Growing community of inventors

Mountain View, CA, United States of America

Harish Kumar Bharat Singh

Average Co-Inventor Count = 4.02

ph-index = 5

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 307

Harish Kumar Bharat SinghVikram Kapoor (24 patents)Harish Kumar Bharat SinghYijou Chen (20 patents)Harish Kumar Bharat SinghMurat Bog (11 patents)Harish Kumar Bharat SinghTheron D Tock (8 patents)Harish Kumar Bharat SinghVimalkumar Jeyakumar (8 patents)Harish Kumar Bharat SinghYing Xie (8 patents)Harish Kumar Bharat SinghWeifei Zeng (8 patents)Harish Kumar Bharat SinghSamuel Joseph Pullara, Iii (3 patents)Harish Kumar Bharat SinghTrevor A Welsh (1 patent)Harish Kumar Bharat SinghHarish Kumar Bharat Singh (24 patents)Vikram KapoorVikram Kapoor (94 patents)Yijou ChenYijou Chen (94 patents)Murat BogMurat Bog (24 patents)Theron D TockTheron D Tock (45 patents)Vimalkumar JeyakumarVimalkumar Jeyakumar (31 patents)Ying XieYing Xie (28 patents)Weifei ZengWeifei Zeng (11 patents)Samuel Joseph Pullara, IiiSamuel Joseph Pullara, Iii (10 patents)Trevor A WelshTrevor A Welsh (2 patents)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Lacework Inc. (18 from 45 patents)

2. Fortinet, Inc. (6 from 1,002 patents)


24 patents:

1. 12463994 - Handling of certificates by intermediate actors

2. 12463995 - Tiered risk engine with user cohorts

3. 12368747 - Using a logical graph to monitor an environment

4. 12309181 - Establishing a location profile for a user device

5. 12244621 - Using activity monitored by multiple data sources to identify shadow systems

6. 12120140 - Detecting threats against computing resources based on user behavior changes

7. 12032634 - Graph reclustering based on different clustering criteria

8. 12034750 - Tracking of user login sessions

9. 11991198 - User-specific data-driven network security

10. 11979422 - Elastic privileges in a secure access service edge

11. 11954130 - Alerting based on pod communication-based logical graph

12. 11916947 - Generating user-specific polygraphs for network activity

13. 11909752 - Detecting deviations from typical user behavior

14. 11895135 - Detecting anomalous behavior of a device

15. 11831668 - Using a logical graph to model activity in a network environment

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/4/2025
Loading…