Wheeling, IL, United States of America

Rong R Wang


Average Co-Inventor Count = 2.0

ph-index = 3

Forward Citations = 31(Granted Patents)


Company Filing History:


Years Active: 2004-2010

Loading Chart...
4 patents (USPTO):Explore Patents

Title: Innovations and Contributions of Rong R Wang

Introduction

Rong R Wang is a notable inventor based in Wheeling, IL (US). He has made significant contributions to the field of data networking, particularly in the area of virtual private networks (VPNs). With a total of 4 patents to his name, Wang's work has had a considerable impact on the way data is managed and transmitted securely over networks.

Latest Patents

One of Wang's latest patents focuses on the distribution of reachability information in data virtual private networks. This invention outlines methods and apparatus for acquiring VPN reachability information at a node of a data network. A VPN reachability information request is transmitted from a requesting node, which includes a VPN identifier. Other nodes in the data network receive this request and, if they possess relevant reachability information, they transmit it back to the requesting node for storage. This invention is particularly applicable in MPLS VPN architectures, enhancing the efficiency and reliability of data transmission.

Career Highlights

Throughout his career, Rong R Wang has worked with prominent companies in the technology sector. Notably, he has been associated with Nortel Networks Corporation and Avaya Inc. His experience in these organizations has contributed to his expertise in networking technologies and innovations.

Collaborations

Wang has collaborated with various professionals in his field, including Dwight D Jamieson. These collaborations have likely enriched his work and led to further advancements in his inventions.

Conclusion

Rong R Wang's contributions to the field of data networking, particularly through his patents related to VPN technology, demonstrate his innovative spirit and technical expertise. His work continues to influence the way data is managed in secure environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…