Beijing, China

Fushui Yu


Average Co-Inventor Count = 4.0

ph-index = 1


Company Filing History:


Years Active: 2018

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Fushui Yu - Innovator in Biological Feature Authentication

Introduction

Fushui Yu is a prominent inventor based in Beijing, China. He has made significant contributions to the field of user authentication through innovative methods that enhance security. His work focuses on utilizing biological features for authentication processes, which is increasingly relevant in today's digital landscape.

Latest Patents

Fushui Yu holds a patent for a "User biological feature authentication method and system." This patent outlines a comprehensive method where a client sends an authentication request to a server. The client then receives a speech password and acquires both speech information and a face image of the user to be authenticated. The system judges the validity of the speech information against the speech password and assesses the face image's authenticity. If both judgments are positive, the client associates the speech information with the face image and calculates a digest value. This innovative approach significantly improves ID authentication security in biological feature recognition processes. He has 1 patent to his name.

Career Highlights

Fushui Yu is currently employed at Beijing Techshino Technology Co., Ltd. His role involves developing advanced authentication systems that leverage biological features. His expertise in this area has positioned him as a key player in enhancing security measures for user identification.

Collaborations

Fushui Yu collaborates with talented individuals such as Chunlin Yang and Jun Zhou. Their combined efforts contribute to the advancement of technology in the field of biological feature authentication.

Conclusion

Fushui Yu's innovative work in user biological feature authentication represents a significant advancement in security technology. His contributions are vital in addressing the growing need for secure identification methods in an increasingly digital world.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…