Pleasanton, CA, United States of America

Joe Epstein


 

Average Co-Inventor Count = 1.1

ph-index = 6

Forward Citations = 112(Granted Patents)


Location History:

  • Plesanton, CA (US) (2015)
  • Palo Alto, CA (US) (2015 - 2016)
  • Pleasanton, CA (US) (2015 - 2017)

Company Filing History:


Years Active: 2015-2017

Loading Chart...
Loading Chart...
8 patents (USPTO):Explore Patents

Title: Joe Epstein: Innovator in Computer Security

Introduction

Joe Epstein is a notable inventor based in Pleasanton, CA (US). He has made significant contributions to the field of computer security, holding a total of 8 patents. His work focuses on enhancing the security and functionality of virtualized computer programs.

Latest Patents

Among his latest patents is the invention titled "Automatic curation and modification of virtualized computer programs." This patent describes a data processing method that involves receiving a first instance of computer program data at a security unit, executing it in a monitored environment, and generating instructions for security protections based on function calls. Another significant patent is "Selective access to executable memory," which outlines a method for establishing different memory access permissions in a computer, ensuring that only authorized processes can execute specific memory pages.

Career Highlights

Joe Epstein is currently employed at Cisco Technology, Inc., where he continues to innovate in the realm of computer security. His expertise and inventions have contributed to the advancement of secure computing practices.

Collaborations

Throughout his career, Joe has collaborated with talented individuals such as Maksim V Panchenko and Jan Civlin. These collaborations have fostered a creative environment that encourages innovation and the development of cutting-edge technologies.

Conclusion

Joe Epstein's contributions to computer security through his patents and collaborations highlight his role as a leading inventor in the field. His work continues to influence the way security is approached in virtualized environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…