Ludwigsburg, Germany

Jamshid Shokrollahi

USPTO Granted Patents = 10 

 

Average Co-Inventor Count = 3.2

ph-index = 3

Forward Citations = 31(Granted Patents)


Location History:

  • Stuttgart, DE (2014)
  • Karlsruhe, DE (2014)
  • Ludwigsburg, DE (2014 - 2019)

Company Filing History:


Years Active: 2014-2019

where 'Filed Patents' based on already Granted Patents

10 patents (USPTO):

Title: Jamshid Shokrollahi: Innovator in Cryptographic Methods

Introduction

Jamshid Shokrollahi is a prominent inventor based in Ludwigsburg, Germany. He has made significant contributions to the field of cryptography, holding a total of 10 patents. His work focuses on enhancing security measures in communication systems through innovative methods and devices.

Latest Patents

Shokrollahi's latest patents include a "Method for Manipulation Protection" and a "Reduction of Memory Requirement for Cryptographic Keys." The first patent describes a method and device for manipulation protection, which involves receiving a data packet from a device, signing it with a private key, and generating a second data packet for secure transmission. The second patent addresses the communication of a participant with multiple others using different certificate formats, ensuring that a shared public key is utilized effectively while managing private keys.

Career Highlights

Throughout his career, Shokrollahi has worked with notable companies such as Robert Bosch GmbH and Denso Corporation. His experience in these organizations has allowed him to develop and refine his innovative ideas in cryptography and secure communications.

Collaborations

Shokrollahi has collaborated with esteemed colleagues, including Robert Szerwinski and Matthew Lewis. Their joint efforts have contributed to advancements in the field of cryptographic technologies.

Conclusion

Jamshid Shokrollahi's work in cryptography exemplifies the importance of innovation in enhancing security measures in communication systems. His patents reflect a commitment to developing effective solutions for manipulation protection and memory efficiency in cryptographic processes.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…