Munich, Germany

David Jennings


Average Co-Inventor Count = 5.0

ph-index = 1


Company Filing History:


Years Active: 2012

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovator Spotlight: David Jennings - A Pioneer in Password Protection

Introduction

David Jennings, based in Munich, Germany, is an innovative inventor with a focus on enhancing digital security. With a notable patent to his name, he has made significant contributions to the field of data protection, specifically in the area of password security. His work plays a vital role in safeguarding sensitive information against unauthorized access.

Latest Patents

David Jennings holds a patent for a groundbreaking "Method of protecting a password from unauthorized access and data processing unit." This invention details a sophisticated approach to password security, where data representing part of a password is stored in memory, linked to multiple executable instructions. The method ensures that executable code cannot be read out as data from the memory, thereby enhancing the security of sensitive information.

Career Highlights

Currently, David is employed at Intel Mobile Communications GmbH, a leading technology company specializing in mobile communication solutions. His innovative mindset and expertise in data processing have positioned him as a valuable asset within the organization.

Collaborations

Throughout his career, David has collaborated with esteemed colleagues such as John Barstow and Patrik Eder. These partnerships have fostered a creative environment where ideas can flourish, leading to innovative solutions in the realm of mobile communications and security.

Conclusion

David Jennings stands out as a prominent inventor in the field of password protection. His patented method not only showcases his ingenuity but also emphasizes the importance of robust security measures in today’s digital landscape. As technology continues to evolve, inventors like David are crucial in advancing methods that protect our data from potential threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…