Company Filing History:
Years Active: 2016-2025
Title: Wing Kwong Wan: Innovator in Sensitive Data Management
Introduction
Wing Kwong Wan is a notable inventor based in Redmond, WA (US). He has made significant contributions to the field of data security, particularly in the area of sensitive data leak detection. With a total of six patents to his name, Wan's work focuses on enhancing security management systems through innovative scanning methods.
Latest Patents
Among his latest patents is a sensitive data leak-detection engine designed for security management systems. This invention outlines methods, systems, and computer storage media for providing sensitive data scanning. The scanning process is crucial during software development, as it identifies confidential information and credentials within in-development code. The engine operates by executing a sensitive data scanning operation, which generates notifications regarding the scan results.
Another significant patent involves scan surface reduction for sensitive information scanning. This method includes receiving a document and utilizing an evidence checker to identify keywords that indicate the presence of sensitive information. Upon detection, a sensitive information scanner assesses the document for sensitive data and performs mitigation operations as necessary.
Career Highlights
Wing Kwong Wan is currently employed at Microsoft Technology Licensing, LLC, where he continues to innovate in the realm of data security. His work has been instrumental in developing advanced solutions that protect sensitive information in various applications.
Collaborations
Throughout his career, Wan has collaborated with esteemed colleagues, including George Raymond Derryberry, Jr. and Michael C. Fanning. These partnerships have contributed to the successful development of his patented technologies.
Conclusion
Wing Kwong Wan stands out as a key figure in the field of sensitive data management, with a focus on innovative scanning technologies. His contributions through patents and collaborations continue to shape the landscape of data security.