San Jose, CA, United States of America

Catherine M Keene


Average Co-Inventor Count = 3.0

ph-index = 2

Forward Citations = 120(Granted Patents)


Company Filing History:


Years Active: 2008-2009

Loading Chart...
2 patents (USPTO):Explore Patents

Title: The Innovative Contributions of Catherine M. Keene

Introduction

Catherine M. Keene is a notable inventor based in San Jose, California. She has made significant contributions to the field of software access control, holding 2 patents that showcase her innovative spirit and technical expertise. Her work is particularly relevant in today's digital landscape, where data security and controlled access are paramount.

Latest Patents

One of Catherine's latest patents is a method and apparatus for providing controlled access to software objects and associated documents. This invention involves a database that stores and provides controlled access to objects and documents by multiple users according to predetermined privileges set by the owner or host of the information. Individual users, or guests, can be granted access to the objects and their attributes as determined by the host. This system allows the host to establish access privileges based on various relationships, making it especially useful in complex business environments where confidentiality and trade secrets are critical.

Career Highlights

Catherine is currently employed at Agile Software Corporation, where she continues to develop innovative solutions in software technology. Her work has not only advanced her career but has also contributed to the broader field of software development and security.

Collaborations

Catherine has collaborated with talented individuals such as Raymond Lin and Rao Sadhureddly. These partnerships have likely enriched her work and fostered a collaborative environment that encourages innovation.

Conclusion

Catherine M. Keene's contributions to software access control highlight her role as a leading inventor in her field. Her patents reflect a deep understanding of the complexities of data security and the importance of controlled access in modern technology.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…