Growing community of inventors

Winchester, United Kingdom

Jonathan Lee Rumsey

Average Co-Inventor Count = 1.82

ph-index = 2

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 25

Jonathan Lee RumseyBret William Dixon (7 patents)Jonathan Lee RumseyPeter Siddall (1 patent)Jonathan Lee RumseyIan C Edwards (1 patent)Jonathan Lee RumseyMichael Horan (1 patent)Jonathan Lee RumseyTristram Terence Reilly (1 patent)Jonathan Lee RumseyDavid Postlethwaite (1 patent)Jonathan Lee RumseyRichard Michael Wyn Harran (1 patent)Jonathan Lee RumseyJonathan Lee Rumsey (12 patents)Bret William DixonBret William Dixon (61 patents)Peter SiddallPeter Siddall (17 patents)Ian C EdwardsIan C Edwards (7 patents)Michael HoranMichael Horan (4 patents)Tristram Terence ReillyTristram Terence Reilly (4 patents)David PostlethwaiteDavid Postlethwaite (2 patents)Richard Michael Wyn HarranRichard Michael Wyn Harran (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. International Business Machines Corporation (12 from 164,275 patents)


12 patents:

1. 11329964 - Policy based message cryptographic expiry

2. 10659438 - Policy based message cryptographic expiry

3. 9755838 - Digital certificate issuer-correlated digital signature verification

4. 9749139 - Digital certificate issuer-correlated digital signature verification

5. 9426146 - Digital certificate issuer-correlated digital signature verification

6. 9197631 - Digital certificate issuer-correlated digital signature verification

7. 9197611 - Topic protection policy for publish-subscribe messaging system

8. 9118633 - Topic protection policy for publish-subscribe messaging system

9. 8990332 - Performance optimization of a publish operation

10. 8959337 - Digital certificate issuer-correlated digital signature verification

11. 8375051 - Apparatus for controlling subscriptions

12. 7649998 - Facilitating secure data communications that use key-based encryption

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/16/2026
Loading…