Clifton, NJ, United States of America

Hany Samir Atiya


Average Co-Inventor Count = 4.8

ph-index = 2

Forward Citations = 7(Granted Patents)


Company Filing History:


Years Active: 2020-2024

Loading Chart...
5 patents (USPTO):Explore Patents

Title: Hany Samir Atiya: Innovator in Secure Application Authentication and Resource Scheduling

Introduction

Hany Samir Atiya is a notable inventor based in Clifton, NJ (US). He has made significant contributions to the fields of secure application authentication and resource scheduling in multi-access edge computing. With a total of 5 patents to his name, Hany continues to push the boundaries of technology.

Latest Patents

Hany's latest patents include innovative methods and devices for secure application authentication using a one-way encrypted authentication token. This invention allows a client application component of a device to request an authentication token from an authentication component, which generates a one-way encrypted token based on a server token and security information. The client application can then use this token to authenticate itself with a server.

Another significant patent is the method and system for scheduling multi-access edge computing resources. This invention provides an intelligent MEC resource scheduling service that monitors resource usage in a MEC cluster and redirects resource usage to another cluster when overload conditions are detected. This ensures efficient resource management in network environments.

Career Highlights

Hany Samir Atiya is currently employed at Verizon Patent and Licensing Inc., where he applies his expertise in developing cutting-edge technologies. His work has been instrumental in enhancing security protocols and optimizing resource allocation in computing networks.

Collaborations

Hany has collaborated with talented individuals such as Jyotsna Kachroo and Dayong He, contributing to a dynamic work environment that fosters innovation and creativity.

Conclusion

Hany Samir Atiya stands out as an influential inventor whose work in secure application authentication and resource scheduling has made a significant impact in the technology sector. His contributions continue to shape the future of secure computing and resource management.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…