Atlantic Highlands, NJ, United States of America

Alton Drake, Ii

USPTO Granted Patents = 9 

Average Co-Inventor Count = 3.0

ph-index = 4

Forward Citations = 35(Granted Patents)


Company Filing History:


Years Active: 2013-2025

Loading Chart...
9 patents (USPTO):Explore Patents

Title: Alton Drake II: Innovator in Access Control Technologies

Introduction

Alton Drake II is a notable inventor based in Atlantic Highlands, NJ (US), recognized for his contributions to access control technologies. With a total of nine patents to his name, he has made significant strides in the field of federated identity verification and multi-system authentication.

Latest Patents

Drake's latest patents include a system for federated identity verification and access control for public service entities. This innovative processing system allows a guest user associated with one public service entity to access network-based resources of another public service entity. The system queries an attribute provider to obtain user attributes and grants access based on established policies. Another significant patent focuses on access control based on combined multi-system authentication factors. This access gateway controls user device access to remote computer resource systems, determining assurance levels based on multiple authentication factors from previous access requests.

Career Highlights

Alton Drake II is currently employed at AT&T Intellectual Property L.P., where he continues to develop and refine technologies that enhance security and access control. His work has been instrumental in advancing the capabilities of identity verification systems.

Collaborations

Drake collaborates with notable colleagues such as Brian M. Novack and Jerry Birkes, contributing to a dynamic team focused on innovation in technology.

Conclusion

Alton Drake II's work in access control technologies exemplifies the impact of innovative thinking in enhancing security measures. His patents reflect a commitment to improving user access while maintaining robust security protocols.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…