Mountain View, CA, United States of America

Shuk Yee Ho


Average Co-Inventor Count = 4.3

ph-index = 3

Forward Citations = 14(Granted Patents)


Company Filing History:


Years Active: 2013-2014

Loading Chart...
3 patents (USPTO):Explore Patents

Title: Innovations by Shuk Yee Ho

Introduction

Shuk Yee Ho is an accomplished inventor based in Mountain View, CA, known for his contributions to identity management and security systems. With a total of three patents to his name, he has made significant strides in enhancing security protocols within enterprise environments.

Latest Patents

One of his latest patents is titled "Methods and systems for managing identity management security domains." This invention provides a centralized registry of services within an enterprise security system, allowing authorized users to discover the location of various services, such as certificate authorities and key archives. The security domain also serves as a distribution point for security policies, which include trusted certificate authorities and certificate revocation lists.

Another notable patent is the "Profile framework for token processing system." This invention addresses the handling of enrollment requests in a token processing system. It selects applicable profiles based on the information in the request, indicating parameters for fulfilling the enrollment, such as the locations of certificate authorities and token key services.

Career Highlights

Shuk Yee Ho is currently employed at Red Hat, Inc., where he continues to innovate in the field of security management. His work focuses on developing systems that enhance the security and efficiency of enterprise operations.

Collaborations

He collaborates with talented coworkers, including Nang Kon Kwan and Chandrasekar Kannan, contributing to a dynamic and innovative work environment.

Conclusion

Shuk Yee Ho's contributions to identity management and security systems reflect his commitment to advancing technology in meaningful ways. His patents demonstrate a clear understanding of the complexities involved in enterprise security, making him a valuable asset in his field.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…