Rockville, MD, United States of America

Michael D Heyman


Average Co-Inventor Count = 3.4

ph-index = 7

Forward Citations = 262(Granted Patents)


Location History:

  • Columbia, MD (US) (2005 - 2009)
  • Rockville, MD (US) (2009)

Company Filing History:


Years Active: 2005-2009

Loading Chart...
7 patents (USPTO):Explore Patents

Title: Michael D Heyman: Innovator in Key Distribution and Network Security

Introduction

Michael D Heyman is a notable inventor based in Rockville, MD (US). He has made significant contributions to the fields of key distribution and network security, holding a total of 7 patents. His innovative work has paved the way for advancements in secure communications.

Latest Patents

Among his latest patents is a system and method for reusable efficient key distribution. This invention discloses a method where key distribution is achieved through self-repairing groups, eliminating the need for key distribution messages in parts of a hierarchical tree. Another significant patent is for a decryption system and method for network analyzers and security programs. This invention provides a system, method, and computer program product for decrypting network communications, where encrypted communications are identified, and a key is conditionally received based on predetermined criteria to facilitate decryption.

Career Highlights

Michael has worked with prominent companies such as Networks Associates Technology, Inc. and McAfee, Inc. His experience in these organizations has contributed to his expertise in network security and key distribution technologies.

Collaborations

Throughout his career, Michael has collaborated with notable professionals, including Peter T Dinsmore and Alan T Sherman. These collaborations have further enriched his work and innovations in the field.

Conclusion

Michael D Heyman is a distinguished inventor whose work in key distribution and network security has had a lasting impact on the industry. His patents reflect his commitment to advancing technology and enhancing secure communications.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…