Miyapur, India

Ashisa Kumar Nayak


Average Co-Inventor Count = 6.0

ph-index = 1


Company Filing History:


Years Active: 2025

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Ashisa Kumar Nayak: Innovator in Content Security

Introduction

Ashisa Kumar Nayak is a notable inventor based in Miyapur, India. He has made significant contributions to the field of content security through his innovative patent. His work focuses on enhancing the security of encrypted files, ensuring that sensitive information is protected effectively.

Latest Patents

Ashisa Kumar Nayak holds a patent titled "Hierarchical based decryption for improved content security." This invention relates to a computing platform that can encrypt and decrypt files based on user hierarchies. The process begins when a first user requests to encrypt a file, leading to the generation of a symmetric key. The file is then encrypted using this key. When a second user requests to decrypt the file, the platform identifies the classification of the encrypted file, which can be personal, proprietary, or company-related. If the file is classified as proprietary, the platform checks the employee hierarchy of the first user. If the second user is found within this hierarchy, the encrypted file is decrypted, granting access to the second user.

Career Highlights

Ashisa Kumar Nayak is currently employed at Bank of America Corporation, where he applies his expertise in content security. His innovative approach to encryption and decryption processes has positioned him as a valuable asset in the field of information security.

Collaborations

Some of his notable coworkers include Praveen Chakravarthy Yedluri and Vittal Surya Narayana Goli. Their collaboration contributes to the advancement of technology and security measures within their organization.

Conclusion

Ashisa Kumar Nayak's contributions to content security through his patent demonstrate his commitment to innovation in the field. His work not only enhances security measures but also sets a precedent for future developments in encryption technology.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…