This patent had ► Log In grant time compared to others in this category.
Patent grant time can be influenced by many factors. Activities within the USPTO that are beyond the control of patent attornies can influence grant time, but short grant times can also indicate well-written patents and dedicated efforts to respond rapidly to USPTO office actions with strong arguments. Shorter grant times are preferable, and the scores for this section are inverse measures — higher scores are better.
This patent has ► Log In claims compared to others in this category.
The number of claims in a patent is correlated with its strength. Because greater claim counts increase the cost of a patent, more claims can indicate the importance an applicant assigns to a patent. Importantly, some may elect to file claims across multiple patents. A higher score in this metric indicates more claims, relative to others in this category.
This patent has received ► Log In citations from other patents, than others in this category.
Citations from other patents are an important measure of the significance of a patent. More citations indicate that other technologies build on a patent. Higher scores in this metric are better, and indicate more citations from other patents.
This patent referenced ► Log In citations to other patents, than others in this category.
A lower number of citations to other patents can be a sign of diminished patent strength. More citations indicate dependence on more other technologies. Higher scores in this category are better, and indicate fewer citations to other patents.
This patent has ► Log In proximity to basic research compared to others in this category.
Proximity to basic research is measured by comparing the number of citations to non-patent literature among a cohort of patents. Because most non-patent citations are primary research papers, a higher count indicates greater proximity to basic research.
|6,453,353||Role-based navigation of information resources|
|6,446,092||Independent distributed database system|
|6,421,714||Efficient mobility management scheme for a wireless internet access system|
|6,393,468||Data access control|
|6,295,482||Electronic newspaper vending machine|
|6,272,537||Method for building element manager for a computer network element using a visual element manager builder process|
|6,259,405||Geographic based communications service|
|6,256,670||Alarm server systems, apparatus, and processes|
|9,325,662||System and method for reduction of mobile network traffic used for domain name system (DNS) queries|
|9,311,378||Data synchronization between a data management system and an external system|
|9,208,123||Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor|
|9,173,128||Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol|
|9,084,105||Device resources sharing for network resource conservation|
|9,065,765||Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network|
|9,049,179||Mobile network traffic coordination across multiple applications|
|9,043,433||Mobile network traffic coordination across multiple applications|
|9,037,637||Dual blind method and system for attributing activity to a user|
|9,021,021||Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system|
|9,009,250||Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation|
|9,002,828||Predictive content delivery|
|8,977,755||Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation|
|8,959,336||Securing locally stored web-based database data|
|8,934,414||Cellular or WiFi mobile traffic optimization based on public or private network destination|
|8,914,408||Detecting mobile operator networks|
|8,903,954||Optimization of resource polling intervals to satisfy mobile device requests|
|8,892,495||Adaptive pattern recognition based controller apparatus and method and human-interface therefore|
|8,875,126||System and method for server customization|
|8,874,761||Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols|
|8,868,753||System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation|
|8,862,657||Policy based content service|
|8,843,153||Mobile traffic categorization and policy for network use optimization while preserving user experience|
|8,839,412||Flexible real-time inbox access|
|8,838,783||Distributed caching for resource and mobile network traffic management|
|8,838,744||Web-based access to data objects|
|8,832,228||System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief|
|8,812,695||Method and system for management of a virtual network connection without heartbeat messages|
|8,799,410||System and method of a relay server for managing communications and notification between a mobile device and a web access server|
|8,782,222||Timing of keep-alive messages used in a system for mobile network resource conservation and optimization|
|8,775,631||Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications|
|8,762,489||System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief|
|8,761,756||Maintaining an IP connection in a mobile network|
|8,750,123||Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network|
|8,700,804||Methods and apparatus for managing mobile content|
|8,700,728||Cache defeat detection and caching of content addressed by identifiers intended to defeat cache|
|8,665,265||Methods and systems for remoting three dimensional graphics|
|8,621,455||System and method for server customization|
|8,621,075||Detecting and preserving state for satisfying application requests in a distributed proxy and cache system|
|8,405,654||Methods and systems for remoting three dimensional graphics|
|8,352,906||Method, system, and computer program product for implementing external domain independent modeling framework in a system design|
|8,350,863||Methods and systems for improving resource utilization by delaying rendering of three dimensional graphics|
|8,169,436||Methods and systems for remoting three dimensional graphics|
|8,010,491||Method for managing multiple file states for replicated files|
|7,895,156||Method, system, and computer program product for implementing a model exchange framework generating a synchronization record in response to a model exchange request using fusion technology|
|7,885,976||Identification, notification, and control of data access quantity and patterns|
|7,882,550||Customized untrusted certificate replication|
|7,831,833||System and method for key recovery|
|7,797,724||Methods and apparatus for secure online access on a client device|
|7,562,226||System and method for permission-based access using a shared account|
|7,506,365||Document distribution method and document management method|
|7,428,544||Systems and methods for mapping e-mail records between a client and server that use disparate storage formats|
|7,389,309||Method for managing file replication in applications|
|7,346,633||System providing methodology for replication subscription resolution|
|7,315,854||Distributed directory replication|
|7,162,543||Process for synchronizing data between remotely located devices and a central computer system|
|7,143,419||Device for running offline applications and synchronizing with a central computer system|