Growing community of inventors

Hopkinton, MA, United States of America

Peter Ashley

Average Co-Inventor Count = 1.44

ph-index = 8

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 514

Peter AshleyShireen Rivera (3 patents)Peter AshleyMichael Andrew Hart (2 patents)Peter AshleyDarrell Kienzle (2 patents)Peter AshleyQuentin Liu (1 patent)Peter AshleyPiyush Sharma (1 patent)Peter AshleyHari Veladanda (1 patent)Peter AshleyScott G Wasson (1 patent)Peter AshleyJacob J Vos (1 patent)Peter AshleyGeorge Tomic (1 patent)Peter AshleyKevin McBride (1 patent)Peter AshleyIgor Moochnick (1 patent)Peter AshleyPeter Ashley (16 patents)Shireen RiveraShireen Rivera (4 patents)Michael Andrew HartMichael Andrew Hart (42 patents)Darrell KienzleDarrell Kienzle (12 patents)Quentin LiuQuentin Liu (16 patents)Piyush SharmaPiyush Sharma (11 patents)Hari VeladandaHari Veladanda (8 patents)Scott G WassonScott G Wasson (6 patents)Jacob J VosJacob J Vos (2 patents)George TomicGeorge Tomic (2 patents)Kevin McBrideKevin McBride (1 patent)Igor MoochnickIgor Moochnick (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Symantec Corporation (15 from 3,063 patents)

2. Other (1 from 832,812 patents)


16 patents:

1. 9830458 - Discovery and classification of enterprise assets via host characteristics

2. 9736178 - Systems and methods for detecting suspicious internet addresses

3. 9692772 - Detection of malware using time spans and periods of activity for network requests

4. 9639693 - Techniques for detecting a security vulnerability

5. 9501649 - Systems and methods for determining potential impacts of applications on the security of computing systems

6. 9444829 - Systems and methods for protecting computing resources based on logical data models

7. 9419986 - System to identify machines infected by malware applying linguistic analysis to network requests from endpoints

8. 9418222 - Techniques for detecting advanced security threats

9. 9384336 - Systems and methods for modifying security based on reputation information

10. 9332022 - Systems and methods for detecting suspicious internet addresses

11. 9258269 - Methods and systems for managing delivery of email to local recipients using local reputations

12. 9065849 - Systems and methods for determining trustworthiness of software programs

13. 8650245 - Systems and methods for providing adaptive views of domain name system reputation data

14. 8601577 - Using configured error codes to enable spam blocking downstream from a mail transfer agent

15. 8214490 - Compact input compensating reputation data tracking mechanism

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/18/2025
Loading…