Basking Ridge, NJ, United States of America

C Jason Chiang


Average Co-Inventor Count = 6.0

ph-index = 1

Forward Citations = 3(Granted Patents)


Company Filing History:


Years Active: 2017

Loading Chart...
1 patent (USPTO):Explore Patents

Title: C Jason Chiang: Innovator in Cloud Computing Security

Introduction

C Jason Chiang is a notable inventor based in Basking Ridge, NJ (US). He has made significant contributions to the field of cloud computing security, particularly in mitigating vulnerabilities associated with time-of-check to time-of-use (TOC/TOU) attacks. His innovative approach has led to the development of a patented system that enhances the security of cloud environments.

Latest Patents

C Jason Chiang holds a patent for a "System and Method for Mitigating TOC/TOU Attacks in a Cloud Computing Environment." This invention encompasses a computer system, method, and computer program product designed to address TOCTOU attacks. The system involves a processor that requests measurements representing the operation of a first process on an untrusted host. Based on this request, the system obtains measurements, including a checksum generated by a second process executing checksum code to verify at least one last branch record on the host. Furthermore, the processor determines whether the first process has been compromised based on the obtained measurements.

Career Highlights

C Jason Chiang is currently employed at Vencore Labs, Inc., where he continues to work on innovative solutions in the realm of cloud computing. His expertise in security measures has positioned him as a valuable asset to his organization.

Collaborations

C Jason Chiang collaborates with talented professionals in his field, including Angelo Sapello and Abhrajit Ghosh. These collaborations foster an environment of innovation and creativity, contributing to advancements in technology.

Conclusion

C Jason Chiang's contributions to cloud computing security through his patented invention demonstrate his commitment to enhancing technology safety. His work not only addresses critical vulnerabilities but also sets a foundation for future innovations in the field.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…