Mumbai, India

Shrikant Pawar


Average Co-Inventor Count = 2.3

ph-index = 2

Forward Citations = 7(Granted Patents)


Company Filing History:


Years Active: 2019-2021

Loading Chart...
6 patents (USPTO):Explore Patents

Title: Shrikant Pawar: Innovator in Cybersecurity Technologies

Introduction

Shrikant Pawar is a notable inventor based in Mumbai, India. He has made significant contributions to the field of cybersecurity, particularly in developing systems that enhance the security of applications and devices. With a total of 6 patents to his name, his work focuses on innovative methods to detect and prevent unauthorized access and attacks.

Latest Patents

Among his latest patents, Shrikant has developed a system and method to detect and prevent auto-click attacks. This computer-implemented method involves several steps, including detecting click inputs and analyzing events associated with a user's finger to determine if the click is an auto-click. If identified as such, the system performs a security action to mitigate potential threats. Another significant patent addresses unauthorized use of applications. This method includes receiving fingerprint data from a touchscreen and comparing it to a whitelist of authorized fingerprints. If a match is not found, the system executes a security action to protect the application.

Career Highlights

Shrikant has worked with prominent companies in the cybersecurity sector, including NortonLifeLock Inc. and Symantec Corporation. His experience in these organizations has allowed him to refine his skills and contribute to the development of advanced security technologies.

Collaborations

Some of his notable coworkers include Sharad Subhash Mhaske and Arif Mohammed Shaikh. Their collaboration has likely fostered an environment of innovation and creativity in their projects.

Conclusion

Shrikant Pawar's contributions to cybersecurity through his patents and work with leading companies highlight his role as an influential inventor in the field. His innovative approaches to security challenges continue to shape the landscape of technology.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…