Evanston, IL, United States of America

Jack Bishop

USPTO Granted Patents = 1 

Average Co-Inventor Count = 1.0

ph-index = 1


Company Filing History:


Years Active: 2025

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Jack Bishop - Innovator in Real-Time Security Solutions

Introduction

Jack Bishop is an accomplished inventor based in Evanston, IL. He has made significant contributions to the field of artificial intelligence and network security. His innovative approach focuses on enhancing security measures through real-time monitoring and compliance analysis.

Latest Patents

Jack holds a patent for an "Artificial intelligence based real-time security escrow system." This invention relates to enforcing dynamically updated network security policies in real-time from multiple organizations. It allows for the anonymous analysis of computing system configuration information uploaded from third-party systems. The analysis engine monitors compliance information and compares it against security rules for enterprise networks. Additionally, the system provides a network map visualization, showcasing communication links and enabling drill-down capabilities to identify issues as they arise. The security escrow system can automatically enable or disable access between third-party networks and enterprise computing systems based on compliance information.

Career Highlights

Jack Bishop is currently employed at Bank of America Corporation, where he applies his expertise in security technologies. His work focuses on developing innovative solutions that enhance the security infrastructure of the organization.

Collaborations

Jack collaborates with talented professionals such as Betsy Balgooyen Keller and Luqman Sharief. Their combined efforts contribute to the advancement of security technologies within their organization.

Conclusion

Jack Bishop is a notable inventor whose work in artificial intelligence and network security is paving the way for more secure computing environments. His contributions are vital in addressing the challenges of modern security threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…