Everett, WA, United States of America

William J Heaton

USPTO Granted Patents = 4 

Average Co-Inventor Count = 5.1

ph-index = 3

Forward Citations = 57(Granted Patents)


Company Filing History:


Years Active: 2000-2013

Loading Chart...
4 patents (USPTO):Explore Patents

Title: Innovations of William J Heaton

Introduction

William J Heaton is a notable inventor based in Everett, WA (US). He holds a total of four patents, showcasing his contributions to the field of technology and data security. His work primarily focuses on enhancing the security of data during input and output processes in client computer systems.

Latest Patents

One of his latest patents is a method and system for maintaining secure data input and output. This innovation aims to prevent unauthorized code from accessing, intercepting, or modifying data. The patent describes various obfuscation techniques and security-enhanced drivers that work together to prohibit unauthorized viewing or receiving of valid data. When unauthorized recipients attempt to access the data, they receive obfuscated information instead. The obfuscation techniques include "copy-in," "replace and restore," and "in-place replacement" methods. Additionally, the patent outlines the use of security-enhanced drivers for display, mouse, keyboard, and audio functions, along with a watchdog mechanism to ensure proper driver functionality.

Career Highlights

Throughout his career, William J Heaton has worked with several prominent companies, including Xsides Corporation and Microsoft Technology Licensing, LLC. His experience in these organizations has contributed to his expertise in data security and technology innovation.

Collaborations

Some of his notable coworkers include John A Painter and D David Nason. Their collaboration has likely played a role in the development of innovative solutions in their respective fields.

Conclusion

William J Heaton's contributions to data security through his patents reflect his commitment to innovation and technology. His work continues to influence the way data is protected in computer systems today.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…