Owego, NY, United States of America

David John Wierbowski




Average Co-Inventor Count = 3.8

ph-index = 5

Forward Citations = 216(Granted Patents)


Company Filing History:


Years Active: 2001-2019

where 'Filed Patents' based on already Granted Patents

15 patents (USPTO):

Title: The Innovations of David John Wierbowski

Introduction

David John Wierbowski is a notable inventor based in Owego, NY (US). He has made significant contributions to the field of technology, particularly in network security. With a total of 15 patents to his name, Wierbowski has demonstrated a commitment to advancing innovative solutions in his area of expertise.

Latest Patents

Wierbowski's latest patents include a method for enforcing a centralized, cryptographic network policy for various traffic at a host. This computer-implemented method involves monitoring multiple connections of host applications, detecting security attributes, and comparing them to a centralized security policy. If the attributes do not meet the policy, remedial actions are taken to ensure security compliance. Another significant patent focuses on the centralized secure offload of security services for distributed security enforcement points. This invention provides methods and systems for managing communication flows between devices in different protection zones, enhancing the overall security framework.

Career Highlights

Wierbowski is currently employed at International Business Machines Corporation, commonly known as IBM. His work at IBM has allowed him to collaborate on various innovative projects that push the boundaries of technology and security.

Collaborations

Some of Wierbowski's coworkers include Linwood H Overby, Jr. and Linwood Hugh Overby, Jr. Their collaboration has contributed to the development of advanced security solutions within the organization.

Conclusion

David John Wierbowski's contributions to technology and network security through his patents and work at IBM highlight his role as a leading inventor in his field. His innovative approaches continue to shape the landscape of secure network management.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…