Seoul, South Korea

Jong Hwan Im

USPTO Granted Patents = 1 

Average Co-Inventor Count = 3.0

ph-index = 1


Company Filing History:


Years Active: 2022

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Jong Hwan Im: Innovator in Web Application Security

Introduction

Jong Hwan Im is a notable inventor based in Seoul, South Korea. He has made significant contributions to the field of web application security through his innovative patent. His work focuses on enhancing the capabilities of dynamic analyzers, which are essential for identifying security vulnerabilities in web applications.

Latest Patents

Jong Hwan Im holds a patent for a "Method and apparatus for generating attack string." This invention discloses an operation method for a dynamic analyzer that analyzes the execution state of a web application. The method involves analyzing the execution state based on a final attack string that includes a parameter indicating a specific operation to be executed through the web application. The final attack string is designed to bypass filtering logic that typically screens raw attack strings containing predefined parameters. This innovation allows for the detection of security vulnerabilities that existing dynamic analyzers may overlook.

Career Highlights

Jong Hwan Im is associated with Sparrow Co., Ltd., where he applies his expertise in web application security. His work at the company emphasizes the importance of developing tools that can effectively identify and mitigate security risks in web applications.

Collaborations

Some of his coworkers include Min Sik Jin and Jong Won Yoon, who contribute to the collaborative environment at Sparrow Co., Ltd. Their combined efforts enhance the company's ability to innovate in the field of web security.

Conclusion

Jong Hwan Im's contributions to web application security through his patent demonstrate his commitment to advancing technology in this critical area. His innovative approach to generating attack strings is a significant step forward in identifying vulnerabilities that could compromise web applications.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…