Hangzhou, China

Shaoping Pan


Average Co-Inventor Count = 4.0

ph-index = 1


Company Filing History:


Years Active: 2024

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovations of Shaoping Pan in Operating System Security

Introduction

Shaoping Pan is a notable inventor based in Hangzhou, China. He has made significant contributions to the field of operating system security through his innovative research and patents. His work focuses on discovering vulnerabilities in operating system access control mechanisms, which is crucial for enhancing security measures in computing environments.

Latest Patents

Shaoping Pan holds a patent titled "Method for discovering vulnerabilities of operating system access control mechanism based on model checking." This invention discloses a method for identifying vulnerabilities in operating system access control by utilizing model checking techniques. The method involves analyzing security attributes and specifications of the access control module to construct a comprehensive access control model. By employing theorem proving techniques, security analysis is conducted to assess the functionality of access control, ensuring the consistency of abstract machine specifications and verifying the correctness and completeness of the components with model checking tools. This innovative approach provides both theoretical and technical support for research in operating system security.

Career Highlights

Shaoping Pan is affiliated with Zhejiang University, where he continues to advance his research in the field of computer security. His work has garnered attention for its practical applications in enhancing the security of operating systems.

Collaborations

He has collaborated with notable colleagues such as Rui Chang and Zhuoruo Zhang, contributing to a collaborative environment that fosters innovation and research excellence.

Conclusion

Shaoping Pan's contributions to the field of operating system security through his patent and research efforts highlight the importance of innovative methods in identifying vulnerabilities. His work not only advances academic knowledge but also provides practical solutions for enhancing security in computing systems.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…