Port Ewen, NY, United States of America

Arthur L Fitzpatrick, Iii


Average Co-Inventor Count = 9.0

ph-index = 1


Company Filing History:


Years Active: 2014

where 'Filed Patents' based on already Granted Patents

1 patent (USPTO):

Title: Arthur L Fitzpatrick, III: Innovator in Computing Security

Introduction

Arthur L Fitzpatrick, III is a notable inventor based in Port Ewen, NY (US). He has made significant contributions to the field of computing security, particularly through his innovative patent. His work has implications for how security contexts are managed across different systems.

Latest Patents

Arthur holds a patent titled "Cross security-domain identity context projection within a computing environment." This patent addresses the processing within a computing environment by determining whether a local security context of a user is acceptable to a second system in a different security domain. If the user's security context is deemed unacceptable, the local security manager of the second system creates a runtime security context for the user. This context is then referenced back to the first system, facilitating secure processing across domains.

Career Highlights

Arthur is associated with the International Business Machines Corporation, commonly known as IBM. His role at IBM has allowed him to work on cutting-edge technologies that enhance security measures in computing environments. His innovative approach has contributed to the advancement of security protocols in the industry.

Collaborations

Some of Arthur's notable coworkers include Alan P Dooley and Walter Barlett Farrell. Their collaboration has likely fostered an environment of innovation and creativity, leading to advancements in their respective fields.

Conclusion

Arthur L Fitzpatrick, III is a distinguished inventor whose work in computing security has made a lasting impact. His patent demonstrates a forward-thinking approach to managing security contexts across different systems. His contributions continue to influence the field of computing security today.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…