Mountain View, CA, United States of America

John M Wilson, Iii


Average Co-Inventor Count = 2.6

ph-index = 4

Forward Citations = 200(Granted Patents)


Company Filing History:


Years Active: 2001-2024

Loading Chart...
6 patents (USPTO):Explore Patents

Title: **John M. Wilson, III: Innovator in Message Security**

Introduction

John M. Wilson, III is a notable inventor based in Mountain View, California, who has made significant contributions to the field of message security. With a total of six patents to his name, Wilson demonstrates a strong commitment to advancing technology and improving communication safety.

Latest Patents

Among his latest innovations is a patent titled "Message security assessment using sender identity profiles." This invention focuses on enhancing user security by tracking the identity profile of a user based on previous message communications. The system identifies and assesses messages that are potentially from the user, extracts crucial information from message headers, and determines security risks by comparing this information with entries in the user's identity profile. Based on this assessment, a security action is implemented to mitigate risks associated with message communications.

Career Highlights

Throughout his career, John M. Wilson, III has worked for esteemed companies in the tech industry, including Agari Data, Inc. and SAP AG, where he applied his expertise in message security and communication technologies.

Collaborations

Wilson has collaborated with talented individuals in the field, including Bjorn Markus Jakobsson and Michael Good. These collaborations have likely contributed to the successful development of his innovative patents, enhancing the security landscape for messaging systems.

Conclusion

John M. Wilson, III stands out as an influential inventor in the realm of message security. His dedication to innovation, evidenced by his six patents, showcases his commitment to creating safer communication solutions. Through his work, Wilson continues to pave the way for advancements in technology that protect user identities and enhance security protocols.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…