This patent had ► Log In grant time compared to others in this category.
Patent grant time can be influenced by many factors. Activities within the USPTO that are beyond the control of patent attornies can influence grant time, but short grant times can also indicate well-written patents and dedicated efforts to respond rapidly to USPTO office actions with strong arguments. Shorter grant times are preferable, and the scores for this section are inverse measures — higher scores are better.
This patent has ► Log In claims compared to others in this category.
The number of claims in a patent is correlated with its strength. Because greater claim counts increase the cost of a patent, more claims can indicate the importance an applicant assigns to a patent. Importantly, some may elect to file claims across multiple patents. A higher score in this metric indicates more claims, relative to others in this category.
This patent has received ► Log In citations from other patents, than others in this category.
Citations from other patents are an important measure of the significance of a patent. More citations indicate that other technologies build on a patent. Higher scores in this metric are better, and indicate more citations from other patents.
This patent referenced ► Log In citations to other patents, than others in this category.
A lower number of citations to other patents can be a sign of diminished patent strength. More citations indicate dependence on more other technologies. Higher scores in this category are better, and indicate fewer citations to other patents.
This patent has ► Log In proximity to basic research compared to others in this category.
Proximity to basic research is measured by comparing the number of citations to non-patent literature among a cohort of patents. Because most non-patent citations are primary research papers, a higher count indicates greater proximity to basic research.
|6,493,825||Authentication of a host processor requesting service in a data processing network|
|6,185,601||Dynamic load balancing of a network of client and server computers|
|5,941,972||Storage router and method for providing virtual local storage|
|5,862,404||Network device discovery and status information distribution using independent information distribution processes|
|9,305,142||Buffer memory protection unit|
|9,251,381||Solid-state storage subsystem security solution|
|9,229,647||Systems, methods, and apparatus for spoofing a port of a host entity to identify data that is stored in a storage system and may be accessed by the port of the host entity|
|9,077,752||Systems, apparatus, and methods for identifying stored data that may be accessed by a host entity and providing data management services|
|8,874,791||Automatically reconnecting a client across reliable and persistent communication sessions|
|8,762,730||System and method to establish and/or manage a trusted relationship between a host to storage array controller and/or a storage array to storage array controller|
|8,694,703||Hardware-accelerated lossless data compression|
|8,694,637||Virtual private server with CPU time scheduler and isolation of system components|
|8,566,908||Database application security|
|8,549,280||System, device and method for securely transferring data across a network|
|8,417,818||Systems and methods for intercepting data relating to storage volume access|
|8,356,184||Data storage device comprising a secure processor for maintaining plaintext access to an LBA table|
|8,335,850||Method and apparatus for role-based access control|
|8,307,406||Database application security|
|8,281,043||Out-of-band access to storage devices through port-sharing hardware|
|8,255,538||Systems and methods for intercepting data relating to storage volume access|
|8,209,469||Offline device-side logical unit number controller|
|8,108,692||Solid-state storage subsystem security solution|
|8,090,874||Systems and methods for maintaining a client's network connection thru a change in network identifier|
|7,984,157||Persistent and reliable session securely traversing network components using an encapsulating protocol|
|7,924,884||Performance logging using relative differentials and skip recording|
|7,817,583||Method for verifying a storage area network configuration|
|7,765,373||System for controlling use of a solid-state storage subsystem|
|7,725,555||Detecting missing elements in a storage area network with multiple sources of information|
|7,685,269||Service-level monitoring for storage applications|
|7,603,446||System and method for configuring a storage area network|
|7,562,146||Encapsulating protocol for session persistence and reliability|
|7,502,726||Systems and methods for maintaining a session between a client and host service|
|7,461,148||Virtual private server with isolation of system components|
|7,424,533||Method and apparatus for role-based access control|
|7,340,772||Systems and methods for continuing an operation interrupted from a reconnection between a client and server|
|7,188,187||File transfer method and system|
|7,080,133||Method and system for configuring a computer network|