| Application number | Title of the application | Filing Date | Status |
|---|
Array
(
[id] => 19935978
[patent_doc_number] => 12309191
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-20
[patent_title] => Computer-based systems configured for network characterization and management based on risk score analysis and methods of use thereof
[patent_app_type] => utility
[patent_app_number] => 18/988185
[patent_app_country] => US
[patent_app_date] => 2024-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7528
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18988185
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/988185 | Computer-based systems configured for network characterization and management based on risk score analysis and methods of use thereof | Dec 18, 2024 | Issued |
Array
(
[id] => 20037265
[patent_doc_number] => 20250175487
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-29
[patent_title] => RISK SCORING OF CLOUD PERMISSION ASSIGNMENTS USING SUPERVISED MACHINE LEARNING
[patent_app_type] => utility
[patent_app_number] => 18/903573
[patent_app_country] => US
[patent_app_date] => 2024-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2394
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18903573
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/903573 | Risk scoring of cloud permission assignments using supervised machine learning | Sep 30, 2024 | Issued |
Array
(
[id] => 19973178
[patent_doc_number] => 12341803
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-06-24
[patent_title] => Technique and method for detection and display of the cybersecurity risk context of a cloud environment
[patent_app_type] => utility
[patent_app_number] => 18/888941
[patent_app_country] => US
[patent_app_date] => 2024-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4628
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18888941
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/888941 | Technique and method for detection and display of the cybersecurity risk context of a cloud environment | Sep 17, 2024 | Issued |
Array
(
[id] => 19813218
[patent_doc_number] => 12244636
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-03-04
[patent_title] => Computer-based systems configured for network characterization and management and methods of use thereof
[patent_app_type] => utility
[patent_app_number] => 18/812503
[patent_app_country] => US
[patent_app_date] => 2024-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 31731
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 462
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18812503
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/812503 | Computer-based systems configured for network characterization and management and methods of use thereof | Aug 21, 2024 | Issued |
Array
(
[id] => 19822352
[patent_doc_number] => 20250080559
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-06
[patent_title] => Computer-Implemented Methods and Computer Systems for Maintaining Information Security Infrastructure of an Entity
[patent_app_type] => utility
[patent_app_number] => 18/801004
[patent_app_country] => US
[patent_app_date] => 2024-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9299
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 535
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18801004
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/801004 | Computer-Implemented Methods and Computer Systems for Maintaining Information Security Infrastructure of an Entity | Aug 11, 2024 | Pending |
Array
(
[id] => 19797148
[patent_doc_number] => 12238134
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-02-25
[patent_title] => Automated discovery and evaluation of vulnerability hotspots in computer networks
[patent_app_type] => utility
[patent_app_number] => 18/795592
[patent_app_country] => US
[patent_app_date] => 2024-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11816
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795592
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/795592 | Automated discovery and evaluation of vulnerability hotspots in computer networks | Aug 5, 2024 | Issued |
Array
(
[id] => 19813217
[patent_doc_number] => 12244635
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-03-04
[patent_title] => Computer-based systems configured for network characterization and management based on risk score analysis and methods of use thereof
[patent_app_type] => utility
[patent_app_number] => 18/785813
[patent_app_country] => US
[patent_app_date] => 2024-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 14710
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 350
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18785813
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/785813 | Computer-based systems configured for network characterization and management based on risk score analysis and methods of use thereof | Jul 25, 2024 | Issued |
Array
(
[id] => 19499449
[patent_doc_number] => 20240338467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => ZERO-KNOWLEDGE PROTECTION FOR SIDE CHANNELS IN DATA PROTECTION TO THE CLOUD
[patent_app_type] => utility
[patent_app_number] => 18/750328
[patent_app_country] => US
[patent_app_date] => 2024-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7581
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18750328
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/750328 | ZERO-KNOWLEDGE PROTECTION FOR SIDE CHANNELS IN DATA PROTECTION TO THE CLOUD | Jun 20, 2024 | Pending |
Array
(
[id] => 20081690
[patent_doc_number] => 12355777
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-08
[patent_title] => Conference security for user groups
[patent_app_type] => utility
[patent_app_number] => 18/742430
[patent_app_country] => US
[patent_app_date] => 2024-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6264
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742430
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/742430 | Conference security for user groups | Jun 12, 2024 | Issued |
Array
(
[id] => 19485711
[patent_doc_number] => 20240333753
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-03
[patent_title] => SECURITY MODEL UTILIZING MULTI-CHANNEL DATA WITH VULNERABILITY REMEDIATION CIRCUITRY
[patent_app_type] => utility
[patent_app_number] => 18/742234
[patent_app_country] => US
[patent_app_date] => 2024-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 39023
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742234
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/742234 | Security model utilizing multi-channel data with vulnerability remediation circuitry | Jun 12, 2024 | Issued |
Array
(
[id] => 19647668
[patent_doc_number] => 20240422188
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-19
[patent_title] => SECURITY DETERMINATION DEVICE, SECURE SYSTEM DESIGN DEVICE, SECURITY DETERMINATION METHOD, AND NON-TRANSITORY STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/738361
[patent_app_country] => US
[patent_app_date] => 2024-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10812
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 56
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18738361
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/738361 | SECURITY DETERMINATION DEVICE, SECURE SYSTEM DESIGN DEVICE, SECURITY DETERMINATION METHOD, AND NON-TRANSITORY STORAGE MEDIUM | Jun 9, 2024 | Pending |
Array
(
[id] => 19887631
[patent_doc_number] => 12273370
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-04-08
[patent_title] => System and method for detecting cybersecurity risks in managed artificial intelligence models
[patent_app_type] => utility
[patent_app_number] => 18/672749
[patent_app_country] => US
[patent_app_date] => 2024-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10306
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18672749
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/672749 | System and method for detecting cybersecurity risks in managed artificial intelligence models | May 22, 2024 | Issued |
Array
(
[id] => 19583421
[patent_doc_number] => 12149558
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-11-19
[patent_title] => Cybersecurity architectures for multi-contextual risk quantification
[patent_app_type] => utility
[patent_app_number] => 18/669528
[patent_app_country] => US
[patent_app_date] => 2024-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 35389
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 262
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18669528
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/669528 | Cybersecurity architectures for multi-contextual risk quantification | May 20, 2024 | Issued |
Array
(
[id] => 19766734
[patent_doc_number] => 12225043
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-11
[patent_title] => Systems and methods for security process analysis
[patent_app_type] => utility
[patent_app_number] => 18/667464
[patent_app_country] => US
[patent_app_date] => 2024-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7611
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18667464
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/667464 | Systems and methods for security process analysis | May 16, 2024 | Issued |
Array
(
[id] => 19408338
[patent_doc_number] => 20240291849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-29
[patent_title] => METHOD FOR OBTAINING SECURITY CLASSIFICATION RESULT AND COMMUNICATION APPARATUS
[patent_app_type] => utility
[patent_app_number] => 18/659239
[patent_app_country] => US
[patent_app_date] => 2024-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 36264
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18659239
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/659239 | METHOD FOR OBTAINING SECURITY CLASSIFICATION RESULT AND COMMUNICATION APPARATUS | May 8, 2024 | Pending |
Array
(
[id] => 19547649
[patent_doc_number] => 20240364685
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-31
[patent_title] => UNIVERSAL AUTHENTICATOR APPARATUS FOR OBTAINING HOST SERVICES
[patent_app_type] => utility
[patent_app_number] => 18/649633
[patent_app_country] => US
[patent_app_date] => 2024-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15041
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18649633
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/649633 | Universal authenticator apparatus for obtaining host services | Apr 28, 2024 | Issued |
Array
(
[id] => 19514458
[patent_doc_number] => 20240346144
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-17
[patent_title] => RANSOMWARE ATTACK ONSET DETECTION
[patent_app_type] => utility
[patent_app_number] => 18/641798
[patent_app_country] => US
[patent_app_date] => 2024-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8133
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18641798
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/641798 | RANSOMWARE ATTACK ONSET DETECTION | Apr 21, 2024 | Pending |
Array
(
[id] => 19576482
[patent_doc_number] => 20240380774
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-14
[patent_title] => SYSTEMS AND METHODS FOR AUTOMATED RISK-BASED NETWORK SECURITY FOCUS
[patent_app_type] => utility
[patent_app_number] => 18/622676
[patent_app_country] => US
[patent_app_date] => 2024-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18778
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18622676
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/622676 | Systems and methods for automated risk-based network security focus | Mar 28, 2024 | Issued |
Array
(
[id] => 19782411
[patent_doc_number] => 12231459
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-02-18
[patent_title] => Technique and method for detection and display of the cybersecurity risk context of a cloud environment
[patent_app_type] => utility
[patent_app_number] => 18/618684
[patent_app_country] => US
[patent_app_date] => 2024-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9964
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18618684
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/618684 | Technique and method for detection and display of the cybersecurity risk context of a cloud environment | Mar 26, 2024 | Issued |
Array
(
[id] => 19663224
[patent_doc_number] => 20240430289
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-26
[patent_title] => AUTOMATED PRIORITIZATION OF CYBER RISK TO DIGITAL IDENTITIES
[patent_app_type] => utility
[patent_app_number] => 18/609300
[patent_app_country] => US
[patent_app_date] => 2024-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12375
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18609300
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/609300 | Automated prioritization of cyber risk to digital identities | Mar 18, 2024 | Issued |