Palo Alto, CA, United States of America

Hong Xu


Average Co-Inventor Count = 7.0

ph-index = 3

Forward Citations = 79(Granted Patents)


Company Filing History:


Years Active: 2007-2010

Loading Chart...
3 patents (USPTO):Explore Patents

Title: Innovations of Inventor Hong Xu

Introduction

Hong Xu is a notable inventor based in Palo Alto, CA (US). He has made significant contributions to the field of technology, particularly in identity management and network security. With a total of 3 patents, his work has had a considerable impact on how identity assertion information is handled across networks.

Latest Patents

Hong Xu's latest patents include a method and system for transferring identity assertion information between trusted partner sites in a network using artifacts. This method involves managing access to multiple applications through a central server. It includes steps such as receiving a user name and password, generating identity assertion information, and verifying the validity of artifacts to authorize user access. Another significant patent is a method and system for providing a circle of trust on a network. This innovation allows for the establishment of a circle of trust by exchanging credentials between affiliated entities, ensuring secure access to resources on a relying party device.

Career Highlights

Throughout his career, Hong Xu has worked with prominent companies such as Oracle America, Inc. and Sun Microsystems, Inc. His experience in these organizations has contributed to his expertise in developing innovative solutions in the tech industry.

Collaborations

Hong Xu has collaborated with notable professionals in his field, including Wei Sun and Aravindan Ranganathan. These collaborations have further enriched his work and expanded the scope of his inventions.

Conclusion

In summary, Hong Xu is a distinguished inventor whose work in identity management and network security has led to valuable innovations. His patents reflect a deep understanding of technology and its applications in securing user identities across networks.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…