Pune, India

Mohammed Eliyas Shaikh


Average Co-Inventor Count = 2.8

ph-index = 2

Forward Citations = 13(Granted Patents)


Location History:

  • Pune, IN (2015)
  • Maharashtra, IN (2013 - 2016)

Company Filing History:


Years Active: 2013-2016

Loading Chart...
3 patents (USPTO):Explore Patents

Title: Mohammed Eliyas Shaikh: Innovator in Data Backup and Encryption Technologies

Introduction

Mohammed Eliyas Shaikh is a notable inventor based in Pune, India. He has made significant contributions to the field of data management and security through his innovative patents. With a total of 3 patents, his work focuses on enhancing the efficiency and security of data backup processes.

Latest Patents

One of his latest patents is titled "Systems and methods for efficiently backing up data." This invention outlines a computer-implemented method that includes identifying a volume scheduled for backup, determining resource usage thresholds, and efficiently copying data to a backup image. The method ensures that the backup image remains consistent with the snapshot taken during the process. Another significant patent involves "Techniques for creating an encrypted virtual hard disk." This patent describes a method for encrypting a virtual hard disk by creating a volume of data and applying a predetermined encryption algorithm, thereby enhancing data security.

Career Highlights

Throughout his career, Mohammed Eliyas Shaikh has worked with prominent companies such as Symantec Corporation and Veritas Technologies LLC. His experience in these organizations has allowed him to develop and refine his innovative ideas in data management and security.

Collaborations

Some of his notable coworkers include Mehtab Ali Syed and Ravindra V Teli. Their collaboration has contributed to the development of advanced technologies in the field.

Conclusion

Mohammed Eliyas Shaikh stands out as an influential inventor in the realm of data backup and encryption technologies. His patents reflect a commitment to improving data management practices and enhancing security measures.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…