Growing community of inventors

Orem, UT, United States of America

Jeremy Ray Brown

Average Co-Inventor Count = 3.38

ph-index = 8

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 543

Jeremy Ray BrownJason Allen Sabin (35 patents)Jeremy Ray BrownLloyd Leon Burch (32 patents)Jeremy Ray BrownNathaniel Brent Kranendonk (19 patents)Jeremy Ray BrownKal A Larsen (19 patents)Jeremy Ray BrownMichael John Jorgensen (17 patents)Jeremy Ray BrownMichael Fairbanks (11 patents)Jeremy Ray BrownThomas Larry Biggs (7 patents)Jeremy Ray BrownStephen R Carter (4 patents)Jeremy Ray BrownDaniel Robert Timpson (4 patents)Jeremy Ray BrownMatthew Holt (4 patents)Jeremy Ray BrownChad Buttars (2 patents)Jeremy Ray BrownDouglas Garry Earl (1 patent)Jeremy Ray BrownJeremy Ray Brown (41 patents)Jason Allen SabinJason Allen Sabin (64 patents)Lloyd Leon BurchLloyd Leon Burch (136 patents)Nathaniel Brent KranendonkNathaniel Brent Kranendonk (30 patents)Kal A LarsenKal A Larsen (29 patents)Michael John JorgensenMichael John Jorgensen (28 patents)Michael FairbanksMichael Fairbanks (13 patents)Thomas Larry BiggsThomas Larry Biggs (7 patents)Stephen R CarterStephen R Carter (197 patents)Daniel Robert TimpsonDaniel Robert Timpson (7 patents)Matthew HoltMatthew Holt (4 patents)Chad ButtarsChad Buttars (2 patents)Douglas Garry EarlDouglas Garry Earl (26 patents)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Novell, Inc. (22 from 798 patents)

2. Micro Focus Software Inc. (15 from 55 patents)

3. Oracle International Corporation (3 from 11,307 patents)

4. Novell Intellectual Property Holdings, Inc. (1 from 13 patents)


41 patents:

1. 11361065 - Techniques for authentication via a mobile device

2. 11170316 - System and method for determining fuzzy cause and effect relationships in an intelligent workload management system

3. 10735419 - Techniques for authentication via a mobile device

4. 10503914 - Techniques for security auditing of cloud resources

5. 10360054 - File mapping and converting for dynamic disk personalization for multiple platforms

6. 10178183 - Techniques for prevent information disclosure via dynamic secure cloud resources

7. 10148657 - Techniques for workload spawning

8. 10057113 - Techniques for workload coordination

9. 9965724 - System and method for determining fuzzy cause and effect relationships in an intelligent workload management system

10. 9929921 - Techniques for workload toxic mapping

11. 9882965 - Techniques for network process identity enablement

12. 9848017 - Techniques for identity and policy based routing

13. 9674188 - Techniques for authentication via a mobile device

14. 9632903 - Techniques for distributed testing

15. 9619262 - Techniques for security auditing of cloud resources

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/15/2025
Loading…