Growing community of inventors

Tel Aviv, Israel

Matilda Lidgi

Average Co-Inventor Count = 4.16

ph-index = 1

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 1

Matilda LidgiRoy Reznik (9 patents)Matilda LidgiShai Keren (8 patents)Matilda LidgiAmi Luttwak (6 patents)Matilda LidgiRaaz Herzberg (6 patents)Matilda LidgiAvi Tal Lichtenstein (5 patents)Matilda LidgiEliran Marom (3 patents)Matilda LidgiLiron Levin (2 patents)Matilda LidgiAvihai Berkovitz (1 patent)Matilda LidgiAmitai Cohen (1 patent)Matilda LidgiRotem Lipowitch (1 patent)Matilda LidgiRon David Ben Arzi (1 patent)Matilda LidgiDanielle Aminov (1 patent)Matilda LidgiArik Schimmel (1 patent)Matilda LidgiMatilda Lidgi (12 patents)Roy ReznikRoy Reznik (65 patents)Shai KerenShai Keren (25 patents)Ami LuttwakAmi Luttwak (104 patents)Raaz HerzbergRaaz Herzberg (19 patents)Avi Tal LichtensteinAvi Tal Lichtenstein (25 patents)Eliran MaromEliran Marom (3 patents)Liron LevinLiron Levin (4 patents)Avihai BerkovitzAvihai Berkovitz (19 patents)Amitai CohenAmitai Cohen (11 patents)Rotem LipowitchRotem Lipowitch (1 patent)Ron David Ben ArziRon David Ben Arzi (1 patent)Danielle AminovDanielle Aminov (1 patent)Arik SchimmelArik Schimmel (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Wiz, Inc. (12 from 143 patents)


12 patents:

1. 12470571 - Near-real time dynamic cybersecurity inspection techniques

2. 12464011 - Techniques for prioritizing cybersecurity remediation actions based on a data risk score

3. 12452293 - Detection of stale data objects and associated cybersecurity risk

4. 12443720 - Techniques for detecting applications paths utilizing exposure analysis

5. 12395503 - System and method for detecting sensitive data in active inspection of cloud computing resources

6. 12395489 - Techniques for active inspection of cloud computing applications utilizing optical character recognition

7. 12395488 - Techniques for analyzing external exposure in cloud environments

8. 12284220 - System and method for applying a policy on a network path

9. 12267326 - Techniques for detecting resources without authentication using exposure analysis

10. 12244627 - Techniques for active inspection of vulnerability exploitation using exposure

11. 12170682 - Application endpoint cybersecurity techniques

12. 11936693 - System and method for applying a policy on a network path

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/24/2025
Loading…