Pepper Pike, OH, United States of America

Peter Wirstrom


Average Co-Inventor Count = 2.0

ph-index = 2

Forward Citations = 121(Granted Patents)


Company Filing History:


Years Active: 1987

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Innovations by Peter Wirstrom in Computer Communications Security

Introduction

Peter Wirstrom is an accomplished inventor based in Pepper Pike, OH (US). He has made significant contributions to the field of computer communications security, holding a total of 2 patents. His work focuses on enhancing the security and authentication processes for users of computer networks.

Latest Patents

Wirstrom's latest patents include a "Computer Communications Security Control System" and an "Interactive Security Control System for Computer Communications." The first patent describes a system that authenticates user authorization for computer equipment, ensuring that only authorized users can access host computers. This system utilizes a security unit connected to the user's terminal, which works in conjunction with the host computer to verify user access through an encryption device. The second patent outlines a security control system that interactively identifies and authenticates users of communications terminals. It also includes features for decoding and encrypting communication signals, further enhancing the security of data transmission.

Career Highlights

Peter Wirstrom is currently associated with Pirmasafe, Inc., where he continues to innovate in the realm of computer security. His expertise in developing advanced security systems has positioned him as a key player in the industry.

Collaborations

Wirstrom collaborates with William Henry Cork, III, leveraging their combined expertise to push the boundaries of computer communications security.

Conclusion

Peter Wirstrom's contributions to computer communications security through his innovative patents demonstrate his commitment to enhancing user authentication and data protection. His work continues to influence the field and improve security measures in computer networks.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…