Xi'an, China

Fangzhan Li


 

Average Co-Inventor Count = 3.0

ph-index = 1


Company Filing History:


Years Active: 2021-2023

Loading Chart...
Loading Chart...
2 patents (USPTO):Explore Patents

Title: Fangzhan Li: Innovator in Data Security Technologies

Introduction

Fangzhan Li is a prominent inventor based in Xi'an, China. He has made significant contributions to the field of data security technologies, holding 2 patents that showcase his innovative approach to solving complex problems in this domain.

Latest Patents

Fangzhan Li's latest patents include a "Method and apparatus for determining trust status of TPM" and a "Secret information distribution method and device." The first patent pertains to a method and apparatus for determining the trust status of a Trusted Platform Module (TPM). In this invention, a verifier sends an unsealing request to a host, allowing the host to unseal current Platform Configuration Register (PCR) values in the TPM. This process enables any verifier that establishes an encrypted channel with the host to determine the trust status of the TPM without the need for a pre-deployed remote attestation server. The second patent describes a secret information distribution method that involves creating a virtual trusted platform module (vTPM) within a network functions virtualization infrastructure (NFVI) and writing secret information into the vTPM for secure access by virtualized network functions.

Career Highlights

Fangzhan Li is currently employed at Huawei Technologies Co., Limited, where he continues to develop innovative solutions in data security. His work has positioned him as a key figure in the advancement of secure computing technologies.

Collaborations

Fangzhan Li has collaborated with notable colleagues, including Fanglong Men and Honglei Wang, contributing to a dynamic and innovative work environment.

Conclusion

Fangzhan Li's contributions to data security technologies through his patents reflect his commitment to innovation and excellence in the field. His work continues to influence the landscape of secure computing, making significant strides in ensuring data integrity and trustworthiness.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…