Hangzhou, China

Hongliang Tian

USPTO Granted Patents = 5 

Average Co-Inventor Count = 6.0

ph-index = 2

Forward Citations = 13(Granted Patents)


Company Filing History:


Years Active: 2020-2022

Loading Chart...
5 patents (USPTO):Explore Patents

Title: Innovations of Hongliang Tian

Introduction

Hongliang Tian is a prominent inventor based in Hangzhou, China. He has made significant contributions to the field of secure computing, holding a total of 5 patents. His work focuses on enhancing the security and efficiency of computing systems through innovative methods and apparatus.

Latest Patents

One of his latest patents is titled "Method and apparatus for performing multi-party secure computing based-on issuing certificate." This patent discloses methods, systems, and apparatus for providing certifications. The method involves receiving a certificate request from a computing unit, authenticating the unit based on authentication information, and sending a certificate report to the computing unit. Another notable patent is "Providing high availability computing service by issuing a certificate." This patent relates to providing high availability computing services in a distributed system, where a computing unit sends a certificate request to a trusted certificate generator and receives a certificate report that includes a public key certificate and a private key.

Career Highlights

Hongliang Tian has worked with notable companies such as Advanced New Technologies Co., Ltd. and Alibaba Group Holding Limited. His experience in these organizations has allowed him to develop and refine his innovative ideas in secure computing.

Collaborations

He has collaborated with talented individuals in the field, including Chaofan Yu and Lei Wang. Their joint efforts have contributed to the advancement of secure computing technologies.

Conclusion

Hongliang Tian's contributions to secure computing through his patents and collaborations highlight his role as an influential inventor in the technology sector. His innovative methods continue to shape the future of computing security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…