| Application number | Title of the application | Filing Date | Status |
|---|
Array
(
[id] => 12027728
[patent_doc_number] => 20170317827
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-02
[patent_title] => 'ELECTRONIC STAMP SYSTEM FOR SECURITY INTENSIFICATION, CONTROL METHOD THEREOF, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM HAVING COMPUTER PROGRAM RECORDED THEREON'
[patent_app_type] => utility
[patent_app_number] => 15/381011
[patent_app_country] => US
[patent_app_date] => 2016-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15864
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15381011
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/381011 | Electronic stamp system for security intensification, control method thereof, and non-transitory computer readable storage medium having computer program recorded thereon | Dec 14, 2016 | Issued |
Array
(
[id] => 12163580
[patent_doc_number] => 20180034846
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'METHOD AND SYSTEM FOR VALIDATING A VULNERABILITY SUBMITTED BY A TESTER IN A CROWDSOURCING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/381045
[patent_app_country] => US
[patent_app_date] => 2016-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6065
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15381045
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/381045 | Method and system for validating a vulnerability submitted by a tester in a crowdsourcing environment | Dec 14, 2016 | Issued |
Array
(
[id] => 11695466
[patent_doc_number] => 20170171183
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-15
[patent_title] => 'AUTHENTICATION OF ACCESS REQUEST OF A DEVICE AND PROTECTING CONFIDENTIAL INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 15/381000
[patent_app_country] => US
[patent_app_date] => 2016-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8477
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15381000
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/381000 | Authentication of access request of a device and protecting confidential information | Dec 14, 2016 | Issued |
Array
(
[id] => 13573389
[patent_doc_number] => 20180338243
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => Communication Between an Electronic Portable Device and a Smart Watch
[patent_app_type] => utility
[patent_app_number] => 15/776831
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3786
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15776831
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/776831 | Communication Between an Electronic Portable Device and a Smart Watch | Nov 17, 2016 | Abandoned |
Array
(
[id] => 13483691
[patent_doc_number] => 20180293388
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-11
[patent_title] => METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR PROVIDING RESILIENT COMPUTING SERVICES USING SYSTEMS DIVERSITY
[patent_app_type] => utility
[patent_app_number] => 15/766885
[patent_app_country] => US
[patent_app_date] => 2016-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4761
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15766885
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/766885 | Methods, systems and computer readable media for providing resilient computing services using systems diversity | Oct 9, 2016 | Issued |
Array
(
[id] => 11405925
[patent_doc_number] => 20170026463
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'WIRELESS NETWORK CLOUD COMPUTING RESOURCE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/286184
[patent_app_country] => US
[patent_app_date] => 2016-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9750
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15286184
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/286184 | Wireless network cloud computing resource management | Oct 4, 2016 | Issued |
Array
(
[id] => 12209214
[patent_doc_number] => 20180054440
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-22
[patent_title] => 'UTILIZING TRANSPORT LAYER SECURITY (TLS) FINGERPRINTS TO DETERMINE AGENTS AND OPERATING SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 15/267068
[patent_app_country] => US
[patent_app_date] => 2016-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9518
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15267068
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/267068 | Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems | Sep 14, 2016 | Issued |
Array
(
[id] => 13767333
[patent_doc_number] => 10176008
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-08
[patent_title] => Loading and running virtual working environments in a mobile device management system
[patent_app_type] => utility
[patent_app_number] => 15/264598
[patent_app_country] => US
[patent_app_date] => 2016-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7884
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15264598
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/264598 | Loading and running virtual working environments in a mobile device management system | Sep 13, 2016 | Issued |
| 15/261867 | AUTOMATED CYBERSECURITY THREAT DETECTION WITH AGGREGATION AND ANALYSIS | Sep 8, 2016 | Abandoned |
Array
(
[id] => 13273143
[patent_doc_number] => 10148664
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems
[patent_app_type] => utility
[patent_app_number] => 15/260095
[patent_app_country] => US
[patent_app_date] => 2016-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9405
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15260095
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/260095 | Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems | Sep 7, 2016 | Issued |
Array
(
[id] => 14254813
[patent_doc_number] => 10277620
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Determining an assessment of a security breach for an asset of a network infrastructure
[patent_app_type] => utility
[patent_app_number] => 15/259477
[patent_app_country] => US
[patent_app_date] => 2016-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7055
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15259477
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/259477 | Determining an assessment of a security breach for an asset of a network infrastructure | Sep 7, 2016 | Issued |
Array
(
[id] => 11940554
[patent_doc_number] => 20170244705
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'METHOD OF USING CONVERGED CORE NETWORK SERVICE, UNIVERSAL CONTROL ENTITY, AND CONVERGED CORE NETWORK SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/252651
[patent_app_country] => US
[patent_app_date] => 2016-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 6776
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15252651
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/252651 | METHOD OF USING CONVERGED CORE NETWORK SERVICE, UNIVERSAL CONTROL ENTITY, AND CONVERGED CORE NETWORK SYSTEM | Aug 30, 2016 | Abandoned |
Array
(
[id] => 12224788
[patent_doc_number] => 20180063147
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE'
[patent_app_type] => utility
[patent_app_number] => 15/246114
[patent_app_country] => US
[patent_app_date] => 2016-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8846
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15246114
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/246114 | NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE | Aug 23, 2016 | Abandoned |
Array
(
[id] => 11556960
[patent_doc_number] => 20170103206
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-13
[patent_title] => 'METHOD AND APPARATUS FOR CAPTURING OPERATION IN A CONTAINER-BASED VIRTUALIZATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/237940
[patent_app_country] => US
[patent_app_date] => 2016-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5833
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237940
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/237940 | Method and apparatus for capturing operation in a container-based virtualization system | Aug 15, 2016 | Issued |
Array
(
[id] => 14400169
[patent_doc_number] => 10313384
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-06-04
[patent_title] => Mitigation of security risk vulnerabilities in an enterprise network
[patent_app_type] => utility
[patent_app_number] => 15/234980
[patent_app_country] => US
[patent_app_date] => 2016-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 10326
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15234980
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/234980 | Mitigation of security risk vulnerabilities in an enterprise network | Aug 10, 2016 | Issued |
Array
(
[id] => 14601737
[patent_doc_number] => 10354061
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Methods and systems for authenticating a headset for a transportation vehicle
[patent_app_type] => utility
[patent_app_number] => 15/218889
[patent_app_country] => US
[patent_app_date] => 2016-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4901
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15218889
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/218889 | Methods and systems for authenticating a headset for a transportation vehicle | Jul 24, 2016 | Issued |
Array
(
[id] => 11405847
[patent_doc_number] => 20170026385
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL'
[patent_app_type] => utility
[patent_app_number] => 15/217171
[patent_app_country] => US
[patent_app_date] => 2016-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5495
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217171
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/217171 | METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL | Jul 21, 2016 | Abandoned |
Array
(
[id] => 15377703
[patent_doc_number] => 10530587
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-07
[patent_title] => Web scale authentication
[patent_app_type] => utility
[patent_app_number] => 15/199097
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 1961
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15199097
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/199097 | Web scale authentication | Jun 29, 2016 | Issued |
Array
(
[id] => 17038931
[patent_doc_number] => 11096048
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-17
[patent_title] => Identity authentication method and communications terminal
[patent_app_type] => utility
[patent_app_number] => 16/313036
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 11382
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16313036
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/313036 | Identity authentication method and communications terminal | Jun 29, 2016 | Issued |
Array
(
[id] => 11352749
[patent_doc_number] => 20160371489
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'EVENT ANOMALY ANALYSIS AND PREDICTION'
[patent_app_type] => utility
[patent_app_number] => 15/184607
[patent_app_country] => US
[patent_app_date] => 2016-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12045
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15184607
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/184607 | Event anomaly analysis and prediction | Jun 15, 2016 | Issued |