This patent had ► Log In grant time compared to others in this category.
Patent grant time can be influenced by many factors. Activities within the USPTO that are beyond the control of patent attornies can influence grant time, but short grant times can also indicate well-written patents and dedicated efforts to respond rapidly to USPTO office actions with strong arguments. Shorter grant times are preferable, and the scores for this section are inverse measures — higher scores are better.
This patent has ► Log In claims compared to others in this category.
The number of claims in a patent is correlated with its strength. Because greater claim counts increase the cost of a patent, more claims can indicate the importance an applicant assigns to a patent. Importantly, some may elect to file claims across multiple patents. A higher score in this metric indicates more claims, relative to others in this category.
This patent has received ► Log In citations from other patents, than others in this category.
Citations from other patents are an important measure of the significance of a patent. More citations indicate that other technologies build on a patent. Higher scores in this metric are better, and indicate more citations from other patents.
This patent referenced ► Log In citations to other patents, than others in this category.
A lower number of citations to other patents can be a sign of diminished patent strength. More citations indicate dependence on more other technologies. Higher scores in this category are better, and indicate fewer citations to other patents.
This patent has ► Log In proximity to basic research compared to others in this category.
Proximity to basic research is measured by comparing the number of citations to non-patent literature among a cohort of patents. Because most non-patent citations are primary research papers, a higher count indicates greater proximity to basic research.
|6,584,499||Methods and apparatus for performing mass operations on a plurality of managed devices on a network|
|6,457,139||Method and apparatus for providing a host computer with information relating to the mapping of logical volumes within an intelligent storage system|
|6,446,141||Storage server system including ranking of data source|
|6,438,595||Load balancing using directory services in a data processing system|
|6,363,391||Application programming interface for monitoring data warehouse activity occurring through a client/server open database connectivity interface|
|6,343,324||Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices|
|6,314,460||Method and apparatus for analyzing a storage network based on incomplete information from multiple respective controllers|
|6,295,575||Configuring vectors of logical storage units for data storage partitioning and sharing|
|6,263,445||Method and apparatus for authenticating connections to a storage system coupled to a network|
|6,260,120||Storage mapping and partitioning among multiple host processors in the presence of login state changes and host controller replacement|
|6,216,162||Extending alias support to heterogeneous servers|
|6,141,701||System for, and method of, off-loading network transactions from a mainframe to an intelligent input/output device, including off-loading message queuing facilities|
|6,138,161||Method and system for maintaining reserve command relationships in a fibre channel network|
|6,105,027||Techniques for eliminating redundant access checking by access filters|
|6,061,726||Dynamic rights assignment apparatus and method using network directory services|
|6,021,470||Method and apparatus for selective data caching implemented with noncacheable and cacheable data for improved cache performance in a computer networking system|
|5,999,930||Method and apparatus for distributed control of a shared storage volume|
|5,930,817||Method and system including operation information accessible by a system on a network utilizing a file access command of a host operating system|
|5,889,952||Access check system utilizing cached access permissions|
|8,862,998||Method and system for generating a network monitoring display with animated utilization information|
|8,683,024||System for video digitization and image correction for use with a computer management system|
|8,429,341||Method and system for responding to file system requests|
|8,380,844||Monitoring digital images|
|8,327,004||Storage area network methods and apparatus with centralized management|
|8,307,411||Generic framework for EAP|
|8,185,639||Server identification in storage networks|
|8,077,730||Method and apparatus for providing virtual ports with attached virtual devices in a storage area network|
|8,060,630||Creating and configuring virtual fabrics in storage area networks|
|8,032,697||Method and system for responding to file system requests|
|8,019,840||Storage area network mapping|
|7,937,418||Method and system for enhancing software documentation and help systems|
|7,917,693||Method and system for responding to file system requests|
|7,865,596||Switching system for managing storage in digital networks|
|7,836,102||Method and system for enhancing software documentation and help systems|
|7,827,317||Apparatus for management of mixed protocol storage networks|
|7,797,353||Method and system for enhancing software documentation and help systems|
|7,779,117||Monitoring digital images|
|7,734,781||Methods and systems for shared storage virtualization|
|7,730,315||Cryptosystem based on a Jacobian of a curve|
|7,693,970||Secured shared storage architecture|
|7,590,798||Method and system for responding to file system requests|
|7,586,942||Identifying host computers at a physical layer|
|7,577,688||Systems and methods for transparent movement of file services in a clustered environment|
|7,565,532||Secure file system server architecture and methods|
|7,565,431||Method, system, and program for determining information on a storage system in a network|
|7,549,048||Efficient and secure authentication of computing systems|
|7,526,511||Distributed image storage architecture|
|7,509,405||Method and apparatus for inferring topology of a network|
|7,477,949||Graphic user interface for a storage system|
|7,475,351||Interactive drag and snap connection tool|
|7,469,048||Methods for point compression for jacobians of hyperelliptic curves|
|7,457,856||Storage configuration changing apparatus and method thereof|
|7,424,519||Distributed storage system, storage device and method of copying data|
|7,407,184||Micro gas generator including an initiator blast shield|
|7,398,326||Methods for management of mixed protocol storage area networks|
|7,340,640||System and method for recoverable mirroring in a storage environment employing asymmetric distributed block virtualization|
|7,334,124||Logical access block processing protocol for transparent secure file storage|
|7,310,774||Method for displaying switch port information in a network topology display|
|7,305,462||Data storage system and control method thereof|
|7,293,116||Graphic user interface for a storage system|
|7,236,589||Device for point compression for Jacobians of hyperelliptic curves|
|7,197,513||Distributed image storage architecture|
|7,181,509||Storage configuration changing apparatus and method thereof|
|7,155,486||Storage management method|
|7,143,615||Method, system, and program for discovering components within a network|
|7,143,288||Secure file system server architecture and methods|
|7,133,907||Method, system, and program for configuring system resources|
|7,107,332||Storage controller and computer system for managing information related to connection port|
|7,103,889||Method, system, and article of manufacture for agent processing|
|7,047,290||Storage controller and computer system for managing information related to connection port|
|7,043,015||Methods for point compression for Jacobians of hyperelliptic curves|
|7,020,776||Cryptosystem based on a Jacobian of a curve|
|7,003,567||Method and system for displaying the configuration of storage network|