Gig Harbor, WA, United States of America

Craig Worstell


Average Co-Inventor Count = 5.0

ph-index = 1

Forward Citations = 2(Granted Patents)


Company Filing History:


Years Active: 2016

Loading Chart...
2 patents (USPTO):Explore Patents

Title: The Innovations of Craig Worstell

Introduction

Craig Worstell is an accomplished inventor based in Gig Harbor, Washington. He has made significant contributions to the field of mobile security, holding two patents that enhance the protection of mobile devices and applications. His work is particularly relevant in today's digital landscape, where security is paramount.

Latest Patents

Worstell's latest patents include a system and method for securing mobile devices using virtual certificates. This innovation involves a process where a computing device requests access to a computer network, and a server processor manages the security keys necessary for this access. The method includes generating a conditional seed key fragment and comparing hash parameters to ensure secure network access.

Another notable patent focuses on securing mobile applications using distributed keys. This method involves receiving security key fragments from both user input and a network-connected storage entity. By concatenating these fragments, a new security key is generated, enhancing the security of mobile applications.

Career Highlights

Craig Worstell is currently employed at Bank of America Corporation, where he applies his expertise in mobile security. His work at the bank allows him to contribute to the development of secure financial applications, ensuring that customer data remains protected.

Collaborations

Worstell has collaborated with notable colleagues, including Abdulkader Omar Barbir and Eileen D Bridges. These partnerships have likely fostered innovative ideas and solutions in the realm of mobile security.

Conclusion

Craig Worstell's contributions to mobile security through his patents demonstrate his commitment to innovation in technology. His work not only enhances the security of mobile devices but also sets a standard for future developments in the field.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…