Taipei, Taiwan

Fay Li


Average Co-Inventor Count = 4.0

ph-index = 1

Forward Citations = 5(Granted Patents)


Company Filing History:


Years Active: 2014

Loading Chart...
1 patent (USPTO):Explore Patents

Title: The Innovative Contributions of Fay Li

Introduction

Fay Li is a prominent inventor based in Taipei, Taiwan. She has made significant contributions to the field of computing, particularly in the area of power management for devices. Her innovative approach has led to the development of a unique patent that addresses critical issues in device power policy enforcement.

Latest Patents

Fay Li holds a patent titled "Enforcing and complying with a computing device power policy." This invention describes a computing device that is configured to enforce a power policy effectively. The device includes a processor and executable instructions stored in memory, which are in electronic communication with the processor. It generates a power policy, sends it, and can respond to suspicious process alerts. The device is capable of determining whether to terminate a suspicious process and can send a process termination command if necessary. This patent showcases her expertise in enhancing the security and efficiency of computing devices.

Career Highlights

Fay Li is currently employed at Crimson Corporation, where she continues to innovate and develop new technologies. Her work has been instrumental in advancing the company's capabilities in the tech industry. With her strong background in computing and power management, she has established herself as a valuable asset to her team.

Collaborations

Fay collaborates with talented coworkers, including Jojo Wu and Marco Wu. Together, they work on various projects that aim to push the boundaries of technology and improve device functionality.

Conclusion

Fay Li's contributions to the field of computing through her innovative patent and her role at Crimson Corporation highlight her importance as an inventor. Her work not only enhances device performance but also addresses critical security concerns in technology.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…