| Application number | Title of the application | Filing Date | Status |
|---|
Array
(
[id] => 18756276
[patent_doc_number] => 20230359723
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-11-09
[patent_title] => SYSTEM AND APPARATUS FOR SECURE PASSWORD RECOVERY AND IDENTITY VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 18/130290
[patent_app_country] => US
[patent_app_date] => 2023-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8907
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18130290
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/130290 | SYSTEM AND APPARATUS FOR SECURE PASSWORD RECOVERY AND IDENTITY VERIFICATION | Apr 2, 2023 | Abandoned |
Array
(
[id] => 18393663
[patent_doc_number] => 20230161883
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-05-25
[patent_title] => COMPUTER SYSTEM VULNERABILITY LOCKDOWN MODE
[patent_app_type] => utility
[patent_app_number] => 18/101295
[patent_app_country] => US
[patent_app_date] => 2023-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6186
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18101295
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/101295 | Computer system vulnerability lockdown mode | Jan 24, 2023 | Issued |
Array
(
[id] => 18622703
[patent_doc_number] => 11755746
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-09-12
[patent_title] => Systems and methods for conducting blockchain actions based on network mappings of self-executing program characteristics
[patent_app_type] => utility
[patent_app_number] => 18/152694
[patent_app_country] => US
[patent_app_date] => 2023-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11841
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18152694
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/152694 | Systems and methods for conducting blockchain actions based on network mappings of self-executing program characteristics | Jan 9, 2023 | Issued |
Array
(
[id] => 19307265
[patent_doc_number] => 20240235846
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-11
[patent_title] => MANAGING CRYPTOGRAPHIC COMPLIANCE ON A COMPUTING DEVICE USING A DISTRIBUTED LEDGER
[patent_app_type] => utility
[patent_app_number] => 18/094431
[patent_app_country] => US
[patent_app_date] => 2023-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11117
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18094431
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/094431 | MANAGING CRYPTOGRAPHIC COMPLIANCE ON A COMPUTING DEVICE USING A DISTRIBUTED LEDGER | Jan 8, 2023 | Pending |
| 18/092220 | Systems and Methods for Assessing Security in a Computing Environment | Dec 30, 2022 | Abandoned |
Array
(
[id] => 18424939
[patent_doc_number] => 20230179404
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-08
[patent_title] => HYBRID CLOUD-BASED SECURITY SERVICE METHOD AND APPARATUS FOR SECURITY OF CONFIDENTIAL DATA
[patent_app_type] => utility
[patent_app_number] => 18/061107
[patent_app_country] => US
[patent_app_date] => 2022-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6009
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18061107
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/061107 | Hybrid cloud-based security service method and apparatus for security of confidential data | Dec 1, 2022 | Issued |
Array
(
[id] => 19721148
[patent_doc_number] => 12206701
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-01-21
[patent_title] => System and method for evaluating performance of a patching process of an enterprise network
[patent_app_type] => utility
[patent_app_number] => 18/071977
[patent_app_country] => US
[patent_app_date] => 2022-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 15
[patent_no_of_words] => 6975
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18071977
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/071977 | System and method for evaluating performance of a patching process of an enterprise network | Nov 29, 2022 | Issued |
Array
(
[id] => 19811222
[patent_doc_number] => 12242616
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-03-04
[patent_title] => Method and system for software security vulnerability diagnostic assessment
[patent_app_type] => utility
[patent_app_number] => 17/985717
[patent_app_country] => US
[patent_app_date] => 2022-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4431
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17985717
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/985717 | Method and system for software security vulnerability diagnostic assessment | Nov 10, 2022 | Issued |
Array
(
[id] => 18765823
[patent_doc_number] => 11816223
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-11-14
[patent_title] => Apparatus and method for updating cyber security support based on real-time changes
[patent_app_type] => utility
[patent_app_number] => 17/963900
[patent_app_country] => US
[patent_app_date] => 2022-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 19673
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17963900
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/963900 | Apparatus and method for updating cyber security support based on real-time changes | Oct 10, 2022 | Issued |
Array
(
[id] => 19087072
[patent_doc_number] => 20240113873
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-04
[patent_title] => DATA PLATFORM USER KEY-ROTATOR
[patent_app_type] => utility
[patent_app_number] => 17/937020
[patent_app_country] => US
[patent_app_date] => 2022-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9574
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17937020
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/937020 | DATA PLATFORM USER KEY-ROTATOR | Sep 29, 2022 | Abandoned |
Array
(
[id] => 19053219
[patent_doc_number] => 20240095188
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-03-21
[patent_title] => MEMORY DEDUPLICATION FOR ENCRYPTED VIRTUAL MACHINES
[patent_app_type] => utility
[patent_app_number] => 17/947840
[patent_app_country] => US
[patent_app_date] => 2022-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6124
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17947840
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/947840 | Memory deduplication for encrypted virtual machines | Sep 18, 2022 | Issued |
Array
(
[id] => 19421673
[patent_doc_number] => 20240297797
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-05
[patent_title] => METHOD FOR CONFIRMING OWNERSHIP OF DIGITAL ASSETS BASED ON HASH ALGORITHM AND METHOD FOR TRACING TO A SOURCE OF DIGITAL ASSETS BASED ON HASH ALGORITHM
[patent_app_type] => utility
[patent_app_number] => 18/245383
[patent_app_country] => US
[patent_app_date] => 2022-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13707
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 327
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18245383
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/245383 | Method for confirming ownership of digital assets based on hash algorithm and method for tracing to a source of digital assets based on hash algorithm | Sep 13, 2022 | Issued |
Array
(
[id] => 18889712
[patent_doc_number] => 11868482
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-01-09
[patent_title] => Vulnerability tracing using scope and offset
[patent_app_type] => utility
[patent_app_number] => 17/941935
[patent_app_country] => US
[patent_app_date] => 2022-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4807
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17941935
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/941935 | Vulnerability tracing using scope and offset | Sep 8, 2022 | Issued |
Array
(
[id] => 18253482
[patent_doc_number] => 20230080521
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-16
[patent_title] => Method For Protection From Cyber Attacks To A Vehicle Based Upon Time Analysis, And Corresponding Device
[patent_app_type] => utility
[patent_app_number] => 17/929370
[patent_app_country] => US
[patent_app_date] => 2022-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7002
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 410
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17929370
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/929370 | Method for protection from cyber attacks to a vehicle based upon time analysis, and corresponding device | Sep 1, 2022 | Issued |
Array
(
[id] => 18240040
[patent_doc_number] => 20230072351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-09
[patent_title] => METHOD FOR EVOLVING ROOT OF TRUST AND ELECTRONIC DEVICE USING THE SAME
[patent_app_type] => utility
[patent_app_number] => 17/893891
[patent_app_country] => US
[patent_app_date] => 2022-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4482
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 300
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17893891
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/893891 | Method for evolving root of trust and electronic device using the same | Aug 22, 2022 | Issued |
Array
(
[id] => 18992035
[patent_doc_number] => 20240064004
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-02-22
[patent_title] => PARALLEL SECRET SALT GENERATION AND AUTHENTICATION FOR ENCRYPTED COMMUNICATION
[patent_app_type] => utility
[patent_app_number] => 17/890628
[patent_app_country] => US
[patent_app_date] => 2022-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13288
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17890628
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/890628 | Parallel secret salt generation and authentication for encrypted communication | Aug 17, 2022 | Issued |
Array
(
[id] => 18475050
[patent_doc_number] => 20230209338
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-29
[patent_title] => Cloud Profile
[patent_app_type] => utility
[patent_app_number] => 17/876420
[patent_app_country] => US
[patent_app_date] => 2022-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13723
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17876420
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/876420 | Cloud profile | Jul 27, 2022 | Issued |
Array
(
[id] => 18235077
[patent_doc_number] => 11599636
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-03-07
[patent_title] => Systems and methods for managing and providing software packages which have undergone malware and/or vulnerability analysis
[patent_app_type] => utility
[patent_app_number] => 17/875294
[patent_app_country] => US
[patent_app_date] => 2022-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11462
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 333
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17875294
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/875294 | Systems and methods for managing and providing software packages which have undergone malware and/or vulnerability analysis | Jul 26, 2022 | Issued |
Array
(
[id] => 18079788
[patent_doc_number] => 20220405400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-22
[patent_title] => SYSTEMS, METHODS, AND USER INTERFACES FOR INTELLIGENT AND EXPEDITED GENERATION OF CYBERSECURITY ARTIFACTS USING CYBERSECURITY CONTROL DATA OBJECTS
[patent_app_type] => utility
[patent_app_number] => 17/874562
[patent_app_country] => US
[patent_app_date] => 2022-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 35368
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17874562
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/874562 | SYSTEMS, METHODS, AND USER INTERFACES FOR INTELLIGENT AND EXPEDITED GENERATION OF CYBERSECURITY ARTIFACTS USING CYBERSECURITY CONTROL DATA OBJECTS | Jul 26, 2022 | Abandoned |
Array
(
[id] => 19236079
[patent_doc_number] => 20240193274
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-13
[patent_title] => APPARATUS AND METHOD FOR AUTOMATED POLICY MANAGEMENT FOR DEPLOYING APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 17/798743
[patent_app_country] => US
[patent_app_date] => 2022-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7917
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17798743
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/798743 | Apparatus and method for automated policy management for deploying applications | Jul 13, 2022 | Issued |