Growing community of inventors

Roudnice Nad Labem, Czechia

Jan Kohout

Average Co-Inventor Count = 3.86

ph-index = 5

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 77

Jan KohoutMartin Kopp (13 patents)Jan KohoutMartin Grill (11 patents)Jan KohoutTomas Pevny (8 patents)Jan KohoutDavid A McGrew (4 patents)Jan KohoutBlake Harrell Anderson (4 patents)Jan KohoutLukas Bajer (4 patents)Jan KohoutMartin Rehak (3 patents)Jan KohoutJan Brabec (3 patents)Jan KohoutCenek Skarda (3 patents)Jan KohoutPetr Somol (2 patents)Jan KohoutJan Jusko (2 patents)Jan KohoutDanila Khikhlukha (2 patents)Jan KohoutMarc René Jacques Marie Dupont (2 patents)Jan KohoutMartin Vejman (1 patent)Jan KohoutKyrylo Shcherbin (1 patent)Jan KohoutDavid Mcgrew (2 patents)Jan KohoutJaroslav Hlavac (1 patent)Jan KohoutLukas Bajer (1 patent)Jan KohoutTornas Pevny (1 patent)Jan KohoutJan Mrkos (1 patent)Jan KohoutJan Kohout (19 patents)Martin KoppMartin Kopp (21 patents)Martin GrillMartin Grill (22 patents)Tomas PevnyTomas Pevny (23 patents)David A McGrewDavid A McGrew (151 patents)Blake Harrell AndersonBlake Harrell Anderson (84 patents)Lukas BajerLukas Bajer (5 patents)Martin RehakMartin Rehak (20 patents)Jan BrabecJan Brabec (11 patents)Cenek SkardaCenek Skarda (4 patents)Petr SomolPetr Somol (12 patents)Jan JuskoJan Jusko (12 patents)Danila KhikhlukhaDanila Khikhlukha (4 patents)Marc René Jacques Marie DupontMarc René Jacques Marie Dupont (2 patents)Martin VejmanMartin Vejman (9 patents)Kyrylo ShcherbinKyrylo Shcherbin (2 patents)David McgrewDavid Mcgrew (2 patents)Jaroslav HlavacJaroslav Hlavac (1 patent)Lukas BajerLukas Bajer (1 patent)Tornas PevnyTornas Pevny (1 patent)Jan MrkosJan Mrkos (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Cisco Technology, Inc. (19 from 20,333 patents)


19 patents:

1. 12160429 - Learning of malicious behavior vocabulary and threat detection through behavior matching

2. 11985154 - Comprehensible threat detection

3. 11936683 - Analyzing encrypted traffic behavior using contextual traffic data

4. 11750621 - Learning of malicious behavior vocabulary and threat detection through behavior matching

5. 11451578 - Analyzing encrypted traffic behavior using contextual traffic data

6. 11245675 - Device detection in network telemetry with TLS fingerprinting

7. 11019095 - Ransomware detection using file replication logs

8. 10965704 - Identifying self-signed certificates using HTTP access logs for malware detection

9. 10855698 - Leveraging endpoint and network environment inferences for malware traffic classification

10. 10805338 - Analyzing encrypted traffic behavior using contextual traffic data

11. 10805377 - Client device tracking

12. 10749770 - Classification of IoT devices based on their network traffic

13. 10491614 - Illegitimate typosquatting detection with internet protocol information

14. 10425434 - Statistical fingerprinting of network traffic

15. 10375097 - Identifying self-signed certificates using HTTP access logs for malware detection

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/6/2025
Loading…