Growing community of inventors

San Jose, CA, United States of America

Taylor Ettema

Average Co-Inventor Count = 2.70

ph-index = 7

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 550

Taylor EttemaHuagang Xie (12 patents)Taylor EttemaHo Yu Lam (8 patents)Taylor EttemaRobert Earle Ashley (8 patents)Taylor EttemaRobert Tesh (5 patents)Taylor EttemaXuanyu Jin (5 patents)Taylor EttemaSuiqiang Deng (4 patents)Taylor EttemaQiuming Li (4 patents)Taylor EttemaPaul Mathison (4 patents)Taylor EttemaPaul Theodore Mathison (0 patent)Taylor EttemaTaylor Ettema (20 patents)Huagang XieHuagang Xie (48 patents)Ho Yu LamHo Yu Lam (15 patents)Robert Earle AshleyRobert Earle Ashley (8 patents)Robert TeshRobert Tesh (5 patents)Xuanyu JinXuanyu Jin (5 patents)Suiqiang DengSuiqiang Deng (14 patents)Qiuming LiQiuming Li (10 patents)Paul MathisonPaul Mathison (7 patents)Paul Theodore MathisonPaul Theodore Mathison (0 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Palo Alto Networks, Inc. (20 from 702 patents)


20 patents:

1. 12003485 - Outbound/inbound lateral traffic punting based on process risk

2. 11616761 - Outbound/inbound lateral traffic punting based on process risk

3. 11128656 - Selective sinkholing of malware domains by a security device via DNS poisoning

4. 10992704 - Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network

5. 10931637 - Outbound/inbound lateral traffic punting based on process risk

6. 10855656 - Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation

7. 10530810 - Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network

8. 10425387 - Credentials enforcement using a firewall

9. 10404661 - Integrating a honey network with a target network to counter IP and peer-checking evasion techniques

10. 10298610 - Efficient and secure user credential store for credentials enforcement using a firewall

11. 10257221 - Selective sinkholing of malware domains by a security device via DNS poisoning

12. 10230689 - Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network

13. 10051001 - Efficient and secure user credential store for credentials enforcement using a firewall

14. 10044675 - Integrating a honey network with a target network to counter IP and peer-checking evasion techniques

15. 10015198 - Synchronizing a honey network configuration to reflect a target network environment

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/28/2025
Loading…