Hangzhou, China

Junxian Xiao

USPTO Granted Patents = 5 

Average Co-Inventor Count = 6.0

ph-index = 2

Forward Citations = 13(Granted Patents)


Company Filing History:


Years Active: 2020-2022

Loading Chart...
5 patents (USPTO):

Title: Junxian Xiao: Innovator in Secure Computing

Introduction

Junxian Xiao is a prominent inventor based in Hangzhou, China. He has made significant contributions to the field of secure computing, holding a total of 5 patents. His work focuses on enhancing the security and efficiency of computing systems through innovative methods and technologies.

Latest Patents

One of Junxian Xiao's latest patents is titled "Method and apparatus for performing multi-party secure computing based-on issuing certificate." This patent discloses methods, systems, and apparatus for providing certifications. The method involves receiving a certificate request from a computing unit, authenticating the unit based on provided information, and sending a certificate report to the computing unit. Another notable patent is "Providing high availability computing service by issuing a certificate." This patent relates to providing high availability computing services in a distributed system, where a computing unit sends a certificate request to a trusted certificate generator and receives a certificate report that includes a public key certificate and a private key.

Career Highlights

Junxian Xiao has worked with notable companies such as Advanced New Technologies Co., Ltd. and Alibaba Group Holding Limited. His experience in these organizations has allowed him to develop and refine his innovative ideas in secure computing.

Collaborations

Some of Junxian Xiao's coworkers include Chaofan Yu and Lei Wang. Their collaboration has contributed to the advancement of secure computing technologies.

Conclusion

Junxian Xiao's contributions to secure computing through his patents and career achievements highlight his role as an influential inventor in the technology sector. His innovative methods continue to shape the future of secure computing.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…