Beijing, China

Meng Yu

USPTO Granted Patents = 2 

Average Co-Inventor Count = 5.0

ph-index = 1

Forward Citations = 14(Granted Patents)


Company Filing History:


Years Active: 2021-2022

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Innovations of Meng Yu in Face Anti-Counterfeiting Technology

Introduction

Meng Yu is a prominent inventor based in Beijing, China. He has made significant contributions to the field of face anti-counterfeiting detection technology. With a total of 2 patents to his name, his work is paving the way for advancements in security and authentication systems.

Latest Patents

Meng Yu's latest patents focus on face anti-counterfeiting detection methods and systems. One of his notable inventions involves a comprehensive approach to detecting counterfeited face clues. This method includes obtaining an image or video containing a face, extracting features from the detected image or video, and determining whether the extracted features contain any counterfeited face clue information. The detection result ultimately helps in deciding whether the face passes the anti-counterfeiting detection.

Career Highlights

Meng Yu is currently employed at Beijing Sensetime Technology Development Co., Ltd. His role at this innovative company allows him to work on cutting-edge technologies that enhance security measures in various applications. His expertise in face detection and anti-counterfeiting systems has positioned him as a key player in the industry.

Collaborations

Meng Yu collaborates with talented individuals such as Liwei Wu and Tianpeng Bao. Their combined efforts contribute to the development of advanced technologies in the field of face recognition and security.

Conclusion

Meng Yu's contributions to face anti-counterfeiting technology are noteworthy and impactful. His innovative patents and work at Beijing Sensetime Technology Development Co., Ltd. highlight his commitment to enhancing security through technology. The advancements he is making will likely influence the future of authentication systems.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…