Millbrae, CA, United States of America

Cahya Adiansyah Masputra


Average Co-Inventor Count = 2.7

ph-index = 3

Forward Citations = 43(Granted Patents)


Location History:

  • Millbrae, CA (US) (2009 - 2010)
  • Menlo Park, CA (US) (2010)

Company Filing History:


Years Active: 2009-2010

Loading Chart...
5 patents (USPTO):Explore Patents

Title: Cahya Adiansyah Masputra: Innovator in Network Technology

Introduction

Cahya Adiansyah Masputra is a notable inventor based in Millbrae, CA (US). He has made significant contributions to the field of network technology, holding a total of 5 patents. His work focuses on improving data transfer methods and enhancing network security.

Latest Patents

Masputra's latest patents include a "Method and system for an efficient transport loopback mechanism for TCP/IP sockets." This invention outlines a method for data transfer using a TCP loopback connection, which involves establishing a TCP connection between two endpoints and determining the feasibility of fusing them for efficient data serialization. Another significant patent is "Router based defense against denial of service attacks using dynamic feedback from attacked host." This patent describes an edge device that utilizes dynamic feedback to manage packet queues and enhance network security against denial of service attacks.

Career Highlights

Throughout his career, Masputra has worked with prominent companies such as Oracle America, Inc. and Sun Microsystems, Inc. His experience in these organizations has allowed him to develop innovative solutions that address complex networking challenges.

Collaborations

Masputra has collaborated with talented individuals in the industry, including Sunay Tripathi and Ashish Kishorchandra Mehta. These collaborations have contributed to the advancement of his projects and innovations.

Conclusion

Cahya Adiansyah Masputra is a distinguished inventor whose work in network technology has led to valuable patents and advancements in the field. His contributions continue to influence the way data is transferred and secured across networks.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…