Seattle, WA, United States of America

Shreeja Kumar


Average Co-Inventor Count = 8.0

ph-index = 1

Forward Citations = 6(Granted Patents)


Company Filing History:


Years Active: 2020

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Shreeja Kumar: Innovator in Data Encryption

Introduction

Shreeja Kumar is a talented inventor based in Seattle, WA (US). She has made significant contributions to the field of data encryption, focusing on enhancing the security of user-submitted data. Her innovative approach has led to the development of a unique patent that addresses the growing need for real-time data protection.

Latest Patents

Shreeja Kumar holds a patent for "Encryption profiles for encrypting user-submitted data." This invention enables various approaches for real-time data encryption using an encryption profile. Customers can specify the type of data to encrypt and the encryption keys to use. The invention includes a profile editor that allows customers to create and manage encryption profiles, ensuring that sensitive user data is securely ingested into web servers. The system analyzes requests to determine data fields and applies the appropriate encryption keys based on the associated profiles.

Career Highlights

Shreeja Kumar is currently employed at Amazon Technologies, Inc., where she continues to innovate in the field of data security. Her work has been instrumental in developing solutions that enhance user privacy and data integrity. With her expertise, she has contributed to the advancement of encryption technologies that are vital in today's digital landscape.

Collaborations

Shreeja has collaborated with notable colleagues, including Ronil Sudhir Mokashi and Francesco De Martino. These partnerships have fostered a creative environment that encourages the exchange of ideas and the development of cutting-edge technologies.

Conclusion

Shreeja Kumar is a pioneering inventor whose work in data encryption is making a significant impact on user data security. Her innovative solutions are essential in addressing the challenges of protecting sensitive information in an increasingly digital world.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…