San Jose, CA, United States of America

Chang Li

USPTO Granted Patents = 7 


Average Co-Inventor Count = 3.1

ph-index = 2

Forward Citations = 29(Granted Patents)


Company Filing History:


Years Active: 2017-2023

Loading Chart...
Loading Chart...
7 patents (USPTO):Explore Patents

Title: Innovations by Chang Li in Security Enforcement

Introduction

Chang Li is a prominent inventor based in San Jose, CA, known for his significant contributions to security enforcement in service provider networks. With a total of seven patents to his name, he has developed innovative techniques that enhance the security of mobile and IoT devices.

Latest Patents

One of Chang Li's latest patents focuses on mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks. This invention outlines a system that monitors network traffic to identify device identifiers for new sessions. It also determines application identifiers for user traffic and establishes security policies based on these identifiers. Another notable patent addresses location-based security in service provider networks. This invention includes a system that monitors network traffic to identify a location for new sessions and applies security policies based on the identified location.

Career Highlights

Chang Li is currently employed at Palo Alto Networks, Inc., where he continues to innovate in the field of network security. His work has been instrumental in developing advanced security measures that protect users and devices in increasingly complex network environments.

Collaborations

Chang has collaborated with notable colleagues such as Sachin Verma and Leonid Burakovsky, contributing to a dynamic and innovative work environment.

Conclusion

Chang Li's contributions to security enforcement in service provider networks demonstrate his commitment to enhancing the safety and integrity of mobile and IoT technologies. His innovative patents reflect a deep understanding of the challenges in network security and provide effective solutions to address them.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…