Livingston, NJ, United States of America

Feng Luo


Average Co-Inventor Count = 8.9

ph-index = 1


Company Filing History:


Years Active: 2022-2025

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Innovator Spotlight: Feng Luo

Introduction

Feng Luo, an inventive mind located in Livingston, NJ, has made significant contributions to the field of technology with his groundbreaking patents. As an employee at Verizon Patent and Licensing Inc., he focuses on pioneering advancements that enhance security in computing devices.

Latest Patents

Feng Luo holds two notable patents that showcase his expertise in encryption and user authentication. The first patent, titled "Systems and methods for device grouping based on quantum resistant encryption capability," details a system utilizing a non-quantum-resistant device alongside a quantum capable proxy server. This system encrypts data with a quantum resistant protocol, ensuring secure communication between devices.

The second patent, "Systems and methods for validating a device and authenticating a user," outlines a method where devices verify user authentication. The device gathers information about the user device and generates responses to facilitate secure communication sessions based on validated access.

Career Highlights

Feng's work at Verizon Patent and Licensing Inc. positions him at the forefront of innovative technology. His focus on quantum resistance and user authentication reflects the evolving demands for secure systems in the digital era.

Collaborations

Feng collaborates with notable colleagues including Dayong He and Young Rak Choi, contributing to a dynamic team that is committed to innovation and research in technology. Their collective expertise fosters an environment ripe for creating impactful solutions in the tech industry.

Conclusion

With two patents that pave the way for advancements in secure communication and user validation, Feng Luo exemplifies the spirit of innovation at Verizon Patent and Licensing Inc. His contributions underscore the importance of security in technology, as he continues to push the boundaries of what is possible in the rapidly evolving landscape of computing.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…