Beijing, China

Howard Liu


Average Co-Inventor Count = 4.0

ph-index = 1

Forward Citations = 1(Granted Patents)


Company Filing History:


Years Active: 2019

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Howard Liu - Innovator in Data Protection Technologies

Introduction

Howard Liu is a prominent inventor based in Beijing, China. He has made significant contributions to the field of data protection through his innovative patent. Liu's work focuses on enhancing the security of stored data, which is increasingly vital in today's digital landscape.

Latest Patents

Howard Liu holds a patent for a "System for context-based data protection." This invention encompasses methods, systems, and computer program products designed to protect stored data effectively. The patent introduces a user interface module that allows for the association of a data sensitivity level, a data protection response, and a contextual trigger with the data stored in a computing device. The user interface is configured to enable the selection of various data protection responses, including soft delete and hard delete options. Additionally, a contextual trigger monitor is implemented to detect occurrences of the contextual trigger, while a data protection enactor is responsible for executing the appropriate data protection response when the trigger is activated.

Career Highlights

Howard Liu is currently employed at Microsoft Technology Licensing, LLC, where he continues to develop innovative solutions in data protection. His expertise and dedication to advancing technology have positioned him as a valuable asset within the company.

Collaborations

Liu collaborates with talented individuals such as Jerry Huang and Zhen Liu, contributing to a dynamic work environment that fosters innovation and creativity.

Conclusion

In summary, Howard Liu is a distinguished inventor whose work in data protection technologies is paving the way for enhanced security measures in the digital realm. His contributions are essential in addressing the challenges of data sensitivity and protection in modern computing.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…