Average Co-Inventor Count = 3.88
ph-index = 3
The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.
Company Filing History:
1. Workday, Inc. (16 from 278 patents)
16 patents:
1. 12346894 - System and method for dynamically retrieving an attribute value of an identity claim from an issuing party using a digitally signed access token
2. 11948145 - System and method for dynamically retrieving an attribute value of an identity claim from an issuing party using a digitally signed access token
3. 11671267 - System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation
4. 11640456 - System and method for authenticating a user at a user application using an credential access application and automatically redirecting to a target application
5. 11632239 - System and method for blockchain-based device authentication based on a cryptographic challenge
6. 11615403 - System and method for dynamically retrieving an attribute value of an identity claim from an issuing party using a digitally signed access token
7. 11539533 - Access control using a circle of trust
8. 11483316 - System and method for access using a circle of trust
9. 11381405 - System and method for authenticating a user at a relying party application using an authentication application and automatically redirecting to a target application
10. 11336432 - System and method for blockchain-based device authentication based on a cryptographic challenge
11. 11088855 - System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation
12. 11018869 - Blockchain-based digital identity management (DIM) system
13. 10735197 - Blockchain-based secure credential and token management across multiple devices
14. 10715312 - System and method for blockchain-based device authentication based on a cryptographic challenge
15. 10715311 - System and method for blockchain-based user authentication based on a cryptographic challenge