Rochester, MN, United States of America

John C Wingertsman, Iii


Average Co-Inventor Count = 11.0

ph-index = 1

Forward Citations = 3(Granted Patents)


Company Filing History:


Years Active: 2015

where 'Filed Patents' based on already Granted Patents

1 patent (USPTO):

Title: John C Wingertsman, III: Innovator in Trusted Systems

Introduction

John C Wingertsman, III is a notable inventor based in Rochester, MN (US). He has made significant contributions to the field of technology, particularly in the area of trusted systems. His innovative approach has led to the development of a unique patent that enhances device security and access management.

Latest Patents

Wingertsman holds a patent for a "Trusted System Network." This invention outlines a method, system, and computer-readable storage media for granting a device access to a managed group. The process involves the exchange of identification information between a management device and a managed device through a secure first channel. If the identification information is verified, access is granted, allowing the managed device to communicate securely within the network. If verification fails, a cryptographic key is sent to establish an encrypted communication session.

Career Highlights

Wingertsman is currently employed at Lenovo (Singapore) Pte. Ltd., where he continues to innovate and contribute to advancements in technology. His work focuses on enhancing security protocols and improving device management systems. His dedication to his field has positioned him as a valuable asset to his company.

Collaborations

Some of his notable coworkers include Robert John Donovan and Joseph C Lindsay. Their collaborative efforts contribute to the innovative environment at Lenovo, fostering the development of cutting-edge technologies.

Conclusion

John C Wingertsman, III is a distinguished inventor whose work in trusted systems has made a significant impact in the technology sector. His patent for a trusted system network exemplifies his commitment to enhancing device security and access management. His contributions continue to shape the future of technology.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…