Irvine, CA, United States of America

Kung Yi Lin

USPTO Granted Patents = 10 

Average Co-Inventor Count = 2.4

ph-index = 6

Forward Citations = 226(Granted Patents)


Company Filing History:


Years Active: 2005-2021

Loading Chart...
10 patents (USPTO):Explore Patents

Title: Innovations of Kung Yi Lin

Introduction

Kung Yi Lin is a prominent inventor based in Irvine, California. He has made significant contributions to the field of database systems and data security. With a total of 10 patents to his name, his work has had a substantial impact on how data is managed and protected in modern technology.

Latest Patents

One of his latest patents is focused on the dynamic modification of database schema. This innovation allows a database system to receive requests for schema changes while maintaining online functionality. The system can complete pending transactions and pause any incoming requests during the modification process, ensuring that the database remains operational. Another notable patent addresses the handling of sensitive data on storage devices. This invention enables data marked as sensitive to be automatically destroyed upon erasure. By overwriting erased sensitive data with random characters or a fixed sequence, the system enhances data security and privacy.

Career Highlights

Kung Yi Lin is currently employed at Unisys Corporation, where he continues to develop innovative solutions in database management and data security. His expertise in these areas has positioned him as a valuable asset to his organization.

Collaborations

Throughout his career, Kung Yi Lin has collaborated with notable colleagues, including Subramaniam Ramamurthi and Donald Ralph Hart. These partnerships have fostered a creative environment that encourages the development of groundbreaking technologies.

Conclusion

Kung Yi Lin's contributions to the field of technology through his patents demonstrate his commitment to innovation and excellence. His work not only enhances database management but also significantly improves data security practices.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…