Houston, TX, United States of America

Joseph Wright

USPTO Granted Patents = 4 

 

Average Co-Inventor Count = 2.2

ph-index = 1

Forward Citations = 1(Granted Patents)


Company Filing History:


Years Active: 2022-2025

Loading Chart...
Loading Chart...
4 patents (USPTO):Explore Patents

Title: Joseph Wright: Innovator in Cryptographic Security and Anomaly Detection

Introduction

Joseph Wright is a notable inventor based in Houston, TX, with a focus on advancements in cryptographic security and computing device health monitoring. He holds four patents that showcase his innovative contributions to technology.

Latest Patents

One of his latest patents involves generating cryptographic security parameters responsive to conductive mesh-captured radiances. This process includes providing a first signal to a first conductive mesh of a semiconductor package to enable wireless transmission. The second conductive mesh receives this transmission, allowing for the determination of a signature of the second signal. A cryptographic security parameter is then generated based on this signature. Another significant patent addresses processing health information to determine whether an anomaly has occurred in computing devices. This involves using a deep learning model to analyze health information from multiple components of a computing device, enabling the identification of anomalistic behavior.

Career Highlights

Joseph Wright is currently employed at Hewlett Packard Enterprise Development LP, where he continues to push the boundaries of technology through his innovative work. His contributions have significantly impacted the fields of cryptography and device health monitoring.

Collaborations

Some of his coworkers include Chris Davenport and Christopher J Davenport, who collaborate with him on various projects within the company.

Conclusion

Joseph Wright's work exemplifies the spirit of innovation in technology, particularly in cryptographic security and anomaly detection. His patents reflect a commitment to enhancing the functionality and security of computing devices.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…