Deerfield, NY, United States of America

Joseph James Sharkey

USPTO Granted Patents = 2 

Average Co-Inventor Count = 1.5

ph-index = 1

Forward Citations = 2(Granted Patents)


Company Filing History:


Years Active: 2013-2021

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Joseph James Sharkey: Innovator in Software Protection

Introduction

Joseph James Sharkey is a notable inventor based in Deerfield, NY (US). He has made significant contributions to the field of software protection, holding two patents that address critical issues in computer security. His innovative approaches have garnered attention in the tech community.

Latest Patents

Sharkey's latest patents include "Memory Fractionation Software Protection" and "Method and System for Reducing an Impact of Malware During a Booting Sequence." The first patent outlines a method for protecting software by defining a memory fractionation configuration, which fractionates application software into fractions that are stored securely. This ensures that at least one fraction remains inaccessible during operation. The second patent focuses on reducing malware impact during the booting sequence of an interrupt-driven computing device. It involves manipulating parameters associated with an interrupt vector table to maintain a clean state and prevent unnecessary interrupt functions from executing.

Career Highlights

Throughout his career, Sharkey has worked with reputable companies such as Assured Information Security, Inc. and Siege Technologies, LLC. His experience in these organizations has allowed him to develop and refine his innovative ideas in software security.

Collaborations

Sharkey has collaborated with talented individuals in the field, including Ryan Matthew Wilson and Michael Joseph Sieffert. These partnerships have contributed to the advancement of his projects and patents.

Conclusion

Joseph James Sharkey is a distinguished inventor whose work in software protection has made a significant impact on the industry. His patents reflect a deep understanding of computer security challenges and innovative solutions.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…