This patent had ► Log In grant time compared to others in this category.
Patent grant time can be influenced by many factors. Activities within the USPTO that are beyond the control of patent attornies can influence grant time, but short grant times can also indicate well-written patents and dedicated efforts to respond rapidly to USPTO office actions with strong arguments. Shorter grant times are preferable, and the scores for this section are inverse measures — higher scores are better.
This patent has ► Log In claims compared to others in this category.
The number of claims in a patent is correlated with its strength. Because greater claim counts increase the cost of a patent, more claims can indicate the importance an applicant assigns to a patent. Importantly, some may elect to file claims across multiple patents. A higher score in this metric indicates more claims, relative to others in this category.
This patent has received ► Log In citations from other patents, than others in this category.
Citations from other patents are an important measure of the significance of a patent. More citations indicate that other technologies build on a patent. Higher scores in this metric are better, and indicate more citations from other patents.
This patent referenced ► Log In citations to other patents, than others in this category.
A lower number of citations to other patents can be a sign of diminished patent strength. More citations indicate dependence on more other technologies. Higher scores in this category are better, and indicate fewer citations to other patents.
This patent has ► Log In proximity to basic research compared to others in this category.
Proximity to basic research is measured by comparing the number of citations to non-patent literature among a cohort of patents. Because most non-patent citations are primary research papers, a higher count indicates greater proximity to basic research.
|6,553,494||Method and apparatus for applying and verifying a biometric-based digital signature to an electronic document|
|6,385,318||Encrypting method, deciphering method and certifying method|
|6,332,193||Method and apparatus for securely transmitting and authenticating biometric data over a network|
|6,317,834||Biometric authentication system with encrypted models|
|6,307,955||Electronic signature management system|
|6,035,406||Plurality-factor security system|
|6,035,398||Cryptographic key generation using biometric data|
|5,805,719||Tokenless identification of individuals|
|9,237,018||Multisystem biometric token|
|9,232,338||Server-paid internet access service|
|9,183,366||Request-specific authentication for accessing Web service resources|
|9,087,183||Method and system of securing accounts|
|8,930,276||Method of multiple algorithm processing of biometric data|
|8,892,899||System and method for enrolling in a biometric system|
|8,799,675||System and method for electronic certification and authentication of data|
|8,656,472||Request-specific authentication for accessing web service resources|
|8,639,937||Method and apparatus for extracting authentication information from a user|
|8,561,173||Authentication processing apparatus, authentication processing method, recording medium storing authentication processing program, recording medium storing information processing program and information processing system|
|8,477,940||Symmetric cryptography with user authentication|
|8,438,391||Credential generation management servers and method for communications devices and device management servers|
|8,316,418||Verification engine for user authentication|
|8,316,239||Decoding information to allow access to computerized systems|
|8,281,129||Direct authentication system and method via trusted authenticators|
|8,271,396||Electronic commerce system and method for detecting fraud|
|8,189,788||Hybrid symmetric/asymmetric cryptography with user authentication|
|8,090,944||Method and apparatus for authenticating users of an emergency communication network|
|8,068,008||Emergency responder credentialing system and method|
|8,068,007||Emergency responder credentialing system and method|
|8,063,737||Emergency responder credentialing system and method|
|8,050,980||Secure downloading of a file from a network system and method|
|8,032,927||Verification engine for user authentication|
|7,999,653||Plant monitor-control apparatus|
|7,958,359||Access control systems|
|7,881,972||Electronic commerce system and method for detecting fraud|
|7,840,034||Method, system and program for authenticating a user by biometric information|
|7,832,001||Identification system and method|
|7,805,615||Asymmetric cryptography with user authentication|
|7,793,109||Random biometric authentication apparatus|
|7,761,914||Method and apparatus for facilitating adjustment of an audit state in a computing environment|
|7,748,029||Authentication query strategizer and results compiler|
|7,676,433||Secure, confidential authentication with private data|
|7,496,948||Method for controlling access to a target application|
|7,375,615||Personal authentication system|
|7,366,299||Method for encrypting and decrypting data using derivative equations and factors|
|7,343,623||Authentication query strategizer and results compiler|
|7,231,657||User authentication system and methods thereof|
|7,178,025||Access system utilizing multiple factor identification and authentication|
|7,165,268||Digital signatures for tangible medium delivery|
|7,165,051||Electronic commerce system and method for detecting fraud|
|7,131,009||Multiple factor-based user identification and authentication|
|7,111,173||Encryption process including a biometric unit|