Exeter, NH, United States of America

Richard B MacKinnon


Average Co-Inventor Count = 1.5

ph-index = 3

Forward Citations = 45(Granted Patents)


Location History:

  • Exeter, NH (US) (1976)
  • Waltham, MA (US) (1978)
  • Austin, TX (US) (2012 - 2013)

Company Filing History:


Years Active: 1976-2013

Loading Chart...
4 patents (USPTO):Explore Patents

Title: Innovations of Richard B MacKinnon

Introduction

Richard B MacKinnon is an accomplished inventor based in Exeter, NH (US). He has made significant contributions to the field of access control systems, holding a total of four patents. His work focuses on enhancing network security and user authentication.

Latest Patents

Among his latest patents is a system and method for providing access control. This innovative control device is designed to monitor network connections. It allows applications running on client devices to send network communications while determining whether the client device is authorized to access the network. Depending on the authorization status, different global rules may be applied. The control device processes subsequent communications through various stages, extracting information from the client device and applying user-specific rules accordingly. Another patent also addresses provisioning network access for users based on their profiles, ensuring that network resources are allocated fairly among multiple users.

Career Highlights

Richard has worked with notable companies, including Rocksteady Technologies, LLC. His experience in the industry has allowed him to develop cutting-edge technologies that improve network access and security.

Collaborations

Throughout his career, Richard has collaborated with talented individuals such as Kelly Looney and Eric R White. These partnerships have contributed to the successful development of his innovative solutions.

Conclusion

Richard B MacKinnon is a notable inventor whose work in access control systems has made a significant impact on network security. His patents reflect a commitment to enhancing user authentication and resource management in multi-user environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…