Growing community of inventors

San Francisco, CA, United States of America

Stephen Melvin

Average Co-Inventor Count = 1.39

ph-index = 13

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 586

Stephen MelvinMario D Nemirovsky (17 patents)Stephen MelvinEnrique Musoll (12 patents)Stephen MelvinNandakumar Sampath (6 patents)Stephen MelvinNarendra Sankar (4 patents)Stephen MelvinAdolfo M Nemirovsky (3 patents)Stephen MelvinEnric Musoll (3 patents)Stephen MelvinJeffery T Huynh (1 patent)Stephen MelvinHector Urdaneta (1 patent)Stephen MelvinAldofo Nemirovsky (0 patent)Stephen MelvinStephen Melvin (43 patents)Mario D NemirovskyMario D Nemirovsky (43 patents)Enrique MusollEnrique Musoll (64 patents)Nandakumar SampathNandakumar Sampath (6 patents)Narendra SankarNarendra Sankar (21 patents)Adolfo M NemirovskyAdolfo M Nemirovsky (22 patents)Enric MusollEnric Musoll (15 patents)Jeffery T HuynhJeffery T Huynh (1 patent)Hector UrdanetaHector Urdaneta (1 patent)Aldofo NemirovskyAldofo Nemirovsky (0 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Mips Technologies, Inc. (16 from 271 patents)

2. Other (11 from 832,761 patents)

3. Teplin Application Limited Liability Company (6 from 6 patents)

4. Nosadia Pass Nv, Limited Liability Company (3 from 3 patents)

5. Schuman Assets Bros. LLC (2 from 2 patents)

6. Teplin Application Limited (2 from 2 patents)

7. Baglador S.a. LLC (2 from 2 patents)

8. Consentry Networks, Inc. (1 from 3 patents)


43 patents:

1. 8812875 - Virtual self-destruction of stored information

2. 8806066 - Method for input output expansion in an embedded system utilizing controlled transitions of first and second signals

3. 8429420 - Time-based key management for encrypted information

4. 8307072 - Network adapter validation

5. 8301753 - Endpoint activity logging

6. 8275996 - Incremental encryption of stored information

7. 8214482 - Remote log repository with access policy

8. 8131882 - Method for input output expansion in an embedded system utilizing controlled transitions of first and second signals

9. 7876427 - Headlamp alignment detection using a network of independent sensor units

10. 7877481 - Method and apparatus for overflowing data packets to a software-controlled memory when they do not fit into a hardware-controlled memory

11. 7765554 - Context selection and activation mechanism for activating one of a group of inactive contexts in a processor core for servicing interrupts

12. 7739452 - Method and apparatus for hardware enforced virtual sequentiality

13. 7715410 - Queueing system for processors in packet routing operations

14. 7668954 - Unique identifier validation

15. 7650605 - Method and apparatus for implementing atomicity of memory operations in dynamic multi-streaming processors

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/17/2025
Loading…