Sammamish, WA, United States of America

Atul Kumar Shah


Average Co-Inventor Count = 4.0

ph-index = 1

Forward Citations = 16(Granted Patents)


Company Filing History:


Years Active: 2012

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Atul Kumar Shah: Innovator in Mobile Security Solutions

Introduction

Atul Kumar Shah is a notable inventor based in Sammamish, WA (US). He has made significant contributions to the field of mobile computing security. His innovative approach to user authentication has led to the development of a unique patent that enhances the security of mobile devices.

Latest Patents

Atul Kumar Shah holds a patent for a "One time password key ring for mobile computing device." This invention utilizes single-use character combinations as a secure mechanism for user authentication. The one-time passwords (OTPs) can be generated by a mobile device, which the user can easily access. The patent describes a key exchange process, such as the Diffie-Hellman algorithm, that allows both the mobile device and a server to share a secret from which the OTPs can be generated. The shared secret can be derived from parameters posted on the server and updated periodically. The mobile device can obtain these parameters from the server before generating an OTP, ensuring a secure authentication process.

Career Highlights

Atul Kumar Shah is currently associated with Microsoft Technology Licensing, LLC. His work focuses on enhancing security measures for mobile devices, making them more reliable for users. His innovative solutions have the potential to significantly improve user experience and security in mobile computing.

Collaborations

Atul has collaborated with notable colleagues such as Trevor William Freeman and Josh D Benaloh. These collaborations have likely contributed to the development and refinement of his innovative ideas in mobile security.

Conclusion

Atul Kumar Shah is a prominent figure in the realm of mobile security innovations. His patent for a one-time password key ring exemplifies his commitment to enhancing user authentication methods. His contributions continue to shape the future of secure mobile computing.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…