Brisbane, Australia

Charles R J Moore


Average Co-Inventor Count = 3.0

ph-index = 3

Forward Citations = 77(Granted Patents)


Company Filing History:


Years Active: 2004-2008

Loading Chart...
3 patents (USPTO):Explore Patents

Title: Innovations of Charles R J Moore

Introduction

Charles R J Moore is an accomplished inventor based in Brisbane, Australia. He has made significant contributions to the field of computing through his innovative patents. With a total of three patents to his name, Moore has demonstrated a commitment to advancing technology and enhancing the security of computing resources.

Latest Patents

One of Moore's latest patents is titled "Method and system for enforcing access to a computing resource using a licensing attribute certificate." This invention introduces a licensing attribute certificate that enables a trusted computing base to enforce access to a computing resource by a computer application. The certificate contains enforcement data that limits the use of the computing resource and allows for tracking licensing data about its usage. This method ensures that products can be deployed with capabilities restricted to specific functions. The enforcement data, licensing data, and application limitations are cryptographically bound to the computing resource, ensuring strong authentication before access is granted.

Career Highlights

Moore has built a notable career at Spyrus, Inc., where he has been instrumental in developing secure computing solutions. His work focuses on enhancing the security and functionality of computing resources, making significant strides in the industry.

Collaborations

Some of his notable coworkers include William P Bialick and Russell D Housley, who have collaborated with Moore on various projects, contributing to the advancement of technology in their respective fields.

Conclusion

Charles R J Moore's innovative work in computing security has made a lasting impact on the industry. His patents reflect a deep understanding of technology and a commitment to improving access control in computing resources.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…