St. George, UT, United States of America

Chuck Paterson



Average Co-Inventor Count = 5.0

ph-index = 1

Forward Citations = 25(Granted Patents)


Company Filing History:


Years Active: 2015

Loading Chart...
Loading Chart...
1 patent (USPTO):Explore Patents

Title: The Innovations of Chuck Paterson

Introduction

Chuck Paterson is an accomplished inventor based in St. George, UT. He has made significant contributions to the field of data security through his innovative patent. His work focuses on enhancing the safety and integrity of structured data storage systems.

Latest Patents

Chuck Paterson holds a patent for "Systems and methods for detecting and mitigating threats to a structured data storage system." This patent encompasses systems, methods, and computer-readable media designed to detect threats on a network. In his invention, target network traffic transmitted between two or more hosts is captured. The target network traffic consists of a plurality of packets, which are assembled into one or more messages. The assembled message(s) can be parsed to generate a semantic model of the target network traffic. This semantic model may include representation(s) of operation(s) or event(s) represented by the message(s). Scores for the operation(s) or event(s) are generated using various scoring algorithms, allowing for the identification of potential threats among the operation(s) or event(s).

Career Highlights

Chuck Paterson is currently associated with Db Networks, Inc., where he continues to develop innovative solutions for network security. His expertise in data protection has positioned him as a valuable asset in the tech industry.

Collaborations

Some of Chuck's notable coworkers include Eric Varsanyi and David Rosenberg, who contribute to the collaborative environment at Db Networks, Inc.

Conclusion

Chuck Paterson's innovative work in network security exemplifies the importance of protecting structured data storage systems. His contributions through his patent demonstrate a commitment to advancing technology in the field of data protection.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…