San Jose, CA, United States of America

Weifang Xie


 

Average Co-Inventor Count = 9.0

ph-index = 3

Forward Citations = 14(Granted Patents)


Company Filing History:


Years Active: 2019-2022

Loading Chart...
Loading Chart...
4 patents (USPTO):Explore Patents

Title: Weifang Xie: Innovator in Threat Detection Technologies

Introduction

Weifang Xie is a notable inventor based in San Jose, CA (US). He has made significant contributions to the field of threat detection, holding a total of 4 patents. His work focuses on innovative techniques for analyzing security events and enhancing user activity monitoring.

Latest Patents

One of Weifang Xie's latest patents is titled "Dynamic policy injection and access visualization for threat detection." This patent relates to the analysis of security events using dynamic policies. It provides a consolidated view of active threats and user activity, including the dynamic policies triggered by these threats. The invention introduces the concept of a policy bus for injecting and communicating dynamic policies to multiple enforcement entities. This allows entities to respond to policies dynamically. Additionally, it offers a consolidated view of active threat categories, counts of triggered policies for each category, and associated trends. It also provides insights into users, applications accessed, and the access policies implicated by such activities.

Career Highlights

Weifang Xie has worked with prominent companies, including Oracle International Corporation. His experience in these organizations has contributed to his expertise in the field of threat detection and security technologies.

Collaborations

Throughout his career, Weifang has collaborated with talented individuals such as Aji Joseph and Paresh Raote. These collaborations have likely enriched his work and contributed to his innovative approaches.

Conclusion

Weifang Xie's contributions to threat detection technologies through his patents and collaborations highlight his role as a significant innovator in the field. His work continues to influence the way security events are analyzed and managed.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…