Growing community of inventors

Sunnyvale, CA, United States of America

Govind Salinas

Average Co-Inventor Count = 3.78

ph-index = 11

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 354

Govind SalinasSourabh Satish (67 patents)Govind SalinasAtif Mahadik (53 patents)Govind SalinasOliver Friedrichs (46 patents)Govind SalinasRobert John Truesdell (6 patents)Govind SalinasGlenn Gallien (5 patents)Govind SalinasTrenton John Beals (5 patents)Govind SalinasRyan Russell (4 patents)Govind SalinasRyan Connor Means (3 patents)Govind SalinasZulfikar Ramzan (1 patent)Govind SalinasMatthew Conover (1 patent)Govind SalinasBrian Robert Earle (1 patent)Govind SalinasVincent Cheong (1 patent)Govind SalinasGovind Salinas (67 patents)Sourabh SatishSourabh Satish (272 patents)Atif MahadikAtif Mahadik (61 patents)Oliver FriedrichsOliver Friedrichs (59 patents)Robert John TruesdellRobert John Truesdell (7 patents)Glenn GallienGlenn Gallien (8 patents)Trenton John BealsTrenton John Beals (8 patents)Ryan RussellRyan Russell (4 patents)Ryan Connor MeansRyan Connor Means (5 patents)Zulfikar RamzanZulfikar Ramzan (60 patents)Matthew ConoverMatthew Conover (49 patents)Brian Robert EarleBrian Robert Earle (1 patent)Vincent CheongVincent Cheong (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Splunk Inc. (57 from 1,852 patents)

2. Phantom Cyber Corporation (5 from 5 patents)

3. Symantec Corporation (3 from 3,063 patents)

4. Splunkinc. (2 from 33 patents)


67 patents:

1. 12375522 - Managing security actions in a computing environment using enrichment information

2. 12363158 - Generating action recommendations based on attributes associated with incidents used for incident response

3. 12074901 - Security action verification in a computing network

4. 12045201 - Automatically configuring connectors of an information technology and security operations application

5. 12047407 - Managing security actions in a computing environment based on movement of a security threat

6. 12039046 - Generating suggested courses of actions for incidents based on previous incident handling

7. 12028222 - Obtaining simulated results for a course of action executed in an information technology environment

8. 11995571 - Determination of decision step logic for incident response in an information technology environment

9. 11895143 - Providing action recommendations based on action effectiveness across information technology environments

10. 11870802 - Identifying automated responses to security threats based on communication interactions content

11. 11863583 - Generating action recommendations for courses of action used for incident response

12. 11811587 - Generating incident response action flows using anonymized action implementation data

13. 11805148 - Modifying incident response time periods based on incident volume

14. 11784996 - Runtime credential requirement identification for incident response

15. 11765198 - Selecting actions responsive to computing environment incidents based on severity rating

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/24/2025
Loading…