Growing community of inventors

San Jose, CA, United States of America

Karl Matthew Lynn

Average Co-Inventor Count = 3.71

ph-index = 2

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 7

Karl Matthew LynnNicolas Beauchesne (6 patents)Karl Matthew LynnWilliam Stow Finlayson, Iv (4 patents)Karl Matthew LynnSohrob Kazerounian (3 patents)Karl Matthew LynnRyan Prenger (2 patents)Karl Matthew LynnOliver Kourosh Tavakoli (1 patent)Karl Matthew LynnOskar Ibatullin (1 patent)Karl Matthew LynnDavid Lopes Pegna (1 patent)Karl Matthew LynnWilliam Stow Finlayson Iv (0 patent)Karl Matthew LynnRyan James Prenger (0 patent)Karl Matthew LynnKarl Matthew Lynn (7 patents)Nicolas BeauchesneNicolas Beauchesne (18 patents)William Stow Finlayson, IvWilliam Stow Finlayson, Iv (4 patents)Sohrob KazerounianSohrob Kazerounian (6 patents)Ryan PrengerRyan Prenger (10 patents)Oliver Kourosh TavakoliOliver Kourosh Tavakoli (11 patents)Oskar IbatullinOskar Ibatullin (9 patents)David Lopes PegnaDavid Lopes Pegna (5 patents)William Stow Finlayson IvWilliam Stow Finlayson Iv (0 patent)Ryan James PrengerRyan James Prenger (0 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Vectra Ai, Inc. (4 from 9 patents)

2. Vectra Networks, Inc. (3 from 16 patents)


7 patents:

1. 12477001 - Method, product, and system for analyzing attack paths in computer network generated using a software representation that embodies network configuration and policy data for security management

2. 12328322 - Method, product, and system for network security management using software representation that embodies network configuration and policy data

3. 12219070 - Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates

4. 12212585 - Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management

5. 9853988 - Method and system for detecting threats using metadata vectors

6. 9628512 - Malicious relay detection on networks

7. 9565208 - System and method for detecting network intrusions using layered host scoring

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/8/2025
Loading…