Chandler, AZ, United States of America

Prital B Shah

USPTO Granted Patents = 2 

 

Average Co-Inventor Count = 6.2

ph-index = 1

Forward Citations = 5(Granted Patents)


Company Filing History:


Years Active: 2017-2019

Loading Chart...
Loading Chart...
2 patents (USPTO):Explore Patents

Title: Innovations by Prital B Shah

Introduction

Prital B Shah is an accomplished inventor based in Chandler, AZ. He has made significant contributions to the field of user authentication technologies. With a total of 2 patents to his name, Shah is recognized for his innovative approaches to enhancing security in mobile computing devices.

Latest Patents

Shah's latest patents include "Technologies for depth-based user authentication" and "Multiple user biometric for authentication to secured resources." The first patent involves a mobile computing device that displays a login image with a depth channel. This technology allows the device to determine user selections from various objects in the image, generating a user-selected password based on the relative depth of those objects. Access is granted when the user-selected password matches the device's login password. The second patent focuses on a system for multiple person biometric authentication. It describes an apparatus that receives multiple biometric measurements and generates a combined biometric indicator using fuzzy hashing techniques.

Career Highlights

Prital B Shah is currently employed at Intel Corporation, where he continues to develop innovative technologies. His work at Intel has positioned him as a key player in advancing security measures in mobile devices.

Collaborations

Shah collaborates with talented individuals such as Jim Santiago Baca and Tobias Max Kohlenberg. Their combined expertise contributes to the development of cutting-edge technologies in the field of user authentication.

Conclusion

Prital B Shah's contributions to user authentication technologies demonstrate his commitment to innovation and security. His patents reflect a forward-thinking approach that enhances the safety of mobile computing devices.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…