Shenzhen, China

Shican Wang


Average Co-Inventor Count = 3.0

ph-index = 1

Forward Citations = 1(Granted Patents)


Company Filing History:


Years Active: 2018

Loading Chart...
1 patent (USPTO):Explore Patents

Title: The Innovations of Shican Wang in Authentication Technology

Introduction

Shican Wang, an innovative inventor based in Shenzhen, China, has made significant contributions to the field of authentication technology. With one notable patent to his name, Wang has showcased his expertise in developing systems that enhance secure access protocols.

Latest Patents

Wang's prominent patent is titled "Terminal single sign-on configuration, authentication method, and system, and application service system thereof." This invention introduces a terminal single sign-on authentication method that streamlines the process of accessing private virtual networks (VPNs). The method encompasses the retrieval of VPN login information, which is then verified by a server. Upon successful verification, a recorded script containing various operations is obtained, allowing for an automatic replay of operations necessary for completing the authentication process.

Career Highlights

Shican Wang currently works at Sangfor Technologies Inc., a company known for its innovative solutions in network security and management. His role at Sangfor Technologies has allowed him to pioneer advancements in secure authentication methods, marking him as a valuable asset in the technology sector.

Collaborations

During his career, Wang has collaborated with other esteemed professionals, including Jianxin Qian and Shizhi Huang. Working alongside talented colleagues has fostered a creative environment that encourages the development of new and effective technological solutions.

Conclusion

In summary, Shican Wang stands out as a leading inventor in the realm of authentication technology, with impactful contributions that enhance security measures in digital environments. His dedication to innovation at Sangfor Technologies Inc. continues to influence the way users access and authenticate their information securely.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…