Growing community of inventors

Heidelberg, Germany

Paul El Khoury

Average Co-Inventor Count = 1.95

ph-index = 5

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 350

Paul El KhouryJuergen Schneider (3 patents)Paul El KhouryAzzedine Benameur (3 patents)Paul El KhouryRobert Lorch (2 patents)Paul El KhouryOliver Kling (2 patents)Paul El KhourySami Lechner (2 patents)Paul El KhouryCedric S P Ulmer (1 patent)Paul El KhouryMark Thomas Schuette (1 patent)Paul El KhourySmriti Kumar Sinha (1 patent)Paul El KhouryPeter Fach (1 patent)Paul El KhouryLi Dong (0 patent)Paul El KhouryChang Liu (0 patent)Paul El KhouryChu Yunxiao Zhong (0 patent)Paul El KhouryNicolas Rousseau (0 patent)Paul El KhouryJürgen Schneider (0 patent)Paul El KhouryPaul El Khoury (13 patents)Juergen SchneiderJuergen Schneider (17 patents)Azzedine BenameurAzzedine Benameur (4 patents)Robert LorchRobert Lorch (7 patents)Oliver KlingOliver Kling (4 patents)Sami LechnerSami Lechner (2 patents)Cedric S P UlmerCedric S P Ulmer (6 patents)Mark Thomas SchuetteMark Thomas Schuette (2 patents)Smriti Kumar SinhaSmriti Kumar Sinha (2 patents)Peter FachPeter Fach (1 patent)Li DongLi Dong (0 patent)Chang LiuChang Liu (0 patent)Chu Yunxiao ZhongChu Yunxiao Zhong (0 patent)Nicolas RousseauNicolas Rousseau (0 patent)Jürgen SchneiderJürgen Schneider (0 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Sap Se (9 from 5,892 patents)

2. Sap Ag (4 from 3,607 patents)


13 patents:

1. 10523695 - Threat modeling tool using machine learning

2. 10055558 - Telecommunication method for authenticating a user

3. 10044722 - Behavioral multi-level adaptive authorization mechanisms

4. 9985945 - Spoofing protection protocol for network-connected things

5. 9760710 - Password recovering for mobile applications

6. 9331995 - Secure configuration of mobile application

7. 9317715 - Data protection compliant deletion of personally identifiable information

8. 9075978 - Secure configuration of mobile applications

9. 8935538 - Enhancing useability of mobile devices that securely store data

10. 8640208 - Authentication enforcement at resource level

11. 8555085 - Enhancing useability of mobile devices that securely store data

12. 8527954 - Method for automatically creating a behavior pattern of a computer program for model-based testing techniques

13. 8495744 - Evaluation of risk of conflict for security solutions integration

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/8/2025
Loading…