Woodstock, NY, United States of America

John L Smith


Average Co-Inventor Count = 5.8

ph-index = 6

Forward Citations = 978(Granted Patents)


Company Filing History:


Years Active: 1976-1983

Loading Chart...
6 patents (USPTO):Explore Patents

Title: Innovations by John L Smith in Cryptographic Communication

Introduction

John L Smith is a notable inventor based in Woodstock, NY (US), recognized for his contributions to data security and cryptographic communication. With a total of six patents to his name, Smith has made significant advancements in the field of cryptography, particularly in enhancing the security of data transmissions.

Latest Patents

Among his latest patents, Smith has developed a data security device that includes a master cipher key storage, cryptographic apparatus for performing operations, and control means for managing the writing and transfer of the master cipher key. This device ensures that when a new master cipher key is written, the old key is automatically overwritten, enhancing security. Additionally, he has created a communication security system for single domain networks, which facilitates secure data transmissions between remote terminals and a host system. This system utilizes a series of terminal master keys enciphered under a host master key, allowing for secure communication sessions.

Career Highlights

Smith's career is marked by his work at International Business Machines Corporation (IBM), where he has contributed to various projects focused on cryptographic technology. His innovative approaches have led to the development of systems that significantly improve data security in communication networks.

Collaborations

Throughout his career, Smith has collaborated with notable colleagues, including William F Ehrsam and Carl H Meyer, who have also contributed to advancements in the field of cryptography.

Conclusion

John L Smith's work in cryptographic communication has established him as a key figure in the field of data security. His innovative patents continue to influence the way secure communications are conducted in today's digital landscape.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…