Acton, MA, United States of America

Jing Xiang

USPTO Granted Patents = 5 

Average Co-Inventor Count = 1.8

ph-index = 3

Forward Citations = 197(Granted Patents)


Company Filing History:


Years Active: 2009-2016

Loading Chart...
5 patents (USPTO):Explore Patents

Title: Innovations by Jing Xiang

Introduction

Jing Xiang is an accomplished inventor based in Acton, MA (US). He holds a total of 5 patents that showcase his expertise in network security and data flow management. His innovative techniques have contributed significantly to the field of secure network connections.

Latest Patents

One of Jing Xiang's latest patents is a technique for maintaining secure network connections. This method involves detecting a change of address associated with a first network element and updating the security configurations accordingly. It also includes transmitting secure messages to ensure that the second network element is informed of the changes. Another notable patent is a method for maintaining differentiated services data flow at a network device implementing redundant packet discard security techniques. This method improves the handling of Differentiated Services (Diffserv) traffic by assigning different look-back window counts to various service levels, thereby enhancing the efficiency of network traffic management.

Career Highlights

Throughout his career, Jing Xiang has worked with prominent companies such as Nortel Networks Corporation and Rockstar Bidco, LP. His experience in these organizations has allowed him to develop and refine his innovative techniques in network security.

Collaborations

Jing has collaborated with talented individuals in the field, including Shreedhar Shirgurkar and Vladimir Senkov. These partnerships have fostered a creative environment that has led to significant advancements in their respective areas of expertise.

Conclusion

Jing Xiang's contributions to network security through his patents and collaborations highlight his role as a leading inventor in the field. His innovative methods continue to influence the way secure network connections are maintained and managed.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…