Yidong Wang, Age 51Cherry Brook, MA

Yidong Wang Phones & Addresses

Weston, MA

33 Howarth Dr, Upton, MA 01568

33 Buttercup Ln, South Grafton, MA 01560

New Milford, CT

Danbury, CT

Bethel, CT

Boston, MA

Show more

Education

Degree: High school graduate or higher

Mentions for Yidong Wang

Yidong Wang resumes & CV records

Resumes

Yidong Wang Photo 14

Principal Software Engineer At Simplivity

Location:
33 Howarth Dr, Upton, MA 01568
Industry:
Computer Software
Work:
startup company since May 2013
Principal software engineer
EMC Apr 2007 - May 2013
Principal Software Engineer
BladeLogic Inc. Aug 2005 - Apr 2007
Software Engineer
Bristol Technology Jun 2000 - Aug 2005
Software Engineer
Kenosia Corporation Jun 2000 - Aug 2005
Principal Software Engineer
Education:
Boston College - Wallace E. Carroll Graduate School of Management 2007 - 2012
Master of Business Administration (MBA)
Northeastern University 1999 - 2000
M.S., Mathematics
Beijing Normal University 1989 - 1993
B.S., Mathematics
Skills:
Cloud Computing, Distributed Systems, Storage, Unix, Software Development, Linux, Software Engineering, Perl, Agile Methodologies, Java, C++, Enterprise Software
Languages:
Mandarin
English
Yidong Wang Photo 15

Yidong Wang

Publications & IP owners

Us Patents

Providing Secure Access To A Set Of Credentials Within A Data Security Mechanism Of A Data Storage System

US Patent:
8555342, Oct 8, 2013
Filed:
Dec 23, 2009
Appl. No.:
12/645857
Inventors:
Gregory W. Lazar - Upton MA, US
Greg Mogavero - Needham MA, US
Michael Hamel - Milford MA, US
Yidong Wang - Upton MA, US
Prakash Chanderia - Shrewsbury MA, US
Feng Zhou - Framingham MA, US
Ashwin Ramkrishna Tidke - Navi Mumbai, IN
Assignee:
EMC Corporation - Hopkinton MA
International Classification:
G06F 12/14
G06F 7/04
G06F 15/16
G06F 21/31
H04L 29/06
US Classification:
726 3, 726 7, 726 19, 713193
Abstract:
A technique provides secure access to a set of credentials within a data storage system. The technique involves obtaining a unique identifier (e. g. , a hostname which is unique to the system) and a set of stable values (e. g. , machine-generated codes which are random to users of the system); and, in response to a storage request from a client application, storing a set of credentials of the client application within a data security mechanism of the data storage system. The set of credentials is in encrypted form when stored within the data security mechanism of the data storage system. The technique further involves configuring the data security mechanism of the data storage system to provide the set of credentials in non-encrypted form in response to new fingerprints matching a system fingerprint which is formed at least in part from the unique identifier and the set of stable values.

NOTICE: You may not use PeopleBackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. PeopleBackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.