Peoria, AZ, United States of America

James M Foley

USPTO Granted Patents = 5 

Average Co-Inventor Count = 3.0

ph-index = 2

Forward Citations = 125(Granted Patents)


Company Filing History:


Years Active: 2011-2014

Loading Chart...
5 patents (USPTO):Explore Patents

Title: Innovations by James M Foley

Introduction

James M Foley is an accomplished inventor based in Peoria, AZ (US). He holds a total of 5 patents that showcase his contributions to technology and secure transactions. His work primarily focuses on enhancing user authentication methods, providing flexibility and security for users accessing restricted services.

Latest Patents

One of his latest patents is a method and apparatus for enabling a user to select an authentication method. This invention facilitates access to a restricted service related to secure transactions via a network. It allows users to select a minimum security level of authentication for their login to a restricted service. The user's selected minimum security level may be registered in an authentication method system, ensuring that the user must use this level for authentication to gain access. Additionally, users can specify that their selected minimum security level may be over-turned or re-set depending on their needs. This innovation provides users with the flexibility to choose their own authentication method for accessing restricted services.

Career Highlights

Throughout his career, James M Foley has worked with notable companies such as American Express Travel Related Services Company, Inc. and Sora Applications LLC. His experience in these organizations has contributed to his expertise in developing secure transaction methods and user authentication systems.

Collaborations

James has collaborated with professionals like Rick D Johnson and Anant Nambiar, further enhancing his innovative projects and contributions to the field.

Conclusion

James M Foley's work in the realm of user authentication and secure transactions has made a significant impact. His inventions not only provide security but also empower users with the ability to choose their authentication methods. His contributions continue to shape the future of secure access in technology.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…