Cary, NC, United States of America

John Joseph McKenna

USPTO Granted Patents = 8 

Average Co-Inventor Count = 2.3

ph-index = 5

Forward Citations = 111(Granted Patents)


Location History:

  • Kingston, NY (US) (1985)
  • Cary, NC (US) (1997 - 2015)

Company Filing History:


Years Active: 1985-2015

Loading Chart...
8 patents (USPTO):

Title: John Joseph McKenna: Innovator in Computer Security

Introduction

John Joseph McKenna is a notable inventor based in Cary, NC (US), recognized for his contributions to computer security. He holds a total of 8 patents, showcasing his expertise and innovative spirit in the field.

Latest Patents

Among his latest patents is a method for the administration of computer security threat countermeasures to a computer system. This invention involves establishing a baseline identification of an operating or application system type and release level, which is compatible with a Threat Management Vector (TMV). The TMV includes critical information about operating system types affected by security threats and possible countermeasures. Another significant patent focuses on methods, computer program products, and data structures for intrusion detection, response, and vulnerability remediation across target computer systems. This invention generates computer security threat management information by processing notifications of security threats and tests that detect intrusions.

Career Highlights

Throughout his career, John has worked with prominent companies such as IBM and Lenovo (Singapore) Pte. Ltd. His experience in these organizations has contributed to his development as an inventor in the technology sector.

Collaborations

John has collaborated with notable coworkers, including Jeffrey Scott Bardsley and Ashley Anderson Brock, further enhancing his innovative endeavors.

Conclusion

John Joseph McKenna's work in computer security has made a significant impact in the field, and his patents reflect his dedication to advancing technology. His contributions continue to influence the way security threats are managed in computer systems.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…