Raleigh, NC, United States of America

Nathaniel Wook Kim


Average Co-Inventor Count = 3.7

ph-index = 8

Forward Citations = 189(Granted Patents)


Company Filing History:


Years Active: 2005-2015

Loading Chart...
11 patents (USPTO):

Title: Nathaniel Wook Kim: Innovator in Computer Security

Introduction

Nathaniel Wook Kim is a prominent inventor based in Raleigh, NC (US). He has made significant contributions to the field of computer security, holding a total of 11 patents. His innovative work focuses on methods for administering countermeasures against computer security threats and determining the entry points of attacks.

Latest Patents

Among his latest patents is a method for the administration of computer security threat countermeasures to a computer system. This patent outlines a process for establishing a baseline identification of an operating or application system type and release level that is compatible with a Threat Management Vector (TMV). The TMV includes critical information about affected operating systems and possible countermeasures. Another notable patent involves correlating network information and intrusion data to identify the entry point of an attack on a protected computer. This method utilizes intrusion detection information and network data to deduce the source of an attack, enhancing the security of devices such as computers and servers.

Career Highlights

Nathaniel has worked with several notable companies, including IBM and Lenovo (Singapore) Pte. Ltd. His experience in these organizations has contributed to his expertise in computer security and innovation.

Collaborations

Some of Nathaniel's coworkers include Ashley Anderson Brock and Charles Steven Lingafelt. Their collaboration has likely fostered a creative environment that encourages innovation in their respective fields.

Conclusion

Nathaniel Wook Kim is a distinguished inventor whose work in computer security has led to multiple patents and significant advancements in the industry. His contributions continue to shape the landscape of technology and security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…