West Brookfield, MA, United States of America

Kenneth M Dorman

USPTO Granted Patents = 11 

Average Co-Inventor Count = 2.1

ph-index = 2

Forward Citations = 15(Granted Patents)


Company Filing History:


Years Active: 2019-2023

Loading Chart...
11 patents (USPTO):Explore Patents

Title: Innovations of Kenneth M Dorman

Introduction

Kenneth M Dorman is a notable inventor based in West Brookfield, MA (US). He holds a total of 11 patents that showcase his contributions to technology and secure communication systems. His work has significantly impacted the field of network security and authentication.

Latest Patents

One of his latest patents is titled "Pre-generating secure channel credentials." This invention focuses on generating secure credentials, such as Diffie-Hellman (DH) key pairs, independently of requests to establish communication channels. The secure credentials are pre-generated relative to the requests for which they are utilized, allowing for efficient and secure communication between storage system ports and remote ports. Another significant patent is "Generating shared authentication keys using network connection characteristics." This technology involves generating shared authentication keys based on the connection characteristics of devices, enhancing the security of network communications.

Career Highlights

Throughout his career, Kenneth has worked with prominent companies, including EMC IP Holding Company LLC and Dell Products Inc. His experience in these organizations has contributed to his expertise in developing innovative solutions for secure communications.

Collaborations

Kenneth has collaborated with notable individuals in his field, including Venkata L R Ippatapu and Venkata Ippatapu. These collaborations have likely fostered the exchange of ideas and advancements in technology.

Conclusion

Kenneth M Dorman's contributions to the field of secure communication through his patents and collaborations highlight his role as an influential inventor. His work continues to shape the landscape of network security and authentication technologies.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…