loadpatents
name:-0.04101300239563
name:-0.20955300331116
name:-0.0046861171722412
White; Steve R. Patent Filings

White; Steve R.

Patent Applications and Registrations

Patent applications and USPTO patent grants for White; Steve R..The latest application filed is for "railroad hopper car door operating mechanism".

Company Profile
0.42.32
  • White; Steve R. - Maple Park IL
  • White; Steve R. - New York NY
  • White; Steve R. - Mt. Kisco NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Railroad hopper car door operating mechanism
Grant 9,751,536 - Galvan , et al. September 5, 2
2017-09-05
Railroad Hopper Car Door Operating Mechanism
App 20160311445 - GALVAN; Guadalupe L. ;   et al.
2016-10-27
Railroad car constant contact side bearing assembly
Grant 9,421,986 - Aspengren , et al. August 23, 2
2016-08-23
Railcar constant contact side bearing assembly
Grant 8,967,052 - Aspengren , et al. March 3, 2
2015-03-03
Railroad Car Constant Contact Side Bearing Assembly
App 20140261065 - ASPENGREN; Paul B. ;   et al.
2014-09-18
Railroad car constant contact side bearing assembly
Grant 8,813,655 - Aspengen , et al. August 26, 2
2014-08-26
Railcar constant contact side bearing assembly
Grant 8,807,050 - Aspengen , et al. August 19, 2
2014-08-19
Railroad car constant contact side bearing assembly
App 20130327245 - ASPENGEN; Paul B. ;   et al.
2013-12-12
Railcar Constant Contact Side Bearing Assembly
App 20130327246 - ASPENGREN; Paul B. ;   et al.
2013-12-12
Apparatus for controlling discharge of material from a railroad hopper car
Grant 8,485,110 - Gaydos , et al. July 16, 2
2013-07-16
Hypervisor with cloning-awareness notifications
Grant 8,458,694 - Chess , et al. June 4, 2
2013-06-04
Discovering and identifying manageable information technology resources
Grant 8,407,349 - Arwe , et al. March 26, 2
2013-03-26
Discovering and identifying manageable information technology resources
Grant 8,392,567 - Arwe , et al. March 5, 2
2013-03-05
Railcar constant contact side bearing assembly
App 20120291660 - ASPENGEN; Paul B. ;   et al.
2012-11-22
Discovering And Identifying Manageable Information Technology Resources
App 20120233330 - Arwe; John E. ;   et al.
2012-09-13
Apparatus for controlling discharge of material from a railroad hopper car
App 20120210906 - Gaydos; Christopher C. ;   et al.
2012-08-23
Method and apparatus for the automatic determination of potentially worm-like behavior of a program
Grant 7,996,905 - Arnold , et al. August 9, 2
2011-08-09
Policy-based management system with automatic policy selection and creation capabilities by using singular value decomposition technique
Grant 7,996,353 - Chan , et al. August 9, 2
2011-08-09
Automated design for deployment of a distributed application using constraint propagation
Grant 7,987,461 - Agrawal , et al. July 26, 2
2011-07-26
Method for mapping machine rooms and locating machines within machine rooms
Grant 7,928,907 - Whalley , et al. April 19, 2
2011-04-19
Method and apparatus for determination of the non-replicative behavior of a malicious program
Grant 7,861,300 - Arnold , et al. December 28, 2
2010-12-28
Discovering And Identifying Manageable Information Technology Resources
App 20100235844 - Arwe; John E. ;   et al.
2010-09-16
Method For Mapping Machine Rooms And Locating Machines Within Machine Rooms
App 20090237304 - WHALLEY; Ian Nicholas ;   et al.
2009-09-24
Method for mapping machine rooms and locating machines within machine rooms
Grant 7,515,105 - Whalley , et al. April 7, 2
2009-04-07
Method and apparatus for the automatic determination of potentially worm-like behavior of a program
Grant 7,487,543 - Arnold , et al. February 3, 2
2009-02-03
Hypervisor With Cloning-awareness Notifications
App 20080271016 - Chess; David M. ;   et al.
2008-10-30
Method and Apparatus for Determination of the Non-Replicative Behavior of a Malicious Program
App 20080256633 - ARNOLD; William C. ;   et al.
2008-10-16
Policy-based Management System With Automatic Policy Selection And Creation Capabilities By Using Singular Value Decomposition Technique
App 20080235168 - Chan; Hoi Y. ;   et al.
2008-09-25
Method and Apparatus for the Automatic Determination of Potentially Worm-Like Behavior of a Program
App 20080189787 - Arnold; William C. ;   et al.
2008-08-07
Elastomeric spring
Grant 7,338,034 - Aspengren , et al. March 4, 2
2008-03-04
Automated design for deployment of a distributed application using constraint propagation
App 20080021873 - Agrawal; Aditya ;   et al.
2008-01-24
Policy-based management system with automatic policy selection and creation capabilities by using singular value decomposition technique
App 20070282778 - Chan; Hoi Y. ;   et al.
2007-12-06
Apparatus, system and method for automatically making operational selling decisions
Grant 7,203,662 - Das , et al. April 10, 2
2007-04-10
Elastomeric spring
App 20070069435 - Aspengren; Paul B. ;   et al.
2007-03-29
Method and apparatus for determination of the non-replicative behavior of a malicious program
App 20060288412 - Arnold; William C. ;   et al.
2006-12-21
Method for disaggregating customer data in online transactions to preserve privacy
Grant 7,117,182 - Chess , et al. October 3, 2
2006-10-03
Method and apparatus for determination of the non-replicative behavior of a malicious program
Grant 7,103,913 - Arnold , et al. September 5, 2
2006-09-05
Method for mapping machine rooms and locating machines within machine rooms
App 20060167624 - Whalley; Ian Nicholas ;   et al.
2006-07-27
Physical key security management method and apparatus for information systems
Grant 7,069,585 - Chess , et al. June 27, 2
2006-06-27
Method for dynamically reprovisioning applications and other server resources in a computer center in response to power and heat dissipation requirements
App 20060112286 - Whalley; Ian Nicholas ;   et al.
2006-05-25
Strategic internet persona assumption
Grant 6,990,590 - Hanson , et al. January 24, 2
2006-01-24
Method and apparatus for replicating and analyzing worm programs
Grant 6,981,279 - Arnold , et al. December 27, 2
2005-12-27
Methods and apparatus for adaptive server reprovisioning under security assault
App 20050198530 - Chess, David M. ;   et al.
2005-09-08
Method and apparatus for the automatic determination of potentially worm-like behavior of a program
App 20040019832 - Arnold, William C. ;   et al.
2004-01-29
Method and apparatus for determination of the non-replicative behavior of a malicious program
App 20030212906 - Arnold, William C. ;   et al.
2003-11-13
Method for disaggregating customer data in online transactions to preserve privacy
App 20030130951 - Chess, David M. ;   et al.
2003-07-10
Strategic internet persona assumption
App 20030131260 - Hanson, James E. ;   et al.
2003-07-10
Apparatus, system and method for automatically making operational selling decisions
App 20030023538 - Das, Rajarshi ;   et al.
2003-01-30
Apparatus, system and method for automatically making operational purchasing decisions
App 20030023499 - Das, Rajarshi ;   et al.
2003-01-30
Method of hosting digital businesses
App 20030018551 - Hanson, James E. ;   et al.
2003-01-23
Method and apparatus for providing independent filtering of e-commerce transactions
App 20020111818 - Morar, John F. ;   et al.
2002-08-15
Collaborative server processing of content and meta-information with application to virus checking in a server network
Grant 6,275,937 - Hailpern , et al. August 14, 2
2001-08-14
Searching for patterns in encrypted data
Grant 5,442,699 - Arnold , et al. August 15, 1
1995-08-15
Tamper resistant packaging for information protection in electronic circuitry
Grant 5,117,457 - Comerford , et al. May 26, 1
1992-05-26
Manipulating rights-to-execute in connection with a software copy protection mechanism
Grant 5,109,413 - Comerford , et al. April 28, 1
1992-04-28
Secure management of keys using extended control vectors
Grant 4,924,515 - Matyas , et al. May 8, 1
1990-05-08
Remote access terminal security
Grant 4,916,738 - Chandra , et al. April 10, 1
1990-04-10
Implementing a shared higher level of privilege on personal computers for copy protection of software
Grant 4,903,296 - Chandra , et al. February 20, 1
1990-02-20
Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
Grant 4,817,140 - Chandra , et al. March 28, 1
1989-03-28
Implementing a shared higher level of privilege on personal computers for copy protection of software
Grant 4,644,493 - Chandra , et al. February 17, 1
1987-02-17
Hardware key-on-disk system for copy-protecting magnetic storage media
Grant 4,577,289 - Comerford , et al. March 18, 1
1986-03-18

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed