Burnaby, Canada

Dayong Zhou

USPTO Granted Patents = 2 

Average Co-Inventor Count = 3.0

ph-index = 1

Forward Citations = 4(Granted Patents)


Company Filing History:


Years Active: 2017-2018

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Innovations by Dayong Zhou

Introduction

Dayong Zhou is a notable inventor based in Burnaby, Canada. He has made significant contributions to the field of network security, particularly in the area of attack context data logging. With a total of two patents to his name, Zhou's work is recognized for its innovative approaches to enhancing cybersecurity measures.

Latest Patents

Zhou's latest patents focus on methods and systems for improved attack context data logging. One embodiment of his invention involves a network security device that determines whether a received packet is potentially associated with a threat. If the packet is deemed non-threatening, it is stored in a circular buffer. However, if a threat is identified, a logging event is triggered, capturing pre-attack context information from the circular buffer. This information is then stored in a log for further analysis. Additionally, his patents include configurations that allow administrators to set parameters for post-attack analysis, ensuring that relevant contextual information is captured and logged effectively.

Career Highlights

Zhou is currently employed at Fortinet, Inc., a leading company in cybersecurity solutions. His role involves developing advanced technologies that protect networks from various threats. His expertise in network security has positioned him as a valuable asset to his team and the industry.

Collaborations

Zhou has collaborated with several talented individuals in his field, including Wei Wang and Ihab Khalil. These collaborations have fostered an environment of innovation and have contributed to the success of their projects.

Conclusion

Dayong Zhou's contributions to network security through his patents and work at Fortinet, Inc. highlight his commitment to advancing technology in this critical area. His innovative methods for logging attack context data are paving the way for improved cybersecurity practices.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…