Beijing, China

Wuqiong Pan


Average Co-Inventor Count = 7.5

ph-index = 1

Forward Citations = 13(Granted Patents)


Company Filing History:


Years Active: 2017-2019

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Wuqiong Pan: Innovator in Cryptographic Operations

Introduction

Wuqiong Pan is a notable inventor based in Beijing, China. He has made significant contributions to the field of cryptography, particularly in virtualization environments. With a total of 2 patents, his work focuses on enhancing security measures in virtual systems.

Latest Patents

Wuqiong Pan's latest patents include a "System and method for providing cryptographic operation service in virtualization environment." This invention outlines a system where a configuration subsystem allows administrators and users to input information about a virtual cryptographic device. It features a key file storage subsystem that protects key files with a password, enabling secure cryptographic computing services for guest virtual machines. His second patent, "Method and system for protecting root CA certificate in a virtualization environment," introduces a root CA certificate security manager that provides certificate validation services to virtual machines. This method ensures that the root CA certificates are isolated and accessed in a read-only manner, enhancing security in virtual environments.

Career Highlights

Wuqiong Pan is affiliated with the Chinese Academy of Sciences, where he continues to innovate and contribute to advancements in cryptographic technologies. His work is pivotal in addressing key security challenges in virtualization.

Collaborations

Some of his notable coworkers include Jingqiang Lin and Jiwu Jing, who collaborate with him on various projects within the field.

Conclusion

Wuqiong Pan's contributions to cryptographic operations in virtualization environments highlight his expertise and commitment to enhancing security measures. His innovative patents reflect a deep understanding of the complexities involved in modern computing environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…