New York, NY, United States of America

Roxana Geambasu


Average Co-Inventor Count = 3.4

ph-index = 2

Forward Citations = 87(Granted Patents)


Location History:

  • Seattle, WA (US) (2013)
  • New York, NY (US) (2016)

Company Filing History:


Years Active: 2013-2016

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Roxana Geambasu: Innovator in Data Security

Introduction

Roxana Geambasu is a prominent inventor based in New York, NY (US). She has made significant contributions to the field of data security, holding 2 patents that focus on innovative systems and methods for file access auditing and data encapsulation.

Latest Patents

Her latest patents include "Systems and methods for file access auditing" and "Encapsulation and decapsulation for data disintegration." The first patent discloses an auditing file system designed for theft-prone devices. This system allows users to obtain reliable evidence that no files have been accessed after a device's loss. Additionally, it enables users to disable future file access even without network connectivity. The second patent presents a configuration for encapsulating data that becomes unreadable after a predetermined timeout. This involves generating a random data key, splitting it into shares, and storing these shares at random locations within networks, ensuring that the data remains secure.

Career Highlights

Roxana Geambasu is affiliated with the University of Washington, where she continues to advance her research in data security. Her work has garnered attention for its innovative approach to protecting sensitive information.

Collaborations

She collaborates with notable colleagues such as Tadayoshi Kohno and Henry M Levy, contributing to a dynamic research environment focused on cutting-edge technology.

Conclusion

Roxana Geambasu's contributions to data security through her patents and research at the University of Washington highlight her role as a leading innovator in the field. Her work continues to influence the way we think about data protection and access auditing.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…