Company Filing History:
Years Active: 2016-2019
Title: William H. Blake: Innovator in Continuous User Authentication
Introduction
William H. Blake, an inventive mind located in Colorado Springs, CO, has made significant contributions to the field of user authentication. With two patents under his name, his work is particularly noteworthy for its focus on enhancing security in mobile device communications.
Latest Patents
Blake's most recent patent describes a continuous user authentication tool specifically designed for mobile device communications. This invention continuously authenticates the user during an electronic communication session, employing a trusted user profile that includes measurements of keypad pressure applied by the recognized user on a virtual keypad displayed on the device's touchscreen. The system continuously monitors the current user's keypad pressure, comparing it to the trusted user profile. Based on this comparison, a confidence score is generated to indicate the likelihood that the current user is indeed the trusted user. If the confidence score falls below a predefined minimum threshold, the device automatically re-authenticates the user, thereby enhancing security.
Career Highlights
William H. Blake is associated with the International Business Machines Corporation, commonly known as IBM. His role as an innovator within such a distinguished organization showcases his commitment to improving technology and user experience.
Collaborations
In his professional journey, Blake has collaborated with notable coworkers including Gregory J. Boss and Rhonda L. Childress. Their combined efforts contribute to advancements in technology and the development of groundbreaking inventions, particularly in the cybersecurity domain.
Conclusion
William H. Blake's innovative work in user authentication marks a significant step forward in securing mobile communications. His patents highlight the importance of continuous monitoring and user verification, ensuring that technology adapts to the evolving security landscape. As the reliance on mobile devices grows, his contributions will undoubtedly play a critical role in protecting user information and enhancing device security.