Growing community of inventors

Beer Sheva, Israel

Stav Sapir

Average Co-Inventor Count = 3.12

ph-index = 2

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 7

Stav SapirJehuda Shemer (12 patents)Stav SapirMaxim Balin (12 patents)Stav SapirNaor Radami (12 patents)Stav SapirKfir Wolfson (5 patents)Stav SapirIgor Dubrovsky (4 patents)Stav SapirAmos Zamir (4 patents)Stav SapirRoman Bober (4 patents)Stav SapirAmihai Savir (3 patents)Stav SapirAmihai Savir (2 patents)Stav SapirBoris Shpilyuck (2 patents)Stav SapirBradley K Goodman (2 patents)Stav SapirJoseph Caisse (2 patents)Stav SapirArieh Don (1 patent)Stav SapirChing-Yun Chao (1 patent)Stav SapirMuzhar S Khokhar (1 patent)Stav SapirEric Joseph Bruno (1 patent)Stav SapirShoham Levy (1 patent)Stav SapirYair Yotam (1 patent)Stav SapirStav Sapir (30 patents)Jehuda ShemerJehuda Shemer (259 patents)Maxim BalinMaxim Balin (78 patents)Naor RadamiNaor Radami (14 patents)Kfir WolfsonKfir Wolfson (70 patents)Igor DubrovskyIgor Dubrovsky (29 patents)Amos ZamirAmos Zamir (17 patents)Roman BoberRoman Bober (15 patents)Amihai SavirAmihai Savir (40 patents)Amihai SavirAmihai Savir (87 patents)Boris ShpilyuckBoris Shpilyuck (62 patents)Bradley K GoodmanBradley K Goodman (47 patents)Joseph CaisseJoseph Caisse (30 patents)Arieh DonArieh Don (348 patents)Ching-Yun ChaoChing-Yun Chao (96 patents)Muzhar S KhokharMuzhar S Khokhar (48 patents)Eric Joseph BrunoEric Joseph Bruno (25 patents)Shoham LevyShoham Levy (5 patents)Yair YotamYair Yotam (2 patents)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Dell Products Inc. (21 from 13,152 patents)

2. Emc IP Holding Company LLC (8 from 7,361 patents)

3. Dell & Products L.p. (1 from 91 patents)


30 patents:

1. 12511419 - Access control using policy-based dynamic context evaluation

2. 12493529 - Edge computing-enhanced system for business priority-based resource allocation

3. 12483585 - System and method for identifying security threats based on standard compliance failures and infrastructure conditions

4. 12476946 - Securing sensitive data in edge devices using steganography

5. 12470536 - Inter-domain access using identity provider

6. 12470589 - Systems and methods for risk assessment of user accesses to data resources

7. 12463974 - Securing blueprints for implementation in edge devices

8. 12452032 - Managing access to sensitive information

9. 12443743 - Dynamic cross-standard compliance coverage

10. 12443729 - Executing commands on air-gapped computer systems

11. 12443479 - Managing operational functionality of far edge devices using log data

12. 12401692 - System and method for quantification of standard compliance and risk tolerance to select remediation

13. 12379917 - Securing serverless computing workloads in a cold start

14. 12368578 - Secret management in distributed systems using passphrases

15. 12355806 - Kubernetes security isolation based on classified information and risk levels

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/17/2026
Loading…