Patent Leaderboard
USPTO Patent Rankings Data through Sept 30, 2025
SW

Steve R. White — 45 Patents

IBM: 34 patents #2,873 of 70,183Top 5%
MEMiner Enterprises: 7 patents #14 of 72Top 20%
FOForgerock: 3 patents #2 of 13Top 20%
POPowerbrace: 2 patents #8 of 23Top 35%
TITrend Micro Incorporated: 1 patents #304 of 749Top 45%
Maple Park, IL: #2 of 35 inventorsTop 6%
Illinois: #983 of 84,256 inventorsTop 2%
Overall (All Time): #65,219 of 4,157,543Top 2%
45 Patents All Time

Issued Patents All Time

Showing 26–45 of 45 patents

Patent #TitleCo-InventorsDate
7103913 Method and apparatus for determination of the non-replicative behavior of a malicious program William C. Arnold, David M. Chess, John Morar, Alla Segal, Ian N. Whalley 2006-09-05
7069585 Physical key security management method and apparatus for information systems David M. Chess, Ian N. Whalley, John Morar 2006-06-27
7051277 Automated assistant for organizing electronic documents Jeffrey O. Kephart, Richard B. Segal 2006-05-23
6990590 Strategic internet persona assumption James E. Hanson, Sophia Krasikov, John Morar 2006-01-24
6981279 Method and apparatus for replicating and analyzing worm programs William C. Arnold, David M. Chess, John Morar, Alla Segal, Morton Gregory Swimmer +1 more 2005-12-27
6772346 System and method for managing files in a distributed system using filtering David M. Chess, Jeffrey O. Kephart, John Morar, Edward J. Pring 2004-08-03
6678822 Method and apparatus for securely transporting an information container from a trusted environment to an unrestricted environment John Morar, David M. Chess, Jeffrey O. Kephart, Morton Gregory Swimmer 2004-01-13
6560632 System and method for managing files in a distributed system using prioritization David M. Chess, Jeffrey O. Kephart, John Morar, Edward J. Pring 2003-05-06
6279128 Autonomous system for recognition of patterns formed by stored data during computer memory scrubbing William C. Arnold, Jehoshua Bruck, Jeffrey O. Kephart, Gregory Bret Sorkin, David M. Chess +2 more 2001-08-21
6275937 Collaborative server processing of content and meta-information with application to virus checking in a server network Brent Tzion Hailpern, Peter K. Malkin, Robert Jeffrey Schloss, Philip Yu, Charles Campbell Palmer 2001-08-14
5802592 System and method for protecting integrity of alterable ROM using digital signatures David M. Chess, Gregory Bret Sorkin 1998-09-01
5442699 Searching for patterns in encrypted data William C. Arnold, David M. Chess, Jeffrey O. Kephart, Gregory Bret Sorkin 1995-08-15
5117457 Tamper resistant packaging for information protection in electronic circuitry Liam D. Comerford, Peter G. Ledermann, Lawrence I. Levy 1992-05-26
5109413 Manipulating rights-to-execute in connection with a software copy protection mechanism Liam D. Comerford 1992-04-28
4924515 Secure management of keys using extended control vectors Stephen M. Matyas, Dennis G. Abraham, William Arnold, Donald B. Johnson, Ramesh K. Karne +3 more 1990-05-08
4916738 Remote access terminal security Akhileshwari N. Chandra, Liam D. Comerford 1990-04-10
4903296 Implementing a shared higher level of privilege on personal computers for copy protection of software Akhileshwari N. Chandra, Liam D. Comerford 1990-02-20
4817140 Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor Ashileshwari N. Chandra, Liam D. Comerford 1989-03-28
4644493 Implementing a shared higher level of privilege on personal computers for copy protection of software Akhileshwari N. Chandra, Liam D. Comerford 1987-02-17
4577289 Hardware key-on-disk system for copy-protecting magnetic storage media Liam D. Comerford 1986-03-18