Shenzhen, China

Fang Hu


 

Average Co-Inventor Count = 1.6

ph-index = 1

Forward Citations = 3(Granted Patents)


Location History:

  • Shenzhen, CN (2015 - 2018)
  • Guangdong, CN (2024)

Company Filing History:


Years Active: 2015-2024

Loading Chart...
Loading Chart...
3 patents (USPTO):Explore Patents

Title: Innovations of Fang Hu

Introduction

Fang Hu is a notable inventor based in Shenzhen, China. He has made significant contributions to the field of technology, particularly in protocol processing and redundancy protection methods. With a total of three patents to his name, Fang Hu continues to push the boundaries of innovation.

Latest Patents

Fang Hu's latest patents include a protocol processing method and a storage medium. This method involves carrying a leaf-transfer capability identifier in an RIFT protocol, which indicates that a first node supports other leaf nodes within a network to access the network through it. Another significant patent is a method for implementing redundancy protection applied in a first router. This method includes providing a first protection group with one active interface and multiple inactive interfaces, which serve to distribute or receive multicast traffic. The method also activates the Bidirectional Forwarding Detection (BFD) protocol only at the active interface, allowing for effective interaction with a second router.

Career Highlights

Fang Hu is currently employed at ZTE Corporation, a leading telecommunications company. His work focuses on developing advanced technologies that enhance network efficiency and reliability. His innovative approaches have garnered attention in the tech community.

Collaborations

Fang Hu collaborates with talented individuals such as Xingfei Yin and Benchong Xu, contributing to a dynamic work environment that fosters creativity and innovation.

Conclusion

Fang Hu's contributions to technology through his patents and collaborative efforts highlight his role as a key innovator in the field. His work continues to influence advancements in network protocols and redundancy protection methods.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…