This patent had ► Log In grant time compared to others in this category.
Patent grant time can be influenced by many factors. Activities within the USPTO that are beyond the control of patent attornies can influence grant time, but short grant times can also indicate well-written patents and dedicated efforts to respond rapidly to USPTO office actions with strong arguments. Shorter grant times are preferable, and the scores for this section are inverse measures — higher scores are better.
This patent has ► Log In claims compared to others in this category.
The number of claims in a patent is correlated with its strength. Because greater claim counts increase the cost of a patent, more claims can indicate the importance an applicant assigns to a patent. Importantly, some may elect to file claims across multiple patents. A higher score in this metric indicates more claims, relative to others in this category.
This patent has received ► Log In citations from other patents, than others in this category.
Citations from other patents are an important measure of the significance of a patent. More citations indicate that other technologies build on a patent. Higher scores in this metric are better, and indicate more citations from other patents.
This patent referenced ► Log In citations to other patents, than others in this category.
A lower number of citations to other patents can be a sign of diminished patent strength. More citations indicate dependence on more other technologies. Higher scores in this category are better, and indicate fewer citations to other patents.
This patent has ► Log In proximity to basic research compared to others in this category.
Proximity to basic research is measured by comparing the number of citations to non-patent literature among a cohort of patents. Because most non-patent citations are primary research papers, a higher count indicates greater proximity to basic research.
|6,581,206||Computer program language subset validation|
|6,546,546||Integrating operating systems and run-time systems|
|6,490,720||Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications|
|6,308,317||Using a high level programming language with a microcontroller|
|6,308,270||Validating and certifying execution of a software program with a smart card|
|6,296,191||Storing data objects in a smart card memory|
|6,195,774||Boundary-scan method using object-oriented programming language|
|6,173,419||Field programmable gate array (FPGA) emulator for debugging software|
|6,148,083||Application certification for an international cryptography framework|
|6,115,472||Contents transmission control method with user authentication functions and recording medium with the method recorded thereon|
|5,923,884||System and method for loading applications onto a smart card|
|9,032,359||Method and apparatus for modifying a platform-independent programming language build tool|
|8,281,289||Device, method, and program for generating and executing execution binary image, and computer-readable recording medium containing the execution binary image execution program|
|7,703,086||Method and apparatus for sharing data files among runtime environment applets in an integrated circuit card|
|7,606,931||Method with which a first application can access components of a second application over a logical interface|
|7,520,438||Method of multi-interfacing between smart card and memory card, and multi-interface card|
|7,454,741||Method and apparatus for sharing data files among runtime environment applets in an integrated circuit card|