Beijing, China

Sishan Wang

USPTO Granted Patents = 9 

 

Average Co-Inventor Count = 2.3

ph-index = 1

Forward Citations = 1(Granted Patents)


Company Filing History:


Years Active: 2020-2025

Loading Chart...
Loading Chart...
9 patents (USPTO):

Title: The Innovations of Sishan Wang

Introduction

Sishan Wang is a prominent inventor based in Beijing, China. He has made significant contributions to the field of technology, particularly in the areas of digital key authentication and Bluetooth device communication. With a total of nine patents to his name, Wang's work reflects a commitment to advancing secure communication methods.

Latest Patents

Wang's latest patents include a "Method for authenticating identity of digital key, terminal device, and medium." This innovative method involves performing identity authentication on a user before a second terminal enters a preset operating state. The identity authentication information is securely stored in the second terminal, allowing for verification when the digital key is used. Another notable patent is the "Method for mutual recognition or mutual trust between Bluetooth devices." This method enables a first Bluetooth device to receive an identity resolving key from a server and generate a resolvable private address, which is then verified by a second Bluetooth device.

Career Highlights

Throughout his career, Sishan Wang has worked with leading technology companies, including Huawei Technologies Co., Limited. His experience in these organizations has allowed him to develop and refine his innovative ideas, contributing to the advancement of technology in the industry.

Collaborations

Wang has collaborated with notable colleagues such as Xinmiao Chang and Xiaona Zhao. These partnerships have fostered a creative environment that has led to the development of groundbreaking technologies.

Conclusion

Sishan Wang's contributions to technology through his patents and collaborations highlight his role as an influential inventor. His work continues to shape the future of secure communication and authentication methods.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…