Growing community of inventors

Cupertino, CA, United States of America

Deb Banerjee

Average Co-Inventor Count = 1.23

ph-index = 12

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 1,417

Deb BanerjeeKarthik Kannan (5 patents)Deb BanerjeeMackenzie Kyle (2 patents)Deb BanerjeeJeswanth Manikonda (2 patents)Deb BanerjeeKevin Gonzalez (2 patents)Deb BanerjeeSanjay Sawhney (1 patent)Deb BanerjeeSharada Sundaram (1 patent)Deb BanerjeeSatheesh Kumar Joseph Durairaj (1 patent)Deb BanerjeeBenjamin Arnold (1 patent)Deb BanerjeeSusan Hassall (1 patent)Deb BanerjeeSteven Albert Vranyes (1 patent)Deb BanerjeeSheetal Venkatesh Yelimeli (1 patent)Deb BanerjeeSmita Gadre (1 patent)Deb BanerjeeDeb Banerjee (30 patents)Karthik KannanKarthik Kannan (8 patents)Mackenzie KyleMackenzie Kyle (5 patents)Jeswanth ManikondaJeswanth Manikonda (5 patents)Kevin GonzalezKevin Gonzalez (2 patents)Sanjay SawhneySanjay Sawhney (26 patents)Sharada SundaramSharada Sundaram (15 patents)Satheesh Kumar Joseph DurairajSatheesh Kumar Joseph Durairaj (6 patents)Benjamin ArnoldBenjamin Arnold (4 patents)Susan HassallSusan Hassall (2 patents)Steven Albert VranyesSteven Albert Vranyes (2 patents)Sheetal Venkatesh YelimeliSheetal Venkatesh Yelimeli (1 patent)Smita GadreSmita Gadre (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Symantec Corporation (25 from 3,063 patents)

2. Anvilogic, Inc. (5 from 5 patents)

3. Ca, Inc. (1,401 patents)


30 patents:

1. 12107869 - Automated quantified assessment, recommendations and mitigation actions for enterprise level security operations

2. 11736527 - Multi-system security monitoring configuration distribution

3. 11399041 - System for determining rules for detecting security threats

4. 11290483 - Platform for developing high efficacy detection content

5. 11055652 - System for sharing detection logic through a cloud-based exchange platform

6. 10291654 - Automated construction of network whitelists using host-based security controls

7. 10171483 - Utilizing endpoint asset awareness for network intrusion detection

8. 9880757 - Copy data management with data security

9. 9813418 - Method and system for visibility and control over access transactions between clouds using resource authorization messages

10. 9794289 - Applying security policies based on context of a workload

11. 9705923 - Method and apparatus for automating security provisioning of workloads

12. 9699141 - Method and apparatus for integrating security context in network routing decisions

13. 9690925 - Consumption control of protected cloud resources by open authentication-based applications in end user devices

14. 9461984 - Systems and methods for blocking flanking attacks on computing systems

15. 9448826 - Enforcing policy-based compliance of virtual machine image configurations

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/7/2025
Loading…