Rochester, NY, United States of America

Donald L Wegeng


Average Co-Inventor Count = 3.1

ph-index = 4

Forward Citations = 151(Granted Patents)


Location History:

  • Rochester, NY (US) (1994 - 1997)
  • Fairport, NY (US) (2009 - 2024)

Company Filing History:


Years Active: 1994-2025

Loading Chart...
8 patents (USPTO):Explore Patents

Title: Innovations of Donald L Wegeng

Introduction

Donald L Wegeng is a notable inventor based in Rochester, NY (US), recognized for his contributions to technology and innovation. He holds a total of 8 patents, showcasing his expertise in developing advanced solutions for shared devices and user authentication.

Latest Patents

One of Wegeng's latest patents is titled "Secure authentication and execution of applications on shared devices." This method involves a processor of a shared device receiving a user's identification, connecting to a remote server that stores authentication modules and applications, and executing the application after authenticating the user based on received log-in information. Another significant patent is "Entity-specific user authentication in shared office document processing device." This invention provides an app to user devices that supplies shared device cards to digital wallets, enabling entity-specific authentication settings for accessing shared document processing devices.

Career Highlights

Wegeng has made significant strides in his career, particularly through his work at Xerox Corporation. His innovative approaches have led to advancements in secure user authentication and application execution, which are crucial in today's digital landscape.

Collaborations

Wegeng has collaborated with talented individuals such as Emily Katherine Anzalone and James P Gorski, contributing to the development of cutting-edge technologies in their field.

Conclusion

Donald L Wegeng's work exemplifies the spirit of innovation and the importance of secure technology in shared environments. His patents reflect a commitment to enhancing user experience and security in digital applications.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…