JR

Jian Ren

MU Michigan State University: 6 patents #63 of 1,164Top 6%
ME Metafix: 3 patents #4 of 8Top 50%
CK City University Of Hong Kong: 3 patents #112 of 1,010Top 15%
AL Alibaba: 2 patents #598 of 2,313Top 30%
AV Avaya: 2 patents #513 of 1,730Top 30%
Huawei: 1 patents #8,196 of 15,535Top 55%
Disney: 1 patents #3,944 of 6,686Top 60%
AT AT&T: 1 patents #10,626 of 18,772Top 60%
📍 Okemos, MI: #19 of 344 inventorsTop 6%
🗺 Michigan: #4,319 of 86,293 inventorsTop 6%
Overall (All Time): #229,884 of 4,157,543Top 6%
19
Patents All Time

Issued Patents All Time

Showing 1–19 of 19 patents

Patent #TitleCo-InventorsDate
12309019 Secure and energy efficient communication system for Nextgen wireless networks overcoming high peak-to-average power ratio and disguised jamming Tongtong Li 2025-05-20
12299473 Dependency injection with auto-serialization in multiple worker system Rui Bie, Han Qin 2025-05-13
12118828 Blockchain-based voting system Ehab Zaghloul, Tongtong Li 2024-10-15
11063357 Dual-band antenna for global positioning system Kwok Wa Leung, Yuxiang Sun 2021-07-13
11050151 Multi-band antenna Kwok Wa Leung, Yuxiang Sun 2021-06-29
10911290 Secure and efficient orthogonal frequency division multiplexing transmission system with disguised jamming Tongtong Li, Yuan Liang 2021-02-02
10901693 Cost-aware secure outsourcing Kai Zhou 2021-01-26
10833417 Filtering dielectric resonator antennas including a loop feed structure for implementing radiation cancellation Kwok Wa Leung, Yan Liu 2020-11-10
10755064 Code scanning security check method and apparatus 2020-08-25
10637508 Optimal construction of regenerating code through rate-matching Jian Li, Tongtong Li 2020-04-28
10599900 Code scanning security check method and apparatus 2020-03-24
10230627 Service path allocation method, router and service execution entity 2019-03-12
9608803 Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption Ahmed S. Alahmadi, Mai Abdelhakim, Tongtong Li 2017-03-28
8259950 Method for secure key management using multi-threshold secret sharing Mehrdad Nadooshan 2012-09-04
7787619 Method and apparatus for secure key management using multi-threshold secret sharing Mehrdad Nadooshan 2010-08-31
6708893 Multiple-use smart card with security features and method Shervin Erfani 2004-03-23
6277290 Process for recovering silver from photographic solutions John Riviere 2001-08-21
6120194 Photographic liquids effluent discharge Denis BRUNELLE, John Riviere, Bernard Gravel 2000-09-19
5900041 Value metal recovery John Riviere 1999-05-04