Beijing, China

Shiguang Li

USPTO Granted Patents = 9 


Average Co-Inventor Count = 2.8

ph-index = 2

Forward Citations = 7(Granted Patents)


Company Filing History:


Years Active: 2016-2025

where 'Filed Patents' based on already Granted Patents

9 patents (USPTO):

Title: Shiguang Li: Innovator in Network Security

Introduction

Shiguang Li is a prominent inventor based in Beijing, China, known for his significant contributions to network security technologies. With a total of nine patents to his name, he has developed innovative methods and apparatuses that enhance the detection and prevention of network attacks.

Latest Patents

One of his latest patents is a network attack detection method and apparatus. This invention provides a network protection device that obtains key data from received network traffic and matches it with attack signatures in a database. If the device determines that the traffic is aggressive, it utilizes a target attack detection model to identify different attack signatures. Another notable patent is a packet processing method and apparatus. This method involves a protection device that receives access request packets and extracts fingerprint features to determine whether to allow or block access to a server based on the operating system type of the terminal device.

Career Highlights

Shiguang Li has worked with leading technology companies, including Huawei Technologies Co., Limited and Zhongke Jingyuan Electron Limited. His experience in these organizations has allowed him to refine his skills and contribute to cutting-edge innovations in network security.

Collaborations

Throughout his career, Shiguang Li has collaborated with notable professionals in the field, including Wu Jiang and Zhihui Xue. These collaborations have further enriched his work and expanded the impact of his inventions.

Conclusion

Shiguang Li's contributions to network security through his innovative patents and collaborations highlight his role as a key figure in the field. His work continues to influence the development of technologies that protect against network threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…