Growing community of inventors

Tel Aviv, Israel

Asaf Hecht

Average Co-Inventor Count = 1.50

ph-index = 6

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 123

Asaf HechtOmer Tsarfati (5 patents)Asaf HechtMichael Balber (4 patents)Asaf HechtHadas Elkabir (3 patents)Asaf HechtTal Kandel (2 patents)Asaf HechtLavi Lazarovitz (2 patents)Asaf HechtMark Cherp (2 patents)Asaf HechtNir Chako (2 patents)Asaf HechtOmar Tsarfati (2 patents)Asaf HechtNiv Rabin (1 patent)Asaf HechtKobi Ben Naim (1 patent)Asaf HechtNoa Moyal (1 patent)Asaf HechtShaked Reiner (1 patent)Asaf HechtOr Ben-Porath (1 patent)Asaf HechtGal Naor (1 patent)Asaf HechtEmmanuel Ouanounou (1 patent)Asaf HechtAsaf Hecht (36 patents)Omer TsarfatiOmer Tsarfati (5 patents)Michael BalberMichael Balber (11 patents)Hadas ElkabirHadas Elkabir (9 patents)Tal KandelTal Kandel (13 patents)Lavi LazarovitzLavi Lazarovitz (13 patents)Mark CherpMark Cherp (4 patents)Nir ChakoNir Chako (4 patents)Omar TsarfatiOmar Tsarfati (2 patents)Niv RabinNiv Rabin (4 patents)Kobi Ben NaimKobi Ben Naim (2 patents)Noa MoyalNoa Moyal (2 patents)Shaked ReinerShaked Reiner (1 patent)Or Ben-PorathOr Ben-Porath (1 patent)Gal NaorGal Naor (1 patent)Emmanuel OuanounouEmmanuel Ouanounou (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Cyberark Software Ltd. (36 from 164 patents)


36 patents:

1. 12363096 - Authentication credential with embedded authentication information

2. 12289334 - Analyzing and addressing security threats in network resources

3. 12255889 - Detecting and preventing unauthorized credential change

4. 12143411 - On-demand and proactive detection of application misconfiguration security threats

5. 12028366 - Dynamically generating multi-factor entity risk assessments within virtualized environments

6. 11997197 - Push architecture for secure provision of secrets

7. 11941109 - Customizable and dynamically mutable operating systems

8. 11822670 - Security risk assessment and control for code

9. 11743032 - Identity-based security layer for peripheral computing devices

10. 11716326 - Protections against security vulnerabilities associated with temporary access tokens

11. 11609780 - Recovery of state, configuration, and content for virtualized instances

12. 11323470 - Analyzing and addressing least-privilege security threats on a composite basis

13. 11316857 - Automated creation of dynamic privileged access resources

14. 11269787 - End-to-end secure lifecycle of secrets with minimal footprint

15. 11258590 - Coordinated management of cryptographic keys for communication with peripheral devices

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/31/2025
Loading…