CM

Carolyn B. McClain

NO Novell: 29 patents #5 of 701Top 1%
MS Micro Focus Software: 9 patents #8 of 77Top 15%
NE Netiq: 3 patents #15 of 74Top 25%
Apple: 2 patents #9,168 of 18,612Top 50%
EM Emc: 2 patents #1,324 of 3,345Top 40%
📍 Springville, UT: #4 of 245 inventorsTop 2%
🗺 Utah: #239 of 19,430 inventorsTop 2%
Overall (All Time): #65,509 of 4,157,543Top 2%
45
Patents All Time

Issued Patents All Time

Showing 1–25 of 45 patents

Patent #TitleCo-InventorsDate
10708387 Service usage metering techniques Greg Goodwin, Carl B. Andersen, Bruce L. Bergeson 2020-07-07
10560330 Techniques for cloud control and management Robert Wipfel, Stephen R. Carter 2020-02-11
10375201 Identity and policy enforced inter-cloud and intra-cloud channel Bruce L. Bergeson, Stephen R. Carter, Vernon Roger Holm 2019-08-06
10230704 System and method for providing key-encrypted storage in a cloud computing environment Stephen R. Carter, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch 2019-03-12
10182074 Techniques for virtual representational state transfer (REST) interfaces Lloyd Leon Burch, Douglas Garry Earl, Jonathan Paul Bultmeyer 2019-01-15
10171470 Techniques for secure debugging and monitoring Lloyd Leon Burch, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo 2019-01-01
10021144 Techniques for establishing a trusted cloud service Bruce L. Bergeson, Carl Tietjen, Larry Hal Henderson, Stephen R. Carter 2018-07-10
9864616 Extending functionality of legacy services in computing system environment Kattiganehalli Y. Srinivasan, Stephen R. Carter, Jonathon P. Bultmeyer 2018-01-09
9742864 System and method for implementing cloud mitigation and operations controllers Stephen R. Carter, Lloyd Leon Burch, Dale Robert Olds 2017-08-22
9736026 Techniques for cloud control and management Robert Wipfel, Stephen R. Carter 2017-08-15
9723007 Techniques for secure debugging and monitoring Lloyd Leon Burch, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo 2017-08-01
9658891 System and method for providing key-encrypted storage in a cloud computing environment Stephen R. Carter, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch 2017-05-23
9614855 System and method for implementing a secure web application entitlement service Stephen R. Carter 2017-04-04
9514459 Identity broker tools and techniques for use with forward proxy computers Kshitij A. Doshi, Hashem Mohammad Ebrahimi 2016-12-06
9473499 Federated role provisioning Bruce L. Bergeson, Vernon Roger Holm 2016-10-18
9438692 Identity and policy enforced inter-cloud and intra-cloud channel Bruce L. Bergeson, Stephen R. Carter, Vernon Roger Holm 2016-09-06
9369494 Techniques for establishing a trusted cloud service Bruce L. Bergeson, Carl Tietjen, Larry Hal Henderson, Stephen R. Carter 2016-06-14
9288264 System and method for implementing a cloud workflow Stephen R. Carter, Lloyd Leon Burch, Dale Robert Olds 2016-03-15
9172701 Techniques for secure debugging and monitoring Lloyd Leon Burch, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo 2015-10-27
9122533 System and method for reducing cloud IP address utilization using a distributor registry Stephen R. Carter, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch 2015-09-01
9071443 Automated service platform prospecting Stephen R. Carter 2015-06-30
9049182 Techniques for virtual representational state transfer (REST) interfaces Lloyd Leon Burch, Douglas Garry Earl, Jonathan Paul Bultmeyer 2015-06-02
8966017 Techniques for cloud control and management Robert Wipfel, Stephen R. Carter 2015-02-24
8813192 Techniques for establishing a trusted cloud service Bruce L. Bergeson, Carl Tietjen, Larry Hal Henderson, Stephen R. Carter 2014-08-19
8806566 Identity and policy enforced inter-cloud and intra-cloud channel Bruce L. Bergeson, Stephen R. Carter, Vernon Roger Holm 2014-08-12