Growing community of inventors

Austin, TX, United States of America

David Endler

Average Co-Inventor Count = 2.57

ph-index = 3

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 20

David EndlerAlen Puzic (10 patents)David EndlerEdward Ross (9 patents)David EndlerRohit Dhamankar (1 patent)David EndlerNick Brands (1 patent)David EndlerPedram Amini (1 patent)David EndlerJacob Wagh (1 patent)David EndlerDavid Endler (13 patents)Alen PuzicAlen Puzic (10 patents)Edward RossEdward Ross (13 patents)Rohit DhamankarRohit Dhamankar (1 patent)Nick BrandsNick Brands (1 patent)Pedram AminiPedram Amini (1 patent)Jacob WaghJacob Wagh (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Spycloud, Inc. (12 from 12 patents)

2. Avast Software A.s. (1 from 1 patent)


13 patents:

1. 12462051 - User identity risk score generation in an enterprise network

2. 12437079 - Browser session security system

3. 12432197 - Filtering passwords based on a plurality of criteria

4. 12166794 - Detecting use of compromised security credentials in private enterprise networks

5. 12093375 - Generating and monitoring fictitious data entries to detect breaches

6. 11888843 - Filtering passwords based on a plurality of criteria

7. 11750645 - Detecting use of compromised security credentials in private enterprise networks

8. 11558409 - Detecting use of passwords that appear in a repository of breached credentials

9. 11461458 - Measuring data-breach propensity

10. 11438360 - Determining the intersection of a set of compromised credentials with a set of active credentials with data structures and architectures that expedite comparisons

11. 11399021 - Filtering passwords based on a plurality of criteria

12. 11283832 - Detecting use of compromised security credentials in private enterprise networks

13. 8812832 - Method and system of using a non-native operating system for scanning and modifying system configuration data of a native operating system

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/12/2025
Loading…