Patent Leaderboard
USPTO Patent Rankings Data through Sept 30, 2025
JM

James G. McLean

IBM: 40 patents #2,346 of 70,183Top 4%
LPLenovo (Singapore) Pte.: 29 patents #697 of 1,301Top 55%
Fuquay-Varina, NC: #2 of 309 inventorsTop 1%
North Carolina: #290 of 45,564 inventorsTop 1%
Overall (All Time): #26,332 of 4,157,543Top 1%
74 Patents All Time

Issued Patents All Time

Showing 26–50 of 74 patents

Patent #TitleCo-InventorsDate
9961811 Controlling access to components in a server housing to enforce use of a grounding strap Keith M. Campbell, William M. Megarity, Luke D. Remis, Gregory D. Sellman, Christopher L. Wood 2018-05-01
9935931 Authorizing user access to resource by determining whether other, authorized users have indicated that the user should be permitted access David D. Chudy, Gary D. Cudak, Cristian Medina 2018-04-03
9749860 Peer-to-peer wireless connection between server computing device and mobile client computing device for authentication and server management David D. Chudy, Cristian Medina, Dharmesh Narendra Topiwala 2017-08-29
9686214 Status and time-based delivery services for instant messengers William G. Pagan 2017-06-20
9665543 System and method for reference validation in word processor documents Shirley S. Ackerman, Sheila E. Allen, Mike D. Hocker, Clifford A. Pickover 2017-05-30
9641507 Virtual avatar authentication Gregory T. Kishi, Clifford A. Pickover, Daniel J. Winarski 2017-05-02
9600641 User permissions based control of pooled features on demand activation keys Fred Allison Bower, III, David D. Chudy, Cristian Medina, Michael T. Shelton 2017-03-21
9576113 User permissions based control of pooled features on demand activation keys Fred Allison Bower, III, David D. Chudy, Cristian Medina, Michael T. Shelton 2017-02-21
9515879 Establishing an action list for reconfiguration of a remote hardware system David D. Chudy, Cristian Medina, Michael T. Shelton 2016-12-06
9443221 Physical location tagging via image recognition David D. Chudy, Cristian Medina, Michael T. Shelton 2016-09-13
9438611 Managing a blocked-originator list for a messaging application David Wayne Glass, Clifford A. Pickover, Daniel J. Winarski 2016-09-06
9412095 Status and time-based delivery services for instant messengers William G. Pagan 2016-08-09
9363934 Controlling access to components in a server housing to enforce use of a grounding strap Keith M. Campbell, William M. Megarity, Luke D. Remis, Gregory D. Sellman, Christopher L. Wood 2016-06-07
9304860 Arranging data handling in a computer-implemented system in accordance with reliability ratings based on reverse predictive failure analysis in response to changes Clifford A. Pickover, Daniel J. Winarski 2016-04-05
9104790 Arranging data handling in a computer-implemented system in accordance with reliability ratings based on reverse predictive failure analysis in response to changes Clifford A. Pickover, Daniel J. Winarski 2015-08-11
9092865 Map generation for an environment based on captured images David D. Chudy, Cristian Medina, Michael T. Shelton 2015-07-28
9047190 Intrusion protection for a client blade Keith M. Campbell, Raymond T. Greggs, Caroline M. Metry, Edward S. Suffern 2015-06-02
9009846 Virtual avatar authentication Gregory T. Kishi, Clifford A. Pickover, Daniel J. Winarski 2015-04-14
8918574 Apparatus, system, and method for deliberately preventing unauthorized access to data stored in a non-volatile memory device 2014-12-23
8839046 Arranging data handling in a computer-implemented system in accordance with reliability ratings based on reverse predictive failure analysis in response to changes Clifford A. Pickover, Daniel J. Winarski 2014-09-16
8265464 Administering a time-shifting cache in a media playback device 2012-09-11
8201266 Security system to prevent tampering with a server blade Keith M. Campbell, Raymond T. Greggs, Caroline M. Metry 2012-06-12
7925457 Flow meter and airflow measurement using an airfoil Keith M. Campbell, Raymond T. Greggs, Carloine Magdy Metry 2011-04-12
7854014 Media enclosure with access to product information 2010-12-14
7702497 Method for recommending upgrade components for a computer system Chris Dombrowski, Cristina Medina 2010-04-20