Los Altos, CA, United States of America

Carl Schroeder

USPTO Granted Patents = 6 


Average Co-Inventor Count = 3.0

ph-index = 2

Forward Citations = 10(Granted Patents)


Location History:

  • Los Altos, CA (US) (2017 - 2021)
  • Mountain View, CA (US) (2019 - 2021)

Company Filing History:


Years Active: 2017-2024

Loading Chart...
Loading Chart...
6 patents (USPTO):Explore Patents

Title: Innovations by Inventor Carl Schroeder

Introduction

Carl Schroeder is an accomplished inventor based in Los Altos, CA. He has made significant contributions to the field of cybersecurity, holding a total of 6 patents. His work focuses on developing techniques to enhance security measures against various cyber threats.

Latest Patents

One of Carl's latest patents involves detecting compromised credentials in a credential stuffing attack. This patent outlines techniques for identifying compromised credentials by training a model based on a set of spilled credentials. The model is designed to test candidate credentials for membership in the spilled credentials set, allowing for negative actions to be performed if a match is found. Another notable patent addresses the integration of security code within applications. This invention details a process where an application generates a secret cryptographic key based on input parameters, ensuring that client data is encrypted and protected against malware.

Career Highlights

Carl currently works at Shape Security, Inc., where he continues to innovate in the cybersecurity domain. His expertise in developing security solutions has positioned him as a valuable asset in the industry.

Collaborations

Throughout his career, Carl has collaborated with talented individuals such as Daniel Gilbert Moen and Ariya Hidayat. These partnerships have contributed to the advancement of his projects and the overall success of his inventions.

Conclusion

Carl Schroeder's contributions to cybersecurity through his innovative patents demonstrate his commitment to enhancing digital security. His work continues to influence the field and protect users from cyber threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…