Noerrebro, Denmark

Kiril Georgiev Georgiev


Average Co-Inventor Count = 5.0

ph-index = 1


Company Filing History:


Years Active: 2024

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Kiril Georgiev Georgiev – Innovator in Sensitive Data Management

Introduction

Kiril Georgiev Georgiev, an accomplished inventor based in Noerrebro, Denmark, has made significant contributions in the field of data security. He is recognized for his innovative approach to managing sensitive data through his patented technology.

Latest Patents

Georgiev holds a patent for a sensitive data management system. This inventive system includes several critical components: a sensitive data protection code generating unit, which creates a code of predetermined length; a symmetric encryption key generating unit, which derives a symmetric encryption key using a key derivation function; a sensitive data encrypting unit that utilizes the symmetric key for data encryption; and a sensitive data protection code encrypting unit. This advanced technology allows for robust data protection and security, while a deleting unit ensures that sensitive data and keys are securely erased after encryption, enhancing data safety.

Career Highlights

Kiril Georgiev Georgiev is currently affiliated with Soliton Systems K.K., where he focuses on innovative data protection solutions. His work demonstrates a deep understanding of the challenges in sensitive data management, showcasing his skills as a forward-thinking inventor in the tech industry.

Collaborations

Throughout his career, Georgiev has collaborated with talented colleagues, including Bo Stig Hansen and Emil Mourier. These partnerships highlight the collaborative spirit within the innovative environment at Soliton Systems.

Conclusion

Kiril Georgiev Georgiev continues to make an impact in the realm of sensitive data management. His inventive solutions are essential in addressing the growing need for data protection in a digital world. With his contributions, Georgiev is paving the way for better security practices in managing sensitive information.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…