SC

Stephen R. Carter

NO Novell: 146 patents #1 of 701Top 1%
MS Micro Focus Software: 16 patents #3 of 77Top 4%
Oracle: 12 patents #919 of 14,854Top 7%
EM Emc: 11 patents #279 of 3,345Top 9%
Apple: 9 patents #3,465 of 18,612Top 20%
NH Novell Intellectual Property Holdings: 2 patents #1 of 32Top 4%
SE Solarchem Enterprises: 1 patents #8 of 12Top 70%
Xerox: 1 patents #5,237 of 8,622Top 65%
📍 Spanish Fork, UT: #2 of 197 inventorsTop 2%
🗺 Utah: #9 of 19,430 inventorsTop 1%
Overall (All Time): #3,375 of 4,157,543Top 1%
200
Patents All Time

Issued Patents All Time

Showing 126–150 of 200 patents

Patent #TitleCo-InventorsDate
8010698 Network application layer routing Ravishankar Krishnamurthy, Duraisamy Veeravadivel 2011-08-30
7996517 Transparent network connection takeover Howard Rollin Davis 2011-08-09
7996429 Mechanisms to persist hierarchical object relations Lee Edward Lowry, Rajesh Vasudevan, Brent Thurgood, Ryan Cox, Zack Grossbart +2 more 2011-08-09
7962889 Techniques for instantiating and configuring projects Michel Shane Simpson, Volker Gunnar Scheuber-Heinz, Lee Edward Lowry 2011-06-14
7934087 Techniques for secure event recording and processing 2011-04-26
7921141 Mechanism for supporting indexed tagged content in a general purpose data store Mark D. Ackerman, Nadeem Ahmad Nazeer 2011-04-05
7890938 Heterogeneous normalization of data characteristics Nathan Blaine Jensen, William Street, Michel Shane Simpson, William Donald Peterson, III, Scott Alan Isaacson 2011-02-15
7845003 Techniques for variable security access information Cameron Craig Morris, Lloyd Leon Burch 2010-11-30
7810139 Remote authorization for operations Lloyd Leon Burch 2010-10-05
7793101 Verifiable virtualized storage port assignments for virtual machines Robert Wipfel 2010-09-07
7792693 Distributed workflow techniques Jonathan Paul Bultmeyer, Howard Melman, Bjarne Rasmussen, Kasman E. Thomas 2010-09-07
7792049 Techniques for modeling and evaluating protocol interactions 2010-09-07
7774827 Techniques for providing role-based security with instance-level granularity Stephen Kinser, Lloyd Leon Burch 2010-08-10
7770204 Techniques for securing electronic identities Scott W. Pathakis, David Kent Beus, Michael William Cook, Howard Rollin Davis, Dustin Lance Nielson +2 more 2010-08-03
7756890 Semantic identities 2010-07-13
7739744 Methods and systems for multifactor authentication Lloyd Leon Burch 2010-06-15
7735122 Credential mapping David Nephi Johnson, Dustin Lance Nielson, Jerry E Griffis, David Kent Beus, Nathan Blaine Jensen +3 more 2010-06-08
7734051 Key distribution Carolyn B. McClain 2010-06-08
7680742 System and method for controlling access to licensed computing processes via a codified electronic license Mark D. Ackerman 2010-03-16
7681242 Allocation of network resources Tammy Anita Green, Lloyd Leon Burch, Douglas Garry Earl 2010-03-16
7680897 Methods and systems for managing network traffic Robert Drew Major 2010-03-16
7680819 Managing digital identity information Joseph Andrew Mellmer, Russell T. Young, Arn D. Perkins, John M. Robertson, Jeffrey Neil Sabin +9 more 2010-03-16
7672952 System and method of semantic correlation of rich content Scott Alan Isaacson 2010-03-02
7653530 Method and mechanism for the creation, maintenance, and comparison of semantic abstracts Delos C. Jensen, Ronald P. Millett 2010-01-26
7647624 Techniques for preserving and managing identities in an audit log Lloyd Leon Burch, Douglas Garry Earl 2010-01-12