PN

Palmer E. Newman

IBM: 14 patents #8,004 of 70,183Top 15%
LP Lenovo (Singapore) Pte.: 1 patents #697 of 1,301Top 55%
Overall (All Time): #327,073 of 4,157,543Top 8%
15
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
7096496 Method and system for improved computer security utilizing dynamically variable security profile David Carroll Challener, Richard A. Dayan 2006-08-22
6823463 Method for providing security to a computer on a computer network David Carroll Challener, Richard A. Dayan 2004-11-23
6081793 Method and system for secure computer moderated voting David Carroll Challener, Richard Allen Kelley 2000-06-27
6046733 Computer input stylus and thickness control system David Carroll Challener 2000-04-04
5970227 Wireless proximity detector security feature Richard A. Dayan, Joseph P. McGovern 1999-10-19
5953001 Computer input stylus and texture control system David Carroll Challener 1999-09-14
5918007 Trusted personal computer system with limited accessibility John W. Blackledge, Jr., Richard A. Dayan, Dennis Moeller, Kenneth Zubay 1999-06-29
5712973 Wireless proximity containment security Richard A. Dayan, Joseph P. McGovern 1998-01-27
5574786 Securing trusted personal computer system against unauthorized movement Richard A. Dayan 1996-11-12
5555373 Inactivity monitor for trusted personal computer system Richard A. Dayan 1996-09-10
5504904 Personal computer having operating system definition file for configuring computer system Richard A. Dayan 1996-04-02
5432939 Trusted personal computer system with management control over initial program loading John W. Blackledge, Jr., Richard A. Dayan, Dennis Moeller, Kenneth Zubay 1995-07-11
5388156 Personal computer system with security features and method John W. Blackledge, Jr., Grant L. Clarke, Jr., Richard A. Dayan, Kimthanh D. Le, Patrick E. McCourt +4 more 1995-02-07
5341422 Trusted personal computer system with identification John W. Blackledge, Jr., Richard A. Dayan, Dennis Moeller, Kenneth Zubay 1994-08-23
5287519 LAN station personal computer system with controlled data access for normal and unauthorized users and method Richard A. Dayan, Kimthanh D. Le, Matthew T. Mittelstedt, Dave Randall, Lisa A. Ruotolo +1 more 1994-02-15