
Philip Kannan
Examiner (ID: 14981)
| Most Active Art Unit | 3508 |
| Art Unit(s) | 3502, 3627, 3508, 3623, 3509, 3628, 3507, 3504, 2899 |
| Total Applications | 1556 |
| Issued Applications | 1475 |
| Pending Applications | 13 |
| Abandoned Applications | 68 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20154346
[patent_doc_number] => 20250254184
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-07
[patent_title] => Defanging Malicious Electronic Files Based on Trusted User Reporting
[patent_app_type] => utility
[patent_app_number] => 19/093823
[patent_app_country] => US
[patent_app_date] => 2025-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3392
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19093823
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/093823 | Defanging Malicious Electronic Files Based on Trusted User Reporting | Mar 27, 2025 | Issued |
Array
(
[id] => 19944510
[patent_doc_number] => 12316655
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-27
[patent_title] => Cyber resilience agentic mesh
[patent_app_type] => utility
[patent_app_number] => 19/041984
[patent_app_country] => US
[patent_app_date] => 2025-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 59569
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19041984
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/041984 | Cyber resilience agentic mesh | Jan 29, 2025 | Issued |
Array
(
[id] => 19944519
[patent_doc_number] => 12316664
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-27
[patent_title] => Intelligent search network for time-based detection of compromised network nodes
[patent_app_type] => utility
[patent_app_number] => 19/040705
[patent_app_country] => US
[patent_app_date] => 2025-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10001
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19040705
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/040705 | Intelligent search network for time-based detection of compromised network nodes | Jan 28, 2025 | Issued |
Array
(
[id] => 19927295
[patent_doc_number] => 12301597
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-13
[patent_title] => Network edge digital twin for IoT attack detection
[patent_app_type] => utility
[patent_app_number] => 19/021683
[patent_app_country] => US
[patent_app_date] => 2025-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1772
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19021683
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/021683 | Network edge digital twin for IoT attack detection | Jan 14, 2025 | Issued |
Array
(
[id] => 19957900
[patent_doc_number] => 12328325
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-06-10
[patent_title] => Probabilistic event linking
[patent_app_type] => utility
[patent_app_number] => 18/963186
[patent_app_country] => US
[patent_app_date] => 2024-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 1317
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18963186
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/963186 | Probabilistic event linking | Nov 26, 2024 | Issued |
Array
(
[id] => 19957905
[patent_doc_number] => 12328330
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-06-10
[patent_title] => Alarm data processing method, apparatus, medium and electronic device
[patent_app_type] => utility
[patent_app_number] => 18/961324
[patent_app_country] => US
[patent_app_date] => 2024-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 7112
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18961324
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/961324 | Alarm data processing method, apparatus, medium and electronic device | Nov 25, 2024 | Issued |
Array
(
[id] => 19944540
[patent_doc_number] => 12316685
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-27
[patent_title] => Systems and methods for intelligent analysis and deployment of cybersecurity assets in a cybersecurity threat detection and mitigation platform
[patent_app_type] => utility
[patent_app_number] => 18/946217
[patent_app_country] => US
[patent_app_date] => 2024-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3572
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18946217
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/946217 | Systems and methods for intelligent analysis and deployment of cybersecurity assets in a cybersecurity threat detection and mitigation platform | Nov 12, 2024 | Issued |
Array
(
[id] => 20216891
[patent_doc_number] => 12413555
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-09
[patent_title] => Cyber threat detection based on threat context, threat changes, and/or impact status
[patent_app_type] => utility
[patent_app_number] => 18/932967
[patent_app_country] => US
[patent_app_date] => 2024-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 52456
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18932967
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/932967 | Cyber threat detection based on threat context, threat changes, and/or impact status | Oct 30, 2024 | Issued |
Array
(
[id] => 19919209
[patent_doc_number] => 12294596
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-06
[patent_title] => Lightweight intrusion detection method and system of internet of vehicles based on knowledge distillation
[patent_app_type] => utility
[patent_app_number] => 18/923017
[patent_app_country] => US
[patent_app_date] => 2024-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 0
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 293
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18923017
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/923017 | Lightweight intrusion detection method and system of internet of vehicles based on knowledge distillation | Oct 21, 2024 | Issued |
Array
(
[id] => 19766717
[patent_doc_number] => 12225026
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-02-11
[patent_title] => Detecting malicious activity using user-specific parameters
[patent_app_type] => utility
[patent_app_number] => 18/914035
[patent_app_country] => US
[patent_app_date] => 2024-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 22595
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18914035
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/914035 | Detecting malicious activity using user-specific parameters | Oct 10, 2024 | Issued |
Array
(
[id] => 19859025
[patent_doc_number] => 12261890
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-03-25
[patent_title] => Threat classification in a streaming system
[patent_app_type] => utility
[patent_app_number] => 18/829996
[patent_app_country] => US
[patent_app_date] => 2024-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17026
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18829996
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/829996 | Threat classification in a streaming system | Sep 9, 2024 | Issued |
Array
(
[id] => 19927319
[patent_doc_number] => 12301622
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-13
[patent_title] => System for cybersecurity campaign artifact discovery and tasking
[patent_app_type] => utility
[patent_app_number] => 18/829109
[patent_app_country] => US
[patent_app_date] => 2024-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 0
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18829109
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/829109 | System for cybersecurity campaign artifact discovery and tasking | Sep 8, 2024 | Issued |
Array
(
[id] => 19734577
[patent_doc_number] => 12212589
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-01-28
[patent_title] => Secure localization method for multi-mobile robots based on network communication
[patent_app_type] => utility
[patent_app_number] => 18/824956
[patent_app_country] => US
[patent_app_date] => 2024-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4654
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 2261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18824956
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/824956 | Secure localization method for multi-mobile robots based on network communication | Sep 4, 2024 | Issued |
Array
(
[id] => 19547467
[patent_doc_number] => 20240364503
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-31
[patent_title] => Data Protection with Two Password Asymmetric Encryption
[patent_app_type] => utility
[patent_app_number] => 18/769927
[patent_app_country] => US
[patent_app_date] => 2024-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13492
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18769927
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/769927 | Data Protection with Two Password Asymmetric Encryption | Jul 10, 2024 | Pending |
Array
(
[id] => 19514438
[patent_doc_number] => 20240346124
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-17
[patent_title] => SYSTEM AND METHODS FOR IMPLEMENTING PRIVATE IDENTITY
[patent_app_type] => utility
[patent_app_number] => 18/754457
[patent_app_country] => US
[patent_app_date] => 2024-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 31544
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18754457
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/754457 | SYSTEM AND METHODS FOR IMPLEMENTING PRIVATE IDENTITY | Jun 25, 2024 | Pending |
Array
(
[id] => 19514437
[patent_doc_number] => 20240346123
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-17
[patent_title] => SYSTEM AND METHODS FOR IMPLEMENTING PRIVATE IDENTITY
[patent_app_type] => utility
[patent_app_number] => 18/754422
[patent_app_country] => US
[patent_app_date] => 2024-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 31543
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 35
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18754422
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/754422 | SYSTEM AND METHODS FOR IMPLEMENTING PRIVATE IDENTITY | Jun 25, 2024 | Pending |
Array
(
[id] => 19663242
[patent_doc_number] => 20240430307
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-26
[patent_title] => METHODS AND APPARATUSES TO PROVIDE INFORMATION SECURITY TO AN ENTITY BY USING MULTIPLE CLOUD-BASED APPLICATION SERVICES
[patent_app_type] => utility
[patent_app_number] => 18/752409
[patent_app_country] => US
[patent_app_date] => 2024-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10721
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18752409
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/752409 | Methods and apparatuses to provide information security to an entity by using multiple cloud-based application services | Jun 23, 2024 | Issued |
Array
(
[id] => 19635679
[patent_doc_number] => 20240414128
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-12
[patent_title] => CYBER THREAT DETECTION BASED ON THREAT CONTEXT, THREAT CHANGES, AND/OR IMPACT STATUS
[patent_app_type] => utility
[patent_app_number] => 18/741624
[patent_app_country] => US
[patent_app_date] => 2024-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 57342
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18741624
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/741624 | CYBER THREAT DETECTION BASED ON THREAT CONTEXT, THREAT CHANGES, AND/OR IMPACT STATUS | Jun 11, 2024 | Pending |
Array
(
[id] => 19627914
[patent_doc_number] => 12166778
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-12-10
[patent_title] => Techniques for incident response and static analysis representation in computing environments
[patent_app_type] => utility
[patent_app_number] => 18/737481
[patent_app_country] => US
[patent_app_date] => 2024-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7431
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18737481
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/737481 | Techniques for incident response and static analysis representation in computing environments | Jun 6, 2024 | Issued |
Array
(
[id] => 19454039
[patent_doc_number] => 20240314169
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-19
[patent_title] => Systems and methods for cloud-based threat alerts and monitoring
[patent_app_type] => utility
[patent_app_number] => 18/674428
[patent_app_country] => US
[patent_app_date] => 2024-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 25972
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18674428
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/674428 | Systems and methods for cloud-based threat alerts and monitoring | May 23, 2024 | Pending |