Phillipsburg, NJ, United States of America

Stephen Roderick


Average Co-Inventor Count = 3.4

ph-index = 2

Forward Citations = 40(Granted Patents)


Company Filing History:


Years Active: 2012

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Innovations by Stephen Roderick

Introduction

Stephen Roderick is an accomplished inventor based in Phillipsburg, NJ (US). He has made significant contributions to the field of network security, holding a total of 2 patents. His work focuses on enhancing the efficiency and effectiveness of security advisory information distribution and retrieval.

Latest Patents

Roderick's latest patents include a "Method and apparatus for distributing network security advisory information." This invention allows users to create profiles that specify their preferences for receiving security advisory information. The system then distributes incoming security advisory information according to these user profiles. Another notable patent is the "Method and apparatus for integrated network security alert information retrieval." This invention enables direct access to databases containing information related to an IP address from within a threat management software tool. It streamlines the process of linking alerts to relevant databases, ensuring that security analysts can efficiently isolate threats.

Career Highlights

Stephen Roderick is currently employed at AT&T Intellectual Property I, L.P. His role involves developing innovative solutions that address complex security challenges in the digital landscape. His expertise in network security has positioned him as a valuable asset in his field.

Collaborations

Roderick has collaborated with notable colleagues, including Michael Singer and John L. Coviello. These partnerships have contributed to the advancement of security technologies and the successful implementation of his inventions.

Conclusion

Stephen Roderick's contributions to network security through his patents demonstrate his commitment to innovation in the field. His work continues to influence the way security advisory information is managed and utilized.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…