West Lafayette, IN, United States of America

Yuseok Jeon


Average Co-Inventor Count = 6.0

ph-index = 1

Forward Citations = 2(Granted Patents)


Location History:

  • West Lafayette, IN (US) (2019)
  • Princeton, NJ (US) (2020)

Company Filing History:


Years Active: 2019-2020

Loading Chart...
3 patents (USPTO):

Title: Yuseok Jeon: Innovator in Security Analysis Technologies

Introduction

Yuseok Jeon is a prominent inventor based in West Lafayette, Indiana, known for his contributions to security analysis technologies. With a total of three patents to his name, he has made significant strides in developing methods and systems that enhance security measures in computing environments.

Latest Patents

Yuseok Jeon's latest patents include "Automated blackbox inference of external origin user behavior" and "Blackbox program privilege flow analysis with inferred program behavior context." The first patent focuses on methods for security analysis that determine whether a process originates internally or externally to a system. This innovation allows for targeted security actions against processes identified as potential threats. The second patent presents a computer-implemented method for privilege flow analysis, which involves monitoring operating system events and generating a privilege flow graph. This method enhances the understanding of program behavior and distinguishes the roles of processes and threads within a program.

Career Highlights

Yuseok Jeon is currently employed at NEC Corporation, where he continues to develop innovative solutions in the field of security analysis. His work has been instrumental in advancing the understanding of user behavior and program interactions, contributing to safer computing environments.

Collaborations

Yuseok collaborates with notable colleagues, including Zhenyu Wu and Zhichun Li, who share his commitment to innovation in security technologies.

Conclusion

Yuseok Jeon's work exemplifies the impact of innovative thinking in the realm of security analysis. His patents reflect a deep understanding of user behavior and program interactions, paving the way for enhanced security measures in technology.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…