Lund, Sweden

Pegah Nikbakht Bideh

USPTO Granted Patents = 2 

 

Average Co-Inventor Count = 3.0

ph-index = 1


Company Filing History:


Years Active: 2025

Loading Chart...
Loading Chart...
2 patents (USPTO):Explore Patents

Title: Pegah Nikbakht Bideh: Innovator in Data Security and Software Vulnerability Management

Introduction

Pegah Nikbakht Bideh is a notable inventor based in Lund, Sweden. She has made significant contributions to the fields of data security and software vulnerability management. With a total of 2 patents, her work focuses on enhancing communication protocols and prioritizing vulnerabilities in software.

Latest Patents

One of her latest patents is titled "Protocol translation for encrypted data traffic." This invention presents a method for enabling communication protocol translation between first and second devices while ensuring data security. The process involves creating a trusted execution environment (TEE) and utilizing cryptographic credentials to facilitate secure communication.

Another significant patent is the "Method for prioritizing among vulnerabilities in a software code and a server." This method allows users to prioritize vulnerabilities in software by leveraging domain-specific and user-specific knowledge. It provides a systematic approach to assessing vulnerabilities and delivering prioritized lists to users.

Career Highlights

Throughout her career, Pegah has worked with various companies, including Debricked AB and Canary Bit AB. Her experience in these organizations has contributed to her expertise in data security and software development.

Collaborations

Pegah has collaborated with Linus Karlsson, who has been a valuable coworker in her projects. Their partnership has fostered innovation and development in their respective fields.

Conclusion

Pegah Nikbakht Bideh is a pioneering inventor whose work in data security and software vulnerability management has made a significant impact. Her patents reflect her commitment to enhancing communication protocols and improving software security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…