Cambridge, United Kingdom

Amya Edward Wykes Philips


Average Co-Inventor Count = 4.0

ph-index = 1


Company Filing History:


Years Active: 2019

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Amya Edward Wykes Philips: Innovator in Computer System Authorization

Introduction

Amya Edward Wykes Philips is a notable inventor based in Cambridge, GB. She has made significant contributions to the field of computer systems, particularly in the area of data authorization. Her innovative approach has led to the development of a unique patent that enhances security and data access.

Latest Patents

Amya holds a patent for "Controlling authorization within computer systems." This invention involves techniques for managing the provision of data to a requester through a local device that communicates with a personal computing device. The personal computing device can exist in either an authorized or unauthorized state. When the personal computing device is near the local device and receives a data request, it utilizes stored permission data to determine if the request is permitted. If allowed, the personal computing device sends a message to a token issuing device to generate a token request for the requester. This token enables the requester to access a third-party device that holds the desired data. Amya has 1 patent to her name.

Career Highlights

Amya is currently employed at Arm IP Limited, where she continues to work on innovative solutions in technology. Her role involves collaborating with other experts in the field to enhance the security and efficiency of computer systems.

Collaborations

Amya has worked alongside talented colleagues such as Andrew John Pritchard and Krisztian Flautner. Their combined expertise contributes to the advancement of technology and innovation within their organization.

Conclusion

Amya Edward Wykes Philips is a pioneering inventor whose work in computer system authorization is making a significant impact in the tech industry. Her contributions are essential for improving data security and access control in modern computing environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…