Rochester, NY, United States of America

Emily Katherine Anzalone


Average Co-Inventor Count = 3.6

ph-index = 1


Company Filing History:


Years Active: 2023-2025

Loading Chart...
5 patents (USPTO):Explore Patents

Title: Emily Katherine Anzalone: Innovator in Secure Authentication Technologies

Introduction

Emily Katherine Anzalone is a prominent inventor based in Rochester, NY (US). She has made significant contributions to the field of secure authentication and application execution on shared devices. With a total of five patents to her name, Anzalone is recognized for her innovative approaches to enhancing user security in shared environments.

Latest Patents

Anzalone's latest patents include "Secure authentication and execution of applications on shared devices." This method involves a processor of a shared device receiving user identification, connecting to a remote server for authentication modules and applications, and executing the application upon successful user authentication. Another notable patent is "Entity-specific user authentication in shared office document processing device." This application provides shared device cards to user devices, allowing for entity-specific authentication settings that enhance security when accessing shared document processing devices.

Career Highlights

Emily Katherine Anzalone is currently employed at Xerox Corporation, where she continues to develop innovative solutions in the realm of secure authentication. Her work has been instrumental in advancing the security protocols used in shared devices, making them safer for users.

Collaborations

Anzalone has collaborated with notable colleagues such as James P. Gorski and Donald L. Wegeng. These partnerships have contributed to the development of her patents and the advancement of technology in her field.

Conclusion

Emily Katherine Anzalone is a trailblazer in the field of secure authentication technologies. Her innovative patents and contributions to Xerox Corporation highlight her commitment to enhancing user security in shared environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…