Tokyo, Japan

Ken-ichiro Yoshino

USPTO Granted Patents = 13 

 

Average Co-Inventor Count = 1.5

ph-index = 2

Forward Citations = 8(Granted Patents)


Company Filing History:


Years Active: 2013-2025

Loading Chart...
Loading Chart...
13 patents (USPTO):Explore Patents

Title: Ken-ichiro Yoshino: A Pioneer in Quantum Encryption Technologies

Introduction

Ken-ichiro Yoshino is a prominent inventor based in Tokyo, Japan. He has made significant contributions to the field of quantum encryption, holding a total of 12 patents. His innovative work focuses on enhancing security through advanced encryption techniques.

Latest Patents

One of Yoshino's latest patents involves an encryption key generation method. In this invention, a first device transmits a first random number to a second device through a first quantum channel. The second device then sends a second random number back through a second quantum channel. Both devices generate their respective encryption keys based on the random numbers exchanged. Another notable patent is a random number supply method and device. This device generates three states necessary for the operation of a signal processing unit from a two-bit random number. It includes a decision section that determines whether a first random number matches a predetermined value, allowing for efficient signal processing.

Career Highlights

Throughout his career, Ken-ichiro Yoshino has worked with esteemed organizations such as NEC Corporation and the National Institute of Information and Communications Technology. His experience in these institutions has greatly influenced his research and development in quantum technologies.

Collaborations

Yoshino has collaborated with notable colleagues, including Akio Tajima and Takao Ochi. Their combined expertise has contributed to advancements in the field of quantum encryption.

Conclusion

Ken-ichiro Yoshino's innovative work in quantum encryption technologies has established him as a leading figure in the field. His patents reflect a commitment to enhancing security through cutting-edge methods.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…