Growing community of inventors

Seattle, WA, United States of America

Mikhail Davidov

Average Co-Inventor Count = 3.80

ph-index = 1

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 6

Mikhail DavidovFabio Rodolfo Maino (2 patents)Mikhail DavidovAlberto Rodriguez Natal (2 patents)Mikhail DavidovLorand Jakab (2 patents)Mikhail DavidovPatrick Stach (2 patents)Mikhail DavidovRichard James Smith (2 patents)Mikhail DavidovFalcon Momot (1 patent)Mikhail DavidovJeremy Lee Erickson (1 patent)Mikhail DavidovJordan Matthew Wright (1 patent)Mikhail DavidovNicholas James Mooney (1 patent)Mikhail DavidovDarren Kemp (1 patent)Mikhail DavidovNicholas Hamilton Steele (1 patent)Mikhail DavidovBradford Pielech (1 patent)Mikhail DavidovMikhail Davidov (5 patents)Fabio Rodolfo MainoFabio Rodolfo Maino (84 patents)Alberto Rodriguez NatalAlberto Rodriguez Natal (26 patents)Lorand JakabLorand Jakab (6 patents)Patrick StachPatrick Stach (4 patents)Richard James SmithRichard James Smith (3 patents)Falcon MomotFalcon Momot (6 patents)Jeremy Lee EricksonJeremy Lee Erickson (5 patents)Jordan Matthew WrightJordan Matthew Wright (5 patents)Nicholas James MooneyNicholas James Mooney (3 patents)Darren KempDarren Kemp (2 patents)Nicholas Hamilton SteeleNicholas Hamilton Steele (2 patents)Bradford PielechBradford Pielech (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Cisco Technology, Inc. (3 from 20,333 patents)

2. Leviathan Security Group, Inc. (2 from 6 patents)


5 patents:

1. 11777917 - Multi-party cloud authenticator

2. 11647019 - Systems and methods for providing security orchestration for trusted traffic segmentation on untrusted devices

3. 11233743 - Extending enterprise trusted policy framework to cloud native applications

4. 10606965 - System and method for emulation of unprivileged code in a simulated environment

5. 10242190 - System and method for detection of malicious code by iterative emulation of microcode

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/4/2025
Loading…