Potomac, MD, United States of America

Walter Mason Stewart


Average Co-Inventor Count = 2.4

ph-index = 5

Forward Citations = 839(Granted Patents)


Location History:

  • Tucson, AZ (US) (1996)
  • Potomac, MD (US) (1989 - 2014)
  • Brunswick, GA (US) (2018)

Company Filing History:


Years Active: 1989-2018

Loading Chart...
8 patents (USPTO):Explore Patents

Title: Walter Mason Stewart: Innovator in Computer Virus Protection

Introduction

Walter Mason Stewart is a notable inventor based in Potomac, MD (US). He holds a total of 8 patents, showcasing his significant contributions to technology and innovation. His work primarily focuses on enhancing computer security, particularly in the realm of virus protection.

Latest Patents

One of Stewart's latest patents involves a novel approach to computer virus protection. This invention utilizes a sacrificial server to safeguard networks from e-mail viruses. Incoming e-mail messages containing executable programs or suspicious components are forwarded to this sacrificial server. The server converts these elements into a non-executable format, such as Adobe Acrobat PDF, before sending them to the intended recipient. After the execution process is completed, the sacrificial server is rebooted and checked for any virus activity, ensuring a secure environment for users.

Career Highlights

Throughout his career, Stewart has worked with various organizations, including Intellectual Ventures I LLC. His innovative mindset and technical expertise have allowed him to develop solutions that address critical issues in computer security.

Collaborations

Stewart has collaborated with several professionals in the field, including Marcelo Carrera and Robert G Hook. These partnerships have contributed to the advancement of his projects and the successful implementation of his inventions.

Conclusion

Walter Mason Stewart's contributions to computer virus protection highlight his role as a significant inventor in the technology sector. His innovative solutions continue to influence the way we approach network security today.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…