Growing community of inventors

Linz, Austria

Andreas Berger

Average Co-Inventor Count = 3.97

ph-index = 3

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 28

Andreas BergerKenneth D Ray (11 patents)Andreas BergerHarald Schütz (10 patents)Andreas BergerAnthony John Merry (8 patents)Andreas BergerAndrew James Thomas (4 patents)Andreas BergerRussell Humphries (4 patents)Andreas BergerJohn Edward Tyrone Shaw (4 patents)Andreas BergerChristian Schwarzbauer (3 patents)Andreas BergerMark David Harris (2 patents)Andreas BergerGordon Sullivan (2 patents)Andreas BergerStefan Ortner (1 patent)Andreas BergerMarkus Hein (1 patent)Andreas BergerGerald Wintersberger (1 patent)Andreas BergerVincent Vanbiervliet (1 patent)Andreas BergerNorbert Gruber (1 patent)Andreas BergerArtur Wenzel (1 patent)Andreas BergerAndreas Berger (14 patents)Kenneth D RayKenneth D Ray (175 patents)Harald SchützHarald Schütz (17 patents)Anthony John MerryAnthony John Merry (12 patents)Andrew James ThomasAndrew James Thomas (134 patents)Russell HumphriesRussell Humphries (43 patents)John Edward Tyrone ShawJohn Edward Tyrone Shaw (13 patents)Christian SchwarzbauerChristian Schwarzbauer (9 patents)Mark David HarrisMark David Harris (55 patents)Gordon SullivanGordon Sullivan (2 patents)Stefan OrtnerStefan Ortner (9 patents)Markus HeinMarkus Hein (3 patents)Gerald WintersbergerGerald Wintersberger (3 patents)Vincent VanbiervlietVincent Vanbiervliet (1 patent)Norbert GruberNorbert Gruber (1 patent)Artur WenzelArtur Wenzel (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Sophos Limited (11 from 366 patents)

2. Dynatrace Corporation (3 from 72 patents)


14 patents:

1. 12189786 - Method and system for data flow monitoring to identify application security vulnerabilities and to detect and prevent attacks

2. 12072984 - Method and system for real time detection and prioritization of computing assets affected by publicly known vulnerabilities based on topological and transactional monitoring data

3. 11886599 - Method and system for data flow monitoring to identify application security vulnerabilities and to detect and prevent attacks

4. 11716351 - Intrusion detection with honeypot keys

5. 11089056 - Intrusion detection with honeypot keys

6. 10834061 - Perimeter enforcement of encryption rules

7. 10791097 - Portable encryption format

8. 10691824 - Behavioral-based control of access to encrypted content by a process

9. 10686827 - Intermediate encryption for exposed content

10. 10657277 - Behavioral-based control of access to encrypted content by a process

11. 10650154 - Process-level control of encrypted content

12. 10628597 - Just-in-time encryption

13. 10263966 - Perimeter enforcement of encryption rules

14. 9984248 - Behavioral-based control of access to encrypted content by a process

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/4/2026
Loading…