Growing community of inventors

San Jose, CA, United States of America

Vamsi Korrapati

Average Co-Inventor Count = 4.14

ph-index = 3

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 49

Vamsi KorrapatiConstantinos Bassias (4 patents)Vamsi KorrapatiUday Veeramachaneni (4 patents)Vamsi KorrapatiIgnacio Arnaldo (3 patents)Vamsi KorrapatiPrakash Khemani (2 patents)Vamsi KorrapatiRajiv Mirani (2 patents)Vamsi KorrapatiAbhishek Chauhan (1 patent)Vamsi KorrapatiKe Li (1 patent)Vamsi KorrapatiAnoop Reddy (1 patent)Vamsi KorrapatiPuneet Agarwal (1 patent)Vamsi KorrapatiSrinivasan Thirunarayanan (1 patent)Vamsi KorrapatiVamsi Korrapati (6 patents)Constantinos BassiasConstantinos Bassias (7 patents)Uday VeeramachaneniUday Veeramachaneni (4 patents)Ignacio ArnaldoIgnacio Arnaldo (6 patents)Prakash KhemaniPrakash Khemani (38 patents)Rajiv MiraniRajiv Mirani (29 patents)Abhishek ChauhanAbhishek Chauhan (95 patents)Ke LiKe Li (33 patents)Anoop ReddyAnoop Reddy (24 patents)Puneet AgarwalPuneet Agarwal (20 patents)Srinivasan ThirunarayananSrinivasan Thirunarayanan (7 patents)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Patternex, Inc. (4 from 5 patents)

2. Citrix Systems, Inc. (2 from 2,402 patents)


6 patents:

1. 10264027 - Computer-implemented process and system employing outlier score detection for identifying and detecting scenario-specific data elements from a dynamic data source

2. 10044762 - Copula optimization method and apparatus for identifying and detecting threats to an enterprise or e-commerce system and other applications

3. 9904893 - Method and system for training a big data machine to defend

4. 9661025 - Method and apparatus for identifying and detecting threats to an enterprise or e-commerce system

5. 8667146 - Systems and methods for configuration driven rewrite of SSL VPN clientless sessions

6. 7870277 - Systems and methods for using object oriented expressions to configure application security policies

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/5/2025
Loading…