Assertion list
computer system (primary) → ReceivesAction

Results from Ascent++: 261
computer systemReceivesAction affected by other threats 0.59
computer systemReceivesAction connected 0.54
computer systemReceivesAction known in the art 0.52
computer systemReceivesAction shown in fig 0.51
computer systemReceivesAction validated 0.51
computer systemReceivesAction designed 0.51
computer systemReceivesAction updated 0.50
computer systemReceivesAction interconnected 0.49
computer systemReceivesAction bought 0.49
computer systemReceivesAction rebooted 0.49
computer systemReceivesAction networked 0.48
computer systemReceivesAction shown in above figures 0.48
computer systemReceivesAction connected by lan 0.48
computer systemReceivesAction claimed in claim 0.47
computer systemReceivesAction performed 0.46
computer systemReceivesAction connected to printer 0.46
computer systemReceivesAction illustrated in fig 0.45
computer systemReceivesAction identified 0.44
computer systemReceivesAction limited 0.44
computer systemReceivesAction configured 0.44
computer systemReceivesAction hacked 0.44
computer systemReceivesAction connected to network 0.43
computer systemReceivesAction coupled via the bus 0.43
computer systemReceivesAction protected against intrusion 0.43
computer systemReceivesAction linked 0.42
computer systemReceivesAction owned 0.42
computer systemReceivesAction provided 0.42
computer systemReceivesAction implemented 0.41
computer systemReceivesAction used in tracking 0.41
computer systemReceivesAction employed 0.41
computer systemReceivesAction incorporated into personal comp… 0.41
computer systemReceivesAction described in claim 0.40
computer systemReceivesAction shown comprising hardware eleme… 0.40
computer systemReceivesAction obtained 0.40
computer systemReceivesAction constructed in accordance 0.40
computer systemReceivesAction coupled to network 0.39
computer systemReceivesAction described 0.39
computer systemReceivesAction used in conjunction 0.39
computer systemReceivesAction programmed 0.38
computer systemReceivesAction coupled through the internet 0.38
computer systemReceivesAction disclosed 0.38
computer systemReceivesAction described in relation 0.38
computer systemReceivesAction coupled to a communications net… 0.37
computer systemReceivesAction illustrated 0.37
computer systemReceivesAction described with reference 0.36
computer systemReceivesAction incorporated into a tablet pc 0.36
computer systemReceivesAction incorporated into mobile device 0.36
computer systemReceivesAction bought on big-scale 0.36
computer systemReceivesAction implemented in particular embod… 0.36
computer systemReceivesAction used to implement method 0.36
computer systemReceivesAction connected to other computer sys… 0.35
computer systemReceivesAction turned off power 0.35
computer systemReceivesAction configured by software 0.35
computer systemReceivesAction connected to the service 0.35
computer systemReceivesAction booted 0.35
computer systemReceivesAction connected to each other 0.35
computer systemReceivesAction controlled by operating system … 0.35
computer systemReceivesAction installed 0.35
computer systemReceivesAction used by the person 0.35
computer systemReceivesAction used in a wan networking enviro… 0.35
computer systemReceivesAction connected by 24 hour 0.34
computer systemReceivesAction accessed through network 0.34
computer systemReceivesAction incorporated into other machine 0.34
computer systemReceivesAction incorporated into personal digi… 0.34
computer systemReceivesAction upgraded 0.34
computer systemReceivesAction assigned by the internet servic… 0.33
computer systemReceivesAction configured to access including … 0.33
computer systemReceivesAction developed 0.33
computer systemReceivesAction incorporated into a communicati… 0.33
computer systemReceivesAction incorporated into a web applian… 0.33
computer systemReceivesAction incorporated into palmtop compu… 0.33
computer systemReceivesAction modified in accordance 0.33
computer systemReceivesAction programmed to provide graphical… 0.33
computer systemReceivesAction configured with executable inst… 0.33
computer systemReceivesAction connected to other devices 0.33
computer systemReceivesAction embodied in wireless device 0.33
computer systemReceivesAction implemented in software or hard… 0.33
computer systemReceivesAction incorporated into camera 0.33
computer systemReceivesAction used by the data subject 0.33
computer systemReceivesAction affected by desktop 0.32
computer systemReceivesAction affected by laptop 0.32
computer systemReceivesAction affected by mobile devices 0.32
computer systemReceivesAction backed up by a best-in-the-indu… 0.32
computer systemReceivesAction backed up by personalized custo… 0.32
computer systemReceivesAction manufactured by avadirect 0.32
computer systemReceivesAction acquired on big-scale 0.32
computer systemReceivesAction coupled by communication link 0.32
computer systemReceivesAction described in greater detail 0.32
computer systemReceivesAction incorporated into a control sys… 0.32
computer systemReceivesAction powered 0.32
computer systemReceivesAction shown in communication 0.32
computer systemReceivesAction equipped 0.31
computer systemReceivesAction on special 0.31
computer systemReceivesAction connected to the communications… 0.31
computer systemReceivesAction embodied in gateway 0.31
computer systemReceivesAction incorporated into wireless tele… 0.31
computer systemReceivesAction programmable 0.31
computer systemReceivesAction responsible for coordination 0.31
computer systemReceivesAction shown to contain single system … 0.31
computer systemReceivesAction shown with one cpu 0.31
computer systemReceivesAction affected by files virus 0.31
computer systemReceivesAction configured to provide service 0.30
computer systemReceivesAction manufactured 0.30
computer systemReceivesAction programmed to perform the metho… 0.30
computer systemReceivesAction affected 0.30
computer systemReceivesAction based on method 0.29
computer systemReceivesAction configured in accordance 0.29
computer systemReceivesAction connected to the website 0.29
computer systemReceivesAction designed to block unauthorized … 0.29
computer systemReceivesAction embodied in server 0.29
computer systemReceivesAction evolved into sophisticated devi… 0.29
computer systemReceivesAction go to be protected against virus 0.29
computer systemReceivesAction illustrated as 14 0.29
computer systemReceivesAction illustrated as 20 0.29
computer systemReceivesAction illustrated as workstation 0.29
computer systemReceivesAction incorporated into a set-top box 0.29
computer systemReceivesAction incorporated into personal trus… 0.29
computer systemReceivesAction interconnected by phone wires 0.29
computer systemReceivesAction operated by said second operati… 0.29
computer systemReceivesAction regulated by fda 0.29
computer systemReceivesAction supposed to be able to handle 5… 0.29
computer systemReceivesAction used in business 0.29
computer systemReceivesAction utilized by preferred embodiment 0.29
computer systemReceivesAction configured to generate the score 0.28
computer systemReceivesAction connected to workstation 0.28
computer systemReceivesAction coupled to a second i/o 0.28
computer systemReceivesAction coupled to server 16 0.28
computer systemReceivesAction coupled to the interrogator 0.28
computer systemReceivesAction docked 0.28
computer systemReceivesAction embodied in hub 0.28
computer systemReceivesAction embodied in other device 0.28
computer systemReceivesAction embodied in personal computer 0.28
computer systemReceivesAction embodied in workstation 0.28
computer systemReceivesAction incorporated into a land-line t… 0.28
computer systemReceivesAction incorporated into facsimile mac… 0.28
computer systemReceivesAction incorporated into pager 0.28
computer systemReceivesAction incorporated into printer 0.28
computer systemReceivesAction incorporated into scanner 0.28
computer systemReceivesAction practiced in distributed cloud … 0.28
computer systemReceivesAction programmed via instruction 0.28
computer systemReceivesAction re 0.28
computer systemReceivesAction started 0.28
computer systemReceivesAction stored on various types of comp… 0.28
computer systemReceivesAction based upon the information 0.27
computer systemReceivesAction configured to perform method 0.27
computer systemReceivesAction connected to the member 0.27
computer systemReceivesAction connected to the postage server 0.27
computer systemReceivesAction coupled to the processor 0.27
computer systemReceivesAction executed by the processor 0.27
computer systemReceivesAction expanded 0.27
computer systemReceivesAction illustrated as one or more clie… 0.27
computer systemReceivesAction implemented in software 0.27
computer systemReceivesAction included in suitable resource 0.27
computer systemReceivesAction linked in fiber optic link 0.27
computer systemReceivesAction linked in modem 0.27
computer systemReceivesAction maintained 0.27
computer systemReceivesAction managed 0.27
computer systemReceivesAction manufactured with processor 0.27
computer systemReceivesAction monitored 0.27
computer systemReceivesAction operated by said first operatin… 0.27
computer systemReceivesAction outputted on connector 0.27
computer systemReceivesAction outputted on wiring 0.27
computer systemReceivesAction provided by third party 0.27
computer systemReceivesAction provided by vendor 0.27
computer systemReceivesAction returned 0.27
computer systemReceivesAction sold 0.27
computer systemReceivesAction treated as instruction 0.27
computer systemReceivesAction used as platform 0.27
computer systemReceivesAction used in place of computer system 0.27
computer systemReceivesAction used to implement apparatus 0.27
computer systemReceivesAction shown by way of example 0.26
computer systemReceivesAction affected by cryptowall 0.25
computer systemReceivesAction affected by gandcrab 0.25
computer systemReceivesAction activated 0.25
computer systemReceivesAction adapted to receive movement data 0.25
computer systemReceivesAction assembled 0.25
computer systemReceivesAction assigned by time 0.25
computer systemReceivesAction authenticated for access 0.25
computer systemReceivesAction authenticated to receive said i… 0.25
computer systemReceivesAction authorized to be placed in one … 0.25
computer systemReceivesAction based on boolean logic 0.25
computer systemReceivesAction based on stored-program archite… 0.25
computer systemReceivesAction based on the ace 0.25
computer systemReceivesAction based on the edvac 0.25
computer systemReceivesAction captured 0.25
computer systemReceivesAction configured in response 0.25
computer systemReceivesAction configured to generate metrolog… 0.25
computer systemReceivesAction configured to include at least … 0.25
computer systemReceivesAction configured to output the proces… 0.25
computer systemReceivesAction connected to programming unit 0.25
computer systemReceivesAction connected to the screen 0.25
computer systemReceivesAction considered for retrieval 0.25
computer systemReceivesAction considered for storage 0.25
computer systemReceivesAction contemplated 0.25
computer systemReceivesAction controlled by a third-party fac… 0.25
computer systemReceivesAction cooled 0.25
computer systemReceivesAction coupled to a cathode ray tube 0.25
computer systemReceivesAction coupled to onboard device 0.25
computer systemReceivesAction described to connect as computi… 0.25
computer systemReceivesAction determined 0.25
computer systemReceivesAction done in full measure 0.25
computer systemReceivesAction done in half 0.25
computer systemReceivesAction embodied in a client device 0.25
computer systemReceivesAction employed as a trading station 0.25
computer systemReceivesAction envisioned by scientist 0.25
computer systemReceivesAction envisioned by writer 0.25
computer systemReceivesAction exploited as criminal activities 0.25
computer systemReceivesAction exploited as the targets of ter… 0.25
computer systemReceivesAction fixed 0.25
computer systemReceivesAction illustrative of processor 0.25
computer systemReceivesAction implemented in a variety of for… 0.25
computer systemReceivesAction implemented in certain aspects 0.25
computer systemReceivesAction indicated by numeral 100 0.25
computer systemReceivesAction interconnected by other means 0.25
computer systemReceivesAction linked into a computer grid 0.25
computer systemReceivesAction linked into cluster 0.25
computer systemReceivesAction made up of various subsystems 0.25
computer systemReceivesAction manufactured by apple computer 0.25
computer systemReceivesAction operable to map locally generat… 0.25
computer systemReceivesAction operated by partial owners 0.25
computer systemReceivesAction optimized 0.25
computer systemReceivesAction provided in paragraph 0.25
computer systemReceivesAction put into operation 0.25
computer systemReceivesAction received 0.25
computer systemReceivesAction selected 0.25
computer systemReceivesAction shown in accordance 0.25
computer systemReceivesAction structured 0.25
computer systemReceivesAction terminated 0.25
computer systemReceivesAction used at work 0.25
computer systemReceivesAction used by time 0.25
computer systemReceivesAction used to implement teaching 0.25
computer systemReceivesAction used to perform logic synthesis… 0.25
computer systemReceivesAction used to provide assistance 0.25
computer systemReceivesAction used to send electronic message 0.25
computer systemReceivesAction owned by the u.s. army 0.24
computer systemReceivesAction affected by ad 0.23
computer systemReceivesAction infected with virus 0.22
computer systemReceivesAction affected by dharma virus 0.21
computer systemReceivesAction arranged to support virtual mac… 0.21
computer systemReceivesAction linked with networking software… 0.21
computer systemReceivesAction owned by nasa 0.21
computer systemReceivesAction owned by oracle 0.21
computer systemReceivesAction subject to interruption 0.21
computer systemReceivesAction utilized to drive economic grow… 0.21
computer systemReceivesAction affected by cerber 0.20
computer systemReceivesAction replaced 0.20
computer systemReceivesAction built 0.19
computer systemReceivesAction affected by cryptconsole 0.18
computer systemReceivesAction affected by cryptolocker 0.18
computer systemReceivesAction affected by everbe 0.18
computer systemReceivesAction affected by globe 0.18
computer systemReceivesAction affected by iphone 0.18
computer systemReceivesAction affected by ransomware 0.18
computer systemReceivesAction restarted 0.18
computer systemReceivesAction attacked 0.16
computer systemReceivesAction connected to the university net… 0.16
computer systemReceivesAction difficult to secure 0.16
computer systemReceivesAction protected against possible haza… 0.13
computer systemReceivesAction protected against the provider 0.13
computer systemReceivesAction connected to server 0.11
computer systemReceivesAction protected against neither the t… 0.11