Validity Report
Full Report
US7779252B2 — Computer architecture for a handheld electronic device with a shared human-machine interface
Priority Date: 2006-03-21, Publication Date: 2010-08-17, Current Assignee: Speir Technologies LtdReport Generated: 2022-01-26

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
US7765399B22.314Computer architecture for a handheld electronic deviceGRANT2010-07-272006-02-2238429894GreatHarris CorpSpeir Technologies Ltd
US7636858B21.189Management of a trusted cryptographic processorGRANT2009-12-222003-12-1137722682GreatIntel CorpIntel Corp
US7802111B11.148System and method for limiting exposure of cryptographic keys protected by a trusted platform moduleGRANT2010-09-212005-04-2742734026GreatOracle America IncOracle America Inc
EP0649546A11.130TRUSTED PATH SUBSYSTEM FOR WORKSTATIONSGRANT1995-04-261992-07-1025431073GreatSecure Computing LLCSecure Computing LLC
US8751818B21.107Method and apparatus for a trust processorGRANT2014-06-102003-12-1134657260GreatIntel CorpIntel Corp
WO2001044899A11.094CRYPTOGRAPHIC TOKEN AND SECURITY SYSTEMAPPLICATION2001-06-211999-12-1325681390Great
EP0732657B11.086Method and apparatus for enciphering and deciphering informationGRANT2002-02-061995-03-148219069GreatUtimaco Safeware AGUtimaco Safeware AG
EP1230777B11.082METHOD AND APPARATUS FOR PROVIDING REDUNDANT AND RESILIENT CRYPTOGRAPHIC SERVICESGRANT2008-10-221999-11-1026860756GreatUnisys CorpUnisys Corp
US20050132226A11.064Trusted mobile platform architectureAPPLICATION2005-06-162003-12-1134657259GreatIntel CorpIntel Corp
EP1218841A21.054ELECTRONIC COMMERCE WITH CRYPTOGRAPHIC AUTHENTICATIONGRANT2002-07-031999-09-2026851727GreatEthentica IncEthentica Inc
EP1280315B11.052Apparatus and method for providing network securityGRANT2007-08-291992-07-318215432GreatMicron Technology IncMicron Technology Inc
EP1580922A21.052Methods and modular cryptographic davice with enhanched communication controlGRANT2005-09-282004-03-2334862044GreatHarris CorpHarris Corp
EP1473869B11.049Universal secure messaging for cryptographic modulesGRANT2006-08-302003-04-2932990354GreatActivIdentity IncActivIdentity Inc
EP1825412A11.038SECURE DATA PARSER METHOD AND SYSTEMGRANT2007-08-292004-10-2535912925GreatSecurity First CorpSecurity First Corp
EP1639743A21.036SECURE DATA PARSER METHOD AND SYSTEMGRANT2006-03-292003-06-1133551325GreatSecurity First CorpSecurity First Corp
EP1952575A21.034SECURE DATA PARSER METHOD AND SYSTEMGRANT2008-08-062005-11-1839344759GreatSecurity First CorpSecurity First Corp
EP1580933A21.032Methods and modular cryptographic device with multi-mode WLAN operationGRANT2005-09-282004-03-2334862035GreatHarris CorpHarris Corp
EP1580934A21.031Methods and modular cryptographic device with enhanced interface protocolGRANT2005-09-282004-03-2334862043GreatHarris CorpHarris Corp
EP0865695A11.028AN APPARATUS AND METHOD FOR CRYPTOGRAPHIC COMPANION IMPRINTINGGRANT1998-09-231995-12-0424264918GreatIntel CorpIntel Corp
EP1480410B11.026System and method for dynamically enabling components to implement data transfer security mechanismsGRANT2019-02-132003-05-2133097984GreatGula Consulting LLCGula Consulting LLC
US5805706A1.026Apparatus and method for re-encrypting data without unsecured exposure of its non-encrypted formatGRANT1998-09-081996-04-1724540224GreatIntel CorpIntel Corp
EP1106000B11.025SECURE PROCESSING FOR AUTHENTICATION OF A WIRELESS COMMUNICATIONS DEVICEGRANT2005-06-221998-08-1922474879GreatQualcomm IncQualcomm Inc
EP1580921A11.019Modular cryptographic device and related methodsGRANT2005-09-282004-03-2334862045GreatHarris CorpHarris Corp
EP1580932A21.013Methods and modular cryptographic device with status determinationGRANT2005-09-282004-03-2334862034GreatHarris CorpHarris Corp
EP1332428B11.006METHOD AND SYSTEM FOR ESTABLISHING A TRUSTED AND DECENTRALIZED PEER-TO-PEER NETWORKGRANT2013-07-312000-11-1024853808GreatDMT Licensing LLCSIGHTSOUND.COM INCORPORATED, DMT Licensing LLC
EP1413157B11.005Method and system for verifying data integrityGRANT2013-11-202001-07-1625420307GreatCerticom CorpCerticom Corp
EP1540628A21.000NETWORK ATTACHED ENCRYPTIONGRANT2005-06-152002-07-1230115910GreatIngrian Networks IncIngrian Networks Inc, Thales DIS CPL USA Inc
EP1387236B11.000Key management system and method for secure data transmissionGRANT2007-05-302002-07-0829999985GreatBroadcom CorpBroadcom Corp
EP0825511A20.998Method and apparatus for trusted processingGRANT1998-02-251996-08-2324820785GreatHewlett Packard CoHP Inc, Cheyenne Property Trust
WO2005020542A10.996METHOD FOR USING TRUSTED  HARDWARE-BASED IDENTITY CREDENTIALS IN RUNTIME PACKAGE SIGNATURE TO SECURE MOBILE COMMUNICATIONS AND HIGH-VALUE TRANSACTION EXECUTIONAPPLICATION2005-03-032003-08-1234135970Great
EP1076280A10.996Communications between modules of a computing apparatusGRANT2001-02-141999-08-138241576GreatHewlett Packard CoHP Inc
US6853988B10.994Cryptographic server with provisions for interoperability between cryptographic systemsGRANT2005-02-081999-09-2034108686GreatSecurity First CorpSecurity First Corp
US7835523B10.992Cryptographic engine abstraction layer for a software defined radioGRANT2010-11-162005-08-2643065901GreatRockwell Collins IncRockwell Collins Inc
US7023998B20.991Cryptographic key processing and storageGRANT2006-04-042001-03-3025237643GreatNokia of America CorpPiece Future Pte Ltd
US7082200B20.988Establishing secure peer networking in trust webs on open networks using shared secret device keyGRANT2006-07-252001-09-0625487894GreatMicrosoft CorpMicrosoft Technology Licensing LLC
EP1595381A10.986SYSTEM AND METHOD OF PROTECTING DATA ON A COMMUNICATION DEVICEGRANT2005-11-162003-02-2832913604GreatResearch in Motion LtdBlackBerry Ltd
EP1355218A20.982Methods and systems for authentication of components in a graphic systemGRANT2003-10-222002-04-1822418498GreatMicrosoft CorpMicrosoft Corp
EP1710758A10.981Portable smart card reader having secure wireless communications capabilityGRANT2006-10-112005-04-0434940704GreatResearch in Motion LtdBlackBerry Ltd
EP1580923A10.978Modular cryptographic device and coupling therefor and related methodsGRANT2005-09-282004-03-2334862042GreatHarris CorpHarris Corp
EP1415231B10.974METHOD AND SYSTEM FOR VISUALISING A LEVEL OF TRUST OF NETWORK COMMUNICATION OPERATIONS AND CONNECTION OF SERVERSGRANT2019-10-162001-08-0725447416GreatNokia Technologies OyNokia Oyj, Nokia Technologies Oy
US7734933B10.971System for providing secure and trusted computing environments through a secure computing moduleGRANT2010-06-082005-06-1742227046GreatRockwell Collins IncRockwell Collins Inc
EP1952253B10.971SYSTEM AND METHOD FOR PROVIDING SECURE DATA TRANSMISSIONGRANT2012-12-262005-10-1237912080GreatBloomberg Finance LPBloomberg Finance LP
EP1592193B10.970Wireless communication device with securely added randomness and related methodGRANT2008-12-242004-04-3034930274GreatResearch in Motion LtdBlackBerry Ltd
US7716720B10.969System for providing secure and trusted computing environmentsGRANT2010-05-112005-06-1742139492GreatRockwell Collins IncRockwell Collins Inc
US6996547B10.968Method for purchasing items over a non-secure communication channelGRANT2006-02-072000-09-2735734337GreatMotorola IncGoogle Technology Holdings LLC
EP1132800A20.967Non-wire contact device application for cryptographic module interfacesGRANT2001-09-122000-03-0824073262GreatRainbow Technologies IncRainbow Technologies Inc, Thales DIS CPL USA Inc
EP1601153B10.965Client authentication using a challenge providerGRANT2010-07-282004-05-2835447305GreatSAP SE SAP SE
EP1161715A10.965COMMUNICATIONS BETWEEN MODULES OF A COMPUTING APPARATUSGRANT2001-12-121999-02-1526153441GreatHewlett Packard CoHP Inc
EP1546896B10.964METHOD AND APPARATUS FOR MULTI-LEVEL SECURITY IMPLEMENTATIONGRANT2013-04-102002-08-2931981100GreatWisterium Development LLCCallahan Cellular LLC
EP1514444B10.962WIRELESS COMMUNICATION SYSTEM  APPARATUS AND METHODGRANT2009-05-062002-06-019937967GreatMotorola Ltd, Motorola IncMotorola Solutions UK Ltd, Motorola Solutions Inc
US8051299B20.961Computer security method and computer systemGRANT2011-11-012006-03-2038519501GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
EP1754126B10.961ENHANCING TRUSTED PLATFORM MODULE PERFORMANCEGRANT2020-05-132004-06-1034971702GreatOracle America IncOracle America Inc
EP1370084A10.959System for protecting security registers and method thereofGRANT2003-12-102002-05-2929549246GreatATI Technologies ULCATI Technologies ULC
EP1782650B10.957METHOD AND SYSTEM FOR IMPROVING ROBUSTNESS OF SECURE MESSAGING IN A MOBILE COMMUNICATIONS NETWORKGRANT2009-10-072004-07-2234958331GreatTelecom Italia SpATelecom Italia SpA
EP0435094A20.954Uniform interface for cryptographic servicesGRANT1991-07-031989-12-2723817457GreatMotorola IncMotorola Solutions Inc
EP1634139A10.953SECURING ACCESS TO AN APPLICATION SERVICE BASED ON A PROXIMITY TOKENGRANT2006-03-152003-06-0533489801GreatSAP SE SAP SE
EP1908210B10.953TRUSTED CRYPTOGRAPHIC PROCESSORGRANT2018-09-052005-07-0537605228GreatViasat IncViasat Inc
EP1788507A20.952Electronic transaction terminal capable of operating in secure and non-secure mode  and method adapted to the deviceGRANT2007-05-232005-11-1637814227GreatCompagnie Industrielle et Financiere dIngenierie Ingenico SAIngenico Group SA
US7103782B10.951Secure memory and processing system having laser-scribed encryption keyGRANT2006-09-052000-09-2736939634GreatMotorola IncGoogle Technology Holdings LLC
US8458801B20.950High-assurance secure boot content protectionGRANT2013-06-042004-07-3035733758GreatSafeNet IncThales DIS CPL USA Inc
EP1203278B10.946ENFORCING RESTRICTIONS ON THE USE OF STORED DATAGRANT2012-02-081999-08-1326153560GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
EP1846863B10.945HARDWARE MULTIMEDIA ENDPOINT AND PERSONAL COMPUTERGRANT2010-04-212005-10-3136694278GreatNero AGNero AG
EP1536306A10.945Proximity authentication systemGRANT2005-06-012003-09-3034467949GreatBroadcom CorpNXP BV, Broadcom Corp
EP1579620A10.941SYSTEM AND METHOD FOR SECURELY INSTALLING A CRYPTOGRAPHIC SYSTEM ON A SECURE DEVICEGRANT2005-09-282002-11-2732325429GreatNokia OyjNokia Oyj
EP1488583B10.940SYSTEM AND METHOD FOR TRANSMITTING AND UTILIZING ATTACHMENTSGRANT2009-10-072002-03-2028042033GreatResearch in Motion LtdBlackBerry Ltd
EP1725924A10.939DEVICE WITH  A CRYPTOGRAPHIC COPROCESSORGRANT2006-11-292004-03-1934962060GreatNokia OyjNokia Oyj, Nokia Technologies Oy
EP0932953B10.937BIOS PROTECTED BY A SECURITY PROCESSORGRANT2004-10-131996-09-3024909346GreatIntel CorpIntel Corp
EP1834328B10.936RENDERING DISK DATA UNRECOVERABLE USING ENCRYPTIONGRANT2014-11-192004-12-1436143742GreatNetApp IncNetApp Inc
US7363491B20.936Resource management in security enhanced processorsGRANT2008-04-222004-03-3135426774GreatIntel CorpIntel Corp
EP1343321A10.934Methods and systems for cryptographically protecting secure content in video memoryGRANT2003-09-102001-12-0427383184GreatMicrosoft CorpMicrosoft Corp
EP1952298A20.934MOBILE SECURITY SYSTEM AND METHODGRANT2008-08-062005-11-1837872442GreatQualcomm IncQualcomm Inc
EP1437026B10.933METHOD AND APPARATUS FOR PROVIDING PRIVACY OF USER IDENTITY AND CHARACTERISTICS IN A COMMUNICATION SYSTEMGRANT2010-05-052001-10-1625528373GreatQualcomm IncQualcomm Inc
EP1580953B10.927System and method for viewing message attachmentsGRANT2011-02-092004-03-2234854579GreatResearch in Motion LtdBlackBerry Ltd
EP1535444B10.927SYSTEM AND METHOD FOR SECURE CONTROL OF RESOURCES OF WIRELESS MOBILE COMMUNICATION DEVICESGRANT2013-04-172002-08-1931888326GreatResearch in Motion LtdBlackBerry Ltd
EP1224516A10.926TRUSTED COMPUTING PLATFORM FOR RESTRICTING USE OF DATAGRANT2002-07-241999-09-2510861565GreatHewlett Packard CoHP Inc
EP1728376A10.926METHOD  APPARATUSES AND COMPUTER PROGRAM PRODUCT FOR SHARING CRYPTOGRAPHIC KEY WITH AN EMBEDDED AGENT ON A NETWORK ENDPOINT IN A NETWORK DOMAINGRANT2006-12-062004-03-2434963516GreatIntel CorpIntel Corp
US20060195907A10.925Data processing deviceAPPLICATION2006-08-312004-12-2335841177GreatInfineon Technologies AGInfineon Technologies AG
EP1300987B10.924An integrated circuit architecture for programmable wireless devicesGRANT2005-09-072001-10-0225516206GreatAgilent Technologies IncAgilent Technologies Inc
EP1224518A10.921TRUSTED COMPUTING PLATFORM WITH BIOMETRIC AUTHENTICATIONGRANT2002-07-241999-10-0810862343GreatHewlett Packard CoHP Inc
US6092202A0.919Method and system for secure transactions in a computer systemGRANT2000-07-181998-05-2222182757GreatN*Able Tech IncN able Technologies Inc, N*Able Tech Inc, ESW Holdings Inc
EP0689120A10.915Isolation of non-secure software from secure software to limit virus infectionGRANT1995-12-271994-06-2223003500GreatAT&T CorpAT&T Corp
EP1792433A20.915SYSTEM AND METHOD FOR CREATING A SECURITY APPLICATION FOR PROGRAMMABLE CRYPTOGRAPHY MODULEGRANT2007-06-062004-08-2536035584GreatHarris CorpHarris Corp
US6378072B10.914Cryptographic systemGRANT2002-04-231998-02-0321784383GreatCompaq Computer CorpMicro Focus LLC
EP1300842B10.914Method and system for authorized decryption of encrypted data using at least two certificatesGRANT2007-07-252001-10-058178867GreatVIRTUAL PAPER EMEDIA SOLUTIONS GMBHVIRTUAL PAPER EMEDIA SOLUTIONS GMBH
EP1629624A20.913AN IN-CURCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATAGRANT2006-03-012003-05-3033511627GreatPrivaris IncPrivaris Inc
EP1655920A20.910User authentication systemGRANT2006-05-102004-10-2035998390GreatBroadcom CorpBroadcom Corp
EP1633155B10.903System and method for generating a secure state indicator on a displayGRANT2007-04-042004-09-0334929537GreatResearch in Motion LtdBlackBerry Ltd
EP1674963A10.903Secure license managementGRANT2006-06-282004-12-2235966461GreatSAP SE SAP SE
EP1076279A10.900Computer platforms and their methods of operationGRANT2001-02-141999-08-138241575GreatHewlett Packard CoHP Inc
US6457125B10.899Encrypted download of SRAM-based FPGAsGRANT2002-09-241998-12-1422789156GreatCompaq Computer CorpHewlett Packard Enterprise Development LP
EP0606401B10.898APPARATUS AND METHOD FOR PROVIDING NETWORK SECURITYGRANT2002-10-021992-07-3122231270GreatMicron Technology IncMicron Technology Inc
EP1563663B10.897SYSTEM AND METHOD OF CONNECTION CONTROL FOR WIRELESS MOBILE COMMUNICATION DEVICESGRANT2008-10-012002-11-0832312861GreatResearch in Motion LtdBlackBerry Ltd
EP1159662B10.897SMARTCARD USER INTERFACE FOR TRUSTED COMPUTING PLATFORMGRANT2004-01-141999-03-0526315223GoodHewlett Packard CoHP Inc
EP1394982B10.895Methods and apparatus for secure data communication linksGRANT2006-10-112002-08-309943244GoodToshiba CorpToshiba Corp
EP1692622B10.894INTER-PROCESSOR PARAMETER MANAGEMENT IN A MULTIPLE-PROCESSOR WIRELESS MOBILE COMMUNICATION DEVICE OPERATING ON A PROCESSOR SPECIFIC COMMUNICATION NETWORKGRANT2008-05-212003-12-0234652441GoodResearch in Motion LtdBlackBerry Ltd
EP1880368A10.892IMPLEMENTATION OF AN INTEGRITY-PROTECTED SECURE STORAGEGRANT2008-01-232005-05-1337396218GoodNokia OyjNokia Oyj, Nokia Technologies Oy
EP1501330B10.889Security for a mobile communications deviceGRANT2009-04-012003-07-2227772434GoodResearch in Motion LtdBlackBerry Ltd
EP1661356B10.887SYSTEM AND METHOD OF ACCESSING KEYS FOR SECURE MESSAGINGGRANT2008-07-092003-08-1234135337GoodResearch in Motion LtdBlackBerry Ltd
EP1454503B10.887STORING AND ACCESSING DATA IN A MOBILE DEVICE AND A USER MODULEGRANT2007-05-092001-12-047707903GoodGiesecke and Devrient GmbHGiesecke and Devrient GmbH
EP1004101B10.885TERMINAL AND SYSTEM FOR IMPLEMENTING SECURE ELECTRONIC TRANSACTIONSGRANT2002-02-271998-05-229526602GoodActivCard SAActivIdentity Inc
US7539421B20.884Self-contained secure videoconferencing consoleGRANT2009-05-262002-12-1132600092GoodCRITICOM Critical Communication3E Technologies International Inc
EP1775923B10.884Audio management in a dual processor environmentGRANT2009-04-152005-10-1435911088GoodResearch in Motion LtdBlackBerry Ltd
US7058818B20.883Integrated circuit for digital rights managementGRANT2006-06-062002-08-0831715727GoodSanDisk IL LtdWestern Digital Israel Ltd
EP1512057B10.882TRUSTED USER INTERFACE FOR A SECURE MOBILE WIRELESS DEVICEGRANT2010-01-062002-05-289937593GoodNokia OyjNokia Oyj, Symbian Ltd
EP1329787B10.878Secure mode indicator for smart phone or PDAGRANT2019-08-282002-01-1633303962GoodTexas Instruments France SAS, Texas Instruments IncTexas Instruments France SAS, Texas Instruments Inc
EP1410601A10.876SYSTEM AND METHOD FOR SECURE MESSAGE KEY CACHING IN A MOBILE COMMUNICATION DEVICEGRANT2004-04-212001-07-1023176341GoodResearch in Motion LtdBlackBerry Ltd
US20060198515A10.876Secure disc drive electronics implementationAPPLICATION2006-09-072005-03-0336944153GoodSeagate Technology LLCSeagate Technology LLC
EP1745589B10.875System and method for configuring devices for secure operationsGRANT2014-07-162004-04-3035242000GoodBlackBerry LtdBlackBerry Ltd
EP1483873B10.873SYSTEM AND METHOD FOR INDICATING THE SIGNATURE AND TRUST STATUS OF A SECURE MESSAGEGRANT2006-11-022002-03-0127789588GoodResearch in Motion LtdBlackBerry Ltd
US9264426B20.872System and method for authentication via a proximate deviceGRANT2016-02-162004-12-2036597572GoodBroadcom CorpNXP BV
EP1869886B10.871SECURE CONDITIONAL ACCESS AND DIGITAL RIGHTS MANAGEMENT IN MULTIMEDIA PROCESSORGRANT2020-09-022005-04-0636694576GoodAvago Technologies International Sales Pte LtdAvago Technologies International Sales Pte Ltd, Broadcom Corp
EP1788505A10.870System and method for application program operation on a wireless deviceGRANT2007-05-232005-11-2136282608GoodResearch in Motion LtdBlackBerry Ltd
EP1411709B10.865System and method of security function activation for a mobile electronic deviceGRANT2009-07-222002-10-1732043444GoodResearch in Motion LtdBlackBerry Ltd
EP1826694B10.861Method and system for secure system-on-a-chip architecture for multimedia data processingGRANT2014-08-062006-02-2738180192GoodBroadcom CorpBroadcom Corp
EP1031909B10.859A system and method for manipulating a computer file and/or programGRANT2005-12-141999-02-2322972212GoodSightsoundcom IncDMT Licensing LLC
US20030046561A10.859Non-algebraic cryptographic architectureAPPLICATION2003-03-062001-08-3123227115Good
US6990587B20.858Cryptographic architecture for secure  private biometric identificationGRANT2006-01-242001-04-1325267307GoodSymbol Technologies LLCSymbol Technologies LLC
EP0696397B10.858DIGITAL RADIO TRANSCEIVER WITH ENCRYPTED KEY STORAGEGRANT2003-05-211994-02-2822751072GoodEricsson IncEricsson Inc
EP1654850A10.858SYSTEM AND METHOD OF INDICATING THE STRENGTH OF ENCRYPTIONGRANT2006-05-102003-08-1234135351GoodResearch in Motion LtdBlackBerry Ltd
US6151677A0.855Programmable telecommunications security module for key encryption adaptable for tokenless useGRANT2000-11-211998-10-0622606322GoodL3 Communications CorpL3 Technologies Inc
EP0828208B10.853Application certification for an international cryptography frameworkGRANT2003-04-161996-08-2324820781GoodCheyenne Property TrustCheyenne Property Trust
EP1410600A20.852A SYSTEM AND METHOD FOR SUPPORTING MULTIPLE CERTIFICATE AUTHORITIES ON A MOBILE COMMUNICATION DEVICEGRANT2004-04-212001-07-1623181798GoodResearch in Motion LtdBlackBerry Ltd
EP1718048B10.849Secure communications system comprising a mobile encryption/decryption unit  a fixed communications unit and a clip-on module attachable to the mobile encryption/decryption unitGRANT2010-01-202005-04-2634935745GoodSectra Communications ABSectra Communications AB
US7302585B10.847System for providing a trustworthy user interfaceGRANT2007-11-271999-05-288241417GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
EP1545084B10.847System and method for digital rights managementGRANT2011-06-012003-12-1834828551GoodResearch in Motion LtdBlackBerry Ltd
EP1905191B10.846NETWORK USER AUTHENTICATION SYSTEM AND METHODGRANT2014-09-032005-07-2037669580GoodVerimatrix IncVerimatrix Inc
EP0851335B10.844Secure two-piece user authentication in a computer networkGRANT2003-10-291996-12-3125102373GoodCompaq Computer CorpCompaq Computer Corp
WO1998015086A10.843SECURE BOOTAPPLICATION1998-04-091996-09-3024901262Good
EP1743246A10.842SYSTEM AND METHOD FOR CONTENT PROTECTION ON A COMPUTING DEVICEGRANT2007-01-172004-04-3035241852GoodResearch in Motion LtdBlackBerry Ltd
US5283828A0.841Architecture for utilizing coprocessing systems to increase performance in security adapted computer systemsGRANT1994-02-011991-03-0126694000GoodHughes Training IncRaytheon Co
US8473754B20.840Hardware-facilitated secure software execution environmentGRANT2013-06-252006-02-2239344774GoodVirginia Tech Intellectual Properties Inc, MacAulay Brown IncVirginia Tech Intellectual Properties Inc, MacAulay Brown Inc
EP1745588B10.837SYSTEM AND METHOD FOR OBTAINING CERTIFICATE STATUS OF SUBKEYSGRANT2009-04-082004-04-3035241997GoodResearch in Motion LtdBlackBerry Ltd
EP1665626A10.836SYSTEM AND METHOD FOR SECURING WIRELESS DATAGRANT2006-06-072003-08-2534216131GoodResearch in Motion LtdBlackBerry Ltd
EP1803249B10.835SYSTEM AND METHOD FOR PROTECTING MASTER ENCRYPTION KEYSGRANT2010-04-072005-10-1437942245GoodResearch in Motion LtdBlackBerry Ltd
EP1743447B10.834CHALLENGE RESPONSE SYSTEM AND METHODGRANT2009-03-252004-05-0435241998GoodResearch in Motion LtdBlackBerry Ltd
EP1574001B10.833SYSTEM AND METHOD OF SECURE AUTHENTICATION INFORMATION DISTRIBUTIONGRANT2011-04-132002-12-0932511601GoodResearch in Motion LtdBlackBerry Ltd
EP1085396A10.829Operation of trusted state in computing platformGRANT2001-03-211999-09-178241625GoodHewlett Packard CoHP Inc, Hewlett Packard Development Co LP, Hewlett Packard Enterprise Development LP
EP1417814B10.827SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGESGRANT2008-10-292001-08-0623202023GoodResearch in Motion LtdBlackBerry Ltd
US20030021417A10.826Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted dataAPPLICATION2003-01-302000-10-2029548293GoodERUCES IncCentral Valley Administrators, Farrukh Abdallah Dr, ERUCES Inc
US7861097B20.821Secure implementation and utilization of device-specific security dataGRANT2010-12-282002-10-3132230364GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
EP1633094B10.818Multiple-stage system and method for processing encoded messagesGRANT2007-03-282001-10-2535809979GoodResearch in Motion LtdBlackBerry Ltd
US8327448B20.817Protected clock management based upon a non-trusted persistent time sourceGRANT2012-12-042005-06-2236974706GoodIntel CorpIntel Corp
US7194623B10.817Data event logging in computing platformGRANT2007-03-201999-05-288241419GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
EP1741245B10.816SYSTEM AND METHOD FOR HANDLING SECURE MESSAGESGRANT2012-11-282004-04-3035242024GoodResearch in Motion LtdBlackBerry Ltd
US7210034B20.816Distributed control of integrity measurement using a trusted fixed tokenGRANT2007-04-242003-01-3032770672GoodIntel CorpIntel Corp
US7698552B20.814Launching a secure kernel in a multiprocessor systemGRANT2010-04-132004-06-0333419035GoodIntel CorpIntel Corp
EP2023263B10.814Method and system for supporting portable authenticators on electronic devicesGRANT2013-02-272003-04-079956344GoodResearch in Motion LtdBlackBerry Ltd
EP1745593B10.814SYSTEM AND METHOD FOR CHECKING DIGITAL CERTIFICATESGRANT2009-12-022004-04-3035242005GoodResearch in Motion LtdBlackBerry Ltd
US20060078109A10.807Information processing apparatus  information processing method  and programAPPLICATION2006-04-132004-10-0835457528GoodFelica Networks IncFelica Networks Inc
EP1754157B10.802CONTENT PROTECTION TICKET METHOD AND DEVICEGRANT2013-05-222004-04-3035241850GoodResearch in Motion LtdBlackBerry Ltd
US6038551A0.801System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computerGRANT2000-03-141996-03-1124596058GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6401208B20.799Method for BIOS authentication prior to BIOS executionGRANT2002-06-041998-07-1722376749GoodIntel CorpIntel Corp
US6662020B10.798Arrangement for effecting secure transactions in a communication deviceGRANT2003-12-091999-08-2720416775GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US5970147A0.798System and method for configuring and registering a cryptographic deviceGRANT1999-10-191997-09-3025471518GoodIntel CorpMicron Technology Inc
EP1613104B10.795Methods and apparatus for automatically recording push-to-talk (PTT) voice communicationsGRANT2007-01-102004-06-3034930451GoodResearch in Motion LtdBlackBerry Ltd
US4386233A0.794Crytographic key notarization methods and apparatusGRANT1983-05-311980-09-2922708385GoodCOMMERCE United States, Secretary ofCOMMERCE United States, Secretary of
EP0848315B10.791Securely generating a computer system password by utilizing an external encryption algorithmGRANT2010-03-101996-12-1325075925GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
EP0680171A20.789Low power security mode for a cellular telephoneGRANT1995-11-021994-04-2822882854GoodMotorola IncMotorola Solutions Inc
US7269736B20.787Distributed cryptographic methods and arrangementsGRANT2007-09-112001-02-2825170219GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8621242B20.781Display of a verification image to confirm securityGRANT2013-12-312004-06-1143880199GoodARM LtdARM Ltd
US7940932B20.780Methods  apparatus  and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processorGRANT2011-05-102004-04-0836585458GoodTexas Instruments IncTexas Instruments Inc
EP1754158B10.775METHOD AND APPARATUS FOR HANDLING PERIPHERAL CONNECTIONS TO MOBILE DEVICESGRANT2013-11-272004-04-3035241851GoodBlackBerry LtdBlackBerry Ltd
US7490065B10.774Cryptographic module for secure processing of value-bearing itemsGRANT2009-02-101999-10-1827575015GoodStamps com IncStamps com Inc
US20040243836A10.774Hierarchical trusted code for content protection in computersAPPLICATION2004-12-021999-04-0632823624GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6209099B10.767Secure data processing method and systemGRANT2001-03-271996-12-1810804616GoodNCR CorpNCR Corp
EP1654828B10.766SYSTEM AND METHOD FOR SENDING SECURE MESSAGESGRANT2018-09-052004-05-0535242001GoodBlackBerry LtdBlackBerry Ltd
US7681046B10.759System with secure cryptographic capabilities using a hardware specific digital secretGRANT2010-03-162003-09-2641819638GoodIntellectual Ventures Funding LLCIntellectual Ventures Holding 81 LLC
US7421583B10.758System  method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereofGRANT2008-09-022000-06-1939718490GoodXerox CorpXerox Corp
US7216110B10.752Cryptographic module for secure processing of value-bearing itemsGRANT2007-05-081999-10-1827578597GoodStamps com IncStamps com Inc
US7590864B20.749Trusted patching of trusted codeGRANT2009-09-152004-05-2135376598GoodIntel CorpIntel Corp
US6990468B10.748System  method and article of manufacture for cryptoserver-based auctionGRANT2006-01-242000-06-1935614132GoodXerox CorpGoogle LLC
US6938154B10.748System  method and article of manufacture for a cryptographic key infrastructure for networked devicesGRANT2005-08-302000-06-1934860566GoodXerox CorpCisco Technology Inc
US7236956B10.746Role assignments in a cryptographic module for secure processing of value-bearing itemsGRANT2007-06-261999-10-1838178859GoodStamps com IncStamps com Inc
US7322042B20.738Secure and backward-compatible processor and secure software execution thereonGRANT2008-01-222003-02-0732824069GoodBroadOn Communications CorpSamsung Electronics Co Ltd
US6868406B10.737Auditing method and system for an on-line value-bearing item printing systemGRANT2005-03-151999-10-1834280305GoodStamps com IncStamps com Inc
US7051199B10.736System  method and article of manufacture for providing cryptographic services utilizing a networkGRANT2006-05-232000-06-1936423998GoodXerox CorpCisco Technology Inc
US7624283B20.730Protocol for trusted platform module recovery through context checkpointingGRANT2009-11-242006-02-1338370145GoodInternational Business Machines CorpInternational Business Machines Corp
US8112787B20.728System and method for securing a credential via user and server verificationGRANT2012-02-072005-12-3138606226GoodBroadcom CorpNXP BV
US8769307B20.720Secure operation indicatorGRANT2014-07-012004-06-1134930400GoodARM LtdARM Ltd
US20030200405A10.720Page granular curtained memory via mapping controlAPPLICATION2003-10-232002-04-1729214621GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20060059372A10.717Integrated circuit chip for encryption and decryption having a secure mechanism for programming on-chip hardwareAPPLICATION2006-03-162004-09-1035079459GoodInternational Business Machines CorpInternational Business Machines Corp
US7512398B20.715Authenticating data units of a mobile communications deviceGRANT2009-03-312005-08-2337546821GoodAgere Systems LLCAvago Technologies International Sales Pte Ltd
US20060117177A10.714Programmable security platformAPPLICATION2006-06-012004-11-2936568514GoodBroadcom CorpBroadcom Corp
US7818574B20.714System and method for providing dynamically authorized access to functionality present on an integrated circuit chipGRANT2010-10-192004-09-1036035460GoodInternational Business Machines CorpInternational Business Machines Corp
US8001377B20.714Methods and apparatus for secure data processing and transmissionGRANT2011-08-162004-11-1235709177GoodSony Computer Entertainment IncSony Interactive Entertainment Inc, Sony Network Entertainment Platform Inc
US5164988A0.714Method to establish and enforce a network cryptographic security policy in a public key cryptosystemGRANT1992-11-171991-10-3125137973GoodInternational Business Machines CorpInternational Business Machines Corp
US5815571A0.713Computer system with secured data paths and method of protectionGRANT1998-09-291996-10-2824953296Good
US7440572B20.713Secure wireless LAN device and associated methodsGRANT2008-10-212001-01-1625059652GoodHarris CorpStingray Ip Solutions LLC
US5224166A0.712System for seamless processing of encrypted and non-encrypted data and instructionsGRANT1993-06-291992-08-1125456876GoodInternational Business Machines CorpInternational Business Machines Corp
US6076162A0.708Certification of cryptographic keys for chipcardsGRANT2000-06-131997-01-227817967GoodInternational Business Machines CorpInternational Business Machines Corp
US7567940B10.708Method and apparatus for on-line value-bearing item systemGRANT2009-07-281999-10-1827496410GoodStamps com IncStamps com Inc
US7028149B20.708System and method for resetting a platform configuration registerGRANT2006-04-112002-03-2928453244GoodIntel CorpIntel Corp
US8121296B20.708Method and apparatus for security in a data processing systemGRANT2012-02-212001-03-2826959993GoodQualcomm IncQualcomm Inc
US20060059373A10.706Integrated circuit chip for encryption and decryption using instructions supplied through a secure interfaceAPPLICATION2006-03-162004-09-1036035476GoodInternational Business Machines CorpInternational Business Machines Corp
EP1806660B10.706Audio deviceGRANT2012-02-012005-11-2635601272GoodWolfson Microelectronics PLCCirrus Logic International UK Ltd
US6711263B10.705Secure distribution and protection of encryption key informationGRANT2004-03-231999-05-0720415516GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US7797544B20.705Attesting to establish trust between computer entitiesGRANT2010-09-142003-12-1134653278GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7392398B10.705Method and apparatus for protection of computer assets from unauthorized accessGRANT2008-06-242000-06-0539530116GoodATI International SRLATI Technologies ULC
EP3101884B10.704COMMUNICATIONS SYSTEM PROVIDING AUTOMATIC TEXT-TO-SPEECH CONVERSION FEATURES AND RELATED METHODSGRANT2020-07-222004-03-0134746132GoodBlackBerry LtdBlackBerry Ltd
US7069447B10.704Apparatus and method for secure data storageGRANT2006-06-272001-05-1136600668GoodCORDER ENGINEERING IncSoteria Encryption Ii LLC
EP1791336B10.703Digital audio device and methodGRANT2013-02-272005-11-2635601273GoodWolfson Microelectronics PLCCirrus Logic International UK Ltd
US20060059369A10.702Circuit chip for cryptographic processing having a secure interface to an external memoryAPPLICATION2006-03-162004-09-1034979608GoodInternational Business Machines CorpInternational Business Machines Corp
US7600166B10.701Method and system for providing trusted access to a JTAG scan interface in a microprocessorGRANT2009-10-062005-06-2837680426GoodIntellectual Ventures Funding LLCHd Silicon Solutions LLC
US20060059574A10.700System for securely configuring a field programmable gate array or other programmable hardwareAPPLICATION2006-03-162004-09-1036035612GoodInternational Business Machines CorpInternational Business Machines Corp
US7047405B20.696Method and apparatus for providing secure processing and data storage for a wireless communication deviceGRANT2006-05-162001-04-0525247413GoodQualcomm IncQualcomm Inc
US7653727B20.696Cooperative embedded agentsGRANT2010-01-262004-03-2434991452GoodIntel CorpIntel Corp
US20050204155A10.696Tamper resistant secure architectureAPPLICATION2005-09-152004-03-0934919775GoodNEC Laboratories America IncNEC Laboratories America Inc
US7313679B20.694Extended trusted computing baseGRANT2007-12-252003-10-1734521188GoodIntel CorpIntel Corp
US5142578A0.691Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectorsGRANT1992-08-251991-08-2225009319GoodInternational Business Machines CorpInternational Business Machines Corp
US7774619B20.687Secure code execution using external memoryGRANT2010-08-102004-11-1736387820GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US5210795A0.685Secure user authentication from personal computerGRANT1993-05-111992-01-1025226608GoodDigital Equipment CorpHewlett Packard Development Co LP
US20050275661A10.682Displaying a trusted user interface using background imagesAPPLICATION2005-12-152004-06-1035460053GoodIntel CorpIntel Corp
US6289454B10.680Memory configuration which support multiple cryptographical algorithmsGRANT2001-09-111998-06-2922314464GoodVLSI Technology IncIII Holdings 6 LLC
US6327652B10.680Loading and identifying a digital rights management operating systemGRANT2001-12-041998-10-2626803068GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8924728B20.680Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive informationGRANT2014-12-302004-11-3036568515GoodIntel CorpIntel Corp
US4918728A0.669Data cryptography operations using control vectorsGRANT1990-04-171989-08-3023587962GoodInternational Business Machines CorpInternational Business Machines Corp
US20060059368A10.667System and method for processing by distinct entities securely configurable circuit chipsAPPLICATION2006-03-162004-09-1036035474GoodInternational Business Machines CorpInternational Business Machines Corp
US7222062B20.664Method and system to support a trusted set of operational environments using emulated trusted hardwareGRANT2007-05-222003-12-2334679061GoodIntel CorpIntel Corp
US20030194094A10.662System and method for secure storage data using a keyAPPLICATION2003-10-161998-10-2628793850GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9198224B20.662Cellular modem processingGRANT2015-11-242003-10-0934422601GoodNorth Star Innovations IncNorth Star Innovations Inc
US20050137889A10.661Remotely binding data to a user deviceAPPLICATION2005-06-232003-12-1834677845GoodIntel CorpMarvell International Ltd
US20040003321A10.658Initialization of protected systemAPPLICATION2004-01-012002-06-2729779527GoodIntel CorpIntel Corp
US7574604B20.658Network device registrationGRANT2009-08-112003-03-0437452689GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US5923759A0.657System for securely exchanging data with smart cardsGRANT1999-07-131995-04-2023689333GoodDe la Rue Card Systems IncDe la Rue Card Systems Inc
US6141756A0.656Apparatus and method of reading a program into a processorGRANT2000-10-311998-04-2722073768GoodMotorola IncMotorola Solutions Inc
US5365591A0.653Secure cryptographic logic arrangementGRANT1994-11-151993-10-2922502327GoodMotorola IncGeneral Dynamics Mission Systems Inc
US11017097B20.652Systems and methods for prevention of unauthorized access to resources of an information systemGRANT2021-05-252004-05-1463916699Good
US7697691B20.650Method of delivering Direct Proof private keys to devices using an on-line serviceGRANT2010-04-132004-07-1435599441GoodIntel CorpIntel Corp
US7693277B20.650Generating digital signatures using ephemeral cryptographic keyGRANT2010-04-062005-01-0736653274GoodFirst Data CorpFirst Data Corp
US20090320048A10.649TASK FOLLOWING BETWEEN MULTIPLE OPERATING SYSTEMSAPPLICATION2009-12-242002-11-189948046GoodARM LtdARM Ltd
EP0635790A10.648Client/server based secure timekeeping systemGRANT1995-01-251993-07-2222255621GoodInternational Business Machines CorpInternational Business Machines Corp
US7496347B20.646Method and apparatus for providing secure wireless communicationGRANT2009-02-242004-11-1236337255GoodVelocita Wireless LLCVelocita Wireless LLC
US6988205B20.646Method and apparatus for the secure storage of audio signalsGRANT2006-01-171997-08-1925433995GoodWalker Digital LLCRPX Corp
US20030084346A10.643Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environmentAPPLICATION2003-05-012001-11-0121929171GoodIntel CorpIntel Corp
US7606560B20.643Authentication services using mobile deviceGRANT2009-10-202002-08-0836636465GoodFujitsu LtdPCMS Holdings Inc
EP1839261A20.642BINDING A DEVICE TO A COMPUTERGRANT2007-10-032005-01-1936685116GoodMicrosoft CorpMicrosoft Corp, Microsoft Technology Licensing LLC
US7363493B20.641Method for protecting computer programs and data from hostile codeGRANT2008-04-222001-01-1926077221GoodAntimalware LtdBufferzone Security Ltd
US7240037B10.640Method and apparatus for digitally signing an advertisement area next to a value-bearing itemGRANT2007-07-031999-10-1838196893GoodStamps com IncStamps com Inc
US7853531B20.640Method and apparatus for supporting multiple trust zones in a digital rights management systemGRANT2010-12-142001-06-0723140679GoodContentguard Holdings IncContentguard Holdings Inc
US5802178A0.639Stand alone device for providing security within computer networksGRANT1998-09-011996-07-3024764773GoodITT Industries IncRound Rock Research LLC
US20060253894A10.638Mobility device platformAPPLICATION2006-11-092004-04-3037395446GoodREALM SYSTEMS IncINAURA Inc
US5615263A0.638Dual purpose security architecture with protected internal operating systemGRANT1997-03-251995-01-0623456119GoodVLSI Technology IncIntellectual Ventures II LLC
US20050108532A10.637Method and system to provide a trusted channel within a computer system for a SIM deviceAPPLICATION2005-05-192003-11-1734574323GoodIntel CorpIntel Corp
US7552326B20.637Use of kernel authorization data to maintain security in a digital processing systemGRANT2009-06-232004-07-1535600822GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US7568102B20.636System and method for authorizing the use of stored information in an operating systemGRANT2009-07-282004-07-1535600824GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US5740248A0.635Software level touchpoints for an international cryptography frameworksGRANT1998-04-141996-11-1225007943GoodCheyenne Property TrustCheyenne Property Trust
US20080022136A10.634Encryption load balancing and distributed policy enforcementAPPLICATION2008-01-242005-02-1838972761GoodProtegrity CorpProtegrity Corp
US7792303B20.634Method of delivering direct proof private keys to devices using a distribution CDGRANT2010-09-072004-07-1435599438GoodIntel CorpIntel Corp
US6327660B10.628Method for securing communications in a pre-boot environmentGRANT2001-12-041998-09-1822558744GoodIntel CorpIntel Corp
US6081895A0.626Method and system for managing data unit processingGRANT2000-06-271997-10-1025488579GoodMotorola IncGeneral Dynamics Mission Systems Inc
US20070204224A10.626System and method for storing and accessing data files at wireless devicesAPPLICATION2007-08-302006-02-2438445467GoodQualcomm IncQualcomm Inc
US8724803B20.625Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication systemGRANT2014-05-132003-09-0234381959GoodQualcomm IncQualcomm Inc
US7721100B20.624Granting an access to a computer-based objectGRANT2010-05-182003-09-3034384333GoodSiemens AGSiemens AG
US7784684B20.621Wireless computer wallet for physical point of sale (POS) transactionsGRANT2010-08-312002-08-0837487378GoodFujitsu LtdPCMS Holdings Inc
US7490239B20.621Facilitating digital signature based on ephemeral private keyGRANT2009-02-102005-01-0736654649GoodFirst Data CorpFirst Data Corp
US5748744A0.621Secure mass storage system for computersGRANT1998-05-051996-06-0324638801GoodVLSI Technology IncCallahan Cellular LLC
US8718279B20.620Apparatus and method for a secure broadcast systemGRANT2014-05-062003-07-0833567841GoodQualcomm IncQualcomm Inc
US7330981B20.619File locker and mechanisms for providing and using sameGRANT2008-02-122004-04-2334939186GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5369702A0.618Distributed cryptographic object methodGRANT1994-11-291993-10-1822483974GoodTecsec IncTecsec Inc
US8438645B20.617Secure clock with grace periodsGRANT2013-05-072005-04-2737235971GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7693286B20.617Method of delivering direct proof private keys in signed groups to devices using a distribution CDGRANT2010-04-062004-07-1435599439GoodIntel CorpIntel Corp
WO1998039876A10.614CRYPTOGRAPHIC DIGITAL IDENTITY METHODAPPLICATION1998-09-111997-03-0621898000Good
US20070174916A10.613Method and apparatus for secure data transferAPPLICATION2007-07-262005-10-2838006428Good
US6385727B10.613Apparatus for providing a secure processing environmentGRANT2002-05-071998-09-2522580022GoodHughes Electronics CorpJPMorgan Chase Bank NA, Hughes Network Systems LLC
US7249381B20.612Controller and resource management system and method with improved security for independently controlling and managing a computer systemGRANT2007-07-242004-03-2935061857GoodBryte Computer Tech IncBRYTE COMPUTER TECHNOLOGIES Inc, Bryte Computer Tech Inc
US5787172A0.611Apparatus and method for establishing a cryptographic link between elements of a systemGRANT1998-07-281994-02-2440600072GoodMerdan Group IncComcast Cable Communications LLC
US8504849B20.611Method for versatile content controlGRANT2013-08-062004-12-2137188231GoodDiscretix Tech Inc, SanDisk Technologies LLCDISCRETIX TECHNOLOGIES Ltd, Discretix Tech Inc, SanDisk Technologies LLC
US8983065B20.610Method and apparatus for security in a data processing systemGRANT2015-03-172001-10-0925520731GoodQualcomm IncQualcomm Inc
US20050154877A10.610Creating and storing one or more digital certificates assigned to subscriber for efficient access using a chip cardAPPLICATION2005-07-141999-10-2726858051GoodVisa International Service AssociationVisa International Service Association
US20040146163A10.609Device keysAPPLICATION2004-07-292002-10-2832170641GoodNokia OyjNokia Technologies Oy
US20060153369A10.608PROVIDING CRYPTOGRAPHIC KEY BASED ON USER INPUT DATAAPPLICATION2006-07-132005-01-0736653272GoodFirst Data CorpFirst Data Corp
US20050268103A10.606Anonymity revocationAPPLICATION2005-12-012004-05-2835426780GoodInternational Business Machines CorpInternational Business Machines Corp
US7409557B20.606System and method for distributing trusted timeGRANT2008-08-051999-07-0237432034GoodTime Certain LLCTime Certain LLC
US6148400A0.606Apparatus and method for establishing a crytographic link between elements of a systemGRANT2000-11-141994-02-2422745665GoodMerdan Group IncComcast Cable Communications LLC
US5633934A0.605Local area nework encryption decryption systemGRANT1997-05-271993-12-0922596831GoodAlcatel Canada IncAlcatel Canada Inc
US7822688B20.604Wireless walletGRANT2010-10-262002-08-0834891268GoodFujitsu LtdPCMS Holdings Inc
US7571329B20.603Method of storing unique constant valuesGRANT2009-08-042004-07-1435600839GoodIntel CorpIntel Corp
US8601283B20.603Method for versatile content control with partitioningGRANT2013-12-032004-12-2137188228GoodSanDisk Technologies LLCSanDisk Technologies LLC
US8214296B20.601Disaggregated secure execution environmentGRANT2012-07-032006-02-1438370279GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6671804B10.597Method and apparatus for supporting authorities in a public key infrastructureGRANT2003-12-301999-12-0126863973GoodBBNT Solutions LLCVerizon Corporate Services Group Inc, Raytheon BBN Technologies Corp, Level 3 Communications LLC
US20030188165A10.594System and method for execution of a secured environment initialization instructionAPPLICATION2003-10-022002-03-2928453267GoodIntel CorpIntel Corp
US20050005161A10.593Services and secure processing environmentsAPPLICATION2005-01-062003-07-0427741554GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US9363481B20.589Protected media pipelineGRANT2016-06-072005-04-2237235970GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7716494B20.589Establishing a trusted platform in a digital processing systemGRANT2010-05-112004-07-1535600821GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US7257542B20.588Secure on-line ticketingGRANT2007-08-142000-02-1626878563GoodStamps com IncStamps com Inc
US7124302B20.588Systems and methods for secure transaction management and electronic rights protectionGRANT2006-10-171995-02-1346278128GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5896499A0.588Embedded security processorGRANT1999-04-201997-02-2125187131GoodInternational Business Machines CorpInternational Business Machines Corp
US9673984B20.588Session key cache to maintain session keysGRANT2017-06-062005-03-1837011740GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7548620B20.588Token provisioningGRANT2009-06-162004-02-2334861087GoodVerisign IncCA Inc
US6473743B10.587Postage meter having delayed generation of cryptographic security parametersGRANT2002-10-291999-12-2823885458GoodPitney Bowes IncPitney Bowes Inc
US8533851B20.586Systems and methods for secure transaction management and electronic rights protectionGRANT2013-09-101996-08-3024836636GoodIntertrust Technologies CorpIntertrust Technologies Corp
US20060156013A10.585DIGITAL SIGNATURE SOFTWARE USING EPHEMERAL PRIVATE KEY AND SYSTEMAPPLICATION2006-07-132005-01-0736654650GoodFirst Data CorpFirst Data Corp
US9189605B20.585Protected computing environmentGRANT2015-11-172005-04-2240754843GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20030196111A10.585Attesting to a value of a register and/or memory regionAPPLICATION2003-10-161998-10-2628791747GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7802112B20.585Information processing apparatus with security moduleGRANT2010-09-212004-09-0735997526GoodFujitsu LtdFujitsu Ltd
US9436804B20.583Establishing a unique session key using a hardware functionality scanGRANT2016-09-062005-04-2237855119GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US7003674B10.580Disk drive employing a disk with a pristine area for storing encrypted data accessible only by trusted devices or clients to facilitate secure network communicationsGRANT2006-02-212000-07-3135810819GoodWestern Digital Ventures IncWestern Digital Ventures Inc
US8051052B20.579Method for creating control structure for versatile content controlGRANT2011-11-012004-12-2137188227GoodSanDisk Technologies LLCSanDisk Technologies LLC
US7506165B20.579Leak-resistant cryptographic payment smartcardGRANT2009-03-171998-01-0226751037GoodCryptography Research IncCryptography Research Inc
US6598165B10.578Secure memoryGRANT2003-07-221999-06-1823312910GoodPhoenix Technologies LtdKinglite Holdings Inc
US20020071563A10.578Method and apparatus for cryptographic key rollover during operationAPPLICATION2002-06-132000-12-1224961011GoodCompaq Information Technologies Group LPHewlett Packard Development Co LP
US7210009B20.578Computer system employing a trusted execution environment including a memory controller configured to clear memoryGRANT2007-04-242003-09-0434225999GoodAdvanced Micro Devices IncAdvanced Micro Devices Inc
US20030163723A10.577Method and apparatus for loading a trustable operating systemAPPLICATION2003-08-282002-02-2527753730GoodIntel CorpIntel Corp
US20060153370A10.577GENERATING PUBLIC-PRIVATE KEY PAIR BASED ON USER INPUT DATAAPPLICATION2006-07-132005-01-0736653273GoodFirst Data CorpFirst Data Corp
US20020199110A10.574Method of protecting intellectual property cores on field programmable gate arrayAPPLICATION2002-12-262001-06-139916435GoodAlgotronix LtdAlgotronix Ltd
US9906528B20.572Method and apparatus for providing bootstrapping procedures in a communication networkGRANT2018-02-272005-02-1136792922GoodNokia OyjNokia Oyj
US20050246553A10.572Mobile terminal and data protection systemAPPLICATION2005-11-032004-04-3035188451GoodHitachi LtdHitachi Ltd
US20030099358A10.571Wireless data communication method and apparatus for software download systemAPPLICATION2003-05-292001-10-1619135560GoodSony CorpSony Corp
US6005945A0.570System and method for dispensing postage based on telephonic or web milli-transactionsGRANT1999-12-211997-03-2025231914GoodPSI Systems IncPSI Systems Inc
US9633206B20.570Demonstrating integrity of a compartment of a compartmented operating systemGRANT2017-04-252000-11-289916862GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US20060015732A10.570Processing system using internal digital signaturesAPPLICATION2006-01-192004-07-1535600831GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US20110140834A10.568SECURE IDENTIFICATION  VERIFICATION AND AUTHORIZATION USING A SECURE PORTABLE DEVICEAPPLICATION2011-06-162004-11-0840973352GoodOvertouch Remote LLCGula Consulting LLC
US6775778B10.568Secure computing device having boot read only memory verification of program codeGRANT2004-08-101998-05-2932829232GoodTexas Instruments IncTexas Instruments Inc
US5610981A0.567Preboot protection for a data security system with anti-intrusion capabilityGRANT1997-03-111992-06-0426899632GoodIntegrated Tech Of America IncCEDAR WEST C/O GESTINOR SERVICES, HILLIARD LP, INDEPENDENCE PLAZA Inc, LENOWITZ MARK, OFFIT ANDREW, SIMON DEBRA, Digital Privacy Inc
US20080175381A10.567E-FUSES FOR STORING SECURITY VERSION DATAAPPLICATION2008-07-242004-07-1535600841GoodInternational Business Machines CorpInternational Business Machines Corp
US20020194483A10.567System and method for authorization of access to a resourceAPPLICATION2002-12-192001-02-2526954921GoodStorymail IncStorymail Inc
US20020165912A10.563Secure certificate and system and method for issuing and using sameAPPLICATION2002-11-072001-02-2526954922GoodStorymail IncStorymail Inc
US20040103288A10.561Apparatus and method for securing data on a portable storage deviceAPPLICATION2004-05-272002-11-2732325306GoodSanDisk IL LtdWestern Digital Israel Ltd
US8176564B20.560Special PC mode entered upon detection of undesired stateGRANT2012-05-082004-11-1536388008GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8181040B20.560Program execution deviceGRANT2012-05-152003-08-2634213903GoodPanasonic CorpPanasonic Intellectual Property Corp of America
US8700535B20.560Issuing a publisher use license off-line in a digital rights management (DRM) systemGRANT2014-04-152003-02-2532850467GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7635084B20.559Electronic transaction systems and methods thereforGRANT2009-12-221996-12-0425156177GoodEsignx CorpServstor Technologies LLC, Callahan Cellular LLC
US8862518B20.558Multi-way transaction related data exchange apparatus and methodsGRANT2014-10-142004-05-1435429056Good
US5421006A0.558Method and apparatus for assessing integrity of computer system softwareGRANT1995-05-301992-05-0725375415GoodCompaq Computer CorpHewlett Packard Development Co LP
US20060123465A10.557Method and system of authentication on an open networkAPPLICATION2006-06-082004-10-0136143036GoodSolidus Networks IncAccullink Inc
US20030009676A10.557Peripheral device with secure driverAPPLICATION2003-01-092001-07-0925413701GoodAdvanced Micro Devices IncAdvanced Micro Devices Inc
US20070168292A10.554Memory system with versatile content controlAPPLICATION2007-07-192004-12-2138264411GoodSanDisk Technologies LLCDISCRETIX TECHNOLOGIES Ltd
US20040185842A10.552Secure telematicsAPPLICATION2004-09-232003-01-2832825342GoodCellPort Systems IncCybercar Inc
EP1480174A10.551A method for making a reliable time available on a smart card provided with a timerGRANT2004-11-242003-05-1933041112GoodAxalto SAAxalto SA
US7356707B20.550Initializing  maintaining  updating and recovering secure operation within an integrated system employing a data access control functionGRANT2008-04-082002-04-1829214852GoodInternational Business Machines CorpDaedalus Blue LLC
US7743409B20.550Methods used in a mass storage device with automated credentials loadingGRANT2010-06-222005-07-0844260296GoodSanDisk CorpSanDisk Technologies LLC
US6148401A0.548System and method for providing assurance to a host that a piece of software possesses a particular propertyGRANT2000-11-141997-02-0527365289GoodAT&T CorpAT&T Corp
WO2004036513A10.547FACILITATING AND AUTHENTICATING TRANSACTIONSAPPLICATION2004-04-292002-10-1732110561Good
US7203842B20.546Method and apparatus for secure configuration of a field programmable gate arrayGRANT2007-04-101999-12-2210866706GoodAlgotronix LtdAlgotronix Ltd
US5448045A0.546System for protecting computers via intelligent tokens or smart cardsGRANT1995-09-051992-02-2625285753GoodF Poszat HU LLCF Poszat HU LLC
US7761717B20.546Memory device with data security in a processorGRANT2010-07-202001-07-108177986GoodTrident Microsystems (Far East) LtdEntropic Communications LLC
US7801826B20.545Framework and system for purchasing of goods and servicesGRANT2010-09-212002-08-0832302463GoodFujitsu LtdPCMS Holdings Inc
US20060218649A10.545Method for conditional disclosure of identity informationAPPLICATION2006-09-282005-03-2237036735GoodIntel CorpIntel Corp
US7543152B20.544Methods and arrangements for realising betting with off-line terminalsGRANT2009-06-022000-09-298559190GoodInnoka OyIGT Canada Solutions ULC
US7266690B20.544Methods and systems for protecting information in paging operating systemsGRANT2007-09-041999-07-1335376586GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20040039924A10.544System and method for security of computing devicesAPPLICATION2004-02-262001-04-0925253451GoodKinglite Holdings IncKinglite Holdings Inc
US7100049B20.541Method and apparatus for authentication of users and web sitesGRANT2006-08-292002-05-1033449697GoodRSA Security LLCEMC Corp
US20090150899A10.541System and methods for dependent trust in a computer systemAPPLICATION2009-06-112004-11-1735580239GoodSun Microsystems IncOracle America Inc
US7290288B20.539Method and system for controlling access  by an authentication server  to protected computer resources provided via an internet protocol networkGRANT2007-10-301997-06-1141118015GoodPrism Technologies LLCPrism Technologies LLC
US6339828B10.539System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport recordGRANT2002-01-151997-05-2825342950GoodSymantec CorpCA Inc
US20070124819A10.538Digital rights management using trusted timeAPPLICATION2007-05-312005-11-2838089038GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US20060053294A10.538System and method for proving time and content of digital data in a monitored systemAPPLICATION2006-03-092004-09-0934932995Good
US20040009815A10.537Managing access to contentAPPLICATION2004-01-152002-06-2629717925GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9450966B20.537Method and apparatus for lifecycle integrity verification of virtual machinesGRANT2016-09-202004-11-2940509947GoodKIP SIGN P1 LPKIP SIGN P1 LP
US7337314B20.536Apparatus and method for allocating resources within a security processorGRANT2008-02-262003-04-1233131117GoodCavium Networks LLCCavium International, Marvell Asia Pte Ltd
US5761309A0.531Authentication systemGRANT1998-06-021994-08-3016860472GoodKokusai Denshin Denwa KKKDDI Corp
US20050177716A10.531Systems and methods for secure transaction management and electronic rights protectionAPPLICATION2005-08-111995-02-1334831157GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7669242B20.529Agent presence monitor configured to execute in a secure environmentGRANT2010-02-232005-06-3037591217GoodIntel CorpIntel Corp
US5796825A0.529System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-timeGRANT1998-08-181996-01-1624346041GoodSymantec CorpNortonLifeLock Inc
US7536544B20.529Trust information delivery scheme for certificate validationGRANT2009-05-191999-06-1123289038GoodTVWorks LLCComcast Cable Communications Management LLC
US8364808B20.527Device management systemGRANT2013-01-292005-09-2937895486GoodSeiko Epson CorpSeiko Epson Corp
US7594269B20.526Platform-based identification of host software circumventionGRANT2009-09-222004-10-2936263679GoodIntel CorpIntel Corp
US5956404A0.526Digital signature with auditing bitsGRANT1999-09-211996-09-3024911170GoodCounterpane Internet Security IncBT Americas Inc
US20030233537A10.525Presence and notification system for maintaining and communicating informationAPPLICATION2003-12-182002-06-1029583785GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9380457B20.524Method and system of secured direct link set-up (DLS) for wireless networksGRANT2016-06-282005-11-0337776631GoodIntel CorpIntel Corp
US8645712B10.523Electronic circuit design copy protectionGRANT2014-02-042005-10-2750001830GoodAltera CorpAltera Corp
US7457960B20.523Programmable processor supporting secure modeGRANT2008-11-252004-11-3036585639GoodAnalog Devices IncAnalog Devices Inc
US7281125B20.522Securing sensitive configuration data remotelyGRANT2007-10-092001-08-2425474336GoodLenovo Singapore Pte LtdLenovo PC International Ltd
US20020099946A10.522CRYPTOGRAPHICALLY PROTECTED PAGING SUBSYSTEMAPPLICATION2002-07-251998-04-3022100902Good
US6351817B10.522Multi-level secure computer with token-based access controlGRANT2002-02-261999-10-2723694900Good
US7552333B20.521Trusted authentication digital signature (tads) systemGRANT2009-06-232000-08-0422617895GoodFirst Data CorpFirst Data Corp
US5548646A0.520System for signatureless transmission and reception of data packets between computer networksGRANT1996-08-201994-09-1523184846GoodSun Microsystems IncSun Microsystems Inc
WO2006117009A10.520METHOD FOR THE MANAGEMENT OF A PERIPHERAL UNIT BY A SIM CARD IN WIRELESS COMMUNICATION TERMINALS  AND PERIPHERAL UNIT FOR IMPLEMENTING THE METHODAPPLICATION2006-11-092005-04-2935405445Good
US6339824B10.519Method and apparatus for providing public key security control for a cryptographic processorGRANT2002-01-151997-06-3025385246GoodInternational Business Machines CorpInternational Business Machines Corp
US7558633B20.517Test system for a user terminal apparatus and test automation method thereforGRANT2009-07-072005-08-1237479305GoodFrancotyp Postalia GmbHFrancotyp Postalia GmbH
US9177175B20.517Data repository and method for promoting network storage of dataGRANT2015-11-032000-02-1822672907GoodPermabit Technology CorpRed Hat Inc
US4227253A0.516Cryptographic communication security for multiple domain networksGRANT1980-10-071977-12-0525326207GoodInternational Business Machines CorpInternational Business Machines Corp
US7707420B10.515Public key encryption with digital signature schemeGRANT2010-04-271999-06-2322491820GoodResearch in Motion LtdBlackBerry Ltd
US7543144B20.512System and method for lost data destruction of electronic data stored on portable electronic devicesGRANT2009-06-022004-07-2135658778GoodBEACHHEAD SOLUTIONS IncBEACHHEAD SOLUTIONS Inc
EP0471538A20.512Data security systemGRANT1992-02-191990-08-1310680558GoodGEC Marconi Ltd, GEC Marconi Holdings LtdBAE Systems Electronics Ltd, Allard Way Holdings Ltd
US6950949B10.511Method and apparatus for password entry using dynamic interface legitimacy informationGRANT2005-09-271999-10-0834992774GoodEntrust LtdEntrust Ltd
US6138236A0.509Method and apparatus for firmware authenticationGRANT2000-10-241996-07-0124705028GoodSun Microsystems IncOracle America Inc
US7149726B10.509Online value bearing item printingGRANT2006-12-121999-06-0137497385GoodStamps com IncStamps com Inc
US7894808B20.508Storing apparatus and telecommunications apparatusGRANT2011-02-222003-11-2734463854GoodNTT Docomo IncNTT Docomo Inc
US6247129B10.508Secure electronic commerce employing integrated circuit cardsGRANT2001-06-121997-03-1221913930GoodVisa International Service AssociationVisa International Service Association
EP1243999A20.507Method and system for recovering and validating cryptographically signed digital dataGRANT2002-09-252001-03-2225221577GoodHitachi LtdHitachi Ltd
US20010044886A10.505METHOD AND APPARATUS FOR CONTROLLING ACCESS TO CONFIDENTIAL DATA BY ANALYZING PROPERTY INHERENT IN DATAAPPLICATION2001-11-221997-09-2626739610GoodHughes Electronics CorpJPMorgan Chase Bank NA, Hughes Network Systems LLC
US20040059916A10.504Memory cardAPPLICATION2004-03-252002-09-1131986551GoodRenesas Technology CorpRenesas Technology Corp
US5533123A0.504Programmable distributed personal securityGRANT1996-07-021994-06-2823020117GoodNational Semiconductor CorpNational Semiconductor Corp
US6836847B10.503Software protection for single and multiple microprocessor systemsGRANT2004-12-281999-03-0533518693GoodJohns Hopkins UniversityJohns Hopkins University
US20060005015A10.503System and method for secure inter-platform and intra-platform communicationsAPPLICATION2006-01-052004-06-3035515402GoodIntel CorpIntel Corp
US20050114687A10.501Methods and apparatus to provide protection for firmware resourcesAPPLICATION2005-05-262003-11-2134591320GoodIntel CorpIntel Corp
US8971790B20.501Method and apparatus for broadcast services in a communication systemGRANT2015-03-032003-01-0232680847GoodQualcomm IncQualcomm Inc
US8065718B20.501Secure authentication using hardware token and computer fingerprintGRANT2011-11-222002-11-0532302604GoodSafeNet IncThales DIS CPL USA Inc
US5134700A0.500MICROCOMPUTER WITH INTERNAL RAM SECURITY DURING EXTERNAL PROGRAM MODEGRANT1992-07-281987-09-1822268509GoodGeneral Instrument CorpArris Technology Inc
US20040111602A10.497Public key cryptograph communication methodAPPLICATION2004-06-102002-08-0631497647GoodHitachi LtdHitachi Ltd
US20050289311A10.497System and method for secure inter-platform and intra-platform communicationsAPPLICATION2005-12-292004-06-2935207467GoodIntel CorpIntel Corp
US20050005098A10.496Associating software with hardware using cryptographyAPPLICATION2005-01-062003-04-0833555123GoodQualcomm IncQualcomm Inc
US7065654B10.494Secure execution boxGRANT2006-06-202001-05-1036586549GoodAdvanced Micro Devices IncMediaTek Inc
US6366117B10.494Nonvolatile/battery-backed key in PLDGRANT2002-04-022000-11-2824912617GoodXilinx IncXilinx Inc
US20070192397A10.492Cryptosystem Based on a Jacobian of a CurveAPPLICATION2007-08-162000-06-2226908205GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20030221116A10.492Security framework for protecting rights in computer softwareAPPLICATION2003-11-272002-04-1529250813GoodCore SDI IncHELP/SYSTEMS LLC
US8725646B20.491Output protection levelsGRANT2014-05-132005-04-1537109729GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7082533B20.491Gauging risk in electronic communications regarding accounts in ABDS systemGRANT2006-07-252000-08-0436778387GoodFirst Data CorpFirst Data Corp
US20060251258A10.491System  method and computer program product for updating security criteria in wireless networksAPPLICATION2006-11-092005-04-0537073920GoodMcAfee LLCMcAfee LLC
US20060212363A10.490Rendering digital content in an encrypted rights-protected formAPPLICATION2006-09-211999-03-2726824864GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6978369B20.490Person-centric account-based digital signature systemGRANT2005-12-202000-08-0423347132GoodFirst Data CorpFirst Data Corp
US6385723B10.490Key transformation unit for an IC cardGRANT2002-05-071997-05-1526724017GoodMondex International LtdMultos Ltd, Mondex International Ltd
US7328348B20.489Method and system for securely timestamping digital dataGRANT2008-02-052001-08-0225442936GoodSafeNet IncRAVENS ACQUISITION CORP, Apple Inc, Rainbow Technologies Inc
US7096354B20.489Central key authority database in an ABDS systemGRANT2006-08-222000-08-0436954265GoodFirst Data CorpFirst Data Corp
US6789189B20.489Managing account database in ABDS systemGRANT2004-09-072000-08-0432965221GoodFirst Data CorpFirst Data Corp
US5664099A0.488Method and apparatus for establishing a protected channel between a user and a computer systemGRANT1997-09-021995-12-2824318169GoodLotus Development CorpInternational Business Machines Corp
US7047416B20.487Account-based digital signature (ABDS) systemGRANT2006-05-161998-11-0927392531GoodFirst Data CorpFirst Data Corp
US7222238B20.486Method and system for real-time registration of transactions with a security moduleGRANT2007-05-222001-07-167693288GoodFrancotyp Postalia GmbHFrancotyp Postalia GmbH
US7114177B20.485Web site identity assuranceGRANT2006-09-262001-03-2827488639GoodGeoTrust LLCDigicert Inc
US7869593B20.485Software for providing based on shared knowledge public keys having same private keyGRANT2011-01-112005-01-0736653271GoodFirst Data CorpFirst Data Corp
US5530749A0.485Methods and apparatus for secure hardware configurationGRANT1996-06-251994-08-1523117171GoodInternational Business Machines CorpInternational Business Machines Corp
US6341274B10.485Method and apparatus for operating a secure metering deviceGRANT2002-01-221998-07-2222950027GoodNeopost IncNeopost Technologies SA
US7185249B20.484Method and apparatus for secure scan testingGRANT2007-02-272002-04-3029249555GoodNXP USA IncNorth Star Innovations Inc
US7395425B20.484Data protection system that protects data by encrypting the dataGRANT2008-07-012001-03-2926612537GoodPanasonic CorpPanasonic Corp
US7936869B20.484Verifying digital signature based on shared knowledgeGRANT2011-05-032005-01-0736653269GoodFirst Data CorpFirst Data Corp
US20030065934A10.483After the fact protection of data in remote personal and wireless devicesAPPLICATION2003-04-032001-09-2825510732GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US6862641B10.481Interruptable and re-enterable system management mode programming codeGRANT2005-03-012001-05-1043332167GoodAdvanced Micro Devices IncMediaTek Inc
US8464348B20.480Isolated computing environment anchored into CPU and motherboardGRANT2013-06-112004-11-1536388007GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8752099B20.480Method and apparatus for network content download and recordingGRANT2014-06-102005-03-1436998183GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC
US7802085B20.480Apparatus and method for distributing private keys to an entity with minimal secret  unique informationGRANT2010-09-212004-02-1834838821GoodIntel CorpIntel Corp
US5189700A0.479Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documentsGRANT1993-02-231989-07-0524556942GoodE-CONTACT TECHNOLOGIES LLCE-CONTACT TECHNOLOGIES LLC
US7366915B20.479Digital license with referral informationGRANT2008-04-292002-04-3029249441GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8098818B20.478Secure registration for a multicast-broadcast-multimedia system (MBMS)GRANT2012-01-172003-07-0733564923GoodQualcomm IncQualcomm Inc
US20040064711A10.478Transaction device with noise signal encryptionAPPLICATION2004-04-012002-03-0732033347GoodSymbol Technologies LLCSymbol Technologies LLC
US5577121A0.478Transaction system for integrated circuit cardsGRANT1996-11-191994-06-0922969120GoodElectronic Payment Services IncTouch Tech Inc
US6282653B10.478Royalty collection method and system for use of copyrighted digital materials on the internetGRANT2001-08-281998-05-1522154806GoodInternational Business Machines CorpAlibaba Group Holding Ltd
US7500100B10.477Method and apparatus for verifying revocation status of a digital certificateGRANT2009-03-032003-09-1040385483GoodCisco Technology IncCisco Technology Inc
US6857067B20.476System and method for preventing unauthorized access to electronic dataGRANT2005-02-152000-09-0126923752GoodUniloc 2017 LLCUniloc 2017 LLC
US6233685B10.475Establishing and employing the provable untampered state of a deviceGRANT2001-05-151997-08-2925444461GoodInternational Business Machines CorpInternational Business Machines Corp
US7953980B20.474Signed manifest for run-time verification of software program identity and integrityGRANT2011-05-312005-06-3037591240GoodIntel CorpIntel Corp
US9378518B20.474Electronic signature security systemGRANT2016-06-282004-12-3036615558GoodTopaz Systems IncTopaz Systems Inc
US7693508B20.473Method and apparatus for broadcast signaling in a wireless communication systemGRANT2010-04-062001-03-2826959991GoodQualcomm IncQualcomm Inc
US20060248599A10.473Cross-domain security for data vaultAPPLICATION2006-11-022004-12-3037235974GoodOracle International CorpOracle International Corp
US4278837A0.472Crypto microprocessor for executing enciphered programsGRANT1981-07-141977-10-3126722203GoodDallas Semiconductor CorpDallas Semiconductor Corp
US8347078B20.471Device certificate individualizationGRANT2013-01-012004-10-1846321725GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20040064457A10.471Mechanism for providing both a secure and attested bootAPPLICATION2004-04-012002-09-2732029480GoodIntel CorpIntel Corp
US20060101408A10.471Terminal  method and computer program product for validating a software applicationAPPLICATION2006-05-112004-10-2036203323GoodNokia OyjNokia Technologies Oy
US6163771A0.471Method and device for generating a single-use financial account numberGRANT2000-12-191997-08-2825441915GoodWalker Digital LLCPayPal Inc
US9219755B20.470Malicious mobile code runtime monitoring system and methodsGRANT2015-12-221996-11-0855018096GoodFinjan IncFinjan LLC
US7593527B20.469Providing digital signature and public key based on shared knowledgeGRANT2009-09-222005-01-0736653268GoodFirst Data CorpFirst Data Corp
US7774824B20.466Multifactor device authenticationGRANT2010-08-102004-06-0935462063GoodIntel CorpIntel Corp
US8353046B20.466System and method for delivery of a modular operating systemGRANT2013-01-082005-06-0837525568GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7685423B10.466Validation protocol and systemGRANT2010-03-232000-02-1524012546GoodSilverbrook Research Pty LtdMemjet Technology Ltd
EP1775882A10.466Signature log storing apparatusGRANT2007-04-182005-10-1137697898GoodHitachi LtdHitachi Ltd
US6023764A0.466Method and apparatus for providing security certificate management for Java AppletsGRANT2000-02-081997-10-2025495753GoodInternational Business Machines CorpInternational Business Machines Corp
US20030120935A10.466Kernel-based network security infrastructureAPPLICATION2003-06-262001-12-2026968436GoodCoretrace CorpIvanti Inc
US10552603B20.462Malicious mobile code runtime monitoring system and methodsGRANT2020-02-042000-05-1727394815GoodFinjan IncFinjan LLC
US20030133574A10.462Secure CPU and memory management unit with cryptographic extensionsAPPLICATION2003-07-172002-01-1621943233GoodSun Microsystems IncOracle America Inc
US6308887B10.462Multi-transactional architectureGRANT2001-10-301997-12-0222073862GoodCASH TECHNOLOGIES IncCASH TECHNOLOGIES Inc
US9141786B20.462Malicious mobile code runtime monitoring system and methodsGRANT2015-09-221996-11-0836642059GoodFinjan IncFinjan LLC
US7334173B20.458Method and system for protecting processors from unauthorized debug accessGRANT2008-02-192005-06-2837906495GoodTransmeta IncHd Silicon Solutions LLC
US7802110B20.458System and method for secure execution of program codeGRANT2010-09-212004-08-2535429383GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6567915B10.456Integrated circuit card with identity authentication table and authorization tables defining access rights based on Boolean expressions of authenticated identitiesGRANT2003-05-201998-10-2322651730GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7694152B20.455Memory controller with performance-modulated securityGRANT2010-04-062005-02-0336758069GoodInternational Business Machines CorpInternational Business Machines Corp
US7558965B20.455Entity authentication in electronic communications by providing verification status of deviceGRANT2009-07-072000-08-0430000362GoodFirst Data CorpFirst Data Corp
US6477646B10.455Security chip architecture and implementations for cryptography accelerationGRANT2002-11-051999-07-0827385867GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US6983368B20.454Linking public key of device to information during manufactureGRANT2006-01-032000-08-0431495620GoodFirst Data CorpFirst Data Corp
US5982887A0.453Encrypted program executing apparatusGRANT1999-11-091995-04-2714370339GoodCasio Computer Co LtdIntellectual Ventures Fund 81 LLC
US7634665B20.452Apparatus and method for secure field upgradability with unpredictable ciphertextGRANT2009-12-151999-10-2937502920GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US20050066168A10.452Authentication chip for authenticating an untrusted chipAPPLICATION2005-03-241998-07-1032323647GoodSilverbrook Research Pty LtdMemjet Technology Ltd
US5887064A0.452Cryptographic equipmentGRANT1999-03-231987-09-096335525GoodSiemens AGSiemens AG
US6754821B10.451System  method and article of manufacture for transition state-based cryptographyGRANT2004-06-222000-06-1924388901GoodXerox CorpMajandro LLC
US20080295180A10.451Memory Card  Data Exchange System  and Data Exchange MethodAPPLICATION2008-11-272004-08-2035907287GoodMitsubishi Electric CorpMitsubishi Electric Corp
US20050005114A10.450Ticket-based secure time delivery in digital networksAPPLICATION2005-01-062003-07-0533552797GoodGeneral Instrument CorpArris Technology Inc
US6996713B10.449Method and apparatus for protecting proprietary decryption keys for programmable logic devicesGRANT2006-02-072002-03-2935734372GoodXilinx IncXilinx Inc
US7698560B20.448Information storage systemGRANT2010-04-132002-04-113835267GoodSpitlock Holdings Pty LtdEndresz Allan, Spitlock Holdings Pty Ltd
US20010052072A10.447Encryption of payload on narrow-band IP linksAPPLICATION2001-12-132000-01-2526873690GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6088684A0.447Secure printer for printing financial instrumentsGRANT2000-07-111993-12-2722634023GoodFirst Data CorpIntegrated Payment Systems Inc
US20060041755A10.446Multichannel device utilizing a centralized out-of-band authentication system (COBAS)APPLICATION2006-02-232000-09-0536228237GoodNetlabs com IncSTRIKEFORCE TECHNOLOGIES Inc
US7005733B20.446Anti tamper encapsulation for an integrated circuitGRANT2006-02-281999-12-3022634377GoodUniversal Imaging Industries LLCUniversal Imaging Industries LLC
US8336085B20.446Tuning product policy using observed evidence of customer behaviorGRANT2012-12-182004-11-1537865262GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6209095B10.446Method and system for processing electronic documentsGRANT2001-03-271996-12-2021873091GoodFinancial Services Technology ConsortiumTelcordia Technologies Inc, International Business Machines Corp, Financial Services Technology Consortium, FleetBoston Financial Corp, Sun Microsystems Inc
US9100457B20.444Method and apparatus for transmission framing in a wireless communication systemGRANT2015-08-042001-03-2826959989GoodQualcomm IncQualcomm Inc
US8077679B20.443Method and apparatus for providing protocol options in a wireless communication systemGRANT2011-12-132001-03-2827364320GoodQualcomm IncQualcomm Inc
US20050050363A10.442Secure data management apparatusAPPLICATION2005-03-032003-08-2934101271GoodPanasonic CorpPanasonic Corp
US8612772B10.442Security core using soft keyGRANT2013-12-172004-09-1049725921GoodAltera CorpAltera Corp
US20060153364A10.440ASYMMETRIC KEY CRYPTOSYSTEM BASED ON SHARED KNOWLEDGEAPPLICATION2006-07-132005-01-0736653267GoodFirst Data CorpFirst Data Corp
US6571335B10.438System and method for authentication of off-chip processor firmware codeGRANT2003-05-271999-04-0123083826GoodIntel CorpIntel Corp
US20020059238A10.436Data management systemAPPLICATION2002-05-161994-09-3027577654GoodMitsubishi CorpPiracy Protection LLC, Xylon LLC
US6249777B10.435System and method for remote postage meteringGRANT2001-06-191996-10-0224913234GoodE-Stamp CorpStamps com Inc
US7925801B20.435Method and system for protection and security of IO devices using credentialsGRANT2011-04-122006-01-1738264416GoodInternational Business Machines CorpInternational Business Machines Corp
US5677955A0.434Electronic funds transfer instrumentsGRANT1997-10-141995-04-0723657085GoodTelcordia Technologies Inc, Financial Services Technology Consortium, First National Bank of BostonTelcordia Technologies Inc, Financial Services Technology Consortium, FleetBoston Financial Corp
US20060291483A10.434Mobile Telephone Gateway Apparatus  Communication System  and Gateway Operating SystemAPPLICATION2006-12-282003-11-0234531847Good
US8549291B20.433Wireless network apparatus storing authentication information in multiple formats and areas and authentication method of the sameGRANT2013-10-012005-07-2837695029GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US6581841B10.433Apparatus and method for secure information processingGRANT2003-06-241998-06-268098205GoodCryptera ASCryptera AS
US7639805B20.433Digital rights management scheme for an on-demand distributed streaming systemGRANT2009-12-292004-09-0335431899GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6615347B10.433Digital certificate cross-referencingGRANT2003-09-021998-06-3027765473GoodVerisign IncDigicert Inc
US20030126434A10.432File security system using a security class and method for managing an encryption keyAPPLICATION2003-07-032001-12-2719717658GoodElectronics and Telecommunications Research Institute ETRIElectronics and Telecommunications Research Institute ETRI
US5643086A0.431Electronic casino gaming apparatus with improved play capacity  authentication and securityGRANT1997-07-011995-06-2937189417GoodSilicon Gaming IncInternational Game Technology
US8522293B20.431Method and apparatus for high bandwidth data transmission in content-based networksGRANT2013-08-272004-12-1536585625GoodTime Warner Cable Enterprises LLCTime Warner Cable Enterprises LLC, Spectrum Management Holding Co LLC
US20010037458A10.430Method of using a mask programmed key to securely configure a field programmable gate arrayAPPLICATION2001-11-012000-02-0827255516GoodAlgotronix LtdAlgotronix Ltd
US7895124B20.430Method for protecting sensitive data during executionGRANT2011-02-222004-12-2336612967GoodInternational Business Machines CorpRakuten Group Inc
US20060153367A10.429DIGITAL SIGNATURE SYSTEM BASED ON SHARED KNOWLEDGEAPPLICATION2006-07-132005-01-0736653270GoodFirst Data CorpFirst Data Corp
US7899901B10.428Method and apparatus for exercising and debugging correlations for network security systemGRANT2011-03-012002-12-0243617404GoodArcSight LLCMicro Focus LLC
US20120123947A10.428LATE BINDING TOKEN IN SYSTEM AND METHOD FOR VERIFYING INTENT IN A CARD NOT PRESENT TRANSACTIONAPPLICATION2012-05-172001-05-3026853457Good
US8566616B10.422Method and apparatus for protecting designs in SRAM-based programmable logic devices and the likeGRANT2013-10-222004-09-1049355393GoodAltera CorpAltera Corp
US6684332B10.421Method and system for the exchange of digitally signed objects over an insecure networkGRANT2004-01-271998-06-1030113678GoodInternational Business Machines CorpInternational Business Machines Corp
US8984636B20.420Content extractor and analysis systemGRANT2015-03-172005-07-2937695749GoodBit9 IncBit 9 Inc, Carbon Black Inc
US5995628A0.420Failsafe security system and methodGRANT1999-11-301997-04-0725268315GoodMotorola IncGeneral Dynamics Mission Systems Inc
US7650638B10.419Network security monitoring system employing bi-directional communicationGRANT2010-01-192002-12-0241509985GoodArcSight LLCValtrus Innovations Ltd, Hewlett Packard Enterprise Development LP
US20050182925A10.418Multi-mode tokenAPPLICATION2005-08-182004-02-1234838104GoodI/O SOFTWAVE IncI/O SOFTWAVE Inc
US9313662B20.418Method of protecting a mobile-telephone-type telecommunication terminalGRANT2016-04-122003-03-2132922337GoodGemalto SAThales DIS France SA
US7788722B10.417Modular agent for network security intrusion detection systemGRANT2010-08-312002-12-0242646803GoodArcSight LLCHewlett Packard Enterprise Development LP
US7213149B20.417Message authenticationGRANT2007-05-011999-12-028239524GoodSony Deutschland GmbHSony Deutschland GmbH
US20040139198A10.417Method and apparatus for manipulating data with session initiation protocolAPPLICATION2004-07-152003-01-1532711882GoodNokia OyjNokia Oyj
US5666411A0.417System for computer software protectionGRANT1997-09-091994-01-1322661068GoodXylon LLCXylon LLC
US7734924B20.416System and method for transparently providing certificate validation and other services within an electronic transactionGRANT2010-06-082000-09-0822868713GoodIdentrust IncIdentrust Inc
US7095855B10.415Message identification with confidentiality  integrity  and source authenticationGRANT2006-08-221998-12-043811733Good
US5825878A0.414Secure memory management unit for microprocessorGRANT1998-10-201996-09-2024880730GoodVLSI Technology IncAvago Technologies International Sales Pte Ltd, Philips Semiconductors Inc
US8272058B20.414Centralized timed analysis in a network security systemGRANT2012-09-182005-07-2937695880GoodBit 9 IncBit 9 Inc, Carbon Black Inc
US6587880B10.413Session management system and management methodGRANT2003-07-011998-01-2211760510GoodFujitsu LtdFujitsu Ltd
US20070214364A10.412Dual layer authentication system for securing user access to remote systems and associated methodsAPPLICATION2007-09-132006-03-0738480307GoodL3 Communications Integrated Systems LP, L3 Integrated Systems CoL3 Communications Integrated Systems LP
US8708828B20.412Pluggable modular gaming modifiers and configuration templates for gaming environmentsGRANT2014-04-292001-09-2840342216GoodInternational Game TechnologyInternational Game Technology
US7765600B20.410Methods and apparatuses for authorizing features of a computer program for use with a productGRANT2010-07-272004-05-0435240589GoodGeneral Instrument CorpGoogle Technology Holdings LLC
US7895651B20.410Content tracking in a network security systemGRANT2011-02-222005-07-2937695879GoodBit 9 IncBit 9 Inc, Carbon Black Inc
US8103001B20.408Method for verifying rights contained in a security moduleGRANT2012-01-242005-10-0735500509GoodNagra France SASNagra France SAS
US8781969B20.408Extensible media rightsGRANT2014-07-152005-05-2037449738GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20020023057A10.406Web-enabled value bearing item printingAPPLICATION2002-02-211999-06-0127538037GoodStamps com IncStamps com Inc
US5892905A0.405Computer apparatus and method for providing a common user interface for software applications accessed via the world-wide webGRANT1999-04-061996-12-2325118299GoodInternational Business Machines CorpInternational Business Machines Corp
US20060093149A10.405Certified deployment of applications on terminalsAPPLICATION2006-05-042004-10-3036261910GoodShera International LtdShera International Ltd
US7526792B20.405Integration of policy compliance enforcement and device authenticationGRANT2009-04-282004-06-0935515565GoodIntel CorpIntel Corp
US5920730A0.405Computer keyboard that changes from normal mode to secure mode bypassing host to input pin code directly into smartcard received at its ICC interfaceGRANT1999-07-061995-09-148221567GoodHewlett Packard CoHewlett Packard Development Co LP
US6212634B10.404Certifying authorization in computer networksGRANT2001-04-031996-11-1525013692GoodOpen Market IncSoverain Ip LLC, Open Market Inc
WO2004075525A10.404METHOD FOR OFFERING TIME ON SMART CARD AND METHOD FOR TIME REGISTRATION BY MEANS OF MOBILE COMMUNICATION DEVICEAPPLICATION2004-09-022003-02-2032909167Good
US8903788B20.403Synchronizing distributed work through document logsGRANT2014-12-022004-07-0934937795GoodRicoh Co LtdRicoh Co Ltd
US20010032318A10.403Apparatus and method for protecting configuration data in a programmable deviceAPPLICATION2001-10-181999-12-0326864612GoodUniversity of Hong Kong HKUUniversity of Hong Kong HKU
US20050138387A10.403System and method for authorizing software useAPPLICATION2005-06-232003-12-1934678074GoodFALCONSTOR IncFALCONSTOR Inc
US7343496B10.402Secure transaction microcontroller with secure boot loaderGRANT2008-03-112004-08-1339155464GoodZilog IncMaxim Integrated Products Inc
US8613083B10.401Method for batching events for transmission by software agentGRANT2013-12-172002-12-0238015872GoodHewlett Packard Development Co LPMicro Focus LLC
US7877605B20.400Opinion registering application for a universal pervasive transaction frameworkGRANT2011-01-252004-02-0634921965GoodFujitsu LtdPCMS Holdings Inc
US8850565B20.400System and method for coordinating network incident response activitiesGRANT2014-09-302005-01-1037011879GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US5832206A0.399Apparatus and method to provide security for a keypad processor of a transaction terminalGRANT1998-11-031996-03-2524494487GoodSchlumberger Technologies IncSoluris Inc, Equipment Systems and Devices Inc, Schlumberger Danyl Inc
US20020129170A10.398Providing kiosk service offerings in a personal area networkAPPLICATION2002-09-122001-03-0925186029GoodInternational Business Machines CorpToshiba Global Commerce Solutions Holdings Corp
US20040199763A10.395Security System with Methodology for Interprocess Communication ControlAPPLICATION2004-10-072003-04-0133100862GoodZone Labs IncCheck Point Software Technologies Inc
US20040092310A10.393Identifying message sendersAPPLICATION2004-05-132002-11-0732229318GoodInternational Game TechnologyInternational Game Technology
US20020015491A10.393Public key encryption method and communication system using public key cryptosystemAPPLICATION2002-02-072000-07-0518704859GoodHitachi LtdHitachi Ltd
US7570759B20.392System and method for secure encryptionGRANT2009-08-042004-08-1335799979Good
US7367063B10.391Methods and apparatus for providing security to a computerized deviceGRANT2008-04-292002-09-1739321787GoodCisco Technology IncCisco Technology Inc
US20030163740A10.390User interface systemAPPLICATION2003-08-282000-02-1525646259GoodMOLTEN MARKETS Pty LtdMOLTEN MARKETS Pty Ltd
US6725240B10.389Apparatus and method for protecting against data tampering in an audit subsystemGRANT2004-04-202000-08-0832070160GoodInternational Business Machines CorpInternational Business Machines Corp
US7577852B20.389Microprocessor  a node terminal  a computer system and a program execution proving methodGRANT2009-08-182005-01-2036685332GoodNara Institute of Science and Technology NUCNara Institute of Science and Technology NUC
US20070110018A10.388Methods and systems for wireless local area network (WLAN)-based signaling network monitoringAPPLICATION2007-05-172004-09-1038040711GoodTekelec IncTekelec Global Inc
US7386713B20.385On-chip security method and apparatusGRANT2008-06-102001-12-2623340247GoodResearch in Motion LtdBlackBerry Ltd
US6895504B10.385Enabling secure communications with a clientGRANT2005-05-172000-09-2934573164GoodIntel CorpIntel Corp
US7350194B10.382Techniques for debugging computer programs involving multiple computing machinesGRANT2008-03-252001-09-2439199359GoodOracle CorpOracle International Corp
US20030196094A10.382Method and apparatus for authenticating the content of a distributed databaseAPPLICATION2003-10-162002-04-1028791781GoodApplied Invention LLCApplied Invention LLC
US7010691B20.381ABDS system utilizing security information in authenticating entity accessGRANT2006-03-072000-08-0436013394GoodFirst Data CorpFirst Data Corp
US20020112156A10.380System and method for secure smartcard issuanceAPPLICATION2002-08-152000-08-1422843101GoodIdentrus LLCSECUDE SICHERHEITS TECHNOLOGIE INFORMATIONS SYSTEME GmbH, Identrus LLC, SECUDE SICHERHEITS TECHNOLOGIE INFORMATIONS SYSTEME GmbH
US20010011353A10.380Secure module with microprocessor and co-processorAPPLICATION2001-08-021995-07-2027356886GoodDallas Semiconductor CorpMaxim Integrated Products Inc
US20030086300A10.380FPGA coprocessing systemAPPLICATION2003-05-082001-04-0623079418Good
US8464337B20.380Switching an application  user  and security context based on device orientationGRANT2013-06-112005-04-1137084426GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8056130B10.379Real time monitoring and analysis of events from multiple network security devicesGRANT2011-11-082002-12-0239387745GoodHewlett Packard Development Co LPMicro Focus LLC
US20030191967A10.379Method for protection against fraud in a network by icon selectionAPPLICATION2003-10-092000-10-108855184GoodGemplus SAGemplus SA
US7062657B20.379Methods and apparatus for hardware normalization and denormalizationGRANT2006-06-132000-09-2526928657GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US7607169B10.378User interface for network security consoleGRANT2009-10-202002-12-0241170444GoodArcSight LLCMicro Focus LLC
US5708715A0.378Integrated circuit device with function usage controlGRANT1998-01-131995-05-188221559GoodHewlett Packard CoSamsung Electronics Co Ltd
US6658394B10.378Electronic sealsGRANT2003-12-022000-08-0829550394GoodSquareTrade IncSquareTrade Inc
US8539608B10.375Integrity checking at high data ratesGRANT2013-09-172004-03-2549122573GoodVerizon Corporate Services Group Inc, Raytheon BBN Technologies CorpRaytheon BBN Technologies Corp, Verizon Patent and Licensing Inc
US5748940A0.375Secure updating of non-volatile memoryGRANT1998-05-051995-08-1724054875GoodCompaq Computer CorpHewlett Packard Development Co LP
US8176527B10.374Correlation engine with support for time-based rulesGRANT2012-05-082002-12-0246002224GoodHewlett Packard Development Co LPMicro Focus LLC
US7748037B20.373Validating a memory type modification attemptGRANT2010-06-292005-09-2237903215GoodIntel CorpIntel Corp
US20030195834A10.373Automated online purchasing systemAPPLICATION2003-10-162002-04-1028791708GoodApplied Minds LLCGoogle LLC
US6851054B20.373Account-Based digital signature (ABDS) system for authenticating entity access to controlled resourceGRANT2005-02-012000-08-0422834916GoodFirst Data CorpFirst Data Corp
US20070055859A10.373BOOT SYSTEMS AND METHODSAPPLICATION2007-03-082005-09-0237831282GoodMediaTek IncMediaTek Inc
US20070028291A10.372Parametric content control in a network security systemAPPLICATION2007-02-012005-07-2937695869GoodBit 9 IncBit 9 Inc
US20030105950A10.370Document distribution method and document management methodAPPLICATION2003-06-052001-11-2726624720GoodFujitsu LtdFujitsu Ltd
US20040010565A10.370Wireless receiver for receiving multi-contents file and method for outputting data using the sameAPPLICATION2004-01-152002-05-3030113059GoodIcube Co LtdIcube Co Ltd
US20050059352A10.370Methods and apparatus for determining device integrityAPPLICATION2005-03-172003-09-1034273532GoodQualcomm IncQualcomm Inc
US7882221B20.369Method and system for measuring status and state of remotely executing programsGRANT2011-02-012003-12-1234653391GoodInternational Business Machines CorpInternational Business Machines Corp
WO2000049766A10.369METHOD FOR THE PROVISION OF DATA SECURITYAPPLICATION2000-08-241999-02-168553803Good
US6341273B10.368Electronic coin stick with potential for future added valueGRANT2002-01-221997-03-268229265GoodBritish Telecommunications PLCBritish Telecommunications PLC
US20070006307A10.368Systems  apparatuses and methods for a host software presence check from an isolated partitionAPPLICATION2007-01-042005-06-3037591461GoodIntel CorpIntel Corp
US20040163087A10.367Computer program code and method for delivering external data to a process running on a virtual machineAPPLICATION2004-08-192003-02-1432850305GoodPROTOCOM DEVELOPMENT SYSTEMS PTY LtdPROTOCOM DEVELOPMENT SYSTEMS PTY Ltd
US20020068627A10.367Gaming video overlayAPPLICATION2002-06-062000-12-043825918GoodAristocrat Technologies Australia Pty LtdAristocrat Technologies Australia Pty Ltd
US7380051B20.366System and methods for an overlay disk and cache using portable flash memoryGRANT2008-05-272005-01-1036654607GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5764761A0.365Eletronic assembly with integrated circuit devices including lock circuitryGRANT1998-06-091995-05-188221560GoodHewlett Packard CoHewlett Packard Enterprise Development LP
US8528077B10.363Comparing events from multiple network security devicesGRANT2013-09-032004-04-0949034837GoodHewlett Packard Development Co LPMicro Focus LLC
US7603575B20.363Frequency-dependent voltage control in digital logicGRANT2009-10-132005-06-3037591250GoodNumonyx BVMicron Technology Inc
US8490870B20.363Apparatus and method for POS processingGRANT2013-07-232004-06-1535459477GoodSix Circle LLCOL Security LLC
US6195694B10.360Server for reconfiguring control of a subset of devices on one or more kiosksGRANT2001-02-271997-03-1321910849GoodInternational Business Machines CorpInternational Business Machines Corp
US20060047959A10.359System and method for secure computingAPPLICATION2006-03-022004-08-2535944851GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8095783B20.358Media boot loaderGRANT2012-01-102003-05-1233555292GoodPhoenix Technologies LtdKinglite Holdings Inc
US8818903B20.357Transaction coordinator for digital certificate validation and other servicesGRANT2014-08-261999-09-1027538450Good
US20090055597A10.357Method and Device for Sharing Information Between Memory Parcels In Limited Resource EnvironmentsAPPLICATION2009-02-262004-06-0935783536GoodSanDisk IL LtdWestern Digital Israel Ltd
US6266771B10.356Probabilistic signature schemeGRANT2001-07-241997-02-1026693468GoodUniversity of CaliforniaUniversity of California
US7284122B20.356Cryptographic method for protection against fraudGRANT2007-10-162000-03-228848399GoodFrance Telecom SAOrange SA
US7565696B10.355Synchronizing network security devices within a network security systemGRANT2009-07-212003-12-1040872740GoodArcSight LLCMicro Focus LLC
US7454749B20.355Scalable parallel processing on shared memory computersGRANT2008-11-182002-11-1232229722GoodEngineered Intelligence CorpVsip Holdings LLC, Engineered Intelligence Corp
US20040039906A10.354Access authorization management system  relay server  access authorization management method  and computer programAPPLICATION2004-02-262002-06-0730434733GoodSony CorpSony Corp
US20020059359A10.353METHOD AND SYSTEM FOR PROVIDING ON-LINE WELLNESS AND RETAIL ACCESS THROUGH A DISTRIBUTED NETWORKAPPLICATION2002-05-161999-02-0226816139Good
US6820199B20.353Sending electronic transaction message  digital signature derived therefrom  and sender identity information in AADS systemGRANT2004-11-161998-11-0922696181GoodFirst Data CorpFirst Data Corp
US10042804B20.353Multiple protocol engine transaction processingGRANT2018-08-072002-11-0532176077GoodSanmina CorpSanmina Corp
US6357007B10.353System for detecting tamper events and capturing the time of their occurrenceGRANT2002-03-121998-07-0122322062GoodInternational Business Machines CorpLenovo PC International Ltd
US7711957B20.352Granting access to a computer-based objectGRANT2010-05-042003-09-3034399100GoodSiemens AGSiemens AG
US5978484A0.349System and method for safety distributing executable objectsGRANT1999-11-021996-04-2524563515GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9100422B10.348Network zone identification in a network security systemGRANT2015-08-042004-10-2753719098GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US7383445B20.346Semiconductor storage deviceGRANT2008-06-032000-07-0318699306GoodSharp CorpSamsung Electronics Co Ltd
US7201659B20.345Data delivery system  data delivery server and video game deviceGRANT2007-04-102001-06-0819015832GoodKonami Computer Entertainment Osaka IncKonami Digital Entertainment Co Ltd
US6327578B10.345Four-party credit/debit payment protocolGRANT2001-12-041998-12-2922829750GoodInternational Business Machines CorpInternational Business Machines Corp, PayPal Inc
US20050234909A10.344Method  computer program product  and data processing system for source verifiable audit loggingAPPLICATION2005-10-202004-04-1535097534GoodInternational Business Machines CorpInternational Business Machines Corp
US20060074812A10.344Code pack for revenue protectionAPPLICATION2006-04-062004-10-0636126776GoodNeopost Technologies SANeopost Technologies SA
US7509677B20.343Pattern discovery in a network security systemGRANT2009-03-242004-05-0435240831GoodArcSight LLCMicro Focus LLC
US7574605B20.342Method of managing digital signature  apparatus for processing digital signature  and a computer readable medium for recording program of managing digital signatureGRANT2009-08-112002-03-2228035700GoodHitachi LtdHitachi Ltd
US7194612B20.341System and method to export pre-boot system access data to be used during operating system runtimeGRANT2007-03-202003-12-2434700653GoodIntel CorpIntel Corp
US6816969B20.340Digital signature generating method and digital signature verifying methodGRANT2004-11-092000-12-0718846639GoodHitachi LtdHitachi Ltd
US20050010752A10.338Method and system for operating system anti-tamperingAPPLICATION2005-01-132003-06-2333539504GoodNokia IncNokia Solutions and Networks Oy
US6058483A0.338Method for secure transfer of data by a communication networkGRANT2000-05-021996-12-249499107GoodGemplus SCAGemplus SCA
US20020099950A10.333Method of maintaining integrity of an instruction or data setAPPLICATION2002-07-252001-01-2225080003GoodHewlett Packard CoHewlett Packard Development Co LP
US20050166057A10.333Digital measurement apparatus and image measurement apparatusAPPLICATION2005-07-281998-11-1726515212Good
US6804696B20.331Pipelining operations in a system for performing modular multiplicationGRANT2004-10-122000-12-1924976712GoodInternational Business Machines CorpInternational Business Machines Corp
US10242077B20.330Method and system for the management of professional services project informationGRANT2019-03-262001-12-1027616580Good
US6094724A0.330Secure memory having anti-wire tappingGRANT2000-07-251997-11-2625525861GoodAtmel CorpAtmel Corp
US20040128508A10.328Method and apparatus for access authentication entityAPPLICATION2004-07-012001-08-0632655473GoodFirst Data CorpFirst Data Corp
US5263168A0.328Circuitry for automatically entering and terminating an initialization mode in a data processing system in response to a control signalGRANT1993-11-161991-06-0324850323GoodMotorola IncNXP USA Inc
US7647632B10.327Object reference in a systemGRANT2010-01-122005-01-0441479594GoodArcSight LLCMicro Focus LLC
US7644438B10.325Security event aggregation at software agentGRANT2010-01-052004-10-2741460466GoodArcSight LLCMicro Focus LLC
US5418970A0.324Parallel processing system with processor array with processing elements addressing associated memories using host supplied address value and base register contentGRANT1995-05-231986-12-1725479426GoodMassachusetts Institute of TechnologyMassachusetts Institute of Technology
US5586301A0.323Personal computer hard disk protection systemGRANT1996-12-171994-11-0923316143GoodYBM Technologies IncMNAP TECHNOLOGIES INTERNATIONAL Inc
US7765206B20.322Meta-WebGRANT2010-07-272002-12-1332600123GoodMetaweb Technologies IncGoogle LLC
US20070192404A10.321Anonymous integrity of transmitted dataAPPLICATION2007-08-162004-03-2334961173GoodKoninklijke Philips Electronics NVKoninklijke Philips NV
US7707638B20.320Autonomous software integrity checkerGRANT2010-04-272002-01-308185669GoodSTMicroelectronics Research and Development LtdSTMicroelectronics Ltd Israel
US20070226390A10.319Method for Detecting Illegal Modifications Made to Manufacturer SoftwareAPPLICATION2007-09-272003-12-1934630361GoodThales SAThales SA
US5136647A0.318Method for secure time-stamping of digital documentsGRANT1992-08-041990-08-0224243913GoodTelcordia Technologies IncTelcordia Technologies Inc
US6324573B10.318Linking of computers using information steganographically embedded in data objectsGRANT2001-11-271993-11-1827569030GoodDigimarc CorpDigimarc Corp
US20060136667A10.317System  method and program to preserve a cache of a virtual machineAPPLICATION2006-06-222004-12-1736597540GoodInternational Business Machines CorpInternational Business Machines Corp
US6029245A0.316Dynamic assignment of security parameters to web pagesGRANT2000-02-221997-03-2525238005GoodInternational Business Machines CorpInternational Business Machines Corp
US8086853B20.315Automatic centralized authentication challenge response generationGRANT2011-12-272005-03-1837011735GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7954153B20.314Secured coprocessor comprising an event detection circuitGRANT2011-05-312005-04-0535079442GoodSTMicroelectronics SASTMicroelectronics SA
US20060168663A10.314Secure transaction protocolAPPLICATION2006-07-272000-05-2522768670GoodeCharge CorpSertintyone Corp
US7233929B10.313Postal system intranet and commerce processing for on-line value bearing systemGRANT2007-06-191999-10-1838180336GoodStamps com IncStamps com Inc
US5483649A0.312Personal computer security systemGRANT1996-01-091994-07-0123027906GoodYBM Technologies IncMNAP TECHNOLOGIES INTERNATIONAL Inc
US6543686B10.312Identification card and billing process with an identification cardGRANT2003-04-081998-02-164185417GoodSwisscom AGSwisscom AG
US7065656B20.310Tamper-evident/tamper-resistant electronic componentsGRANT2006-06-202001-07-0325407880GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US6819133B10.306System and method for protecting configuration data for a programmable execution unitGRANT2004-11-162003-07-0333418754GoodAdtran IncAdtran Inc
US7739512B20.304Method and apparatus for internet web site accreditationGRANT2010-06-152000-02-2326073016GoodTradesafely com LtdTradesafely com Ltd
US7013296B10.304Using electronic security value units to control access to a resourceGRANT2006-03-141999-06-0835998898GoodColumbia University of New YorkCOLUMBIA INNOVATION ENTERPRISE, Columbia University of New York
US20030084256A10.303Method and system for privilege-level-access to memory within a computerAPPLICATION2003-05-012001-10-3121694253GoodHewlett Packard CoSamsung Electronics Co Ltd
US7809131B10.300Adjusting sensor time in a network security systemGRANT2010-10-052004-12-2342797812GoodArcSight LLCMicro Focus LLC
US7069443B20.298Creating and verifying electronic documentsGRANT2006-06-272000-06-0622781866GoodIngeo Systems IncIngeo Systems Inc
US7415476B20.297Digital file management and imaging system and method including secure file markingGRANT2008-08-191999-02-2622983674GoodAuthentiDate Holding CorpAuthentiDate Holding Corp
US6101510A0.297Web browser control for incorporating web browser functionality into application programsGRANT2000-08-081997-01-2925150792GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6205550B10.297Tamper resistant methods and apparatusGRANT2001-03-201996-06-1325450647GoodIntel CorpIntel Corp
US20050015344A10.296Method and system for detection of tampering and verifying authenticity of a 'data capture' data from a value dispensing systemAPPLICATION2005-01-202003-06-2633418693GoodPitney Bowes IncPitney Bowes Inc
US5159560A0.295Automated merchandise dispensing and retrieval systemGRANT1992-10-271990-06-2524167263GoodRedbox Entertainment IncRedbox Entertainment Inc
US6247133B10.289Method for authenticating electronic documents on a computer networkGRANT2001-06-121998-02-2321839677Good
US7140039B10.288Identification of an attacker in an electronic systemGRANT2006-11-211999-06-0837423370GoodColumbia University of New YorkCOLUMBIA INNOVATION ENTERPRISE, Columbia University of New York
US20060089917A10.287License synchronizationAPPLICATION2006-04-272004-10-2236207263GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20110231391A10.287PROJECT MANAGEMENT DATABASE AND METHOD OF MANAGING PROJECT RELATED INFORMATIONAPPLICATION2011-09-222001-12-1027616581Good
US7272855B10.287Unified monitoring and detection of intrusion attacks in an electronic systemGRANT2007-09-181999-06-0838481928GoodColumbia University of New YorkCOLUMBIA INNOVATION ENTERPRISE, Columbia University of New York
US4509201A0.285Wireless telephone apparatus with protection against power lossGRANT1985-04-021982-06-2314475114GoodToshiba CorpToshiba Corp
US20070067590A10.285Providing protected access to critical memory regionsAPPLICATION2007-03-222005-09-2237885595GoodIntel CorpIntel Corp
US7305558B10.283Digital signing methodGRANT2007-12-041999-10-2226562608GoodHitachi LtdHitachi Ltd
US7436792B10.280For-fee distribution of consumer-selected content items between different satellite radio service providersGRANT2008-10-142005-01-0339828344GoodConsumer Satellite Radio LLCConsumer Satellite Radio LLC
US6091823A0.279Transaction processing system utilizing teletext broadcasting system and terminal used in the transaction processing systemsGRANT2000-07-181992-08-0627553865GoodFujitsu LtdGoogle LLC
US8015604B10.278Hierarchical architecture in a network security systemGRANT2011-09-062003-10-1044513687GoodArcSight LLCMicro Focus LLC
US6944689B20.278Printer/powered peripheral node systemGRANT2005-09-132001-07-1625423699GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US4320387A0.275Information communicating apparatus and methodGRANT1982-03-161978-12-2826802540Good
US5319562A0.273System and method for purchase and application of postage using personal computerGRANT1994-06-071991-08-2225011085GoodPSI Systems IncPSI Systems Inc
US9027120B10.271Hierarchical architecture in a network security systemGRANT2015-05-052003-10-1053001856GoodHewlett Packard Development Co LPMicro Focus LLC
US7082523B20.270Bridging memory access across pre-boot and runtime phasesGRANT2006-07-252002-12-1632507019GoodIntel CorpIntel Corp
US7861299B10.269Threat detection in a network security systemGRANT2010-12-282003-09-0338374143GoodArcSight LLCMicro Focus LLC
US20030126531A10.269Deterministic hardware reset for FRC machineAPPLICATION2003-07-032001-12-3121906558GoodIntel CorpIntel Corp
US8892475B20.268Provision of authorization and other servicesGRANT2014-11-182000-09-0827398175GoodIdentrust IncIdentrust Inc
US20020183056A10.266Safe application distribution and execution in a wireless environmentAPPLICATION2002-12-052001-05-3125359530GoodQualcomm IncQualcomm Inc
US20030070115A10.265Logging and retrieving pre-boot error informationAPPLICATION2003-04-102001-10-0525518841GoodIntel CorpIntel Corp
US6349292B10.262System and method for distributing postage over a public network  enabling efficient printing of postal indicia on items to be mailed and authenticating the printed indiciaGRANT2002-02-191997-10-0622037562GoodEscher Group LtdEscher Group Ltd
US7844999B10.262Message parsing in a network security systemGRANT2010-11-302005-03-0143215738GoodArcSight LLCMicro Focus LLC
US20030051169A10.261Using permissions to allocate device resources to an applicationAPPLICATION2003-03-132001-08-1323210077GoodQualcomm IncQualcomm Inc
US20040133750A10.260Apparatus for controlling access in a data processorAPPLICATION2004-07-082001-03-0237769873GoodATSANA SEMICONDUCTOR CORPMteksemicon Inc
US7574479B20.254Techniques for attesting to contentGRANT2009-08-112006-01-2438056498GoodMicro Focus Software IncApple Inc
US20060277477A10.249System and method for generating enhanced depiction of electronic files such as web filesAPPLICATION2006-12-072005-06-0237495551GoodENTRTEPRENEUR'S PLACE IncENTRTEPRENEUR'S PLACE Inc
US20110179488A10.248KERNAL-BASED INTRUSION DETECTION USING BLOOM FILTERSAPPLICATION2011-07-212004-03-2543617421GoodVerizon Corporate Services Group Inc, Raytheon BBN Technologies CorpRaytheon BBN Technologies Corp, Verizon Patent and Licensing Inc
US6421759B10.247Single-cycle variable period buffer manager for disk controllersGRANT2002-07-161997-10-1625491928GoodSeagate Technology LLCSeagate Technology LLC
US7469362B20.247Using a call stack hash to record the state of a processGRANT2008-12-232005-04-1537395415GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7254694B20.246Processors interconnect fabric with relay broadcasting and accumulation of partial responsesGRANT2007-08-072005-02-1036781263GoodInternational Business Machines CorpInternational Business Machines Corp
US6564318B10.246Method and apparatus for execution of an application during computer pre-boot operation and post-boot under normal OS controlGRANT2003-05-131997-12-1046203630GoodPhoenix Technologies LtdPhoenix Technologies Ltd
US9684889B20.243System and method for providing certification-related and other servicesGRANT2017-06-201999-02-1227537564GoodIdentrust IncIdentrus LLC, Identrust Inc
US20050038757A10.243Memory card device  rights managing system and time managing methodAPPLICATION2005-02-172003-08-1134131617GoodPanasonic CorpPanasonic Corp
EP1560033A10.243Integrated circuit comprising a secure test mode by resetting of said test modeGRANT2005-08-032004-01-2934639797GoodSTMicroelectronics SASTMicroelectronics SA
US7127566B20.241Synchronizing memory copy operations with memory accessesGRANT2006-10-242003-12-1834678248GoodIntel CorpIntel Corp
US7765161B20.241System and method for providing payment services in electronic commerceGRANT2010-07-271999-09-2422557004GoodIdentrust IncIdentrus LLC, Identrust Inc
US4779187A0.241Method and operating system for executing programs in a multi-mode microprocessorGRANT1988-10-181985-04-1024900326GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7257715B20.237Semiconductor integrated circuitGRANT2007-08-142001-01-2418882084GoodPanasonic CorpCollabo Innovations Inc
US20080068513A10.237Remote ControllerAPPLICATION2008-03-202004-09-2836118995GoodPOWER TO PEOPLE KKPTP Inc
US7127567B20.236Performing memory RAS operations over a point-to-point interconnectGRANT2006-10-242003-12-1834678249GoodIntel CorpIntel Corp
WO2004031923A10.236SIGNATURE CREATION DEVICEAPPLICATION2004-04-152002-10-0732031787Good
EP0657820A10.234Method for preventing unauthorised data modification in an apparatus with a non-volatile memoryGRANT1995-06-141993-12-086504502GoodSiemens AGSiemens AG
US7177975B20.233Card system with erase tagging hierarchy and group based write protectionGRANT2007-02-131998-11-0422681877GoodSanDisk CorpSanDisk Technologies LLC
US7441115B20.233Method for verifying a digital signatureGRANT2008-10-211999-10-2231719834GoodHitachi LtdHitachi Ltd
US5136646A0.232Digital document time-stamping with catenate certificateGRANT1992-08-041991-03-0824675954GoodTelcordia Technologies IncTelcordia Technologies Inc
US20020040337A10.231Electronic commerce transaction audit system  electronic commerce transaction audit method  and storage medium recording electronic commerce transaction audit program thereonAPPLICATION2002-04-042000-09-2918780819GoodNEC CorpNEC Corp
US20050131918A10.225Personalized profile for evaluating contentAPPLICATION2005-06-162003-12-1234657279GoodApplied Minds LLCGoogle LLC
US7328368B20.221Dynamic interconnect width reduction to improve interconnect availabilityGRANT2008-02-052004-03-1234920854GoodIntel CorpIntel Corp
US20060041511A10.221Device and method for digital rights management in a mobile terminalAPPLICATION2006-02-232004-03-1135910749GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20020156835A10.221Multiple browser interfaceAPPLICATION2002-10-242001-04-2325282455GoodGilbarco IncGilbarco Inc
US20030110402A10.220Method for inputting a password in a mobile communication terminalAPPLICATION2003-06-122001-12-0719716792GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
EP1612670A20.214Secure task management in a computerGRANT2006-01-042004-07-0235058913GoodNTT Docomo IncNTT Docomo Inc
US6938178B20.210Terminal device and real-time clock control method therefor enabling preservation of clock/calendar information and high information readout speedGRANT2005-08-302001-02-1618902858GoodNEC CorpLenovo Innovations Ltd Hong Kong
US5757819A0.209Integrated circuit test controllerGRANT1998-05-261994-07-0110757625GoodAdvanced Risc Machines LtdARM Ltd
US7401225B20.208Method and apparatus for publishing signature log entryGRANT2008-07-152003-02-2732905649GoodHitachi LtdHitachi Ltd
US7512852B20.208Protecting an integrated circuit test modeGRANT2009-03-312004-01-2934639798GoodSTMicroelectronics SASTMicroelectronics SA
US20020062438A10.207Reliance server for electronic transaction systemAPPLICATION2002-05-231996-12-1325078951GoodCertco LLCCertco LLC
US20060107268A10.205Method and apparatus for implementing task management of computer operationsAPPLICATION2006-05-182004-11-1636387972GoodSoftware Wireless LLCSoftware Wireless LLC
US7427709B20.201Apparatus and method for processing MIDIGRANT2008-09-232004-03-2234858867GoodLG Electronics IncLG Electronics Inc
US20020099791A10.196Method of printing information by a network kioskAPPLICATION2002-07-252000-11-2924922251GoodNCR CorpNCR Corp
US20060253711A10.182Biometric safety and security systemAPPLICATION2006-11-092005-05-0937395341Good
US6216251B10.179On-chip error detection and correction system for an embedded non-volatile memory array and method of operationGRANT2001-04-101999-04-3023168016GoodMotorola IncProgressive Semiconductor Solutions LLC
US8069175B20.172Delegating authority to evaluate contentGRANT2011-11-292002-04-1046584510GoodGoogle LLCGoogle LLC
US5163155A0.171SYSTEM FOR RESETTING A SERIES OF LATCHES TO VARYING DATA PATTERNSGRANT1992-11-101988-06-0715256586GoodMitsubishi Electric CorpMitsubishi Electric Corp
US7249258B20.165Method and system for assuring an originalGRANT2007-07-242002-07-0229996984GoodHitachi LtdHitachi Ltd
WO2005062855A20.164PRECISE SLEEP TIMER USING A LOW-COST AND LOW-ACCURACY CLOCKAPPLICATION2005-07-142003-12-2234742273Good
WO2006128747A10.164METHOD FOR TRANSMITTING AND VERIFYING SYNCHRONIZATION MESSAGESAPPLICATION2006-12-072005-05-3136660798Good
US20020065931A10.155Method of downloading web content to a network kiosk in advanceAPPLICATION2002-05-302000-11-2924922248GoodNCR CorpNCR Corp
US7844610B20.153Delegated authority evaluation systemGRANT2010-11-302003-12-1242337745GoodGoogle LLCGoogle LLC
US20040119650A10.149Auxiliary antenna for wireless handsetAPPLICATION2004-06-242002-12-2332594457GoodCingular Wireless LLCAT&T Mobility II LLC
US4493031A0.148Memory write protection using timersGRANT1985-01-081982-08-2523628256GoodAT&T Bell Laboratories IncNokia Bell Labs, AT&T Corp
US20030217309A10.144Software hardeningAPPLICATION2003-11-202002-05-2029419401GoodSun Microsystems IncOracle America Inc
US5446856A0.132Circuitry and method for addressing global array elements in a distributed memory  multiple processor computerGRANT1995-08-291991-04-2926880468GoodIntel CorpIntel Corp
US20070160721A10.130SYSTEM AND METHOD FOR AUDITING HAZARDOUS SUBSTANCES OF A PRODUCTAPPLICATION2007-07-122006-01-1238255247GoodHon Hai Precision Industry Co LtdHon Hai Precision Industry Co Ltd
US6061010A0.108Dual return-to-zero pulse encoding in a DAC output stageGRANT2000-05-091997-09-2525469031GoodAnalog Devices IncAnalog Devices Inc
US20020049673A10.091Bad check and unpaid bill collection systemAPPLICATION2002-04-252000-09-2926930266Good
US4959832A0.066Parallel pseudorandom pattern generator with varying phase shiftGRANT1990-09-251988-12-0923078068GoodInternational Business Machines CorpInternational Business Machines Corp
GB2430774ANRSoftware updating with version comparison stepsGRANT2007-04-042005-10-0335395209GoodNEC Technologies UK LtdNEC Technologies UK Ltd
GB2414139BNRIntegrated circuit architecture for mobile radio communications deviceGRANT2006-10-182004-05-1232526929GoodNEC Technologies UK LtdNEC Technologies UK Ltd
GB2386802ANRAuditing of secure communication sessions over a communication networkGRANT2003-09-242002-03-189933237GoodHewlett Packard CoHP Inc
GB2336005ANRMaintaining security in development toolsGRANT1999-10-061998-03-2810829369GoodMotorola LtdMotorola Solutions UK Ltd
FR2884000A1NRCryptographic coprocessor control execution monitoring method for integrated circuit  involves carrying error signal if abnormal flow of execution is detected and preventing access to register as long as signal is given with active valueGRANT2006-10-062005-04-0535064731GoodSTMicroelectronics SASTMicroelectronics SA
DE19633919C1NRProgram module updating method for mobile communications apptsGRANT1997-06-051996-08-227803380GoodSiemens AGSiemens AG
DE10248542A1NRProtecting log files involves data processing system security module providing information for each entry in log file  whereby each entry has associated function value  especially digital signatureGRANT2004-04-222002-10-1432038752GoodDeutsche Telekom AGDeutsche Telekom AG
CN1906560ANRMethod and apparatus for implementing subscriber identity module (SIM) capabilities in an open platformGRANT2007-01-312003-11-1934574645Good
CN1694032ANRMethod and system for bootstrapping a trusted server having redundant trusted platform modulesGRANT2005-11-092004-04-2935310719Good
CN1509546ANRPlatform and method for securely transmitting authorization dataGRANT2004-06-302000-12-2725028644Good
US20070123298A10.539Mobile wireless communications device having buffered clock distribution network for microprocessor and RF circuitsAPPLICATION2007-05-312005-11-3038088213FairResearch in Motion LtdBlackBerry Ltd
EP1817595B10.514INTEGRATED CIRCUIT AND A METHOD FOR SECURE TESTINGGRANT2009-03-042004-11-2234960219FairNXP USA IncNXP USA Inc
US6378071B10.447File access system for efficiently accessing a file having encrypted data within a storage deviceGRANT2002-04-231997-02-2812755299FairFujitsu LtdFujitsu Ltd
US5577735A0.444Computer software delivery systemGRANT1996-11-261991-05-2824836715FairTCI Technology IncTime Warner Cable Enterprises LLC, TCI Technology Management LLC
US7502770B20.437Knowledge webGRANT2009-03-102001-04-1126961899FairMetaweb Technologies IncGoogle LLC
US6009488A0.410Computer having packet-based interconnect channelGRANT1999-12-281997-11-0726795788FairMicrolinc LLCMicrolinc LLC
US7561515B20.406Role-based network traffic-flow rate controlGRANT2009-07-142004-09-2736125386FairIntel CorpIntel Corp
US7722468B20.383Magnetoresistive memory units as read only memory devices in gaming machinesGRANT2010-05-252005-03-0936581906FairInternational Game TechnologyInternational Game Technology
US7931533B20.382Game development architecture that decouples the game logic from the graphics logicsGRANT2011-04-262001-09-2826716870FairInternational Game TechnologyInternational Game Technology
US6286029B10.377Kiosk controller that retrieves content from servers and then pushes the retrieved content to a kiosk in the order specified in a run listGRANT2001-09-041997-04-2825282915FairSabre IncSabre GLBL Inc
US6260087B10.374Embedded configurable logic ASICGRANT2001-07-101999-03-0322992474FairIntellectual Ventures II LLCIntellectual Ventures II LLC
US7736234B20.372MRAM as critical event storage for powered down gaming machinesGRANT2010-06-152005-03-0936971747FairInternational Game TechnologyInternational Game Technology
US7072937B20.370Web-based common use terminal with multiple application serversGRANT2006-07-042001-03-2126796661FairNorthrop Grumman CorpNorthrop Grumman Systems Corp
US8713400B20.365Method and system for reduction of decoding complexity in a communication systemGRANT2014-04-292001-10-1225524254FairQualcomm IncQualcomm Inc
EP1089219A20.361Method for protecting a data memoryGRANT2001-04-041999-10-017924328FairGiesecke and Devrient GmbHGiesecke and Devrient GmbH
US7228440B10.359Scan and boundary scan disable mechanism on secure deviceGRANT2007-06-052002-02-1338090283FairLSI CorpAvago Technologies International Sales Pte Ltd
US6754862B10.352Gaining access to internal nodes in a PLDGRANT2004-06-222000-03-0932474028FairAltera CorpAltera Corp
US6826315B10.347Digital imaging device with image authentication capabilityGRANT2004-11-302000-09-1324651367FairHewlett Packard Development Co LPHewlett Packard Development Co LP
US7206939B20.340File storage system and a NAS serverGRANT2007-04-172002-03-2627800433FairHitachi LtdHitachi Ltd
US6519596B10.335System for increasing traffic on an electronic site of a system of networked computersGRANT2003-02-111997-06-0346279441FairPhoterra IncPicture Marketing Inc
US7837556B20.296Decoupling of the graphical presentation of a game from the presentation logicGRANT2010-11-232001-09-2826717918FairInternational Game TechnologyInternational Game Technology
EP1818677B10.287Electronic circuit comprising a test mode secured by breaking a scan chainGRANT2011-03-302006-02-1037071652FairSTMicroelectronics SASTMicroelectronics SA
US20040257219A10.276Computer security alert systemAPPLICATION2004-12-232003-04-1633519132Fair
US20060256907A10.263Real time clockAPPLICATION2006-11-162005-05-1337419113FairNXP USA IncNXP USA Inc
US8254411B20.263Data processing system  method and interconnect fabric having a flow governorGRANT2012-08-282005-02-1036912653FairInternational Business Machines CorpInternational Business Machines Corp
US5347523A0.232Data processing system having serial self address decoding and method of operationGRANT1994-09-131992-03-0225291688FairMotorola IncNXP USA Inc
US7577886B20.220Method for testing an electronic circuit comprising a test mode secured by the use of a signature  and associated electronic circuitGRANT2009-08-182005-07-0837718929FairSTMicroelectronics SASTMicroelectronics SA
US5898776A0.217Security antifuse that prevents readout of some but not other information from a programmed field programmable gate arrayGRANT1999-04-271996-11-2125034895FairQuickLogic CorpQuickLogic Corp
US20040230550A10.212METHOD AND APPARATUS FOR ELECTRONIC FILING OF PATENT AND TRADEMARK APPLICATIONS AND RELATED CORRESPONDENCEAPPLICATION2004-11-182003-04-0333415535FairLegalStar IncLegalStar Inc
US8539292B20.209Testing of an integrated circuit that contains secret informationGRANT2013-09-172005-08-1037606833FairNXP BVNXP BV
US20040021577A10.208Power outage alert electronic deviceAPPLICATION2004-02-052002-08-0531187769Fair
US6304099B10.206Method and structure for dynamic in-system programmingGRANT2001-10-161998-05-2122177656FairLattice Semiconductor CorpLattice Semiconductor Corp
US5627842A0.202Architecture for system-wide standardized intra-module and inter-module fault testingGRANT1997-05-061993-01-2126676631FairDigital Equipment CorpSamsung Electronics Co Ltd
US7251804B10.201Structures and methods of overcoming localized defects in programmable integrated circuits by routing during the programming thereofGRANT2007-07-312004-10-0138290418FairXilinx IncXilinx Inc
US7647302B20.194Method for searching layered dataGRANT2010-01-122005-05-3146322548FairSAP SE SAP SE
EP1560032A10.191Integrated circuit test mode securisation method by intrusion detectionGRANT2005-08-032004-01-2934639799FairSTMicroelectronics SASTMicroelectronics SA
US8012025B20.179Video game controller hub with control input reduction and combination schemesGRANT2011-09-062002-12-1332965412FairApplied Minds LLCApplied Invention LLC
US6757683B20.178Method of downloading web content to a network kiosk in advanceGRANT2004-06-292000-11-2924922255FairNCR CorpNCR Corp
US4947357A0.147Scan testing a digital system using scan chains in integrated circuitsGRANT1990-08-071988-02-2422574577FairStellar Computer IncStardent Computer Inc
US6539511B10.144Semiconductor integrated circuit devices with test circuitGRANT2003-03-251999-05-0614921485FairMitsubishi Electric CorpRenesas Electronics Corp
US7330275B20.123Method and system for determining the position and alignment of a surface of an object in relation to a laser beamGRANT2008-02-122002-10-1132068758FairIntralase CorpAMO Development LLC
US20090309591A10.095DISPLACED ELECTRODE AMPLIFIERAPPLICATION2009-12-172005-11-1038049358FairHalliburton Energy Services IncHalliburton Energy Services Inc
US20060150740A10.078Resonating transducerAPPLICATION2006-07-132005-01-0736651890FairKulite Semiconductor Products IncKulite Semiconductor Products Inc
US6384628B10.064Multiple voltage supply programmable logic deviceGRANT2002-05-072000-03-3124154010FairCypress Semiconductor CorpMonterey Research LLC
US6072202A0.054II-VI compound semiconductor device with III-V buffer layerGRANT2000-06-061996-09-2617267594FairNEC CorpNEC Corp
US6624084B20.040Plasma processing equipment and plasma processing method using the sameGRANT2003-09-231999-12-2718496161FairHitachi LtdHitachi Ltd
EP1655448A20.034Connector for elements spacing panesGRANT2006-05-102004-11-0534982467Fair
US7665399B20.030System and method for vacuum generated imprintingGRANT2010-02-232005-02-2436911256FairIntel CorpIntel Corp
US20060055523A10.009Method for locating tire condition sensing apparatusesAPPLICATION2006-03-162004-09-1336033292Fair
JPH1167614ANRPOWER SUPPLY MONITORGRANT1999-03-091997-08-2016797999Fair
JPH0685666ANRCLOCK SIGNAL GENERATING INTEGRATED CIRCUITGRANT1994-03-251992-02-1825270592Fair
JP2004171544ANRCONTENT BROWSING SYSTEM WITH TIME RESTRICTIONAPPLICATION2004-06-172002-10-3132715896Fair
JP2000311196ANRSYSTEM FOR PROCESSING APPLICATION PROCEDURE AND IC CARD USED THEREFORAPPLICATION2000-11-071999-04-2814817324Fair
FR2888330A1NRSynchronous integrated electronic circuit  has intelligence circuit with state detection cell to produces state signal representing logic state of output signal delivered by logical combination of control signals received on conductorsGRANT2007-01-122005-07-0836123107FairSTMicroelectronics SASTMicroelectronics SA
FR2885417A1NRNo titleGRANT2006-11-102005-05-0435539041FairSTMicroelectronics SASTMicroelectronics SA
DE102005001925B4NRNo titleAPPLICATION2014-12-042004-01-1634215225FairSunplus Technology Co LtdSunplus Technology Co Ltd
DE102005001924B4NRNo titleAPPLICATION2014-12-042004-01-1634215224FairSunplus Technology Co LtdSunplus Technology Co Ltd
CN1874317ANRCommunication terminal device and computer deviceGRANT2006-12-062005-06-0337484586Fair

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
816
Recommended Classes
204
Government Assigned Classes
3
CPC
Title
Score
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine2.517
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)2.246
G06F12/1491in a hierarchical protection system  e.g. privilege levels  memory rings1.637
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures1.626
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database1.601
G06F21/71to assure secure computing or processing of information1.141
G06F21/445by mutual authentication  e.g. between devices or programs1.066
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks1.042
H04W12/02Protecting privacy or anonymity1.039
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode1.036
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)1.036
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules1.032
H04W12/08Access security1.014
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols1.014
G06F21/85interconnection devices  e.g. bus-connected or in-line devices1.013
H04L63/0263Rule management1.012
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload1.001
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)0.989
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems0.989
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics0.989
G06F21/606by securing the transmission between two devices or processes0.986
G06F11/1458Management of the backup or restore process0.986
H04W12/04Key management0.981
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)0.980
H04L63/0272Virtual private networks0.980
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)0.974
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.973
H04L63/1433Vulnerability analysis0.970
G06F21/602Providing cryptographic facilities or services0.966
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)0.965
G06F21/79in semiconductor storage media  e.g. directly-addressable memories0.964
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.963
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints0.962
H04N21/426Characteristics of or|  Internal components of the client | (ref: H04N5/44)|  takes precedence0.961
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]0.959
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.958
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)0.953
H04L9/0838Key agreement  i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by  or associated with  each of these | network architectures or network communication protocols for key exchange in a packet data network | (ref: H04L63/061)0.952
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)0.952
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities0.951
G06F9/3824Operand accessing0.949
H04W4/16Communication-related supplementary services  e.g. call-transfer or call-hold0.949
G06Q20/4012Verifying personal identification number [PIN]0.948
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material0.946
H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card | arrangements for secret or secure communication | (ref: H04L9/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)|  | | security arrangements in wireless networks | (ref: H04W12/00)0.946
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)0.945
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)0.945
G06F21/12Protecting executable software0.945
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.944
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.944
G06F21/72in cryptographic circuits0.944
G06F21/83input devices  e.g. keyboards  mice or controllers thereof0.944
H04L9/0819Key transport or distribution  i.e. key establishment techniques where one party creates or otherwise obtains a secret value  and securely transfers it to the other(s) | network architectures or network communication protocols for key distribution in a packet data network | (ref: H04L63/062)0.942
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)0.941
H04L9/0822using key encryption key0.941
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself0.939
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)0.938
H04L63/0421Anonymous communication  i.e. the party's identifiers are hidden from the other party or parties  e.g. using an anonymizer0.938
G06F9/45533Hypervisors| Virtual machine monitors0.938
H04L63/0861using biometrical features  e.g. fingerprint  retina-scan | cryptographic mechanisms or cryptographic arrangements for entity authentication using biological data | (ref: H04L9/3231)0.932
H04W88/02Terminal devices0.932
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner0.931
G06Q20/3674involving authentication0.929
H04K1/00Secret communication0.929
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)0.928
H04L63/162at the data link layer0.927
H04L63/0492by using a location-limited connection  e.g. near-field communication or limited proximity of entities0.925
H04L63/0485Networking architectures for enhanced packet encryption processing  e.g. offloading of IPsec packet processing or efficient security association look-up0.925
H04L29/08Transmission control procedure  e.g. data link level control procedure0.922
H04B1/3816Mechanical arrangements for accommodating identification devices  e.g. cards or chips| with connectors for programming identification devices0.922
G06F21/84output devices  e.g. displays or monitors0.922
G06F21/575Secure boot0.921
H04L9/085Secret sharing or secret splitting  e.g. threshold schemes0.920
H04L9/321involving a third party or a trusted authority0.920
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage0.918
H04W12/06Authentication0.916
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)0.916
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability0.915
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates0.913
G06F13/102where the programme performs an interfacing function  e.g. device driver | (ref: G06F13/105)|  takes precedence| scheduling within device drivers | (ref: G06F9/52)| | contention policies within device drivers | (ref: G06F9/4881)0.912
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy0.910
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards0.910
G06F21/335for accessing specific resources  e.g. using Kerberos tickets0.910
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)0.909
H04W12/12Fraud detection0.909
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals0.907
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity0.907
G06Q20/3278RFID or NFC payments by means of M-devices0.905
G06Q30/06Buying  selling or leasing transactions0.904
G06F15/173using an interconnection network  e.g. matrix  shuffle  pyramid  star  snowflake0.904
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.904
G06F21/556involving covert channels  i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755)0.903
G06Q20/3227Use of a security embedded in M-devices0.903
H04W12/10Integrity0.903
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.902
H04L63/065for group communications | cryptographic mechanisms or cryptographic arrangements for key management involving conference or group key | (ref: H04L9/0833)0.902
H04L63/30for supporting lawful interception  monitoring or retaining of communications or communication related information | circuit switched telephony call monitoring | (ref: H04M3/2281)0.901
G06F15/00Digital computers in general | details | (ref: G06F1/00)|  – | (ref: G06F13/00)| Data processing equipment in general0.900
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)0.898
H04L9/0827involving distinctive intermediate devices or communication paths | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.898
G06F21/73by creating or determining hardware identification  e.g. serial numbers0.897
G10H7/002using a common processing for different operations or calculations  and a set of microinstructions (programme) to control the sequence thereof0.897
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB0.896
H04L63/16Implementing security features at a particular protocol layer0.896
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system0.895
G07C9/00563using personal physical data of the operator  e.g. finger prints  retinal images  voicepatterns0.895
G06Q30/00Commerce  e.g. shopping or e-commerce0.895
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.895
H04L63/045wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.894
A61B5/0022Monitoring a patient using a global network  e.g. telephone networks  internet0.893
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)0.893
G06F21/45Structures or tools for the administration of authentication0.893
G06F13/4068Electrical coupling0.893
H04L63/0471applying encryption by an intermediary  e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding0.892
H04L9/0877using additional device  e.g. trusted platform module [TPM]  smartcard  USB or hardware security module [HSM]0.891
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks0.890
H04W88/06adapted for operation in multiple networks | or having at least two operational modes|   e.g. multi-mode terminals0.888
H04L9/0863involving passwords or one-time passwords | network architectures or network communication protocols for using one-time keys in a packet data network | (ref: H04L63/067)0.888
G06F3/165Management of the audio stream  e.g. setting of volume  audio stream path0.887
G09C1/00Apparatus or methods whereby a given sequence of signs  e.g. an intelligible text  is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00)0.884
G06F21/31User authentication0.884
G06F9/441Multiboot arrangements  i.e. selecting an operating system to be loaded0.883
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]0.882
G06F21/6227where protection concerns the structure of data  e.g. records  types  queries0.882
G06F7/588Random number generators  i.e. based on natural stochastic processes0.881
G06Q20/382insuring higher security of transaction0.881
G06F21/46by designing passwords or checking the strength of passwords0.880
G06F21/60Protecting data0.880
G06F9/30178of compressed or encrypted instructions0.879
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)0.879
G06F9/545where tasks reside in different layers  e.g. user- and kernel-space0.879
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)0.878
H04L9/3273for mutual authentication | network architectures or network communication protocols for achieving mutual authentication in a packet data network | (ref: H04L63/0869)0.878
H04L63/0464using hop-by-hop encryption  i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it0.878
H04L63/105Multiple levels of security0.877
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)0.875
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint0.875
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)0.875
G07F7/0866by active credit-cards adapted therefor | (ref: G07F7/1008)|  takes precedence0.875
H04L9/3271using challenge-response0.875
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]0.874
H04M1/66with means for preventing unauthorised or fraudulent calling | verifying user identity or authority in secret or secure digital communications | (ref: H04L9/32)0.872
G06Q30/0238at point-of-sale [POS]0.872
H04W88/08Access point devices0.872
G06F21/42using separate channels for security data0.871
H04L9/10with particular housing  physical features or manual controls | not used| | see|  | (ref: H04L9/00)0.871
H04L9/3247involving digital signatures0.871
G06Q20/4014Identity check for transaction0.871
H04L51/38in combination with wireless systems | mobile application service signalling using messaging  e.g. SMS  | (ref: H04W4/12)0.870
G06F21/125by manipulating the program code  e.g. source code  compiled code  interpreted code  machine code0.870
G06F21/629to features or functions of an application0.870
H04M1/68Circuit arrangements for preventing eavesdropping0.868
G06F21/577Assessing vulnerabilities and evaluating computer system security0.868
H04L63/02for separating internal from external traffic  e.g. firewalls0.867
G06F15/167using a common memory  e.g. mailbox0.867
H04L9/3236using cryptographic hash functions0.867
H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords0.865
H04L63/123received data contents  e.g. message integrity0.865
G06Q10/00Administration| Management0.865
H04M1/6066including a wireless connection0.865
G06F21/82Protecting input  output or interconnection devices0.864
G06F21/43wireless channels0.863
H04L51/14with selective forwarding0.862
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)0.861
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)0.861
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.860
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key0.860
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones0.859
G06F21/6245Protecting personal data  e.g. for financial or medical purposes0.859
G06Q30/0241Advertisement0.858
G06Q30/0277Online advertisement0.858
H04L67/04adapted for terminals or networks with limited resources or for terminal portability  e.g. wireless application protocol [WAP] | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)0.858
H04L9/0852Quantum cryptography | transmission systems employing electromagnetic waves other than radio waves  e.g. light  infra-red | (ref: H04B10/00)| | wavelength-division multiplex systems | (ref: H04J14/02)0.858
G06Q20/04Payment circuits0.857
H04L9/3221interactive zero-knowledge proofs0.856
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour0.855
G06F21/6281at program execution time  where the protection is within the operating system0.854
G06F8/00Arrangements for software engineering | testing or debugging | (ref: G06F11/36)| | administrative  planning or organisation aspects of software project management | (ref: G06Q10/06)0.854
H04N21/42623involving specific decryption arrangements0.853
H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence | pseudo-random number generators in general | (ref: G06F7/58)0.853
G06F21/554involving event detection and direct action0.853
G06Q20/3829involving key management0.853
G06F21/105Tools for software license management or administration  e.g. managing licenses at corporate level0.851
G10L13/00Speech synthesis| Text to speech systems0.851
H04N7/147Communication arrangements  e.g. identifying the communication as a video-communication  intermediate storage of the signals | selecting | (ref: H04Q)0.850
G06F21/44Program or device authentication0.850
H04W4/10Push-to-Talk [PTT] or Push-On-Call services0.850
G06F21/41where a single sign-on provides access to a plurality of computers0.850
G06F1/30Means for acting in the event of power-supply failure or interruption  e.g. power-supply fluctuations | for resetting only | (ref: G06F1/24)0.850
G06F21/80in storage media based on magnetic or optical technology  e.g. disks with sectors | preventing unauthorised reproduction or copying of disc-type recordable media | (ref: G11B20/00)0.848
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)0.847
G11B20/0021involving encryption or decryption of contents recorded on or reproduced from a record carrier0.847
G06F21/77in smart cards0.846
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals0.846
G11B20/00507wherein consecutive physical data units of the record carrier are encrypted with separate encryption keys  e.g. the key changes on a cluster or sector basis0.844
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)0.844
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.844
H04L63/302gathering intelligence information for situation awareness or reconnaissance0.843
G06F21/40by quorum  i.e. whereby two or more security principals are required0.843
G06F21/305by remotely controlling device operation0.843
H04R1/10Earpieces| Attachments therefor | | Earphones| Monophonic headphones | (ref: H04R1/28)|  takes precedence| stereophonic headphones | (ref: H04R5/033)0.843
H04N21/4126portable device  e.g. remote control with a display  PDA  mobile phone | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)0.843
H04L67/327whereby the routing of a service request to a node providing the service depends on the content or context of the request  e.g. profile  connectivity status  payload or application type0.841
G10L19/008Multichannel audio signal coding or decoding  i.e. using interchannel correlation to reduce redundancies  e.g. joint-stereo  intensity-coding  matrixing | arrangements for reproducing spatial sound | (ref: H04R5/00)| | stereophonic systems  e.g. spatial sound capture or matrixing of audio signals in the decoded state | (ref: H04S)0.841
G06F9/44526Plug-ins| Add-ons0.841
H04W8/245from a network towards a terminal0.841
G06F8/54Link editing before load time0.841
G06F1/3203Power Management  i.e. event-based initiation of power-saving mode0.839
G06F21/36by graphic or iconic representation0.838
G09C5/00Ciphering apparatus or methods not provided for in the preceding groups  e.g. involving the concealment or deformation of graphic data such as designs  written or printed messages0.838
G06F3/048Interaction techniques based on graphical user interfaces [GUI]0.838
H04L29/06755Authentication mechanisms0.838
H04L63/1416Event detection  e.g. attack signature detection0.837
G06F21/70Protecting specific internal or peripheral components  in which the protection of a component leads to protection of the entire computer0.836
G06T1/60Memory management0.835
G06F3/147using display panels0.835
H04L63/0815providing single-sign-on or federations0.835
G06F15/17331Distributed shared memory [DSM]  e.g. remote direct memory access [RDMA]0.835
G06F11/3648using additional hardware0.835
G06F21/604Tools and structures for managing or administering access control systems0.835
G06F21/76in application-specific integrated circuits [ASICs] or field-programmable devices  e.g. field-programmable gate arrays [FPGAs] or programmable logic devices [PLDs]0.834
H04L9/0841involving Diffie-Hellman or related key agreement protocols0.833
G06Q20/405Establishing or using transaction specific rules0.833
G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer  e.g. network details  transfer of information from host to ECR or from ECR to ECR0.833
G06Q20/20Point-of-sale [POS] network systems | POS | per se|  | (ref: G07F)|  or | (ref: G07G)0.833
G06F21/81by operating on the power supply  e.g. enabling or disabling power-on  sleep or resume operations0.833
H04L51/066with adaptation of format0.831
G06F12/0875with dedicated cache  e.g. instruction or stack0.831
G07B17/0008Communication details outside or between apparatus | coin-freed apparatus for franking | per se|  | (ref: G07F17/26)0.831
G06F21/33using certificates0.830
H04L12/2898Subscriber equipments | DSL modems | (ref: H04M11/062)| | cable modems | (ref: H04L12/2801)0.830
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]0.830
G06F13/12using hardware independent of the central processor  e.g. channel or peripheral processor0.829
G06F17/00Digital computing or data processing equipment or methods  specially adapted for specific functions0.829
G06F12/1433for a module or a part of a module0.829
H04L9/06the encryption apparatus using shift registers or memories for block-wise | or stream|  coding  e.g. DES systems | or RC4| Hash functions| Pseudorandom sequence generators0.828
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)0.828
G06F21/123by using dedicated hardware  e.g. dongles  smart cards  cryptographic processors  global positioning systems [GPS] devices0.828
G06F9/45558Hypervisor-specific management and integration aspects0.828
H04W4/14Short messaging services  e.g. short message services [SMS] or unstructured supplementary service data [USSD]0.827
G06F12/08in hierarchically structured memory systems  e.g. virtual memory systems0.827
G06F15/177Initialisation or configuration control | processor initialisation | (ref: G06F9/4405)0.827
G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups  e.g. automatic card files incorporating conveying and reading operations0.826
G06Q20/401Transaction verification0.826
H04R3/12for distributing signals to two or more loudspeakers | specially adapted for hearing aids | (ref: H04R25/407)0.825
G06F1/1656Details related to functional adaptations of the enclosure  e.g. to provide protection against EMI  shock  water  or to host detachable peripherals like a mouse or removable expansions units like PCMCIA cards  or to provide access to internal components for maintenance or to removable storage supports like CDs or DVDs  or to mechanically mount accessories | mounting of accessories to a computer display | (ref: G06F1/1607)| | display hoods | (ref: G06F1/1603)| | cooling arrangements for portable computers | (ref: G06F1/203)0.825
G06F21/35communicating wirelessly0.428
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms0.400
G06F9/54Interprogram communication0.400
H04L63/0281Proxies0.391
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)0.388
H04L63/166at the transport layer0.380
H04L63/164at the network layer0.380
H04W84/12WLAN [Wireless Local Area Networks]0.380
H04W76/10Connection setup0.380
H04L63/126the source of the received data0.373
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys0.371
H04L51/00Arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages0.371
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.371
H04L29/06characterised by a protocol0.371
G07F7/0826Embedded security module0.370
G06F21/54by adding security routines or objects to programs0.370
G06F9/3834Maintaining memory consistency | cache consistency protocols | (ref: G06F12/0815)0.370
G06F9/3863using multiple copies of the architectural state  e.g. shadow registers0.370
G06F11/1471involving logging of persistent data for recovery0.370
G06F11/1453using de-duplication of the data0.370
G06F11/1469Backup restoration techniques0.370
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.368
H04L9/16the keys or algorithms being changed during operation0.368
G06Q20/327Short range or proximity payments by means of M-devices0.367
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences0.367
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.367
H04L61/2015using the dynamic host configuration protocol [DHCP] or variants0.367
G06F11/1076Parity data used in redundant arrays of independent storages  e.g. in RAID systems0.365
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)0.365
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes0.365
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity0.365
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)0.363
G06F13/28using burst mode transfer  e.g. direct memory access | DMA|   cycle steal | (ref: G06F13/32)|  takes precedence0.362
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD0.361
H04N21/42692for reading from or writing on a volatile storage medium  e.g. Random Access Memory [RAM]0.360
H04N7/163by receiver means only0.360
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.360
H04L9/0869involving random numbers or seeds0.360
H04L9/0618Block ciphers  i.e. encrypting groups of characters of a plain text message using fixed encryption transformation0.360
H04B7/18506Communications with or from aircraft  i.e. aeronautical mobile service0.360
H04N21/4627Rights management | associated to the content | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)0.357
H04L63/101Access control lists [ACL]0.357
H04L9/3249using RSA or related signature schemes  e.g. Rabin scheme0.357
H04B5/0062in RFID [Radio Frequency Identification] Systems0.357
G06F21/567using dedicated hardware0.356
H04M1/6091including a wireless interface0.356
H04L63/0478applying multiple layers of encryption  e.g. nested tunnels or encrypting the content with a first key and then with at least a second key | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.355
G07F7/1091Use of an encrypted form of the PIN0.355
G07F7/1041PIN input keyboard gets new key allocation at each use0.355
G06Q20/353Payments by additional cards plugged into M-devices0.355
G06Q20/3226Use of secure elements separate from M-devices0.355
G06Q20/322Aspects of commerce using mobile devices [M-devices]0.355
G07F19/211Software architecture within ATMs or in relation to the ATM network0.355
H04N21/63345by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | arrangements for network security key management | (ref: H04L29/06707)0.355
H04N21/43635HDMI0.355
H04N21/4408involving video stream encryption  e.g. re-encrypting a decrypted video stream for redistribution in a home network | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.355
G10L15/30Distributed recognition  e.g. in client-server systems  for mobile phones or network applications0.355
G10L15/22Procedures used during a speech recognition process  e.g. man-machine dialogue0.355
G06F21/121Restricting unauthorised execution of programs0.354
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation0.354
G06F21/86Secure or tamper-resistant housings0.354
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC0.354
H04L67/22Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)| | e-commerce | (ref: G06Q30/00)0.352
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)0.352
H04L63/0218Distributed architectures  e.g. distributed firewalls0.352
H04L63/102Entity profiles0.352
H04W92/08between user and terminal device0.351
G06F12/1466Key-lock mechanism0.351
H04M1/67by electronic means0.350
G07F7/1016Devices or methods for securing the PIN and other transaction-data  e.g. by encryption | arrangements for secret communication  | see|  | (ref: H04L9/00)0.350
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)0.350
G06F21/30Authentication  i.e. establishing the identity or authorisation of security principals0.350
G06K9/6201Matching| Proximity measures0.350
H04N21/25875involving end-user authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system | (ref: H04L9/32)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.350
H04N21/4415using biometric characteristics of the user  e.g. by voice recognition or fingerprint scanning | methods or arrangements for recognising patterns | (ref: G06K9/00)| | restricting access to computer systems by authenticating users using biometric data | (ref: G06F21/32)| | authentication mechanisms using biometrical features for network security | (ref: H04L29/06809)| | authentication in wireless network security | (ref: H04W12/06)0.350
H04L51/18Messages including commands or codes to be executed either at an intermediate node or at the recipient to perform message-related actions | computer aided management of electronic mail | (ref: G06Q10/10)| | networked applications for remote control or remote monitoring of the application | (ref: H04L67/025)| | networked applications involving the movement of software or configuration parameters | (ref: H04L67/34)0.349
G06Q20/3821Electronic credentials0.348
G06Q20/3823combining multiple encryption tools for a transaction0.348
G05B19/409characterised by using manual input [MDI] or by using control panel  e.g. controlling functions with the panel| characterised by control panel details  by setting parameters | (ref: G05B19/408)|   | (ref: G05B19/4093)|  take precedence0.348
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)0.348
H04L9/0625with splitting of the data block into left and right halves  e.g. Feistel based algorithms  DES  FEAL  IDEA or KASUMI0.348
H04W4/02Services making use of location information0.347
G06F3/14Digital output to display device| | Cooperation and interconnection of the display device with other functional units| control of display in general | (ref: G09G)| | arrangements for producing a permanent visual presentation of the output data | (ref: G06K15/00)0.347
G02B27/017Head mounted0.347
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds0.347
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)0.347
G06F13/4282on a serial bus  e.g. I2C bus  SPI bus | on daisy chain buses | (ref: G06F13/4247)0.346
H04W4/50Service provisioning or reconfiguring0.346
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.346
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)0.345
H04L9/0643Hash functions  e.g. MD5  SHA  HMAC or f9 MAC0.345
H04L9/3218using proof of knowledge  e.g. Fiat-Shamir  GQ  Schnorr  ornon-interactive zero-knowledge proofs0.345
G06F12/0808with cache invalidating means | (ref: G06F12/0815)|  takes precedence0.343
G06F12/1027using associative or pseudo-associative address translation means  e.g. translation look-aside buffer [TLB]0.343
H04L63/104Grouping of entities0.343
H04L69/14Multichannel or multilink protocols0.342
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]0.342
G06F3/0619in relation to data integrity  e.g. data losses  bit errors0.342
G06F3/0646Horizontal data movement in storage systems  i.e. moving data in between storage devices or systems0.342
G06F3/061Improving I/O performance0.342
G06F3/067Distributed or networked storage systems  e.g. storage area networks [SAN]  network attached storage [NAS]0.342
G06F3/0659Command handling arrangements  e.g. command buffers  queues  command scheduling0.342
H04L69/12Protocol engines  e.g. VLSIs or transputers0.342
H04L9/0847involving identity based encryption [IBE] schemes0.341
G06F21/645using a third party0.341
G06Q40/08Insurance  e.g. risk analysis or pensions | processing of insurance policies or claims | (ref: G06Q10/10)0.341
G06F9/4401Bootstrapping | security arrangements therefor | (ref: G06F21/57)0.341
G06F11/1464for networked environments0.341
G06F3/064Management of blocks0.341
G06F11/1474in transactions | (ref: G06F17/30286)|  takes precedence0.341
G06F3/0686Libraries  e.g. tape libraries  jukebox0.341
G06F11/1456Hardware arrangements for backup0.341
G06F3/0664at device level  e.g. emulation of a storage device or system0.341
G06F3/0623in relation to content0.341
G06F11/1402Saving  restoring  recovering or retrying0.341
G06F21/552involving long-term monitoring or reporting0.340
H04L63/1425Traffic logging  e.g. anomaly detection0.340
G06F3/04883for entering handwritten data  e.g. gestures  text0.340
G06F3/04886by partitioning the screen or tablet into independently controllable areas  e.g. virtual keyboards  menus | (ref: G06F3/04883)|  takes precedence0.340
G06F1/00Details not covered by groups | (ref: G06F3/00)|  – | (ref: G06F13/00)|  and | (ref: G06F21/00)|  | architectures of general purpose stored program computers | (ref: G06F15/76)0.340
G06Q20/02involving a neutral party  e.g. certification authority  notary or trusted third party [TTP]0.340
G06Q20/352Contactless payments by cards0.340
H04L67/108characterized by resources being split in blocks or fragments0.339
G07F9/023for display  data presentation or advertising arrangements in payment activated and coin-freed apparatus0.339
G06Q20/12specially adapted for electronic shopping systems0.339
H04N21/47815Electronic shopping | payment schemes  payment architectures or payment protocols for electronic shopping systems | (ref: G06Q20/12)0.339
G06Q20/38215Use of certificates or encrypted proofs of transaction rights0.339
G06Q20/3825Use of electronic signatures0.339
H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation | means for verifying the identity or the authority of a user of a secure or secret communication system | (ref: H04L9/32)0.339
G06Q20/40145Biometric identity checks0.338
G06Q20/34using cards  e.g. integrated circuit [IC] cards or magnetic cards0.338
G06Q20/3224Transactions dependent on location of M-devices0.338
H04L43/12using dedicated network monitoring probes0.338
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)0.337
H04L67/42Protocols for client-server architectures | access to replicated servers | (ref: H04L67/1002)0.337
H04L63/067using one-time keys | cryptographic mechanisms or cryptographic arrangements for generation of one-time passwords | (ref: H04L9/0863)0.337
H04L63/0846using time-dependent-passwords  e.g. periodically changing passwords0.337
H04L9/007involving hierarchical structures0.337
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL0.337
G10H7/004with one or more auxiliary processor in addition to the main processing unit0.336
G06Q50/01Social networking0.336
H04L63/108when the policy decisions are valid for a limited amount of time0.336
H04L67/40Protocols for remote procedure calls [RPC] | remote procedure calls | (ref: G06F9/547)0.336
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip0.336
G06F13/1663Access to shared memory0.336
G07C9/00571operated by interacting with a central unit0.336
H04W8/18Processing of user or subscriber data  e.g. subscribed services  user preferences or user profiles| Transfer of user or subscriber data0.336
G06Q20/085involving remote charge determination or related payment systems0.336
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]0.336
H04L9/0662with particular pseudorandom sequence generator0.336
G16H40/67for remote operation0.335
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)0.335
H04L9/065Encryption by serially and continuously modifying data stream elements  e.g. stream cipher systems  RC4  SEAL or A5/30.335
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.335
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence0.334
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines0.334
H04L65/605intermediate0.333
H04L65/1069Setup | computer conference organisation arrangements  e.g. handling schedules  setting up parameters needed by nodes to attend a conference  booking network resources or notifying involved parties | (ref: H04L12/1818)| | admission control or resource reservation in packet switching networks | (ref: H04L47/70)| | arrangements for peer-to-peer networking in network applications | (ref: H04L67/104)| | session management in network applications | (ref: H04L67/14)| | negotiation of communication capabilities | (ref: H04L69/24)0.333
H04L65/4069Services related to one way streaming0.333
G06F3/162Interface to dedicated audio devices  e.g. audio drivers  interface to CODECs0.333
H04L67/26Push based network services | broadcast or multicast push services | (ref: H04L12/1859)0.331
H04L9/3265using certificate chains  trees or paths| Hierarchical trust model0.330
H04L9/3073involving pairings  e.g. identity based encryption [IBE]  bilinear mappings or bilinear pairings  e.g. Weil or Tate pairing0.330
H04N21/4181for conditional access0.330
G06F9/223Execution means for microinstructions irrespective of the microinstruction function  e.g. decoding of microinstructions and nanoinstructions| timing of microinstructions| programmable logic arrays| delays and fan-out problems0.330
G06F11/30Monitoring0.329
G06Q20/42Confirmation  e.g. check or permission by the legal debtor of payment0.329
G06Q20/3576Multiple memory zones on card0.328
H04L9/0833involving conference or group key | network architectures or network communication protocols for key management in group communication in a packet data network | (ref: H04L63/065)0.328
G06Q20/40975Use of encryption for mutual authentication0.328
G07F7/10together with a coded signal |   e.g. in the form of personal identification information  like personal identification number [PIN] or biometric data0.328
G06Q20/363with the personal data files for a user0.328
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)0.328
H04M3/2281Call monitoring  e.g. for law enforcement purposes| Call tracing| Detection or prevention of malicious calls0.328
H04L63/306intercepting packet switched data communications  e.g. Web  Internet or IMS communications0.328
H04K3/80Jamming or countermeasure characterized by its function0.328
G06F9/4406Loading of operating system0.328
H04L9/302involving the integer factorization problem  e.g. RSA or quadratic sieve [QS] schemes0.328
G06F9/00Arrangements for program control  e.g. control units | program control for peripheral devices | (ref: G06F13/10)0.327
H04L63/064Hierarchical key distribution  e.g. by multi-tier trusted parties0.327
H04B5/0031for data transfer0.327
H04W36/16Performing reselection for specific purposes0.327
H04M1/2535adapted for voice communication over an Internet Protocol [IP]  network | Voice over Internet Protocol (VoIP) network equipment and services | (ref: H04M7/006)| | internet protocols | (ref: H04L29/06095)0.327
G06F3/0481based on specific properties of the displayed interaction object or a metaphor-based environment  e.g. interaction with desktop elements like windows or icons  or assisted by a cursor's changing behaviour or appearance0.327
G06Q20/4016involving fraud or risk level assessment in transaction processing0.327
G06Q20/325using wireless networks0.326
G06Q20/027involving a payment switch or gateway0.326
H04M1/0258for a headset device | constructional features of headsets | (ref: H04M1/05)| | headsets for handsfree use | (ref: H04M1/6058)0.326
H04B5/0006using a receiver structurally associated with a loudspeaker or an earphone0.326
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits0.326
H04L29/02Communication control | in satellite networks | (ref: H04B7/185)| Communication processing | (ref: H04L29/12)|   | (ref: H04L29/14)|  take precedence| contains provisionally no documents0.326
G06F13/10Program control for peripheral devices | (ref: G06F13/14)|  - | (ref: G06F13/42)|  take precedence0.326
G06F8/63Image based installation| Cloning| Build to order0.326
G06Q20/385Use of an alias or a single-use code0.326
G06Q20/00Payment architectures  schemes or protocols | apparatus for performing or posting payment transactions | (ref: G07F7/08)|   | (ref: G07F19/00)| | electronic cash registers | (ref: G07G1/12)0.326
H04M1/82Line monitoring circuits for call progress or status discrimination | for detecting caller identity | (ref: H04M1/573)0.326
G06F21/6272by registering files or documents with a third party0.325
G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means  e.g. caches0.325
H04B1/3888Arrangements for carrying or protecting transceivers0.325
H04B1/38Transceivers  i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving0.325
H04L12/2854Wide area networks  e.g. public data networks0.324
G06Q20/40Authorisation  e.g. identification of payer or payee  verification of customer or shop credentials| Review and approval of payers  e.g. check credit lines or negative lists0.324
G06Q20/105involving programming of a portable memory device  e.g. IC cards  "electronic purses"0.324
G06Q20/367involving intelligent token  e.g. electronic purse0.324
H04L63/168above the transport layer0.324
G06Q20/3229Use of the SIM of a M-device as secure element0.324
G06Q20/3223Realising banking transactions through M-devices0.324
H05K3/321by conductive adhesive | in general | (ref: H01R4/04)0.324
G06K9/00557by plotting the signal segments against each other  e.g. analysing scattergrams0.324
G06F21/55Detecting local intrusion or implementing counter-measures0.324
G06F9/4484Executing subprograms0.323
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow0.323
H04L9/3297involving time stamps  e.g. generation of time stamps0.323
H04L65/608Streaming protocols  e.g. RTP or RTCP0.323
H04L65/1006SIP0.323
H04M1/006Call diverting means0.323
G06F1/1684Constructional details or arrangements related to integrated I/O peripherals not covered by groups | (ref: G06F1/1635)|  - | (ref: G06F1/1675)0.323
H04M1/04Supports for telephone transmitters or receivers | for transducers in general | (ref: H04R1/00)0.323
G06F21/88Detecting or preventing theft or loss0.323
H04M1/673the user being required to key in a code0.323
G06F1/1626with a single-body enclosure integrating a flat display  e.g. Personal Digital Assistants [PDAs]0.323
G06F1/1632External expansion units  e.g. docking stations0.323
H04L63/0838using one-time-passwords0.322
H04N21/436Interfacing a local distribution network  e.g. communicating with another STB  inside the home | | Interfacing an external card to be used in combination with the client device| arrangements specially adapted plural spots in a confined site in broadcast systems | (ref: H04H20/63)0.322
H04N21/8193dedicated tools  e.g. video decoder software or IPMP tool0.322
H04N21/2541Rights Management | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)| | security management or policies for network security | (ref: H04L29/06986)| | security in data switching network management | (ref: H04L41/28)| | access security in wireless networks | (ref: H04W12/08)0.322
H04N21/418External card to be used in combination with the client device  e.g. for conditional access0.322
H04N21/4147Personal Video Recorder [PVR] | (ref: H04N5/76)|  takes precedence | | arrangements for broadcast specially adapted for accumulation-type receivers | (ref: H04H20/40)0.322
H04N21/4405involving video stream decryption | arrangements for secret or secure communication | (ref: H04L9/00)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.322
H04N21/41407embedded in a portable device  e.g. video client on a mobile phone  PDA  laptop | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)| | arrangements specially adapted for mobile receivers in broadcast systems | (ref: H04H20/57)0.322
H04N21/443OS processes  e.g. booting an STB  implementing a Java virtual machine in an STB  power management in an STB | arrangements for program loading or initiating | (ref: G06F9/445)|  | | boot device selection| loading of operating system | (ref: G06F9/4406)| | program loading or initiating in general using non-volatile memory from which the program can be directly executed | (ref: G06F9/44568)0.322
H04N21/435Processing of additional data  e.g. decrypting of additional data  reconstructing software from modules extracted from the transport stream0.322
H04N21/835Generation of protective data  e.g. certificates | protecting software against unauthorised usage in a vending or licensing environment | (ref: G06F21/10)0.322
H04N21/25816involving client authentication | restricting access to computer systems by authenticating users using a predetermined code | (ref: G06F21/33)| | authentication mechanisms for network security in communication control or processing | (ref: H04L29/06755)| | authentication in wireless network security | (ref: H04W12/06)0.322
H04N21/458Scheduling content for creating a personalised stream  e.g. by combining a locally stored advertisement with an incoming stream| Updating operations  e.g. for OS modules | | time-related management operations | arrangements for replacing or switching information during the broadcast or during the distribution | (ref: H04H20/10)0.322
H04N21/23614Multiplexing of additional data and video streams | arrangements for simultaneous broadcast of plural pieces of information | (ref: H04H20/28)0.322
H04N21/812involving advertisement data | advertising | per se|  | (ref: G06Q30/02)0.322
H04N21/4331Caching operations  e.g. of an advertisement for later insertion during playback0.322
H04N21/4532involving end-user characteristics  e.g. viewer profile  preferences | monitoring of user activities for profile generation for accessing a video database | (ref: G06F17/30843)| | protocols involving user profiles for network applications in communication control or processing | (ref: H04L29/08936)| | processing of user preferences or user profiles in wireless networks | (ref: H04W8/18)0.322
G06Q20/388Mutual authentication without cards0.321
H04W52/18TPC being performed according to specific parameters0.321
G06F15/76Architectures of general purpose stored program computers | with program plugboard | (ref: G06F15/08)| | multicomputers | (ref: G06F15/16)0.320
G06F9/4405Initialisation of multiprocessor systems0.320
G06F15/163Interprocessor communication0.320
G06F15/17343wherein the interconnection is dynamically configurable  e.g. having loosely coupled nearest neighbor architecture | reconfigurable processors arrays | (ref: G06F15/7867)0.320
H04N21/4433Implementing client middleware  e.g. Multimedia Home Platform [MHP]0.320
H04N21/43853involving multiplex stream decryption | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)0.320
G11B20/00224wherein the key is obtained from a remote server0.320
H04N21/8355involving usage data  e.g. number of copies or viewings allowed0.320
G06Q20/32using wireless devices0.320
H04L41/0293for accessing web services by means of a binding identification of the management service or element | aspects of naming and addressing in general | (ref: H04L61/00)0.320
H04L61/00Network arrangements or network protocols for addressing or naming0.320
H04W4/24Accounting or billing0.320
H04W8/183Processing at user equipment or user record carrier0.320
G06F11/1451by selection of backup contents0.319
G06F12/14Protection against unauthorised use of memory | or access to memory0.319
H04L65/4061"Push-to-X" services | push-to-talk services in wireless networks | (ref: H04W4/10)| | connection management  e.g. connection set-up  manipulation or release for push-to-talk or push-on-call services in wireless communication networks | (ref: H04W76/45)0.319
H04M1/656for recording conversations0.319
H04W76/45for Push-to-Talk [PTT] or Push-to-Talk over cellular [PoC] services0.319
H04L9/0836using tree structure or hierarchical structure0.319
H02J7/0022Management of charging with batteries permanently connected to charge circuit | (ref: H02J7/0014)|  takes precedence0.319
H04W52/0261managing power supply demand  e.g. depending on battery level0.319
H02J7/0013for charging several batteries simultaneously or sequentially | (ref: H02J7/1423)|  takes precedence0.319
H02J7/0063Circuits adapted for supplying loads only0.319
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)0.318
G06F9/22Microcontrol or microprogram arrangements0.318
H04W76/11Allocation or use of connection identifiers0.318
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)0.318
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling0.318
G11B20/00086Circuits for prevention of unauthorised reproduction or copying  e.g. piracy | indicating unauthorised use of record carriers in general | (ref: G11B23/28)| | scrambling for television signal recording | (ref: H04N5/913)| | network architectures or network protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)0.317
H04M1/2473Telephone terminals interfacing a personal computer  e.g. using an API (Application Programming Interface) | details of API | (ref: H04M7/0021)0.317
H04W28/14using intermediate storage0.317
H04L51/22Mailbox-related details | computer aided management of electronic mail | (ref: G06Q10/10)0.317
H04L51/063with adaptation of content0.317
G11B20/00695said measures preventing that data are read from the recording medium0.317
G11B20/00666involving a step of erasing or nullifying data  e.g. data being overwritten with a random string0.317
G11B20/10Digital recording or reproducing | digital computers in which at least part of the computation is effected electrically  arrangements for handling digital data | (ref: G06F)| | transmission of digital information | (ref: H04L)0.317
G11B20/00673wherein the erased or nullified data include a cryptographic key0.317
H04L67/2823for conversion or adaptation of application content or format | message adaptation based on network or terminal capabilities | (ref: H04L51/06)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)| | optimising visualization of content for web browsing | (ref: G06F17/30905)0.316
H04W8/205Transfer to or from user equipment or user record carrier0.316
H04R1/1041Mechanical or electronic switches  or control elements | switches in general | (ref: H01H)0.316
H04R5/033Headphones for stereophonic communication | details thereof  e.g. relating to batteries  cables or control elements | (ref: H04R1/10)0.316
H04N21/4882for displaying messages  e.g. warnings  reminders | arrangements for providing short real-time information to substation in data switching networks | (ref: H04L12/1895)0.316
H04N21/4542Blocking scenes or portions of the received content  e.g. censoring scenes0.316
H04N21/414Specialised client platforms  e.g. receiver in car or embedded in a mobile appliance0.316
H04N21/6543for forcing some client operations  e.g. recording | remote booting in general | (ref: G06F9/4416)0.316
H04N21/4516involving client characteristics  e.g. Set-Top-Box type  software version  amount of memory available | allocation of resources considering hardware capabilities | (ref: G06F9/5044)| | allocation of resources considering software capabilities | (ref: G06F9/5055)| | protocols involving terminal profiles for network applications in communication control or processing | (ref: H04L29/08927)| | message adaptation based on network or terminal capabilities in packet switching networks | (ref: H04L51/06)| | processing of terminal status or physical abilities in wireless networks | (ref: H04W8/22)0.316
H04N21/439Processing of audio elementary streams0.316
H04L67/1002for accessing one among a plurality of replicated servers  e.g. load balancing | arrangements or protocols for peer-to-peer networking | (ref: H04L67/104)| | protocols for client-server architectures | (ref: H04L67/42)| | allocation of processing resources to service requests in a distributed system | (ref: G06F9/5027)| | rebalancing the processing load in a distributed system | (ref: G06F9/5083)| | wireless network traffic load balancing | (ref: H04W28/08)| | network load balancing  traffic engineering | (ref: H04L47/125)| | video servers using load balancing strategies | (ref: H04N21/23103)|0.316
G06F12/145the protection being virtual  e.g. for virtual blocks or segments before a translation mechanism0.316
G06T1/20Processor architectures| Processor configuration  e.g. pipelining0.315
H04L67/303Terminal profiles0.315
H03M1/66Digital/analogue converters | (ref: H03M1/001)|  - | (ref: H03M1/004)|  |  | (ref: H03M1/02)|  - | (ref: H03M1/10)|  take precedence0.315
H03M1/12Analogue/digital converters | (ref: H03M1/001)|  - | (ref: H03M1/004)|  |  | (ref: H03M1/02)|  - | (ref: H03M1/10)|  take precedence0.315
H04M1/0202Portable telephone sets  e.g. cordless phones  mobile phones or bar type handsets | constructional features of telephone transmitters or receivers  e.g. of speakers or microphones | (ref: H04M1/03)| | mounting of the dialing module | (ref: H04M1/23)| | with protection against RF exposure | (ref: H04B1/3838)0.315
H04B7/2659for data rate control0.315
H04L5/14Two-way operation using the same type of signal  i.e. duplex | duplex repeaters | (ref: H04L25/22)|  | conditioning for two-way transmission in general | (ref: H04B3/20)| | | for interconnection between telephone switching centres | (ref: H04Q3/00)0.315
G06F3/16Sound input| Sound output | conversion of speech into digital information or | vice versa|  | (ref: G10L)0.315
H04B7/24for communication between two or more posts | wireless communication networks | (ref: H04W)0.315
G06F13/38Information transfer  e.g. on bus | (ref: G06F13/14)|  takes precedence0.315
G06Q20/383Anonymous user system0.315
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)0.315
H04L9/3066involving algebraic varieties  e.g. elliptic or hyper-elliptic curves0.315
G06F9/5072Grid computing0.315
G06F21/6236between heterogeneous systems0.315
H04M1/0289Telephone sets for operators0.314
G06F1/3293Power saving by switching to a less power consuming processor  e.g. sub-CPU0.314
G07F7/0886the card reader being portable for interacting with a POS or ECR in realizing a payment transaction0.314
G09C3/08the connections being electrical0.314
H04M1/6058involving the use of a headset accessory device connected to the portable telephone0.314
H04N21/64715Protecting content from unauthorized alteration within the network | verifying the information received for network security in communication control or processing | (ref: H04L29/06857)| | integrity in wireless network security | (ref: H04W12/10)0.314
G09B21/00Teaching  or communicating with  the blind  deaf or mute | audible presentation of material to be studied | (ref: G09B5/04)| | devices or methods for replacing direct visual or auditory perception by another kind of perception | (ref: A61F9/08)|   | (ref: A61F11/04)| | audible indication of meter readings or of colour | (ref: G01D7/12)| | watches for blind persons | (ref: G04B25/02)| | methods or arrangements for reading or recognising printed or written characters | (ref: G06K9/00)| | speech analysis  speech recognition | (ref: G10L)| | sound-recording or reproducing  | per se|  | (ref: G11B)0.313
H04M3/42391where the subscribers are hearing-impaired persons  e.g. telephone devices for the deaf0.313
G10L15/26Speech to text systems | (ref: G10L15/08)|  takes precedence0.313
G02B27/0176characterised by mechanical features0.313
H04N21/44004involving video buffer management  e.g. video decoder buffer or video display buffer0.313
H04N21/4318by altering the content in the rendering process  e.g. blanking  blurring or masking an image region | image enhancement or restoration in general | (ref: G06T5/00)0.313
H04N21/42653for processing graphics0.313
G06F8/61Installation0.313
H04L12/1831Tracking arrangements for later retrieval  e.g. recording contents  participants activities or behavior  network status0.313
G06F13/36for access to common bus or bus system0.313
G06F9/468Specific access rights for resources  e.g. using capability register0.313
G06Q20/206comprising security or user identification provision  e.g. password entry0.312
H04M1/6505storing speech in digital form0.312
H04L69/328in the presentation layer  i.e. layer six | graphical user interfaces | (ref: G06F3/048)| | terminal emulation  e.g. telnet  | (ref: H04L67/08)0.312
G06F13/24using interrupt | (ref: G06F13/32)|  takes precedence0.311
G07B17/00733Cryptography or similar special procedures in a franking system0.311
G06F1/3237Power saving by disabling clock generation or distribution0.311
G06F13/14Handling requests for interconnection or transfer0.311
G06F1/3287Power saving by switching off individual functional units in a computer system  i.e. selective power distribution0.311
G06F13/124where hardware is a sequential transfer control unit  e.g. microprocessor  peripheral processor or state-machine0.311
H04L63/0245Filtering by information in the payload0.311
G06F12/1458by checking the subject access rights0.311
H04L29/06789One-time-passwords0.311
H04L67/104for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer  upload  download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r0.310
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements0.310
H04B1/0003Software-defined radio [SDR] systems  i.e. systems wherein components typically implemented in hardware  e.g. filters or modulators/demodulators  are implented using software  e.g. by involving an AD or DA conversion stage such that at least part of the signal processing is performed in the digital domain | digital baseband systems | (ref: H04L25/00)| | digital modulation/demodulation | (ref: H04L27/00)| | CDMA | (ref: H04B1/707)| | TDMA | (ref: H04B7/2643)| | image transmission | (ref: H04N5/00)0.310
H04L9/3215using a plurality of channels | network architectures or network communication protocols using different networks | (ref: H04L63/18)0.310
G06F9/5016the resource being the memory0.310
H04W8/186Processing of subscriber group data0.310
H04W4/08User group management0.310
G06Q20/3552Downloading or loading of personalisation data0.310
G06K7/00Methods or arrangements for sensing record carriers  | e.g. for reading patterns| (ref: G06K9/00)|  takes precedence0.310
H04B5/02using transceiver0.310
G06Q20/3558Preliminary personalisation for transfer to user0.310
H04L65/1093by adding or removing participants0.310
H04R1/1091Details not provided for in groups | (ref: H04R1/1008)|  - | (ref: H04R1/1083)0.310
H04L65/60Media handling  encoding  streaming or conversion0.310
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)0.309
G06F2221/2105Dual mode as a secondary aspect0.157
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.140
H04L2209/12Details relating to cryptographic hardware or logic circuitry0.140
G06F2221/2113Multi-level security  e.g. mandatory access control0.102
G06F3/041Digitisers  e.g. for touch screens or touch pads  characterised by the transducing means0.071
G06F2221/2103Challenge-response0.071
G06F2221/033Test or assess software0.067
H04L2463/062applying encryption of the keys | cryptographic mechanisms or cryptographic arrangements for key distribution using key encryption key | (ref: H04L9/0822)0.065
G06F2221/032Protect output to user by software means0.065
G06F2221/031Protect user input by software means0.065
H04L2209/127Trusted platform modules [TPM]0.065
G06F2221/2107File encryption0.065
G06F2221/0704Device0.065
G06F2221/2153Using hardware token as a secondary aspect0.063
G06F2221/2149Restricted operating environment0.062
G06F2211/009Trust0.062
G06F2211/007Encryption  En-/decode  En-/decipher  En-/decypher  Scramble  (De-)compress0.062
G06F2201/805Real-time0.062
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.062
H04L2209/56Financial cryptography  e.g. electronic payment or e-cash0.061
H04L2209/805Lightweight hardware  e.g. radio-frequency identification [RFID] or sensor0.061
G06F2221/2101Auditing as a secondary aspect0.061
G06F11/182based on mutual exchange of the output between redundant processing components0.061
G06F11/2094Redundant storage or storage space | (ref: G06F11/2056)|  takes precedence0.061
G06F2221/2133Verifying human interaction  e.g.  Captcha0.060
H04L2463/102applying security measure for e-commerce | data processing systems or methods  specially adapted for e-commerce | (ref: G06Q30/00)0.060
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.060
H04L2209/24Key scheduling  i.e. generating round keys or sub-keys for block encryption0.060
G06F2207/7219Countermeasures against side channel or fault attacks0.060
G06F2211/008Public Key  Asymmetric Key  Asymmetric Encryption0.060
G06F2211/1097Boot  Start  Initialise  Power0.060
G06F2221/2115Third party0.060
H04L2209/603Digital right managament [DRM]0.060
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.060
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]0.060
G06F2212/1052Security improvement0.059
G06F2221/034Test or assess a computer or a system0.059
H04M2203/609Secret communication0.059
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.059
G10L2015/223Execution procedure of a spoken command0.059
G10L15/08Speech classification or search0.059
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.059
G10L2015/088Word spotting0.059
H04L2209/26Testing cryptographic entity  e.g. testing integrity of encryption key or encryption algorithm0.059
G06F2009/45579I/O management (device drivers  storage access) | internal functioning of device drivers | (ref: G06F13/102)|   loading of device drivers | (ref: G06F9/4411)0.059
G06F2221/0755Generation0.059
H03M13/1102Codes on graphs and decoding on graphs  e.g. low-density parity check [LDPC] codes0.059
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.059
H04L2209/60Digital content management  e.g. content distribution0.059
G06F2221/2147Locking files0.059
G06F2009/45575Starting  stopping  suspending  resuming virtual machine instances | program initiating | (ref: G06F9/445)| | task life-cycle in general | (ref: G06F9/485)0.059
H04L63/1458Denial of Service0.059
H04W8/22Processing or transfer of terminal data  e.g. status or physical capabilities0.059
H04M1/675the user being required to insert a coded card  e.g. a smart card carrying an integrated circuit chip | for constructional features in portable telephones | (ref: H04B1/3816)0.058
G06F2221/0771Revocation0.058
H04L2209/122Hardware reduction or efficient architectures0.058
G05B2219/33192Radio link  wireless0.058
H04M2250/16including more than one display unit0.058
H04M1/6075adapted for handsfree use in a vehicle | (ref: H04M1/6058)|  takes precedence| arrangements for holding telephones in a vehicle | (ref: B60R11/0241)0.058
G02B2027/014comprising information/image processing systems0.058
G06F2221/2117User registration0.058
G06F2221/2141Access rights  e.g. capability lists  access control lists  access tables  access matrices0.058
G06F2221/2129Authenticate client device independently of the user0.058
H04W84/042Public Land Mobile systems  e.g. cellular systems0.058
H04W8/265for initial activation of new user0.058
G06F2009/45562Creating  deleting  cloning virtual machine instances0.058
H04L2209/46Secure multiparty computation  e.g. millionaire problem0.058
H04L2209/72Signcrypting  i.e. digital signing and encrypting simultaneously0.058
Y04S40/20Information technology specific aspects0.057
G06F2212/1048Scalability0.057
G06F2212/152Virtualized environment  e.g. logically partitioned system0.057
G06F12/0897with two or more cache hierarchy levels | with multilevel cache hierarchies | (ref: G06F12/0811)0.057
G06F2212/1032Reliability improvement  data loss prevention  degraded operation etc0.057
H04W74/00Wireless channel access  e.g. scheduled or random access0.057
G06F2201/84Using snapshots  i.e. a logical point-in-time copy of the data0.057
G06F2203/04806Zoom  i.e. interaction techniques or interactors for controlling the zooming operation0.057
G06F2203/04803Split screen  i.e. subdividing the display area or the window area into separate subareas0.057
G06F2221/0797using dedicated hardware at the client0.057
G06F11/1092Rebuilding  e.g. when physically replacing a failing disk0.057
H04M2250/04including near field communication means  e.g. RFID0.057
H04L43/026using flow generation0.056
H04L43/062for traffic related reporting0.056
H04W88/04adapted for relaying to or from another terminal or user0.056
H04L2209/42Anonymization  e.g. involving pseudonyms0.056
G06F9/4411Configuring for operating with peripheral devices| Loading of device drivers0.056
Y10S707/99939Privileged access0.056
H04M2250/02including a Bluetooth interface0.056
G10H2230/041Processor load management  i.e. adaptation or optimization of computational load or data throughput in computationally intensive musical processes to avoid overload artifacts  e.g. by deliberately suppressing less audible or less relevant tones or decreasing their complexity0.056
G10H2230/021Mobile ringtone  i.e. generation  transmission  conversion or downloading of ringing tones or other sounds for mobile telephony| Special musical data formats or protocols herefor | mobile telephone transmission specifically adapted for electrophonic musical tools or instruments | (ref: G10H2240/251)0.056
G07C2009/00777by induction0.056
H04L2209/125Parallelization or pipelining  e.g. for accelerating processing of cryptographic operations0.056
A61B5/01Measuring temperature of body parts| | Diagnostic temperature sensing  e.g. for malignant or inflamed tissue| clinical thermometers | (ref: G01K5/22)| | thermometers for special purposes | (ref: G01K13/00)0.056
A61B5/1455using optical sensors  e.g. spectral photometrical oximeters0.056
A61B5/024Detecting  measuring or recording pulse rate or heart rate | (ref: A61B5/0205)|   | (ref: A61B5/021)|  take precedence0.056
A61B5/021Measuring pressure in heart or blood vessels | (ref: A61B5/0205)|  takes precedence0.056
A61B5/145Measuring characteristics of blood | in vivo|   e.g. gas concentration  pH value| | Measuring characteristics of body fluids or tissues  e.g. interstitial fluid  cerebral tissue| measuring of blood pressure or blood flow | (ref: A61B5/02)| | non-radiation detecting or locating of foreign bodies in blood | (ref: A61B5/06)0.056
H04L2463/082applying multi-factor authentication | cryptographic mechanisms or cryptographic arrangements including means for verifying the identity or authority of a user of the system or for message authentication | (ref: H04L9/32)0.056
G06F2221/2131Lost password  e.g. recovery of lost or forgotten passwords0.056
H04L41/0806for initial configuration or provisioning0.056
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.056
G06F3/0489using dedicated keyboard keys or combinations thereof0.056
H04L2209/68Special signature format  e.g. XML format0.055
H04W92/18between terminal devices0.055
G06F2221/0711Token0.055
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)0.055
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.055
G06F2209/542Intercept0.055
H04W76/12Setup of transport tunnels0.055
G06F2213/0038System on Chip0.055
H04L2209/38Chaining  e.g. hash chain or certificate chain0.055
H04L2209/16Obfuscation or hiding  e.g. involving white box0.055
H04M1/0262for a battery compartment0.055
H01M10/4257Smart batteries  e.g. electronic circuits inside the housing of the cells or batteries0.055
H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries0.055
Y02E60/10Energy storage0.055
H04K2203/16for telephony0.055
H04W76/14Direct-mode setup0.055
H04M2207/185wireless packet-switched0.055
H04K2203/18for wireless local area networks or WLAN0.055
H04M2203/301Management of recordings0.055
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)0.055
G10L2019/0013Codebook search algorithms0.055
G10L2019/0011Long term prediction filters  i.e. pitch estimation0.055
H04M2250/06including a wireless LAN interface0.054
G06F3/04817using icons | graphical programming languages using iconic symbols | (ref: G06F8/34)0.054
H04M2250/66user interface aspects for indicating selection options for a communication line0.054
H04W36/24Reselection being triggered by specific parameters | used to improve the performance of a single terminal0.054
H04W84/10Small scale networks| Flat hierarchical networks0.054
H04W84/04Large scale networks| Deep hierarchical networks0.054
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)0.054
H04M2250/14including a card reading device0.054
G06F2221/07Indexing scheme relating to | (ref: G06F21/10)|   protecting distributed programs or content0.054
G06F2221/2121Chip on media  e.g. a disk or tape with a chip embedded in its case0.054
G06F2221/2109Game systems0.054
G06F2212/402Encrypted data0.054
G06F2212/60Details of cache memory0.054
G06F2221/0742Enhanced product0.054
H04M1/05adapted for use on head  throat  or breast | handsfree use of portable phones | (ref: H04M1/6041)0.054
Y10T29/4913Assembling to base an electrical component  e.g.  capacitor  etc.0.054
Y10T29/53174Means to fasten electrical component to wiring board  base  or substrate0.054
G06F2221/0775Logging0.054
H04L9/008involving homomorphic encryption0.054
H04W28/18Negotiating wireless communication parameters0.054
G06F2200/1633Protecting arrangement for the entire housing of the computer0.054
H04M2250/12including a sensor for measuring a physical value  e.g. temperature or motion | telephones including GPS signal receivers | (ref: H04M2250/10)0.054
H04W48/02Access restriction performed under specific conditions0.054
G06F2221/0788Peer-to-Peer [P2P]0.054
G06F2221/0793Synchronisation0.054
G06F2211/005Network  LAN  Remote Access  Distributed System0.054
Y10S707/99954Version management0.054
Y10S707/99953Recoverability0.054
H04L2209/30Compression  e.g. Merkle-Damgard construction0.054
G06F13/00Interconnection of  or transfer of information or other signals between  memories  input/output devices or central processing units | interface circuits for specific input/output devices  | (ref: G06F3/00)| | multiprocessor systems  | (ref: G06F15/16)|  | multiprogram control therefor  | (ref: G06F9/46)0.053
G06F13/4221being an input/output bus  e.g. ISA bus  EISA bus  PCI bus  SCSI bus0.053
G06F3/0635by changing the path  e.g. traffic rerouting  path reconfiguration0.053
H04M2215/2026Wireless network  e.g. GSM  PCS  TACS0.053
H04M2215/32Involving wireless systems0.053
G06F2221/0782Backup or restore0.053
G10L13/047Architecture of speech synthesisers0.053
G10L13/033Voice editing  e.g. manipulating the voice of the synthesiser0.053
H04N21/2347involving video stream encryption | arrangements for secret or secure communication | (ref: H04L9/00)|   analogue secrecy systems | (ref: H04N7/16)|  | | arrangements using cryptography for the use of broadcast information or broadcast-related information | (ref: H04H60/23)| | arrangements for preventing the taking of data from a data transmission channel without authorisation | (ref: H04L12/22)| | security arrangements in wireless networks | (ref: H04W12/00)0.053
H04N21/266Channel or content management  e.g. generation and management of keys and entitlement messages in a conditional access system  merging a VOD unicast channel into a multicast channel0.053
H04N21/4623Processing of entitlement messages  e.g. Entitlement Control Message [ECM]  Entitlement Management Message [EMM] | arrangements for conditional access to broadcast information or to broadcast-related services | (ref: H04H60/14)0.053
H04N21/43637involving a wireless protocol  e.g. Bluetooth or wireless LAN | IEEE 802.11| arrangements for wireless networking or broadcasting of information in indoor or near-field type systems | (ref: H04B10/114)| | wireless local area data switching networks | (ref: H04W)| | flow control in wireless networks | (ref: H04W28/10)0.053
H04M2215/2093Push to talk0.053
H04W4/12Messaging| Mailboxes| Announcements0.053
H04L65/1016IMS | wireless communication networks | (ref: H04W)0.053
G06F2221/2137Time limited access  e.g. to a computer or data0.053
H04L45/74Address processing for routing0.053
H04Q2213/13095PIN / Access code  authentication0.053
H04L29/06863Checking the content  e.g. message integrity0.053
H04L29/06775Certificates0.053
G06F2221/2139Recurrent verification0.053
H04R2420/07Applications of wireless loudspeakers or wireless microphones0.053
H04R2420/01Input selection or mixing for amplifiers or loudspeakers | for hearing aids | (ref: H04R25/43)0.053
G06F2221/0706Domain0.053
H04L2209/84Vehicles0.053
G06Q50/26Government or public services0.053
H04M1/00Substation equipment  e.g. for use by subscribers| Analogous equipment at exchanges | prepayment telephone coin boxes | (ref: H04M17/00)| | current supply arrangements | (ref: H04M19/00)| | | telephone sets particularly adapted for data transmission | (ref: H04M11/066)| | network interface devices | (ref: H04Q1/028)0.053
H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set | at the operator set in a manual exchange | (ref: H04M5/20)0.053
G06F9/46Multiprogramming arrangements0.053
G11C7/00Arrangements for writing information into  or reading information out from  a digital store | (ref: G11C5/00)|  takes precedence| auxiliary circuits for stores using semiconductor devices | (ref: G11C11/4063)|   | (ref: G11C11/413)|  0.053
G06F15/02manually operated with input through keyboard and computation using a built-in program  e.g. pocket calculators0.053
H04B7/2653for logical channel control0.053
G11C7/16Storage of analogue signals in digital stores using an arrangement comprising analogue/digital [A/D] converters  digital memories and digital/analogue [D/A] converters 0.053
Y02D10/00Energy efficient computing0.052
G06F2221/2145Inheriting rights or properties  e.g.  propagation of permissions or restrictions within a hierarchy0.052
G06F2221/0751Key | not used0.052
H04M2250/62user interface aspects of conference calls0.052
G02B2027/0178Eyeglass type  eyeglass details | (ref: G02C)0.052
G06F2221/03Indexing scheme relating to | (ref: G06F21/50)|   monitoring users  programs or devices to maintain the integrity of platforms0.052
G09G2358/00Arrangements for display data security0.052
H04L63/14for detecting or protecting against malicious traffic0.052
H04W84/02Hierarchically pre-organised networks  e.g. paging networks  cellular networks  WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]0.052
H04M11/08adapted for optional reception of entertainment or informative matter | systems in which the information is continuously available on a carrier over the whole network | (ref: H04H20/81)0.052
H04M1/21Combinations with auxiliary equipment  e.g. with clock  with memoranda pads0.052
H04M1/27Devices whereby a plurality of signals may be stored simultaneously | devices disposed in the exchange | (ref: H04M3/424)|   | (ref: H04M3/44)0.052
H04M2250/74with voice recognition means | voice activated dialling | (ref: H04M1/271)| | voice recognition algorithms | (ref: G10L15/00)0.052
H04M1/642storing speech in digital form0.052
H04L51/36Unified messaging  e.g. interactions between instant messaging  e-mail or other types of messages such as converged IP messaging [CPM]0.052
H04M7/0042where the data service is a text-based messaging service | (ref: H04M7/0054)|  takes precedence0.052
G07B2017/00967PSD [Postal Security Device] as defined by the USPS [US Postal Service]0.052
G07B2017/00887using look-up tables  also called master tables with pointers0.052
G07B2017/00056Client-server0.052
G07B2017/00201Open franking system  i.e. the printer is not dedicated to franking only  e.g. PC (Personal Computer)0.052
G07B2017/00064Virtual meter  online stamp| PSD functions or indicia creation not at user's location0.052
G07B2017/00145via the Internet0.052
G06F2221/2125Just-in-time application of countermeasures  e.g.  on-the-fly decryption  just-in-time obfuscation or de-obfuscation0.052
H04L2209/608Watermarking0.052
G06F2221/0735Restriction at operating system level0.052
H04L2212/00Encapsulation of packets0.052
G06F2212/2022Flash memory0.052
H04M2203/554Data synchronization0.052
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.052
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.052
G06F2212/652Page size control0.052
H04M2201/60Medium conversion0.052
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.052
H04L2209/34Encoding or coding  e.g. Huffman coding or error correction0.052
G06F1/16Constructional details or arrangements0.052
F04C2270/0421Controlled or regulated0.052
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.