| Application number | Title of the application | Filing Date | Status |
|---|
Array
(
[id] => 13294925
[patent_doc_number] => 10158670
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-18
[patent_title] => Automatic privilege determination
[patent_app_type] => utility
[patent_app_number] => 15/042780
[patent_app_country] => US
[patent_app_date] => 2016-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8113
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15042780
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/042780 | Automatic privilege determination | Feb 11, 2016 | Issued |
Array
(
[id] => 14615317
[patent_doc_number] => 10360361
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-23
[patent_title] => Computer-implemented method for controlling access
[patent_app_type] => utility
[patent_app_number] => 15/549949
[patent_app_country] => US
[patent_app_date] => 2016-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9978
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15549949
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/549949 | Computer-implemented method for controlling access | Feb 9, 2016 | Issued |
Array
(
[id] => 12434181
[patent_doc_number] => 09977908
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-22
[patent_title] => Implementation and management of information security for distributed data storage systems
[patent_app_type] => utility
[patent_app_number] => 15/010767
[patent_app_country] => US
[patent_app_date] => 2016-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8978
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 267
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15010767
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/010767 | Implementation and management of information security for distributed data storage systems | Jan 28, 2016 | Issued |
Array
(
[id] => 12296781
[patent_doc_number] => 09935952
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-03
[patent_title] => Selectively permitting a receiver device to access a message based on authenticating the receiver device
[patent_app_type] => utility
[patent_app_number] => 15/008820
[patent_app_country] => US
[patent_app_date] => 2016-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6749
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15008820
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/008820 | Selectively permitting a receiver device to access a message based on authenticating the receiver device | Jan 27, 2016 | Issued |
Array
(
[id] => 11646243
[patent_doc_number] => 09667645
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-30
[patent_title] => 'Performance benchmarking for simulated phishing attacks'
[patent_app_type] => utility
[patent_app_number] => 15/006030
[patent_app_country] => US
[patent_app_date] => 2016-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6035
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15006030
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/006030 | Performance benchmarking for simulated phishing attacks | Jan 24, 2016 | Issued |
Array
(
[id] => 11022101
[patent_doc_number] => 20160219056
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-28
[patent_title] => 'METHODS, APPARATUS, AND SYSTEMS FOR RESOURCE ACCESS PERMISSION MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/002120
[patent_app_country] => US
[patent_app_date] => 2016-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5747
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15002120
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/002120 | Methods, apparatus, and systems for resource access permission management | Jan 19, 2016 | Issued |
Array
(
[id] => 14754819
[patent_doc_number] => 20190260583
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-22
[patent_title] => ENCRYPTION DEVICE, SEARCH DEVICE, COMPUTER READABLE MEDIUM, ENCRYPTION METHOD, AND SEARCH METHOD
[patent_app_type] => utility
[patent_app_number] => 15/774498
[patent_app_country] => US
[patent_app_date] => 2016-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10767
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15774498
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/774498 | Encryption device, search device, computer readable medium, encryption method, and search method | Jan 17, 2016 | Issued |
Array
(
[id] => 12163535
[patent_doc_number] => 20180034801
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'VIRTUAL NETWORK SYSTEM, VIRTUAL NETWORK CONTROL METHOD, ORCHESTRATION APPARATUS, CONTROL APPARATUS, AND CONTROL METHOD AND CONTROL PROGRAM OF CONTROL APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 15/551785
[patent_app_country] => US
[patent_app_date] => 2016-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 51
[patent_figures_cnt] => 51
[patent_no_of_words] => 19205
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15551785
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/551785 | Virtual network system, virtual network control method, orchestration apparatus, control apparatus, and control method and control program of control apparatus | Jan 13, 2016 | Issued |
Array
(
[id] => 16069793
[patent_doc_number] => 10693868
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-23
[patent_title] => EHN venue-specific application provisioning
[patent_app_type] => utility
[patent_app_number] => 15/558523
[patent_app_country] => US
[patent_app_date] => 2015-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7072
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15558523
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/558523 | EHN venue-specific application provisioning | Dec 29, 2015 | Issued |
Array
(
[id] => 14646185
[patent_doc_number] => 10367849
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-30
[patent_title] => Method and system for detecting phishing page
[patent_app_type] => utility
[patent_app_number] => 15/533925
[patent_app_country] => US
[patent_app_date] => 2015-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 4599
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15533925
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/533925 | Method and system for detecting phishing page | Dec 29, 2015 | Issued |
Array
(
[id] => 17153459
[patent_doc_number] => 11146562
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-12
[patent_title] => System and method for modifying permissions associated with network-based resources via fingerprint entry on communication devices
[patent_app_type] => utility
[patent_app_number] => 15/777865
[patent_app_country] => US
[patent_app_date] => 2015-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 6050
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15777865
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/777865 | System and method for modifying permissions associated with network-based resources via fingerprint entry on communication devices | Dec 22, 2015 | Issued |
Array
(
[id] => 11717253
[patent_doc_number] => 20170185752
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-29
[patent_title] => 'Attestable information flow control in computer systems'
[patent_app_type] => utility
[patent_app_number] => 14/757733
[patent_app_country] => US
[patent_app_date] => 2015-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 16549
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14757733
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/757733 | Attestable information flow control in computer systems | Dec 22, 2015 | Issued |
Array
(
[id] => 10753790
[patent_doc_number] => 20160099942
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'DATA LEAK PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 14/971340
[patent_app_country] => US
[patent_app_date] => 2015-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 8631
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14971340
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/971340 | Data leak protection | Dec 15, 2015 | Issued |
Array
(
[id] => 12875890
[patent_doc_number] => 20180183805
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-28
[patent_title] => SYSTEM AND METHOD OF AUTHORIZATION OF SIMPLE, SEQUENTIAL AND PARALLEL REQUESTS WITH MEANS OF AUTHORIZATION THROUGH PREVIOUSLY DEFINED PARAMETERS
[patent_app_type] => utility
[patent_app_number] => 15/537806
[patent_app_country] => US
[patent_app_date] => 2015-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5586
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537806
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/537806 | SYSTEM AND METHOD OF AUTHORIZATION OF SIMPLE, SEQUENTIAL AND PARALLEL REQUESTS WITH MEANS OF AUTHORIZATION THROUGH PREVIOUSLY DEFINED PARAMETERS | Dec 14, 2015 | Abandoned |
Array
(
[id] => 14860949
[patent_doc_number] => 10419220
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-17
[patent_title] => Management device, key generating device, vehicle, maintenance tool, management system, management method, and computer program
[patent_app_type] => utility
[patent_app_number] => 15/533751
[patent_app_country] => US
[patent_app_date] => 2015-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 27
[patent_no_of_words] => 21401
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15533751
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/533751 | Management device, key generating device, vehicle, maintenance tool, management system, management method, and computer program | Dec 13, 2015 | Issued |
Array
(
[id] => 10771347
[patent_doc_number] => 20160117503
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems'
[patent_app_type] => utility
[patent_app_number] => 14/950676
[patent_app_country] => US
[patent_app_date] => 2015-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 39
[patent_figures_cnt] => 39
[patent_no_of_words] => 16065
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14950676
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/950676 | Using power fingerprinting (PFP) to monitor the integrity and enhance security of computer based systems | Nov 23, 2015 | Issued |
Array
(
[id] => 10771346
[patent_doc_number] => 20160117502
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems'
[patent_app_type] => utility
[patent_app_number] => 14/950498
[patent_app_country] => US
[patent_app_date] => 2015-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 39
[patent_figures_cnt] => 39
[patent_no_of_words] => 16071
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14950498
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/950498 | Using power fingerprinting (PFP) to monitor the integrity and enhance security of computer based systems | Nov 23, 2015 | Issued |
Array
(
[id] => 11327342
[patent_doc_number] => 20160357954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'METHOD FOR CONTROLLING ACCESS TO A PRODUCTION SYSTEM OF A COMPUTER SYSTEM NOT CONNECTED TO AN INFORMATION SYSTEM OF SAID COMPUTER SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/119038
[patent_app_country] => US
[patent_app_date] => 2015-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5005
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15119038
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/119038 | Method for controlling access to a production system of a computer system not connected to an information system of said computer system | Nov 17, 2015 | Issued |
Array
(
[id] => 16566012
[patent_doc_number] => 10891381
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-01-12
[patent_title] => Detecting vulnerabilities in a web application
[patent_app_type] => utility
[patent_app_number] => 15/775198
[patent_app_country] => US
[patent_app_date] => 2015-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 4869
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15775198
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/775198 | Detecting vulnerabilities in a web application | Nov 12, 2015 | Issued |
Array
(
[id] => 16323302
[patent_doc_number] => 10783268
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-22
[patent_title] => Data allocation based on secure information retrieval
[patent_app_type] => utility
[patent_app_number] => 15/774708
[patent_app_country] => US
[patent_app_date] => 2015-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6718
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15774708
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/774708 | Data allocation based on secure information retrieval | Nov 9, 2015 | Issued |