or debugging support0.065
G06F2201/81Threshold0.065
Y02D10/00Energy efficient computing  e.g. low power processors  power management or thermal management0.065
G06F11/349for interfaces  buses0.065
H04L41/08Configuration management of networks or network elements | address allocation | (ref: H04L61/50)0.065
H04W80/06Transport layer protocols  e.g. TCP [Transport Control Protocol] over wireless | transmission control protocol/Internet protocol [TCP/IP] or user datagram protocol [UDP] | (ref: H04L69/16)0.065
H04W72/0453the resource being a frequency  carrier or frequency band0.065
H04L1/18Automatic repetition systems  e.g. van Duuren system | | ARQ protocols0.065
H04W84/06Airborne or Satellite Networks | space-based or airborne stations | (ref: H04B7/185)0.065
H04L47/15in relation to multipoint traffic | arrangements for broadcast or multicast in data networks | (ref: H04L12/18)0.065
Y10S707/99956File allocation0.065
Y10S707/99953Recoverability0.065
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.065
Y04S40/00Communication or information technology specific aspects supporting electrical power generation  transmission  distribution or end-user application management0.065
Y04S40/20Information technology specific aspects  e.g. CAD  simulation  modelling  system security0.065
G06F3/0601Interfaces specially adapted for storage systems0.065
G06F3/0673Single storage device0.065
H04L47/803Application aware0.065
G06F2221/2107File encryption0.065
G06F2221/2151Time stamp0.065
G06F3/0635by changing the path  e.g. traffic rerouting  path reconfiguration0.065
H04L49/355Application aware switches  e.g. for HTTP0.065
G06F3/0613in relation to throughput0.065
H04L49/1523Parallel switch fabric planes0.065
G06F11/2087with a common controller0.065
H04L49/351for local area network [LAN]  e.g. Ethernet switches0.065
H04L49/201Multicast operation| Broadcast operation0.065
G06F3/067Distributed or networked storage systems  e.g. storage area networks [SAN]  network attached storage [NAS]0.065
H04L67/1029using data related to the state of servers by a load balancer0.065
H04L67/10015Access to distributed or replicated servers  e.g. using brokers0.065
G06N3/0454using a combination of multiple neural nets0.064
G06F11/2097maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)|  and subgroups0.064
G06F11/1658Data re-synchronization of a redundant component  or initial sync of replacement  additional or spare unit0.064
G06F11/1435using file system or storage system metadata0.064
G06F11/2069Management of state  configuration or failover0.064
G06F11/2056by mirroring0.064
G06F11/1464for networked environments0.064
G06F11/2094Redundant storage or storage space | (ref: G06F11/2056)|  takes precedence0.064
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.064
Y10S707/99936Pattern matching access0.064
H04L2001/0097Relays0.064
H04L1/1835Buffer management0.064
H04L1/1621Group acknowledgement  i.e. the acknowledgement message defining a range of identifiers  e.g. of sequence numbers0.064
H04L2101/64Asynchronous transfer mode [ATM] addresses0.064
H04L12/2836Protocol conversion between an external network and a home network | controlling appliance services of a home automation network from a device located outside the home and the home network | (ref: H04L12/2818)| | protocol conversion | (ref: H04L69/08)| | adaptation of digital video signals for transport over a specific home network | (ref: H04N7/24)0.064
H04N7/15Conference systems0.064
H04L2101/30Types of network names0.064
H04L51/00User-to-user messaging in packet-switching networks  transmitted according to store-and-forward or real-time protocols  e.g. e-mail0.064
H04W84/12WLAN [Wireless Local Area Networks]0.064
H04L47/808User-type aware0.064
G06F2009/45587Isolation or security of virtual machine instances0.064
H04W28/26Resource reservation0.064
H04Q2213/13389LAN  internet0.064
H04Q2213/13216Code signals  frame structure0.064
H04Q2213/13141Hunting for free outlet  circuit or channel0.064
H04Q2213/1305Software aspects0.064
H04Q2213/13176Common channel signaling  CCS70.064
H04Q2213/13204Protocols0.064
H04Q2213/13196Connection circuit/link/trunk/junction  bridge  router  gateway0.064
H04W72/04Wireless resource allocation0.064
H04W72/1247based on priority of the information source or recipient0.064
H04Q2213/13292Time division multiplexing  TDM0.064
H04Q2213/13348Channel/line reservation0.064
H04Q2213/13296Packet switching  X.25  frame relay0.064
H04L12/1836with heterogeneous network architecture0.064
H04Q2213/13166Fault prevention0.064
H04Q2213/13096Digital apparatus individually associated with a subscriber line  digital line circuits0.064
H04Q2213/13097Numbering  addressing0.064
H04L12/189in combination with wireless systems | selective distribution or broadcast in wireless communication networks | (ref: H04W4/06)0.064
H04Q2213/13098Mobile subscriber0.064
H04Q2213/1322PBX0.064
G06F2209/5016Session0.064
H04L12/00Data switching networks | interconnection of  or transfer of information or other signals between  memories  input/output devices or central processing units | (ref: G06F13/00)0.063
H04K2203/18for wireless local area networks or WLAN0.063
G06F11/3466Performance evaluation by tracing or monitoring0.063
H04M2215/0188Network monitoring| statistics on usage on called/calling number0.063
H04M2215/202VoIP| Packet switched telephony0.063
H04L43/103with adaptive polling  i.e. dynamically adapting the polling rate0.063
H04L47/13in a LAN segment  e.g. ring or bus0.063
H04W28/18Negotiating wireless communication parameters0.063
H04W40/02Communication route or path selection  e.g. power-based or shortest path routing0.063
Y02D30/70in wireless communication networks0.063
H04L41/0873Checking configuration conflicts between network elements0.063
H04L67/59Providing operational support to end devices by off-loading in the network or by emulation  e.g. when they are unavailable0.063
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.063
G06F2009/45579I/O management  e.g. providing access to device drivers or storage0.063
G06F2209/502Proximity0.063
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules0.063
G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means  e.g. caches0.063
G06F2221/2127Bluffing0.063
Y10S707/99939Privileged access0.063
G06F2209/508Monitor0.063
G02B2006/12097Ridge  rib or the like0.063
G02B2006/12116Polariser| Birefringent0.063
Y10S707/99931Database or file accessing0.063
Y10S707/99943Generating database or data structure  e.g. via user interface0.063
G06F16/215Improving data quality| Data cleansing  e.g. de-duplication  removing invalid entries or correcting typographical errors0.063
Y10S707/99935Query augmenting and refining  e.g. inexact access0.063
Y10S707/99944Object-oriented database structure0.063
Y10S707/955Object-oriented0.063
Y10S707/99942Manipulating data structure  e.g. compression  compaction  compilation0.063
Y10S707/944Business related0.063
Y10S707/99945Object-oriented database structure processing0.063
H04B2203/5445Local network0.063
H04B2203/5408using protocols0.063
H04L65/1016IP multimedia subsystem [IMS]0.063
G06F2209/506Constraint0.063
Y10S707/99934Query formulation  input preparation  or translation0.063
H04M2215/42Least cost routing  i.e. provision for selecting the lowest cost tariff0.062
H04M2215/82Advice-of-Charge [AOC]  i.e. notify subscriber of charges/cumulative charge| meter at the substation0.062
H04M2215/81Notifying aspects  e.g. notifications or displays to the user0.062
G06F2221/2149Restricted operating environment0.062
H04M2215/7009Account settings  e.g. users  terminals  limits  numbers or payment0.062
G06F2201/86Event-based monitoring0.062
G06F11/0757by exceeding a time limit  i.e. time-out  e.g. watchdogs0.062
H04M2215/54Resellers-retail or service providers billing  e.g. agreements with telephone service operator  activation  charging/recharging of accounts0.062
H04M2215/0108Customization according to wishes of subscriber  e.g. customer preferences  friends and family  selecting services or billing options  Personal Communication Systems [PCS]0.062
H04M2215/0168On line or real-time flexible customization or negotiation according to wishes of subscriber0.062
H04M2215/7045Using Internet or WAP0.062
Y10S707/99938Concurrency  e.g. lock management in shared database0.062
H04L63/0815providing single-sign-on or federations0.062
H04M2215/46Connection to several service providers0.062
H04M2215/018On-line real-time billing  able to see billing information while in communication  e.g. via the internet0.062
H04M2215/8108before establishing a communication0.062
G06F2221/2137Time limited access  e.g. to a computer or data0.062
Y10S379/90Internet  e.g. Internet phone  webphone  internet-based telephony0.062
H04L43/0805by checking availability0.062
H04M2215/8129Type of notification0.062
Y10S707/99937Sorting0.062
Y10S715/969Network layout and operation interface0.062
H04M2215/0164Billing record  e.g. Call Data Record [CDR]  Toll Ticket[TT]  Automatic Message Accounting [AMA]  Call Line Identifier [CLI]  details  i.e. parameters  identifiers  structure0.062
G06F11/328Computer systems status display | (ref: G06F11/327)|  takes precedence0.062
G06F11/202where processing functionality is redundant | redundant communication control functionality | (ref: G06F11/2005)|   redundant storage control functionality | (ref: G06F11/2089)0.062
H04M2215/0152General billing plans  rate plans  e.g. charge rates  numbering plans  rate centers  customer accounts0.062
H04M2215/745Least cost routing  e.g. Automatic or manual  call by call or by preselection0.062
G06F2201/875Monitoring of systems including the internet0.062
H04L45/56Routing software0.062
H04L51/18Commands or executable codes0.062
G06N20/20Ensemble learning0.062
G16H40/67for remote operation0.062
G06F11/2028eliminating a faulty processor or activating a spare0.062
G06F11/1461Backup scheduling policy0.062
G06F11/1662the resynchronized component or unit being a persistent storage device | re-synchronization of failed mirror storage | (ref: G06F11/2082)| | rebuild or reconstruction of parity RAID storage | (ref: G06F11/1008)0.062
G06F11/2005using redundant communication controllers0.062
G06F11/2007using redundant communication media0.062
H04L41/0897by horizontal or vertical scaling of resources  or by migrating entities  e.g. virtual resources or entities0.062
G06F12/0808with cache invalidating means | (ref: G06F12/0815)|  takes precedence0.062
H04L61/4535using an address exchange platform which sets up a session between two nodes  e.g. rendezvous servers  session initiation protocols [SIP] registrars or H.323 gatekeepers0.062
H04W84/14WLL [Wireless Local Loop]| RLL [Radio Local Loop]0.062
H04L61/255Maintenance or indexing of mapping tables0.062
H04L67/53using third party service providers0.062
H04L49/3036Shared queuing0.062
H04L49/3072Packet splitting0.062
H04W12/71Hardware identity0.062
H04L51/08Annexed information  e.g. attachments0.062
G06F2212/657Virtual address space management0.062
Y02D30/00Reducing energy consumption in communication networks0.062
G06F2212/1016Performance improvement0.062
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)0.062
H04L2209/60Digital content management  e.g. content distribution0.062
H04W8/087for preserving data network PoA address despite hand-offs0.062
H04M3/42Systems providing special services or facilities to subscribers | specially adapted for wireless communication networks | (ref: H04W4/00)0.062
H04L2012/6472Internet0.062
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.062
H04L2209/42Anonymization  e.g. involving pseudonyms0.062
H04W12/64using geofenced areas0.062
H04W12/63Location-dependent| Proximity-dependent0.062
H04L12/467Arrangements for supporting untagged frames  e.g. port-based VLANs0.062
H04L41/0266using meta-data  objects or commands for formatting management information  e.g. using eXtensible markup language [XML]0.061
G06F2209/501Performance criteria0.061
H04L2463/142Denial of service attacks against network infrastructure0.061
H04L51/58Message adaptation for wireless communication0.061
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities0.061
G06F13/40Bus structure | for computer networks | (ref: G06F15/163)| | for optical bus networks | (ref: H04B10/25)0.061
G06F2213/0042Universal serial bus [USB]0.061
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.