Growing community of inventors

Santa Clara, CA, United States of America

Tao Yan

Average Co-Inventor Count = 4.32

ph-index = 3

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 52

Tao YanBo Qu (9 patents)Tao YanJiangxia Liu (5 patents)Tao YanJin Chen (4 patents)Tao YanTaojie Wang (3 patents)Tao YanChienHua Lu (2 patents)Tao YanZhibin Zhang (2 patents)Tao YanZhanglin He (2 patents)Tao YanRoyce Lu (1 patent)Tao YanEdouard Bochin (1 patent)Tao YanEdouard Bochin (1 patent)Tao YanMichael Harbison (1 patent)Tao YanMengying Hu (1 patent)Tao YanYue Guan (1 patent)Tao YanChienhua Lu (1 patent)Tao YanTao Yan (10 patents)Bo QuBo Qu (24 patents)Jiangxia LiuJiangxia Liu (22 patents)Jin ChenJin Chen (5 patents)Taojie WangTaojie Wang (5 patents)ChienHua LuChienHua Lu (11 patents)Zhibin ZhangZhibin Zhang (5 patents)Zhanglin HeZhanglin He (4 patents)Royce LuRoyce Lu (1 patent)Edouard BochinEdouard Bochin (1 patent)Edouard BochinEdouard Bochin (1 patent)Michael HarbisonMichael Harbison (1 patent)Mengying HuMengying Hu (1 patent)Yue GuanYue Guan (1 patent)Chienhua LuChienhua Lu (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Palo Alto Networks, Inc. (10 from 716 patents)


10 patents:

1. 12524540 - Malicious pattern extraction via fuzzing

2. 12518009 - System and method for detecting exploit including shellcode

3. 12457224 - Detecting obfuscated web skimmers based on encoding and hooking

4. 12380212 - Return address validation watchdog to discover ROP chains in exploits engineering cloud delivered security services (CDSS)

5. 12197577 - Malicious JS detection based on automated user interaction emulation

6. 11874924 - Malicious JS detection based on automated user interaction emulation

7. 10803168 - Rendering an object using multiple versions of an application in a single process for dynamic malware analysis

8. 10482239 - Rendering an object using muliple versions of an application in a single process for dynamic malware analysis

9. 10216931 - Detecting an attempt to exploit a memory allocation vulnerability

10. 9916443 - Detecting an attempt to exploit a memory allocation vulnerability

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/18/2026
Loading…