Credential registry trail
CISSP #1835754 / CISA #242443310
The founder credential claims point to official verification registries instead of relying on unlinked profile copy.
One Architect. 31 CVEs in 48 Hours. 15 MITRE Tickets Confirmed.


DIRECTOR
The Architect
ISO 27001 Compliant
Information security management
SOC 2 Type II
Security, Availability, Processing Integrity
GDPR Compliant
Data protection for EU customers
ISO 27701
Privacy Information Management
SOC 3 Ready
General security reporting
ISO 27017
Cloud Security
Click to verify credentials on official registries
M.S. Computer Information Technology, Northern Arizona University
Inventor & Security Pioneer. Feng Jiqiang has public patent records across behavioral biometrics and adversarial AI, with the inventor index exposed below for buyer-side verification.
Unicorn Builder. As Co-founder & CSO of Qingteng Cloud Security (青藤云安全), he architected the "Adaptive Security" model that became an industry standard. Qingteng achieved unicorn status in China's cybersecurity market.
Sovereign Architect. Now bridging offensive security and autonomous coding at Innora. Building the "Autonomous Architect" reality with zero external dependencies.
Every high-trust claim below is paired with a public source: credential registries, patent records, and the published research timeline.
Evidence rule
Use source links first; keep narrative copy secondary.
CISSP #1835754 / CISA #242443310
The founder credential claims point to official verification registries instead of relying on unlinked profile copy.
Jiqiang Feng / Feng Jiqiang inventor search
Patent-related copy is tied to a public Google Patents inventor index so buyers can inspect the source records directly.
CN112801452A
A cited patent record links graph neural network analysis to malicious-code detection, matching the About page IP narrative.
31 vulnerabilities / 15 MITRE tickets
The founder narrative connects to the published research timeline and methodology rather than leaving the CVE claim isolated.
Innora.ai builds AI security products across intrusion detection, vulnerability research, AI red teaming, and security automation. The public trust record includes a 31-vulnerability research sprint, 15 confirmed MITRE tickets, a Trust Center, a canonical security.txt policy, and an inspectable GitHub organization.
Innora doesn't have a headcount problem—it has an automation advantage. 9 AI systems operate 24/7 with zero human bottleneck.
One architect designs the strategy. Nora Flow orchestrates autonomous agents that write, test, and deploy code. The result: 30,000+ Python modules, 9 production systems, and fully automated operations—all with a single point of accountability and zero outsourcing risk.
The offensive research backbone of our US Security Lab.
First in China to demonstrate soft-hard combined overflow, elevating 'High' risks to 'System Takeover'. This offensive research forms the backbone of our US Security Lab.
CRITICAL VULNERABILITY RESEARCHPioneered physical material attacks on biometric AI, proving that Generative Adversarial examples could bypass commercial Face ID systems. Now core to our Identity Defense modules.
BIOMETRIC SECURITYUnifying Eastern Engineering Efficiency with Western Security Standards.
INNORA INFORMATION TECHNOLOGY PTE. LTD.
3 Phillip Street, Royal Group Building #10-04, Singapore 048693
Focus: AI Security (Nora Vision/Nora Scan/Nora Veridic) & Automation (Nora Flow/Nora Content)
AURORA INFINITE, LLC.
1111B S Governors Ave #37629, Dover, DE 19901
Focus: Offensive Security Research, Compliance, Deep Tech
"The system is the team. Code is the trust. Every module is automatically tested, deployed, and monitored by AI agents that never sleep. One architect. Zero outsourcing. Full auditability."
Technical superiority built on verified intellectual property.
Public patent records covering behavioral biometrics, graph neural network detection, and human-machine identification.
Certified Information Systems Security Professional (CISSP) & Certified Information Systems Auditor (CISA).
QCon Global Software Development Conference Speaker (2017). Author of 'AI in Cybersecurity' whitepapers.
Research transformed into inspectable IP records. The portfolio links below expose the source trail behind the Adversarial AI and Network Defense narrative.
The theoretical core of CodeEye. Utilizing GNNs to identify obfuscated attack patterns that bypass traditional static analysis.
Foundational patent for Human-Proof verification systems. Combines biological features with behavioral analysis.
Open the public inventor index for patent records including Network Attack Tracing & Automated Defense.
Legal Notice: Patents and research referenced herein illustrate the professional expertise and historical achievements of our founding team. Unless explicitly stated, intellectual property rights may reside with respective assignees, affiliated research entities, or the inventor in their personal capacity. Innora Pte. Ltd. operates under appropriate licensing arrangements where applicable.
Two decades of escalation.
Established the US R&D Center in Delaware to focus on Offensive Security, Compliance, and Deep Tech Research. Validated 'Autonomous Development' model by deploying Ares & CodeEye via AI Agents.
Leading the next generation of AI-driven security. Developed Nora Shrike autonomous pentest engine and InnoraCI agentic orchestration.
Built the revolutionary GNN-based Vulnerability Scanner and behavioral security analysis engine. Managed expansive security engineering teams.
Pioneered behavior-based authentication. Selected for Microsoft Accelerator. Secured Pre-A funding and filed 14 core patents.
Defined the Adaptive Security Architecture (ASA). Qingteng became a unicorn in the Chinese security market.
Led strategic enterprise security solution consulting and defense infrastructure construction, establishing a foundation in high-compliance environments for large-scale organizations.