Company Filing History:
Years Active: 2003-2006
Title: The Innovative Contributions of Clifford C. Miller
Introduction
Clifford C. Miller is a notable inventor based in Palm Bay, FL (US), recognized for his contributions to network security technology. With a total of 3 patents, Miller has made significant strides in assessing the security posture of networks, showcasing his expertise in data processing systems.
Latest Patents
Miller's latest patents include a "System and method for assessing the security posture of a network." This innovative method involves creating a system object model database that represents a network, which supports the information data requirements of various network vulnerability analysis programs. The database is exported to these programs, allowing for a comprehensive analysis of the network's security vulnerabilities.
Another significant patent is the "System and method for assessing the security posture of a network using goal-oriented fuzzy logic decision rules." This method also creates a system object model database, but it focuses on importing only the necessary data to analyze the network. The results from each program are stored in a common system model database, where goal-oriented fuzzy logic decision rules are applied to determine the network's vulnerability posture.
Career Highlights
Miller is currently employed at Harris Corporation, where he continues to develop innovative solutions in network security. His work has been instrumental in enhancing the security measures of various networks, making them more resilient against vulnerabilities.
Collaborations
Miller has collaborated with several professionals in his field, including Kevin Lee Fox and Ronda R. Henning. These collaborations have contributed to the advancement of his projects and the overall success of his innovations.
Conclusion
Clifford C. Miller's contributions to network security through his patents and work at Harris Corporation highlight his role as a significant inventor in the field. His innovative methods for assessing network vulnerabilities demonstrate the importance of technology in enhancing security measures.
