This patent had ► Log In grant time compared to others in this category.
Patent grant time can be influenced by many factors. Activities within the USPTO that are beyond the control of patent attornies can influence grant time, but short grant times can also indicate well-written patents and dedicated efforts to respond rapidly to USPTO office actions with strong arguments. Shorter grant times are preferable, and the scores for this section are inverse measures — higher scores are better.
This patent has ► Log In claims compared to others in this category.
The number of claims in a patent is correlated with its strength. Because greater claim counts increase the cost of a patent, more claims can indicate the importance an applicant assigns to a patent. Importantly, some may elect to file claims across multiple patents. A higher score in this metric indicates more claims, relative to others in this category.
This patent has received ► Log In citations from other patents, than others in this category.
Citations from other patents are an important measure of the significance of a patent. More citations indicate that other technologies build on a patent. Higher scores in this metric are better, and indicate more citations from other patents.
This patent referenced ► Log In citations to other patents, than others in this category.
A lower number of citations to other patents can be a sign of diminished patent strength. More citations indicate dependence on more other technologies. Higher scores in this category are better, and indicate fewer citations to other patents.
This patent has ► Log In proximity to basic research compared to others in this category.
Proximity to basic research is measured by comparing the number of citations to non-patent literature among a cohort of patents. Because most non-patent citations are primary research papers, a higher count indicates greater proximity to basic research.
|6,654,793||System and method for facilitating dynamic loading of stub information to enable a program operating in one address space to invoke processing of a remote method or procedure in another address space|
|6,578,074||Provisioning server enhancement|
|6,408,342||Communications framework for supporting multiple simultaneous communications protocols in a distributed object environment|
|6,385,643||Clustered enterprise Java| having a message passing kernel in a distributed processing system|
|6,343,308||Systems, methods and computer programs for mixing different versions of Java classes|
|6,292,934||Method and system for improving the locality of memory references during execution of a computer program|
|6,282,581||Mechanism for resource allocation and for dispatching incoming calls in a distributed object environment|
|6,282,568||Platform independent distributed management system for manipulating managed objects in a network|
|6,272,559||Deferred reconstruction of objects and remote loading for event notification in a distributed system|
|6,263,379||Method and system for referring to and binding to objects using identifier objects|
|6,263,350||Method and system for leasing storage|
|6,253,256||Deferred reconstruction of objects and remote loading in a distributed system|
|6,247,091||Method and system for communicating interrupts between nodes of a multinode computer system|
|6,243,814||Method and apparatus for reliable disk fencing in a multicomputer system|
|6,243,716||Methods and systems for distributed failure detection and recovery using leasing|
|6,226,746||Stack-based system and method to combine security requirements of methods|
|6,216,158||System and method using a palm sized computer to control network devices|
|6,212,578||Method and apparatus for managing dependencies in a distributed computing environment for ensuring the safety of remote procedure calls|
|6,199,116||Method and system for managing data while sharing application programs|
|6,189,046||Mechanism and method for merging cached location information in a distributed object environment|
|6,185,611||Dynamic lookup service in a distributed system|
|6,185,602||Multi-user interaction of multimedia communication|
|6,157,960||Technique for programmatically creating distributed object programs|
|6,154,844||System and method for attaching a downloadable security profile to a downloadable|
|6,108,346||Combined synchronous and asynchronous message transmission|
|6,104,716||Method and apparatus for lightweight secure communication tunneling over the internet|
|6,093,216||Method of run-time tracking of object references in Java programs|
|6,092,194||System and method for protecting a computer and a network from hostile downloadables|
|6,085,255||System and associated method for re-engineering a telecommunications support system with object-oriented translators|
|6,052,761||Increment update in an SCI based system|
|6,009,413||System for real time shopping|
|6,003,050||Method for integrating a virtual machine with input method editors|
|5,999,988||Method and apparatus for generating and employing a run-time generated stub to reference an object in object oriented systems|
|5,991,808||Task processing optimization in a multiprocessor system|
|5,982,773||Lan connection method|
|5,974,201||Smart image system|
|5,963,947||Technique of dynamically adding functionality from a client to manipulated data at a server|
|5,951,652||Dependable data element synchronization mechanism|
|5,949,998||Filtering an object interface definition to determine services needed and provided|
|5,933,647||System and method for software distribution and desktop management in a computer network environment|
|5,913,029||Distributed database system and method|
|5,845,090||System for software distribution in a digital computer network|
|5,799,173||Dynamic workload balancing|
|5,794,207||Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers|
|5,778,179||System for flexible distributed processing and transaction processing suitable for nested transaction|
|5,768,532||Method and distributed database file system for implementing self-describing distributed file objects|
|5,764,897||Method and apparatus for managing transactions in an object-oriented distributed system|
|5,758,077||Service-centric monitoring system and method for monitoring of distributed services in a computing network|
|5,757,925||Secure platform independent cross-platform remote execution computer system and method|
|5,745,678||Method and system for the secured distribution of multimedia titles|
|5,742,768||System and method for providing and displaying a web page having an embedded menu|
|5,729,594||On-line secured financial transaction system through electronic media|
|5,727,145||Mechanism for locating objects in a secure fashion|
|5,706,435||System for maintaining data coherency in cache memory by periodically broadcasting a single invalidation report from server to clients|
|5,675,796||Concurrency management component for use by a computer program during the transfer of a message|
|9,172,620||Cooperative proxy auto-discovery and connection interception|
|9,071,443||Automated service platform prospecting|
|9,007,945||Automated network service discovery and communication|
|8,762,569||System for selecting a proxy pair based on configurations of autodiscovered proxies on a network|
|8,671,205||Cooperative proxy auto-discovery and connection interception|
|8,549,541||Bridging local device communications across the wide area|
|8,533,737||System and method for interfacing distributed systems with different frameworks|
|8,316,118||Cooperative proxy auto-discovery and connection interception|
|8,190,743||Most eligible server in a common work queue environment|
|8,161,184||Method and apparatus for facilitating long-lived DNS queries|
|7,949,751||Method for a network device to describe itself and the services it requires to a AAA server|
|7,454,501||Most eligible server in a common work queue environment|
|7,322,046||Method and system for the secure use of a network service|
|7,292,579||Processing operations associated with resources on a local network|
|7,177,867||Method and apparatus for providing scalable resource discovery|
|7,174,380||Communication terminal, service providing system, service use method, storage medium, and program|
|7,127,526||Method and apparatus for dynamically loading and managing software services on a network device|
|6,988,134||Apparatus and method to automatically collect data regarding assets of a business entity|