san jose, CA, United States of America

Yiwei Wang

USPTO Granted Patents = 4 

Average Co-Inventor Count = 14.0

ph-index = 1


Years Active: 2024-2025

Loading Chart...
4 patents (USPTO):

Title: Innovations by Yiwei Wang in Cloud Security

Introduction

Yiwei Wang is a notable inventor based in San Jose, CA, who has made significant contributions to the field of cloud security. With a total of four patents to his name, Wang's work focuses on enhancing the security of cloud data storage and addressing vulnerabilities that can arise in these systems.

Latest Patents

Wang's latest patents include innovative methods for locating shadow vulnerable datastores for cloud data table/API/data lake stores. This computerized method involves identifying cloned data stores and determining their security posture. It also includes publishing a digitized data clone security differential report that outlines security posture issues and potential remediations. Another significant patent addresses the implementation of a cloud-platform push for known data breaches. This method maps kill chains or Tactics, Techniques, and Procedures (TTPs) for specified security dimensions, generating security rules to inform enterprises of vulnerabilities within their cloud-based networks.

Career Highlights

Throughout his career, Yiwei Wang has demonstrated a commitment to improving cloud security through innovative solutions. His patents reflect a deep understanding of the complexities involved in managing data security in cloud environments. Wang's work not only addresses current vulnerabilities but also anticipates future challenges in cloud data management.

Collaborations

Wang has collaborated with talented individuals such as Supreeth Hosur, Nagesh Rao, and Navindra Yadav. These collaborations have likely contributed to the development of his innovative patents and the advancement of cloud security technologies.

Conclusion

Yiwei Wang's contributions to cloud security through his patents highlight his expertise and dedication to innovation in this critical field. His work continues to influence the way enterprises manage and secure their cloud data.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…