Growing community of inventors

Kessel-lo, Belgium

Anthony John Merry

Average Co-Inventor Count = 5.78

ph-index = 4

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 60

Anthony John MerryKenneth D Ray (12 patents)Anthony John MerryHarald Schütz (12 patents)Anthony John MerryAndreas Berger (8 patents)Anthony John MerryAndrew James Thomas (6 patents)Anthony John MerryJohn Edward Tyrone Shaw (6 patents)Anthony John MerryRussell Humphries (4 patents)Anthony John MerryMark David Harris (2 patents)Anthony John MerryDaniel Salvatore Schiappa (2 patents)Anthony John MerrySimon Neil Reed (2 patents)Anthony John MerryNeil Robert Tyndale Watkiss (2 patents)Anthony John MerryRobert Wendell Cook (2 patents)Anthony John MerryGordon Sullivan (2 patents)Anthony John MerryMarkus Hein (1 patent)Anthony John MerryGerald Wintersberger (1 patent)Anthony John MerryNorbert Gruber (1 patent)Anthony John MerryArtur Wenzel (1 patent)Anthony John MerryAnthony John Merry (12 patents)Kenneth D RayKenneth D Ray (175 patents)Harald SchützHarald Schütz (17 patents)Andreas BergerAndreas Berger (14 patents)Andrew James ThomasAndrew James Thomas (134 patents)John Edward Tyrone ShawJohn Edward Tyrone Shaw (13 patents)Russell HumphriesRussell Humphries (43 patents)Mark David HarrisMark David Harris (55 patents)Daniel Salvatore SchiappaDaniel Salvatore Schiappa (29 patents)Simon Neil ReedSimon Neil Reed (22 patents)Neil Robert Tyndale WatkissNeil Robert Tyndale Watkiss (18 patents)Robert Wendell CookRobert Wendell Cook (12 patents)Gordon SullivanGordon Sullivan (2 patents)Markus HeinMarkus Hein (3 patents)Gerald WintersbergerGerald Wintersberger (3 patents)Norbert GruberNorbert Gruber (1 patent)Artur WenzelArtur Wenzel (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Sophos Limited (12 from 364 patents)


12 patents:

1. 10979449 - Key throttling to mitigate unauthorized file access

2. 10834061 - Perimeter enforcement of encryption rules

3. 10691824 - Behavioral-based control of access to encrypted content by a process

4. 10686827 - Intermediate encryption for exposed content

5. 10681078 - Key throttling to mitigate unauthorized file access

6. 10657277 - Behavioral-based control of access to encrypted content by a process

7. 10650154 - Process-level control of encrypted content

8. 10628597 - Just-in-time encryption

9. 10558800 - Labeling objects on an endpoint for encryption management

10. 10263966 - Perimeter enforcement of encryption rules

11. 9984248 - Behavioral-based control of access to encrypted content by a process

12. 9965627 - Labeling objects on an endpoint for encryption management

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/27/2025
Loading…