Shenzhen, China

Qihong Fu

USPTO Granted Patents = 7 

 

Average Co-Inventor Count = 3.6

ph-index = 1


Location History:

  • Guangdong Province, CN (2014)
  • Shenzhen, CN (2013 - 2017)

Company Filing History:


Years Active: 2013-2017

Loading Chart...
Loading Chart...
7 patents (USPTO):Explore Patents

Title: Qihong Fu: Innovator in Wireless Communication Technologies

Introduction

Qihong Fu is a prominent inventor based in Shenzhen, China, known for his contributions to wireless communication technologies. With a total of 7 patents to his name, Fu has made significant strides in enhancing mobile terminal functionalities and security measures in communication systems.

Latest Patents

Among his latest patents, Fu has developed a method for establishing a WLAN by a mobile terminal. This innovative method involves the mobile terminal initiating Bluetooth to modify its device name to include an identifier. The mobile terminal then searches for other terminals with matching identifiers and compares Bluetooth MAC addresses to set itself as a wireless access point when certain conditions are met. Additionally, he has created a user terminal for password-based authentication, which includes a password generation module and a near field communication module. This system effectively ensures password security during authentication processes.

Career Highlights

Qihong Fu has worked with notable companies such as ZTE Corporation and Xi'an ZTE New Software Company Limited. His experience in these organizations has allowed him to refine his skills and contribute to groundbreaking technologies in the field of wireless communication.

Collaborations

Fu has collaborated with several professionals in his field, including Zhiping Zhang and Xin Yang, who have contributed to his projects and innovations.

Conclusion

Qihong Fu's work in wireless communication technologies showcases his innovative spirit and dedication to improving mobile terminal capabilities. His patents reflect a commitment to enhancing user experience and security in communication systems.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…