YC

Yijou Chen

LA Lacework: 37 patents #1 of 38Top 3%
FO Fortinet: 34 patents #4 of 528Top 1%
PA Paraccel: 7 patents #3 of 19Top 20%
AC Actian: 1 patents #8 of 29Top 30%
📍 Cupertino, CA: #122 of 6,989 inventorsTop 2%
🗺 California: #3,414 of 386,348 inventorsTop 1%
Overall (All Time): #22,395 of 4,157,543Top 1%
80
Patents All Time

Issued Patents All Time

Showing 26–50 of 80 patents

Patent #TitleCo-InventorsDate
12284197 Reducing amounts of data ingested into a data warehouse Jean-Philippe Martin, Ulfar Erlingsson 2025-04-22
12267345 Using user feedback for attack path analysis in an anomaly detection framework Ulfar Erlingsson, Jay Parikh 2025-04-01
12261866 Time series anomaly detection Ting-Fang Yen, Isha Singhal, Andrew D. Twigg 2025-03-25
12244621 Using activity monitored by multiple data sources to identify shadow systems Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more 2025-03-04
12206696 Detecting anomalies in a network environment Vikram Kapoor, Samuel Joseph Pullara, III, Murat Bog, Sanjay Kalra 2025-01-21
12130878 Deduplication of monitored communications data in a cloud environment Anil Nanduri, Prakash Jalan, Matti A. Vanninen, Ammar Ekbote, Alex Ramachandran Nirmala 2024-10-29
12126695 Enhancing security of a cloud deployment based on learnings from other cloud deployments Ulfar Erlingsson 2024-10-22
12126643 Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment Njall Skarphedinsson, Pamela Bhattacharya, Ulfar Erlingsson, Jay Parikh, Timothy Chase 2024-10-22
12120140 Detecting threats against computing resources based on user behavior changes Harish Kumar Bharat Singh, Vikram Kapoor, Murat Bog 2024-10-15
12095879 Identifying encountered and unencountered conditions in software applications Ulfar Erlingsson 2024-09-17
12095794 Universal cloud data ingestion for stream processing Gurunatha Karaje, Helgi K. Sigurbjarnarson, Jean-Philippe Martin, Ashwin Jayaprakash, Ulfar Erlingsson +2 more 2024-09-17
12095796 Instruction-level threat assessment Patrice Godefroid, Curtis Gerald Condra 2024-09-17
12058160 Generating computer code for remediating detected events Ulfar Erlingsson, Jay Parikh 2024-08-06
12034754 Using static analysis for vulnerability detection Peter W. O'Hearn, Theodore M. Reed, Robert Schoening 2024-07-09
12032634 Graph reclustering based on different clustering criteria Harish Kumar Bharat Singh, Murat Bog, Vikram Kapoor 2024-07-09
12034750 Tracking of user login sessions Murat Bog, Vikram Kapoor, Samuel Joseph Pullara, III, Harish Kumar Bharat Singh 2024-07-09
12021888 Cloud infrastructure entitlement management by a data platform Theodore M. Reed, Bao Nguyen, Kenneth Beasley, Joshua Vertes, Adin Aoki +3 more 2024-06-25
11991198 User-specific data-driven network security Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more 2024-05-21
11979422 Elastic privileges in a secure access service edge Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more 2024-05-07
11973784 Natural language interface for an anomaly detection framework Ulfar Erlingsson, Jay Parikh 2024-04-30
11954130 Alerting based on pod communication-based logical graph Harish Kumar Bharat Singh, Murat Bog, Vikram Kapoor 2024-04-09
11916947 Generating user-specific polygraphs for network activity Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more 2024-02-27
11909752 Detecting deviations from typical user behavior Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more 2024-02-20
11895135 Detecting anomalous behavior of a device Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more 2024-02-06
11894984 Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments Ulfar Erlingsson 2024-02-06