Suwon-si, South Korea

Sang Jun Lee

USPTO Granted Patents = 2 

Average Co-Inventor Count = 1.7

ph-index = 1

Forward Citations = 6(Granted Patents)


Company Filing History:


Years Active: 2021-2024

Loading Chart...
2 patents (USPTO):Explore Patents

Title: The Innovations of Sang Jun Lee

Introduction

Sang Jun Lee is a notable inventor based in Suwon-si, South Korea. He has made significant contributions to the field of technology, particularly in encryption and data management. With a total of two patents to his name, Lee continues to push the boundaries of innovation.

Latest Patents

One of Sang Jun Lee's latest patents is an encryption key management method in a data subscription system. This method involves several steps, including receiving a data registration request from a supplier terminal and determining a data identifier associated with the content data. The process includes encrypting a master key with the public key of the supplier terminal and providing the supplier terminal with the encrypted master key, data identifier, and a key update count value. Additionally, the method encompasses receiving a subscription application related to the data identifier from a first subscriber terminal, encrypting the master key with the public key of the first subscriber terminal, and transmitting the encrypted content data and hash to the first subscriber terminal.

Career Highlights

Sang Jun Lee is currently employed at Penta Security Inc., where he applies his expertise in encryption and data security. His work at the company has allowed him to develop innovative solutions that enhance data protection and management.

Collaborations

Lee collaborates with talented individuals such as Jin Hyeok Oh and Myong Cheol Lim. Their teamwork fosters an environment of creativity and innovation, leading to advancements in their respective fields.

Conclusion

Sang Jun Lee is a prominent inventor whose work in encryption and data management has made a significant impact. His contributions continue to shape the future of technology and data security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…