Application number | Title of the application | Filing Date | Status |
---|
Array
(
[id] => 17449693
[patent_doc_number] => 20220070198
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-03
[patent_title] => Detecting and Quantifying Vulnerabilities in a Network System
[patent_app_type] => utility
[patent_app_number] => 17/011494
[patent_app_country] => US
[patent_app_date] => 2020-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9346
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17011494
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/011494 | Detecting and quantifying vulnerabilities in a network system | Sep 2, 2020 | Issued |
Array
(
[id] => 17449684
[patent_doc_number] => 20220070189
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-03
[patent_title] => TRACKING OF SENSITIVE DATA
[patent_app_type] => utility
[patent_app_number] => 17/005501
[patent_app_country] => US
[patent_app_date] => 2020-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7960
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17005501
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/005501 | Tracking of sensitive data | Aug 27, 2020 | Issued |
Array
(
[id] => 18388164
[patent_doc_number] => 11658964
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-05-23
[patent_title] => System and method for providing a continuous authentication on an open authentication system using user's behavior analysis
[patent_app_type] => utility
[patent_app_number] => 17/003501
[patent_app_country] => US
[patent_app_date] => 2020-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8842
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 699
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17003501
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/003501 | System and method for providing a continuous authentication on an open authentication system using user's behavior analysis | Aug 25, 2020 | Issued |
Array
(
[id] => 16510228
[patent_doc_number] => 20200389484
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-10
[patent_title] => SYSTEMS AND METHODS FOR ATTACK SIMULATION ON A PRODUCTION NETWORK
[patent_app_type] => utility
[patent_app_number] => 17/000922
[patent_app_country] => US
[patent_app_date] => 2020-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 27569
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17000922
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/000922 | Systems and methods for attack simulation on a production network | Aug 23, 2020 | Issued |
Array
(
[id] => 19553387
[patent_doc_number] => 12137108
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-11-05
[patent_title] => Live log analysis for real-time data manipulation and visualization of a large data set
[patent_app_type] => utility
[patent_app_number] => 16/986347
[patent_app_country] => US
[patent_app_date] => 2020-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 9820
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16986347
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/986347 | Live log analysis for real-time data manipulation and visualization of a large data set | Aug 5, 2020 | Issued |
Array
(
[id] => 17390600
[patent_doc_number] => 20220038454
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-03
[patent_title] => NON-INTRUSIVE / AGENTLESS NETWORK DEVICE IDENTIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/942188
[patent_app_country] => US
[patent_app_date] => 2020-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9277
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16942188
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/942188 | Non-intrusive / agentless network device identification | Jul 28, 2020 | Issued |
Array
(
[id] => 16441483
[patent_doc_number] => 20200358810
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-12
[patent_title] => CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES
[patent_app_type] => utility
[patent_app_number] => 16/941884
[patent_app_country] => US
[patent_app_date] => 2020-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12016
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16941884
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/941884 | Cyber threat defense system, components, and a method for using artificial intelligence models trained on a normal pattern of life for systems with unusual data sources | Jul 28, 2020 | Issued |
Array
(
[id] => 17360859
[patent_doc_number] => 20220021655
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-01-20
[patent_title] => OPTIMIZATION OF REDUNDANT USAGE PATTERNS BASED ON HISTORICAL DATA AND SECURITY CONSTRAINTS
[patent_app_type] => utility
[patent_app_number] => 16/930555
[patent_app_country] => US
[patent_app_date] => 2020-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14827
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 418
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16930555
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/930555 | Optimization of redundant usage patterns based on historical data and security constraints | Jul 15, 2020 | Issued |
Array
(
[id] => 16846764
[patent_doc_number] => 11018873
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-05-25
[patent_title] => Collision resistant digital signatures
[patent_app_type] => utility
[patent_app_number] => 16/926646
[patent_app_country] => US
[patent_app_date] => 2020-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 82
[patent_figures_cnt] => 82
[patent_no_of_words] => 41616
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 74
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16926646
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/926646 | Collision resistant digital signatures | Jul 10, 2020 | Issued |
Array
(
[id] => 17731775
[patent_doc_number] => 11388186
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-12
[patent_title] => Method and system to stitch cybersecurity, measure network cyber health, generate business and network risks, enable realtime zero trust verifications, and recommend ordered, predictive risk mitigations
[patent_app_type] => utility
[patent_app_number] => 16/920682
[patent_app_country] => US
[patent_app_date] => 2020-07-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 12087
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 458
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16920682
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/920682 | Method and system to stitch cybersecurity, measure network cyber health, generate business and network risks, enable realtime zero trust verifications, and recommend ordered, predictive risk mitigations | Jul 3, 2020 | Issued |
Array
(
[id] => 16395563
[patent_doc_number] => 20200336504
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-22
[patent_title] => LOG GENERATION METHOD, LOG GENERATION DEVICE, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/919809
[patent_app_country] => US
[patent_app_date] => 2020-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14252
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 301
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16919809
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/919809 | Log generation method, log generation device, and recording medium | Jul 1, 2020 | Issued |
Array
(
[id] => 17320382
[patent_doc_number] => 20210409432
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-30
[patent_title] => AUTOMATIC IDENTIFICATION OF APPLICATIONS THAT CIRCUMVENT PERMISSIONS AND/OR OBFUSCATE DATA FLOWS
[patent_app_type] => utility
[patent_app_number] => 16/914039
[patent_app_country] => US
[patent_app_date] => 2020-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8870
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16914039
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/914039 | Automatic identification of applications that circumvent permissions and/or obfuscate data flows | Jun 25, 2020 | Issued |
Array
(
[id] => 18668744
[patent_doc_number] => 11775647
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-03
[patent_title] => Secure user assigned device from manufacturer
[patent_app_type] => utility
[patent_app_number] => 16/912270
[patent_app_country] => US
[patent_app_date] => 2020-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 7907
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16912270
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/912270 | Secure user assigned device from manufacturer | Jun 24, 2020 | Issued |
Array
(
[id] => 18138062
[patent_doc_number] => 11563762
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-24
[patent_title] => User flow graph analytics for cyber security
[patent_app_type] => utility
[patent_app_number] => 16/908785
[patent_app_country] => US
[patent_app_date] => 2020-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 6499
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16908785
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/908785 | User flow graph analytics for cyber security | Jun 22, 2020 | Issued |
Array
(
[id] => 16365619
[patent_doc_number] => 20200322370
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-08
[patent_title] => System and method for extracting and combining electronic risk information for business continuity management with actionable feedback methodologies
[patent_app_type] => utility
[patent_app_number] => 16/904617
[patent_app_country] => US
[patent_app_date] => 2020-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9620
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 504
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16904617
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/904617 | System and method for extracting and combining electronic risk information for business continuity management with actionable feedback methodologies | Jun 17, 2020 | Issued |
Array
(
[id] => 18121576
[patent_doc_number] => 11552980
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-10
[patent_title] => Detection of multi-factor authentication and non-multi-factor authentication for risk assessment
[patent_app_type] => utility
[patent_app_number] => 16/904443
[patent_app_country] => US
[patent_app_date] => 2020-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8081
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16904443
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/904443 | Detection of multi-factor authentication and non-multi-factor authentication for risk assessment | Jun 16, 2020 | Issued |
Array
(
[id] => 16472755
[patent_doc_number] => 20200374293
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-26
[patent_title] => METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR PRIVACY MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/897698
[patent_app_country] => US
[patent_app_date] => 2020-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8493
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16897698
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/897698 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR PRIVACY MANAGEMENT | Jun 9, 2020 | Abandoned |
Array
(
[id] => 18480226
[patent_doc_number] => 11693967
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-04
[patent_title] => Machine learning-based method and system for detecting plaintext passwords
[patent_app_type] => utility
[patent_app_number] => 16/867887
[patent_app_country] => US
[patent_app_date] => 2020-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9641
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16867887
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/867887 | Machine learning-based method and system for detecting plaintext passwords | May 5, 2020 | Issued |
Array
(
[id] => 16637376
[patent_doc_number] => 10915888
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-02-09
[patent_title] => Contactless card with multiple rotating security keys
[patent_app_type] => utility
[patent_app_number] => 16/863902
[patent_app_country] => US
[patent_app_date] => 2020-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7902
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16863902
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/863902 | Contactless card with multiple rotating security keys | Apr 29, 2020 | Issued |
Array
(
[id] => 17872084
[patent_doc_number] => 20220294821
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-15
[patent_title] => RISK CONTROL METHOD, COMPUTER DEVICE, AND READABLE STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 17/636283
[patent_app_country] => US
[patent_app_date] => 2020-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6281
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17636283
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/636283 | RISK CONTROL METHOD, COMPUTER DEVICE, AND READABLE STORAGE MEDIUM | Apr 28, 2020 | Pending |