loadpatents
name:-0.039005041122437
name:-0.040337085723877
name:-0.0043721199035645
McClain; Carolyn B. Patent Filings

McClain; Carolyn B.

Patent Applications and Registrations

Patent applications and USPTO patent grants for McClain; Carolyn B..The latest application filed is for "techniques for secure debugging and monitoring".

Company Profile
4.46.35
  • McClain; Carolyn B. - Springville UT
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Service usage metering techniques
Grant 10,708,387 - McClain , et al.
2020-07-07
Techniques for cloud control and management
Grant 10,560,330 - Wipfel , et al. Feb
2020-02-11
Identity and policy enforced inter-cloud and intra-cloud channel
Grant 10,375,201 - Bergeson , et al.
2019-08-06
System and method for providing key-encrypted storage in a cloud computing environment
Grant 10,230,704 - Carter , et al.
2019-03-12
Techniques for virtual representational state transfer (REST) interfaces
Grant 10,182,074 - Burch , et al. Ja
2019-01-15
Techniques for secure debugging and monitoring
Grant 10,171,470 - Burch , et al. J
2019-01-01
Techniques for establishing a trusted cloud service
Grant 10,021,144 - Bergeson , et al. July 10, 2
2018-07-10
Extending functionality of legacy services in computing system environment
Grant 9,864,616 - Srinivasan , et al. January 9, 2
2018-01-09
Techniques For Secure Debugging And Monitoring
App 20170353464 - Burch; Lloyd Leon ;   et al.
2017-12-07
Techniques For Cloud Control And Management
App 20170346696 - Wipfel; Robert A. ;   et al.
2017-11-30
Techniques for cloud control and management
Grant 9,736,026 - Wipfel , et al. August 15, 2
2017-08-15
Techniques for secure debugging and monitoring
Grant 9,723,007 - Burch , et al. August 1, 2
2017-08-01
System And Method For Providing Key-encrypted Storage In A Cloud Computing Environment
App 20170214669 - Carter; Stephen R ;   et al.
2017-07-27
Service Usage Metering Techniques
App 20170126820 - McClain; Carolyn B. ;   et al.
2017-05-04
Identity broker tools and techniques for use with forward proxy computers
Grant 9,514,459 - Doshi , et al. December 6, 2
2016-12-06
Identity And Policy Enforced Inter-cloud And Intra-cloud Channel
App 20160352862 - Bergeson; Bruce L. ;   et al.
2016-12-01
Techniques For Establishing A Trusted Cloud Service
App 20160352779 - Bergeson; Bruce L. ;   et al.
2016-12-01
Federated role provisioning
Grant 9,473,499 - McClain , et al. October 18, 2
2016-10-18
Identity and policy enforced inter-cloud and intra-cloud channel
Grant 9,438,692 - Bergeson , et al. September 6, 2
2016-09-06
Techniques for establishing a trusted cloud service
Grant 9,369,494 - Bergeson , et al. June 14, 2
2016-06-14
Techniques For Secure Debugging And Monitoring
App 20160021113 - Burch; Lloyd Leon ;   et al.
2016-01-21
Techniques for secure debugging and monitoring
Grant 9,172,701 - Burch , et al. October 27, 2
2015-10-27
Techniques For Virtual Representational State Transfer (rest) Interfaces
App 20150281286 - Burch; Lloyd Leon ;   et al.
2015-10-01
Techniques For Cloud Control And Management
App 20150207684 - Wipfel; Robert A. ;   et al.
2015-07-23
Automated service platform prospecting
Grant 9,071,443 - Carter , et al. June 30, 2
2015-06-30
Techniques for virtual representational state transfer (REST) interfaces
Grant 9,049,182 - Burch , et al. June 2, 2
2015-06-02
Techniques for cloud control and management
Grant 8,966,017 - Wipfel , et al. February 24, 2
2015-02-24
Identity And Policy Enforced Inter-cloud And Intra-cloud Channel
App 20140365656 - Bergeson; Bruce L. ;   et al.
2014-12-11
Techniques For Establishing A Trusted Cloud Service
App 20140351894 - Bergeson; Bruce L. ;   et al.
2014-11-27
Federated Role Provisioning
App 20140298407 - McClain; Carolyn B. ;   et al.
2014-10-02
Extending Functionality Of Legacy Services In Computing System Environment
App 20140282547 - Srinivasan; Kattiganehalli Y. ;   et al.
2014-09-18
Techniques for establishing a trusted cloud service
Grant 8,813,192 - Bergeson , et al. August 19, 2
2014-08-19
Identity and policy enforced inter-cloud and intra-cloud channel
Grant 8,806,566 - Bergeson , et al. August 12, 2
2014-08-12
Techniques For Secure Debugging And Monitoring
App 20140189775 - Burch; Lloyd Leon ;   et al.
2014-07-03
Extending functionality of legacy services in computing system environment
Grant 8,756,597 - Srinivasan , et al. June 17, 2
2014-06-17
Key distribution
Grant 8,731,200 - Carter , et al. May 20, 2
2014-05-20
Federated role provisioning
Grant 8,719,894 - McClain , et al. May 6, 2
2014-05-06
Techniques for managing a network delivery path of content via a key
Grant 8,688,856 - McClain , et al. April 1, 2
2014-04-01
Key distribution
Grant 8,538,026 - Carter , et al. September 17, 2
2013-09-17
Techniques For Establishing A Trusted Cloud Service
App 20120284780 - Bergeson; Bruce L. ;   et al.
2012-11-08
Virtualized federated role provisioning
Grant 8,156,516 - McClain , et al. April 10, 2
2012-04-10
Tessellated virtual machines conditionally linked for common computing goals
Grant 8,146,080 - Carter , et al. March 27, 2
2012-03-27
Key distribution
Grant 8,098,828 - Carter , et al. January 17, 2
2012-01-17
Extending Functionality Of Legacy Services In Computing System Environment
App 20110197188 - Srinivasan; Kattiganehalli Y. ;   et al.
2011-08-11
Identity And Policy Enforced Inter-cloud And Intra-cloud Channel
App 20110119729 - Bergeson; Bruce L. ;   et al.
2011-05-19
Techniques For Virtual Representational State Transfer (rest) Interfaces
App 20110041171 - Burch; Lloyd Leon ;   et al.
2011-02-17
Techniques For Cloud Control And Management
App 20110010339 - Wipfel; Robert A. ;   et al.
2011-01-13
Key Distribution
App 20100239095 - Carter; Stephen R. ;   et al.
2010-09-23
Key Distribution
App 20100223459 - Carter; Stephen R. ;   et al.
2010-09-02
Key Distribution
App 20100211771 - Carter; Stephen R. ;   et al.
2010-08-19
Key distribution
Grant 7,734,051 - Carter , et al. June 8, 2
2010-06-08
Secure problem resolution techniques for complex data response networks
Grant 7,734,962 - Sabin , et al. June 8, 2
2010-06-08
Proxy authentication
Grant 7,681,229 - Ebrahimi , et al. March 16, 2
2010-03-16
Automated Service Platform Prospecting
App 20100050239 - Carter; Stephen R. ;   et al.
2010-02-25
Identity And Policy Enabled Collaboration
App 20100043049 - Carter; Stephen R. ;   et al.
2010-02-18
System and method for filtering of web-based content stored on a proxy cache server
Grant 7,506,055 - McClain , et al. March 17, 2
2009-03-17
Secure Problem Resolution Techniques For Complex Data Response Networks
App 20080276134 - Sabin; Jason Allen ;   et al.
2008-11-06
Federated Role Provisioning
App 20080244687 - McClain; Carolyn B. ;   et al.
2008-10-02
Virtualized Federated Role Provisioning
App 20080244688 - McClain; Carolyn B. ;   et al.
2008-10-02
Tessellated virtual machines conditionally linked for common computing goals
App 20080244575 - Carter; Stephen R. ;   et al.
2008-10-02
Privileged network routing
Grant 7,376,134 - Carter , et al. May 20, 2
2008-05-20
Policy administration and provisioning
App 20070192823 - Andersen; Carl B. ;   et al.
2007-08-16
Content distribution via keys
App 20070174485 - McClain; Carolyn B. ;   et al.
2007-07-26
Key distribution
App 20060115089 - Carter; Stephen R. ;   et al.
2006-06-01
Techniques for content filtering
Grant 7,043,555 - McClain , et al. May 9, 2
2006-05-09
Privileged network routing
App 20060034179 - Carter; Stephen R. ;   et al.
2006-02-16
System and method for filtering of web-based content stored on a proxy cache server
App 20050021796 - McClain, Carolyn B. ;   et al.
2005-01-27
System and method for filtering of web-based content stored on a proxy cache server
Grant 6,772,214 - McClain , et al. August 3, 2
2004-08-03

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed