Foster City, CA, United States of America

Leslie L Dunston

USPTO Granted Patents = 14 

 

Average Co-Inventor Count = 8.9

ph-index = 4

Forward Citations = 88(Granted Patents)


Company Filing History:


Years Active: 2017-2025

Loading Chart...
Loading Chart...
14 patents (USPTO):Explore Patents

Title: The Innovative Contributions of Leslie L. Dunston

Introduction

Leslie L. Dunston is a prominent inventor based in Foster City, California, known for her significant contributions to technology and web security. With a total of 14 patents to her name, she has made remarkable strides in developing applications that enhance user experience and security in accessing web resources.

Latest Patents

Among her latest innovations are two notable patents. The first is a "Secure application for accessing web resources," which describes systems and methods for providing a remote cloud browsing session. This apparatus allows users to request Internet content from their devices, access it from a source, and receive tailored content based on their requests. The second patent is a "Secure analysis application for accessing web resources." This invention enables users to securely and anonymously analyze web pages and their underlying source code without exposing their local machines. It offers increased flexibility in masking and modifying the user's digital persona when interacting with external websites.

Career Highlights

Leslie L. Dunston has established herself as a key player in the tech industry through her work at Authentic8, Inc. Her innovative spirit and dedication to enhancing web security have positioned her as a leader in her field.

Collaborations

Throughout her career, Leslie has collaborated with notable colleagues, including Scott M. Petry and Ramesh Rajagopal. These partnerships have further enriched her work and contributed to the development of cutting-edge technologies.

Conclusion

Leslie L. Dunston's contributions to web security and technology are invaluable. Her innovative patents and collaborative efforts continue to shape the future of secure web access.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…