Lexington, MA, United States of America

Christopher J Eng

USPTO Granted Patents = 6 

Average Co-Inventor Count = 2.2

ph-index = 3

Forward Citations = 59(Granted Patents)


Location History:

  • Santa Ana, CA (US) (2022)
  • Lexington, MA (US) (2013 - 2023)

Company Filing History:


Years Active: 2013-2023

Loading Chart...
6 patents (USPTO):Explore Patents

Title: The Innovations of Christopher J Eng

Introduction

Christopher J Eng is an accomplished inventor based in Lexington, MA (US). He holds a total of 6 patents that reflect his expertise in software security and analysis. His contributions to the field have made a significant impact on how software applications are assessed for security flaws.

Latest Patents

One of Eng's latest patents focuses on the assessment and analysis of software security flaws. This innovative approach involves determining the necessary static and dynamic analyses for a software application based on its profile. The first software application undergoes static analysis to generate results, followed by dynamic analysis to produce additional results. An assessment report is then created, indicating a security score derived from both analyses, providing valuable insights into the application's security posture.

Career Highlights

Eng is currently employed at Veracode, Inc., where he continues to develop solutions that enhance software security. His work is instrumental in helping organizations identify vulnerabilities in their software applications, thereby improving overall security measures.

Collaborations

Throughout his career, Eng has collaborated with notable colleagues, including Christopher J Wysopal and Matthew P Moynahan. These partnerships have fostered a collaborative environment that encourages innovation and the sharing of ideas.

Conclusion

Christopher J Eng's contributions to software security through his patents and work at Veracode, Inc. highlight his commitment to advancing technology in this critical area. His innovative approaches continue to shape the future of software security assessment.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…