Shrewsbury, MA, United States of America

Asem Othman



 

Average Co-Inventor Count = 4.1

ph-index = 6

Forward Citations = 173(Granted Patents)


Location History:

  • Shrewsbury, MA (US) (2016 - 2022)
  • Worcester, MA (US) (2019 - 2022)

Company Filing History:


Years Active: 2016-2025

Loading Chart...
Loading Chart...
Loading Chart...
12 patents (USPTO):Explore Patents

Title: Asem Othman: Innovator in Biometric Authentication

Introduction

Asem Othman is a notable inventor based in Shrewsbury, MA, who has made significant contributions to the field of biometric authentication. With a total of 12 patents to his name, Othman's work focuses on enhancing user security through innovative technologies.

Latest Patents

One of Othman's latest patents involves systems and methods for performing fingerprint-based user authentication using imagery captured by mobile devices. This invention presents a comprehensive approach to fingerprint recognition, where a user's biometric features are captured and transformed into an identifier. The technology utilizes mobile devices, such as smartphones, to authenticate users by analyzing images of multiple fingers. Additionally, the patent addresses the challenge of spoofing by incorporating anti-spoofing techniques that assess the liveness of the captured biometric data.

Career Highlights

Throughout his career, Asem Othman has worked with various companies, including Veridium IP Limited and Hoyos Labs IP Ltd. His experience in these organizations has allowed him to refine his expertise in biometric technologies and contribute to advancements in user authentication systems.

Collaborations

Othman has collaborated with notable professionals in the field, including Richard Tyson and Andrew Simpson. These partnerships have further enriched his work and expanded the impact of his innovations.

Conclusion

Asem Othman's contributions to biometric authentication demonstrate his commitment to enhancing security through innovative technologies. His patents reflect a deep understanding of user needs and the importance of reliable authentication methods.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…