San Diego, CA, United States of America

Paul Elbridge Catinella

USPTO Granted Patents = 12 

Average Co-Inventor Count = 4.2

ph-index = 8

Forward Citations = 189(Granted Patents)


Location History:

  • Potter Valley, CA (US) (2014)
  • San Diego, CA (US) (2012 - 2018)

Company Filing History:


Years Active: 2012-2018

Loading Chart...
12 patents (USPTO):Explore Patents

Title: Paul Elbridge Catinella: Innovator in Secure Transaction Technologies

Introduction

Paul Elbridge Catinella is a notable inventor based in San Diego, CA. He has made significant contributions to the field of secure transaction technologies, holding a total of 12 patents. His work focuses on enhancing the security and efficiency of transactional devices and methods.

Latest Patents

Catinella's latest patents include a "System and method for variable length encryption" and a "System and method for updating a transactional device." The variable length encryption patent outlines a method that involves reading data on a command token, encrypting the token data with a key, and transmitting the encrypted data to a remote device. The updating transactional device patent describes a method for reading data on a command token, generating transaction data based on the token, and executing commands remotely.

Career Highlights

Throughout his career, Catinella has worked with prominent companies such as Verifone GmbH and Iwallet Corporation. His experience in these organizations has allowed him to develop innovative solutions that address the complexities of secure transactions.

Collaborations

Catinella has collaborated with notable individuals in the industry, including Clay Von Mueller and Scott Raymond Yale. These partnerships have contributed to the advancement of his projects and the successful implementation of his inventions.

Conclusion

Paul Elbridge Catinella is a distinguished inventor whose work in secure transaction technologies has made a lasting impact. His innovative patents and collaborations reflect his commitment to enhancing security in transactional processes.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…