Fort Collins, CO, United States of America

William H Lutton

USPTO Granted Patents = 15 

Average Co-Inventor Count = 6.0

ph-index = 9

Forward Citations = 337(Granted Patents)


Company Filing History:


Years Active: 2010-2017

Loading Chart...
15 patents (USPTO):Explore Patents

Title: The Innovations of William H. Lutton

Introduction

William H. Lutton is a notable inventor based in Fort Collins, CO (US). He has made significant contributions to the field of computer security, holding a total of 15 patents. His work focuses on developing systems and methods that enhance the security and authorization of computer program code.

Latest Patents

One of Lutton's latest patents is titled "Secure system for allowing the execution of authorized computer program code." This patent describes systems and methods for selective authorization of code modules. In one embodiment, a kernel mode driver monitors events occurring within a file system or an operating system. When a trigger event is observed, the system performs or bypasses a real-time authentication process on the second code module, utilizing a multi-level whitelist database architecture. This innovative approach allows the active process to load the second code module into memory based on the results of the authentication process.

Career Highlights

Throughout his career, Lutton has worked with several prominent companies, including Fortinet, Inc. and Whitecell Software, Inc. His experience in these organizations has contributed to his expertise in developing advanced security solutions for computer systems.

Collaborations

Lutton has collaborated with notable individuals in the field, including Andrew F. Fanton and John J. Gandee. These partnerships have likely enriched his work and led to further innovations in computer security.

Conclusion

William H. Lutton's contributions to the field of computer security through his patents and collaborations highlight his role as a significant inventor. His innovative approaches continue to shape the landscape of authorized code execution and system security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…