Charlotte, NC, United States of America

Yassine Touahri

USPTO Granted Patents = 2 

Average Co-Inventor Count = 8.9

ph-index = 1


Company Filing History:


Years Active: 2025

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Yassine Touahri: Innovator in Secure Computing

Introduction

Yassine Touahri is a notable inventor based in Charlotte, NC, who has made significant contributions to the field of secure computing. With two patents to his name, he has developed innovative methods that enhance the security of data transmission and orchestration in computing environments.

Latest Patents

Touahri's latest patents include "Mutual transport layer security (TLS) verification using an authorized viewer" and "Private cloud infrastructure stitching process and orchestration." The first patent focuses on securing mutual TLS verification between client and server computers by utilizing an authorized viewer. This method involves intercepting files and employing an Artificial Intelligence (AI) module for content inspection, ultimately preventing the transmission of malicious data. The second patent presents a system for orchestrating a mainframe computing environment, which includes various components such as a computer processor, controller, and network layer. This system optimizes the utilization of the mainframe by using an application programming interface (API) and an infrastructure as code (IaC) format.

Career Highlights

Yassine Touahri is currently employed at Bank of America Corporation, where he applies his expertise in secure computing. His work focuses on developing innovative solutions that enhance the security and efficiency of banking operations.

Collaborations

Touahri collaborates with talented professionals such as Gilbert M. Gatchalian and Brian Christman, contributing to a dynamic work environment that fosters innovation.

Conclusion

Yassine Touahri's contributions to secure computing through his patents and work at Bank of America Corporation highlight his role as a significant inventor in the field. His innovative methods continue to shape the landscape of data security and computing orchestration.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…