Growing community of inventors

Palo Alto, CA, United States of America

Úlfar Erlingsson

Average Co-Inventor Count = 2.72

ph-index = 7

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 143

Úlfar ErlingssonYijou Chen (18 patents)Úlfar ErlingssonJay Parikh (8 patents)Úlfar ErlingssonJean-philippe E Martin (3 patents)Úlfar ErlingssonPamela Bhattacharya (1 patent)Úlfar ErlingssonAshwin Jayaprakash (1 patent)Úlfar ErlingssonNjall Skarphedinsson (1 patent)Úlfar ErlingssonSai Samrat Karlapudi (1 patent)Úlfar ErlingssonDerek G Murray (1 patent)Úlfar ErlingssonGurunatha Karaje (1 patent)Úlfar ErlingssonAnastasios Arvanitis (1 patent)Úlfar ErlingssonHelgi Sigurbjarnarson (1 patent)Úlfar ErlingssonTimothy Chase (1 patent)Úlfar ErlingssonÚlfar Erlingsson (18 patents)Yijou ChenYijou Chen (94 patents)Jay ParikhJay Parikh (32 patents)Jean-philippe E MartinJean-philippe E Martin (3 patents)Pamela BhattacharyaPamela Bhattacharya (21 patents)Ashwin JayaprakashAshwin Jayaprakash (4 patents)Njall SkarphedinssonNjall Skarphedinsson (4 patents)Sai Samrat KarlapudiSai Samrat Karlapudi (2 patents)Derek G MurrayDerek G Murray (2 patents)Gurunatha KarajeGurunatha Karaje (2 patents)Anastasios ArvanitisAnastasios Arvanitis (1 patent)Helgi SigurbjarnarsonHelgi Sigurbjarnarson (1 patent)Timothy ChaseTimothy Chase (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Fortinet, Inc. (9 from 1,002 patents)

2. Lacework Inc. (9 from 45 patents)


18 patents:

1. 12489771 - Detecting anomalous behavior of nodes in a hierarchical cloud deployment

2. 12457231 - Initiating and utilizing pedigree for content

3. 12355793 - Guided interactions with a natural language interface

4. 12335286 - Compute environment security monitoring using data collected from a sub-kernel space

5. 12335348 - Optimizing data warehouse utilization by a data ingestion pipeline

6. 12284197 - Reducing amounts of data ingested into a data warehouse

7. 12267345 - Using user feedback for attack path analysis in an anomaly detection framework

8. 12126695 - Enhancing security of a cloud deployment based on learnings from other cloud deployments

9. 12126643 - Leveraging generative artificial intelligence ('AI') for securing a monitored deployment

10. 12095879 - Identifying encountered and unencountered conditions in software applications

11. 12095794 - Universal cloud data ingestion for stream processing

12. 12058160 - Generating computer code for remediating detected events

13. 11973784 - Natural language interface for an anomaly detection framework

14. 11894984 - Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments

15. 11818156 - Data lake-enabled security platform

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/4/2025
Loading…