East Brunswick, NJ, United States of America

Hong-Hsi Lo


Average Co-Inventor Count = 2.0

ph-index = 1


Company Filing History:


Years Active: 2010-2016

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Innovations of Hong-Hsi Lo

Introduction

Hong-Hsi Lo is an accomplished inventor based in East Brunswick, NJ (US). He holds 2 patents that showcase his expertise in security administration technologies. His work has significantly contributed to the field of transactional security systems.

Latest Patents

Hong-Hsi Lo's latest patents include a "System and method for supporting security administration" and a "System and method for single security administration." The first patent describes a transactional server configured to receive a transactional procedure call from a client to initiate transaction processes. This server includes a Lightweight Directory Access Protocol (LDAP) authentication server that forwards the call to a distributed authentication server for user authentication. The process involves identifying the user, initiating an LDAP session, and creating a token based on the authentication result. The second patent outlines a method for providing single security administration, allowing a client to access a default security plugin and issuing calls to an LDAP authentication server to return corresponding user information and provide an authentication token.

Career Highlights

Throughout his career, Hong-Hsi Lo has worked with notable companies such as Oracle International Corporation and BEA Systems, Inc. His experience in these organizations has allowed him to develop innovative solutions in the realm of security administration.

Collaborations

One of his notable collaborators is Rich T Lee, with whom he has worked on various projects in the field of security technologies.

Conclusion

Hong-Hsi Lo's contributions to security administration through his patents and career experiences highlight his role as a significant innovator in the field. His work continues to influence the development of secure transactional systems.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…