Average Co-Inventor Count = 2.66
ph-index = 14
The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.
Company Filing History:
1. Motorola Corporation (13 from 20,290 patents)
2. Amida Technology Solutions, Inc. (5 from 5 patents)
3. Verigy (singapore) Pte. Ltd. (3 from 115 patents)
4. Silicon Aid Solutions, Inc. (3 from 3 patents)
5. Other (2 from 832,680 patents)
6. Asset Intertech, Inc. (2 from 4 patents)
7. Southern Methodist University (1 from 116 patents)
8. Advantest (singapore) Pte Ltd (1 from 35 patents)
9. Dafca, Inc. (1 from 9 patents)
31 patents:
1. 12210618 - Method and system for insertion of cybersecurity and hardware assurance instruments within intergrated circuits and electronic systems using multi-stage hardware marking
2. 12026250 - Method, system, and apparatus for security assurance, protection, monitoring and analysis of integrated circuits and electronic systems in relation to hardware trojans
3. 11736501 - Method, system, and apparatus for security assurance, protection, monitoring and analysis of integrated circuits and electronic systems using machine learning instruments and machine learning analysis
4. 11693052 - Using embedded time-varying code generator to provide secure access to embedded content in an on-chip access architecture
5. 11681795 - Method, system and apparatus for security assurance, protection, monitoring and analysis of integrated circuits and electronic systems in relation to hardware trojans
6. 11333706 - Using embedded time-varying code generator to provide secure access to embedded content in an on chip access architecture
7. 11277419 - Method, system, and apparatus for verification of operation using GPS receiver input within integrated circuits and electronic systems using an operation navigation system
8. 11157619 - Method and system for selection of location for placement of trojans, triggers and instruments within integrated circuits and electronic systems using contributory operation analysis
9. 10909284 - Method and system for selection of location for placement of trojans, triggers and instruments within integrated circuits and electronic systems using weighted controllability and observability analysis
10. 10690718 - Using embedded time-varying code generator to provide secure access to embedded content in an on chip access architecture
11. 9811690 - Protecting hidden content in integrated circuits
12. 9305186 - Protection of proprietary embedded instruments
13. 8881301 - Protection of proprietary embedded instruments
14. 8615691 - Process for improving design-limited yield by localizing potential faults from production test data
15. 8060851 - Method for operating a secure semiconductor IP server to support failure analysis