A method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent; providing a synthetic economic value to a first set of agents at the a high level of the hierarchy; allocating portions of the synthetic economic value by the first set of agents to a second set of agents at respectively different hierarchal rank than the first set of agents; and conducting an auction amongst agents using the synthetic economic value as the currency. A method for allocation among agents, comprising assigning a wealth generation function for generating future wealth to each of a plurality of agents, communicating subjective market information between agents, and transferring wealth generated by the secure wealth generation function between agents in consideration of a market transaction. The method may further comprise the step of transferring at least a portion of the wealth generation function between agents.

Patent
   RE49334
Priority
Oct 04 2005
Filed
Apr 04 2019
Issued
Dec 13 2022
Expiry
Aug 29 2026
Assg.orig
Entity
Large
0
3442
currently ok
1. A networking system for controlling an allocation of at least one physical resource by at least one automated control within a network having a changing network state associated with a network state risk, based on a received control signal, comprising:
a memory configured to store parameters of a network model, comprising a first set of stored values representing an estimate of the changing network state;
an automated arbitrage agent, comprising at least one automated processor and being operationally associated with the memory and the an automated communication network interface port, configured to:
(1) engage in a negotiation of an automatic arbitrage transaction based on at least;
(a) an analysis of the network state risk, and
(b) a self-interest of the automated arbitrage agent,
with at least one automated counterparty, with respect to a communication of information relating to the first set of stored values,
the negotiation comprising at least one automated communication through the automated communication network interface port,
(2) engage in the transaction comprising a communication of at least a portion of information defining the estimate of the changing network state through the automated communication network interface port,
(3) update the network model;, and
(4) generate the control signal selectively dependent on the updated network model; and
an output of the automated arbitrage agent configured to communicate at least one of the generated control signal and information dependent on the generated control signal.
23. A networking system comprising:
a network model comprising a set of stored values representing statistical estimates of a varying availability state of an automated network comprising physical elements, an accuracy of the statistical estimates being limited by availability of state information for the automated network; and
an automated arbitrage agent, comprising at least one automated processor and a communication network interface port, configured to:
engage in an automated negotiation based on at least (a) an analysis of the statistical estimates of the varying availability state, and (b) a self-interest of the automated arbitrage agent, through the communication network interface port, between the automated arbitrage agent and an automated counterparty agent;
engage in an automatic arbitrage transaction through the communication network interface port with the automated counterparty agent, the transaction comprising at least communicating previously unavailable automated network state information for the automated network to increase an accuracy of the statistical estimates, and a token representing compensation for the arbitrage transaction, and
update the network model based on the communicated previously unavailable automated network state information for the automated network; and
account for the communicated token; and
a control, configured to automatically control the automated network in dependence on the updated network model comprising the set of stored values, the control having an output signal selectively dependent on the network model.
18. A networking method comprising:
storing parameters defining a network model of a communication network having a changing state in a memory, comprising network state information for estimating a time-varying state of the communication network and a reliability risk of at least one physical resource within the communication network;
providing an automated arbitrage agent which acts in its own self-interest, comprising at least one automated processor and being associated with the memory;
engaging in an automated negotiation based on at least (a) an analysis of the reliability risk, and the (b) self-interest of the automated arbitrage agent, through an automated communication network between the automated arbitrage agent and at least one automated counterparty, of a transaction comprising a communication of the network state information;
communicating the network state information through the automated communication network in accordance with the automated negotiation of the transaction;
estimating the communication network state and the reliability risk of the at least one physical resource within the communication network based on at least the network model and the communicated network state information;
updating the stored parameters defining the network model in the memory based on at least the communicated network state information;
generating a control signal, by at least one automated control, for automatically altering an allocation of at least one physical resource within the network, dependent on at least the estimated communication network state and the reliability risk of the at least one physical resource within the communication network; and
communicating at least one of the generated control signal and information dependent on the generated control signal.
21. A communication networking system, comprising:
a memory configured to store a communication network model of an estimate of a varying network state of an automated communication network comprising a plurality of physical communication resources, comprising an estimate of a risk of future impaired function of the plurality of physical communication resources, the estimate being dependent on an availability of network state information for the automated communication network;
an automated arbitrage agent, configured to:
engage in an automated negotiation with respect to at least (a) a self-interest of the automated arbitrage agent, and (b) an analysis of the risk of future impaired function, through the automated communication network, with at least one other automated arbitrage agent, with respect to a transaction to communicate network state information for the automated communication network, wherein the transaction to communicate the network state information for the automated communication network incurs a transmission cost;
conclude the negotiated transaction by communicating the network state information for the automated communication network and a compensation for the transmission cost;
update the communication network model based on at least the communicated network state information for the automated communication network;
update the estimate of the risk of future impaired function of the plurality of physical communication resources based on the updated communication network model; and
produce an automated communication network control signal dependent on at least the updated communication network model updated and the updated estimate of the risk of future impaired function of the plurality of physical communication resources; and
at least one automated control, configured to allocate the plurality of physical communication resources in dependence on at least the automated communication network control signal.
2. The networking system according to claim 1, wherein the automated arbitrage agent is configured:
to receive the network state information through the automated communication network interface port and
to store the received network state information in the memory, and
to transmit information to compensate for the received network state information.
3. The networking system according to claim 1, wherein the network state risk comprises a risk of impaired availability of the at least one physical resource within the network, and the transaction comprises a communication of information adapted to decrease an uncertainty of the network state risk.
4. The networking system according to claim 1, wherein the automated arbitrage agent is configured to automatically sense network state information, and to communicate the automatically sensed network state information to the at least one automated counterparty as a result of the transaction.
5. The networking system according to claim 1, wherein the automatic arbitrage agent is further configured to:
receive network state information comprising sensed system condition information from at least one first automated counterparty in at least one first transaction for a first compensation,
transmit the network state information comprising the sensed system condition information to at least one second automated counterparty in at least one second transaction for a second compensation, and
to negotiate the at least one first transaction and the at least one second transaction to produce a profit based on an excess of the second compensation over the first compensation and a transactional cost.
6. The networking system according to claim 1, wherein the at least one automated arbitrage agent has an associated risk tolerance, wherein the transaction reduces an assessment of the network state risk incurred by the automated arbitrage agent, and the automated arbitrage agent is further configured to compensate the at least one automated counterparty as part of the automatic arbitrage transaction dependent on an at least amount of the reduction in the assessed network state risk.
7. The networking system according to claim 1, wherein the automated arbitrage agent competes with other automated arbitrage agents for the transaction, and the transaction has a compensation which is competitively determined based on the competition with the other automated arbitrage agents.
8. The networking system according to claim 1, wherein the automated arbitrage agent is configured to automatically selectively receive information adapted to improve the network model, through the automated communication network interface portadapted to improve the network model, and to automatically selectively transmit information stored in the memory dependent on the network model.
9. The networking system according to claim 1, wherein the network model comprises information describing the network state risk comprising a respective risk of availability and an inclusion cost of a set of available intermediary nodes which engage in communications through the network.
10. The networking system according to claim 1, wherein the physical resource comprises a node of a mobile ad hoc communication network.
11. The networking system according to claim 1,
wherein the at least one automated counterparty has a risk tolerance with respect to an assessed network state risk associated with allocation of the at least one physical resource within the network, and
wherein the transaction communicates sufficient information to the at least one automated counterparty to reduce an assessment of the network state risk by the automated counterparty from a level above its risk tolerance to a level below its risk tolerance.
12. The networking system according to claim 1, wherein the automated control is configured to select one of a plurality of future configurations of a network, representing potential network states, comprising the at least one physical resource, wherein at least one of the future configurations has an associated risk of failure, and wherein the automated arbitrage agent is configured to automatically negotiate the transaction to reduce the associated network state risk comprising a risk of failure, and to selectively produce the control signal in dependence thereon.
13. The networking system according to claim 1, wherein the network model further comprises at least one predicted future state of availability of the at least one physical resource.
14. The networking system according to claim 1, wherein the automated arbitrage agent is configured to conduct the negotiation of the automatic arbitrage negotiation transaction with another automated arbitrage agent having its own respective network model comprising a second set of stored values representing an estimate of the changing network state, wherein the negotiation of the automatic arbitrage transaction negotiation between the automated arbitrage agent and the other automated arbitrage agent is dependent on differences in the first set of stored values and the second set of stored values.
0. 15. A networking method for producing a control signal for automatically controlling an allocation of at least one physical resource within an automated network, comprising: maintaining a network model as a set of stored parameters in a memory, representing an estimate of a changing network state subject to a communication risk dependent on the allocation of the at least one physical resource;
providing an automated arbitrage agent, comprising at least one automated processor operationally associated with the memory and an automated communication network interface port;
engaging in an automated negotiation of an automatic arbitrage transaction based on at least (a) an analysis of the communication risk, and (b) a self-interest of the automated arbitrage agent, between the automated arbitrage agent and at least one automated counterparty by communications through the automated communication network interface port, the automatic arbitrage transaction being for communicating information to alter an estimate of the communication risk by the automated arbitrage agent;
engaging in the negotiated automatic arbitrage transaction comprising communicating the information to alter the estimate of the communication risk by the automated arbitrage agent;
updating the maintained network model;
generating the control signal dependent on at least the altered estimate of the communication risk by the automated arbitrage agent; and
at least one of communicating the generated control signal and communicating information dependent on the generated control signal.
0. 16. The network method according to claim 15, wherein said engaging in the negotiated automatic arbitrage transaction further comprises conveying compensation to the at least one automated counterparty.
0. 17. The network method according to claim 15, wherein the automated network comprises a shared communication medium, and the automated communication network interface port communicates with the at least one automated counterparty through the shared communication medium.
19. The networking method according to claim 18, further comprising compensating the at least one automated counterparty for said communicating.
20. The networking method according to claim 18, wherein the at least one physical resource comprises a communication network intermediary of the automated communication network through which a communication passes, and the network state information comprises a communication risk dependent on allocation of at least one physical resource within the automated communication network.
22. The communication networking system according to claim 21, wherein the compensation comprises a transfer of virtual currency through the automated communication network.
0. 24. The networking method according to claim 23, wherein the communicated token comprises a cryptographically-authenticated virtual currency.

The present application is a and

Wherein B1 is the attributed bid, B0 is the actual bid, and ΔR is the difference in rank, positive or negative.

Outside the chain of command, a different, generally lower, discount (dNCOC) may be applied, possibly with a base discount as compared to all bids within the chain of command (dCOC), i.e.,
B1=B0×10(1+dCOC+dNCOC×ΔR).
The discount is applied so that higher ranking officers pay less, while lower ranking officers pay more. Clearly, there is a high incentive for each bid to originate from the highest available commander within the chain of command, and given the effect of the perturbation, for ranking officers to “pull rank” judiciously.

The Modified VCG Auction

A so-called Vickrey-Clarke-Groves, or VCG, auction is a type of auction suitable for bidding, in a single auction, for the goods or services of a plurality of offerors, as a unit. Vickrey, W. (1961). Counterspeculation, auctions, and competitive sealed tenders, Journal of Finance 16, 8-37; Clarke, E. H. (1971). Multipart pricing of public goods, Public Choice 11, 17-33.

In the classic case, each bidder bids a value vector for each available combination of goods or services. The various components and associated ask price are evaluated combinatorially to achieve the minimum sum to meet the requirement. The winning bid set is that which produces the maximum value of the accepted bids, although the second (Vickrey) price is paid. In theory, the Vickrey price represents the maximum state of the network absent the highest bidder, so that each bidder is incentivized to bit its private value, knowing that its pricing will be dependent not on its own value, but the subjective value applied by others. In the present context, each offeror submits an ask price (reserve) or evaluatable value function for a component of the combination. If the minimum aggregate to meet the bid requirement is not met, the auction fails. If the auction is successful, then the set of offerors selected is that with the lowest aggregate bid, and they are compensated that amount.

The VCG auction is postulated as being optimal for allocation of multiple resources between agents. It is “strategyproof” and efficient, meaning that it is a dominant strategy for agents to report their true valuation for a resource, and the result of the optimization is a network which maximizes the value of the system to the agents. Game theory also allows an allocation of cost between various recipients of a broadcast or multicast. That is, the communication is of value to a plurality of nodes, and a large set of recipient nodes may efficiently receive the same information. This allocation from multiple bidders to multiple sellers is a direct extension of VCG theory, and a similar algorithm may be used to optimize allocation of costs and benefit.

The principal issue involved in VCG auctions is that the computational complexity of the optimization grows with the number of buyers and their different value functions and allocations. While various simplifying presumptions may be applied, studies reveal that these simplifications may undermine the VCG premise, and therefore do not promote honesty in reporting the buyer's valuation, and thus are not “strategyproof”, which is a principal advantage of the VCG process.

The surplus, i.e., gap between bid and ask, is then available to compensate the deferred bidders. This surplus may be, for example, distributed proportionately to the original bid value of the bidder, thus further encouraging an honest valuation of control over the resource. Thus, if we presume that a bidder may have an incentive to adopt a strategy in which it shaves its bid to lower values, an additional payoff dependent on a higher value bid will promote higher bides and disincentivize shaving. On the other hand, it would be inefficient to promote bidding above a bidder's private value, and therefore care must be exercised to generally avoid this circumstance. In similar manner, potential offerors may be compensated for low bids, to promote availability of supply. It is noted that, by broadcasting supply and demand, fault tolerance of the network is improved, since in the event that an involved node becomes unavailable, a competing node or set of nodes for that role may be quickly enlisted.

The optimization is such that, if any offeror asks an amount that is too high, it will be bypassed in favor of more “reasonable” offerors. Since the bidder pays the second highest price, honesty in bidding the full private value is encouraged. The distribution of the surplus to losing bidders, which exercise deference to the winner, is proportional to the amount bid, that is, the reported value.

In a scenario involving a request for information meeting specified criteria, the auction is complicated by the fact that the information resource content is unknown to the recipient, and therefore the bid is blind, that is, the value of the information to the recipient is indeterminate. However, game theory supports the communication of a value function or utility function, which can then be evaluated at each node possessing information to be communicated, to normalize its value to the requestor. Fortunately, it is a dominant strategy in a VCG auction to communicate a truthful value, and therefore broadcasting the private value function, to be evaluated by a recipient, is not untenable. In a mere request for information conveyance, such as the intermediate transport nodes in a multihop network, or in a cellular network infrastructure extension model, the bid may be a true (resolved) value, since the information content is not the subject of the bidding; rather it is the value of the communications per se, and the bidding node can reasonably value its bid.

Game theory also allows an allocation of cost between various recipients of a broadcast or multicast. That is, in many instances, information which is of value to a plurality of nodes, and a large set of recipient nodes may efficiently receive the same information. This allocation is a direct extension of VCG theory.

Operation of Protocol

The preferred method for acquiring an estimate of the state of the network is through use of a proactive routing protocol. Thus, in order to determine the network architecture state, each node must broadcast its existence, and, for example, a payload of information including its identity, location, itinerary (navigation vector) and “information value function”. Typically, the system operates in a continuous set of states, so that it is reasonable to commence the process with an estimate of the state based on prior information. Using an in-band or out-of-band propagation mechanism, this information must propagate to a network edge, which may be physically or artificially defined. If all nodes operate with a substantially common estimation of network topology, only deviations from previously propagated information need be propagated. On the other hand, various nodes may have different estimates of the network state, allowing efficiency gains through exploitation of superior knowledge as compared with seeking to convey full network state information to each node.

A CSMA scheme may be used for the protocol-related communications because it is relatively simple and robust, and well suited for ad hoc communications in lightly loaded networks. We presume that the network is willing to tolerate protocol related inefficiency, and therefore that protocol communications can occur in a lightly loaded network even if the content communications are saturated. An initial node transmits using an adaptive power protocol, to achieve an effective transmit range, for example, of greater than an average internodal distance, but not encompassing the entire network. This distance therefore promotes propagation to a set of nearby nodes, without unnecessarily interfering with communications of distant nodes and therefore allowing this task to be performed in parallel in different regions. Neighboring nodes also transmit in succession, providing sequential and complete protocol information propagation over a relevance range, for example 3-10 maximum range hops.

If we presume that there is a spatial limit to relevance, for example, 5 miles or 10 hops, then the network state propagation may be so limited. Extending the network to encompass a large number of nodes will necessarily reduce the tractability of the optimization, and incur an overhead which may be inefficient. Each node preferably maintains a local estimate of relevance. This consideration is accommodated, along with a desire to prevent exponential growth in protocol-related data traffic, by receiving an update from all nodes within a node's network relevance boundary, and a state variable which represents an estimate of relevant status beyond the arbitrarily defined boundary. The propagation of network state may thus conveniently occur over a finite number of hops, for example 3-10. In a dense population of nodes, such as in a city, even a single maximum range communication may result in a large number of encompassed nodes. On the other hand, in a deserted environment, there may be few or no communications partners, at any time.

Under conditions of relatively high nodal densities, the system may employ a zone strategy, that is, proximate groups of nodes are is treated as an entity or cluster for purposes of external state estimation, especially with respect to distant nodes or zones. In fact, a supernode may be nominated within a cluster to control external communications for that cluster. Such a presumption is realistic, since at extended distances, geographically proximate nodes may be modeled as being similar or inter-related, while at close distances, and particularly within a zone in which all nodes are in direct communication, inter-node communications may be subject to mutual interference, and can occur without substantial external influence. Alternately, it is clear that to limit latencies and communication risks, it may be prudent to bypass nearby and neighboring nodes, thus trading latency for power consumption and overall network capacity. Therefore, a hierarchal scheme may be implemented to geographically organize the network at higher analytical levels, and geographic cells may cooperate to appear externally as a single coordinated entity.

In order to estimate a network edge condition, a number of presumptions must be made. The effect of an inaccurate estimate of the network edge condition typically leads to inefficiency, while inordinate efforts to accurately estimate the network edge condition may also lead to inefficiency. Perhaps the best way to achieve compromise is to have a set of adaptive presumptions or rules, with a reasonable starting point. For example, in a multihop network, one might arbitrarily set a network edge the maximum range of five hops of administrative data using a 95% reliable transmission capability. Beyond this range, a set of state estimators is provided by each node for its surroundings, which are then communicated up to five hops (or the maximum range represented by five hops). This state estimator is at least one cycle old, and by the time it is transferred five hops away, it is at least six cycles old. Meanwhile, in a market economy, each node may respond to perceived opportunities, leading to a potential for oscillations if a time-element is not also communicated. Thus, it is preferred that the network edge state estimators represent a time-prediction of network behavior under various conditions, rather than a simple scalar value or instantaneous function.

For example, each node may estimate a network supply function and a network demand function, liquidity estimate and bid-ask gap for its environment, and its own subjective risk tolerance, if separately reported; the impact of nodes closer than five hops may then be subtracted from this estimate to compensate for redundant data. Further, if traffic routes are identifiable, which would correspond in a physical setting of highways, fixed infrastructure access points, etc., a state estimator for these may be provided as well. As discussed above, nodes may bid not only for their own needs or resources, but also to act as market-makers or merchants, and may obtain long term commitments (futures and/or options) and employ risk reduction techniques (insurance and/or indemnification), and thus may provide not only an estimate of network conditions, but also “guaranty” this state.

A node seeking to communicate within the five hop range needs to consider the edge state estimate only when calculating its own supply and demand functions, bearing in mind competitive pressures from outside. On the other hand, nodes seeking resources outside the five hop range must rely on the estimate, because a direct measurement or acquisition of information would require excess administrative communications, and incur an inefficient administrative transaction. Thus, a degree of trust and reliance on the estimate may ensue, wherein a node at the arbitrary network edge is designated as an agent for the principal in procuring or selling the resource beyond its own sphere of influence, based on the provided parameters. The incentive for a node to provide misinformation is limited, since nodes with too high a reported estimate value lose gains from competitive sale transactions, and indeed may be requested to be buyers, and vice versa. While this model may compel trading by intermediary nodes, if the information communicated accurately represents the network state, an economic advantage will accrue to the intermediary participating, especially in a non-power constrained, unlicensed spectrum node configuration.

It should be borne in mind that the intended administration of the communications is an automated process, with little human involvement, other than setting goals, risk tolerance, cost constraints, etc. In a purely virtual economy with temporally declining currency value, the detriment of inaccurate optimizations is limited to reduced nodal efficiency, and with appropriate adaptivity, the system can learn from its “mistakes”. (A defined decline in currency value tends to define the cost constraints for that node, since wealth cannot be accumulated nor overspent).

A supernode within a zone may be selected for its superior capability, or perhaps a central location. The zone is defined by a communication range of the basic data interface for communications, with the control channel preferably having a longer range, for example at least double the normal data communications range. Communications control channel transmitters operate on a number of channels, for example at least 7, allowing neighboring zones in a hexagonal tiled array to communicate simultaneously without interference. In a geographic zone system, alternate zones which would otherwise be interfering may use an adaptive multiplexing scheme to avoid interference. All nodes may listen on all control channels, permitting rapid analysis and propagation of control information. As discussed elsewhere herein, directional antennas of various types may be employed, although it is preferred that out-of-band control channels employ omnidirectional antennas, having a generally longer range (and lower data bandwidth) than the normal data communications channels, in order to have a better chance to disseminate the control information to potentially interfering sources, and to allow coordination of nodes more globally.

In order to effectively provide decentralized control, either each node must have a common set of information to allow execution of an identical control algorithm, or nodes defer to the control signals of other nodes without internal analysis for optimality. A model of semi-decentralized control is also known, in which dispersed supernodes are nominated as master, with other topologically nearby nodes remaining as slave nodes. In the pure peer network, relatively complete information conveyance to each node is required, imposing a relatively high overhead. In a master-slave (or supernode) architecture, increased reliance on a single node trades-off reliability and robustness (and other advantages of pure peer-to-peer networks) for efficiency. A supernode within a cellular zone may be selected for its superior capability, or perhaps is at a central location or is immobile.

Once each control node (node or supernode) has an estimate of network topology, the next step is to optimize network channels. According to VCG theory, each agent has an incentive to broadcast its truthful value or value function for the scarce resource, which in this case, is control over communications physical layer, and or access to information. This communication can be consolidated with the network discovery transmission. Each control node then performs a combinatorial solution to select the optimum network configuration from the potentially large number of possibilities, which may include issues of transmit power, data rate, path, timing, reliability and risk criteria, economic and virtual economic costs, multipath and redundancy, etc., for the set of simultaneous equations according to VCG theory (or extensions thereof). This solution should be consistent between all nodes, and the effects of inconsistent solutions may be resolved by collision sensing, and possibly an error/inconsistency detection and correction algorithm specifically applied to this type of information. Thus, if each node has relatively complete information, or accurate estimates for incomplete information, then each node can perform the calculation and derive a closely corresponding solution, and verify that solutions reported by others are reasonably consistent to allow or promote reliance thereon.

As part of the network mapping, communications impairment and interference sources are also mapped. GPS assistance may be particularly useful in this aspect. Where network limitations are caused by interfering communications, the issue is a determination of a strategy of deference or competition. If the interfering communication is continuous or unresponsive, then the only available strategy is competition. On the other hand, when the competing system uses, for example, a CSMA system, such as 802.11, competition with such a communication simply leads to retransmission, and therefore ultimately increased network load, and a deference strategy may be more optimal, at least and until it is determined that the competing communication is incessant. Other communications protocols, however, may have a more or less aggressive strategy. By observation of a system over time, its strategies may be revealed, and game theory permits composition of an optimal strategy to deal with interference or coexistence. It is noted that this strategy may be adopted adaptively by the entire ad hoc network, which may coordinate deference or competition as determined optimal.

The optimization process produces a representation of optimal network architecture during the succeeding period. That is, value functions representing bids are broadcast, with the system then being permitted to determine an optimal real valuation and distribution of that value. Thus, prior to completion of the optimization, potentially inconsistent allocations must be prevented, and each node must communicate its evaluation of other node's value functions, so that the optimization is performed on a normalized economic basis. This step may substantially increase the system overhead, and is generally required for completion of the auction. This valuation may be inferred, however, for intermediate nodes in a multihop network path, since there is little subjectivity for nodes solely in this role, and the respective value functions may be persistent. For example, the valuation applied by a node to forward information is generally independent of content and involved party.

A particular complication of a traffic information system is that the nature of the information held by any node is private to that node (before transmission), and therefore the valuation is not known until after all bids are evaluated. Thus, prior to completion of optimization, each node must communicate its evaluation of other nodes' value functions, so that the optimization is performed on an economic basis. This required step substantially increases the system overhead. This valuation may be inferred, however, for transit nodes in a multihop network path.

As discussed above, may of the strategies for making the economic markets more efficient may be employed either directly, or analogy, to the virtual economy of the ad hoc network. The ability of nodes to act as market maker and derivative market agents facilitates the optimization, since a node may elect to undertake a responsibility (e.g., transaction risk), rather than relay it to others, and therefore the control/administrative channel chain may be truncated at that point. If the network is dense, then a node which acts selfishly will be bypassed, and if the network is sparse, the node may well be entitled to gain transactional profit by acting as a principal and trader, subject to the fact that profits will generally be suboptimal if pricing is too high or too low.

After the network architecture is defined, compensation is paid to those nodes providing value or subjected to a burden (including foregoing communication opportunity) by those gaining a benefit. The payment may be a virtual currency, with no specific true value, and the virtual currency system provides a convenient method to flexibly tax, subsidize, or control the system, and thus steer the virtual currency to a normalized extrinsic value. In a real currency system, external controls are more difficult, and may have unintended consequences. A hybrid economy may be provided, linking both the virtual and real currencies, to some degree. This is especially useful if the network itself interfaces with an outside economy, such as the cellular telephony infrastructure (e.g., 2G, 2.5G, 3G, 4G, proposals for 5G, WiFi (802.11x) hotspots, WiMax (802.16x), etc.)

Using the protocol communication system, each node transmits its value function (or change thereof), passes through communications from neighboring nodes, and may, for example transmit payment information for the immediate-past bid for incoming communications.

Messages are forwarded outward (avoiding redundant propagation back to the source), with messages appended from the series of nodes. Propagation continues for a finite number of hops, until the entire community has an estimate of the state and value function of each node in the community. Advantageously, the network beyond a respective community may be modeled in simplified form, to provide a better estimate of the network as a whole. If the propagation were not reasonably limited, the information would be stale by the time it is employed, and the system latency would be inordinate. Of course, in networks where a large number of hops are realistic, the limit may be time, distance, a counter or value decrement, or other variable, rather than hops. Likewise, the range may be adaptively determined, rather than predetermined, based on some criteria.

After propagation, each node evaluates the set of value functions for its community, with respect to its own information and ability to forward packets. Each node may then make an offer to supply or forward information, based on the provided information. In the case of multihop communications, the offers are propagated to the remainder of the community, for the maximum number of hops, including the originating node. At this point, each node has a representation of the state of its community, with community edge estimates providing consistency for nodes with differing community scopes, the valuation function each node assigns to control over portions of the network, as well as a resolved valuation of each node for supplying the need. Under these circumstances, each node may then evaluate an optimization for the network architecture, and come to a conclusion consistent with that of other members of its community. If supported, node reputation may be updated based on past performance, and the reputation applied as a factor in the optimization and/or externally to the optimization. As discussed above, a VCG-type auction is employed as a basis for optimization. Since each node receives bid information from all other nodes within the maximum node count, the VCG auction produces an optimized result.

As discussed above, by permitting futures, options, derivatives, insurance/indemnification/guaranties, long and short sales, etc., the markets may be relatively stabilized as compared to a simple set of independent and sequential auctions, which may show increased volatility, oscillations, chaotic behavior, and other features which may be inefficient.

Transmissions are preferably made in frames, with a single bidding process controlling multiple frames, for example a multiple of the maximum number of hops. Therefore, the bid encompasses a frame's-worth of control over the modalities. In the event that the simultaneous use of, or control over, a modality by various nodes is not inconsistent, then the value of the respective nodes may be summed, with the resulting allocation based on, for example, a ratio of the respective value functions. As a part of the optimization, nodes are rewarded not only for supporting the communication, but also for deferring their own respective communications needs. As a result, after controlling the resources, a node will be relatively less wealthy and less able to subsequently control the resources, while other nodes will be more able to control the resources. The distribution to deferred nodes also serves to prevent pure reciprocal communications, since the proposed mechanism distributes and dilutes the wealth to deferring nodes.

Another possible transaction between nodes is a loan, that is, instead of providing bandwidth per se, one node may loan a portion of its generator function or accumulated wealth to another node. Presumably, there will be an associated interest payment. Since the currency in the preferred embodiment is itself defined by an algorithm, the loan transaction may also be defined by an algorithm. While this concept is somewhat inconsistent with a virtual currency which declines in value over time and/or space, it is not completely inconsistent, and, in fact, the exchange may arbitrage these factors, especially location-based issues.

Because each node in the model presented above has complete information, for a range up to the maximum node count, the wealth of each node can be estimated by its neighbors, and payment inferred even if not actually consummated. (Failure of payment can occur for a number of reasons, including both malicious and accidental). Because each hop adds significant cost, the fact that nodes beyond the maximum hop distance are essentially incommunicado is typically of little consequence; since it is very unlikely that a node more than 5 or 10 hops away will be efficiently directly included in any communication, due to the increasing cost with distance, as well as reduction in reliability and increase in latency. Thus, large area and scalable networks may exist.

Communications are generally of unencrypted data. Assuming the network is highly loaded, this may allow a node to incidentally fulfill its data requirements as a bystander, and thus at low cost meet its needs, allowing nodes with more urgent or directed needs to both control and compensate the network. While this may reduce compensation to intermediaries and data sources, the improvements in efficiency will likely benefit the network as a whole in increase stability, since we assume that peak load conditions will occur frequently.

Enforcement of responsibility may be provided by a centralized system which assures that the transactions for each node are properly cleared, and that non-compliant nodes are either excluded from the network or at least labeled. While an automated clearinghouse which periodically ensures nodal compliance is preferred, a human discretion clearinghouse, for example presented as an arbitrator or tribunal, may be employed.

It is clear that, once an economic optimization methodology is implemented, various factors may be included in the optimization, as set forth in the Summary and Objects of the invention and claims. Likewise, the optimization itself may have intrinsic limitations, which may create arbitrage opportunities. One set of embodiments of the present invention encourages such arbitrage as a means for efficiently minimizing perturbations from optimality—as the model deviance from reality creates larger arbitrage opportunities, there will be a competitive incentive for recruitment of agents as arbitragers, and also an incentive to create and implement better models. The resulting equilibrium may well be more efficient than either mechanism alone.

The Synthetic Economy

Exerting external economic influences on the system may have various effects on the optimization, and may exacerbate differences in subjective valuations. The application of a monetary value to the virtual currency substantially also increases the possibility of misbehavior and external attacks. On the other hand, a virtual currency with no assessed real value is self-normalizing, while monetization leads to external and generally irrelevant influences as well as possible external arbitrage (with potential positive and negative effects). External economic influences may also lead to benefits, which are discussed in various publications on non-zero sum games.

In order to provide fairness, the virtual currency (similar to the so-called “nuglets” or “nugglets” proposed for use in the Terminodes project) is self-generated at each node according to a schedule, and itself may have a time dependent value. L. Blazevic, L. Buttyan, S. Capkun, S. Giordiano, J.-P. Hubaux, and J.-Y. Le Boudec. Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine, 39(6):166-174, June 2001; M. Jakobsson, J. P. Hubaux, and L. Buttyan. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of Financial Crypto 2003, January 2003; J. P. Hubaux, et al., “Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project”, IEEE Communications, 39(1), 2001. citeseer.ist.psu.edu/hubaux01toward.html; Buttyan, L., and Hubaux, J.-P. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Tech. Rep. DSC/citeseer.ist.psu.edu/buttyan01stimulating.html; Levente Buttyan and Jean-Pierre Hubaux, “Enforcing Service Availability in Mobile Ad-Hoc WANs”, 1st IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC citeseer.ist.psu.edu/buttyan00enforcing.html; L. Buttyan and J.-P. Hubaux. Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. Technical Report DSC/2001, citeseer.ist.psu.edu/article/buttyan01nuglets.html; Mario Cagalj, Jean-Pierre Hubaux, and Christian Enz. Minimum-energy broadcast in all-wireless networks: Np-completeness and distribution issues. In The Eighth ACM International Conference on Mobile Computing and Networking (Mobi-Com 2002), citeseer.ist.psu.edu/cagalj02minimumenergy.html; N. Ben Salem, L. Buttyan, J. P. Hubaux, and Jakobsson M. A charging and rewarding scheme for packet forwarding. In Proceeding of Mobihoc, June 2003. For example, the virtual currency may have a half-life or temporally declining value. On the other hand, the value may peak at a time after generation, which would encourage deference and short term savings, rather than immediate spending, and would allow a recipient node to benefit from virtual currency transferred before its peak value. This also means that long term hoarding of the currency is of little value, since it will eventually decay in value, while the system presupposes a nominal rate of spending, which is normalized among nodes. The variation function may also be adaptive, but this poses a synchronization issue for the network. An external estimate of node wealth may be used to infer counterfeiting, theft and failure to pay debts, and to further effect remediation.

The currency is generated and verified in accordance with micropayment theory. Rivest, R. L., A. Shamir, PayWord and MicroMint: Two simple micropayment schemes, also presented at the RSA '96 conference, http//theory.lcs.mit.edu/rivest/RivestShamirmpay.ps, citeseer.ist.psu.edu/rivest96payword.html; Silvio Micali and Ronald Rivest. Micropayments revisited. In Bart Preneel, editor, Progress in Cryptology—CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science. Springer-Verlag, Feb. 18-22, 2002. citeseer.ist.psu.edu/micali02micropayments.html.

Micropayment theory generally encompasses the transfer of secure tokens (e.g., cryptographically endorsed information) having presumed value, which are intended for verification, if at all, in a non-real time transaction, after the transfer to the recipient. The currency is circulated (until expiration) as a token, and therefore may not be subject to immediate definitive authentication by source. Since these tokens may be communicated through an insecure network, the issue of forcing allocation of payment to particular nodes may be dealt with by cryptographic techniques, in particular public key cryptography, in which the currency is placed in a cryptographic “envelope” (cryptolope) addressed to the intended recipient, e.g., is encrypted with the recipient's public key, which must be broadcast and used as, or in conjunction with, a node identifier. This makes the payment unavailable to other than the intended recipient. The issue of holding the encrypted token hostage and extorting a portion of the value to forward the packet can be dealt with by community pressure, that is, any node presenting this (or other undesirable) behavior might be ostracized. The likelihood of this type of misbehavior is also diminished by avoiding monetization of the virtual currency. Further, redundant routing of such information may prevent single-node control over such communications.

This currency generation and allocation mechanism generally encourages equal consumption by the various nodes over the long term. In order to discourage excess consumption of bandwidth, an external tax may be imposed on the system, that is, withdrawing value from the system based on usage. Clearly, the effects of such a tax must be carefully weighed, since this will also impose an impediment to adoption as compared to an untaxed system. On the other hand, a similar effect use-disincentive may be obtained by rewarding low consumption, for example by allocating an advertising subsidy between nodes, or in reward of deference. The external tax, if associated with efficiency-promoting regulation, may have a neutral or even beneficial effect.

Each node computes a value function, based on its own knowledge state, risk profile and risk tolerance, and wealth, describing the value to it of additional information, as well as its own value for participating in the communications of others. The value function typically includes a past travel history, future travel itinerary, present location, recent communication partners, and an estimator of information strength and weakness with respect to the future itinerary. It may be presumed that each node has a standard complement of sensors, and accurately acquired descriptive data for its past travel path. Otherwise, a description of the available information is required. One advantage of a value function is that it changes little over time, unless a need is satisfied or circumstances change, and therefore may be a persistent attribute. Using the protocol communication system, each node transmits its value function (or change thereof), passes through communications from neighboring nodes, and may, for example transmit payment information for the immediate-past bid for incoming communications.

Messages are forwarded outward (avoiding redundant propagation back to the source), with messages appended from the series of nodes. Propagation continues for a finite number of hops, until the entire community has an estimate of the state and value function of each node in the community. Advantageously, the network beyond a respective community may be modeled in simplified form, to provide a better estimate of the network as a whole.

After propagation, each node evaluates the set of value functions for its community, with respect to its own information and ability to forward packets. Each node may then make an offer to supply or forward information, based on the provided information. In the case of multihop communications, the offers are propagated to the remainder of the community, for the maximum number of hops, including the originating node. At this point, each node has a representation of the state of its community, with community edge estimates providing consistency for nodes with differing community scopes, the valuation function each node assigns to control over portions of the network, as well as a resolved valuation of each node for supplying the need. Under these circumstances, each node may then evaluate an optimization for the network architecture, and come to a conclusion consistent with that of other members of its community. If supported, node reputation may be updated based on past performance, and the reputation applied as a factor in the optimization and/or externally to the optimization. As discussed above, a VCG-type auction is employed as a basis for optimization. Since each node receives bid information from all other nodes within the maximum node count, the VCG auction produces an optimized result.

Transmissions are made in frames, with a single bidding process controlling multiple frames, for example a multiple of the maximum number of hops. Therefore, the bid encompasses a frame's-worth of control over the modalities. In the event that the simultaneous use of, or control over, a modality by various nodes is not inconsistent, then the value of the respective nodes may be summed, with the resulting allocation based on, for example, a ratio of the respective value functions. As a part of the optimization, nodes are rewarded not only for supporting the communication, but also for deferring their own respective needs. As a result, after controlling the resources, a node will be relatively less wealthy and less able to subsequently control the resources, while other nodes will be more able to control the resources. The distribution to deferred nodes also serves to prevent pure reciprocal communications, since the proposed mechanism distributes and dilutes the wealth to deferring nodes.

Because each node in the model presented above has complete information, for a range up to the maximum node count, the wealth of each node can be estimated by its neighbors, and payment inferred even if not actually consummated. (Failure of payment can occur for a number of reasons, including both malicious and accidental). Because each hop adds significant cost, the fact that nodes beyond the maximum hop distance are essentially incommunicado is typically of little consequence; since it is very unlikely that a node more than 5 or 10 hops away will be efficiently included in any communication, due to the increasing cost with distance, as well as reduction in reliability and increase in latency. Thus, large area and scalable networks may exist.

Typically, cryptography is employed for both authentication and to preserve privacy. External regulation, in a legal sense at least, is typically imposed by restrictions on hardware and software design, as well as voluntary compliance at risk of detection and legal sanction.

A synthetic economy affords the opportunity to provide particular control over the generator function, which in turn supports a hierarchy. In this scheme, each node controls the generator function at respectively lower nodes, and thus can allocate wealth among subordinates. If one assumes real time communications, then it is clear that the superordinate node can directly place bids on behalf of subordinates, thus effectively controlling its entire branch. In the absence of real time communications, the superordinate node must defer to the discretion of the subordinate, subject to reallocation later if the subordinate defects. If communications are impaired, and a set of a priori instructions are insufficient, then it is up to the subjective response of a node to provide deference.

It is noted that when sets of nodes “play favorites”, the VCG auction will no longer be considered “strategyproof”. The result is that bidders will assume bidding strategies that do not express their secret valuation, with the result being likely suboptimal market finding during the auction. This factor can be avoided if hierarchal overrides and group bidding play only a small role in the economy, and thus the expected benefits from shaded bidding are outweighed by the normal operation of the system. For example, by taxing transactions, over-valued bidding will be disincentivized, and by redistributing economic surplus to bystanders, the aggregate wealth of the controlling group will be mitigated.

A synthetic economy affords the opportunity to provide particular control over the generator function, which in turn provides particular advantages with respect to a hierarchal organization. In this scheme, each node has the ability to control the generator function at respectively lower nodes, and thus can allocate wealth among subordinates. If one assumes real time communications, then it is clear that the superordinate node can directly place bids on behalf of subordinates, thus effectively controlling its entire branch. In the absence of real time communications, the superordinate node must defer to the discretion of the subordinate, subject to reallocation later if the subordinate defects. If communications are impaired, and a set of a priori instructions are insufficient, then it is up to the subjective response of a node to provide deference. Thus, a node may transfer all or a portion of its generator function, either for a limited time or permanently, using feed-forward or feedback control. In this sense, the hierarchal and financial derivatives, options, futures, loans, etc. embodiments of the invention share a common theme.

It is noted that when sets of nodes “play favorites”, the VCG auction will no longer be considered “strategyproof”. The result is that bidders will assume bidding strategies that do not express their secret valuation, with the result being likely suboptimal market price finding during the auction. This factor can be avoided if hierarchal overrides and group bidding play only a small role in the economy, and thus the expected benefits from shaded bidding are outweighed by the normal operation of the system. On the other hand, the present invention potentially promotes competition within branches of a hierarchy, to the extent the hierarchy does not prohibit this. Between different branches of a hierarchy, there will generally be full competition, while within commonly controlled branches of a hierarchy, cooperation will be expected. Since the competitive result is generally more efficient, there will be incentive for the hierarchal control to permit competition as a default state, asserting control only where required for the hierarchal purpose.

Military Hierarchy

In a typical auction, each player is treated fairly; that is, the same rules apply to each player, and therefore a single economy describes the process. The fair auction therefore poses challenges for an inherently hierarchal set of users, such as a military organization. In the military, there is typically an expectation that “rank has its privileges”. The net result, however, is a decided subjective unfairness to lower ranking nodes. In a mobile ad hoc network, a real issue is user defection or non-compliance. For example, where a cost is imposed on a user for participating in the ad hoc network, e.g., battery power consumption, if the anticipated benefit does not exceed the cost, the user will simply turn off the device until actually needed, to conserve battery power outside the control of the network. The result of mass defection will of course be the instability and failure of the ad hoc network itself. Thus, perceived fairness and net benefit is required to important for network success, assuming that defection or non-compliance remains possible.

On the other hand, in military systems, the assertion of rank as a basis for priority is not necessarily perceived as arbitrary and capricious, and is generally not perceived subjectively as such. Orders and communications from a central command are critical for the organization itself. Therefore, the difficulty in analyzing the application of a fair game to a hierarchal organization is principally a result of conceptualizing and aligning the individual incentives with those of the organization as a whole. Since the organization exists outside of the ad hoc network, it is generally not unrealistic to expect compliance with the hierarchal attributes both within and outside of the network.

An artificial economy provides a basis for an economically efficient solution. In this economy, each node has a generator function for generating economic units which are used in a combinatorial auction with other nodes. The economic units may have a declining value, so that wealth does not accumulate over long periods, and by implication, wealth accumulated in one region is not available for transfer in a distant region, since the transfer may be subject to latency and/or cost. Even if a low latency system is employed to transfer the value, an express spatially declining value function may also be imposed. The geographic decline may also be explicit, for example based on a GPS or navigational system. In other cases, nodal motility is valuable, and mobile nodes are to be rewarded over those which are stationary. Therefore, the value or a portion thereof, or the generator function, may increase with respect to relocations.

This scheme may be extended to the hierarchal case by treating each chain of command as an economic unit with respect to the generator function. At any level of the hierarchy, the commander retains a portion of the wealth generation capacity, and delegates the remainder to its subordinates. In the case of real-time communications, a commander may directly control allocation of the generator function at each time period. Typically, there is no real-time communications capability, and the wealth generator function must be allocated a priori. Likewise, wealth may also be reallocated, although a penalty is incurred in the event of an initial misallocation since the transfer itself incurs a cost, and there will be an economic competitive distortion, under which a node's subjective value of a resource is influenced by its subjective wealth. If a node is supplied with wealth beyond its needs, the wealth is wasted, since it declines in value and cannot be hoarded indefinitely. If a node is supplied with insufficient wealth, economic surplus through transactional gains are lost. Thus, each node must analyze its expected circumstances to retain or delegate the generator function, and to optimally allocate wealth between competing subordinates.

In any transaction, there will be a component which represents the competitive “cost”, and a possible redistribution among nodes within a hierarchal chain. This redistribution may be of accumulated wealth, or of the generation function portion. In the former case, if the communication path fails, no further transfers are possible, while in the later case, the result is persistent until the transfer function allocation is reversed. It is also possible to transfer an expiring or declining portion of the generating function; however, this might lead a node which is out of range to have no ability to rejoin the network upon return, and thus act as an impediment to efficient network operation. As discussed above, one possibility is for nodes to borrow or load currency. In this case, a node deemed credit-worthy may blunt the impact of initially having insufficient wealth by merely incurring a transaction cost (including interest, if applied).

In practice, the bulk of the wealth generating function will be widely distributed, and not concentrated at the top of the hierarchy. If this is true, under most circumstances, the network will appear to operate according to a non-hierarchal or fair VCG model, but in some circumstances, normal operation may be usurped by nodes which have apparent excess wealth resulting from a superior wealth generator function. Typically, hierarchically superior nodes will use their ability to transfer wealth to themselves, or to recruit subordinates to cooperate, in order to directly or indirectly control the network resources. It is possible, however, for nodes within one branch of a hierarchy to conspire against nodes outside that branch, resulting in a different type of distortion. Since the ad hoc network typically gains by having a larger number of participating nodes, this type of behavior may naturally be discouraged. On the other hand, hierarchically superior nodes either retain, or more likely, can quickly recruit surrounding subordinates to allocate their wealth generating function and accumulated wealth to pass urgent or valuable messages.

Where expensive assets are employed, an actual transfer of wealth or the generator function to a single entity may be required. For example, a high level node might have access to a high power broadcast system, which interferes with other communications, or simply incurs a high cost to operate. Low level nodes might ordinarily be limited to cellular (i.e., short range, low power radio) wireless communications. In order for a low level node to control an expensive asset, the assent or cooperation of others may be required, for example by hierarchal superiors.

Since the network should be stable in the absence of command and control communications, a hierarchal superior should assure that subordinate nodes possess sufficient wealth and motivation to maintain ad hoc network operation. Insufficient wealth will tend to eliminate the advantage to nodal participation (and therefore encourage defection), unless payments from acting as intermediary are significant. Thus, a node with insufficient wealth generation function may potentially exhaust its resources, and be unavailable for ad hoc intermediary use, even for the benefit of the hierarchy. On the other hand, an initial allocation of too much wealth will encourage high spending and less active participation as an intermediary. While it is possible in a military system to formulate an “engineered” solution which forces participation and eliminates defection, this solution does not gain the benefit of economic optimization and may have limited application outside of mandatory hierarchies.

Game theory is a useful basis for analyzing ad hoc networks, and understanding the behavior of complex networks of independent nodes. By presuming a degree of choice and decision-making by nodes, we obtain an analysis that is robust with respect to such considerations. The principal issues impeding deployment are the inherent complexity of the system, as well as the overhead required to continuously optimize the system. Determination of a set of simplifying presumptions to reduce protocol overhead and reduce complexity may improve performance. Hierarchal considerations can be imposed to alter the optimization of the system, which would be expected to provide only a small perturbation to the efficient and optimal operation of the system according to a pure VCG protocol. A marketplace auction with competition between potential buyers and potential sellers, and with the economic surplus distributed between parties which must defer to active participants, provides incentive to all affected parties, and therefore may provide a better result than a simple transfer between supply and demand elements only.

The ad hoc network does not exist in a vacuum. There are various competing interests seeking to use the same bandwidth, and technological superiority alone does not assure dominance and commercial success. Game theory may also be used as a tool to analyze the entities which seek to deploy ad hoc networks, especially where they compete.

In a typical auction, each player is treated fairly; that is, the same rules apply to each player, and therefore a single economy describes the process. The fair auction therefore poses challenges for an inherently hierarchal set of users, such as a military organization, where rank is accompanied by privilege. The net result, however, is a decided apparent disadvantage to lower ranking agents, at least when viewed in light of constricted self-interest. The issues that arise are similar to the relating to “altruism”, although not identical, and thus the game theoretic analysis of altruistic behavior may be imported for consideration, as appropriate.

In a mobile ad hoc communications network, a real issue is user defection or non-compliance. For example, where a cost is imposed on a user for participating in the ad hoc network, e.g., battery power consumption in a mesh radio network, if the anticipated benefit does not exceed the cost, the user will simply turn off or disable the device until actually needed. The result of mass defection will, of course, be the instability and failure of the ad hoc network itself, leading to decreased utility, even for those who gain an unfair or undue advantage under the system. Thus, perceived fairness and net benefit is required for network success, assuming that defection and/or non-compliance are possible.

On the other hand, in military systems, the assertion of rank as a basis for priority is not itself necessarily arbitrary or capricious. Orders and communications from a central command are critical for the organization itself, and thus the lower ranking agents gain at least a peripheral, if not direct benefit as their own chain of command employs their resources. Therefore, the difficulty in analyzing the application of a fair game paradigm to a hierarchal organization is principally a result of conceptualizing and aligning the individual incentives with those of the organization as a whole and the relationship between branches. Thus, in contradistinction to typical self-organizing peer-to-peer networks, a hierarchal network is not seen as self-organizing, at least in terms of the hierarchy, which is extrinsic to the formation of the communications network under consideration.

As discussed below, the “distortions” of the network imposed by the external hierarchy can be analyzed and accounted for by, for example, the concepts of inheritance and delegation. Thus, each branch of a hierarchy tree may be considered an object, which receives a set of characteristics from its root, and from which each sub-branch inherits the characteristics and adds subcharacteristics of, for example, specialization. It is noted that the hierarchy need not follow non-ambiguous or perfect rules, and thus there is no particular limit imposed that the hierarchy necessarily follow these formalisms. Rather, by analyzing those aspects of the hierarchy which comply with these formalisms in accordance therewith, efficiency is facilitated.

In establishing an economic system, a preliminary question is whether the system is microeconomic or macroeconomic; that is, whether the economy is linked to a real economy or insulated from it. One disadvantage of a real economy with respect to a peer relationship is that external wealth can override internal dynamics, thus diminishing the advantages to be gained by optimization, and potentially creating a perception of unfairness for externally less wealthy agents, at least unless and until the system accomplishes a wealth redistribution. An artificial economy provides a solution for a peer network in which each node has an equal opportunity to gain control over the ad hoc network, independent of outside influences and constraints. On the other hand, by insulating the network from external wealth redistribution, real efficiency gains may be unavailable. Therefore, both types of economies, as well as hybrids, are available. Thus, as discussed in more detail below, a “fair” initial (or recurring) wealth distribution may be applied, which may be supplemented with, and/or provide an output of, external wealth. The rules or proportion of external influence may be predetermined, adaptive, or otherwise.

In accordance with the proposed artificial economy, each node has a generator function for generating economic units, which are then used in a transaction (e.g., an auction) with other nodes to create a market economy, that is, each node has a supply and demand function, and acts as a source or sink for a limited resource. In some cases, nodes may have only supply or demand functions, or a degree of asymmetry, but in this case, these are typically subject to an external economic consideration, and the artificial economy will be less effective in providing appropriate incentives. According to one implementation of this embodiment, the artificial economic units have a temporally and/or spatially declining value, so that wealth does not accumulate over long periods and/or cannot be transferred over large distances. The decline may be linear, exponential, or based on some other function. This creates a set of microeconomies insulated from each other. Where distant microeconomies must deal with each other, there is a discount. This architecture provides a number of advantages, for example, by decreasing the influence of more spatially and temporally distant effects, the scope of an optimization analysis may be relatively constrained, while reducing the amount of information which must be stored over time and/or carried over distance in order to permit an optimization. Likewise, since the economy is artificial, the discount need not be recouped within the scope of the system; that is, conservation of capital is not required. In the same manner, a somewhat different incentive structure may be provided; that is, economic units generated at one location and at one time may have a higher value at a different location and time; this may encourage reduced immediate use of the system resources, and relocation to higher valued locations. As discussed below, one embodiment of the invention permits trading of credits, and thus, for example, a user may establish a repeater site at an under-served location to gain credits for use elsewhere. Preferably, beyond a “near field” effect, the value does not continue to increase, since this may result in inflationary pressures, and undermine the utility of the system in optimally balancing immediate supply and demand at a particular location.

As can be seen, through modifications of the governing rules and formulae, the system can be incentivized to behave in certain ways, but care should be exercised since a too narrow analysis of the incentive might result in unintended long term or distant effects. To the extent that human behavior and subjective analysis is involved, care should also be exercised in applying a rationality assumption, since this is not always true. Rather, there may be applicable models for human irrational behavior that are better suited to an understanding of the network behavior in response to a perturbation.

The typical peer-to-peer ad hoc network may be extended to the hierarchal case by treating each branch (including sub-branches) within the chain of command as an economic unit with respect to the generator function. At any level of the hierarchy, the commander optionally retains a portion of the wealth generation capacity, and delegates the remainder to its subordinates. Therefore, the rank and hierarchal considerations are translated to an economic wealth (or wealth generation) distribution. One aspect of this system allows wealth transfer or redistribution, although in a real system, a time delay is imposed, and in the event of a temporally and/or spatially declining value, the transfer will impose a cost. Thus, an initial misallocation is undesired, and there will be an incentive to optimally distribute the wealth initially. Of course, if centralized control with low penalty is desired, it is possible to limit the penalty, if any, for wealth redistribution through appropriate rules, although the time for propagation through the network remains an issue, and blind nodes (i.e., those which do not have an efficient communication path, or have insufficient resources to utilize otherwise available paths through the hierarchy) may also lead to limitations on system performance.

In this system, there may be an economic competitive distortion, under which a node's subjective value of a resource is influenced by its then subjective wealth. If a node is supplied with wealth beyond its needs, the wealth is wasted, since it may decline in value and cannot be hoarded indefinitely. (In a network wealth model in which wealth could be hoarded indefinitely, small deviations from optimality and arbitrage opportunities may be exploited to create a perception of unfairness, thus, this is not preferred.) If a node is supplied with insufficient wealth, economic surplus through transactional gains are lost. Thus, each node must analyze its expected circumstances to retain or delegate the generator function, and to optimally allocate wealth between competing subordinates. Likewise, there may be a plurality of quasi-optimal states.

In any economic transaction, there is an amount that a seller requires to part with the resource, a price a buyer is willing to pay, and a surplus between them. Typically, in a two party transaction, the surplus is allocated to the party initiating the transaction, that is, the party initiating the transaction uses some discovery mechanism to find the minimum price acceptable by the buyer. In brokered or agent-mediated transactions, a portion of the surplus is allocated to a facilitator.

In accordance with one aspect of the present invention, compliance with the community rules, as well as an incentive to bid or ask a true private value is encouraged by distributing a portion of the transaction surplus to losing competitive bidders. While according to one proposal, this portion is allocated in accordance with their reported valuations, this creates a potential incentive for bidders who know they will not be winning bidders to overbid, and thereby gain an increased portion of the surplus. In order to reward honest reporting of private values, the reward function must penalize both overreporting and underreporting of private values. This circumstance occurs if, at each bid, there is a risk of winning commensurate with the bid, and thus the system is strategyproof. In order to achieve this circumstance, for example, a statistical noise or probability distribution may be added to the system, with an acceptance of a bid made a statistical process. This results in a “fuzzy” boundary on the bid value, although it may impose an inefficiency on the market since any deviation from the optimal market price represents a loss.

Another approach to minimizing strategic bidding is to impose a bid fee. That is, each bidder must offer a prepayment corresponding to a small portion of its bid, thereby disincentivizing bidding to lose. The winning bidder will then pay a second price plus the deposit bid. The sellers will receive their own lowest cost (or second cost) bid. Losing bidders will receive a payment in accordance with the value of their bid, less the bid deposit. In order to disincentivize strategic bidding, the average return to a bidder is less than the bid cost. In fact, a good target for the bidder deposit is the administrative cost of transacting the bidding negotiations. This, in turn, provides an incentive to keep the administrative overhead low, thus improving overall system performance, especially where the administrative communications compete with normal communications for bandwidth. In this circumstance, those bidding to win receive either the benefit of the transaction or a payment for deference, less the transactional fee. Those who are bidding strategically, in manner seeking to acquire the deference payment, must risk the transactional cost, and to gain substantially, must submit a relatively high bid. When the bids are “competitive”, there is a substantial risk that the bid will be a winning bid, and thus incur the full bid cost. Thus, there is a disincentive to bidding a high value, but without an intent to win. Of course, the bid deposit may be a flat fee, or subject to a mathematical or adaptive function, rather than directly related to administrative cost.

The aggregated bid deposits may, for example, be awarded to a class who are optimally incentivized by the nature of this payment. For example, it may be awarded to those selling bandwidth, in a manner generally inversely proportional to the value of their ask, or, for example, based on allocations during the combinatorial (VCG) auction. This payment would then incentivize sellers to offer services at a low price, improving network availability.

Of course, there may be other classes within the auction population who may be taxed or subsidized, using value derived from the auction process.

In a strategyless auction, automated bidding is quite feasible, since the optimal bid is the computed value. For auctions in which a bidder does not have an incentive to bid its true private value, and this must assume a strategic play, automated bidding becomes more of a challenge, but may also be automated.

In a strategy-less auction, a bidder cannot gain by bidding over or under its private value. If a bidder bids below its private value, it has a reduced chance of gaining the benefit of the transaction.

In an auction which is subject to strategic bidding, the strategy may be mitigated by imposing commensurate risks and costs to balance the perceived advantage toward zero.

In particular, the competitive bidders seeking to allocate a scarce resource for themselves receive compensation for deferring to the winning bidder in an amount commensurate with their reported value. Thus, sellers receive their minimum acceptable value, buyers pay their maximum valuation, the surplus is distributed to the community in a manner tending to promote the highest bids within the private value of the bidder. In a corresponding manner, the auction rules can be established to incentivized sellers to ask the minimum possible amount, above their reserve. For example, a portion of the surplus may be allocated to bidders in accordance with how close they come to the winning ask. Therefore, both incentives may be applied, for example with the surplus split in two, and half allocated to the bidder pool and half allocated to the seller pool. Clearly, other allocations or proportionations are possible.

The winning bidder and/or seller may be included within the rebate pool. This is particularly advantageous where for various reasons, the winning bidder is not selected. Thus, this process potentially decouples the bidding (auction) process and the resulting commercial transaction.

Because of transactional inefficiencies, human behavioral aspects, and a desire to avoid increased network overhead by “false” bidders seeking a share of the allocation pool without intending to win the auction, it may be useful to limit the allocation of the surplus pool to a subset of the bidders and/or sellers, for example the top three of one or both. This therefore encourages bidders and/or sellers to seek to be in the limited group splitting the pool, and thus incentivizes higher bids and lower asks. Of course, a party will have a much stronger incentive to avoid bidding outside its valuation bounds, so the risk of this type of inefficiency is small.

As discussed above, one embodiment of the invention provides a possible redistribution or wealth among nodes within a hierarchal chain. This redistribution may be of accumulated wealth, or of the generation function portion. Trading among hierarchally related parties is preferred, since the perceived cost is low, and the wealth can be repeatedly redistributed. In fact, it is because of the possibility of wealth oscillation and teaming that the declining wealth function is preferred, since this will tend to defeat closely related party control over the network for extended periods.

It is noted that, in a multihop mobile ad hoc network, if a communication path fails, no further transfers are possible, potentially resulting in stalled or corrupt system configuration. It is possible to transfer an expiring or declining portion of the generating function; however, this might lead a node which is out of range to have no ability to rejoin the network upon return, and thus act as an impediment to efficient network operation. Therefore, it is preferred that, in an artificial economy, each node has some intrinsic wealth generator function, so an extended period of inactivity, a node gains wealth likely sufficient to rejoin the network as a full participant.

In practice, in a typical military-type hierarchy, the bulk of the wealth generating function will be distributed to the lowest ranks with the highest numbers. Thus, under normal circumstances, the network will appear to operate according to a non-hierarchal (i.e., peer) model, with the distortion that not all nodes have a common generator function. On the other hand, hierarchically superior nodes either retain, or more likely, can quickly recruit surrounding subordinates to allocate their wealth generating function and accumulated wealth to pass urgent or valuable messages. Thus, if 85% of the wealth and network resources are distributed to the lowest-ranking members, then the maximum distortion due to hierarchal modifications is 15%.

One way that this allocation of wealth may be apparent is with respect to the use of expensive assets. Thus, a high level node might have access to a high power broadcast system or licensed spectrum, while low level nodes might ordinarily be limited to lower power transmission and/or unlicensed spectrum or cellular wireless communications. For a low level node to generate a broadcast using an expensive asset (or to allocate a massive amount of space bandwidth product), it must pass the request up through the chain of command, until sufficient wealth (i.e., authority) is available to implement the broadcast.

In fact, such communications and authorizations are quite consistent with the expectations within a hierarchal organization, and this construct is likely to be accepted within a military-type hierarchal organization.

Under normal circumstances, a superior would have an incentive to assure that each subordinate node possesses sufficient wealth to carry out its function and be incentivized to participate in the network. If a subordinate has insufficient initial wealth (or wealth generating function) allocation, it may still participate, but it must expend its internal resources to obtain wealth for participation toward its own benefit. This, in turn, leads to a potential exhaustion of resources, and the unavailability of the node for ad hoc intermediary use, even for the benefit of the hierarchy. An initial surplus allocation will lead to overbidding for resources, and thus inefficient resource allocation, potential waste of allocation, and a disincentive to act as an intermediary in the ad hoc network. While in a traditional military hierarchy, cooperation can be mandated, in systems where cooperation is perceived as contrary to the net personal interests of the actor, network stability may be poor, and defection in spite of mandate.

In a military system, it is thus possible to formulate an “engineered” solution which forces participation and eliminates defection; however, it is clear that such solutions forfeit the potential gains of optimality, and incentivizes circumvention and non-compliance. Further, because such a system is not “cost sensitive” (however the appropriate cost function might be expressed), it fails to respond to “market” forces.

Accordingly, a peer to peer mobile ad hoc network suitable for respecting hierarchal organization structures is provided. In this hierarchal system, the hierarchy is represented by an initial wealth or wealth generation function distribution, and the hierarchally higher nodes can reallocate wealth of nodes beneath themselves, exercising their higher authority. This wealth redistribution can be overt or covert, and if overt, the hierarchal orders can be imposed without nodal assent. In a covert redistribution, trust may be required to assure redistribution by a node to a grandchild node.

The wealth and its distribution can be implemented using modified micropayment techniques and other verifiable cryptographic techniques. This wealth can be applied to auctions and markets, to allocate resources. Various aspects of this system are discussed in more detail elsewhere in this specification.

In accordance with aspects of this embodiment, an example is provided. In this scenario, a vehicle traveling along a highway seeks traffic information 10-20 miles ahead on the road. The transceiver in the vehicle has a range of about 0.5 miles, meaning that, assuming maximum hop range, 20-40 hope would be necessary in each direction in order to fulfill a response to a request for information. If we further assume that the traffic density allows an average density of compatible transceivers of 1 per 0.05 miles2, then it would appear that for each hop, a number of intermediaries would be possible. We further assume that each vehicle has a pair of antennas (which may operate on different frequencies), forward and backward looking, so that forward And backward communications are non-interfering. It is noted that, in operation, it is not a single vehicle that seeks information responding to a request; rather, it is likely that 2-25% of vehicles will seek information within a short period, especially of the cost of fulfilling a request is relatively low. We also assume that there is no common trigger event, such as an accident, which would provoke essentially all vehicles to request the same information, a circumstances that could be addressed through a multicast or broadcast.

If the vehicle sought to arrange a communication over the entire 10-20 miles in advance of communicating, this would require a multifactorial optimization likely involving over 100 transceivers, and if even one of the 20-40 intermediates fails, the entire communication fails. The administrative overhead for this process may not outweigh its advantages.

On the other hand, if we instead presume that the vehicle only optimize a path over a limited range or number of hops, e.g., 1 mile or 5 hops, then the optimization is facilitated and the administrative overhead reduced. On the other hand, this requires that vehicles or nodes at the fringe arrange for completion of the communication. It is here that the statistical aspects of the network architecture may be exploited to achieve efficiencies. Thus, in observing or participating in the network activities over a period of time, a node can model the behavior of nearby nodes, and determine a degree of risk with respect to the model. That node may then undertake the risk associated with its assessment of its environment, and communicate an offer to act as agent for completion of the communication, without explicitly communicating the details of the communication. Therefore, the originating node optimizes a local region ad hoc network, and then adopts an estimate of the network state beyond the edge of the local region.

Economically, the vehicle seeking the information broadcasts a bid or value function of its valuation of the resources it requires. This bid is propagated to the local region or beyond, and compared with the bids or value functions of other vehicles or nodes. A winning vehicle or node then assumes control over the minimum temporal-spatial-frequency channel required. As stated above, at the edge of the local region, nodes may act as proxies or agents, and undertake the risk of the more distant communication, adding a risk premium to their ask. The node with the lowest ask is selected as the agent or proxy. It is noted that the role of communication intermediary and proxy or agent is discrete, and therefore need not be a single element, though certain efficiencies are gained if this is the case. The agent or proxy must also conduct an auction for the next stage of the communication, in a process which is repeated until the destination node is included within the local region.

The proxy or agent undertakes the risk of the cost of the downstream communications, as well as the risk of non-payment, and thus may well charge a substantial premium over its actual risk-free cost. Therefore, the efficiency gained through the use of the agent or proxy derives from the administrative efficiencies gained, as well as comprehension that the risks are inherent, and must generally be undertaken by some element of the network. The incrementally added risks may be small, but are transferred. A node which promotes itself for acting as agent or proxy may do so because it has lower risks, costs or otherwise unproductive assets. For example, a cellular telephone carrier may choose to participate in the network, using its fixed infrastructure as a backup, or bypass. In that case, if the network fails, or is less efficient, it has the option of using its own facilities.

The agent or proxy therefore arbitrages the risk, based on its own knowledge of its local region which is different from the local region of the originator of the communication. There may be less competition for the role of arbitrageur, allowing it to claim a larger portion of the economic surplus. In fact, an arbitrageur may pre-acquire resources at a defined price, and resell them later at a profit. Thus, it is seen that economic efficiencies and increased profits for intermediaries are not inconsistent, where opportunities for reduction in inefficiencies exist.

Adding hierarchal element to this example, it is noted that certain risks are reduced when transactions are conducted between related entities. For example, if their respective wealth is interlinked, over the long term, the risk of non-payment is abated. Likewise, the risk of defection or non-compliance is reduced. Further, since it is presumed that the benefit function of related nodes is intertwined, actual costs may be reduced, since the communication itself is a countervailing benefit to the cost of a related node conveying the message or packet. Thus, there will likely be a preference for communications between more closely related nodes than between more distantly related or unrelated nodes. On the other hand, since wealth (virtual or real) itself is desirable, and inter-party transactions limit wealth gain opportunities, there will also be an incentive to conduct transactions with unrelated nodes for full value. As discussed above, in a hierarchy, a top level node is initially allocated the entire wealth and/or wealth generation function for its subordinates, which is then redistributed as appropriate or desired. The top level node will generally not maintain more wealth than required, since this is inefficient, and redistributions incur their own inefficiencies.

The economy is preferably virtual, employing arbitrary value credits generated using a cryptographic function. One possible exception is where external elements, such as cellular telephone carriers, are integrated into the system. Since these are real economy agents, there must be some interchange in value between credits and cash, unless the cellular carrier gains a benefit from the ad hoc network. One such possible benefit is extension of its fixed infrastructure to serve under-covered areas. Another possible benefit is the ability to provide information from the ad hoc network to more remote areas. A further benefit is the ability to use unlicensed spectrum for its activities in a standard and non-interfering manner.

In the virtual economy, each node has a physically and/or logically secure cryptographic module, which sequentially generates values which have a unique index number, and may be verified as to node and time of origin, and possibly chain of owners. A node receiving this value can therefore verify that it is authentic, its time of creation (and therefore amortization schedule), and as an audit trail, the chain of ownership. Each bid is also cryptographically secure and signed, so that if a node places a bid, and later fails to pay, a later investigation can be conducted to correctly account for the transaction, and possibly penalize wrongdoing. The payments for a communication are communicated after the transaction, in a cryptographic wrapper (cryptolope) destined for a target node. Since these are secure, the opportunity for theft is low, and there is little incentive for intentional delay of transmission by any intermediate. Further, these packets may be transmitted along redundant paths, to limit the ability of any one node to disrupt communications.

The ability of a node to spend the same value packet twice is limited by a number of factors. First, since each node has a defined generator function, if its spending exceeds its generation capacity, this will be apparent to nearby nodes. Second, since each packet has an index value, the other nodes may compare these values to make sure that they are not used more than once by any node, before they are transferred to another node. Since the value of the credit declines in value over time, indefinite period monitoring is not required.

In some instances, saving value may be an efficient strategy. In order to take advantage of these gains, special bank nodes may be established which have the ability to hoard credits and then reissue new credits when required. Typically, there will be no interest, and in fact there may be discount and delay. The net result of promoting savings will typically be a reduction in demand with respect to supply, thus increasing availability of resources. By allowing withdrawal of savings, periods of inflation and high peak demand is possible. Further, if the withdrawn wealth has the same amortization schedule as newly generated credits, an event which provokes a “run on the bank” may result in a rapid diminution of saved wealth, unless the immediate recipients bank the newly transferred wealth.

As is seen, many of the economic institutions of the real economy have equivalents in the virtual economy, and therefore may be employed in their traditional and known roles to improve efficiency where the self-organizing features of the network alone incur corresponding inefficiencies, thus creating opportunities. Where necessary, links to a real economy, in order to pay for capital investment, efforts, or compensate for risks, may be employed, however it is preferred that these links be attenuated in order to isolate the bulk of the ad hoc network from the influence of real-economy node wealth, and therefore to promote defection of those nodes who are disadvantaged thereby.

Multihop Ad Hoc Networks require cooperation of nodes which are relatively disinterested in the content being conveyed. Typically, such disinterested intermediaries incur a cost for participation, for example, power consumption or opportunity cost. Economic incentives may be used to promote cooperation of disinterested intermediaries. An economic optimization may be achieved using a market price-finding process, such as an auction. In many scenarios, the desire for the fairness of an auction is tempered by other concerns, i.e., there are constraints on the optimization which influence price and parties of a transaction. For example, in military communication systems, rank may be deemed an important factor in access to, and control over, the communications medium. A simple process of rank-based preemption, without regard for subjective or objective importance, will result in an inefficient economic distortion. In order to normalize the application of rank, one is presented with two options: imposing a normalization scheme with respect to rank to create a unified economy, or considering rank using a set of rules outside of the economy. One way to normalize rank, and the implicit hierarchy underlying the rank, is by treating the economy as an object-oriented hierarchy, in which each individual inherits or is allocated a subset of the rights of a parent, with peers within the hierarchy operating in a purely economic manner. The extrinsic consideration of rank, outside of an economy, can be denominated “respect”, which corresponds to the societal treatment of the issue, rather than normalizing this factor within the economy, in order to avoid unintended secondary economic distortion. Each system has its merits and limitations. An economic optimization is one involving a transaction in which all benefits and detriments can be expressed in normalized terms, and therefore by balancing all factors, including supply and demand, at a price, an optimum is achieved. Auctions are well known means to achieve an economic optimization between distinct interests, to transfer a good or right in exchange for a market price. While there are different types of auctions, each having their limitations and attributes, as a class these are well accepted as a means for transfer of goods or rights at an optimum price. Where multiple goods or rights are required in a sufficient combination to achieve a requirement, a so-called Vickrey-Clarke-Groves (VCG) auction may be employed. In such an auction, each supplier asserts a desired price for his component. The various combinations which meet the requirement are then compared, and the lowest cost combination selected. In a combinatorial supply auction, a plurality of buyers each seeks a divisible commodity, and each bids its best price. The bidders with the combination of prices which are maximum are selected. In a commodity market, there are a plurality of buyers and sellers, so the auction is more complex. In a market economy, the redistribution of goods or services is typically transferred between those who value them least to those who value them most. The transaction price depends on the balance between supply and demand; with the surplus being allocated to the limiting factor.

There has thus been shown and described novel communications devices and systems and methods which fulfill all the objects and advantages sought therefore. Many changes, modifications, variations, combinations, subcombinations and other uses and applications of the subject invention will, however, become apparent to those skilled in the art after considering this specification and the accompanying drawings which disclose the preferred embodiments thereof. All such changes, modifications, variations and other uses and applications which do not depart from the spirit and scope of the invention are deemed to be covered by the invention, which is to be limited only by the claims which follow.

Hoffberg, Steven M.

Patent Priority Assignee Title
Patent Priority Assignee Title
10002389, Jun 28 2013 Gemini IP, LLC Systems, methods, and program products for an application programming interface generating a blended digital math-based assets index
10007893, Jun 30 2008 BLOG BAND, LLC Methods for online collaboration
10013246, Dec 03 2016 Dell Products, LP Distributed information handling systems and methods for automatic object code replacement and patching
10013286, Feb 24 2016 Prophetstor Data Services, Inc. Method for deploying storage system resources with learning of workloads applied thereto
10015017, Apr 09 2015 Qualcomm Incorporated Proof of work based user identification system
10015478, Jun 24 2010 Two dimensional to three dimensional moving image converter
10021132, Sep 30 2013 Juniper Networks, Inc. Limiting the efficacy of a denial of service attack by increasing client resource demands
10022613, May 02 2016 Smart device
10025797, Feb 23 2018 True Return Systems LLC Method and system for separating storage and process of a computerized ledger for improved function
10026118, Feb 22 2016 Bank of America Corporation System for allowing external validation of data in a process data network
10027649, Jun 02 2015 ALTR Solutions, Inc.; ALTR SOLUTIONS, INC Credential-free user login to remotely executed applications
10032212, Nov 04 2013 Audi AG; Volkswagen AG System and method for location based secure ordering and payment
10038695, Jun 02 2015 ALTR SOLUTIONS, INC Remotely deauthenticating a user from a web-based application using a centralized login server
10042782, Jun 02 2015 ALTR SOLUTIONS, INC Immutable datastore for low-latency reading and writing of large data sets
10043176, Dec 21 2012 SQWIN SA Online transaction system
10046228, May 02 2016 Smart device
10051060, Dec 04 2015 International Business Machines Corporation Sensor data segmentation and virtualization
10051069, Nov 26 2014 International Business Machines Corporation Action based trust modeling
10068228, Jun 28 2013 Gemini IP, LLC Systems and methods for storing digital math-based assets using a secure portal
10075298, Jun 02 2015 ALTR SOLUTIONS, INC Generation of hash values within a blockchain
10078822, Oct 25 1999 Smartflash, LLC Data storage and access systems
10083422, Feb 19 2010 Elance, Inc. Authenticated session work tracking and job status reporting apparatus
10084607, Feb 04 2016 Nasdaq Technology AB Systems and methods for storing and sharing transactional data using distributed computing systems
10084642, Jun 02 2015 ALTR SOLUTIONS, INC Automated sensing of network conditions for dynamically provisioning efficient VPN tunnels
10084794, Jun 02 2015 ALTR SOLUTIONS, INC Centralized access management of web-based or native applications
10086949, Feb 27 2017 Honeywell International Inc. Systems and methods for selective annunciation
10089489, Jun 02 2015 ALTR SOLUTIONS, INC Transparent client application to arbitrate data storage between mutable and immutable data repositories
10091276, Sep 27 2013 TRANSVOYANT INC Computer-implemented systems and methods of analyzing data in an ad-hoc network for predictive decision-making
10092843, Jun 24 2010 Steven M., Hoffberg Interactive system and method
10095878, Jun 02 2015 ALTR SOLUTIONS, INC Internal controls engine and reporting of events generated by a network or associated applications
10097344, Jul 15 2016 MasterCard International Incorporated Method and system for partitioned blockchains and enhanced privacy for permissioned blockchains
10097356, Jul 02 2015 NASDAQ, INC Systems and methods of secure provenance for distributed transaction databases
10102265, Apr 12 2017 MADISETTI, VIJAY K Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing
10102501, Feb 19 2010 Elance, Inc. System for status reporting and invoicing of work tracked from a work tracker
10103885, Jan 20 2016 MasterCard International Incorporated Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
10110576, May 23 2016 GSC Secrypt, LLC Distributed key secret for rewritable blockchain
10114970, Jun 02 2015 ALTR SOLUTIONS, INC Immutable logging of access requests to distributed file systems
10116693, Jun 28 2016 RSA Security LLC Server using proof-of-work technique for hardening against denial of service attacks
10118696, Mar 31 2016 Steerable rotating projectile
10121015, Feb 21 2014 LENS VENTURES, LLC Management of data privacy and security in a pervasive computing environment
10121019, Jun 02 2015 ALTR SOLUTIONS, INC Storing differentials of files in a distributed blockchain
10122661, Jun 10 2016 Salesforce.com, Inc. Messaging systems and methods that employ a blockchain to ensure integrity of message delivery
10127816, Jan 27 1998 Blanding Hovenweep, LLC Detection and alert of automobile braking event
10129032, Feb 16 2016 Xerox Corporation Secure revisioning auditing system for electronic document files
10129097, Jun 02 2015 ALTR SOLUTIONS, INC GUI and high-level API wrapper for software defined networking and software defined access for controlling network routing and rules
10129292, Sep 09 2004 International Business Machines Corporation Front-end protocol for server protection
10135616, May 07 2016 Revocation of cryptographic keys in the absence of a trusted central authority
10135859, May 03 2016 Cisco Technology, Inc. Automated security enclave generation
10135921, Sep 20 2016 System and method for announcing cryptographic keys on a blockchain
10142312, Feb 22 2016 Bank of America Corporation System for establishing secure access for users in a process data network
10142491, Jul 05 2017 KYNDRYL, INC Support system for cellular based resource sharing service
10142937, Mar 28 2016 Dell Products L.P. Information handling system mesh network power management
10147076, Oct 01 2002 Digital currency (virtual payment cards) issued by central bank for mobile and wearable devices
10156185, Nov 24 2014 Nirvana Energy Systems, Inc.; NIRVANA ENERGY SYSTEMS, INC Secure control system for multistage thermo acoustic micro-CHP generator
10156953, Dec 27 2006 Malikie Innovations Limited Method for presenting data on a small screen
10158527, Oct 28 2016 International Business Machines Corporation Changing an existing blockchain trust configuration
10158611, Nov 17 2016 Bank of America Corporation System for multiplexing and demultiplexing blockchain ledgers via a cryptographic hash
10160251, Apr 04 2016 UNITED SERVICES AUTOMOBILE ASSOCIATION USAA Digitally encoded seal for document verification
10163137, Feb 05 2003 HOFFBERG FAMILY TRUST 2 System and method for incentivizing participation in a market transaction
10164952, Feb 16 2016 Xerox Corporation Method and system for server based secure auditing for revisioning of electronic document files
10164983, Jan 20 2017 Verizon Patent and Licensing Inc. Distributed authentication for internet-of-things resources
10168705, Apr 06 2017 UATC, LLC Automatic tuning of autonomous vehicle cost functions based on human driving data
10169614, Nov 17 2016 International Business Machines Corporation Container update system
10171248, Dec 21 2015 MasterCard International Incorporated Method and system blockchain variant using digital signatures
10176308, Apr 28 2017 Accenture Global Solutions Limited Entitlement management system
10182065, Jun 29 2016 Rockwell Collins, Inc.; Rockwell Collins, Inc Distributed vetronics intrustion detection system and device
10185550, Sep 28 2016 JPMORGAN CHASE BANK, N A , AS ADMINISTRATIVE AGENT Device-driven auto-recovery using multiple recovery sources
10186115, Mar 13 2013 Game Play Network, Inc. System and method of revealing real world wager outcomes based on user interactions with interactive media
10187214, Jan 23 2015 Method and apparatus for the limitation of the mining of blocks on a block chain
10191462, Jun 06 2017 MAPLEBEAR INC Vehicle electronic receptionist for communications management
10192073, Nov 19 2016 ROCK INNOVATION LLC System and method for interaction object reconciliation in a blockchain environment
10192198, Nov 05 2014 HURU SYSTEM INC ; HURU SYSTEMS INC Tracking code generation, application, and verification using blockchain technology
10193696, Jun 02 2015 ALTR SOLUTIONS, INC Using a tree structure to segment and distribute records across one or more decentralized, acylic graphs of cryptographic hash pointers
10195513, May 12 2017 Smart device
10198325, May 24 2016 MasterCard International Incorporated Method and system for desynchronization recovery for permissioned blockchains using bloom filters
10198908, Sep 30 2002 Method and apparatus for integrated customer tracking and browsing
10198949, Apr 28 2017 MasterCard International Incorporated Method and system for parking verification via blockchain
10200261, Apr 30 2015 Microsoft Technology Licensing, LLC Multiple-computing-node system job node selection
10204148, Jan 23 2017 MADISETTI, VIJAY K Method and system for tuning blockchain scalability, decentralization, and security for fast and low-cost payment and transaction processing
10204341, May 24 2016 MasterCard International Incorporated Method and system for an efficient consensus mechanism for permissioned blockchains using bloom filters and audit guarantees
10205997, Jan 03 2017 SYNAMEDIA LIMITED Method and device for identifying and verifying the illegitimate use of residential set-top boxes
10210079, Apr 09 2015 11:11 SYSTEMS, INC Touch free disaster recovery
10217241, Jun 15 2016 Xerox Corporation System and method for compressing graphs via cliques
10227739, Dec 19 2014 BOMAG GmbH Method for determining a mass of milled material and ground milling machine for carrying out said method
10229434, Mar 22 2014 RETAILMENOT, INC Caching geolocated offers
10235516, May 10 2016 Cisco Technology, Inc. Method for authenticating a networked endpoint using a physical (power) challenge
10235621, May 07 2013 IOTELLIGENT TECHNOLOGY LTD INC Architecture for implementing an improved neural network
10237349, May 11 2015 Providence IP, LLC Method and system for the organization and maintenance of social media information
10237420, Mar 07 2003 PATENT ARMORY INC Method and system for matching entities in an auction
10242219, Jun 02 2015 ALTR SOLUTIONS, INC Fragmenting data for the purposes of persistent storage across multiple immutable data structures
10245875, Apr 04 2016 UNITED SERVICES AUTOMOBILE ASSOCIATION USAA Digitally encoded seal for document verification
2006004,
3014605,
3573747,
3581072,
4048452, May 28 1976 Bell Telephone Laboratories, Incorporated Automatic call distribution system
4200770, Sep 06 1977 Stanford University Cryptographic apparatus and method
4218582, Oct 06 1977 The Board of Trustees of the Leland Stanford Junior University Public key cryptographic apparatus and method
4264782, Jun 29 1979 International Business Machines Corporation Method and apparatus for transaction and identity verification
4286118, Jul 02 1979 BCS TECHNOLOGIES, INC , A DELAWARE CORPORATION Data distribution system for private automatic branch exchange
4291749, Dec 27 1978 Nippondenso Co., Ltd. Method and apparatus for controlling compartment temperature of a vehicle
4306111, May 31 1979 Comsat Corporation Simple and effective public-key cryptosystem
4309569, Sep 05 1979 The Board of Trustees of the Leland Stanford Junior University Method of providing digital signatures
4314232, Oct 24 1979 Nissan Motor Company, Limited Voice warning system for an automotive vehicle
4326098, Jul 02 1980 International Business Machines Corporation High security system for electronic signature verification
4337821, Nov 28 1978 Nippondenso Co., Ltd. Air conditioner system for automobiles
4351982, Dec 15 1980 RACAL GUARDATA, INC RSA Public-key data encryption system having large random prime number generating microprocessor or the like
4365110, Jun 05 1979 Comsat Corporation Multiple-destinational cryptosystem for broadcast networks
4386233, Sep 29 1980 COMMERCE, THE UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF Crytographic key notarization methods and apparatus
4393269, Jan 29 1981 International Business Machines Corporation Method and apparatus incorporating a one-way sequence for transaction and identity verification
4399323, Feb 09 1981 Bell Telephone Laboratories, Incorporated Fast real-time public key cryptography
4401848, Oct 04 1979 Nissan Motor Company, Limited Voice warning system for an automotive vehicle
4405829, Dec 14 1977 Massachusetts Institute of Technology Cryptographic communications system and method
4407564, Jan 22 1980 GEC-Marconi Limited Head-up displays
4419730, Feb 18 1980 Nippondenso Co., Ltd. Method and system for controlling the setting temperature of a vehicle air conditioner
4438824, Apr 22 1981 Siemens Corporation Apparatus and method for cryptographic identity verification
4441405, Mar 12 1981 Nissan Motor Company, Limited Solar radiation heat influx sensor for an automotive vehicle
4451887, Jun 13 1980 Aisin Seiki Kabushiki Kaisha System for controlling a door and driver's seat of vehicle
4453074, Oct 19 1981 American Express Company Protection system for intelligent cards
4458109, Feb 05 1982 Siemens Corporation Method and apparatus providing registered mail features in an electronic communication system
4471164, Oct 13 1981 AT&T Bell Laboratories Stream cipher operation using public key cryptosystem
4477874, Nov 25 1980 Nippondenso Co., Ltd. Card-operated control system for vehicle components
4486853, Apr 01 1981 Telemet American, Inc. Apparatus for receiving and displaying continuously updated data
4494114, Dec 05 1983 INTERNATIONAL ELECTRONIC TECHNOLOGY CORPORATION Security arrangement for and method of rendering microprocessor-controlled electronic equipment inoperative after occurrence of disabling event
4514592, Jul 27 1981 Nippon Telegraph & Telephone Corporation Cryptosystem
4528588, Sep 26 1980 Method and apparatus for marking the information content of an information carrying signal
4529870, Mar 10 1980 INFOSPACE, INC Cryptographic identification, financial transaction, and credential device
4536739, Jun 15 1981 SHARP KABUSHIKI KAISHA, A CORP Apparatus for communication of instructing information
4558176, Sep 20 1982 Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
4564018, Oct 28 1982 Storz Instrument Company Ultrasonic system for obtaining ocular measurements
4564108, Jun 14 1983 Molnlycke AB Package for sanitary napkins
4564840, Feb 16 1977 LMT RADIO PROFESSIONNELLE, 46 QUAI ALPHONSE LE GALLO, 92103 BOULOGNE-BILLANCOURT, FRANCE, A CORP OF FRANCE Radionavigation system having means for concealing distance and/or bearing information conveyed thereby
4567600, Feb 02 1982 OMNET ASSOCIATES A CA PARTNERSHIP Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission
4575621, Mar 07 1984 CORPRA, A CORP OF PA Portable electronic transaction device and system therefor
4578531, Jun 09 1982 AT&T Bell Laboratories Encryption system key distribution method and apparatus
4582389, Feb 18 1982 Flight Dynamics Holographic device
4590470, Jul 11 1983 AT&T Bell Laboratories User authentication system employing encryption functions
4595950, Sep 26 1980 Method and apparatus for marking the information content of an information carrying signal
4625076, Mar 19 1984 Nippon Telegraph & Telephone Corporation Signed document transmission system
4633036, May 31 1984 HELLMAN, MARTIN E Method and apparatus for use in public-key data encryption system
4636782, Mar 25 1983 Nippondenso Co., Ltd. Display arrangement for a vehicle
4653003, Apr 15 1983 Renk Aktiengesellschaft Electronic control system for a motive unit
4672572, May 21 1984 Gould Inc. Protector system for computer access and use
4677663, Jul 05 1985 CIM, LTD Telephone answering and call forwarding improvement
4704610, Dec 16 1985 E-LITE LIMITED, A CA LIMITED PARTNERSHIP Emergency vehicle warning and traffic control system
4706086, May 06 1985 Fiat Auto S.p.A. System for communication and automatic signalling between a plurality of motor vehicles
4707788, Jul 10 1984 Nippon Soken, Inc; Nippondenso Co., Ltd. Automatic adjuster for automobile driver equipment
4731769, Apr 20 1985 Robert Bosch GmbH Central servicing and information controller for vehicle auxiliary equipment
4731841, Jun 16 1986 FOUNDATION FOR SMALL BUSINESS EDUCATION, THE AN OH NON-PROFIT CORPORATION Field initialized authentication system for protective security of electronic information networks
4734564, May 02 1985 Visa International Service Association Transaction system with off-line risk assessment
4736203, Jul 17 1985 Hoechst Marion Roussel 3D hand profile identification apparatus
4737983, Oct 02 1985 American Telephone and Telegraph Company Communications, Inc.; AT&T COMMUNICATIONS, INC , 295 NORTH MAPLE AVENUE, BASKING RIDGE, NEW JERSEY, 07920, A CORP OF NEW YORK Automatic call distributor telephone service
4740779, Apr 16 1986 The Boeing Company Aircraft panoramic display
4740780, Jun 24 1985 GEC AVIONICS, INC , A CORP OF NY Head-up display for automobile
4752676, Dec 12 1985 Common Bond Associates Reliable secure, updatable "cash" card system
4752824, Mar 20 1986 GEC-Marconi Limited Parallax correction apparatus for a head-up display
4757529, Feb 28 1986 Avaya Technology Corp Call distribution arrangement
4768221, Oct 20 1986 Planum Technology Corp. Remote reprogramming system for telephone call forwarding service
4787039, May 31 1985 Yazaki Corporation Display device for motor vehicle and information display method in the device
4789928, Feb 17 1986 AUCNET INC Auction information transmission processing
4789929, May 14 1987 Hitachi Medical Corporation CT system for spirally scanning subject on a movable bed synchronized to X-ray tube revolution
4795223, Jan 06 1987 Delphi Technologies, Inc Segmented 3-D hologram display
4797911, Jun 16 1987 ASPECT SOFTWARE, INC Customer account online servicing system
4799156, Oct 01 1986 Strategic Processing Corporation Interactive market management system
4807279, Jan 07 1987 COMMAND COMMUNCIATIONS, INC Remotely programmable call forwarding control device
4809180, Apr 22 1986 IKEDA BUSSAN CO , LTD , 771, KOZONO, AYASE-SHI, KANAGAWA-KEN, JAPAN A CORP OF JAPAN Seat control apparatus for vehicle
4812628, May 02 1985 Visa International Service Association Transaction system with off-line risk assessment
4818048, Jan 06 1987 Delphi Technologies Inc Holographic head-up control panel
4819267, Feb 22 1984 VASCO CORPORATION, 1919 S HIGHLAND, SUITE 118-C, LOMBARD, ILLINOIS 60148, A UTAH CORP Solid state key for controlling access to computer systems and to computer software and/or for secure communications
4823264, May 27 1986 Electronic funds transfer system
4827508, Oct 14 1985 ELECTRONIC PUBLISHING RESOURCES, INC Database usage metering and protection system and method
4827518, Aug 06 1987 Telcordia Technologies, Inc Speaker verification system using integrated circuit cards
4827520, Jan 16 1987 Prince Corporation; PRINCE CORPORATION, A CORP OF MICHIGAN Voice actuated control system for use in a vehicle
4837551, Feb 03 1988 Yazaki Corporation Display apparatus for automotive vehicle
4852149, Jun 29 1988 Dialogic Corporation Automated call filter
4853687, Dec 24 1986 Ikeda Bussan Co., Ltd. Programmable adjusting seat control apparatus
4860216, Nov 13 1986 The United States of America as represented by the Secretary of the Air Communication adaptive multi-sensor system
4866754, Dec 30 1987 Hashimoto Corporation Automatic telephone answering machine utilizing voice synthesis
4868376, May 15 1987 SAFENET, INC Intelligent portable interactive personal data system
4876594, Mar 12 1985 AUTOVISION ASSOCIATES, 525 WOODWARD AVE , STE 100, BLOOMFIELD HILLS, MI 48013 A CORP OF MI Apparatus for promoting the vigilance of a motor vehicle operator
4878243, Jul 25 1986 Hashimoto Corporation Call forwarding system and method
4881178, May 07 1987 REGENTS OF THE UNIVERSITY OF MICHIGAN, THE Method of controlling a classifier system
4887818, Jan 11 1988 Airline ownership and travel game
4890323, May 22 1986 ZAXUS LIMITED Data communication systems and methods
4893301, Jun 27 1988 e-talk Corporation Automatic call distribution (ACD) switching system having distributed processing capability
4894857, Jun 16 1987 ASPECT SOFTWARE, INC Method and apparatus for customer account servicing
4896363, May 28 1987 VASCO CORPORATION, 1919 S HIGHLAND, SUITE 118-C, LOMBARD, ILLINOIS 60148, A UTAH CORP Apparatus and method for matching image characteristics such as fingerprint minutiae
4903201, Nov 03 1983 ESPEED, INC Automated futures trading exchange
4914705, Sep 03 1986 Hitachi, Ltd. Voice message announcing method and system for plant
4918728, Aug 30 1989 International Business Machines Corporation Data cryptography operations using control vectors
4924501, Nov 25 1985 ZIAYLEK, THEODORE JR ; ZIAYLEK, MICHAEL PAUL Dial pulse selection
4926325, Aug 23 1988 Moneyfax, Inc. Apparatus for carrying out financial transactions via a facsimile machine
4926480, Aug 22 1983 VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY Card-computer moderated systems
4930073, Jun 26 1987 International Business Machines Corporation Method to prevent use of incorrect program version in a computer system
4930150, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Telephonic interface control system
4933964, Jul 25 1989 SER SOLUTIONS, INC A VIRGINIA CORPORATION Pacing of telephone calls for call origination management systems
4935956, May 02 1988 T-NETIX, INC ; SECURUS TECHNOLOGIES, INC; TELEQUIP LABS, INC ; T-NETIX TELECOMMUNICATIONS SERVICES, INC ; EVERCOM HOLDINGS, INC ; EVERCOM, INC ; EVERCOM SYSTEMS, INC ; SYSCON JUSTICE SYSTEMS, INC ; MODELING SOLUTIONS LLC Automated public phone control for charge and collect billing
4941168, Sep 21 1988 U.S. Telecom International Inc. System for the recognition of automated telephone answering devices and delivery of prerecorded messages to such devices
4941173, Nov 13 1987 Device and method to render secure the transfer of data between a videotex terminal and a server
4952928, Aug 29 1988 B I INCORPORATED Adaptable electronic monitoring and identification system
4953204, Oct 17 1989 BELL TELEPHONE LABORATORIES, INCORPORATED, A CORP OF NY ; AMERICAN TELEPHONE AND TELEGRAPH COMPANY, A CORP OF NY Multilocation queuing for telephone calls
4958371, Apr 19 1988 Control Data Corporation Method and apparatus for determining when a telephone handset is off-hook
4961142, Jun 29 1988 MasterCard International, Inc. Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer
4967178, Mar 18 1985 Niles Parts Co., Ltd. Apparatus for controlling a seat for vehicles
4972476, May 11 1989 Counterfeit proof ID card having a scrambled facial image
4975841, Mar 03 1989 AMCOL INTERNATIONAL CORPORATION, A DELAWARE CORPORATION Method and apparatus for reporting customer data
4977595, Mar 28 1990 Nippon Telegraph and Telephone Corporation Method and apparatus for implementing electronic cash
4979171, May 03 1989 FIRSTPOINT CONTACT TECHNOLOGIES, LLC Announcement and tone code generator for telephonic network and method
4987587, Jul 26 1989 International Business Machines Corporation Method and apparatus for providing 800 number service
4988976, Sep 06 1989 HU, CHING-PIAO Head-up display with magnetic field speed detecting means
4993068, Nov 27 1989 Motorola, Inc. Unforgeable personal identification system
4995258, Apr 26 1990 General Motors Corporation Method for determining air mass in a crankcase scavenged two-stroke engine
4996959, Jul 13 1988 Fuji Jukogyo Kabushiki Kaisha Ignition timing control system for automotive engine
4998272, Jun 15 1989 Digital Voice Technologies, Inc. Personal voice mail system
5006829, Mar 31 1987 HONDA GIKEN KOGYO KABUSHIKI KAISHA, A CORP OF JAPAN Information display system for a vehicle
5006983, Sep 12 1989 ADDAX, INC , A DE CORP Service allocation system
5007000, Jun 28 1989 SER SOLUTIONS, INC A VIRGINIA CORPORATION Classification of audio signals on a telephone line
5007078, Apr 28 1989 American Communications & Engineering, Inc. Automated order entry recording method and apparatus
5014298, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Voice-data telephonic control system
5016170, Sep 22 1988 Task management
5016270, Apr 03 1989 RONALD A KATZ TECHNOLOGY LICENSING, L P Expanded telephone data organization system
5020095, Nov 16 1988 Aspect Communications Corporation Interactive call distribution processor
5020097, Nov 18 1988 Anritsu Corporation Telephone with data setting by remote control
5020105, Jun 16 1986 FOUNDATION FOR SMALL BUSINESS EDUCATION, THE AN OH NON-PROFIT CORPORATION Field initialized authentication system for protective security of electronic information networks
5036461, May 16 1990 Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
5036535, Nov 27 1989 MPL APPLICATIONS L L C , A DELAWARE LIMITED LIABILITY COMPANY Switchless automatic call distribution system
5040208, Nov 03 1989 International Business Machines Corporation Coordinated voice and data display having temporary storage of transaction data
5043736, Jul 27 1990 INTRINSYC SOFTWARE INTERNATIONAL, INC Cellular position locating system
5046094, Feb 02 1989 Kabushiki Kaisha Toshiba Server-aided computation method and distributed information processing unit
5048075, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Telephonic-interface statistical analysis system
5051735, Sep 25 1987 HONDA GIKEN KOGYO KABUSHIKI KAISHA, 1-1 MINAMIAOYAMA 2-CHOME, MINATO-KU, TOKYO, JAPAN, A CORP OF JAPAN Heads-up display system for a road vehicle
5056141, Jun 18 1986 Method and apparatus for the identification of personnel
5056147, May 16 1989 PRODUCTS FROM IDEAS LTD Recognition procedure and an apparatus for carrying out the recognition procedure
5063522, Mar 15 1988 TELETECH HOLDINGS, INC Multi-user, artificial intelligent expert system
5065429, Apr 03 1989 LANRALD DATA MGMT NV, LLC Method and apparatus for protecting material on storage media
5067162, Jun 30 1986 BANK OF AMERICA,N A Method and apparatus for verifying identity using image correlation
5070323, Jun 17 1988 Yazaki Corporation Display for vehicle
5070453, Apr 10 1989 AT&T Bell Laboratories System and method for scheduling data transfers among a plurality of data processing units to avoid conflicting data requests
5070525, Feb 12 1990 ASPECT SOFTWARE, INC Method for avoiding call blocking
5070526, Aug 08 1990 Cisco Technology, Inc Signal analyzing system
5070931, Aug 31 1989 Valeo Klimasysteme GmbH Temperature control unit for a motor vehicle
5073890, Dec 30 1988 Bell Telephone Laboratories, Incorporated; American Telephone and Telegraph Company Remote agent operation for automatic call distributors
5073929, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Voice-data telephonic control system
5073950, Apr 13 1989 Personnel Identification & Entry Access Control, Inc. Finger profile identification system
5077665, May 25 1989 REUTERS TRANSACTIONS SERVICES LIMITED Distributed matching system
5077789, Dec 24 1987 Remotely commanded telephone switch enhancing system
5081711, Feb 24 1987 Computer peripheral device control and communication system
5097528, Feb 25 1991 Genesys Telecommunications Laboratories, Inc System for integrating telephony data with data processing systems
5103449, Nov 03 1989 Genesys Telecommunications Laboratories, Inc PBX transparent ANI and DNIS using VRU
5103476, Nov 07 1990 BETANET, LLC Secure system for activating personal computer software at remote locations
5111390, Aug 22 1988 Unisys Corporation Software security system for maintaining integrity of compiled object code by restricting users ability to define compilers
5119504, Jul 19 1990 CDC PROPRIETE INTELLECTUELLE Position aided subscriber unit for a satellite cellular system
5121422, Apr 24 1989 MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD Voice message storage device including at least two analog recording mediums
5128984, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Telephone interface call processing system with call selectivity
5131020, Dec 29 1989 SMARTROUTE SYSTEMS, INC Method of and system for providing continually updated traffic or other information to telephonically and other communications-linked customers
5131038, Nov 07 1990 Motorola, Inc Portable authentification system
5136501, May 26 1989 REUTERS TRANSACTION SERVICES LIMITED Anonymous matching system
5155680, Oct 24 1986 Signal Security Technologies Billing system for computing software
5161181, Jan 10 1990 Dialogic Corporation Automatic number identification blocking system
5163083, Oct 12 1990 AMERICAN TELEPHONE AND TELEGRAPH COMPANY, A CORP OF NY Automation of telephone operator assistance calls
5163087, Dec 31 1990 AT&T Bell Laboratories Delivery of customer data base key using automatic number identification
5163094, Mar 20 1991 INFRARED INDENTIFICATION, INC Method for identifying individuals from analysis of elemental shapes derived from biosensor data
5164904, Jul 26 1990 Farradyne Systems, Inc.; FARRADYNE SYSTEMS, INC In-vehicle traffic congestion information system
5164981, Jun 04 1990 Wilmington Trust, National Association, as Administrative Agent Voice response system with automated data transfer
5166974, Nov 16 1988 Aspect Communications Corporation Interactive call processor to facilitate completion of queued calls
5168517, Mar 13 1989 ADVANCED CELLULAR TELECOM CORP Apparatus and methods for selectively forwarding telephone calls
5182670, Aug 30 1991 APA ENTERPRISES, INC Narrow band algan filter
5185786, Nov 13 1990 Intel Corporation Automatic call center overflow retrieval system
5191611, Apr 03 1989 LANRALD DATA MGMT NV, LLC Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
5193110, Oct 09 1990 XURA, INC Integrated services platform for telephone communication system
5193855, Jan 25 1989 Patient and healthcare provider identification system
5198797, May 11 1990 Nissan Motor Co., Ltd. Heads-up display arrangement for vehicle
5203499, Oct 26 1989 HELLA KG HUECK & CO Process and apparatus for controlling an interior space temperature of a motor vehicle
5204670, Aug 29 1988 B I INCORPORATED Adaptable electric monitoring and identification system
5206903, Dec 26 1990 AVAYA Inc Automatic call distribution based on matching required skills with agents skills
5208858, Feb 05 1990 Siemens Aktiengesellschaft Method for allocating useful data to a specific originator
5214413, Jun 23 1987 Nissan Motor Company, Limited Head-up display apparatus for vehicular display
5214688, Jun 05 1990 ASPECT SOFTWARE, INC Method and apparatus for dynamic and interdependent processing of inbound calls and outbound calls
5214707, Aug 16 1990 Fujitsu Ten Limited Control system for controlling equipment provided inside a vehicle utilizing a speech recognition apparatus
5218635, Jun 19 1989 Alcatel Business Systems Low-frequency alternating current signal detector, in particular for central office line interface circuits
5224153, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Voice-data telephonic interface control system
5224162, Jun 14 1991 Nippon Telegraph and Telephone Corporation Electronic cash system
5224163, Sep 28 1990 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Method for delegating authorization from one entity to another through the use of session encryption keys
5224173, Oct 29 1991 Avant Incorporated Method of reducing fraud in connection with employment, public license applications, social security, food stamps, welfare or other government benefits
5228094, Dec 28 1990 FRANCE TELECOM ETABLISSEMENT AUTONOME DE DROIT PUBLIC CENTRE NATIONAL D ETUDES DES TELECOMMUNICATIONS Process of identifying and authenticating data characterizing an individual
5229764, Jun 20 1991 Continuous biometric authentication matrix
5235166, Feb 14 1991 XTec, Incorporated Data verification method and magnetic media therefor
5235633, Dec 26 1991 EMSAT ADVANCED GEO-LOCATION TECHNOLOGY, LLC Cellular telephone system that uses position of a mobile unit to make call management decisions
5235680, Jul 31 1987 VISTA DMS, INC Apparatus and method for communicating textual and image information between a host computer and a remote display terminal
5237159, Jul 17 1991 Carreker Corporation Electronic check presentment system
5239574, Dec 11 1990 AVAYA Inc Methods and apparatus for detecting voice information in telephone-type signals
5241599, Oct 02 1991 American Telephone and Telegraph Company Cryptographic protocol for secure communications
5245329, Feb 27 1989 SECURITY PEOPLE INC Access control system with mechanical keys which store data
5247569, Jan 13 1992 INTERVOICE LIMITED PARTNERSHIP A NEVADA LIMITED PARTNERSHIP, COMPOSED OF, AS ITS SOLE GENERAL PARTNER, INTERVOICE GP, INC System and method for controlling outbound and inbound calls in a telephone communication system
5251252, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Telephone interface call processing system with call selectivity
5253165, Dec 18 1989 Computerized reservations and scheduling system
5253289, Jul 04 1990 Murata Kikai Kabushiki Kaisha Terminal connection device
5254843, Aug 07 1991 Securing magnetically encoded data using timing variations in encoded data
5255349, Jan 26 1990 The United States of America as represented by the Administrator of the Electronic neural network for solving "traveling salesman" and similar global optimization problems
5257190, Aug 12 1991 CONDATIS LLC Interactive dynamic realtime management system for powered vehicles
5265221, Mar 20 1989 Tandem Computers Access restriction facility method and apparatus
5270921, Dec 19 1990 Accenture Global Services Limited Virtual fare methods for a computerized airline seat inventory control system
5272754, Mar 28 1991 Secure Computing Corporation Secure computer interface
5274560, Dec 03 1990 PRONOUNCED TECHNOLOGIES LLC Sensor free vehicle navigation system utilizing a voice input/output interface for routing a driver from his source point to his destination point
5274700, Nov 27 1989 MPL APPLICATIONS, L L C Methods of automatically rerouting an incoming telephone call placed over a network
5275400, Jun 11 1992 EVERI PAYMENTS INC ; EVERI HOLDINGS INC ; EVERI GAMES HOLDING INC ; GCA MTL, LLC; CENTRAL CREDIT, LLC; EVERI INTERACTIVE LLC; EVERI GAMES INC Pari-mutuel electronic gaming
5276732, Aug 22 1991 Wilmington Trust, National Association, as Administrative Agent Remote workstation use with database retrieval system
5276737, Apr 20 1992 CERTCO, INC ; MICALI, SILVIO Fair cryptosystems and methods of use
5278532, Sep 14 1987 Delphi Technologies Inc Automotive instrument virtual image display
5278898, May 30 1991 Wilmington Trust, National Association, as Administrative Agent System for managing a hold queue
5280527, Apr 14 1992 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
5283431, Feb 04 1992 Optical key security access system
5283731, Jan 19 1992 EC Corporation Computer-based classified ad system and method
5283818, Mar 31 1992 IPVX PATENT HOLDINGS, INC Telephone answering device linking displayed data with recorded audio message
5289530, Jul 23 1991 Method and apparatus for vocally communicating to a caller at a remote telephone station synthesized speech of stored special service information
5291550, Dec 26 1990 AT&T Bell Laboratories Dynamic network call distributor
5291560, Jul 15 1991 IRISCAN INCORPORATED Biometric personal identification system based on iris analysis
5293115, Aug 06 1991 Itron, Inc Method and system for sensing removal of a utility meter from its socket
5297146, Jul 01 1988 Kabushiki Kaisha Toshiba Communication terminal apparatus and its control method
5297195, Oct 02 1991 TELEDIRECT INTERNATIONAL, INC Method and apparatus for automatic telephone scheduling system
5299132, Jan 17 1991 IRON OAKS TECHNOLOGIES, LLC Vehicle locating and communicating method and apparatus using cellular telephone network
5299263, Mar 04 1993 TTI Inventions C LLC Two-way public key authentication and key agreement for low-cost terminals
5302955, Oct 19 1992 Grumman Aerospace Corporation Apparatus for combining data produced from multiple radars illuminating a common target area
5309504, Nov 18 1991 Wilmington Trust, National Association, as Administrative Agent Automated identification of attendant positions in a telecommunication system
5309505, May 20 1991 Wilmington Trust, National Association, as Administrative Agent Automated voice system for improving agent efficiency and improving service to parties on hold
5309513, Jul 02 1992 Wilmington Trust, National Association, as Administrative Agent Telephone system with ubiquitous agents
5311574, Oct 23 1991 AT&T Bell Laboratories Automatic customer call back for automatic call distribution systems
5311577, Mar 06 1992 Genesys Telecommunications Laboratories, Inc Data processing system, method and program for constructing host access tables for integration of telephony data with data processing systems
5313516, May 31 1990 TRONTECH LICENSING INCORPORATED Telephone answering device with automatic function
5315658, Apr 20 1992 MICALI, SILVIO; CERTCO, INC Fair cryptosystems and methods of use
5319543, Jun 19 1992 MCKESSON TECHNOLOGIES INC Workflow server for medical records imaging and tracking system
5319703, May 26 1992 VMX, INC Apparatus and method for identifying speech and call-progression signals
5319705, Oct 21 1992 IBM Corporation Method and system for multimedia access control enablement
5321745, May 26 1992 VMX, INC Adaptive efficient single/dual tone decoder apparatus and method for identifying call-progression signals
5325292, Oct 12 1990 IEX Corporation Tour/schedule generation for a force management system
5325294, Jun 29 1992 Medical privacy system
5327490, Feb 19 1991 INTERVOICE LIMITED PARTNERSHIP A NEVADA LIMITED PARTNERSHIP, COMPOSED OF, AS ITS SOLE GENERAL PARTNER, INTERVOICE GP, INC System and method for controlling call placement rate for telephone communication systems
5329579, Jul 27 1992 AVAYA Inc Modular adjunct processor made of identical multi-function modules adaptable under direction of one of them to perform any of the adjunct-processor functions
5333190, Jan 15 1992 Telephone ring detection method and apparatus
5334974, Feb 06 1992 SIMMS SECURITY CORPORATION Personal security system
5335276, Dec 16 1992 Texas Instruments Incorporated Communication system and methods for enhanced information transfer
5335288, Feb 10 1992 FAULKNER, KEITH W ; GROETZINGER, ROBERT S ; BERGSTEDT, LOWELL C Apparatus and method for biometric identification
5335743, Oct 19 1990 Saab Automobile Aktiebolag Operation of servo devices for driving a motor vehicle - control, arrangement and method
5341412, Oct 10 1991 Wilmington Trust FSB Apparatus and a method for predictive call dialing
5341414, Feb 05 1992 Calling number verification service
5341428, Jan 30 1992 GBS SYSTEMS CORPORATION A CORP OF ILLINOIS Multiple cross-check document verification system
5341429, Dec 04 1992 BUYLINE, INC Transformation of ephemeral material
5341477, Feb 24 1989 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Broker for computer network server selection
5343527, Oct 27 1993 Lockheed Martin Corporation Hybrid encryption method and system for protecting reusable software components
5345549, Oct 30 1992 International Business Machines Corporation Multimedia based security systems
5345817, Feb 22 1993 GM Global Technology Operations LLC Misfire detection in internal combustion engines
5347452, Jul 12 1991 Method for providing a visual display of current trading volume and cumulative average trading volume for preselected time intervals
5347578, Mar 17 1992 International Computers Limited Computer system security
5347580, Apr 23 1992 International Business Machines Corporation Authentication method and system with a smartcard
5351041, Oct 25 1990 Pioneer Electronic Corporation Method of data communication in communication network on automobile
5351285, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Multiple format telephonic interface control system
5359645, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Voice-data telephonic interface control system
5361165, Jan 03 1992 General Motors Corporation Reflective cluster display with stowable viewing screen
5361202, Jun 18 1993 Koninklijke Philips Electronics N V Computer display system and method for facilitating access to patient data records in a medical information system
5363453, Nov 02 1989 TMS Inc. Non-minutiae automatic fingerprint identification system and methods
5365523, Nov 16 1992 LENOVO SINGAPORE PTE LTD Forming and maintaining access groups at the lan/wan interface
5365575, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Telephonic-interface lottery system
5369695, Jan 06 1992 American Telephone and Telegraph Company Method of redirecting a telephone call to an alternate destination
5371510, Nov 28 1990 Nippondenso Co., Ltd. Automotive information display apparatus
5377095, Jul 12 1991 Hitachi, Ltd. Merchandise analysis system with sales data table and various functions for predicting the sale by item
5381470, May 28 1991 Wilmington Trust, National Association, as Administrative Agent Supervisory management center with parameter testing and alerts
5390236, Mar 31 1992 IPVX PATENT HOLDINGS, INC Telephone answering device linking displayed data with recorded audio message
5390330, Feb 11 1993 SILICON GRAPHICS INTERNATIONAL, CORP Control system and method for direct execution of software application information models without code generation
5392353, Aug 07 1989 TV Answer, Inc. Interactive satellite broadcast network
5394324, Dec 08 1993 Xerox Corporation Auction-based control system for energy resource management in a building
5400045, Apr 01 1988 Yazaki Corporation Indication display unit for a vehicle
5400393, Jun 05 1992 TRONTECH LICENSING INCORPORATED Voice mail digital telephone answering device
5402474, Mar 05 1992 Genesys Telecommunications Laboratories, Inc System, data processing method and program to provide a programmable interface between a workstation and an archive server to automatically store telephone transaction information
5404443, Jul 25 1989 Nissan Motor Company, Limited Display control system with touch switch panel for controlling on-board display for vehicle
5412727, Jan 14 1994 ASSA ABLOY AB Anti-fraud voter registration and voting system using a data card
5414439, Jun 09 1994 Delphi Technologies, Inc Head up display with night vision enhancement
5414755, Aug 10 1994 Exelis Inc System and method for passive voice verification in a telephone network
5416318, Oct 30 1991 Combined headlamp and climate control sensor having a light diffuser and a light modulator
5420852, Sep 29 1988 AMERICAN TEL-A-SYSTEMS, INC Digital switching system connecting buses with incompatible protocols and telephone answering system and private automatic branch exchange with integrated voice and textual message recording
5420919, Jan 29 1992 SGS-THOMSON MICROELECTRONICS S A Telephone line current modulator
5422565, Aug 19 1991 Itron, Inc Method and system for sensing removal of a utility meter from its socket
5425093, Feb 23 1993 SIEMENS ENTERPRISE COMMUNICATIONS, INC System for integrating a stand alone inbound automatic call distributor and a outbound automatic call dialer
5428544, Nov 05 1990 Norm Pacific Automation Corporation Traffic information inter-vehicle transference and navigation system
5428683, Apr 09 1993 Washington University Method and apparatus for fingerprinting and authenticating magnetic media
5430279, Feb 14 1991 Rockwell International Corporation Data verification method and magnetic media therefor
5430792, May 03 1991 SIEMENS ENTERPRISE COMMUNICATIONS, INC Automated telephone calling system
5432835, Sep 30 1992 Hashimoto Corporation Telephone device for amplifying opposite party's voice after user's telephone is placed on-hook
5432864, Oct 05 1992 L-1 IDENTITY SOLUTIONS OPERATING COMPANY, INC Identification card verification system
5432904, Feb 19 1991 CCC INFORMATION SERVICES, INC Auto repair estimate, text and graphic system
5434906, Sep 13 1993 Cisco Technology, Inc Method and apparatus for processing an incoming call in a communication system
5436967, Feb 01 1994 AVAYA Inc Held party call-back arrangement
5440428, Sep 30 1993 Delphi Technologies Inc Automotive instrument 3-D virtual image display
5442342, Aug 29 1990 Hughes Electronics Corporation Distributed user authentication protocol
5442553, Nov 16 1992 Motorola Wireless motor vehicle diagnostic and software upgrade system
5442693, Dec 22 1993 AT&T Bell Laboratories Integrated operator console
5448045, Feb 26 1992 INTELLECTUAL VENTURES TRUSTED PLATFORM ASSETS, LLC System for protecting computers via intelligent tokens or smart cards
5448624, Aug 22 1990 Verizon Patent and Licensing Inc Telephone network performance monitoring method and system
5448631, Oct 13 1992 Qwest Communications International Inc Apparatus for handling features in a telephone network
5450321, Aug 12 1991 CONDATIS LLC Interactive dynamic realtime management system for powered vehicles
5450329, Dec 22 1993 Vehicle location method and system
5450613, Sep 09 1992 HITACHI CONSUMER ELECTRONICS CO , LTD Mobile communications equipment which detects and notifies when it is moved into or out of a service area
5453601, Nov 15 1991 CITIBANK, N A Electronic-monetary system
5455407, Nov 15 1991 Citibank, N.A. Electronic-monetary system
5457747, Jan 14 1994 ASSA ABLOY AB Anti-fraud verification system using a data card
5459761, Jun 29 1992 MOTOROLA SOLUTIONS, INC Intelligent repeater for trunked communications
5459781, Jan 12 1994 Dialogic Corporation Selectively activated dual tone multi-frequency detector
5465082, Jul 27 1990 Hill-Rom Services, Inc Apparatus for automating routine communication in a facility
5465286, May 24 1994 Wilmington Trust FSB Apparatus for supervising an automatic call distribution telephone system
5467391, Oct 21 1992 AVAYA Inc Integrated intelligent call blending
5469506, Jun 27 1994 Pitney Bowes Inc. Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic
5475399, May 21 1990 Portable hand held reading unit with reading aid feature
5475839, Mar 28 1990 National Semiconductor Corporation Method and structure for securing access to a computer system
5478993, Jan 18 1993 Ascom Autelca AG. Process as safety concept against unauthorized use of a payment instrument in cashless payment at payment sites
5479482, Aug 30 1993 AT&T IPM Corp Cellular terminal for providing public emergency call location information
5479487, Feb 11 1993 INTERVOICE LIMITED PARTNERSHIP A NEVADA LIMITED PARTNERSHIP, COMPOSED OF, AS ITS SOLE GENERAL PARTNER, INTERVOICE GP, INC Calling center employing unified control system
5479501, Jun 05 1991 SIEMENS ENTERPRISE COMMUNICATIONS, INC Far-end disconnect detector for telephony systems
5481596, May 26 1994 AT&T Corp. Auxiliary baseband telephone interface for an answering machine
5481613, Apr 15 1994 ENTRUST TECHNOLOGIES LTD Computer network cryptographic key distribution system
5483601, Feb 10 1992 BIOMET PARTNERS, INC Apparatus and method for biometric identification using silhouette and displacement images of a portion of a person's hand
5483632, Sep 03 1988 Hitachi, Ltd. Method and system of help-information control
5485161, Nov 21 1994 Trimble Navigation Limited Vehicle speed control based on GPS/MAP matching of posted speeds
5485312, Sep 14 1993 The United States of America as represented by the Secretary of the Air; UNITED STATES OF AMERICA, THE, AS REPRESENTED BY THE AIR FORCE; UNITED STATES OF AMERICA, THE, AS REPRESENTED BY THE DEPARTMENT OF AIR FORCE Optical pattern recognition system and method for verifying the authenticity of a person, product or thing
5485506, Jan 05 1994 Google Technology Holdings LLC Method for designating recorded messages
5485519, Jun 07 1991 EMC Corporation Enhanced security for a secure token code
5486840, Mar 21 1994 Delphi Technologies, Inc Head up display with incident light filter
5491800, Dec 20 1993 Apple Inc Object-oriented remote procedure call networking system
5493658, Mar 26 1992 International Business Machines Corporation Interactive online tutorial system with monitoring function for software products
5493690, Jun 28 1993 LENOVO INNOVATIONS LIMITED HONG KONG Foldable portable telephone set
5494097, Sep 27 1993 Daimler AG Method and device for regulating or controlling the temperature of an interior space, especially that of a motor vehicle
5495523, Jun 01 1994 Wilmington Trust, National Association, as Administrative Agent Method for low priority telephony system assisted dialing
5495528, Aug 25 1992 UNIFY GMBH & CO KG Digital telephone control interface system
5497271, Sep 07 1993 FORD GLOBAL TECHNOLOGIES, INC A MICHIGAN CORPORATION Head up displays for motor vehicles
5497339, Nov 15 1993 ETE, INC Portable apparatus for providing multiple integrated communication media
5497430, Nov 07 1994 SANWA BANK CALIFORNIA Method and apparatus for image recognition using invariant feature signals
5499293, Jan 24 1995 University of Maryland Privacy protected information medium using a data compression method
5500899, May 20 1982 The United States of America as represented by the Director, NSA Secure voice conferencing apparatus
5502762, Jun 10 1994 System and method for simultaneously controlling ringing at local and remote telephones
5504482, Jun 11 1993 CSR TECHNOLOGY INC Automobile navigation guidance, control and safety system
5504491, Apr 25 1994 WEISE, THEODORE L Global status and position reporting system
5504622, Mar 18 1993 Kansei Corporation Apparatus for head up display comprising a parabolic reflective mirror
5506595, Feb 18 1985 Nissan Motor Co., Ltd. Vehicular display system forming display image on front windshield
5506898, Jul 12 1994 AVAYA Inc Expected wait-time indication arrangement
5508912, Jan 23 1989 Barry, Schneiderman Clinical database of classified out-patients for tracking primary care outcome
5511112, May 20 1991 Wilmington Trust, National Association, as Administrative Agent Automated voice system for improving agent efficiency and improving service to parties on hold
5511117, Sep 26 1994 Wilmington Trust, National Association, as Administrative Agent Integrated voice and business transaction reporting for telephone call centers
5511121, Feb 23 1994 TTI Inventions C LLC Efficient electronic money
5511724, Nov 23 1994 Delphi Technologies Inc Adaptive climate control system
5515421, Mar 02 1992 RPX Corporation Automatic batch broadcast system
5517566, Jun 01 1994 Wilmington Trust, National Association, as Administrative Agent Method for allocating agent resources to multiple telephone call campaigns
5519403, Nov 29 1993 General Dynamics Decision Systems, Inc Global positioning system communications multi-interface
5519410, Mar 05 1993 Delphi Technologies, Inc Virtual image display management system with head-up display
5519773, Jun 07 1994 UNIFY GMBH & CO KG Call sharing for inbound and outbound call center agents
5519778, Aug 13 1993 MICALI, SILVIO Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications between the users
5521722, Jan 31 1990 De La Rue International Limited Image handling facilitating computer aided design and manufacture of documents
5523559, Aug 06 1991 Itron, Inc Method and system for sensing removal of a utility meter from its socket
5523739, May 31 1994 Metal detector for control of access combined in an integrated form with a transponder detector
5524140, Mar 31 1992 IPVX PATENT HOLDINGS, INC Telephone answering device linking displayed data with recorded audio message
5524147, Feb 02 1995 Wilmington Trust, National Association, as Administrative Agent Method for forming a virtual call center
5525977, Dec 06 1993 Prince Corporation Prompting system for vehicle personalization
5526417, Feb 28 1994 Wilmington Trust, National Association, as Administrative Agent Automatic call distributor with automated postconversation message system
5526428, Dec 29 1993 Lenovo PC International Access control apparatus and method
5528248, Aug 19 1994 Trimble Navigation, Ltd. Personal digital location assistant including a memory cartridge, a GPS smart antenna and a personal computing device
5528492, Sep 06 1991 Kabushiki Kaisha Toshiba Method of managing medical diagnostic data with reference relationship
5528496, Apr 29 1993 E I DU PONT DE NEMOURS AND COMPANY Vehicle alignment system and method incorporating digital photograph database of vehicles
5528516, May 25 1994 VMWARE, INC Apparatus and method for event correlation and problem reporting
5528666, Jul 01 1994 Google Technology Holdings LLC Personal phone expansion system
5530235, Feb 16 1995 CONTENTGUARD HOLDINGS, INC Interactive contents revealing storage device
5530931, Oct 20 1994 Telefonaktiebolaget L M Ericsson Method and apparatus for providing a look ahead feature for enhanced call forwarding in a telecommunications system
5533103, Apr 28 1994 SIEMENS ENTERPRISE COMMUNICATIONS, INC Calling system and method
5533107, Mar 01 1994 BELLSOUTH INTELLECTUAL PROPERTY GROUP, INC ; Bellsouth Intellectual Property Corporation Method for routing calls based on predetermined assignments of callers geographic locations
5533109, Sep 30 1994 Wilmington Trust, National Association, as Administrative Agent Telecommunication system with user modifiable PBX terminating call feature controller and method
5533123, Jun 28 1994 National Semiconductor Corporation Programmable distributed personal security
5534855, Jul 20 1992 GOOGLE LLC Method and system for certificate based alias detection
5534888, Feb 03 1994 Motorola Electronic book
5534975, May 26 1995 Xerox Corporation Document processing system utilizing document service cards to provide document processing services
5535257, Feb 07 1994 Motorola Mobility LLC Method and apparatus for managing telephone calls in a selective call radio system controller
5535383, Mar 17 1994 SYBASE, Inc. Database system with methods for controlling object interaction by establishing database contracts between objects
5537467, Aug 23 1994 HANGER SOLUTIONS, LLC Method for forwarding a call to a temporarily utilized portable telephone
5537470, Apr 06 1994 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Method and apparatus for handling in-bound telemarketing calls
5539645, Nov 19 1993 U S PHILIPS CORPORATION Traffic monitoring system with reduced communications requirements
5539869, Sep 28 1992 FORD GLOBAL TECHNOLOGIES, INC A MICHIGAN CORPORATION Method and system for processing and presenting on-line, multimedia information in a tree structure
5544220, Feb 23 1993 SIEMENS ENTERPRISE COMMUNICATIONS, INC System for integrating a stand alone inbound automatic call distributor and an outbound automatic call dialer
5544232, Nov 19 1992 Wilmington Trust, National Association, as Administrative Agent Call distributor with automatic preannouncement system and method
5544255, Aug 31 1994 CIC ACQUISTION CORP ; CIC ACQUISITION CORP Method and system for the capture, storage, transport and authentication of handwritten signatures
5546452, Mar 02 1995 Cisco Systems, Inc Communications system using a central controller to control at least one network and agent system
5546456, Aug 02 1994 Wilmington Trust, National Association, as Administrative Agent Telecommunication system with inbound call responsive predictive outdialing system and method
5546462, Apr 09 1993 Washington University Method and apparatus for fingerprinting and authenticating various magnetic media
5546580, Apr 15 1994 Koninklijke Philips Electronics N V Method and apparatus for coordinating concurrent updates to a medical information database
5547125, Aug 01 1995 NEW CARCO ACQUISITION LLC; Chrysler Group LLC Vehicle climate control system and operating method
5553145, Mar 21 1995 DOCUSIGN, INC Simultaneous electronic transactions with visible trusted parties
5553155, Mar 11 1992 Avant Incorporated Low cost method employing time slots for thwarting fraud in the periodic issuance of food stamps, unemployment benefits or other governmental human services
5553661, Oct 23 1995 Delphi Technologies Inc Solar position correction for climate control system
5555172, Aug 22 1994 Johnson Controls Technology Company User interface for controlling accessories and entering data in a vehicle
5555286, Jan 31 1994 TENDLER CELLULAR, INC Cellular phone based automatic emergency vessel/vehicle location system
5555290, Apr 23 1990 Verizon Patent and Licensing Inc Long distance telephone switching system with enhanced subscriber services
5555295, May 16 1995 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Service and information management system for a telecommunications network
5555502, May 11 1994 GEO Ventures Display and control apparatus for the electronic systems of a motor vehicle
5557668, Jun 25 1992 TELEDATA SOLUTIONS, INC Call distribution system with distributed control of calls and data distribution
5557765, Aug 11 1994 McAfee, Inc System and method for data recovery
5559520, Sep 26 1994 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Wireless information system for acquiring location related information
5559867, Jun 20 1994 CASSIDIAN COMMUNICATIONS, INC Automated calling system with database updating
5559878, May 23 1994 Teltrust, Inc. Telephonic communications answering and callback processing system
5559885, Jan 14 1994 ASSA ABLOY AB Two stage read-write method for transaction cards
5560011, Oct 19 1993 Fujitsu Limited Computer system for monitoring a user's utilization pattern to determine useful tasks
5561711, Mar 09 1994 Qwest Communications International Inc Predictive calling scheduling system and method
5561718, Jan 17 1992 NXP, B V F K A FREESCALE SEMICONDUCTOR, INC Classifying faces
5568540, Sep 13 1993 Cisco Technology, Inc Method and apparatus for selecting and playing a voice mail message
5570419, Oct 13 1995 InterVoice Limited Partnership System and method for an improved predictive dialer
5572204, Apr 10 1995 WILMINGTON TRUST FSB, AS ADMINISTRATIVE AGENT Vehicular emergency message system
5572576, Mar 31 1992 IPVX PATENT HOLDINGS, INC Telephone answering device linking displayed data with recorded audio message
5572586, Mar 27 1992 Canon Kabushiki Kaisha Communication control apparatus and method and communication exchange apparatus and method
5572596, Sep 02 1994 SENSAR, INC Automated, non-invasive iris recognition system and method
5573244, Feb 28 1994 INTERACTIVE SYSTEMS WORLDWIDE, INC System and method for wagering at fixed handicaps and/or odds on a sports event
5574782, Apr 14 1995 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Minimizing service disruptions in handling call request messages where new message formats are needed in a telecommunication network
5574784, Nov 20 1992 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Dynamic admission control for telecommunications relay service with text-to-speech synthesis
5576724, Jun 01 1992 NIPODENSO CO , LTD Vehicular extreme position display system
5577112, May 28 1991 Wilmington Trust, National Association, as Administrative Agent Telephony system with supervisory management center and parameter testing with alerts
5578808, Dec 22 1993 SMART CARD, LLC Data card that can be used for transactions involving separate card issuers
5579377, Nov 18 1994 Remote-control telephone answering system and method
5579383, Feb 26 1993 AVAYA Inc Calling terminal controlled call coverage
5579393, Jun 21 1994 YOUNG AMERICA HOMES, INC System and method for secure medical and dental record interchange
5579535, Jul 01 1991 Motorola Mobility LLC Personal communication system providing supplemental information mode
5581602, Jun 19 1992 Wilmington Trust, National Association, as Administrative Agent Non-offensive termination of a call detection of an answering machine
5581604, Sep 13 1993 Cisco Technology, Inc Method and apparatus for processing an incoming call in a communication system
5581607, Oct 01 1990 Intel Corporation Customized, billing-controlled call bridging system
5583933, Aug 05 1994 SMART TONE, INC , A DELWARE CORPORATION Method and apparatus for the secure communication of data
5583950, Sep 16 1992 Mikos, Ltd. Method and apparatus for flash correlation
5586171, Jul 07 1994 GOOGLE LLC Selection of a voice recognition data base responsive to video data
5586179, Mar 17 1993 Wilmington Trust, National Association, as Administrative Agent System and method for adding and integrating outbound calling and overall system control to an existing inbound telephone system
5586262, Jul 02 1986 Kabushiki Kaisha Toshiba Image data management system particularly for use in a hospital
5588049, Jan 25 1993 AG Communication Systems Corporation Method for the automatic insertion of removal of a calling number identification (CNID) blocking prefix from within a telephone number in a personal computer based telephone management system
5588059, Mar 02 1995 GENERAL DYNAMICS C4 SYSTEMS, INC Computer system and method for secure remote communication sessions
5590171, Jul 07 1994 BELLSOUTH INTELLECTUAL PROPERTY GROUP, INC ; Bellsouth Intellectual Property Corporation Method and apparatus for communications monitoring
5590188, Nov 09 1992 Tekelec Rules-based call routing
5592408, Jan 03 1994 SECURITY PEOPLE, INC Identification card and access control device
5592543, Jun 01 1994 Wilmington Trust, National Association, as Administrative Agent Method and system for allocating agent resources to a telephone call campaign
5592549, Jun 15 1995 HARMONY LOGIC SYSTEMS LLC Method and apparatus for retrieving selected information from a secure information source
5592945, Feb 28 1996 Koninklijke Philips Electronics N V Real-time event charting in an electronic flowsheet
5594779, Jan 12 1995 Verizon Patent and Licensing Inc Mobile audio program selection system using public switched telephone network
5594790, Jan 14 1993 Wilmington Trust, National Association, as Administrative Agent Method for selecting and controlling the automatic dialing of a call record campaign
5594791, Oct 05 1994 Wilmington Trust, National Association, as Administrative Agent Method and apparatus for providing result-oriented customer service
5594806, Jun 20 1994 Personnel Identification & Entry Access Control, Inc. Knuckle profile indentity verification system
5600710, Jul 08 1994 BELLSOUTH INTELLECTUAL PROPERTY GROUP, INC ; Bellsouth Intellectual Property Corporation Method for providing a recorded message to a telephone caller when called number is busy
5604804, Apr 23 1996 ASSA ABLOY AB Method for certifying public keys in a digital signature scheme
5606609, Sep 19 1994 SILANIS TECHNOLOGY INC Electronic document verification system and method
5608387, Nov 30 1991 VISAGE DEVELOPMENTS LIMITED Personal identification devices and access control systems
5610774, Oct 11 1991 Sharp Kabushiki Kaisha Audio sound recording/reproducing apparatus using semiconductor memory
5610978, Dec 30 1994 Mitel Corporation Ring discriminator
5610982, May 15 1996 ASSA ABLOY AB Compact certification with threshold signatures
5613004, Jun 07 1995 Wistaria Trading Ltd Steganographic method and device
5613012, Nov 28 1994 Open Invention Network, LLC Tokenless identification system for authorization of electronic transactions and electronic transmissions
5615109, May 24 1995 EDER, JEFFREY Method of and system for generating feasible, profit maximizing requisition sets
5615277, Nov 28 1994 Open Invention Network, LLC Tokenless security system for authorizing access to a secured computer system
5616904, Feb 14 1991 XTec, Incorporated Data verification method and magnetic media therefor
5619557, Jul 10 1995 Wilmington Trust, National Association, as Administrative Agent Telephone switching system and method for controlling incoming telephone calls to remote agents and for collecting and providing call data
5619991, Apr 26 1995 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Delivery of medical services using electronic data communications
5621201, May 11 1994 Visa International Automated purchasing control system
5621889, Jun 09 1993 Alcatel Facility for detecting intruders and suspect callers in a computer installation and a security system including such a facility
5623547, Apr 12 1990 Mondex International Limited Value transfer system
5623601, Nov 21 1994 RPX Corporation Apparatus and method for providing a secure gateway for communication and data exchanges between networks
5625676, Sep 13 1993 Cisco Technology, Inc Method and apparatus for monitoring a caller's name while using a telephone
5625682, Mar 15 1994 Mitel Networks Corporation Help desk improvement
5627547, Apr 07 1995 VALUE STREET CONSULTING GROUP LLC Mapless GPS navigation system in vehicle entertainment system
5629980, Nov 23 1994 CONTENTGUARD HOLDINGS, INC System for controlling the distribution and use of digital works
5629982, Mar 21 1995 DOCUSIGN, INC Simultaneous electronic transactions with visible trusted parties
5631961, Sep 15 1995 The United States of America as represented by the Director of the Device for and method of cryptography that allows third party access
5632011, May 22 1995 International Business Machines Corporation Electronic mail management system for operation on a host computer system
5633917, Nov 18 1994 Remote-control telephone answering system and method
5633922, Dec 29 1995 AT&T Corp Process and apparatus for restarting call routing in a telephone network
5633924, Sep 30 1993 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Telecommunication network with integrated network-wide automatic call distribution
5633932, Dec 19 1995 Intel Corporation Apparatus and method for preventing disclosure through user-authentication at a printing node
5634012, Nov 23 1994 CONTENTGUARD HOLDINGS, INC System for controlling the distribution and use of digital works having a fee reporting mechanism
5634055, Sep 27 1994 BidPlus, Inc. Method for selecting assignments
5636267, Mar 04 1996 Jintec Corporation Cleaning system for telephone number list
5636268, Jul 29 1994 Koninklijke PTT Nederland N.V. Communication system with queues
5636282, Jun 20 1994 CLEARWATER INNOVATIONS, LLC; DIGITAL SIGNAL INNOVATIONS, LLC Method for dial-in access security using a multimedia modem
5636292, May 08 1995 DIGIMARC CORPORATION AN OREGON CORPORATION Steganography methods employing embedded calibration data
5638305, Mar 25 1994 Honda Giken Kogyo Kabushiki Kaisha Vibration/noise control system
5638436, Jan 12 1994 Intel Corporation Voice detection
5638443, Nov 23 1994 CONTENTGUARD HOLDINGS, INC System for controlling the distribution and use of composite digital works
5638445, Sep 19 1995 Microsoft Technology Licensing, LLC Blind encryption
5640546, Feb 23 1993 UP TWO, INC Composition of systems of objects by interlocking coordination, projection, and distribution
5640569, Apr 28 1995 HE HOLDINGS, INC , A DELAWARE CORP Diverse goods arbitration system and method for allocating resources in a distributed computer system
5644778, Nov 02 1993 ADMINASTAR COMMUNICATIONS, INC Medical transaction system
5646839, May 29 1990 SANDATA TECHNOLOGIES, INC ; SANDATA TECHNLOGIES, INC Telephone-based personnel tracking system
5646986, Dec 29 1995 AT&T; AT&T Corp Network communication system with global event calendar information and trunk allocation
5646988, Mar 18 1994 Fujitsu Limited Incoming call controller for preferentially connecting a waiting call based on number of previous unsuccessful call attempts
5646997, Dec 14 1994 Sony Corporation Method and apparatus for embedding authentication information within digital data
5647017, Aug 31 1994 Peripheral Vision Limited; CIC ACQUISITION CORP Method and system for the verification of handwritten signatures
5647364, Feb 15 1995 Qualcomm Incorporated Ultrasonic biometric imaging and identity verification system
5648769, Oct 06 1994 Toyota Jidosha Kabushiki Kaisha Vehicle data processing system which can communicate with information center
5650770, Oct 27 1994 CONVERSANT INTELLECTUAL PROPERTY MANAGEMENT INC Self-locating remote monitoring systems
5650929, Apr 28 1995 Prince Corporation Modular electronic display and accessory mounting system for a vehicle
5652788, Sep 29 1993 Kabushiki Kaisha Toshiba Key telephone apparatus
5653386, Jul 28 1995 NEW CARCO ACQUISITION LLC; Chrysler Group LLC System for controlling climate within a vehicle
5654715, Dec 15 1995 Honda Giken Kogyo Kabushiki Kaisha Vehicle-surroundings monitoring apparatus
5655013, Apr 19 1994 SECURUS TECHNOLOGIES, INC Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access
5655014, Feb 18 1994 CALABRIO, INC Switching device independent computer-telephone integration system
5657074, Nov 29 1991 Minolta Camera Kabushiki Kaisha Apparatus for reproducing still images with music
5659616, Jul 19 1994 Certco, LLC Method for securely using digital signatures in a commercial cryptographic system
5659726, Feb 23 1995 Regents of the University of California, The Data embedding
5661283, Oct 03 1995 NCR Corporation Automated patching between ATM and consultant
5664018, Mar 12 1996 Watermarking process resilient to collusion attacks
5664109, Jun 07 1995 RAYTHEON COMPANY, A CORP OF DELAWARE Method for extracting pre-defined data items from medical service records generated by health care providers
5664115, Jun 07 1995 Intel Corporation Interactive computer system to match buyers and sellers of real estate, businesses and other property using the internet
5666102, Jul 24 1996 UT Automotive Dearborn, INC Vehicle signals incorporated into steering wheel rim
5666400, Jul 07 1994 GOOGLE LLC Intelligent recognition
5666414, Aug 31 1995 Guaranteed partial key-escrow
5666416, Nov 16 1995 ASSA ABLOY AB Certificate revocation system
5666420, Mar 21 1995 MICALI, SILVIO Simultaneous electronic transactions
5666523, Jun 30 1994 Microsoft Technology Licensing, LLC Method and system for distributing asynchronous input from a system input queue to reduce context switches
5668878, Feb 28 1994 Microsoft Technology Licensing, LLC Secure cryptographic methods for electronic transfer of information
5670953, Mar 15 1994 Nissan Motor Co., Ltd. Distance control apparatus for vehicle
5672106, Sep 13 1994 Tab Limited Combined totalizer and fixed odds betting system and method
5675637, May 16 1995 Wilmington Trust, National Association, as Administrative Agent Method for automatically obtaining and presenting data from multiple data sources
5677955, Apr 07 1995 FleetBoston Financial Corporation Electronic funds transfer instruments
5679940, Dec 02 1994 First Data Corporation Transaction system with on/off line risk assessment
5680460, Sep 07 1994 BIOSCRYPT INC Biometric controlled key generation
5682032, Feb 22 1996 Atmel Corporation Capacitively coupled identity verification and escort memory apparatus
5682142, Jul 29 1994 SIENA FUNDING LLC Electronic control system/network
5684863, Jul 10 1985 Ronald A. Katz, Technology Lic. L.P. Telephonic-interface statistical analysis system
5687215, Apr 10 1995 WILMINGTON TRUST FSB, AS ADMINISTRATIVE AGENT Vehicular emergency message system
5687225, Sep 11 1995 SIEMENS ENTERPRISE COMMUNICATIONS, INC System for adding outbound dialing to inbound call distributors
5687236, Jun 07 1995 Wistaria Trading Ltd Steganographic method and device
5689252, Nov 04 1994 VRINGO INFRASTRUCTURE, INC Navigation system for an automotive vehicle
5689652, Apr 27 1995 OPTIMARK HOLDINGS, INC ; OPTIMARK, INC Crossing network utilizing optimal mutual satisfaction density profile
5691695, Jul 24 1996 Lear Automotive Dearborn, Inc Vehicle information display on steering wheel surface
5692033, Jan 22 1996 Verizon Patent and Licensing Inc AIN queuing for call-back system
5692034, Oct 01 1990 Intel Corporation Customized, billing-controlled call bridging system
5692047, Dec 08 1995 Oracle America, Inc System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources
5696809, Jun 22 1995 Verizon Patent and Licensing Inc Advanced intelligent network based computer architecture for concurrent delivery of voice and text data using failure management system
5696818, Sep 13 1995 Wilmington Trust, National Association, as Administrative Agent Delay announcement group and time controller for a telephone system
5696827, Aug 31 1995 Microsoft Technology Licensing, LLC Secure cryptographic methods for electronic transfer of information
5696908, Jun 07 1995 MEDCOM USA, INC Telephone debit card dispenser and method
5699056, Dec 28 1994 OMRON AUTOMOTIVE ELECTRONICS CO , LTD Traffic information system
5699418, Mar 24 1995 RPX CLEARINGHOUSE LLC Telephone circuit
5699427, Jun 23 1995 IBM Corporation Method to deter document and intellectual property piracy through individualization
5701295, May 26 1995 AVAYA Inc Variable communication bandwidth for providing automatic call back and call hold
5702165, May 17 1995 Toyota Jidosha Kabushiki Kaisha Behavior control system of vehicle distinctive of oversteered and understeered conditions
5703562, Nov 20 1996 Sandia National Laboratories Method for transferring data from an unsecured computer to a secured computer
5703935, Mar 29 1994 Verizon Patent and Licensing Inc Automated telephone operator services
5706427, Sep 08 1995 IDENTITY VERIFICATION SOLUTIONS LLC Authentication method for networks
5710834, May 08 1995 DIGIMARC CORPORATION AN OREGON CORPORATION Method and apparatus responsive to a code signal conveyed through a graphic image
5712625, May 15 1995 Delphi Technologies Inc Vehicle operator verification system that prevents vehicle adapting systems from adapting
5712632, Sep 16 1994 Sumitomo Electric Industries,Ltd. Navigation apparatus for land vehicle inputting road traffic information
5712640, Nov 28 1994 Honda Giken Kogyo Kabushiki Kaisha Radar module for radar system on motor vehicle
5712912, Jul 28 1995 BIOSCRYPT INC Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques
5712914, Sep 29 1995 Intel Corporation Digital certificates containing multimedia data extensions
5714852, Sep 13 1996 LEAR CORPORATION EEDS AND INTERIORS Three state switch detection using current sensing
5715307, Sep 26 1994 Wilmington Trust, National Association, as Administrative Agent Integrated voice and business transaction reporting for telephone call centers
5715403, Nov 23 1994 CONTENTGUARD HOLDINGS, INC System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
5717387, Jan 19 1990 Visteon Global Technologies, Inc Remote vehicle programming system
5717741, Aug 26 1992 BELLSOUTH INTELLECTUAL PROPERTY GROUP, INC ; Bellsouth Intellectual Property Corporation Method for handling telephonic messages
5717757, Aug 29 1996 ASSA ABLOY AB Certificate issue lists
5719950, Mar 24 1994 Minnesota Mining and Manufacturing Company Biometric, personal authentication system
5720770, Oct 06 1995 Pacesetter, Inc Cardiac stimulation system with enhanced communication and control capability
5724418, Jun 25 1992 COOPER T G S L L C Call distributor
5724425, Jun 10 1994 Sun Microsystems, Inc Method and apparatus for enhancing software security and distributing software
5724488, Apr 29 1994 International Business Machines Corporation Fuzzy logic entity behavior profiler
5727092, May 17 1995 The Regents of the University of California Compression embedding
5727154, Apr 28 1995 DII2000, INC ; SOTF TECHNOLOGIES, INC Program synchronization on first and second computers by determining whether information transmitted by first computer is an acceptable or unacceptable input to second computer program
5727165, Dec 17 1990 Reuters Limited Offer matching system having timed match acknowledgment
5729600, Jun 25 1992 Wilmington Trust, National Association, as Administrative Agent Automatic call distributor with automated voice responsive call servicing system and method
5732368, Sep 23 1994 Robert Bosch GmbH Method for displaying information on a screen
5734154, Sep 03 1996 Freescale Semiconductor, Inc Smart card with Iintegrated reader and visual image display
5734204, Mar 17 1993 Canon Kabushiki Kaisha Backup apparatus
5734752, Sep 24 1996 Xerox Corporation Digital watermarking using stochastic screen patterns
5734973, Apr 25 1995 Clarion Co., Ltd. Radio receiver for selectively receiving signals at frequencies of previously stored broadcast stations
5737419, Nov 09 1994 Verizon Patent and Licensing Inc Computer system for securing communications using split private key asymmetric cryptography
5737420, Sep 07 1994 BIOSCRYPT INC Method for secure data transmission between remote stations
5740233, Nov 02 1995 InterVoice Limited Partnership System and method for statistical diagnosis of the operation of an automated telephone system
5740240, Apr 10 1995 Edify Corporation Computer telephony integration system and method
5740244, Apr 09 1993 Washington University Method and apparatus for improved fingerprinting and authenticating various magnetic media
5742226, Jul 05 1994 Delphi Technologies Inc Simple theft deterrent for electronic control modules
5742675, Sep 26 1995 Telefonaktiebolaget L M Ericsson Method and apparatus for automatically distributing calls to available logged-in call handling agents
5742683, Dec 19 1995 Pitney Bowes Inc.; Pitney Bowes Inc System and method for managing multiple users with different privileges in an open metering system
5742685, Oct 11 1995 Pitney Bowes Inc. Method for verifying an identification card and recording verification of same
5745555, Aug 05 1994 SMART TONE, INC , A DELWARE CORPORATION System and method using personal identification numbers and associated prompts for controlling unauthorized use of a security device and unauthorized access to a resource
5745569, Jan 17 1996 Wistaria Trading Ltd Method for stega-cipher protection of computer code
5745573, Aug 11 1994 McAfee, Inc System and method for controlling access to a user secret
5745604, Nov 18 1993 DIGIMARC CORPORATION AN OREGON CORPORATION Identification/authentication system using robust, distributed coding
5745678, Dec 13 1994 International Business Machines Corporation Method and system for the secured distribution of multimedia titles
5745754, Jun 07 1995 GOOGLE LLC Sub-agent for fulfilling requests of a web browser using an intelligent agent and providing a report
5748103, Jul 09 1996 GE MEDICAL SYSTEMS INFORMATION TECHNOLOGIES, INC Two-way TDMA telemetry system with power conservation features
5748711, Jun 07 1995 Convergys Customer Management Delaware LLC Telephone transaction processing as a part of call transport
5748738, Jan 17 1995 EORIGINAL, INC System and method for electronic transmission, storage and retrieval of authenticated documents
5748763, Nov 18 1993 DIGIMARC CORPORATION AN OREGON CORPORATION Image steganography system featuring perceptually adaptive and globally scalable signal embedding
5748783, May 08 1995 DIGIMARC CORPORATION AN OREGON CORPORATION Method and apparatus for robust information coding
5748890, Dec 23 1996 Qwest Communications International Inc Method and system for authenticating and auditing access by a user to non-natively secured applications
5748960, Aug 10 1993 Method and apparatus for validating travelling object-oriented programs with digital signatures
5749785, Sep 21 1994 Communications system using bets
5751809, Sep 29 1995 Intel Corporation Apparatus and method for securing captured data transmitted between two sources
5751836, Sep 02 1994 Sarnoff Corporation Automated, non-invasive iris recognition system and method
5751909, Mar 17 1994 SYBASE, Inc. Database system with methods for controlling object interaction by establishing database contracts between objects
5752754, Mar 19 1996 Mitsubishi Denki Kabushiki Kaisha Control apparatus for anti-skid brake system of motor vehicle
5752976, Jun 23 1995 REMOTE BIOMEDICAL TECH, LLC; REMOTE BIOMEDICAL, TECH, LLC World wide patient location and data telemetry system for implantable medical devices
5754659, Dec 22 1995 Google Technology Holdings LLC Generation of cryptographic signatures using hash keys
5754939, Nov 29 1994 Apple Inc System for generation of user profiles for a system for customized electronic identification of desirable objects
5757431, Jun 20 1994 L-1 IDENTITY SOLUTIONS OPERATING COMPANY, INC Apparatus for coupling multiple data sources onto a printed document
5757914, Oct 26 1995 Oracle America, Inc System and method for protecting use of dynamically linked executable modules
5757916, Oct 06 1995 Google Inc Method and apparatus for authenticating the location of remote users of networked computing systems
5758311, Mar 16 1994 Honda Giken Koygo K.K. Vibration/noise active control system for vehicles
5758328, Feb 22 1996 SOURCE SEARCH TECHNOLOGIES, LLC Computerized quotation system and method
5761285, Jun 01 1994 Wilmington Trust, National Association, as Administrative Agent Universal telephony application client that is configurable from a profile for a telphone call campaign
5761288, Jun 05 1995 Mitel Networks Corporation Service context sensitive features and applications
5761298, May 31 1996 Plantronics, Inc Communications headset with universally adaptable receiver and voice transmitter
5761686, Jun 27 1996 Xerox Corporation Embedding encoded information in an iconic version of a text image
5763862, Jun 24 1996 SHENZHEN XINGUODU TECHNOLOGY CO , LTD Dual card smart card reader
5764789, Nov 28 1994 Open Invention Network, LLC Tokenless biometric ATM access system
5765152, Oct 13 1995 DIGIMARC CORPORATION AN OREGON CORPORATION System and method for managing copyrighted electronic media
5767496, Jan 27 1994 Symbol Technologies, LLC Apparatus for processing symbol-encoded credit card information
5768355, May 16 1996 T-NETIX, INC ; EVERCOM SYSTEMS, INC ; SECURUS TECHNOLOGIES, INC Three-way call detection system
5768360, Mar 09 1992 International Business Machines Corporation Subscriber call routing processing system
5768382, Nov 22 1995 Inventor Holdings, LLC Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols
5768385, Aug 29 1995 Microsoft Technology Licensing, LLC Untraceable electronic cash
5768388, Mar 21 1996 Time delayed key escrow
5768426, Nov 18 1993 DIGIMARC CORPORATION AN OREGON CORPORATION Graphics processing system employing embedded code signals
5770849, Aug 23 1996 SHENZHEN XINGUODU TECHNOLOGY CO , LTD Smart card device with pager and visual image display
5771071, Jun 20 1994 L-1 IDENTITY SOLUTIONS OPERATING COMPANY, INC Apparatus for coupling multiple data sources onto a printed document
5772585, Aug 30 1996 EMC, Inc System and method for managing patient medical records
5774073, Sep 22 1994 AISIN AW CO , LTD Navigation system for a vehicle
5774357, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Human factored interface incorporating adaptive pattern recognition based controller apparatus
5774537, Aug 24 1995 SAMSUNG ELECTRONICS CO , LTD Method and apparatus for displaying multiple languages in key phone system
5774551, Aug 07 1995 Oracle America, Inc Pluggable account management interface with unified login and logout and multiple user authentication services
5777394, Jan 15 1996 DaimlerChrysler AG Seat adjusting switch particularly for vehicle seats
5778102, May 17 1995 The Regents of the University of California, Office of Technology Compression embedding
5778367, Dec 14 1995 GraphOn Corporation Automated on-line information service and directory, particularly for the world wide web
5778882, Feb 24 1995 Brigham and Women's Hospital; BRIGHAM AND WOMEN S HOSPITAL Health monitoring system
5779634, May 10 1991 Kabushiki Kaisha Toshiba Medical information processing system for supporting diagnosis
5781872, Oct 04 1993 Seiko Epson Corporation On-vehicle data processing and display system responsive to a vehicle mode of operation
5781890, Oct 16 1991 Kabushiki Kaisha Toshiba Method for managing clustered medical data and medical data filing system in clustered form
5784461, May 23 1996 Eastman Kodak Company Security system for controlling access to images and image related services
5784463, Dec 04 1996 SSL SERVICES LLC Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
5784566, Jan 11 1996 Oracle International Corporation System and method for negotiating security services and algorithms for communication across a computer network
5787156, Jul 10 1985 Ronald A. Katz Technology Licensing, LP Telephonic-interface lottery system
5787159, Feb 27 1996 Micron Technology, Inc Use of caller ID information
5787187, Apr 01 1996 Sandia Corporation Systems and methods for biometric identification using the acoustic properties of the ear canal
5789733, Sep 20 1996 SHENZHEN XINGUODU TECHNOLOGY CO , LTD Smart card with contactless optical interface
5790665, Jan 17 1997 Anonymous information retrieval system (ARS)
5790668, Dec 19 1995 BIOSCRYPT INC Method and apparatus for securely handling data in a database of biometrics and associated data
5790674, May 08 1995 LEXISNEXIS RISK SOLUTIONS GA INC System and method of providing system integrity and positive audit capabilities to a positive identification system
5790703, Jan 21 1997 Xerox Corporation Digital watermarking using conjugate halftone screens
5790935, Jan 30 1996 Hughes Electronics Corporation Virtual on-demand digital information delivery system and method
5793846, Jul 10 1985 Ronald A. Katz Technology Licensing, LP Telephonic-interface game control system
5793868, Aug 29 1996 ASSA ABLOY AB Certificate revocation system
5794207, Sep 04 1996 PRICELINE COM LLC Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers
5796791, Oct 15 1996 InterVoice Limited Partnership Network based predictive dialing
5796816, Jun 26 1995 Jintec Corporation Device and method for cleaning telephone number list
5796841, Aug 21 1995 Pitney Bowes Inc.; Pitney Bowes Inc Secure user certification for electronic commerce employing value metering system
5797127, Dec 31 1996 PRICELINE COM INCORPORATED Method, apparatus, and program for pricing, selling, and exercising options to purchase airline tickets
5797128, Jul 03 1995 Sun Microsystems, Inc. System and method for implementing a hierarchical policy for computer system administration
5799077, Jul 28 1994 Fujitsu Limited Method of and apparatus for automatic dialing
5799083, Aug 26 1996 Mineral Lassen LLC Event verification system
5799086, Jan 13 1994 CERTCO, INC , A CORPORATION OF DELAWARE Enhanced cryptographic system and method with key escrow feature
5799087, Apr 28 1994 Citibank, N.A.; CITIBANK, N A Electronic-monetary system
5799088, Dec 01 1993 RPK New Zealand Limited Non-deterministic public key encrypton system
5802199, Nov 28 1994 Open Invention Network, LLC Use sensitive identification system
5802502, May 24 1993 British Telecommunications public limited company System for selective communication connection based on transaction pricing signals
5805055, May 11 1993 Elementare Watson S.r.l. Antitheft system integrated with functions of security, information and navigation, based on electronic cartography, vocal synthesis and radio telecommunication
5805719, Nov 28 1994 Open Invention Network, LLC Tokenless identification of individuals
5805803, May 13 1997 Uber Technologies, Inc Secure web tunnel
5806048, Oct 12 1995 MOPEX INC Open end mutual fund securitization process
5806071, Aug 21 1995 NCR Corporation Process and system for configuring information for presentation at an interactive electronic device
5809144, Aug 24 1995 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
5809437, Jun 07 1995 Automotive Technologies International, Inc On board vehicle diagnostic module using pattern recognition
5812398, Jun 10 1996 Oracle America, Inc Method and system for escrowed backup of hotelled world wide web sites
5812642, Jul 12 1995 Audience response monitor and analysis system and method
5812668, Jun 17 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture
5815252, Sep 05 1995 Canon Kabushiki Kaisha Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives
5815551, Jul 10 1985 Ronald A. Katz Technology Licensing, LP Telephonic-interface statistical analysis system
5815554, May 24 1995 SWEETSER, DAVID J Method and system for indicating operator availability
5815566, Oct 10 1991 Wilmington Trust FSB Apparatus and method for dynamic inbound/outbound call management and for scheduling appointments
5815577, Mar 01 1996 Innovonics, Inc. Methods and apparatus for securely encrypting data in conjunction with a personal computer
5815657, Apr 26 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
5819237, Feb 13 1996 Financial Engineering Associates, Inc. System and method for determination of incremental value at risk for securities trading
5819289, Apr 02 1996 Los Alamos National Security, LLC Data embedding employing degenerate clusters of data having differences less than noise value
5822400, Aug 19 1996 Wilmington Trust, National Association, as Administrative Agent Call record scheduling system and method
5822401, Nov 02 1995 InterVoice Limited Partnership Statistical diagnosis in interactive voice response telephone system
5822410, Jan 11 1996 BANK OF AMERICA, N A Churn amelioration system and method therefor
5822432, Jan 17 1996 Wistaria Trading Ltd Method for human-assisted random key generation and application for digital watermark system
5822436, Apr 25 1996 DIGIMARC CORPORATION AN OREGON CORPORATION Photographic products and methods employing embedded information
5825869, Apr 24 1995 UNIFY, INC Call management method and system for skill-based routing
5825871, Aug 05 1994 SMART TONE, INC , A DELWARE CORPORATION Information storage device for storing personal identification information
5825880, Jan 13 1994 CERTCO, INC , A CORPORATION OF DELAWARE Multi-step digital signature method and system
5826014, Feb 06 1996 GraphOn Corporation Firewall system for protecting network elements connected to a public network
5826029, Oct 31 1995 TREND MICRO INCORPORATED Secured gateway interface
5826244, Aug 23 1995 Xerox Corporation Method and system for providing a document service over a computer network using an automated brokered auction
5828731, Jun 19 1992 Wilmington Trust, National Association, as Administrative Agent Method and apparatus for non-offensive termination of an outbound call and for detection of an answer of an outbound call by an answering machine
5828734, Jul 10 1985 RONALD A KATZ TECHNOLOGY LICENSING, L P Telephone interface call processing system with call selectivity
5828751, Apr 08 1996 CERTIFIED MEASUREMENTS, LLC; CERTIFIED MEASUREMENT, LLC Method and apparatus for secure measurement certification
5828840, Aug 06 1996 Hewlett Packard Enterprise Development LP Server for starting client application on client if client is network terminal and initiating client application on server if client is non network terminal
5828878, Jan 20 1995 Ericsson AB Method and a scheduler for controlling when a server provides service with rate control to an entity
5831545, Aug 25 1995 Google Technology Holdings LLC Method and apparatus for adjusting a communication strategy in a radio communication system using location
5832089, Jun 07 1995 Sandia Corporation Off-line compatible electronic cash method and system
5832119, Nov 18 1993 DIGIMARC CORPORATION AN OREGON CORPORATION Methods for controlling systems using control signals embedded in empirical data
5832450, Jun 28 1993 Scott & White Memorial Hospital Electronic medical record using text database
5832464, May 08 1995 LEXISNEXIS RISK SOLUTIONS GA INC System and method for efficiently processing payments via check and electronic funds transfer
5832488, Mar 29 1995 INFORMATION RETRIEVAL ACQUISITION, LLC Computer system and method for storing medical histories using a smartcard to store data
5835572, Oct 01 1990 Intel Corporation Customized, billing controlled call bridging system
5835726, Dec 15 1993 Check Point Software Technologies Ltd System for securing the flow of and selectively modifying packets in a computer network
5835881, Jan 16 1996 U S PHILIPS CORPORATION Portable system for providing voice driving directions
5835896, Mar 29 1996 eBay Inc Method and system for processing and transmitting electronic auction information
5838237, May 22 1996 Personal alarm device
5838772, Jun 04 1991 COMPAQ INFORMATION TECHNOLOGIES GROUP, L P Voice services equipment
5838779, Sep 14 1984 Wilmington Trust, National Association, as Administrative Agent Adjunct controller for a telephone system
5838792, Jul 18 1994 Verizon Patent and Licensing Inc Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
5838812, Nov 28 1994 Open Invention Network, LLC Tokenless biometric transaction authorization system
5839114, Feb 29 1996 Hewlett Packard Enterprise Development LP Automated system for selecting an initial computer reservation system
5839119, Sep 27 1996 Xerox Corporation Method of electronic payments that prevents double-spending
5841122, Sep 13 1994 Dorma GmbH + Co. KG Security structure with electronic smart card access thereto with transmission of power and data between the smart card and the smart card reader performed capacitively or inductively
5841852, Dec 29 1995 Verizon Patent and Licensing Inc Method and system for telecommunications language support
5841865, Jan 13 1994 CERTCO, INC , A CORPORATION OF DELAWARE Enhanced cryptographic system and method with key escrow feature
5841886, Nov 18 1993 DIGIMARC CORPORATION AN OREGON CORPORATION Security system for photographic identification
5841907, Nov 14 1994 The University of Connecticut Spatial integrating optical correlator for verifying the authenticity of a person, product or thing
5841978, Mar 17 1994 DIGIMARC CORPORATION AN OREGON CORPORATION Network linking method using steganographically embedded data objects
5844244, Feb 01 1996 Kaba Schliesssysteme AG Portable identification carrier
5845211, Jan 13 1995 Intellectual Ventures I LLC Wireless digital network
5845253, Aug 24 1994 Rensimer Enterprises, Ltd. System and method for recording patient-history data about on-going physician care procedures
5845266, Dec 12 1995 OPTIMARK HOLDINGS, INC ; OPTIMARK, INC Crossing network utilizing satisfaction density profile with price discovery features
5845267, Sep 06 1996 AT&T Corp System and method for billing for transactions conducted over the internet from within an intranet
5848143, Mar 02 1995 Cisco Systems, Inc Communications system using a central controller to control at least one network and agent system
5848155, Sep 04 1996 NEC Corporation Spread spectrum watermark for embedded signalling
5848231, Dec 24 1996 Activcard Ireland Limited System configuration contingent upon secure input
5850428, Jul 17 1996 Message management system and method
5850442, Mar 26 1996 Intellectual Ventures II LLC Secure world wide electronic commerce over an open network
5850446, Jun 17 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible architecture
5850451, Jan 13 1994 CERTCO, INC , A CORPORATION OF DELAWARE Enhanced cryptographic system and method with key escrow feature
5850481, Mar 17 1994 DIGIMARC CORPORATION AN OREGON CORPORATION Steganographic system
5852814, Apr 04 1991 Egain Communications Corporation Autonomous learning and reasoning agent
5854832, Jun 26 1995 Wilmington Trust, National Association, as Administrative Agent Monitoring system and method used in automatic call distributor for timing incoming telephone calls
5857013, Aug 26 1992 BELLSOUTH INTELLECTUAL PROPERTY GROUP, INC ; Bellsouth Intellectual Property Corporation Method for automatically returning voice mail messages
5857022, Jan 13 1994 CERTCO, INC , A CORPORATION OF DELAWARE Enhanced cryptographic system and method with key escrow feature
5857023, Nov 25 1996 Xerox Corporation Space efficient method of redeeming electronic payments
5862223, Jul 24 1996 Community United IP, LLC Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce
5862246, Jun 20 1994 Personal Information & Entry Access Control, Incorporated; PERSONNEL IDENTIFICATION & ENTRY ACCESS CONTROL, INCORPORATED Knuckle profile identity verification system
5862260, Nov 18 1993 DIGIMARC CORPORATION AN OREGON CORPORATION Methods for surveying dissemination of proprietary empirical data
5864305, Mar 04 1994 AB Volvo Traffic information system
5867386, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Morphological pattern recognition based controller system
5867559, Feb 20 1996 UNIFY, INC Real-time, on-line, call verification system
5867564, May 16 1995 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Time-of-day clock synchronization in commincations networks
5867572, Oct 17 1995 British Telecommunications public limited company Customer queuing arrangement
5867578, Jun 05 1995 CERTCO, INC , A CORPORATION OF DELAWARE Adaptive multi-step digital signature system and method of operation thereof
5867795, Aug 23 1996 Freescale Semiconductor, Inc Portable electronic device with transceiver and visual image display
5867799, Apr 04 1996 HUDSON BAY MASTER FUND LTD Information system and method for filtering a massive flow of information entities to meet user information classification needs
5867802, Aug 16 1995 Activcard Ireland Limited Biometrically secured control system for preventing the unauthorized use of a vehicle
5867821, May 11 1994 INTEL AMERICAS, INC ; Intel-GE Care Innovations LLC Method and apparatus for electronically accessing and distributing personal health care information and services in hospitals and homes
5869822, Oct 04 1996 STRATFORD, WILLIAM D Automated fingerprint identification system
5870464, Nov 13 1996 Wilmington Trust, National Association, as Administrative Agent Intelligent information routing system and method
5870723, Nov 28 1994 Open Invention Network, LLC Tokenless biometric transaction authorization method and system
5870744, Jun 30 1997 Intel Corporation Virtual people networking
5872833, Jun 07 1995 Convergys Customer Management Delaware LLC Telephone transaction processing as a part of a call transport
5872834, Sep 16 1996 Activcard Ireland Limited Telephone with biometric sensing device
5872848, Feb 18 1997 HANGER SOLUTIONS, LLC Method and apparatus for witnessed authentication of electronic documents
5872849, Jan 13 1994 CERTCO, INC , A CORPORATION OF DELAWARE Enhanced cryptographic system and method with key escrow feature
5873068, Jun 14 1994 INNOVATIA INC Display based marketing message control system and method
5873071, May 15 1997 ITG SOFTWARE SOLUTIONS, INC Computer method and system for intermediated exchange of commodities
5873782, Feb 24 1994 Specified return determinator
5875108, Dec 23 1991 Microsoft Technology Licensing, LLC Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
5876926, Jul 23 1996 Method, apparatus and system for verification of human medical data
5878126, Dec 11 1995 BELLSOUTH INTELLECTUAL PROPERTY GROUP, INC ; Bellsouth Intellectual Property Corporation Method for routing a call to a destination based on range identifiers for geographic area assignments
5878130, Sep 30 1996 Cisco Systems, Inc Communications system and method for operating same
5878137, Jan 11 1994 Alfi S.r.l. Method for obtaining authenticity identification devices for using services in general, and device obtained thereby
5878144, Sep 29 1995 Intel Corporation Digital certificates containing multimedia data extensions
5881225, Apr 14 1997 LAWSON SOFTWARE AMERICAS, INC ; LAWSON SOFTWARE, INC Security monitor for controlling functional access to a computer system
5881226, Oct 28 1996 CALLAHAN CELLULAR L L C Computer security system
5884272, Sep 06 1996 Inventor Holdings, LLC Method and system for establishing and maintaining user-controlled anonymous communications
5884277, May 01 1995 Vinod Khosla Process for issuing coupons for goods or services to purchasers at non-secure terminals
5889473, Mar 17 1997 Sony Corporation; Sony Electronics, Inc. Tourist information pager
5889474, May 18 1992 AERIS COMMUNICATIONS, INC Method and apparatus for transmitting subject status information over a wireless communications network
5889799, Nov 16 1993 ASPECT SOFTWARE, INC Method and system for optimization of telephone contact campaigns
5889862, Jul 17 1995 Nippon Telegraph and Telephone Corporation Method and apparatus for implementing traceable electronic cash
5889863, Jun 17 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensible, flexible architecture
5889868, Jul 02 1996 Wistaria Trading Ltd Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
5890129, May 30 1997 System for exchanging health care insurance information
5890138, Aug 26 1996 ADB SYSTEM INTERNATIONAL, INC Computer auction system
5890152, Sep 09 1996 QUITO ENTERPRISES, LLC; QUITO ENTERPRISES, INC Personal feedback browser for obtaining media files
5892824, Jan 12 1996 CHECKMATE ELECTRONICS, INC Signature capture/verification systems and methods
5892838, Jun 11 1996 Minnesota Mining and Manufacturing Company Biometric recognition using a classification neural network
5892900, Aug 30 1996 INTERTRUST TECHNOLOGIES CORP Systems and methods for secure transaction management and electronic rights protection
5892902, Sep 05 1996 INTELLECTUAL VENTURES ASSETS 19 LLC Intelligent token protected system with network authentication
5893902, Feb 15 1996 KNOWLEDGE KIDS ENTERPRISES, INC Voice recognition bill payment system with speaker verification and confirmation
5894505, Apr 03 1996 Sharp Kabushiki Kaisha Telephone answering machine
5896446, Jul 29 1996 CRANE PAYMENT INNOVATIONS, INC Coin operated telephone auditor
5897616, Jun 11 1997 IBM Corporation Apparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic models and databases
5897620, Jul 08 1997 PRICELINE COM LLC Method and apparatus for the sale of airline-specified flight tickets
5898154, Nov 15 1991 Citibank, N.A. System and method for updating security information in a time-based electronic monetary system
5898759, Aug 27 1996 CHAW KHONG TECHNOLOGY CO , LTD Telephone answering machine with on-line switch function
5898762, Jul 10 1985 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system
5898830, Oct 17 1996 GraphOn Corporation Firewall providing enhanced network security and user transparency
5899998, Aug 31 1995 MEDCARD SYSTEMS, INC Method and system for maintaining and updating computerized medical records
5901209, Oct 15 1996 InterVoice Limited Partnership Caller ID substitution for selected telephone callers
5901214, Jun 10 1996 NEUSTAR INFORMATION SERVICES, INC One number intelligent call processing system
5901229, Nov 06 1995 Nippon Telegraph and Telephone Corporation Electronic cash implementing method using a trustee
5901246, Jun 06 1995 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
5903454, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Human-factored interface corporating adaptive pattern recognition based controller apparatus
5903641, Jan 28 1997 AVAYA Inc Automatic dynamic changing of agents' call-handling assignments
5903651, May 14 1996 AXWAY INC Apparatus and method for demonstrating and confirming the status of a digital certificates and other data
5903880, Jul 19 1996 Self-contained payment system with circulating digital vouchers
5903889, Jun 09 1997 Telaric, Inc.; TELARIC, INC System and method for translating, collecting and archiving patient records
5905505, May 13 1996 TTI Inventions C LLC Method and system for copy protection of on-screen display of text
5905792, Feb 19 1997 Genesys Telecommunications Laboratories, Inc. External positivistic forward transfer in call routing systems
5905800, Jan 17 1996 Wistaria Trading Ltd Method and system for digital watermarking
5905975, Jan 04 1996 Efficient Auctions LLC Computer implemented methods and apparatus for auctions
5905979, Jul 02 1996 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Abstract manager system and method for managing an abstract database
5907149, Jun 27 1994 L-1 SECURE CREDENTIALING, INC Identification card with delimited usage
5907601, Jun 13 1997 UNIFY, INC Call pacing method
5907608, Feb 22 1993 NEUSTAR INFORMATION SERVICES, INC Automatic routing and information system for telephonic services
5909493, Oct 16 1996 Ricoh Corporation Method and system for diagnosis and control of machines using connectionless modes of communication
5910982, Feb 22 1993 NEUSTAR INFORMATION SERVICES, INC Automatic routing and information system for telephonic services
5910987, Feb 13 1995 INTERTRUST TECHNOLOGIES CORP Systems and methods for secure transaction management and electronic rights protection
5910988, Aug 27 1997 SHORE DEARY, L L P Remote image capture with centralized processing and storage
5911132, Apr 26 1995 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Method using central epidemiological database
5911136, Apr 15 1987 HOME ACCOUNT NETWORK, INC System for prioritized operation of a personal financial account comprising liabilities and investment assets
5911143, Aug 15 1994 IBM Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
5911687, Nov 15 1995 Hitachi, Ltd. Wide area medical information system and method using thereof
5912818, Jan 25 1993 Diebold Nixdorf, Incorporated System for tracking and dispensing medical items
5912947, Jun 20 1994 CASSIDIAN COMMUNICATIONS, INC Public notification system and method
5912974, May 04 1994 International Business Machines Corporation Apparatus and method for authentication of printed documents
5913025, Nov 14 1996 EMC IP HOLDING COMPANY LLC Method and apparatus for proxy authentication
5913195, Dec 27 1996 InterVoice Limited Partnership System and method for developing VRU voice dialogue
5913196, Nov 17 1997 SENTRY COM LTD System and method for establishing identity of a speaker
5914951, Apr 16 1996 Lucent Technologies Inc System and method for controlling and monitoring communication between customers and customer service representatives
5915008, Oct 04 1995 Verizon Patent and Licensing Inc System and method for changing advanced intelligent network services from customer premises equipment
5915011, Feb 19 1997 Genesys Telecommunications Laboratories, Inc. Statistically-predictive and agent-predictive call routing
5915018, Nov 05 1996 U S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT Key management system for DVD copyright management
5915019, Feb 13 1995 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
5915027, Nov 05 1996 NEC PERSONAL COMPUTERS, LTD Digital watermarking
5915087, Dec 12 1996 McAfee, LLC Transparent security proxy for unreliable message exchange protocols
5915093, Apr 24 1997 HANGER SOLUTIONS, LLC Computer network debit disk used for prepayment to transfer information from a central computer
5915209, Nov 21 1994 BGC PARTNERS, L P Bond trading system
5915240, Jun 12 1997 Computer system and method for accessing medical information over a network
5915973, Mar 11 1997 Prometric LLC System for administration of remotely-proctored, secure examinations and methods therefor
5917893, Jul 10 1985 Ronald A. Katz Technology Licensing, L.P. Multiple format telephonic interface control system
5917903, Apr 10 1995 Edify Corporation Computer telephony integration system and method
5918213, Dec 22 1995 Verizon Patent and Licensing Inc System and method for automated remote previewing and purchasing of music, video, software, and other multimedia products
5918227, May 06 1996 SWITCHBOARD LLC On-line directory service with a plurality of databases and processors
5919239, Jun 28 1996 QUALCOMM FYX, INC Position and time-at-position logging system
5919246, Oct 07 1994 Mannesmann Aktiengesellschaft Target input for navigation system
5920058, Oct 23 1996 Holographic labeling and reading machine for authentication and security applications
5920384, Dec 09 1997 Activcard Ireland Limited Optical imaging device
5920477, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Human factored interface incorporating adaptive pattern recognition based controller apparatus
5920628, Jan 09 1997 Washington University Method and apparatus for fingerprinting and authenticating various magnetic media
5920629, Apr 28 1994 Citibank, N.A. Electronic-monetary system
5920630, Feb 25 1997 United States of America; NATIONAL SECURITY AGENCY, U S GOVERNMENT Method of public key cryptography that includes key escrow
5920861, Feb 25 1997 INTERTRUST TECHNOLOGIES CORP Techniques for defining using and manipulating rights management data structures
5923745, Feb 28 1997 Open Text Corporation Routing calls to call centers
5923746, Sep 18 1996 Wilmington Trust, National Association, as Administrative Agent Call recording system and method for use with a telephonic switch
5923763, Mar 21 1996 Inventor Holdings, LLC Method and apparatus for secure document timestamping
5924016, Sep 14 1984 Wilmington Trust, National Association, as Administrative Agent Control and monitoring apparatus and method for a telephone system
5924074, Sep 27 1996 BANK OF AMERICA, N A ; BANK OF AMERICA, N A , AS COLLATERAL AGENT Electronic medical records system
5924082, Aug 17 1994 Geneva Branch of Reuters Transaction Services Limited Negotiated matching system
5924083, May 29 1996 REUTERS TRANSACTION SERVICES LIMITED Distributed matching system for displaying a book of credit filtered bids and offers
5924406, Jun 06 1996 Toyota Jidosha Kabushiki Kaisha Apparatus for controlling auxiliary equipment driven by an internal combustion engine
5925126, Mar 18 1997 Memco Software, Ltd. Method for security shield implementation in computer system's software
5926528, May 26 1995 UNIFY, INC Call pacing method
5926539, Sep 12 1997 GENESYS TELECOMMUNICATIONS LABORATORIES, INC , A CORPORATION OF CALIFORNIA Method and apparatus for determining agent availability based on level of uncompleted tasks
5926548, May 29 1996 Nippon Telegraph and Telephone Corporation Method and apparatus for implementing hierarchical electronic cash
5926796, May 05 1997 Apple Inc Method and apparatus for selling subscriptions to periodicals in a retail environment
5928333, May 22 1995 International Business Machines Corporation Electronic mail management system for operation on a host computer system
5929753, Mar 05 1997 Sivan LLC Vehicle/aircraft security system based on vehicle displacement profile, with optional GPS/cellular discrimination indicator
5930339, Nov 05 1996 AVAYA Inc Leaving a message on a held connection
5930369, Sep 28 1995 NEC Corporation Secure spread spectrum watermarking for multimedia data
5930759, Apr 30 1996 Symbol Technologies, LLC Method and system for processing health care electronic data transactions
5930777, Apr 15 1997 CLICK SALES INC Method of charging for pay-per-access information over a network
5930804, Jun 09 1997 U S PHILIPS CORPORATION Web-based biometric authentication system and method
5931890, Feb 21 1996 Aisin Seiki Kabushiki Kaisha Positioning system utilizing GPS satellites
5933480, Jun 05 1996 CREDIT CARD FRAUD CONTROL CORPORATION Method for billing and controlling fraud in providing pay information services
5933492, Jan 21 1997 Genesys Telecommunications Laboratories, Inc Method and system for determining and using multiple object states in a computer telephony integration system
5933498, Jan 11 1996 HANGER SOLUTIONS, LLC System for controlling access and distribution of digital property
5933515, Jul 25 1996 California Institute of Technology User identification through sequential input of fingerprints
5933809, Feb 29 1996 Medcom Solutions, Inc.; MEDCOM SOLUTIONS, INC Computer software for processing medical billing record information
5935071, Feb 15 1995 Qualcomm Incorporated Ultrasonic biometric imaging and identity verification system
5937055, Jan 28 1997 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Method and apparatus for routing telephone calls between alternate telephone service providers
5937068, Mar 22 1996 ASSA ABLOY AB System and method for user authentication employing dynamic encryption variables
5937390, Sep 14 1995 Fujitsu Limited On-line advertising system and its method
5937394, Oct 03 1996 Jaesent, Inc. System and method for pseudo cash transactions with credit back
5938707, Aug 23 1995 Toyota Jidosha Kabushiki Kaisha Automatic steering system for automatically changing a moving line
5940493, Nov 26 1996 BELLSOUTH INTELLECTUAL PROPERTY GROUP, INC ; Bellsouth Intellectual Property Corporation System and method for providing directory assistance information
5940496, Feb 19 1997 Genesys Telecommunications Laboratories, Inc Apparatus and methods enhancing call routing within and between call-centers
5940497, Feb 19 1997 Genesys Telecommunications Laboratories, Inc. Statistically-predictive and agent-predictive call routing
5940504, Jul 01 1991 INFOLOGIC SOFTWARE, INC ; Intertrust Technologies Corporation Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site
5940508, Apr 07 1997 GENERAL DYNAMICS ADVANCED INFORMATION SYSTEMS, INC; GENERAL DYNAMICS MISSION SYSTEMS, INC Method and apparatus for seamless crypto rekey system
5940813, Jul 26 1996 CITIBANK, N A Process facility management matrix and system and method for performing batch, processing in an on-line environment
5940947, Dec 21 1994 NGK Insulators, Ltd. Method of making a piezoelectric/electrostrictive film element with a diaphragm having at least one stress releasing end section
5941813, Jul 23 1996 Cardiotools Herzchirurgietechnik Gmbh Cardiac assist device
5941947, Aug 18 1995 Rovi Technologies Corporation System and method for controlling access to data entities in a computer network
5943403, Oct 01 1990 Intel Corporation Customized, billing-controlled call bridging system
5943422, Aug 12 1996 Intertrust Technologies Corp.; INTERTRUST TECHNOLOGIES CORP Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
5943423, Dec 15 1995 Intellectual Ventures II LLC Smart token system for secure electronic transactions and identification
5943424, Jun 17 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for processing a plurality of transactions from a single initiation point on a multichannel, extensible, flexible architecture
5944823, Oct 21 1996 TREND MICRO INCORPORATED Outside access to computer resources through a firewall
5945877, Feb 08 1996 SGS-THOMSON MICROELECTRONICS PTE LTD Power amplifier with bootstrap voltage clamp
5946387, Feb 10 1997 Genesys Telecommunications Laboratories, Inc Agent-level network call routing
5946388, Feb 06 1997 Inventor Holdings, LLC Method and apparatus for priority queuing of telephone calls
5946394, Jun 12 1997 C. P. Clare Corporation Isolation amplifier with hook switch control
5946414, Aug 28 1998 Xerox Corporation Encoding data in color images using patterned color modulated image regions
5946669, Sep 30 1997 Conduent Business Services, LLC Method and apparatus for payment processing using debit-based electronic funds transfer and disbursement processing using addendum-based electronic data interchange
5948040, Jun 24 1994 Delorme Publishing Co.; DELORME PUBLISHING COMPANY, INC Travel reservation information and planning system
5948136, Jul 30 1997 Sony Corporation; Sony Electronics, INC Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network
5949045, Jul 03 1997 AT&T Corp. Micro-dynamic simulation of electronic cash transactions
5949046, Dec 14 1995 NCR Corporation Apparatus for issuing integrated circuit cards
5949852, Dec 20 1996 AT& T Corp Method for recording messages for absent parties
5949854, Jan 11 1995 Fujitsu Limited Voice response service apparatus
5949863, Jul 29 1996 MEI, INC Coin operated telephone auditor
5949866, Mar 11 1996 Hewlett Packard Enterprise Development LP Communications system for establishing a communication channel on the basis of a functional role or task
5949876, Feb 13 1995 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
5949879, Sep 06 1996 Pitney Bowes Inc.; Pitney Bowes Inc Auditable security system for the generation of cryptographically protected digital data
5949881, Dec 04 1995 Intel Corporation Apparatus and method for cryptographic companion imprinting
5949882, Dec 13 1996 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm
5949885, Mar 12 1996 Method for protecting content using watermarking
5950195, Sep 18 1996 McAfee, LLC Generalized security policy management system and method
5951055, Jun 11 1997 The Standard Register Company Security document containing encoded data block
5952638, Nov 25 1996 Xerox Corporation Space efficient method of electronic payments
5952639, Dec 08 1995 Hitachi, Ltd. Depositing, withdrawal, balance check, exchange and transfer of electronic money in automatic cash handling machine
5952641, Nov 28 1995 C-SAM S.A. Security device for controlling the access to a personal computer or to a computer terminal
5953319, Sep 29 1995 XRS Corporation Wide area mobile communication networks with multiple routing mode options
5953332, Feb 19 1997 Genesys Telecommunications Laboratories, Inc. Agent-initiated dynamic requeing
5953405, Feb 10 1997 Genesys Telecommunications Laboratories, Inc Agent-predictive routing process in call-routing systems
5953419, May 06 1996 Symantec Corporation Cryptographic file labeling system for supporting secured access by multiple users
5954583, Nov 05 1992 COM21 Limited Secure access control system
5956392, Nov 20 1992 Canon Kabushiki Kaisha Private branch exchange apparatus
5956397, Feb 22 1993 NEUSTAR INFORMATION SERVICES, INC Automatic routing and information system for telephonic services
5956400, Jul 19 1996 CUFER ASSET LTD L L C Partitioned information storage systems with controlled retrieval
5956408, Sep 15 1994 International Business Machines Corporation Apparatus and method for secure distribution of data
5958016, Jul 13 1997 Verizon Patent and Licensing Inc Internet-web link for access to intelligent network service control
5958050, Sep 24 1996 Electric Communities Trusted delegation system
5959529, Mar 07 1997 HEALTHCARE FINANCIAL SOLUTIONS, LLC, AS SUCCESSOR AGENT Reprogrammable remote sensor monitoring system
5960073, Apr 03 1997 GENESYS TELECOMMUNICATIONS LABORATORIES, INC , A CORP OF CALIFORNIA Method and apparatus for providing an interactive home agent with access to call center functionality and resources
5960083, Oct 24 1995 ASSA ABLOY AB Certificate revocation system
5960177, May 19 1995 Fujitsu Limited System for performing remote operation between firewall-equipped networks or devices
5963632, Feb 10 1997 Genesys Telecommunications Laboratories, Inc Agent-initiated dynamic requeing of misrouted calls in call-routing systems
5963635, Oct 05 1994 Wilmington Trust, National Association, as Administrative Agent Method and apparatus for providing result-oriented customer service
5963648, Apr 28 1994 Citibank, N.A. Electronic-monetary system
5963657, Sep 09 1996 BIOSCRYPT INC Economical skin-pattern-acquisition and analysis apparatus for access control; systems controlled thereby
5963908, Dec 23 1996 Intel Corporation Secure logon to notebook or desktop computers
5963914, Apr 17 1995 RAKUTEN, INC Network time and work tracker
5963924, Apr 26 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for the use of payment instrument holders and payment instruments in network electronic commerce
5966429, Dec 09 1997 CONCENTRIX CVG CUSTOMER MANAGEMENT DELAWARE LLC Telephone transaction processing as a part of a call transport
5966446, Sep 29 1995 Intel Corporation Time-bracketing infrastructure implementation
5966448, Aug 30 1995 Hitachi, Ltd. Cryptographic communication system
5968176, May 29 1997 Hewlett Packard Enterprise Development LP Multilayer firewall system
5970143, Nov 22 1995 Inventor Holdings, LLC Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system using cryptographic and other protocols
5970479, May 29 1992 Alice Corporation Pty Ltd Methods and apparatus relating to the formulation and trading of risk management contracts
5973616, Aug 25 1997 Motorola, Inc. Pager supported traffic signal controller
5974146, Jul 30 1997 ENT SERVICES DEVELOPMENT CORPORATION LP Real time bank-centric universal payment system
5974389, Mar 01 1996 Glaxo Wellcome Inc Medical record management system and process with improved workflow features
5974548, Jul 12 1996 Apple Inc Media-independent document security method and apparatus
5977884, Jul 01 1998 DESIGN MANUFACTURE DISTRIBUTION LLC Radar detector responsive to vehicle speed
5978475, Jul 18 1997 BT AMERICAS INC Event auditing system
5978494, Mar 04 1998 Sensar, Inc. Method of selecting the best enroll image for personal identification
5978840, Sep 26 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment transactions utilizing a multichannel, extensible, flexible architecture
5978918, Jan 17 1997 SECURE.NET Corporation Security process for public networks
5979773, Dec 02 1994 AMERICAN CARD TECHNOLOGY, INC Dual smart card access control electronic data storage and retrieval system and methods
5982298, Nov 14 1996 Microsoft Technology Licensing, LLC Interactive traffic display and trip planner
5982325, Nov 24 1997 Racom Corporation Method for tracking real time road conditions
5982520, Mar 28 1996 Xerox Corporation Personal storage device for application and data transfer
5982891, Feb 13 1995 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
5982894, Feb 06 1997 Apple Inc System including separable protected components and associated methods
5983154, Mar 22 1996 Toyota Jidosha Kabushiki Kaisha Control system for automatic transmission having plural running modes
5983161, Aug 11 1993 GPS vehicle collision avoidance warning and control system and method
5983205, Jul 26 1996 New York University Computer-based method for the fair division of ownership of goods
5983208, Jun 17 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for handling transaction results in a gateway payment architecture utilizing a multichannel, extensible, flexible architecture
5983350, Sep 18 1996 McAfee, LLC Secure firewall supporting different levels of authentication based on address or encryption status
5984366, Jul 26 1994 TRANSPACIFIC SILICA, LLC Unalterable self-verifying articles
5986746, Feb 27 1995 KREMEN, MR STANLEY H Topographical object detection system
5987132, Jun 17 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for conditionally accepting a payment method utilizing an extensible, flexible architecture
5987140, Apr 26 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for secure network electronic payment and credit collection
5987153, Apr 29 1996 QUINTET, INC Automated verification and prevention of spoofing for biometric data
5987155, Oct 27 1997 Activcard Ireland Limited Biometric input device with peripheral port
5987440, Jul 22 1996 CYVA RESEARCH HOLDINGS, LLC Personal information security and exchange tool
5987459, Mar 15 1996 Regents of the University of Minnesota Image and document management system for content-based retrieval
5990825, Jul 31 1996 Toyota Jidosha Kabushiki Kaisha Positioning system and fixed station and positioning apparatus for employing the same
5991399, Dec 18 1997 HONEYMAN CIPHER SOLUTIONS LLC Method for securely distributing a conditional use private key to a trusted entity on a remote system
5991406, Aug 11 1994 McAfee, Inc System and method for data recovery
5991408, May 16 1997 Veridicom, Inc.; VERICOM, INC ; VERIDICOM, INC Identification and security using biometric measurements
5991429, Dec 06 1996 INFRARED INDENTIFICATION, INC Facial recognition system for security access and identification
5991431, Feb 12 1996 ACTIVCARD CORP Mouse adapted to scan biometric data
5991519, Oct 03 1997 Atmel Corporation Secure memory having multiple security levels
5991731, Mar 03 1997 University of Florida Research Foundation, Incorporated Method and system for interactive prescription and distribution of prescriptions in conducting clinical studies
5991758, Jun 06 1997 International Business Machines Corporation System and method for indexing information about entities from different information sources
5991877, Apr 03 1997 Lockheed Martin Corporation Object-oriented trusted application framework
5991878, Sep 08 1997 FMR LLC Controlling access to information
5995625, Mar 24 1997 Certco, LLC Electronic cryptographic packing
5995630, Mar 07 1996 Activcard Ireland Limited Biometric input with encryption
5995943, Apr 01 1996 TVL LP Information aggregation and synthesization system
5996076, Feb 19 1997 ENT SERVICES DEVELOPMENT CORPORATION LP System, method and article of manufacture for secure digital certification of electronic commerce
5999095, Jan 16 1996 GE SECURITY, INC Electronic security system
5999629, Oct 31 1995 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Data encryption security module
5999637, Sep 28 1995 Hamamatsu Photonics K.K. Individual identification apparatus for selectively recording a reference pattern based on a correlation with comparative patterns
5999919, Feb 26 1997 AT&T Corp Efficient micropayment system
5999973, Mar 28 1997 Telefonaktiebolaget L M Ericsson (publ) Use of web technology for subscriber management activities
6002326, Sep 19 1994 Valerie, Turner Automotive vehicle anti-theft and anti-vandalism and anti-carjacking system
6002756, Apr 18 1997 AT&T Corp Method and system for implementing intelligent telecommunication services utilizing self-sustaining, fault-tolerant object oriented architecture
6002767, Jun 17 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for a modular gateway server architecture
6002770, Jul 28 1995 BIOSCRYPT INC Method for secure data transmission between remote stations
6002772, Sep 29 1995 PIRACY PROTECTION LLC Data management system
6003084, Sep 13 1996 McAfee, LLC Secure network proxy for connecting entities
6003135, Jun 04 1997 SPEX TECHNOLOGIES, INC Modular security device
6003765, May 16 1996 Nippon Telegraph and Telephone Corporation Electronic cash implementing method with a surveillance institution, and user apparatus and surveillance institution apparatus for implementing the same
6004276, Mar 03 1997 QUINTON INC Open architecture cardiology information system
6005517, Apr 14 1997 FCA US LLC Test vehicle tracking system
6005859, Dec 19 1996 RPX CLEARINGHOUSE LLC Proxy VAT-PSTN origination
6005939, Dec 06 1996 GOOGLE LLC Method and apparatus for storing an internet user's identity and access rights to world wide web resources
6005943, Oct 29 1996 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Electronic identifiers for network terminal devices
6006194, Oct 01 1997 Computer-implemented system for controlling resources and policies
6006328, Jul 14 1995 Christopher N., Drake Computer software authentication, protection, and security system
6006332, Oct 21 1996 Case Western Reserve University Rights management system for digital media
6008741, Sep 30 1997 Toyota Jidosha Kabushiki Kaisha Intersection information supply apparatus
6009177, Jan 13 1994 CERTCO, INC , A CORPORATION OF DELAWARE Enhanced cryptographic system and method with key escrow feature
6009430, Dec 19 1997 WSOU Investments, LLC Method and system for provisioning databases in an advanced intelligent network
6009475, Dec 23 1996 TREND MICRO INCORPORATED Filter rule validation and administration for firewalls
6009526, Sep 24 1996 WATERWALL SYSTEMS CO , LTD Information security system for tracing the information outflow and a method for tracing the same
6011858, May 10 1996 MORPHOTRUST USA, INC Memory card having a biometric template stored thereon and system for using same
6012035, Jul 08 1993 Integral Business Services, Inc. System and method for supporting delivery of health care
6012039, Nov 28 1994 Open Invention Network, LLC Tokenless biometric electronic rewards system
6012045, Jul 01 1997 Computer-based electronic bid, auction and sale system, and a system to teach new/non-registered customers how bidding, auction purchasing works
6012049, Feb 04 1998 CITICORP CREDIT SERVICES, INC USA System for performing financial transactions using a smartcard
6012088, Dec 10 1996 SNAPCHAT, INC Automatic configuration for internet access device
6013956, Feb 23 1998 REBO LIGHTING & ELECTRONICS, LLC Touch control switches for vehicles
6014605, Apr 19 1996 Toyota Jidosha Kabushiki Kaisha Vehicular control system for detecting road situations of a planned route
6014627, Feb 03 1992 EBS Dealing Resources, Inc. Credit management for electronic brokerage system
6014643, Jun 28 1996 Interactive securities trading system
6014666, Oct 28 1997 Microsoft Technology Licensing, LLC Declarative and programmatic access control of component-based server applications using roles
6016318, Jul 12 1996 NEC Corporation Virtual private network system over public mobile data network and virtual LAN
6016476, Aug 11 1997 Toshiba Global Commerce Solutions Holdings Corporation Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security
6016484, Apr 26 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for network electronic payment instrument and certification of payment and credit collection utilizing a payment
6018724, Jun 30 1997 Oracle America, Inc Method and apparatus for authenticating on-line transaction data
6018739, May 15 1997 Raytheon Company Biometric personnel identification system
6018801, Feb 23 1998 CONA, FRANK A Method for authenticating electronic documents on a computer network
6021202, Dec 20 1996 FleetBoston Financial Corporation Method and system for processing electronic documents
6021393, Apr 19 1994 SHIINA, SHINICHI Medical information management system
6021397, Dec 02 1997 FINANCIAL ENGINES, INC Financial advisory system
6021398, Jan 04 1996 Efficient Auctions LLC Computer implemented methods and apparatus for auctions
6021399, Nov 25 1996 Xerox Corporation Space efficient method of verifying electronic payments
6021491, Nov 27 1996 Oracle America, Inc Digital signatures for data streams and data archives
6021497, Aug 15 1997 NAVY, UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE, THE Secured network system
6023685, May 23 1996 LIVE NATION ENTERTAINMENT, INCORPORATED Computer controlled event ticket auctioning system
6023686, Feb 20 1996 HANGER SOLUTIONS, LLC Method for conducting an on-line bidding session with bid pooling
6023762, Jul 09 1997 RPX CLEARINGHOUSE LLC Multi-view personalized communications agent
6023765, Dec 06 1996 SECRETARY OF COMMERCE, UNITED STATES OF AMERICA, THE, AS REPRESENTED BY THE Implementation of role-based access control in multi-level secure systems
6026163, Dec 13 1995 Distributed split-key cryptosystem and applications
6026166, Oct 20 1997 CHANNEL IP B V Digitally certifying a user identity and a computer system in combination
6026167, Jun 10 1994 Oracle America, Inc Method and apparatus for sending secure datagram multicasts
6026193, Nov 18 1993 DIGIMARC CORPORATION AN OREGON CORPORATION Video steganography
6026379, Jun 17 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for managing transactions in a high availability system
6026383, Jan 04 1996 Efficient Auctions LLC System and method for an efficient dynamic auction for multiple objects
6026490, Aug 01 1997 GENERAL DYNAMICS ADVANCED INFORMATION SYSTEMS, INC; GENERAL DYNAMICS MISSION SYSTEMS, INC Configurable cryptographic processing engine and method
6028932, Nov 26 1994 LG Electronics Inc. Copy prevention method and apparatus for digital video system
6028933, Jun 14 1996 Alcatel-Lucent USA Inc Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network
6028936, Jan 16 1996 DISNEY ENTERPRISES, INC Method and apparatus for authenticating recorded media
6028937, Oct 09 1995 Matsushita Electric Industrial Co., Ltd Communication device which performs two-way encryption authentication in challenge response format
6028939, Jan 03 1997 RedCreek Communications, Inc.; REDCREEK COMMUNICATIONS, INC Data security system and method
6029067, Jul 12 1995 ALCATEL N V Virtual private network for mobile subscribers
6029150, Oct 04 1996 Certco, LLC Payment and transactions in electronic commerce system
6029151, Dec 13 1996 Telefonaktiebolaget L M Ericsson Method and system for performing electronic money transactions
6029160, May 24 1995 International Business Machines Corporation Method and means for linking a database system with a system for filing data
6029195, Nov 29 1994 Pinpoint Incorporated System for customized electronic identification of desirable objects
6029201, Aug 01 1997 International Business Machines Corporation Internet application access server apparatus and method
6029245, Mar 25 1997 International Business Machines Corporation Dynamic assignment of security parameters to web pages
6029247, Dec 09 1996 RPX Corporation Method and apparatus for transmitting secured data
6031910, Jul 24 1996 International Business Machines, Corp. Method and system for the secure transmission and storage of protectable information
6031913, Jun 17 1996 Ericsson Inc. Apparatus and method for secure communication based on channel characteristics
6031914, Aug 30 1996 DIGIMARC CORPORATION AN OREGON CORPORATION Method and apparatus for embedding data, including watermarks, in human perceptible images
6032118, Dec 19 1996 RPX CLEARINGHOUSE LLC Virtual private network service provider for asynchronous transfer mode network
6034605, Dec 08 1998 FAMILY TRUSTED PRODUCTS, LLC System/method for secure storage of personal information and for broadcast of the personal information at a time of emergency
6034618, Oct 31 1996 MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD ; Kabushiki Kaisha Toshiba Device authentication system which allows the authentication function to be changed
6034626, Sep 22 1994 Aisin Aw Co., Ltd Navigation system for a vehicle
6035041, Apr 28 1997 CERTCO, INC , A CORPORATION OF DELAWARE Optimal-resilience, proactive, public-key cryptographic system and method
6035276, Oct 17 1997 SINCLAIR ALLISON, INC Medical practitioner credentialing system
6035280, Jun 16 1995 Catalina Marketing Corporation Electronic discount couponing method and apparatus for generating an electronic list of coupons
6035398, Nov 14 1997 DIGITALPERSONA, INC Cryptographic key generation using biometric data
6035402, Dec 20 1996 GTE CyberTrust Solutions Incorporated Virtual certificate authority
6035406, Apr 02 1997 QUINTET, INC Plurality-factor security system
6037870, Feb 25 1998 Dector system for access control, and a detector assembly for implementing such a system
6038315, Mar 17 1997 Lawrence Livermore National Security LLC Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy
6038316, Aug 21 1995 International Business Machines Corporation Method and system for protection of digital information
6038322, Oct 20 1998 Cisco Technology, Inc Group key distribution
6038337, Mar 29 1996 NEC Corporation Method and apparatus for object recognition
6038560, May 21 1997 Oracle International Corporation Concept knowledge base search and retrieval system
6038563, Oct 31 1997 Oracle America, Inc System and method for restricting database access to managed object information using a permissions table that specifies access rights corresponding to user access rights to the managed objects
6038581, Jan 29 1997 Nippon Telegraph and Telephone Corporation Scheme for arithmetic operations in finite field and group operations over elliptic curves realizing improved computational speed
6038665, Mar 12 1998 CDD TECHNOLOGIES, LLC System and method for backing up computer files over a wide area computer network
6038666, Dec 22 1997 Northrop Grumman Systems Corporation Remote identity verification technique using a personal identification device
6039244, Oct 04 1996 AIMIA PROPRIETARY LOYALTY U S INC Method of building up a data bank containing customer data and/or for the organization of a rebate or coupon system
6040783, May 08 1995 LEXISNEXIS RISK SOLUTIONS GA INC System and method for remote, wireless positive identity verification
6041122, Feb 27 1998 HONEYMAN CIPHER SOLUTIONS LLC Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation
6041123, Jul 01 1996 Allsoft Distributing Incorporated Centralized secure communications system
6041349, Feb 29 1996 Hitachi, Ltd. System management/network correspondence display method and system therefor
6041355, Dec 27 1996 Intel Corporation Method for transferring data between a network of computers dynamically based on tag information
6041357, Feb 06 1997 TUMBLEWEED HOLDINGS LLC Common session token system and protocol
6041408, Jun 28 1996 Hitachi, Ltd. Key distribution method and system in secure broadcast communication
6041410, Dec 22 1997 Northrop Grumman Systems Corporation Personal identification fob
6041411, Mar 28 1997 SELFSERVE USA, INC Method for defining and verifying user access rights to a computer information
6041412, Nov 14 1997 Iris Corporation Berhad Apparatus and method for providing access to secured data or area
6042005, Jun 20 1997 BIOMETRX, INC Personal identification and promotional system using personal and medical information
6044131, Jul 26 1995 MedFX Systems Secure digital x-ray image authentication method
6044155, Jun 30 1997 Microsoft Technology Licensing, LLC Method and system for securely archiving core data secrets
6044157, Mar 08 1996 Panasonic Intellectual Property Corporation of America Microprocessor suitable for reproducing AV data while protecting the AV data from illegal copy and image information processing system using the microprocessor
6044205, Feb 29 1996 Intermind Corporation Communications system for transferring information between memories according to processes transferred with the information
6044257, Mar 19 1998 ACTIVECARE, INC Panic button phone
6044349, Jun 19 1998 Intel Corporation Secure and convenient information storage and retrieval method and apparatus
6044350, Dec 24 1998 Pitney Bowes Inc. Certificate meter with selectable indemnification provisions
6044363, Sep 04 1996 Hitachi, Ltd. Automatic auction method
6044388, May 15 1997 RPX Corporation Pseudorandom number generator
6044401, Nov 20 1996 International Business Machines Corporation Network sniffer for monitoring and reporting network information that is not privileged beyond a user's privilege level
6044402, Jul 02 1997 DEWAAY INVESTMENT PARTNERS, LLLP Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections
6044462, Apr 02 1997 PERIMETER LABS, INC Method and apparatus for managing key revocation
6044463, Mar 07 1994 Nippon Telegraph and Telephone Corporation Method and system for message delivery utilizing zero knowledge interactive proof protocol
6044464, May 08 1998 YEDA RESEARCH AND DEVELOPMENT CO LTD AT THE WEIZMANN INSTITUTE OF SCIENCE Method of protecting broadcast data by fingerprinting a common decryption function
6044466, Nov 25 1997 International Business Machines Corp. Flexible and dynamic derivation of permissions
6044468, Aug 25 1997 EMC IP HOLDING COMPANY LLC Secure transmission using an ordinarily insecure network communication protocol such as SNMP
6045039, Feb 06 1997 ATC REALTY FIFTEEN, INC Cardless automated teller transactions
6047051, Nov 11 1996 Nokia Technologies Oy Implementation of charging in a telecommunications system
6047066, Dec 13 1995 Google Technology Holdings LLC Communication method and device
6047067, Apr 28 1994 Citibank, N.A. Electronic-monetary system
6047072, Oct 23 1997 Signals, Inc.; SIGNALS, INC Method for secure key distribution over a nonsecure communications network
6047242, May 28 1997 Fujitsu Siemens Computer Computer system for protecting software and a method for protecting software
6047264, Aug 08 1996 eBay Inc Method for supplying automatic status updates using electronic mail
6047268, Nov 04 1997 HANGER SOLUTIONS, LLC Method and apparatus for billing for transactions conducted over the internet
6047269, Jul 19 1996 Peter, Biffar Self-contained payment system with circulating digital vouchers
6047274, Feb 24 1997 GEOPHONIC NETWORKS, INC Bidding for energy supply
6047322, Dec 29 1997 JPMORGAN CHASE BANK, N A , AS SUCCESSOR AGENT Method and apparatus for quality of service management
6047325, Oct 24 1997 Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks
6047374, Dec 14 1994 Sony Corporation Method and apparatus for embedding authentication information within digital data
6047887, Nov 15 1991 Citibank, N.A. System and method for connecting money modules
6049610, Sep 17 1991 NeXT Software, Inc. Method and apparatus for digital signature authentication
6049612, Mar 10 1997 RPX Corporation File encryption method and system
6049613, Jan 17 1997 Method and apparatus for encrypting, decrypting, and providing privacy for data values
6049627, May 28 1997 Thomson Reuters Global Resources Unlimited Company Covert digital identifying indicia for digital image
6049671, Apr 18 1996 ZHIGU HOLDINGS LIMITED Method for identifying and obtaining computer software from a network computer
6049785, Dec 16 1993 Soverain IP, LLC Open network payment system for providing for authentication of payment orders based on a confirmation electronic mail message
6049786, Jul 22 1997 Unisys Corporation Electronic bill presentment and payment system which deters cheating by employing hashes and digital signatures
6049787, Mar 31 1997 Hitachi, Ltd. Electronic business transaction system with notarization database and means for conducting a notarization procedure
6049838, Jul 01 1996 Sun Microsystems, Inc Persistent distributed capabilities
6049872, May 06 1997 AT&T Corp Method for authenticating a channel in large-scale distributed systems
6049874, Dec 03 1996 CDD TECHNOLOGIES, LLC System and method for backing up computer files over a wide area computer network
6049875, Mar 08 1996 Kabushiki Kaisha Toshiba Security apparatus and method
6052466, Aug 28 1997 CLUSTER, LLC; Optis Wireless Technology, LLC Encryption of data packets using a sequence of private keys generated from a public key exchange
6052467, Mar 27 1995 Microsoft Technology Licensing, LLC System for ensuring that the blinding of secret-key certificates is restricted, even if the issuing protocol is performed in parallel mode
6052468, Jan 15 1998 Activcard Ireland Limited Method of securing a cryptographic key
6052469, Jul 29 1996 International Business Machines Corporation Interoperable cryptographic key recovery system with verification by comparison
6052645, Jul 17 1997 Toyota Jodosha Kabushiki Kaisha Map data distribution system and map data acquisition device suitable for such system
6052688, Jan 26 1995 RPX Corporation Computer-implemented control of access to atomic data items
6052780, Sep 12 1996 RPX Corporation Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
6052788, Oct 17 1996 Network Engineering Software, Inc. Firewall providing enhanced network security and user transparency
6055314, Mar 22 1996 Rovi Technologies Corporation System and method for secure purchase and delivery of video content programs
6055321, Jun 20 1996 International Business Machines Corporation System and method for hiding and extracting message data in multimedia data
6055494, Oct 28 1996 TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF NEW YORK, THE System and method for medical language extraction and encoding
6055506, Apr 25 1997 Unitron Medical Communications, Inc. Outpatient care data system
6055508, Jun 05 1998 YEDA RESEARCH AND DEVELOPMENT CO LTD Method for secure accounting and auditing on a communications network
6055512, Jul 08 1997 Nortel Networks Limited Networked personal customized information and facility services
6055518, Feb 01 1996 AT&T Corporation Secure auction systems
6055575, Jan 10 1997 ASCEND COMMUNICATIONS, INC Virtual private network system and method
6055636, Jan 27 1998 Entrust Technologies, Limited Method and apparatus for centralizing processing of key and certificate life cycle management
6055637, Sep 27 1996 Hewlett Packard Enterprise Development LP System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential
6055639, Oct 10 1997 Unisys Corporation Synchronous message control system in a Kerberos domain
6056197, Feb 19 1997 Canon Kabushiki Kaisha Information recording method for preventing alteration, information recording apparatus, and information recording medium
6056199, Sep 25 1995 Intermec IP Corporation Method and apparatus for storing and reading data
6057872, Jul 09 1997 General Instrument Corporation Digital coupons for pay televisions
6058187, Apr 17 1997 AT&T Corp. Secure telecommunications data transmission
6058188, Jul 24 1997 International Business Machines Corporation Method and apparatus for interoperable validation of key recovery information in a cryptographic system
6058189, Jun 20 1997 Qwyit LLC Method and system for performing secure electronic monetary transactions
6058193, Dec 23 1996 Pitney Bowes Inc. System and method of verifying cryptographic postage evidencing using a fixed key set
6058303, Aug 30 1996 Telefonaktiebolaget L M Ericsson (publ) System and method for subscriber activity supervision
6058379, Jul 11 1997 HANGER SOLUTIONS, LLC Real-time network exchange with seller specified exchange parameters and interactive seller participation
6058381, Oct 30 1996 HYPION NETWORK SRVC, LLC Many-to-many payments system for network content materials
6058383, Jun 27 1996 Kent Ridge Digital Labs Computationally efficient method for trusted and dynamic digital objects dissemination
6061003, Jul 27 1997 Toyota Jidosha Kabushiki Kaisha Map acquisition system, map acquisition unit, and navigation apparatus equipped with a map acquisition unit
6061448, Apr 01 1997 AXWAY INC Method and system for dynamic server document encryption
6061451, Sep 03 1996 Kabushiki Kaisha Toshiba Apparatus and method for receiving and decrypting encrypted data and protecting decrypted data from illegal use
6061454, Jun 27 1997 International Business Machines Corporation System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver
6061665, Jun 06 1997 ENT SERVICES DEVELOPMENT CORPORATION LP System, method and article of manufacture for dynamic negotiation of a network payment framework
6061692, Nov 04 1997 Microsoft Technology Licensing, LLC System and method for administering a meta database as an integral component of an information server
6061729, Dec 31 1997 WSOU Investments, LLC Method and system for communicating service information in an advanced intelligent network
6061789, Jan 12 1996 GOOGLE LLC Secure anonymous information exchange in a network
6061790, Nov 20 1996 Intellisync Corporation Network computer system with remote user data encipher methodology
6061791, May 09 1997 Connotech Experts-Conseils Inc. Initial secret key establishment including facilities for verification of identity
6061792, Apr 01 1997 Microsoft Technology Licensing, LLC System and method for fair exchange of time-independent information goods over a network
6061794, Sep 30 1997 Hewlett Packard Enterprise Development LP System and method for performing secure device communications in a peer-to-peer bus architecture
6061796, Aug 26 1997 SSL SERVICES LLC Multi-access virtual private network
6061797, Oct 21 1996 TREND MICRO INCORPORATED Outside access to computer resources through a firewall
6061798, Feb 06 1996 Network Engineering Software, Inc. Firewall system for protecting network elements connected to a public network
6061799, Oct 31 1997 GOOGLE LLC Removable media for password based authentication in a distributed system
6064723, Sep 16 1994 AVAYA Inc Network-based multimedia communications and directory system and method of operation
6064737, Nov 16 1994 DIGIMARC CORPORATION AN OREGON CORPORATION Anti-piracy system for wireless telephony
6064738, Dec 10 1996 The Research Foundation of State University of New York Method for encrypting and decrypting data using chaotic maps
6064740, Nov 12 1997 Maxim Integrated Products, Inc Method and apparatus for masking modulo exponentiation calculations in an integrated circuit
6064741, Apr 13 1995 Siemens Aktiengesellschaft Method for the computer-aided exchange of cryptographic keys between a user computer unit U and a network computer unit N
6064751, Aug 31 1994 CIC ACQUISITION CORP Document and signature data capture system and method
6064764, Mar 30 1998 Seiko Epson Corporation Fragile watermarks for detecting tampering in images
6064878, Oct 23 1996 AT& T Corp Method for separately permissioned communication
6064968, Aug 25 1998 SCHANZ, STEVEN J Systems, methods and computer program products for identifying unique and common legal requirements for a regulated activity among multiple legal jurisdictions
6064977, Jun 19 1997 GOOGLE LLC Web server with integrated scheduling and calendaring
6065008, Oct 01 1997 Microsoft Technology Licensing, LLC System and method for secure font subset distribution
6065119, May 30 1997 Los Alamos National Security, LLC Data validation
6065675, Jun 30 1997 CARDIS ENTERPRISE INTERNATIONAL N V Processing system and method for a heterogeneous electronic cash environment
6067466, Nov 18 1998 New England Medical Center Hospitals, Inc Diagnostic tool using a predictive instrument
6067620, Jul 30 1996 Round Rock Research, LLC Stand alone security device for computer networks
6068184, Apr 27 1998 Security card and system for use thereof
6069647, Jan 29 1998 Intel Corporation Conditional access and content security method
6069914, Sep 19 1996 NEC Corporation Watermarking of image data using MPEG/JPEG coefficients
6069952, Sep 30 1994 PIRACY PROTECTION LLC Data copyright management system
6069954, May 29 1996 Cryptographic data integrity with serial bit processing and pseudo-random generators
6069955, Apr 14 1998 IBM Corporation System for protection of goods against counterfeiting
6069969, Sep 16 1994 MORPHOTRUST USA, INC Apparatus and method for electronically acquiring fingerprint images
6069970, May 16 1997 Apple Inc Fingerprint sensor and token reader and associated methods
6070118, Mar 15 1996 Toyota Jidosha Kabushiki Kaisha Transmission control system using road data to control the transmission
6070141, May 08 1995 LEXISNEXIS RISK SOLUTIONS GA INC System and method of assessing the quality of an identification transaction using an identificaion quality score
6070239, Dec 08 1995 Sun Microsystems, Inc. System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources
6072870, Jun 17 1996 Hewlett Packard Enterprise Development LP System, method and article of manufacture for a gateway payment architecture utilizing a multichannel, extensible, flexible architecture
6072874, Jan 26 1996 Fuji Xerox Co., Ltd. Signing method and apparatus using the same
6072876, Jul 26 1996 Nippon Telegraph and Telephone Corporation Method and system for depositing private key used in RSA cryptosystem
6072894, Oct 17 1997 HANGER SOLUTIONS, LLC Biometric face recognition for applicant screening
6073106, Oct 30 1997 WELLMED, INC Method of managing and controlling access to personal information
6073125, Jun 26 1997 Pitney Bowes Inc. Token key distribution system controlled acceptance mail payment and evidencing system
6073160, Dec 20 1995 Xerox Corporation Document communications controller
6073172, Jul 14 1997 ARRIS Enterprises, Inc Initializing and reconfiguring a secure network interface
6073234, May 07 1997 Fuji Xerox Co., Ltd. Device for authenticating user's access rights to resources and method
6073236, Jun 28 1996 Sony Corporation Authentication method, communication method, and information processing apparatus
6073237, Nov 06 1997 PayPal, Inc; Paypal International Limited Tamper resistant method and apparatus
6073238, Mar 29 1996 KONINKLIJKE KPN N V Method of securely loading commands in a smart card
6073240, Oct 28 1997 GOOGLE LLC Method and apparatus for realizing computer security
6073242, Mar 19 1998 Microsoft Technology Licensing, LLC Electronic authority server
6075455, Sep 23 1997 UNION NATIONAL BANK AND TRUST COMPANY OF SOUDERTON Biometric time and attendance system with epidermal topographical updating capability
6075852, Feb 10 1995 Nortel Networks Limited Telecommunications system and method for processing call-independent signalling transactions
6075854, Dec 09 1997 WSOU Investments, LLC Fully flexible routing service for an advanced intelligent network
6075860, Feb 19 1997 Hewlett Packard Enterprise Development LP Apparatus and method for authentication and encryption of a remote terminal over a wireless link
6075861, May 29 1996 HANGER SOLUTIONS, LLC Security access system
6075864, Aug 30 1996 Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem
6075865, Jul 01 1998 TecSec Incorporated Cryptographic communication process and apparatus
6076066, Mar 25 1997 Integrated Claims Systems, LLC Attachment integrated claims system and operating method therefor
6076077, Oct 27 1995 PIRACY PROTECTION LLC Data management system
6076078, Feb 14 1996 Carnegie Mellon University Anonymous certified delivery
6076162, Jan 22 1997 International Business Machines Corporation Certification of cryptographic keys for chipcards
6076163, Oct 20 1997 ONBOARD SECURITY, INC Secure user identification based on constrained polynomials
6076164, Sep 03 1996 KDDI Corporation Authentication method and system using IC card
6076166, Jan 17 1997 U S PHILIPS CORPORATION Personalizing hospital intranet web sites
6076167, Dec 04 1996 Activcard Ireland Limited Method and system for improving security in network applications
6078265, Feb 11 1998 Nettel Technologies, Inc. Fingerprint identification security system
6078586, Aug 03 1998 Verizon Patent and Licensing Inc ATM virtual private networks
6078663, Jun 30 1995 Canon Kabushiki Kaisha Communication apparatus and a communication system
6078665, Sep 09 1996 Intelligent Security Systems, Inc. Electronic encryption device and method
6078667, Oct 10 1996 Certicom Corp Generating unique and unpredictable values
6078853, Apr 16 1997 Micro Compact Car smart GmbH Vehicle air conditioning monitoring device
6078909, Nov 19 1997 GOOGLE LLC Method and apparatus for licensing computer programs using a DSA signature
6078946, Sep 10 1996 VERADO HOLDINGS, INC System and method for management of connection oriented networks
6079018, Oct 08 1997 Microsoft Technology Licensing, LLC System and method for generating unique secure values for digitally signing documents
6079020, Jan 27 1998 AVAYA Inc Method and apparatus for managing a virtual private network
6079021, Jun 02 1997 Hewlett Packard Enterprise Development LP Method and apparatus for strengthening passwords for protection of computer systems
6079047, May 22 1998 Unisys Corporation Unwrapping system and method for multiple files of a container
6079621, Nov 13 1998 RAINBOW TECHNOLOGIES, INC Secure card for E-commerce and identification
6081199, Jul 30 1996 Locking device for systems access to which is time-restricted
6081533, Jun 25 1997 ARRIS ENTERPRISES LLC Method and apparatus for an application interface module in a subscriber terminal unit
6081597, Aug 19 1996 ONBOARD SECURITY, INC Public key cryptosystem method and apparatus
6081598, Oct 20 1997 Microsoft Technology Licensing, LLC Cryptographic system and method with fast decryption
6081610, Dec 29 1995 GOOGLE LLC System and method for verifying signatures on documents
6081750, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
6081790, Mar 20 1998 Citibank, N.A.; CITIBANK, N A System and method for secure presentment and payment over open networks
6081793, Dec 30 1997 Lenovo PC International Method and system for secure computer moderated voting
6081893, May 28 1997 CA, INC System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
6081900, Mar 16 1999 MICRO FOCUS SOFTWARE INC Secure intranet access
6082776, May 07 1997 Storing personal medical information
6084510, Apr 18 1997 Danger warning and emergency response system and method
6084969, Dec 31 1997 SSL SERVICES LLC Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network
6085175, Jul 02 1998 Axiom Software Laboratories, Inc. System and method for determining value at risk of a financial portfolio
6085216, Dec 31 1997 HANGER SOLUTIONS, LLC Method and system for efficiently allocating resources for solving computationally hard problems
6088450, Apr 17 1996 Intel Corporation Authentication system based on periodic challenge/response protocol
6091956, Jun 12 1997 LBS INNOVATIONS, LLC Situation information system
6092005, Jul 15 1996 Toyota Jidosha Kabushiki Kaisha Vehicle driving condition prediction device and warning device
6092014, Jul 15 1996 Toyota Jidosha Kabushiki Kaisha Vehicle driving condition prediction device, warning device using the prediction device, and recording medium for storing data for prediction
6092724, Aug 15 1997 NAVY, UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE Secured network system
6098016, Nov 29 1996 Toyota Jidosha Kabushiki Kaisha Dynamic route guidance apparatus
6098051, Apr 27 1995 OPTIMARK HOLDINGS, INC ; OPTIMARK, INC Crossing network utilizing satisfaction density profile
6104101, Mar 25 1997 Lear Automotive Dearborn, Inc Driver interface system for vehicle control parameters and easy to utilize switches
6105873, Dec 12 1996 Swisscom AG Chip card and program for chip cards
6108644, Feb 19 1998 NAVY, UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF, THE System and method for electronic transactions
6108787, Mar 31 1995 The Commonwealth of Australia Method and means for interconnecting different security level networks
6112181, Nov 06 1997 INTERTRUST TECHNOLOGIES CORP Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
6115654, Dec 23 1997 SIMMONDS PRECISION PRODUCTS, INC Universal sensor interface system and method
6118403, Nov 13 1998 INFOMOVE COM, INC Speed trap information system
6118874, Mar 31 1997 Hitachi, LTD; Fujitsu Limited; OKAMOTO, EIJI; MAMBO, MASAHIRO Encrypted data recovery method using split storage key and system thereof
6119229, Apr 11 1997 HANGER SOLUTIONS, LLC Virtual property system
6125186, Nov 28 1996 Fujitsu Limited Encryption communication system using an agent and a storage medium for storing that agent
6128391, Sep 22 1997 VISA INTERNATIONAL SERVICE ASSOCIATION, A DE CORP Method and apparatus for asymetric key management in a cryptographic system
6131087, Nov 05 1997 The Planning Solutions Group, Inc. Method for automatically identifying, matching, and near-matching buyers and sellers in electronic market transactions
6131090, Mar 04 1997 Pitney Bowes Inc. Method and system for providing controlled access to information stored on a portable recording medium
6134326, Nov 18 1996 MICALI, SILVIO Simultaneous electronic transactions
6134328, Aug 21 1995 Pitney Bowes Inc. Secure user certification for electronic commerce employing value metering system
6134536, May 29 1992 Alice Corporation Pty Ltd Methods and apparatus relating to the formulation and trading of risk management contracts
6134647, Mar 25 1997 Sun Microsystems, Inc. Computing system having multiple nodes coupled in series in a closed loop
6137884, Mar 21 1995 DOCUSIGN, INC Simultaneous electronic transactions with visible trusted parties
6138107, Jan 04 1996 Meta Platforms, Inc Method and apparatus for providing electronic accounts over a public network
6138119, Feb 25 1997 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
6141423, Oct 04 1993 FISCHER, ADDISON M Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets
6141750, Mar 21 1995 MICALI, SILVIO Simultaneous electronic transactions with subscriber verification
6141755, Apr 13 1998 The United States of America as represented by the Director of the Firewall security apparatus for high-speed circuit switched networks
6141758, Jul 14 1997 International Business Machines Corporation Method and system for maintaining client server security associations in a distributed computing system
6144336, May 19 1998 AIRBIQUITY INC System and method to communicate time stamped, 3-axis geo-position data within telecommunication networks
6145079, Mar 06 1998 Deloitte & Touche USA LLP Secure electronic transactions using a trusted intermediary to perform electronic services
6147598, Jul 03 1997 Trimble Navigation Limited Vehicle theft system including a handheld computing device
6148338, Apr 03 1998 Hewlett Packard Enterprise Development LP System for logging and enabling ordered retrieval of management events
6148342, Jan 27 1998 Secure database management system for confidential records using separately encrypted identifier and access request
6149440, Sep 18 1998 VITAL LINK FINANCIAL SERVICES, LLC Methods and apparatus for authenticating informed consent
6151309, Apr 28 1994 British Telecommunications public limited company Service provision system for communications networks
6151395, Dec 04 1997 Cisco Technology, Inc System and method for regenerating secret keys in diffie-hellman communication sessions
6151589, Sep 10 1998 eBay Inc Methods for performing large scale auctions and online negotiations
6157721, Aug 12 1996 INTERTRUST TECHNOLOGIES CORP Systems and methods using cryptography to protect secure computing environments
6157914, Feb 21 1992 Kabushiki Kaisha Toshiba Medical support system
6158010, Oct 28 1998 Oracle International Corporation System and method for maintaining security in a distributed computer network
6161099, May 29 1997 MuniAuction, Inc.; MUNIAUCTION, INC Process and apparatus for conducting auctions over electronic networks
6161139, Jul 10 1998 ENTRUST, INC Administrative roles that govern access to administrative functions
6161181, Mar 06 1998 Deloitte & Touche USA LLP Secure electronic transactions using a trusted intermediary
6163607, Apr 09 1998 AVAYA Inc Optimizing call-center performance by using predictive data to distribute agents among calls
6163701, Jul 25 1997 Google Technology Holdings LLC System and method for providing location information of a mobile station in a communication system
6167386, Jun 05 1998 HANGER SOLUTIONS, LLC Method for conducting an on-line bidding session with bid pooling
6167522, Apr 01 1997 Oracle America, Inc Method and apparatus for providing security for servers executing application programs received via a network
6169476, Feb 18 1997 DISASTER WARNING NETWORK, INC Early warning system for natural and manmade disasters
6169789, Dec 16 1996 SMART MOBILE TECHNOLOGIES LLC Intelligent keyboard system
6169802, Dec 17 1996 Google Technology Holdings LLC Dynamic private key security system for personal messaging devices
6169805, Feb 28 1997 International Business Machines Corporation System and method of operation for providing user's security on-demand over insecure networks
6173159, Jun 25 1999 Harris Corporation Wireless spread spectrum ground link-based aircraft data communication system for updating flight management files
6174262, Oct 09 1998 Toyota Jidosha Kabushiki Kaisha Control device for an automatic transmission
6175626, Sep 29 1995 Intel Corporation Digital certificates containing multimedia data extensions
6175803, Aug 04 1998 Ford Global Technologies, Inc. Vehicle navigation route generation with user selectable risk avoidance
6175831, Jan 17 1997 DEGREES OF CONNECTION LLC Method and apparatus for constructing a networking database and system
6178377, Sep 20 1996 Toyota Jidosha Kabushiki Kaisha Positional information providing system and apparatus
6182000, Dec 24 1996 Toyota Jidosha Kabushiki Kaisha Control system for transmissions
6185514, Apr 17 1995 RAKUTEN, INC Time and work tracker with hardware abstraction layer
6185683, Feb 13 1995 Intertrust Technologies Corp. Trusted and secure techniques, systems and methods for item delivery and execution
6189026, Jun 16 1997 GOOGLE LLC Technique for dynamically generating an address book in a distributed electronic mail system
6192472, Sep 12 1997 International Business Machines Corporation Method and apparatus for the secure distributed storage and retrieval of information
6192473, Dec 24 1996 Pitney Bowes Inc.; Pitney Bowes Inc System and method for mutual authentication and secure communications between a postage security device and a meter server
6192476, Dec 11 1997 Oracle America, Inc Controlling access to a resource
6195698, Apr 13 1998 GOOGLE LLC Method for selectively restricting access to computer systems
6199001, Dec 19 1996 Toyota Jidosha Kabushiki Kaisha Control system for controlling the behavior of a vehicle based on accurately detected route information
6199050, Sep 18 1998 ARIBA, INC Method and system for bidding in electronic auctions using flexible bidder-determined line-item guidelines
6199102, Aug 26 1997 GOOGLE LLC Method and system for filtering electronic messages
6201493, May 28 1999 Lucent Technologies Inc Radar detector arrangement
6202022, Sep 25 1997 Toyota Jidosha Kabushiki Kaisha Vehicle-use data processing system, on-vehicle terminal device constituting such system, and navigation device
6202058, Apr 25 1994 Apple Inc System for ranking the relevance of information objects accessed by computer users
6220986, Aug 01 1997 AISIN AW CO , LTD ; Toyota Jidosha Kabushiki Kaisha Vehicle control system for suppressing shift determinations at a corner using road data
6225901, Mar 07 1997 HEALTHCARE FINANCIAL SOLUTIONS, LLC, AS SUCCESSOR AGENT Reprogrammable remote sensor monitoring system
6226383, Apr 17 1996 KINGLITE HOLDINGS INC Cryptographic methods for remote authentication
6226618, Aug 13 1998 Level 3 Communications, LLC Electronic content delivery system
6230098, Sep 17 1997 Toyota Jidosha Kabushiki Kaisha Map data processing apparatus and method, and map data processing system
6230146, Sep 21 1998 ARIBA, INC ; ARIBA, INC , A DELAWARE CORPORATION Method and system for controlling closing times of electronic auctions involving multiple lots
6230501, Apr 14 1994 PROMXD TECHNOLOGY, INC Ergonomic systems and methods providing intelligent adaptive surfaces and temperature control
6233520, Feb 13 1998 Toyota Jidosha Kabushiki Kaisha; AISIN AW CO , LTD ; Denso Corporation; Fujitsu Ten Limited; MATSUSHITA ELECTRIC INDUSTRIAL CO LTD ; MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD Map data access method for navigation and navigation system
6236977, Jan 04 1999 Acacia Research Group LLC Computer implemented marketing system
6240411, Jun 15 1998 AMDOCS DEVELOPMENT LIMITED; Amdocs Software Systems Limited Integrating campaign management and data mining
6243691, Mar 29 1996 eBay Inc Method and system for processing and transmitting electronic auction information
6249873, Feb 28 1997 EMC IP HOLDING COMPANY LLC Method of and apparatus for providing secure distributed directory services and public key infrastructure
6252544, Jan 25 1999 Mobile communication device
6255942, Mar 19 1998 AT&T Corp Wireless communications platform
6260024, Dec 02 1998 Red Hat, Inc Method and apparatus for facilitating buyer-driven purchase orders on a commercial network system
6263334, Nov 11 1998 Microsoft Technology Licensing, LLC Density-based indexing method for efficient execution of high dimensional nearest-neighbor queries on large databases
6266652, Aug 26 1996 ADB SYSTEM INTERNATIONAL, INC Computer auction system
6266692, Jan 04 1999 TREND MICRO INCORPORATED Method for blocking all unwanted e-mail (SPAM) using a header-based password
6272473, Oct 27 1998 SCIQUEST, INC Method, apparatus, and embodied data structures for optimal anytime winner determination in combinatorial auction-type problems
6272474, Feb 08 1999 Method for monitoring and trading stocks via the internet displaying bid/ask trade bars
6285867, Oct 16 1998 SECUREALERT, INC Combination emergency phone and personal audio device
6292736, Aug 08 1997 AISIN AW CO , LTD ; Toyota Jidosha Kabushiki Kaisha Vehicle control system and recording media recorded with programs for the system
6292743, Jan 06 1999 Infogation Corporation Mobile navigation system
6292787, Sep 11 1998 FINANCIAL ENGINES, INC Enhancing utility and diversifying model risk in a portfolio optimization framework
6304758, Feb 25 1997 Sirius XM Connected Vehicle Services Inc Method and system for providing and transmitting individualized traffic information
6308072, Apr 26 1996 Motorola, Inc Method and apparatus for controlling a wireless communication system
6321212, Jul 21 1999 Longitude LLC Financial products having a demand-based, adjustable return, and trading exchange therefor
6321267,
6321339,
6324519, Mar 12 1999 PRIME RESEARCH ALLIANCE E , INC , A CORPORATION OF BRITISH VIRGIN ISLANDS Advertisement auction system
6330551, Aug 06 1998 CYBERSETTLE HOLDING, INC Computerized dispute resolution system and method
6331986, Apr 24 1998 Lucent Technologies Inc.; Lucent Technologies Inc Method for resource allocation and routing in multi-service virtual private networks
6333980, Sep 28 1994 FIRSTPOINT CONTACT TECHNOLOGIES, LLC Automatic call distributor and method for routing incoming telephone calls based on proficiency ratings of agents
6338011, Jan 11 2000 Solipsys Corporation Method and apparatus for sharing vehicle telemetry data among a plurality of users over a communications network
6340928, Jun 22 2000 TRW Inc. Emergency assistance system using bluetooth technology
6353679, Nov 03 1998 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Sample refinement method of multiple mode probability density estimation
6356822, Nov 05 1998 OCC TECHNOLOGIES, LLC Land vehicle communications system and process for providing information and coordinating vehicle activities
6359270, Sep 04 1998 SAROS LICENSING LLC Communications module mounting for domestic appliance
6359571, Oct 13 1998 Hitachi, Ltd.; Xanavi Informatics Corp. Broadcasting type information providing system and travel environment information collecting device
6360222, May 06 1998 Oracle International Corporation Method and system thereof for organizing and updating an information directory based on relationships between users
6366907, Dec 15 1999 MOON GLOW, SERIES 82 OF ALLIED SECURITY TRUST I Real-time search engine
6377809, Sep 16 1997 Qualcomm Incorporated Channel structure for communication systems
6384739, May 10 1999 Bellsouth Intellectual Property Corporation Traffic monitoring system and method
6389400, Aug 20 1998 SBC Technology Resources, Inc. System and methods for intelligent routing of customer requests using customer and agent models
6393276, Jan 12 2000 CLUSTER, LLC; Optis Wireless Technology, LLC Mobile station assisted forward link open loop power and rate control in a CDMA system
6393465, Nov 25 1997 Nixmail Corporation Junk electronic mail detector and eliminator
6397141, Nov 17 1997 Definiens AG Method and device for signalling local traffic delays
6397167, Apr 17 1995 RAKUTEN, INC Time and activity tracker with hardware abstraction layer
6398245, Aug 13 1998 Level 3 Communications, LLC Key management system for digital content player
6400996, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Adaptive pattern recognition based control system and method
6401027, Mar 19 1999 STRATEGIC DESIGN FEDERATION W, INC Remote road traffic data collection and intelligent vehicle highway system
6411221, Feb 27 1997 Device and method to detect an object in a given area, especially vehicles, for the purpose of traffic control
6411889, Sep 08 2000 Mitsubishi Denki Kabushiki Kaisha; Massachusetts Institute of Technology Integrated traffic monitoring assistance, and communications system
6415151, Jul 06 1998 Siemens Aktiengesellschaft Method and mobile radio telephone network for handling a packet data service
6415156, Sep 10 1998 Swisscom AG Transaction method
6418367, Oct 08 1999 Nissan Motor Co., Ltd. Engine transmission control system
6418424, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
6429812, Jan 27 1998 Mobile communication device
6430537, Mar 31 1998 Meta Platforms, Inc Method and apparatus for priority-based jukebox queuing
6430690, Jan 30 1998 Certicom Corp Secure one-way authentication communication system
6434380, Dec 13 1999 Unwired Planet, LLC Dynamic negotiation of resources for user equipment in wireless communications system
6436005, Jun 18 1998 Cummins Engine Company, Inc System for controlling drivetrain components to achieve fuel efficiency goals
6438694, Oct 27 1994 PIRACY PROTECTION LLC Apparatus for data copyright management system
6442473, Jan 28 1999 GOOGLE LLC Method and apparatus for presenting traffic information in a vehicle
6443841, Sep 21 1994 Communications system using bets
6445308, Jan 12 1999 Toyota Jidosha Kabushiki Kaisha Positional data utilizing inter-vehicle communication method and traveling control apparatus
6449535, Jan 28 1997 TALKING QUICK TIPS, INC Method and system for adjusting a function in a vehicle
6449612, Mar 17 1998 Microsoft Technology Licensing, LLC Varying cluster number in a scalable clustering system for use with large databases
6452565, Oct 29 1999 Microsoft Technology Licensing, LLC Steerable-beam multiple-feed dielectric resonator antenna
6459881, Dec 02 1996 T-Mobile Deutschland GmbH Repeater for radio signals
6463454, Jun 17 1999 Level 3 Communications, LLC System and method for integrated load distribution and resource management on internet environment
6466977, May 06 1999 Cisco Technology, Inc Proxy on demand
6470265, Dec 25 1997 Toyota Jidosha Kabushiki Kaisha Method and apparatus for processing digital map data
6473688, Aug 29 2000 Mitsubishi Denki Kabushiki Kaisha Traffic information transmitting system, traffic information collecting and distributing system and traffic information collecting and distributing method
6480587, Jun 04 1999 SMART MOBILE TECHNOLOGIES LLC Intelligent keyboard system
6480753, Sep 04 1998 SAROS LICENSING LLC Communications, particularly in the domestic environment
6484088, May 04 1999 SSI Technologies, Inc. Fuel optimization system with improved fuel level sensor
6487541, Jan 22 1999 International Business Machines Corporation System and method for collaborative filtering with applications to e-commerce
6487542, Aug 14 1997 Hitachi, Ltd. Method and apparatus for managing electronic money and storage for storing an electronic money management program
6493682, Sep 15 1998 Pendelton Trading Systems, Inc. Optimal order choice: evaluating uncertain discounted trading alternatives
6499018, Sep 18 1998 ARIBA, INC A DELAWARE CORPORATION Method and system for controlling bidding in electronic auctions using bidder-specific bid limitations
6501765, Sep 01 1998 AT&T INTELLECTUAL PROPERTY II, L P ; AT&T PROPERTIES, LLC, A NEVADA FORMATION Distributed method and apparatus for allocating a communication medium
6503170, Aug 20 1999 Toyota Jidosha Kabushiki Kaisha Control device for an automatic transmission
6507739, Jun 26 2000 CDC PROPRIETE INTELLECTUELLE Apparatus and methods for controlling a cellular communications network having airborne transceivers
6519702, Jan 22 1999 Oracle America, Inc Method and apparatus for limiting security attacks via data copied into computer memory
6522946, Mar 27 1997 CEC ENTERTAINMENT CONCEPTS, L P Automatic token dispensing apparatus and method
6530537, Feb 07 2001 Joy Global Underground Mining LLC Movable electric machinery having a trailing cable extending through a hinged sheave bracket assembly
6542742, Apr 01 1998 Telefonaktiebolaget LM Ericsson (publ) Cell selection in mobile radio systems
6546416, Dec 09 1998 GOOGLE LLC Method and system for selectively blocking delivery of bulk electronic mail
6556548, Aug 07 1919 RPX CLEARINGHOUSE LLC Method of allocating resources in a telecommunications network
6556951, Nov 26 1997 GOVERNMENT OF THE UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE DEPARTMENT OF HEALTH AND HUMAN SERVICES, THE System and method for intelligent quality control of a process
6557756, Sep 04 1998 SAROS LICENSING LLC Communications, particularly in the domestic environment
6560580, Dec 13 1996 CANTOR FITZGERALD, L P ; CFPH, LLC Automated auction protocol processor
6564192, Jun 08 1999 ARIBA, INC A DELAWARE CORPORATION Method and system for differential index bidding in online auctions
6570980, Oct 11 1999 Alcatel Method of distributing telephone calls to ordered agents
6571277, Oct 19 1999 GOOGLE LLC Method and apparatus for scaling universal plug and play networks using atomic proxy replication
6581008, Apr 18 2000 Carmel Systems LLC Space weather prediction system and method
6587837, Aug 13 1998 Level 3 Communications, LLC Method for delivering electronic content from an online store
6587946, Dec 29 1998 WSOU Investments, LLC Method and system for quorum controlled asymmetric proxy encryption
6591232, Jun 08 1999 Sikorsky Aircraft Corporation Method of selecting an optimum mix of resources to maximize an outcome while minimizing risk
6601036, Mar 21 1997 PayPal, Inc System and method for dynamic assembly of packages in retail environments
6606607, Jun 17 1999 MCJ Ventures, Inc. Individualized, real-time, interactive e-commerce auction
6609112, May 20 1999 LIQUIDITY SERVICES, INC System and method for providing proxy-based online Dutch auction services
6609114, Oct 24 1996 Sandisk IL Ltd System for safe collection of payment including electronic payment receipt generators having electronic purses
6611812, Aug 13 1998 Wistron Corporation Secure electronic content distribution on CDS and DVDs
6622116, Apr 17 1995 RAKUTEN, INC Time and activity tracker
6625734, Apr 26 1999 CHECK POINT SOFTWARE TECHNOLOGIES, INC Controlling and tracking access to disseminated information
6629082, Jun 15 1999 W R HAMBRECHT + CO , INC Auction system and method for pricing and allocation during capital formation
6639898, May 25 1999 XRS Corporation Wide area mobile communication networks with multiple routing mode options
6639982, Aug 12 1999 SIX SIGMA, INC Method and apparatus for agent forcing and call distribution for large team call servicing
6640145, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Media recording device with packet data interface
6641050, Nov 06 2001 KYNDRYL, INC Secure credit card
6647373, Dec 27 1998 HANGER SOLUTIONS, LLC Method and system for processing and transmitting electronic reverse auction information
6654459, May 25 1999 AT&T Corp. Enhanced agent authentication in virtual contact center
6654806, Apr 09 1999 Oracle America, Inc Method and apparatus for adaptably providing data to a network environment
6658467, Sep 08 1999 c4cast.com, Inc.; C4CAST COM, INC Provision of informational resources over an electronic network
6661379, Jan 08 1999 SKYHOOK HOLDING, INC Antenna selection method for a wireless location system
6662141, Jan 13 1995 Traffic safety prediction model
6665705, Oct 19 1999 GOOGLE LLC Method and apparatus for proxy replication
6671759, Jun 18 1999 Sony Corporation Apparatus and method for mapping IEEE 1394 node IDS to unchanging node unique IDS to maintain continuity across bus resets
6678245, Jan 30 1998 Lucent Technologies Inc Packet network performance management
6683945, Dec 28 2000 Bellsouth Intellectual Property Corporation Routing data based on comparative income values
6684250, Apr 03 2000 DEUTSCHE BANK AG NEW YORK BRANCH Method and apparatus for estimating a geographic location of a networked entity
6687822, Jun 11 1999 WSOU Investments, LLC Method and system for providing translation certificates
6691156, Mar 10 2000 TREND MICRO INCORPORATED Method for restricting delivery of unsolicited E-mail
6704713, May 23 1996 LIVE NATION ENTERTAINMENT, INCORPORATED Computer controlled event ticket auctioning system
6711253, Feb 04 2000 AVAYA Inc Method and apparatus for analyzing performance data in a call center
6712701, Mar 01 2000 ODS Properties, Inc Electronic book interactive wagering system
6718312, Oct 12 1999 AUSUBEL, LAWRENCE M; CRAMTON, PETER C; MCAFEE, R PRESTON; MILGROM, PAUL R ; ROTH, ALVIN E; WILSON, ROBERT B Method and system for combinatorial auctions with bid composition restrictions
6728266, Dec 23 1999 CIENA LUXEMBOURG S A R L ; Ciena Corporation Pricing mechanism for resource control in a communications network
6736322, Nov 20 2000 SAMSUNG ELECTRONICS CO , LTD Method and apparatus for acquiring, maintaining, and using information to be communicated in bar code form with a mobile communications device
6754169, Dec 13 2001 Google Technology Holdings LLC Method and system of operation for a variable transmission mode multi-carrier communication system
6754643, Oct 03 2000 National Technology & Engineering Solutions of Sandia, LLC Adaptive method with intercessory feedback control for an intelligent agent
6766307, May 11 1999 NATIONAL ARBITRATION AND MEDIATION, LLC System and method for providing complete non-judicial dispute resolution management and operation
6772171, May 04 1998 IBM Corporation Method and device for creating an object in a non-persistent memory and/or keeping accessibility to said object
6779111, May 10 1999 Telefonaktiebolaget LM Ericsson Indirect public-key encryption
6785606, Apr 19 1999 TRAFFIC INFORMATION, LLC System for providing traffic information
6785671, Dec 08 1999 A9 COM, INC System and method for locating web-based product offerings
6791472, Jan 27 1998 Mobile communication device
6792399, Sep 08 1999 c4cast.com, Inc.; C4CAST COM INC Combination forecasting using clusterization
6799165, Jul 28 1998 Amazon Technologies, Inc Apparatus and methods for inventory, sale, and delivery of digitally transferable goods
6804345, Sep 18 1997 AT&T Corp Virtual contact center with flexible staffing control
6834110, Dec 10 1999 International Business Machines Corporation Multi-tier digital TV programming for content distribution
6834272, Aug 10 1999 Yeda Research and Development Company Ltd Privacy preserving negotiation and computation
6834811, Apr 01 2003 VALTRUS INNOVATIONS LIMITED Market-based temperature control system and method
6842463, Jul 14 2000 RPX CLEARINGHOUSE LLC Automated and adaptive management of bandwidth capacity in telecommunications networks
6842515, Jun 12 2001 Wilmington Trust, National Association, as Administrative Agent Multi-site responsibility-based routing
6845367, Dec 23 1999 eBay Inc Process and device for internet payments by means of security modules
6847939, Nov 18 1999 OLSALE COM LTD System and method of conducting on-line auctions
6850252, Oct 05 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Intelligent electronic appliance system and method
6850502, Oct 30 2000 Intel Corporation Join process method for admitting a node to a wireless mesh network
6859533, Apr 06 1999 CONTENTGUARD HOLDINGS, INC System and method for transferring the right to decode messages in a symmetric encoding scheme
6865559, Dec 07 2000 International Business Machines Corporation Method and system in electronic commerce for inspection-service-based release of escrowed payments
6865825, Apr 14 1994 ProMDX Technology, Inc. Ergonomic systems and methods providing intelligent adaptive surfaces and temperature control
6868525, May 26 2000 RELATIVITY DISPLAY LLC Computer graphic display visualization system and method
6876309, Nov 21 1994 BGC PARTNERS, L P Bond trading system
6886102, Jul 14 1999 CA, INC System and method for protecting a computer network against denial of service attacks
6901446, Feb 28 2001 Microsoft Technology Licensing, LLC System and method for describing and automatically managing resources
6926796, Jan 29 1999 Panasonic Corporation Electronic parts mounting method and device therefor
6928261, Nov 09 2000 ANCHOR WALL SYSTEMS, INC Music data distribution system and method, and storage medium storing program realizing such method
6931538, Sep 24 1999 ZEROSOFT CORPORATION Portable personal authentication apparatus and electronic system to which access is permitted by the same
6934249, Apr 01 1997 Cisco Technology, Inc. Method and system for minimizing the connection set up time in high speed packet switching networks
6937726, Apr 06 1999 CONTENTGUARD HOLDINGS, INC System and method for protecting data files by periodically refreshing a decryption key
6944663, Mar 06 2002 Oracle America, Inc Method and apparatus for using client puzzles to protect against denial-of-service attacks
6954731, Jun 27 2000 TERADATA US, INC Methods and system for optimizing a campaign
6954931, Jul 13 2001 Honeywell International, Inc. Resource allocation
6955605, Jun 27 2000 Electronic Arts Inc. Episodic delivery of content
6956835, Jan 20 2000 Ericsson AB Multi-carrier arrangement for high speed data
6958986, Jan 10 2002 STINGRAY IP SOLUTIONS LLC Wireless communication system with enhanced time slot allocation and interference avoidance/mitigation features and related methods
6959288, Aug 13 1998 International Business Machines Corporation Digital content preparation system
6959388, Oct 25 1999 AT&T Corporation Method for generating many-time restrictive blind signatures
6968323, Oct 05 2000 International Business Machines Corporation Dynamic allocation and pricing of resources of web server farm
6974412, May 24 2001 Minnesota Scientific, Inc. Cam-wedge locking mechanism
6978126, Jun 07 1999 Gentex Corporation Transceiver with closed loop control of antenna tuning and power level
6978252, Apr 18 2000 Intellectual Ventures I LLC Method and system for transacting with network traffic
7003485, May 07 1999 F POSZAT HU, L L C Ticket auction
7003499, Feb 09 2000 France Telecom SA Service activation by virtual prepaid card
7006881, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Media recording device with remote graphic user interface
7016870, Dec 02 1997 Financial Engines Identifying a recommended portfolio of financial products for an investor based upon financial products that are available to the investor
7023979, Mar 07 2002 PATENT ARMORY INC Telephony control system with intelligent call routing
7036146, Oct 03 2000 National Technology & Engineering Solutions of Sandia, LLC System and method for secure group transactions
7039598, Mar 02 2001 Verizon Patent and Licensing Inc Method of estimating expected revenues from business directory books
7043245, Dec 16 2000 LG-ERICSSON CO , LTD Call processing method during termination busy state of terminal in radio intelligent network system
7043759, Sep 07 2000 RIVERBED TECHNOLOGY LLC Architecture to thwart denial of service attacks
7044362, Oct 10 2001 VALTRUS INNOVATIONS LIMITED Electronic ticketing system and method
7047242, Mar 31 1999 Apple Inc Weighted term ranking for on-line query tool
7062458, Dec 02 1997 Financial Engines User Interface for a financial advisory system that allows an end user to interactively explore tradeoffs among input decisions
7062461, May 18 1999 EFFICIENT AUCTINS LLC System and method for an efficient dynamic multi-unit auction
7069308, Jun 16 2003 Meta Platforms, Inc System, method and apparatus for connecting users in an online computer system based on their relationships within social networks
7072942, Feb 04 2000 Microsoft Technology Licensing, LLC Email filtering methods and systems
7075902, Feb 11 2002 HRL Laboratories, LLC Apparatus, method, and computer program product for wireless networking using directional signaling
7076553, Oct 26 2000 Intel Corporation Method and apparatus for real-time parallel delivery of segments of a large payload file
7085682, Sep 18 2002 GOOGLE LLC System and method for analyzing website activity
7096197, Dec 30 1999 General Electric Company Methods and apparatus for simulating competitive bidding yield
7099839, Sep 08 1999 Primex Holdings, LLC Opening price process for trading system
7103565, Aug 27 1999 TECHVENTURE ASSOCIATES, INC Initial product offering system
7103580, Mar 30 2000 VOXAGE LTD Negotiation using intelligent agents
7107706, Aug 14 1997 ProMDX Technology, Inc. Ergonomic systems and methods providing intelligent adaptive surfaces and temperature control
7110525, Jun 25 2001 Agent training sensitive call routing system
7113780, Mar 06 1992 GOGO LLC System for integrating an airborne wireless cellular network with terrestrial wireless cellular networks and the public switched telephone network
7113927, Oct 09 1998 RAKUTEN, INC DATA DISTRIBUTION SYSTEM, DATA DISTRIBUTION METHOD, PORTABLE TERMINAL WITH DATA RECEIVING CAPABILITY, PORTABLE TERMINAL WITH DATA TRANSMITTING/RECEIVING CAPABILITY, RECORDING MEDIUM ONTO WHICH DATA CONTENT IS RECORDED, ENCODING APPARATUS, AND DECODING APPARATUS
7124440, Sep 07 2000 RIVERBED TECHNOLOGY LLC Monitoring network traffic denial of service attacks
7130579, Oct 21 1999 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED Adaptive radio transceiver with a wide tuning range VCO
7133841, Apr 17 2000 REGENTS OF THE UNIVERSITY OF MICHIGAN, THE Method and computer system for conducting a progressive, price-driven combinatorial auction
7136710, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
7142523, Jul 31 2000 Lucent Technologies, INC Methods and apparatus for design, adjustment or operation of wireless networks using pre-frequency-assignment optimization
7143434, Nov 06 1998 THE TRUSTEES OF COLUMBIA UNIVESITY IN THE CITY OF NEW YORK Video description system and method
7149801, Nov 08 2002 Microsoft Technology Licensing, LLC Memory bound functions for spam deterrence and the like
7162035, May 24 2000 Copilot Ventures Fund III LLC Authentication method and system
7162639, Oct 25 1999 AT & T Corp. Method for generating many-time restrictive blind signatures
7165046, May 18 2000 Efficient Auctions LLC System and method for an efficient dynamic multi-unit auction
7181017, Mar 23 2001 RPX Corporation System and method for secure three-party communications
7184540, Nov 26 2002 Wilmington Trust, National Association, as Administrative Agent Personality based matching of callers to agents in a communication system
7184777, Nov 27 2002 Cisco Technology, Inc Server and multiple sensor system for monitoring activity in a shared radio frequency band
7194515, Dec 09 1998 GOOGLE LLC Method and system for selectively blocking delivery of bulk electronic mail
7197639, Feb 05 1999 EMC IP HOLDING COMPANY LLC Cryptographic countermeasures against connection depletion attacks
7200219, Feb 10 1999 AVAYA Inc Dynamically allocating server resources to competing classes of work based upon achievement of service goals
7200571, Sep 21 1999 SCHOENECKERS, INC ; BI Performance Services Computerized auction system for use with multiple purchasing media
7204041, Aug 14 1997 ProMDX Technology, Inc. Ergonomic systems and methods providing intelligent adaptive surfaces
7206762, Mar 28 2000 DERIV COM LIMITED Betting system and method
7206814, Oct 09 2003 Proofpoint, Inc Method and system for categorizing and processing e-mails
7212634, Jul 23 1999 British Telecommunications plc Data distribution
7213260, Mar 08 2002 JPMORGAN CHASE BANK, N A , AS ADMINISTRATIVE AGENT Systems and methods for upstream threat pushback
7219225, Feb 19 1999 NOKIA SOLUTIONS AND NETWORKS OY Network arrangement for communication
7219449, May 03 1999 ProMDX Technology, Inc. Adaptively controlled footwear
7240036, Jul 13 2000 Aeritas, LLC Method and system for facilitation of wireless e-commerce transactions
7242988, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
7246164, May 10 2001 WHOGLUE INC Distributed personal relationship information management system and methods
7248841, Jun 13 2000 Comcast Cable Communications, LLC Method and apparatus for optimization of wireless multipoint electromagnetic communication networks
7249027, Jan 04 1996 Efficient Auctions LLC Computer implemented methods and apparatus for auctions
7249069, Aug 27 2001 United Parcel Service of America, Inc International cash-on-delivery system and method
7249081, Feb 23 2000 EDELMAN FINANCIAL ENGINES, LLC Load aware optimization
7249085, Mar 31 1999 ARIBA, INC , A CORP OF DELAWARE Method and system for conducting electronic auctions with multi-parameter price equalization bidding
7249175, Nov 23 1999 Escom Corporation Method and system for blocking e-mail having a nonexistent sender address
7251589, May 09 2005 SAS INSTITUTE INC Computer-implemented system and method for generating forecasts
7263607, Jun 12 2003 Microsoft Technology Licensing, LLC Categorizing electronic messages based on trust between electronic messaging entities
7264069, Oct 11 2004 Briggs and Stratton Corporation Vehicle or lawn and garden maintenance equipment having a generator, and power takeoff assembly for a vehicle or lawn and garden maintenance equipment
7268700, Jan 27 1998 Mobile communication device
7269253, Mar 07 2002 PATENT ARMORY INC Telephony control system with intelligent call routing
7271737, Jan 27 1998 Mobile communication device
7278159, Sep 07 2000 RIVERBED TECHNOLOGY LLC Coordinated thwarting of denial of service attacks
7286665, Apr 06 1999 Xerox Corporation System and method for transferring the right to decode messages
7287007, Mar 18 1999 Two-part pricing of differentiated goods
7290033, Apr 18 2003 YAHOO ASSETS LLC Sorting electronic messages using attributes of the sender address
7290132, Sep 06 2001 Microsoft Technology Licensing, LLC Establishing secure peer networking in trust webs on open networks using shared secret device key
7295806, May 30 2003 Microsoft Technology Licensing, LLC Using directional antennas to enhance wireless mesh networks
7298289, Jan 27 1998 Mobile communication device
7305445, Jan 28 2003 Microsoft Technology Licensing, LLC Indirect disposable email addressing
7310660, Jun 25 2002 Engate Technology Corporation Method for removing unsolicited e-mail messages
7319973, Mar 02 2001 Verizon Patent and Licensing Inc Method of estimating expected revenues from business directory books
7321871, Sep 11 1998 FINANCIAL ENGINES, INC Enhancing utility and diversifying model risk in a portfolio optimization framework
7324971, May 29 2002 Blind perturbation encryption method for protecting financial position information while providing risk transparency
7328187, Feb 16 2000 STAR BANK CO , LTD System and method for issuing cyber payment means marked with business identification information and processing transactions with the cyber payment means on computer network
7328188, Jul 12 1999 ELECTRONIC TAX-FREE SHOPPING LIMITED Dynamic currency conversion for card payment systems
7330826, Jul 09 1999 HSBC UK BANK PLC Method, system and business model for a buyer's auction with near perfect information using the internet
7334720, Nov 25 1999 SMARTFLASH LLC Data storage and access systems
7337139, Jan 04 1996 Efficient Auctions LLC Ascending bid auction for multiple auctions
7337195, Dec 31 2002 Meta Platforms, Inc Method and device for establishing synchronized recovery log points
7337324, Dec 01 2003 Microsoft Technology Licensing, LLC System and method for non-interactive human answerable challenges
7337332, Oct 24 2000 SYNAMEDIA LIMITED Transferring electronic content
7339992, Dec 06 2002 TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF NEW YORK, THE System and method for extracting text captions from video and generating video summaries
7342876, Dec 20 2001 SRI International Interference mitigation and adaptive routing in wireless ad-hoc packet-switched networks
7343342, May 18 2000 Efficient Auctons LLC System and method for an efficient dynamic multi-unit auction
7346557, May 20 2003 Canon Kabushiki Kaisha Information processing apparatus and information processing method
7349827, Sep 18 2002 GOOGLE LLC System and method for reporting website activity based on inferred attribution methodology
7353531, Feb 23 2001 Hewlett Packard Enterprise Development LP Trusted computing environment
7356688, Apr 06 1999 Xerox Corporation System and method for document distribution
7356696, Aug 01 2000 EMC IP HOLDING COMPANY LLC Proofs of work and bread pudding protocols
7360080, Nov 03 2000 GOOGLE LLC Non-transferable anonymous credential system with optional anonymity revocation
7366695, Feb 29 2000 First Data Corporation; The Western Union Company Electronic purchase method and funds transfer system
7372952, Mar 07 2002 PATENT ARMORY INC Telephony control system with intelligent call routing
7373310, Apr 06 2000 GINEGAR LLC Workflow system matrix organization search engine
7395614, Aug 14 1997 ProMDX Technology, Inc. Intelligent footwear
7398315, Mar 12 2003 Microsoft Technology Licensing, LLC Reducing unwanted and unsolicited electronic messages by preventing connection hijacking and domain spoofing
7398317, Sep 07 2000 RIVERBED TECHNOLOGY LLC Thwarting connection-based denial of service attacks
7412519, Dec 08 2000 Xerox Corporation Authorized document usage including rendering a protected document
7412605, Aug 28 2000 ContentGuard Holdings, Inc. Method and apparatus for variable encryption of data
7415432, Nov 17 2000 D.E. Shaw & Co., Inc. Method and apparatus for the receipt, combination, and evaluation of equity portfolios for execution by a sponsor at passively determined prices
7415436, Mar 08 2000 W R HAMBRECHT + CO , INC System and method for pricing and allocation of commodities or securities
7416124, Sep 29 2004 Sony Corporation Information processing apparatus and method, recording medium, and program
7421741, Oct 20 2003 Digital Reg of Texas, LLC Securing digital content system and method
7424617, Aug 14 2000 R2 SOLUTIONS LLC Offline-online incentive points system and method
7430607, May 25 2005 Microsoft Technology Licensing, LLC Source throttling using CPU stamping
7437323, Jun 25 2003 PROS, INC Method and system for spot pricing via clustering based demand estimation
7451005, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Vehicular information system and method
7457823, May 02 2004 OpSec Online Limited Methods and systems for analyzing data related to possible online fraud
7460065, Mar 31 2006 Kabushiki Kaisha Topcon RTK-GPS surveying system
7464057, Mar 30 2001 CITIBANK, N A Method and system for multi-currency escrow service for web-based transactions
7465241, Mar 23 2007 JPMORGAN CHASE BANK, N A , AS SUCCESSOR ADMINISTRATIVE AGENT Functionalized, crosslinked, rubber nanoparticles for use in golf ball castable thermoset layers
7466823, Mar 03 2000 DESTINY SOFTWARE PRODUCTIONS, INC Digital media distribution method and system
7469152, Nov 30 2004 Regents of the University of California, The Method and apparatus for an adaptive multiple-input multiple-output (MIMO) wireless communications systems
7470197, Aug 17 2001 CREATIVEMASS 54 LIMITED On-line gaming with independent player matching
7471188, Dec 19 2003 Semiconductor Energy Laboratory Co., Ltd. Semiconductor device and driving method thereof
7472080, Oct 24 2003 TENON & GROOVE LLC Methods and associated systems for an airline to enhance customer experience and provide options on flights
7475054, Nov 30 2005 The Boeing Company Integrating multiple information-providing systems
7475055, Apr 08 2003 SAP SE Method for executing a database query
7487123, Mar 25 1996 CFPH L L C Computer-implemented securities trading system with virtual currency and virtual specialist
7487206, Jul 15 2005 International Business Machines Corporation Method for providing load diffusion in data stream correlations
7493280, Jul 10 2001 MICRO FOCUS LLC Method and system for setting an optimal reserve price for an auction
7500104, Jun 15 2001 Microsoft Technology Licensing, LLC Networked device branding for secure interaction in trust webs on open networks
7505056, Apr 02 2004 THE NATIONAL FEDERATION OF THE BLIND Mode processing in portable reading machine
7506028, Feb 20 2004 DCi Database For Commerce and Industry AG Internet-supported information system
7516089, Sep 04 1996 PRICELINE COM LLC System and method for allocating business to one of a plurality of sellers in a buyer driven electronic commerce system
7519559, Oct 30 2003 Meta Platforms, Inc Messaging stamp authority
7520421, Sep 12 2003 INTERNATIONAL FINANCIAL SERVICES, INC System and method to create electronic deposit records and to track the status of a deposit
7523072, Nov 23 1994 ContentGuard Holdings, Inc. System for controlling the distribution and use of digital works
7523085, Sep 30 2004 BUZZMETRICS, LTD Topical sentiments in electronically stored communications
7548937, May 04 2006 International Business Machines Corporation System and method for scalable processing of multi-way data stream correlations
7552176, Mar 12 2003 Microsoft Technology Licensing, LLC Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles
7558759, Nov 20 2001 CONTENTGUARD HOLDINGS, INC Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates
7559070, Jul 28 2003 GLOBAL POINT SYSTEMS INC Moving image distribution system, moving image dividing system, moving image distribution program, moving image dividing program, and recording medium storing moving image distribution program and/or moving image dividing program
7567909, Sep 26 1996 Electronic transactions
7574179, Jul 13 2006 Qualcomm Incorporated Mobile broadband wireless network with interference mitigation mechanism to minimize interference within a cluster during multiple concurrent transmissions
7584363, Mar 02 2004 France Telecom Fair blind signature process
7590589, Sep 10 2004 Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference
7590602, Aug 26 1999 MONEYCAT LTD Electronic currency, electronic wallet therefor and electronic payment systems employing them
7596552, Aug 05 2005 BuzzMetrics Ltd. Method and system for extracting web data
7600017, Oct 11 2000 BuzzMetrics, Ltd. System and method for scoring electronic messages
7600255, Apr 14 2004 Cisco Technology, Inc. Preventing network denial of service attacks using an accumulated proof-of-work approach
7603304, Mar 08 2005 KYNDRYL, INC Domain specific return on investment model system and method of use
7603319, Aug 28 2000 ContentGuard Holdings, Inc. Method and apparatus for preserving customer identity in on-line transactions
7609848, Dec 29 2000 ContentGuard Holdings, Inc. Multi-stage watermarking process and system
7613225, Feb 10 2006 Honeywell International Inc. System and method for secure communication of collected amphibious data
7627510, Mar 23 2005 Regents of the University of California, The System and method for conducting combinatorial exchanges
7630927, May 18 2004 France Telecom Anonymous and secure internet payment method and mobile devices
7634598, Aug 17 2005 Permanent Solution Industries, Inc. Dynamic total asset management system (TAMS) and method for managing building facility services
7636789, Nov 27 2007 Microsoft Technology Licensing, LLC Rate-controllable peer-to-peer data stream routing
7640166, Apr 17 2000 Verizon Patent and Licensing Inc Method for charging on-line directory assistance services
7641108, Apr 02 2004 THE NATIONAL FEDERATION OF THE BLIND Device and method to assist user in conducting a transaction with a machine
7644144, Dec 21 2001 Microsoft Technology Licensing, LLC Methods, tools, and interfaces for the dynamic assignment of people to groups to enable enhanced communication and collaboration
7644274, Mar 30 2000 RPX Corporation Methods of protecting against spam electronic mail
7646343, Jun 24 2005 RUCKUS IP HOLDINGS LLC Multiple-input multiple-output wireless antennas
7650319, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
7653816, Dec 30 2003 DU MOLIN, JAMES R ; DU MOLIN, SUZANNE S E-mail certification service
7660783, Sep 27 2006 CITIBANK, N A System and method of ad-hoc analysis of data
7660993, Mar 22 2004 Microsoft Technology Licensing, LLC Cryptographic puzzle cancellation service for deterring bulk electronic mail messages
7664708, May 24 2005 ContentGuard Holdings, Inc. System for controlling the distribution and use of digital works using digital tickets
7676034, Mar 07 2003 PATENT ARMORY INC Method and system for matching entities in an auction
7676423, Mar 05 2004 FORMAN, BARRY Method and system for optimal pricing and allocation with allotments
7676439, Jun 18 2001 Daon Holdings Limited Electronic data vault providing biometrically protected electronic signatures
7685642, Jun 26 2003 CONTENTGUARD HOLDINGS, INC System and method for controlling rights expressions by stakeholders of an item
7693939, May 07 2007 Microsoft Technology Licensing, LLC Context-based routing in multi-hop networks
7698248, Jan 24 2007 Rally Software Method and system for auditing processes and projects for process improvement
7698335, Jun 27 2005 Microsoft Technology Licensing, LLC Cluster organization of electronically-stored items
7702806, Sep 07 2000 RIVERBED TECHNOLOGY LLC Statistics collection for network traffic
7707118, Feb 24 2005 Asymmetrical escrow system for use in non-cooperative bargaining relationships
7710932, Dec 14 2005 ARRIS ENTERPRISES LLC Method and apparatus for encouraging routing in a network
7711808, Nov 08 2001 HEWLETT-PACKARD DEVELOPMENT COMPANY L P Method and system for online printer error database
7715852, Jan 06 2006 MEDIATEK INC. Location estimation method
7716532, Jun 04 1999 Microsoft Technology Licensing, LLC System for performing context-sensitive decisions about ideal communication modalities considering information about channel reliability
7720767, Oct 24 2005 CONTENTGUARD HOLDING, INC Method and system to support dynamic rights and resources sharing
7724896, Dec 10 2004 Nagra France Sarl Method for transmitting messages between an emitter and at least on receiver and system for implementing said method
7725401, May 31 2001 CONTENTGUARD HOLDINGS, INC Method and apparatus for establishing usage rights for digital content to be created in the future
7725414, Mar 16 2004 Buzzmetrics Ltd Method for developing a classifier for classifying communications
7729975, Nov 06 2003 Efficient Auctions LLC System and method for a hybrid clock and proxy auction
7730120, Mar 07 2002 Comscore, Inc; Rentrak Corporation; Proximic, LLC Systems and methods for clickstream analysis to modify an off-line business process involvng cross promotion
7730314, Oct 19 2004 Samsung Electronics Co., Ltd. Method and apparatus for electronic commerce using digital ticket to provide anonymity
7739335, Jun 22 2000 Sony Corporation; Sony Electronics Inc. Method and apparatus for providing a customized selection of audio content over the internet
7742972, Jul 21 1999 Longitude LLC Enhanced parimutuel wagering
7743134, Sep 07 2000 RIVERBED TECHNOLOGY LLC Thwarting source address spoofing-based denial of service attacks
7743163, Apr 30 2008 SG GAMING, INC Download and data transfer gaming system
7751423, Sep 10 2004 WSOU Investments, LLC Scheduler
7751973, May 04 2004 THE BANK OF NEW YORK MELLON, AS ADMINISTRATIVE AGENT Curve warning system
7752064, Jul 01 1999 International Business Machines Corporation System and method for infrastructure design
7761471, Oct 16 2007 JPMORGAN CHASE BANK, N.A. Document management techniques to account for user-specific patterns in document metadata
7773749, May 24 2000 Copilot Ventures Fund III LLC Authentication method and system
7774257, Dec 02 1997 FINANCIAL ENGINES, INC User interface for a financial advisory system
7774264, Jan 04 1996 Efficient Auctions LLC Computer implemented methods and apparatus for auctions
7774609, Oct 28 1997 FDGS GROUP, LLC Process for digital signing of a message
7778856, Dec 05 2001 International Business Machines Corporation System and method for measuring and managing operational risk
7778869, Jun 12 2007 Microsoft Technology Licensing, LLC Fair discounting auction
7788155, Dec 02 1997 FINANCIAL ENGINES, INC Financial advisory system
7788205, May 12 2006 International Business Machines Corporation Using stochastic models to diagnose and predict complex system problems
7797732, Nov 04 2004 ToPeer Corporation System and method for creating a secure trusted social network
7801802, Sep 02 1999 Inventor Holdings, LLC Method, system and computer program product for facilitating an auction behavior and automatic bidding in an auction
7808922, Mar 08 2007 Alcatel-Lucent USA Inc Method of routing and resource allocation in a wireless communication system
7813527, Oct 30 2006 Industrial Technology Research Institute Method and system for object detection in an image plane
7813822, Oct 05 2000 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Intelligent electronic appliance system and method
7813989, Dec 02 1997 FINANCIAL ENGINES, INC Financial goal planning and analysis system
7817796, Apr 27 2005 AVAYA LLC Coordinating work assignments for contact center agents
7827128, May 11 2007 Mercury Kingdom Assets Limited System identification, estimation, and prediction of advertising-related data
7831573, Aug 12 2003 Hewlett-Packard Development Company, L.P. System and method for committing to a set
7836498, Sep 07 2000 RIVERBED TECHNOLOGY LLC Device to protect victim sites during denial of service attacks
7843822, May 24 2007 Rockwell Collins, Inc Cognitive adaptive network management areas
7844535, Oct 23 2002 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Computer-implemented method for determining a bid for an auction
7849139, May 02 2007 PIROUETTE SOFTWARE CONSULTING Adaptive search in mobile peer-to-peer databases
7860486, Oct 22 2004 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED Key revocation in a mobile device
7869591, Mar 25 2002 RPX Corporation System and method for secure three-party communications
7870240, Jun 28 2002 Microsoft Technology Licensing, LLC Metadata schema for interpersonal communications management systems
7877304, Dec 16 2004 CONSUMERDIRECT, INC System and method for managing consumer information
7885947, May 31 2006 International Business Machines Corporation Method, system and computer program for discovering inventory information with dynamic selection of available providers
7890581, Dec 16 1996 IP HOLDINGS, INC Matching network system for mobile devices
7894595, Mar 07 2002 PATENT ARMORY INC Telephony control system with intelligent call routing
7904187, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Internet appliance system and method
7909243, Aug 28 2007 Liberty Peak Ventures, LLC System and method for completing a secure financial transaction using a wireless communications device
7916327, Dec 13 2005 Canon Kabushiki Kaisha Apparatus, method, and program for automatically generating a set of possible print job workflows and selecting a most secure print job workflow from the set of possible print job workflows
7916858, Jun 25 2002 PATENT ARMORY INC Agent training sensitive call routing system
7921173, Mar 12 2003 Microsoft Technology Licensing, LLC Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles
7929689, Jun 30 2004 Microsoft Technology Licensing, LLC Call signs
7933829, Oct 28 2005 Intertrust Technologies Corp. Systems and methods for pricing and selling digital goods
7937586, Jun 29 2007 Microsoft Technology Licensing, LLC Defending against denial of service attacks
7942317, Nov 25 1999 SMARTFLASH LLC Data storage and access systems
7945464, Apr 06 2000 GINEGAR LLC Workflow system matrix organization search engine
7947936, Oct 01 2004 The United States of America as represented by the Secretary of the Navy Apparatus and method for cooperative multi target tracking and interception
7949121, Sep 27 2004 AVAYA LLC Method and apparatus for the simultaneous delivery of multiple contacts to an agent
7953219, Jul 19 2001 NICE LTD Method apparatus and system for capturing and analyzing interaction based content
7956807, Jan 23 2007 University of South Florida Cognitive positioning system
7962346, Sep 24 2003 FAIRNEZ INC Social choice determination systems and methods
7966078, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Network media appliance system and method
7974714, Oct 05 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Intelligent electronic appliance system and method
7979628, Oct 30 2007 Sandisk IL Ltd. Re-flash protection for flash memory
7983941, Aug 11 2006 Raytheon Company Analyzing system performance, operational performance, and costs of a surveillance system
7987003, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Network media appliance system and method
7990947, Jun 12 2007 CODE-X, INC Network watermark
8005746, Apr 10 2006 DIGIMARC CORPORATION AN OREGON CORPORATION Auction methods and systems
8015073, Sep 25 2006 International Business Machines Corporation Increasing market efficiency of ticket supply systems
8015398, Dec 06 2007 International Business Machines Corporation Set membership proofs in data processing systems
8015607, Oct 30 2003 Meta Platforms, Inc Messaging stamp authority
8019814, Nov 23 2009 International Business Machines Corporation Service for standardization of resource metadata models via social networking—arriving at an agreed upon (standard) resource meta-model via social consensus
8020029, Feb 17 2006 Alcatel Lucent Method and apparatus for rendering game assets in distributed systems
8024274, May 05 2006 President and Fellows of Harvard College Practical secrecy-preserving, verifiably correct and trustworthy auctions
8024317, Nov 18 2008 R2 SOLUTIONS LLC System and method for deriving income from URL based context queries
8027665, Oct 22 2004 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED System and method for protecting data in a synchronized environment
8031060, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Mobile system and method of operating mobile system
8032435, Dec 21 2007 Diasporalink AB Secure transmission of money transfers
8032477, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
8032751, Dec 30 2003 DU MOLIN, JAMES R ; DU MOLIN, SUZANNE S E-mail certification service
8046292, Mar 28 2000 DERIV COM LIMITED Computer system and method for speculating on a financial market
8046293, Mar 28 2000 DERIV COM LIMITED Computer trading system for offering custom financial market speculations
8046313, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
8046832, Jun 26 2002 Microsoft Technology Licensing, LLC Spam detector with challenges
8051011, Aug 26 1999 MONEYCAT LTD Electronic currency, electronic wallet therefor and electronic payment systems employing them
8054965, Mar 07 2002 PATENT ARMORY INC Telephony control system with intelligent call routing
8060035, Oct 13 2004 McMaster University Transmit power control techniques for wireless communication systems
8060401, Jul 17 2007 AT&T Intellectual Property I, LP Methods, systems, and computer-readable media for providing an indication of a schedule conflict
8060433, Jan 03 2007 SCIQUEST, INC Method of determining an exchange allocation that promotes truthful bidding and improves the obtainment of exchange objectives
8065370, Nov 03 2005 Microsoft Technology Licensing, LLC Proofs to filter spam
8069072, Jul 17 2007 AT&T Intellectual Property I, LP Methods, systems, and computer-readable media for providing an indication of hightime
8073731, Dec 30 2003 ProcessProxy Corporation Method and system for improving efficiency in an organization using process mining
8081969, Oct 11 2000 GOGO BUSINESS AVIATION LLC System for creating an aircraft-based internet protocol subnet in an airborne wireless cellular network
8082582, May 21 2008 MEDIATEK INC. Authorization system of navigation device and associated authorization method
8086520, Oct 11 2006 MICRO FOCUS LLC Constraint satisfaction for solutions to an auction winner-determination problem
8086700, Jul 29 2008 R2 SOLUTIONS LLC Region and duration uniform resource identifiers (URI) for media objects
8086842, Apr 21 2006 Microsoft Technology Licensing, LLC Peer-to-peer contact exchange
8098585, May 21 2008 NEC Corporation Ranking the importance of alerts for problem determination in large systems
8098637, Mar 28 2003 Regents of the University of Minnesota Load balancing in wireless local area networks
8099386, Dec 27 2006 Malikie Innovations Limited Method and apparatus for synchronizing databases connected by wireless interface
8099668, Jan 07 2008 ACTIVISION PUBLISHING, INC Predator and abuse identification and prevention in a virtual environment
8107375, Jan 16 2008 T-MOBILE INNOVATIONS LLC Bandwidth projection for customer bandwidth usage
8111646, Jul 30 2009 SPATIAL DIGITAL SYSTEMS Communication system for dynamically combining power from a plurality of propagation channels in order to improve power levels of transmitted signals without affecting receiver and propagation segments
8112303, Feb 28 2001 Digonex Technologies, Inc.; DIGONEX TECHNOLOGIES, INC Digital online exchange for pricing items to exhaust inventory by an expiration time
8112483, Aug 08 2003 Radix Holdings, LLC Enhanced challenge-response
8121628, Dec 26 2007 General Motors LLC Vehicle telematics unit data upload deferral
8121708, Mar 21 2007 National Technology & Engineering Solutions of Sandia, LLC Control system design method
8126830, Jul 03 2007 Method for ensuring privacy while querying a database by using quantum superposition and multiple responses
8126947, Sep 29 2004 Sony Corporation Information processing apparatus and method, recording medium, and program
8131302, Jul 20 2007 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED Method and system for dynamically splitting jobs across multiple agnostic processors in wireless system
8132005, Jul 07 2005 RPX Corporation Establishment of a trusted relationship between unknown communication parties
8137201, Jan 09 2009 Microsoft Technology Licensing, LLC Arrangement for building and operating human-computation and other games
8138934, Nov 25 2007 TRILLIANT NETWORKS, INC System and method for false alert filtering of event messages within a network
8144619, Oct 04 2005 Multifactorial optimization system and method
8148989, Mar 11 2002 Ferromagnetic detection enhancer compatible with magnetic resonance
8159493, Feb 03 2009 Xerox Corporation Adaptive grand tour
8165916, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Internet appliance system and method
8166016, Dec 19 2008 R2 SOLUTIONS LLC System and method for automated service recommendations
8175578, May 07 2007 Battelle Energy Alliance, LLC Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture
8195496, Nov 26 2008 SAP SE Combining multiple objective functions in algorithmic problem solving
8195578, Aug 26 1999 MONEYCAT LTD Electronic currency, electronic wallet therefor and electronic payment systems employing them
8204856, Jan 21 2009 GOOGLE LLC Database replication
8214298, Feb 26 2008 RFinity Corporation Systems and methods for performing wireless financial transactions
8218502, May 14 2008 Extreme Networks, Inc Predictive and nomadic roaming of wireless clients across different network subnets
8220046, May 18 2007 Trimble Navigation Limited Method and system for GNSS receiver login protection and prevention
8224905, Dec 06 2006 Microsoft Technology Licensing, LLC Spam filtration utilizing sender activity data
8225458, Jul 13 2001 Intelligent door restraint
8229718, Dec 23 2008 Microsoft Technology Licensing, LLC Use of scientific models in environmental simulation
8233918, Aug 20 2009 E-View Connections LLC Digital content distribution system for delivering location specific content to an ad hoc group of mobile subscribers
8245301, Sep 15 2009 Lockheed Martin Corporation Network intrusion detection visualization
8245302, Sep 15 2009 Lockheed Martin Corporation Network attack visualization and response through intelligent icons
8245921, Oct 08 2008 Hyundai Motor Company Electronic toll settlement system and apparatus for vehicle
8249916, Mar 28 2008 Computer method and apparatus for outcome-based pricing of goods and services
8250650, Sep 09 2004 International Business Machines Corporation Front-end protocol for server protection
8255297, Jul 20 2010 Meta Platforms, Inc Creation, redemption, and accounting in a virtual currency system
8261062, Mar 27 2003 Microsoft Technology Licensing, LLC Non-cryptographic addressing
8270603, May 24 2000 Copilot Ventures Fund III LLC Authentication method and system
8271506, Mar 31 2008 R2 SOLUTIONS LLC System and method for modeling relationships between entities
8271620, Nov 13 2003 Lantronix, Inc. Communication protocol converter and method of protocol conversion
8275741, Dec 27 2006 Malikie Innovations Limited Method and apparatus for memory management in an electronic device
8281121, May 13 2010 Microsoft Technology Licensing, LLC Private aggregation of distributed time-series data
8289182, Nov 21 2008 TRILLIANT NETWORKS, INC Methods and systems for virtual energy management display
8296571, May 18 2007 Trimble Navigation Limited Export control for a GNSS receiver
8300798, Apr 03 2006 PATENT ARMORY INC Intelligent communication routing system and method
8312271, Jul 12 2004 International Business Machines Corporation Privacy-protecting integrity attestation of a computing platform
8312511, Mar 12 2008 International Business Machines Corporation Methods, apparatus and articles of manufacture for imposing security measures in a virtual environment based on user profile information
8315938, Oct 19 2009 MORGAN STANLEY SERVICES GROUP INC Option analysis for a trading system
8316237, Mar 25 2002 RPX Corporation System and method for secure three-party communications
8319766, Jun 15 2007 E Ink Corporation Spatially masked update for electronic paper displays
8320302, Apr 20 2007 Elster Electricity, LLC Over the air microcontroller flash memory updates
8321955, Aug 26 2003 THE OREGON STATE BOARD OF HIGHER EDUCATION ON BEHALF OF PORTLAND STATE UNIVERSITY Systems and methods for protecting against denial of service attacks
8326282, Sep 24 2007 Panasonic Avionics Corporation System and method for receiving broadcast content on a mobile platform during travel
8327443, Oct 29 2008 ABACUS INNOVATIONS TECHNOLOGY, INC ; LEIDOS INNOVATIONS TECHNOLOGY, INC MDL compress system and method for signature inference and masquerade intrusion detection
8331632, Aug 06 2007 GOVERNMENT OF THE UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF COMMERCE, THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Indexing face templates using linear models
8333670, Dec 27 2007 System for pitching of baseball
8341547, Jul 17 2007 AT&T Intellectual Property I, L.P. Methods, systems, and computer-readable media for providing contact information at turf level
8346799, Apr 23 2010 A9.COM, INC. Recent content rank adjustment with inverted decay
8352302, Jul 17 2007 AT&T Intellectual Property I, L.P. Methods, systems, and computer-readable media for determining a plurality of turfs from where to reallocate a workforce to a given turf
8352400, Dec 23 1991 Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
8355018, Jun 15 2007 E Ink Corporation Independent pixel waveforms for updating electronic paper displays
8359265, Jan 28 2000 VISA CAPE TOWN PTY LTD Banking system with enhanced identification of financial accounts
8363744, Jun 10 2001 Comcast Cable Communications, LLC Method and system for robust, secure, and high-efficiency voice and packet transmission over ad-hoc, mesh, and MIMO communication networks
8364136, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system
8369880, Feb 27 2008 Fisher-Rosemount Systems, Inc Join key provisioning of wireless devices
8369967, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Alarm system controller and a method for controlling an alarm system
8373582, Jan 27 1998 Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
8385533, Sep 21 2009 AVAYA LLC Bidding work assignment on conference/subscribe RTP clearing house
8402356, Nov 22 2006 Slack Technologies, LLC; SLACK TECHNOLOGIES, INC Methods, systems and apparatus for delivery of media
8402490, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
8407198, Sep 29 2004 Sony Corporation Information processing apparatus and method, recording medium, and program
8411842, Mar 07 2002 PATENT ARMORY INC Intelligent communication routing
8412952, May 06 2009 CA, INC Systems and methods for authenticating requests from a client running trialware through a proof of work protocol
8416064, Dec 07 2009 Universal mobile communication system for wireless and wire line sensor network
8416197, Jun 15 2007 E Ink Corporation Pen tracking and low latency display updates on electronic paper displays
8418039, Aug 03 2009 Airbiquity Inc. Efficient error correction scheme for data transmission in a wireless in-band signaling system
8429083, Oct 30 2003 Meta Platforms, Inc Messaging stamp authority
8447804, Dec 21 2010 GM Global Technology Operations LLC Information gathering system using multi-radio telematics devices
8462681, Jan 15 2009 The Trustees of Stevens Institute of Technology Method and apparatus for adaptive transmission of sensor data with latency controls
8463651, May 27 2011 International Business Machines Corporation Non-instrumented perishable product tracking in a supply chain
8464067, Sep 10 2008 NEC Corporation Method for enabling limitation of service access
8468244, Jan 05 2007 DIGITAL DOORS, INC Digital information infrastructure and method for security designated data and with granular data stores
8480483, Mar 03 2005 ECASH HOLDINGS PTY LTD Device for monitoring a validator
8484366, Mar 31 2010 Accenture Global Services Limited Hierarchical service management
8510200, Dec 02 2011 SPIREON, INC Geospatial data based assessment of driver behavior
8510324, Jan 31 2011 GM Global Technology Operations LLC Efficient information exchange between encountering vehicles using approximate knowledge via hash functions
8516266, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 System and method for intermachine markup language communications
8527317, Mar 03 2011 International Business Machines Corporation Service level agreement work prioritization system
8533843, Oct 13 2008 MARQETA, INC Device, method, and program product for determining an overall business service vulnerability score
8538740, Oct 14 2009 GLOBALFOUNDRIES U S INC Real-time performance modeling of software systems with multi-class workload
8538785, Aug 19 2011 HARTFORD FIRE INSURANCE COMPANY System and method for computing and scoring the complexity of a vehicle trip using geo-spatial information
8553623, Jul 20 2007 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED Method and system for utilizing standardized interface in a wireless device to discover and use local and remote resources
8559388, Jun 13 2008 SOCIONEXT INC Self organizing network
8566247, Feb 19 2007 RPX Corporation System and method for secure communications involving an intermediary
8572193, Feb 10 2009 Certusview Technologies, LLC Methods, apparatus, and systems for providing an enhanced positive response in underground facility locate and marking operations
8582753, Jun 25 2001 PATENT ARMORY INC Agent training sensitive call routing system
8583263, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Internet appliance system and method
8583564, Mar 26 2007 Microsoft Technology Licensing, LLC Differential pricing based on social network standing
8584200, Oct 22 2004 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED Multiple time outs for applications in a mobile device
8589206, May 31 2007 International Business Machines Corporation Service requests for multiple service level characteristics
8589884, Jan 15 2009 Infosys Limited Method and system for identifying regression test cases for a software
8593946, Aug 25 2008 International Business Machines Corporation Congestion control using application slowdown
8600830, Feb 05 2003 HOFFBERG FAMILY TRUST 2 System and method for providing a payment to a non-winning auction participant
8600847, Aug 24 2012 ServiceNow, Inc; International Business Machines Corporation Optimal service fee discount management
8607305, Sep 01 2008 Microsoft Technology Licensing, LLC Collecting anonymous and traceable telemetry
8612271, Oct 02 2008 Certusview Technologies, LLC Methods and apparatus for analyzing locate and marking operations with respect to environmental landmarks
8615087, Feb 21 2008 Telcordia Technologies, Inc OCDM-based photonic encryption system with provable security
8620887, Mar 01 2011 Bank of America Corporation Optimization of output data associated with a population
8621074, Apr 27 2012 III Holdings 6, LLC Intelligent work load manager
8629789, Jan 27 1998 Mobile communication device
8635132, Apr 14 2008 United Services Automobile Associatiion (USAA) Self-service real-time financial advice
8645514, May 08 2006 Xerox Corporation Method and system for collaborative self-organization of devices
8645697, Aug 08 2003 Radix Holdings, LLC Message authorization
8661537, Jul 21 2010 Empire Technology Development LLC Verifying work performed by untrusted computing nodes
8667288, May 29 2012 Robert Bosch GmbH System and method for message verification in broadcast and multicast networks
8676394, Jun 30 2010 Siemens Aktiengesellschaft Integrated demand response for energy utilization
8682343, Jun 18 2009 Intel Corporation Mobile radio communication devices and methods for controlling mobile radio communication devices
8682686, Jan 11 2008 General Electric Company System and method to manage a workflow in delivering healthcare
8682726, Jan 27 1998 Mobile communication device
8689003, Jun 01 2007 Adobe Inc System and method for secure password-based authentication
8706516, Jan 11 2008 General Electric Company System and method to manage a workflow in delivering healthcare
8706914, Apr 23 2007 Computing infrastructure
8706915, Apr 23 2007 Computing infrastructure
8712918, Aug 26 1999 Moneycat Ltd. Electronic currency, electronic wallet therefor and electronic payment systems employing them
8713450, Jan 08 2008 International Business Machines Corporation Detecting patterns of abuse in a virtual environment
8733632, Jun 22 2007 Visa U.S.A. Inc. Mobile subscriber device for financial transaction tokens
8737965, May 07 2007 Battelle Energy Alliance, LLC Wireless device monitoring systems and monitoring devices, and associated methods
8744890, Feb 14 2013 AKTANA, INC.; AKTANA, INC System and method for managing system-level workflow strategy and individual workflow activity
8761787, Oct 04 2011 AT&T INTELLECTUAL PROPERTY I, L P , A NEVADA PARTNERSHIP Methods, systems and apparatus to facilitate ranked network priority
8768737, Dec 21 2012 PagerDuty, Inc. Schedule management interface
8768851, Oct 30 2003 Meta Platforms, Inc Visually distinguishing paid messages
8769373, Mar 22 2010 LRDC SYSTEMS, LLC Method of identifying and protecting the integrity of a set of source data
8774717, Oct 15 2009 CommScope Technologies LLC Portable AISG controller with smartphone interface and system
8775822, Aug 31 2007 FLEXERA SOFTWARE, INC Computer-implemented method and system for protecting a software installation after certification
8777735, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ Monetization of an integrated wagering and interactive media platform
8781462, Sep 28 2009 Itron, Inc Methodology and apparatus for validating network coverage
8792922, Feb 28 2007 Qualcomm Incorporated Uplink scheduling for fairness in channel estimation performance
8793778, Aug 31 2012 Spamcaptcher Inc. System for providing trusted user access of computer systems
8793780, Apr 11 2011 Malikie Innovations Limited Mitigation of application-level distributed denial-of-service attacks
8794516, Oct 25 1999 Smartflash, LLC Data storage and access systems
8798246, May 15 2013 Cisco Technology, Inc. Allocating service requests to service providers according to dynamic network service fulfillment cycle
8813107, Jun 27 2008 R2 SOLUTIONS LLC System and method for location based media delivery
8831205, Mar 07 2002 PATENT ARMORY INC Intelligent communication routing
8831220, Nov 30 2007 Battelle Energy Alliance, LLC Processing module operating methods, processing modules, and communications systems
8831869, Mar 31 2009 GM Global Technology Operations LLC Using V2X-based in-network message generation, aggregation, distribution and processing protocols to enable road hazard condition warning applications
8832073, Jun 29 2007 Alcatel Lucent Method and apparatus for efficient aggregate computation over data streams
8838561, Sep 29 2004 Sony Corporation Information processing apparatus and method, recording medium, and program
8849183, Oct 05 2007 Qualcomm Incorporated Location and time based filtering of broadcast information
8862495, Sep 28 2004 INTERDIGITAL CE PATENT HOLDINGS, SAS Method for recycling products
8869111, Jan 15 2009 Infosys Limited Method and system for generating test cases for a software application
8874477, Oct 04 2005 MeadWestvaco Corporation Multifactorial optimization system and method
8881275, Jul 21 2010 Empire Technology Development LLC Verifying work performed by untrusted computing nodes
8892221, Sep 18 2007 GROUNDSWELL TECHNOLOGIES, LLC Integrated resource monitoring system with interactive logic control for well water extraction
8892495, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Adaptive pattern recognition based controller apparatus and method and human-interface therefore
8892673, Aug 08 2003 Radix Holdings, LLC Hybrid challenge-response
8892712, Sep 30 2011 Oracle International Corporation Upgrading enterprise managers
8892900, Jul 12 2004 International Business Machines Corporation Privacy-protecting integrity attestation of a computing platform
8897900, Mar 18 2011 ROCKWELL AUTOMATION TECHNOLOGIES, INC Graphical language for optimization and use
8904181, Mar 25 2002 RPX Corporation System and method for secure three-party communications
8909462, Jul 07 2011 International Business Machines Corporation Context-based traffic flow control
8914022, Jun 12 2008 GOGO BUSINESS AVIATION LLC System for providing high speed communications service in an airborne wireless cellular network
8915781, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through mirage reveals
8935366, Apr 24 2009 Microsoft Technology Licensing, LLC Hybrid distributed and cloud backup architecture
8958408, Jun 05 2008 The Boeing Company Coded aperture scanning
8961300, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of providing wagering opportunities based on promotional content
8961301, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of timing wagers in an integrated wagering and interactive media platform
8964958, May 20 2009 AVAYA LLC Grid-based contact center
8965834, Dec 07 2011 ARTIFICIAL GENIUS INC Particle methods for nonlinear control
8968082, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of managing user accounts to track outcomes of real world wagers revealed to users
8968104, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of providing wagering opportunities based on multiplayer interactions
8971519, Jun 25 2001 PATENT ARMORY INC Agent training sensitive call routing system
8974284, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of providing wagering opportunities based on external triggers
8984030, May 04 2011 International Business Machines Corporation Journaling and integrity in mobile clouded collaborative spaces
8984402, Dec 20 2010 Xerox Corporation Visual indication of document size in a virtual rendering
8986096, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through strategic reveals
8990100, Oct 02 2008 Certusview Technologies, LLC Methods and apparatus for analyzing locate and marking operations with respect to environmental landmarks
8990370, Dec 16 2011 RPX Corporation Method and apparatus for providing information collection using template-based user tasks
8991716, Jul 20 2011 Fujikura Ltd. Antenna and wireless tag
8992311, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through guaranteed reveals and partner promotions
8992312, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of providing an integrated wagering and interactive media platform
8996558, Nov 10 2011 Viavi Solutions UK Limited Geolocation information storage system for mobile communications data
9009183, Nov 03 2011 Microsoft Technology Licensing, LLC Transformation of a system change set from machine-consumable form to a form that is readily consumable by a human
9009318, Nov 03 2011 Microsoft Technology Licensing, LLC Offline resource allocation algorithms
9009492, Feb 29 2012 SYNAMEDIA LIMITED Prevention of playback attacks using OTP memory
9020987, Jun 29 2011 EMC IP HOLDING COMPANY LLC Managing updating of metadata of file systems
9045927, Jul 13 2001 Intelligent door restraint
9053562, Jun 24 2010 Two dimensional to three dimensional moving image converter
9055362, Dec 19 2012 ZHANG, DUO Methods, apparatus and systems for individualizing audio, music and speech adaptively, intelligently and interactively
9055511, Oct 08 2007 Qualcomm Incorporated Provisioning communication nodes
9060381, Feb 08 2010 PACCAR Inc In-vehicle communication device with social networking
9070252, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing sponsored and other items through mock reveals
9070253, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through single or multiple reveals
9071446, Mar 11 2011 Emsycon GmbH Tamper-protected hardware and method for using same
9076294, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through timed reveals and reveal decay
9076295, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through geolocation reveals
9092939, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of providing wagering opportunities based on invitations
9092940, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of selecting parameters for real world wagers placed on behalf of users in an integrated wagering and interactive media platform
9094836, Sep 15 2012 Electronics and Telecommunications Research Institute Method for calculating fairness index and method for allocating resources based on the fairness index in coexistence management system
9098711, Sep 29 2004 Sony Corporation Information processing apparatus and method, recording medium, and program
9112806, Oct 30 2007 International Business Machines Corporation User guided generation of network link optimization profiles
9119083, Mar 02 2012 CommScope Technologies LLC Master antenna controller application and device
9121217, Jul 13 2001 Intelligent door restraint
9122702, Oct 16 2012 WSOU Investments, LLC Method and apparatus for providing location trajectory compression based on map structure
9132352, Jun 24 2010 Interactive system and method for rendering an object
9143392, Apr 23 2007 Computing infrastructure
9148473, Aug 27 2012 Amazon Technologies, Inc Dynamic resource expansion of mobile devices
9151633, Jan 27 1998 Mobile communication device for delivering targeted advertisements
9159019, Jul 20 2011 Fujikura Ltd. Antenna and wireless tag
9167505, Oct 08 2007 Qualcomm Incorporated Access management for wireless communication
9177280, Feb 10 2009 Certusview Technologies, LLC Methods, apparatus, and systems for acquiring an enhanced positive response for underground facility locate and marking operations based on an electronic manifest documenting physical locate marks on ground, pavement, or other surface
9189047, May 08 2008 Daedalus Blue LLC Organizing databases for energy efficiency
9200908, Jul 17 2008 Audi AG Navigation system for a motor vehicle
9202178, Mar 11 2014 SAS Institute Inc.; SAS INSTITUTE INC Computerized cluster analysis framework for decorrelated cluster identification in datasets
9202375, Jul 17 2008 Volkswagen AG; Audi AG Navigation system for a motor vehicle
9208032, May 15 2013 Amazon Technologies, Inc Managing contingency capacity of pooled resources in multiple availability zones
9208203, Oct 05 2011 High-speed statistical processing in a database
9208458, Oct 02 2008 Certusview Technologies, LLC Methods and apparatus for analyzing locate and marking operations with respect to facilities maps
9208624, Dec 14 2012 Zubie, Inc.; ZUBIE, INC Time window authentication for vehicle telematics device
9209985, Jan 31 2013 ANUVU OPERATIONS LLC; ANUVU IP HOLDINGS LLC Association of diverse application logic across multiple distinct devices with priority bandwidth channel
9214063, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through escalating reveals
9215322, Apr 03 2006 PATENT ARMORY INC Intelligent communication routing system and method
9219947, Dec 06 2011 Comcast Cable Communications, LLC Indirect control of content consumption in an appliance
9220018, Jun 16 2011 The Boeing Company Communications quality analysis
9224262, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of selecting interactive media used to reveal outcomes of real world wagers
9232559, May 15 2008 Alcatel Lucent System and method to provide dynamic bearer selection for data transfers in multi-bearer wireless data terminals
9235821, Feb 10 2009 Certusview Technologies, LLC Methods, apparatus, and systems for providing an enhanced positive response for underground facility locate and marking operations based on an electronic manifest documenting physical locate marks on ground, pavement or other surface
9239951, Jun 06 1995 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
9256849, Jun 27 2008 Certusview Technologies, LLC Apparatus and methods for evaluating a quality of a locate operation for underground utility
9256908, Aug 19 2011 Daedalus Blue LLC Utility consumption disaggregation using low sample rate smart meters
9258307, Mar 02 2012 Alcatel Lucent Decentralized electronic transfer system
9261371, May 16 2014 Honeywell International Inc. System and method of voice based personalized interactive evacuation guidance
9276404, May 28 2012 Renesas Electronics Corporation Semiconductor integrated circuit and operating method thereof
9276664, Apr 30 2007 DBSD SERVICES LTD ; DBSD Corporation Mobile interactive satellite services
9276771, Sep 27 2013 GOOGLE LLC Lossless multipath table compression
9277482, Nov 10 2011 Cisco Technology, Inc.; Cisco Technology, Inc Adaptive reoptimization rate for unstable network topologies
9280778, Dec 15 2008 Qualcomm Incorporated Location logging and location and time based filtering
9290896, Mar 13 2013 CONTROL MODULE, INC Modular gate system and installation method therefor
9294560, Jun 04 2009 BAE SYSTEMS PLC System and method of analysing transfer of data over at least one network
9298806, Jul 08 2015 COINLAB, INC System and method for analyzing transactions in a distributed ledger
9299218, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing real world wager outcomes based on user interactions with interactive media
9305428, Mar 13 2013 Game Play Network, Inc. System and method of timing wagers in an integrated wagering and interactive media platform
9311664, May 25 2010 Salesforce.com, Inc. Systems and methods for automatically collection of performance data in a multi-tenant database system environment
9311670, Sep 10 2004 Game theoretic prioritization system and method
9317830, Jun 27 2008 Certusview Technologies, LLC Methods and apparatus for analyzing locate and marking operations
9317997, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through allocated reveal payouts
9317998, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of selecting real-world wagers on behalf of users in an integrated wagering and interactive media platform
9317999, Mar 13 2013 Game Play Network, Inc. System and method of managing user accounts to track outcomes of real world wagers revealed to users
9325504, Mar 29 2010 GIESECKE+DEVRIENT MOBILE SECURITY GMBH Method for secure transfer of an application from a server into a reading device unit
9342829, Mar 29 2010 Systems and methods for mobile application, wearable application, transactional messaging, calling, digital multimedia capture and payment transactions
9344355, Sep 27 2013 Cisco Technology, Inc.; Cisco Technology, Inc Handling unacceptable asymmetrical communication paths in computer networks
9344438, Dec 22 2008 Qualcomm Incorporated Secure node identifier assignment in a distributed hash table for peer-to-peer networks
9346428, Nov 22 2011 VEONEER US SAFETY SYSTEMS, LLC System and method for determining when to deploy a vehicle safety system
9348419, Jan 24 2014 Ultrahaptics IP Two Limited; LMI LIQUIDATING CO , LLC Method for synchronizing operation of systems
9355649, Nov 13 2012 Adobe Inc Sound alignment using timing information
9361616, Oct 01 2002 One-scan and one-touch payment and buying using haptic control via messaging and calling multimedia system on mobile and wearable device, currency token interface, point of sale device, and electronic payment card
9361797, Dec 11 2014 HERE Global B.V. Detecting road condition changes from probe data
9362742, May 28 2012 Renesas Electronics Corporation Semiconductor integrated circuit and operating method thereof
9367706, Apr 02 2010 Microsoft Technology Licensing, LLC Computation to gain access to service
9377314, Apr 02 2014 Ford Global Technologies, LLC Reduced network flow and computational load using a spatial and temporal variable scheduler
9379981, Sep 27 2013 GOOGLE LLC Flow level dynamic load balancing
9392018, Sep 30 2013 Juniper Networks, Inc Limiting the efficacy of a denial of service attack by increasing client resource demands
9397985, Apr 14 2015 PIONEER MPW, LLC System and method for providing a cryptographic platform for exchanging information
9405750, Oct 31 2011 Hewlett-Packard Development Company, L.P. Discrete wavelet transform method for document structure similarity
9406063, Oct 01 2002 Systems and methods for messaging, calling, digital multimedia capture, payment transactions, global digital ledger, and national currency world digital token
9406195, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of securing reveals of outcomes of real world wagers
9416499, Jan 16 2013 Heatwurx, Inc. System and method for sensing and managing pothole location and pothole characteristics
9419951, Mar 23 2001 RPX Corporation System and method for secure three-party communications
9424509, Mar 09 2011 T-Mobile USA, Inc System for application personalization for a mobile device
9424576, Sep 15 2014 Conduent Business Services, LLC Methods and systems of creating a payment record with a cryptographically secure audit trail
9425620, Jan 12 2009 Battelle Memorial Institute Nested, hierarchical resource allocation schema for management and control of an electric power grid
9443383, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of determining a reveal specification in an integrated wagering and interactive media platform
9449121, Oct 30 2012 Apple Inc. Venue based real time crowd modeling and forecasting
9449494, Apr 01 2009 General Motors LLC First-responder notification for alternative fuel vehicles
9454755, Apr 27 2007 THALES DIS FRANCE SAS Transaction method between two entities providing anonymity revocation for tree-based schemes without trusted party
9455777, Mar 15 2013 Viasat, Inc Satellite network service sharing
9456086, Mar 07 2003 PATENT ARMORY INC Method and system for matching entities in an auction
9461826, Mar 11 2011 Emsycon GmbH Tamper-protected hardware and method for using same
9471910, Oct 25 1999 Smartflash, LLC Data storage and access systems
9473626, Jun 27 2008 Certusview Technologies, LLC Apparatus and methods for evaluating a quality of a locate operation for underground utility
9489671, Oct 01 2002 BANKER OF MOBI INC Systems and methods for mobile application, wearable application, transactional messaging, calling, digital multimedia capture and payment transactions
9489762, Jun 30 2010 PRIMAL SPACE SYSTEMS, INC Delivering and controlling streaming interactive media comprising rendered geometric, texture and lighting data
9489798, Mar 13 2013 Game Play Network, Inc. System and method of providing wagering opportunities based on invitations
9495668, May 10 2013 EMC IP HOLDING COMPANY LLC Computing solutions to a problem involving inversion of a one-way function
9524510, Oct 02 2013 AMOBEE, INC Adaptive fuzzy fallback stratified sampling for fast reporting and forecasting
9535563, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Internet appliance system and method
9536385, Mar 13 2013 Game Play Network, Inc. System and method of timing wagers in an integrated wagering and interactive media platform
9542642, Apr 06 2006 Packet data neural network system and method
9551582, Jan 27 1998 Blanding Hovenweep, LLC Mobile communication device
9552694, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of providing wagering opportunities based on gameplay
9552696, Mar 13 2013 Game Play Network, Inc. System and method of providing an integrated wagering and interactive media platform
9553812, Sep 09 2014 Cisco Technology, Inc Interest keep alives at intermediate routers in a CCN
9558623, Mar 13 2013 Game Play Network, Inc. System and method of revealing the outcomes of real world wagers through geolocation reveals
9563863, Feb 11 2009 Certusview Technologies, LLC Marking apparatus equipped with ticket processing software for facilitating marking operations, and associated methods
9563890, Oct 01 2002 Facilitating mobile device payments using product code scanning
9576285, Oct 01 2002 One gesture, one blink, and one-touch payment and buying using haptic control via messaging and calling multimedia system on mobile and wearable device, currency token interface, point of sale device, and electronic payment card
9576426, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through skill based actions
9578678, Oct 02 2008 Certusview Technologies, LLC Methods and apparatus for facilitating locate and marking operations
9584543, Mar 05 2013 HUMAN SECURITY, INC Method and system for web integrity validator
9603033, Dec 31 2011 International Business Machines Corporation Online and distributed optimization framework for wireless analytics
9607052, Dec 29 2008 TECHNION RESEARCH & DEVELOPMENT FOUNDATION LTD Query networks evaluation system and method
9608829, Jul 25 2014 BLOCKTECH LLC System and method for creating a multi-branched blockchain with configurable protocol rules
9615264, Oct 04 2005 Multifactorial optimization system and method
9619967, Mar 13 2013 Game Play Network, Inc. System and method of revealing the outcomes of wagers through physiological condition-based reveals
9626685, Jan 04 2008 R2 SOLUTIONS LLC Systems and methods of mapping attention
9635024, Dec 16 2013 F5 Networks, Inc Methods for facilitating improved user authentication using persistent data and devices thereof
9635177, Jun 25 2001 PATENT ARMORY INC Agent training sensitive call routing system
9646130, Dec 18 2012 OPUS IVS, INC Vehicle simulator system
9646300, Oct 01 2002 MOBILE PAY, INC Systems and methods for mobile application, wearable application, transactional messaging, calling, digital multimedia capture, payment transactions, and one touch service
9661615, Apr 09 2013 MOTOROLA SOLUTIONS, INC Method and apparatus for managing trunking operations in an ad-hoc network
9665101, Sep 28 2012 GOOGLE LLC Methods and systems for transportation to destinations by a self-driving vehicle
9665865, Oct 01 2002 MOBILE PAY, INC One-scan and one-touch payment and buying using haptic control via messaging and calling multimedia system on mobile and wearable device, currency token interface, point of sale device, and electronic payment card
9667649, Apr 18 2013 Amazon Technologies, Inc Detecting man-in-the-middle and denial-of-service attacks
9672518, Sep 21 2013 VISA, INC Systems, methods, and devices for improved transactions at a point of sale
9684929, Jul 18 2013 GOOGLE LLC Detecting content consumption
9688286, Sep 29 2009 GOLDMAN SACHS LENDING PARTNERS LLC, AS COLLATERAL AGENT; ALTER DOMUS US LLC, AS COLLATERAL AGENT System and method for integrating smartphone technology into a safety management platform to improve driver safety
9696418, May 04 2015 PROPAGATION RESEARCH ASSOCIATES, INC Systems, methods and computer-readable media for improving platform guidance or navigation using uniquely coded signals
9699212, Sep 30 2013 Juniper Networks, Inc. Limiting the efficacy of a denial of service attack by increasing client resource demands
9703616, Aug 05 2014 AIRBNB, INC Executing a command on an optimal smart device
9704151, Oct 01 2002 BANKER OF MOBI INC Systems and methods for mobile application, wearable application, transactional messaging, calling, digital multimedia capture and payment transactions
9705895, Jul 05 2013 DCS7, LLC System and methods for classifying internet devices as hostile or benign
9707942, Dec 06 2013 Elwha LLC Systems and methods for determining a robotic status of a driving vehicle
9710804, Oct 07 2012 Virtual payment cards issued by banks for mobile and wearable devices
9716653, Nov 18 2014 HAUWEI TECHNOLOGIES CO., LTD. System and method for flow-based addressing in a mobile environment
9722912, Jul 09 2015 GOOGLE LLC Network stochastic cross-layer optimization for meeting traffic flow availability target at minimum cost
9727042, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
9728037, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ System and method of revealing the outcomes of real world wagers through reveals and unreveals
9736147, Apr 08 2013 MEAD, CRAIG Artificial intelligence encryption model (AIEM) with device authorization and attack detection (DAAAD)
9736308, Mar 07 2002 PATENT ARMORY INC Intelligent communication routing
9747597, Jul 31 2013 NXGN DATA, INC Mobile device and authentication method for mobile payment system
9753802, Mar 30 2015 Amazon Technologies, Inc Dead letter queue for smart fleet management
9756116, May 01 2015 GE DIGITAL HOLDINGS LLC Data communication using vehicle data carriers
9767651, Mar 13 2013 Game Play Network, Inc. System and method of revealing real world wager outcomes based on user interactions with interactive media
9773217, Feb 10 2009 Certusview Technologies, LLC Methods, apparatus, and systems for acquiring an enhanced positive response for underground facility locate and marking operations
9774578, May 23 2016 GSC Secrypt, LLC Distributed key secret for rewritable blockchain
9775096, Oct 08 2007 Qualcomm Incorporated Access terminal configuration and access control
9780853, Feb 19 2016 Elwha LLC Receiver configured to provide a channel capacity that exceeds a saturation channel capacity
9785130, Apr 10 2014 NEC Corporation Decentralized energy management platform
9785369, May 23 2016 GSC Secrypt, LLC Multiple-link blockchain
9785780, Sep 29 2004 Sony Corporation Information processing apparatus and method, recording medium, and program
9786127, Mar 13 2013 GAME PLAY NETWORK, INC D B A ODDZ Systems and methods for interactive games
9787760, Sep 24 2013 Platform for building virtual entities using equity systems
9794074, Feb 04 2016 Nasdaq Technology AB Systems and methods for storing and sharing transactional data using distributed computing systems
9794797, Oct 04 2005 Multifactorial optimization system and method
9795882, Jun 24 2010 Interactive system and method
9800310, Feb 19 2016 Elwha LLC Transmitter configured to provide a channel capacity that exceeds a saturation channel capacity
9807092, Jul 05 2013 DCS7, LLC Systems and methods for classification of internet devices as hostile or benign
9807106, Jul 31 2015 British Telecommunications public limited company Mitigating blockchain attack
9807239, Apr 03 2006 PATENT ARMORY INC Intelligent communication routing system and method
9807621, May 17 2016 GOOGLE LLC Distributed channel sampling across a mesh network
9813973, Apr 03 2016 Siklu Communication Ltd.; SIKLU COMMUNICATION LTD Embedded millimeter-wave components
9814071, Sep 26 2008 COLLISION COMMUNICATIONS, INC Media access control protocol for multiuser detection enabled ad-hoc wireless communications
9818136, Feb 05 2003 System and method for determining contingent relevance
9820157, Mar 06 2017 WIPRO LIMITED Method and system for localizing spatially separated wireless transmitters
9826412, Oct 24 2013 AT&T Intellectual Property I, L.P.; AT&T MOBILITY II LLC Facilitating adaptive key performance indicators in self-organizing networks
9836661, Dec 04 2014 General Electric Company System and method for collision avoidance
9836908, Jul 25 2014 BLOCKTECH LLC System and method for securely receiving and counting votes in an election
9837706, Feb 19 2016 Ford Global Technologies, LLC Directing electromagnetic waves in vehicle communications
9842211, Oct 28 2015 Synaptics Incorporated Systems and methods for biometric authentication
9842312, Feb 19 2010 Upwork Global Inc. Digital workroom
9849364, Feb 02 2016 Smart device
9855785, Apr 04 2016 UNITED SERVICES AUTOMOBILE ASSOCIATION USAA Digitally encoded seal for document verification
9858569, Mar 21 2014 NAVARATNAM, RAMANAN Systems and methods in support of authentication of an item
9859952, Oct 10 2013 ABB Limited Methods and apparatus relating to measurement instruments
9860391, Mar 07 2003 PATENT ARMORY INC Method and system for matching entities in an auction
9862222, Apr 04 2016 UNITED SERVICES AUTOMOBILE ASSOCIATION USAA Digitally encoded seal for document verification
9866545, Jun 02 2015 ALTR SOLUTIONS, INC Credential-free user login to remotely executed applications
9867112, Nov 23 2016 CenturyLink Intellectual Property LLC System and method for implementing combined broadband and wireless self-organizing network (SON)
9870591, Sep 12 2013 Intellectual Frontiers LLC Distributed electronic document review in a blockchain system and computerized scoring based on textual and visual feedback
9875510, Feb 03 2015 Consensus system for tracking peer-to-peer digital records
9876775, Nov 09 2012 ENT TECHNOLOGIES, INC Generalized entity network translation (GENT)
9881176, Jun 02 2015 ALTR SOLUTIONS, INC Fragmenting data for the purposes of persistent storage across multiple immutable data structures
9887933, Oct 31 2014 CITIBANK, N A Method and apparatus to throttle media access by web crawlers
9890744, Aug 08 2014 Ford Global Technologies, LLC Route and traffic information-based EVAP system leak test initiation
9892460, Jun 28 2013 Gemini IP, LLC Systems, methods, and program products for operating exchange traded products holding digital math-based assets
9893898, Mar 11 2011 Emsycon GmbH Tamper-protected hardware and method for using same
9894485, Dec 28 2015 Philips North America LLC Peer-to-peer geolocation system
9896572, Nov 28 2012 PECTCOF B V Pectin extraction from coffee pulp
9898782, Jun 28 2013 Gemini IP, LLC Systems, methods, and program products for operating exchange traded products holding digital math-based assets
9906552, Feb 13 2013 Amazon Technologies, Inc Managing system load
9916588, Jun 27 2008 Certusview Technologies, LLC Methods and apparatus for quality assessment of a field service operation based on dynamic assessment parameters
9922278, Aug 15 2016 LENOVO PC INTERNATIONAL LIMITED Verifying integrity of physical documents
9922498, Mar 13 2013 Game Play Network, Inc. System and method of revealing the outcomes of real world wagers through geolocation reveals
9928290, Aug 17 2015 Accenture Global Solutions Limited Trust framework for platform data
9940594, Feb 19 2010 Elance, Inc. Digital workroom
9942214, Mar 02 2015 Amazon Technologies, Inc Automated agent detection utilizing non-CAPTCHA methods
9942262, Mar 19 2014 University of Virginia; University of Virginia Patent Foundation Cyber-physical system defense
9948467, Dec 21 2015 MasterCard International Incorporated Method and system for blockchain variant using digital signatures
9948580, Jun 19 2015 WhatsApp LLC Techniques to replicate data using uploads from messaging clients
9959065, May 23 2016 GSC Secrypt, LLC Hybrid blockchain
9960909, Dec 08 2014 ALPHAWAVE SEMI, INC High speed and low power hashing system and method
9965628, Mar 02 2015 Dell Products LP Device reporting and protection systems and methods using a secure distributed transactional ledger
9965804, Jun 28 2013 Gemini IP, LLC Systems, methods, and program products for operating exchange traded products holding digital math-based assets
9965805, Jun 28 2013 Gemini IP, LLC Systems, methods, and program products for operating exchange traded products holding digital math-based assets
9966220, Jan 20 2016 GATAN, INC Electron energy loss spectrometer using direct detection sensor
9967088, May 23 2016 GSC Secrypt, LLC Rewritable blockchain
9967096, May 23 2016 GSC Secrypt, LLC Rewritable blockchain
9967333, Mar 02 2015 Dell Products LP Deferred configuration or instruction execution using a secure distributed transaction ledger
9967334, Mar 02 2015 Dell Products LP Computing device configuration and management using a secure decentralized transaction ledger
9973341, Jan 23 2015 Method and apparatus for the limitation of the mining of blocks on a block chain
9986577, Feb 19 2013 VANU, INC Spectrum access system
9995076, Jul 13 2001 Intelligent door restraint
9996574, Jun 30 2015 International Business Machines Corporation Enhancements for optimizing query executions
9997023, Mar 13 2013 Game Play Network, Inc. System and method of managing user accounts to track outcomes of real world wagers revealed to users
9998286, Feb 17 2017 Accenture Global Solutions Limited Hardware blockchain consensus operating procedure enforcement
20010000458,
20010003172,
20010008013,
20010011228,
20010013021,
20010024497,
20010027431,
20010032164,
20010033557,
20010034578,
20010039528,
20010039624,
20010042785,
20010043586,
20010045104,
20010047291,
20010049650,
20010051540,
20020002521,
20020006191,
20020007453,
20020009190,
20020010663,
20020010669,
20020010673,
20020013631,
20020013757,
20020018554,
20020019846,
20020021693,
20020023027,
20020023215,
20020029194,
20020035534,
20020040310,
20020042274,
20020042769,
20020046122,
20020047859,
20020052816,
20020052819,
20020052873,
20020055899,
20020059379,
20020069241,
20020073018,
20020073049,
20020077954,
20020082856,
20020083175,
20020091782,
20020094081,
20020095327,
20020103999,
20020114278,
20020116239,
20020123954,
20020128803,
20020131399,
20020138386,
20020147675,
20020151992,
20020161671,
20020165756,
20020165814,
20020165817,
20020174052,
20020174344,
20020183066,
20020194256,
20020194334,
20020198950,
20030002646,
20030009698,
20030014293,
20030014373,
20030016251,
20030018561,
20030023538,
20030033302,
20030035468,
20030041002,
20030055787,
20030055895,
20030055898,
20030065608,
20030078867,
20030083926,
20030086554,
20030087652,
20030088488,
20030095652,
20030097325,
20030101124,
20030101274,
20030115088,
20030115114,
20030115251,
20030119558,
20030120809,
20030135437,
20030139995,
20030152086,
20030158806,
20030172018,
20030172278,
20030182224,
20030195780,
20030204569,
20030217106,
20030220978,
20030225822,
20030233274,
20030233307,
20030233584,
20040003283,
20040006528,
20040006529,
20040006534,
20040015554,
20040024684,
20040024687,
20040028018,
20040034773,
20040039670,
20040039685,
20040049479,
20040054551,
20040054610,
20040054617,
20040054741,
20040059665,
20040068416,
20040068447,
20040073642,
20040077320,
20040081183,
20040083195,
20040093278,
20040093371,
20040095907,
20040101127,
20040103013,
20040111308,
20040111310,
20040111484,
20040117302,
20040132405,
20040138958,
20040141508,
20040148358,
20040153375,
20040181571,
20040181581,
20040181585,
20040184478,
20040199597,
20040213400,
20040215793,
20040228356,
20040230678,
20040236817,
20040242275,
20040259558,
20040260645,
20040264677,
20040266505,
20040268121,
20050002335,
20050010502,
20050021739,
20050022184,
20050027816,
20050038774,
20050044032,
20050044228,
20050050364,
20050055410,
20050065808,
20050065837,
20050074014,
20050075891,
20050080710,
20050080858,
20050090227,
20050102221,
20050108164,
20050129217,
20050137939,
20050141706,
20050144064,
20050144065,
20050164664,
20050166041,
20050187803,
20050195960,
20050197857,
20050198031,
20050246420,
20050251434,
20050267824,
20050278240,
20050286426,
20050289043,
20050289650,
20060026423,
20060031770,
20060039381,
20060041456,
20060046658,
20060059075,
20060062376,
20060069621,
20060095578,
20060148414,
20060153356,
20060155398,
20060167703,
20060167784,
20060167787,
20060168119,
20060168140,
20060168147,
20060173730,
20060174007,
20060190725,
20060200253,
20060200258,
20060200259,
20060200260,
20060218277,
20060222101,
20060223447,
20060224436,
20060259957,
20060287937,
20070002762,
20070005799,
20070006224,
20070011453,
20070016476,
20070038498,
20070043811,
20070053513,
20070054617,
20070061022,
20070061023,
20070061735,
20070063875,
20070064912,
20070070038,
20070071222,
20070087756,
20070094734,
20070097205,
20070100748,
20070115125,
20070115916,
20070115995,
20070118463,
20070118464,
20070118465,
20070124395,
20070130046,
20070136087,
20070156460,
20070174179,
20070195048,
20070217339,
20070233543,
20070245416,
20070265980,
20070277248,
20070294769,
20070297328,
20080016029,
20080034090,
20080034203,
20080040749,
20080095121,
20080109343,
20080115103,
20080120308,
20080132241,
20080139136,
20080162331,
20080162486,
20080162666,
20080168001,
20080168002,
20080189158,
20080205501,
20080207149,
20080212461,
20080227404,
20080229097,
20080232238,
20080243577,
20080262893,
20080271144,
20080279147,
20080299923,
20080300891,
20080300942,
20080300947,
20080300948,
20080300949,
20080301022,
20080301024,
20080301025,
20080301026,
20080301027,
20080301028,
20080301029,
20080301030,
20080301031,
20080301688,
20080301689,
20080313707,
20090012875,
20090024430,
20090024438,
20090024590,
20090041100,
20090048928,
20090054018,
20090059912,
20090076632,
20090076868,
20090091451,
20090133123,
20090135753,
20090170607,
20090180392,
20090182667,
20090187583,
20090216910,
20090228309,
20090234759,
20090300347,
20090327024,
20100010862,
20100010863,
20100010882,
20100010883,
20100017870,
20100037248,
20100042456,
20100048134,
20100076642,
20100088135,
20100088164,
20100100403,
20100100451,
20100111097,
20100121839,
20100138344,
20100145951,
20100147488,
20100150027,
20100161817,
20100191591,
20100205032,
20100211574,
20100211894,
20100217696,
20100223096,
20100232380,
20100235285,
20100267536,
20100284333,
20100317420,
20100318918,
20100324969,
20100332281,
20110004513,
20110029347,
20110029419,
20110029922,
20110035245,
20110035251,
20110035252,
20110035260,
20110035324,
20110035328,
20110046999,
20110087430,
20110090118,
20110093500,
20110112880,
20110131081,
20110137805,
20110156896,
20110161127,
20110164527,
20110164546,
20110167110,
20110178948,
20110213669,
20110218916,
20110225103,
20110238552,
20110246658,
20110251892,
20110295752,
20110295766,
20120004893,
20120017232,
20120022908,
20120036016,
20120036140,
20120054626,
20120078769,
20120089983,
20120144989,
20120150651,
20120159321,
20120179966,
20120221380,
20120238211,
20120253532,
20120260329,
20120271712,
20120310809,
20120316688,
20120331285,
20130006718,
20130024379,
20130036222,
20130080307,
20130085926,
20130116920,
20130117143,
20130117162,
20130121194,
20130122882,
20130147598,
20130165070,
20130166387,
20130211877,
20130226669,
20130238455,
20130262680,
20140068735,
20140074765,
20140081793,
20140089241,
20140101312,
20140108126,
20140122149,
20140173452,
20140229621,
20140257868,
20140258110,
20140258356,
20140272907,
20140274263,
20140274264,
20140274265,
20140274266,
20140274267,
20140274268,
20140274269,
20140274270,
20140274271,
20140274272,
20140274325,
20140274326,
20140274327,
20140274328,
20140274329,
20140274330,
20140274331,
20140274333,
20140274334,
20140274335,
20140274336,
20140274337,
20140274338,
20140274339,
20140274340,
20140274352,
20140274365,
20140279148,
20140280972,
20140302905,
20140304041,
20140344015,
20140349692,
20140362697,
20140379506,
20150006349,
20150006350,
20150026072,
20150033026,
20150073907,
20150081444,
20150088674,
20150089353,
20150097531,
20150102940,
20150111591,
20150116162,
20150120392,
20150120551,
20150149242,
20150170112,
20150170470,
20150170471,
20150193717,
20150199875,
20150204559,
20150206389,
20150211919,
20150212973,
20150220892,
20150220928,
20150223539,
20150223892,
20150244690,
20150256556,
20150269570,
20150269624,
20150307634,
20150330645,
20150332202,
20150332283,
20150332554,
20150339607,
20150356523,
20150363769,
20150379408,
20160025500,
20160027229,
20160028552,
20160034530,
20160045841,
20160054563,
20160063378,
20160071368,
20160071372,
20160078219,
20160085955,
20160098898,
20160103902,
20160112281,
20160140653,
20160155079,
20160162873,
20160164672,
20160177521,
20160201168,
20160203477,
20160203522,
20160217436,
20160218879,
20160224949,
20160224951,
20160225107,
20160232537,
20160232746,
20160247351,
20160254910,
20160259937,
20160260091,
20160260095,
20160260171,
20160261404,
20160261685,
20160261690,
20160275753,
20160292672,
20160300223,
20160300234,
20160301531,
20160306982,
20160330034,
20160342977,
20160358253,
20160358267,
20160364708,
20160379205,
20160379212,
20160379312,
20170005804,
20170031676,
20170032614,
20170034197,
20170046670,
20170046689,
20170048209,
20170048234,
20170048235,
20170054611,
20170063551,
20170083907,
20170085545,
20170085555,
20170091397,
20170091756,
20170098346,
20170102307,
20170103355,
20170103458,
20170103472,
20170103608,
20170104345,
20170109735,
20170116693,
20170124556,
20170124647,
20170126684,
20170126702,
20170132619,
20170132620,
20170132621,
20170132625,
20170132626,
20170132931,
20170134280,
20170140321,
20170145193,
20170148016,
20170148265,
20170178128,
20170180134,
20170185981,
20170188197,
20170200147,
20170206382,
20170206512,
20170206532,
20170206603,
20170206604,
20170207059,
20170207917,
20170213289,
20170221032,
20170221052,
20170228704,
20170228731,
20170228822,
20170230189,
20170230242,
20170232300,
20170236094,
20170236121,
20170237554,
20170237569,
20170237570,
20170237766,
20170237770,
20170242729,
20170243208,
20170243213,
20170243214,
20170243222,
20170243286,
20170243287,
20170244707,
20170244709,
20170249482,
20170249606,
20170255917,
20170262833,
20170278026,
20170278186,
20170285720,
20170286717,
20170286934,
20170293669,
20170293747,
20170295023,
20170300627,
20170318008,
20170323294,
20170323392,
20170324711,
20170327035,
20170330174,
20170330250,
20170331803,
20170338947,
20170338957,
20170344435,
20170344580,
20170344987,
20170346693,
20170346804,
20170346830,
20170352033,
20170352116,
20170352219,
20170357966,
20170359288,
20170359374,
20170364450,
20170364698,
20170364699,
20170364700,
20170364701,
20170364702,
20170366353,
20170366395,
20170366416,
20170366547,
20170372308,
20170372391,
20170372392,
20170374049,
20180006831,
20180013567,
20180018723,
20180019867,
20180019921,
20180020324,
20180025166,
20180025365,
20180025435,
20180025442,
20180032273,
20180039667,
20180039982,
20180039993,
20180040007,
20180040040,
20180040041,
20180046889,
20180048469,
20180049043,
20180053182,
20180068358,
20180075527,
20180076957,
20180077134,
20180078843,
20180082043,
20180082216,
20180082255,
20180082256,
20180082296,
20180084042,
20180088928,
20180089041,
20180089436,
20180089465,
20180089625,
20180089667,
20180089678,
20180089683,
20180089684,
20180089685,
20180089729,
20180089758,
20180089760,
20180089761,
20180091316,
20180096163,
20180096563,
20180101684,
20180101848,
20180102013,
20180103042,
20180108024,
20180109541,
20180113752,
20180115413,
20180115425,
20180117446,
20180117447,
20180121673,
20180121918,
20180122031,
20180123882,
20180129700,
20180131511,
20180137306,
20180137503,
20180139042,
20180139103,
20180139186,
20180144156,
20180144292,
20180145836,
20180146338,
20180146339,
20180150440,
20180150488,
20180150865,
20180157481,
20180157688,
20180157999,
20180158051,
20180158058,
20180158278,
20180160270,
20180165720,
20180165781,
20180166062,
20180167217,
20180173747,
20180173906,
20180174122,
20180174188,
20180176017,
20180181759,
20180181904,
20180181909,
20180181953,
20180181964,
20180183587,
20180183600,
20180189312,
20180189730,
20180191503,
20180192131,
20180198632,
20180198794,
20180204191,
20180204192,
20180204213,
20180204259,
20180204260,
20180205537,
20180205552,
20180205555,
20180205558,
20180211252,
20180211316,
20180211322,
20180211487,
20180212783,
20180212970,
20180216946,
20180218003,
20180218364,
20180218454,
20180219676,
20180220278,
20180225366,
20180225611,
20180227128,
20180232731,
20180234239,
20180240165,
20180240639,
20180241573,
20180247191,
20180247320,
20180248685,
20180248701,
20180248880,
20180253464,
20180253691,
20180253702,
20180254887,
20180257306,
20180260811,
20180260879,
20180260921,
20180262335,
20180264347,
20180267539,
20180267789,
20180268436,
20180276597,
20180276600,
20180276626,
20180276663,
20180278596,
20180285217,
20180285412,
20180285838,
20180285840,
20180285879,
20180285983,
20180285996,
20180287790,
20180287805,
20180287915,
20180293547,
20180293553,
20180293556,
20180293557,
20180294955,
20180294956,
20180294957,
20180295546,
20180300382,
20180300495,
20180302222,
20180302390,
20180307854,
20180307857,
20180307868,
20180308078,
20180308161,
20180314809,
20180315047,
20180315055,
20180315145,
20180315309,
20180322561,
20180322597,
20180323964,
20180326291,
20180328612,
20180329944,
20180329945,
20180331835,
20180336552,
20180337769,
20180337879,
20180341861,
20180343266,
20180343305,
20180343306,
20180343307,
20180343339,
20180349867,
20180349879,
20180349896,
20180349968,
20180352268,
20180356236,
20180357603,
20180365691,
20180373776,
20180373983,
20180373984,
20180374037,
20180374094,
20180374173,
20190004789,
20190005566,
20190007198,
20190007199,
20190007484,
20190012249,
20190012595,
20190012623,
20190012695,
20190013932,
20190013933,
20190013934,
20190013948,
20190016419,
20190018887,
20190018888,
20190018975,
20190025817,
20190025818,
20190026146,
20190028275,
20190028276,
20190028280,
20190034903,
20190034926,
20190035208,
20190035209,
20190036702,
20190036712,
20190042407,
20190044735,
20190044736,
20190050831,
20190054030,
20190057115,
20190057379,
20190057454,
20190058590,
20190058593,
20190058599,
20190058604,
20190058709,
20190065093,
20190065709,
20190065764,
20190065788,
20190066119,
20190073146,
20190073152,
20190073645,
20190073646,
20190074962,
20190074966,
20190075022,
20190075160,
20190080118,
20190080407,
20190080411,
20190097806,
20190097807,
20190097813,
20190098013,
20190101896,
20190102409,
20190102423,
20190102839,
20190104102,
20190104196,
AU1580501,
AU1997036815,
AU1997036816,
AU1997036840,
AU2003289583,
AU2008311749,
AU2008311930,
CA2705191,
CA2716727,
CN101283526,
CN101305526,
CN101828307,
CN102036269,
CN102075898,
CN102123505,
CN102710508,
CN102844605,
CN102954796,
CN102982274,
CN103954269,
CN104023277,
CN104050551,
CN104961088,
CN105205013,
CN107306409,
EP128672,
EP399822,
EP421409,
EP565314,
EP715247,
EP913757,
EP952741,
EP1054336,
EP1285380,
EP1325594,
EP1646112,
EP1895456,
EP2107518,
EP2215550,
EP2257875,
EP2476082,
EP2550765,
EP2848487,
EP2989851,
EP3005174,
EP3242729,
EP3257171,
EP3417642,
FR2905763,
FR2907582,
GB2264796,
GB2366401,
GB2418267,
GB2498924,
JP2001019496,
JP2002342684,
JP2005539296,
JP2012160004,
JP3979400,
JP4245059,
JP4947145,
JP5140121,
JP5181184,
JP5228366,
JP5516577,
JP5682610,
JP5734299,
JP6015086,
JP6426477,
KR100653087,
KR100924683,
KR100962399,
KR101036693,
KR101179919,
KR101288970,
KR101379255,
KR101422213,
KR101703163,
KR20050007348,
KR20150092933,
KR20170004054,
RE35758, Apr 17 1992 GOLDEN VOICE TECHNOLOGY AND TRAINING L L C Voice/data-formatted telephone information storage and retrieval system
RE36416, May 25 1995 Wilmington Trust, National Association, as Administrative Agent Method and apparatus for dynamic and interdependent processing of inbound calls and outbound calls
RE37001, Nov 16 1988 Aspect Communications Corporation Interactive call processor to facilitate completion of queued calls
RE45775, Jun 13 2000 Comcast Cable Communications, LLC Method and system for robust, secure, and high-efficiency voice and packet transmission over ad-hoc, mesh, and MIMO communication networks
RE46310, Dec 23 1991 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
RU17642,
RU2161819,
WO77539,
WO108063,
WO108072,
WO110076,
WO154335,
WO207031,
WO2091100,
WO291100,
WO2004018158,
WO2005114106,
WO2006027557,
WO2006029297,
WO2006039803,
WO2006047879,
WO2006096612,
WO2007044383,
WO2007067930,
WO2008109641,
WO2008142682,
WO2009067252,
WO2009067254,
WO2009082717,
WO2009114161,
WO2009126785,
WO2009146132,
WO2009148641,
WO2010024929,
WO2010027308,
WO2010028315,
WO2010075408,
WO2010090617,
WO2010143182,
WO2011010462,
WO2011048531,
WO2011085252,
WO2011141371,
WO2011153155,
WO2012072651,
WO2013073020,
WO2015030731,
WO2016011582,
WO2016176684,
WO2017147331,
WO2017200948,
WO9002382,
WO9222870,
WO9301550,
WO9403859,
WO9406103,
WO9419912,
WO9627155,
WO9634356,
WO9737315,
WO9743761,
WO9809144,
WO9809209,
WO9810381,
WO9837481,
WO9845768,
WO9901815,
WO9924928,
WO9927476,
WO9948296,
//
Executed onAssignorAssigneeConveyanceFrameReelDoc
Apr 04 2019HOFFBERG FAMILY TRUST 2(assignment on the face of the patent)
Sep 23 2019HOFFBERG, STEVEN M , MRHOFFBERG FAMILY TRUST 2ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0504660560 pdf
Date Maintenance Fee Events
Apr 04 2019BIG: Entity status set to Undiscounted (note the period is included in the code).


Date Maintenance Schedule
Dec 13 20254 years fee payment window open
Jun 13 20266 months grace period start (w surcharge)
Dec 13 2026patent expiry (for year 4)
Dec 13 20282 years to revive unintentionally abandoned end. (for year 4)
Dec 13 20298 years fee payment window open
Jun 13 20306 months grace period start (w surcharge)
Dec 13 2030patent expiry (for year 8)
Dec 13 20322 years to revive unintentionally abandoned end. (for year 8)
Dec 13 203312 years fee payment window open
Jun 13 20346 months grace period start (w surcharge)
Dec 13 2034patent expiry (for year 12)
Dec 13 20362 years to revive unintentionally abandoned end. (for year 12)