Seoul, South Korea

Hyungsuk Kim

USPTO Granted Patents = 1 

 

Average Co-Inventor Count = 2.0

ph-index = 1

Forward Citations = 14(Granted Patents)


Company Filing History:


Years Active: 2015

Loading Chart...
Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovations by Hyungsuk Kim in Clipboard Security

Introduction

Hyungsuk Kim is an innovative inventor based in Seoul, South Korea. He has made significant contributions to the field of data security, particularly through his work on clipboard security systems. His inventions aim to enhance the security of data transmission, which is crucial in today's digital age.

Latest Patents

Hyungsuk Kim holds a patent for a "System and method for clipboard security." This invention provides a clipboard security system and method designed to improve the security of data transmission made through a clipboard, which is frequently utilized in computer operations. The clipboard security system includes a clipboard managing unit that stores data in a clipboard or extracts data from it in response to requests from various objects. This unit features a data encrypting unit that encrypts data based on the trust relationship of the object wishing to store the data, as well as a data decrypting unit that decrypts the encrypted data according to the trust relationship of the object seeking to extract the data.

Career Highlights

Hyungsuk Kim is currently employed at Fasoo.com Co., Ltd., where he continues to develop innovative solutions in data security. His work has garnered attention for its practical applications and potential to enhance user security in digital environments.

Collaborations

One of his notable coworkers is Chel Woo Park, with whom he collaborates on various projects related to data security and innovation.

Conclusion

Hyungsuk Kim's contributions to clipboard security represent a significant advancement in protecting data transmission. His innovative approach to encryption and decryption based on trust relationships showcases the importance of security in the digital landscape.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…