Company Filing History:
Years Active: 2003-2017
Title: The Innovative Contributions of Timothy C. Goeke
Introduction
Timothy C. Goeke is a notable inventor based in Elkhorn, Nebraska, who has made significant contributions to the field of computer security and resource management. With a total of eight patents to his name, Goeke has developed innovative methods that enhance the protection and tracking of computer resources.
Latest Patents
Among his latest patents is a method for managing access to protected computer resources. This system is designed to secure and track the usage of transaction services or computer resources by a client computer from a first server computer. It includes a clearinghouse for storing identity data of both the first server computer and the client computer(s). The system also features server and client software that forwards identity data at the beginning of an operating session. Additionally, a hardware key connected to the client computer generates a digital identification as part of the identity data. This hardware key can be implemented using various access systems, including hardware token access, magnetic card access, smart card access, biometric identification, or a central processing unit with a unique embedded digital identification.
Career Highlights
Timothy Goeke has worked with several companies throughout his career, including Prism Technologies LLC and Prism Technologies, L.L.C. His experience in these organizations has allowed him to refine his skills and contribute to the development of advanced technological solutions.
Collaborations
Goeke has collaborated with notable professionals in his field, including Richard L. Gregg and Sandeep Giri. These partnerships have likely played a role in the successful development and implementation of his innovative ideas.
Conclusion
Timothy C. Goeke's work in computer resource management and security has established him as a significant figure in the field of technology. His patents reflect a commitment to innovation and the advancement of secure computing practices.