
Philip Kannan
Examiner (ID: 14981)
| Most Active Art Unit | 3508 |
| Art Unit(s) | 3502, 3627, 3508, 3623, 3509, 3628, 3507, 3504, 2899 |
| Total Applications | 1556 |
| Issued Applications | 1475 |
| Pending Applications | 13 |
| Abandoned Applications | 68 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18671062
[patent_doc_number] => 11777984
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-10-03
[patent_title] => Automatic threat detection and remediation
[patent_app_type] => utility
[patent_app_number] => 17/013285
[patent_app_country] => US
[patent_app_date] => 2020-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8450
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17013285
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/013285 | Automatic threat detection and remediation | Sep 3, 2020 | Issued |
Array
(
[id] => 17449677
[patent_doc_number] => 20220070182
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-03
[patent_title] => SYSTEMS AND METHODS FOR IDENTIFYING ATTACK PATTERNS OR SUSPICIOUS ACTIVITY IN CLIENT NETWORKS
[patent_app_type] => utility
[patent_app_number] => 17/011225
[patent_app_country] => US
[patent_app_date] => 2020-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9004
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17011225
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/011225 | Systems and methods for identifying attack patterns or suspicious activity in client networks | Sep 2, 2020 | Issued |
Array
(
[id] => 18277840
[patent_doc_number] => 11616798
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-03-28
[patent_title] => Malicious traffic detection with anomaly detection modeling
[patent_app_type] => utility
[patent_app_number] => 16/999865
[patent_app_country] => US
[patent_app_date] => 2020-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9859
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16999865
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/999865 | Malicious traffic detection with anomaly detection modeling | Aug 20, 2020 | Issued |
Array
(
[id] => 16661776
[patent_doc_number] => 20210058413
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-25
[patent_title] => INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/994935
[patent_app_country] => US
[patent_app_date] => 2020-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13369
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16994935
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/994935 | Information processing device, information processing system, and recording medium | Aug 16, 2020 | Issued |
Array
(
[id] => 16669585
[patent_doc_number] => 10938852
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-03-02
[patent_title] => Systems and methods for private authentication with helper networks
[patent_app_type] => utility
[patent_app_number] => 16/993596
[patent_app_country] => US
[patent_app_date] => 2020-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14961
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16993596
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/993596 | Systems and methods for private authentication with helper networks | Aug 13, 2020 | Issued |
Array
(
[id] => 17390616
[patent_doc_number] => 20220038470
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-03
[patent_title] => SUPPLEMENTAL ATTACK SURFACE SCANNER
[patent_app_type] => utility
[patent_app_number] => 16/941335
[patent_app_country] => US
[patent_app_date] => 2020-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6512
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 67
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16941335
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/941335 | Supplemental attack surface scanner | Jul 27, 2020 | Issued |
Array
(
[id] => 16602628
[patent_doc_number] => 20210029159
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-28
[patent_title] => THREAT MITIGATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 16/940020
[patent_app_country] => US
[patent_app_date] => 2020-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 25371
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 45
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16940020
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/940020 | Threat mitigation system and method | Jul 26, 2020 | Issued |
Array
(
[id] => 18646300
[patent_doc_number] => 11770387
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-09-26
[patent_title] => Graph-based detection of lateral movement in computer networks
[patent_app_type] => utility
[patent_app_number] => 16/931923
[patent_app_country] => US
[patent_app_date] => 2020-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 12087
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 258
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16931923
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/931923 | Graph-based detection of lateral movement in computer networks | Jul 16, 2020 | Issued |
Array
(
[id] => 16929291
[patent_doc_number] => 11050793
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-29
[patent_title] => Retrospective learning of communication patterns by machine learning models for discovering abnormal behavior
[patent_app_type] => utility
[patent_app_number] => 16/927335
[patent_app_country] => US
[patent_app_date] => 2020-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 40
[patent_no_of_words] => 20668
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16927335
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/927335 | Retrospective learning of communication patterns by machine learning models for discovering abnormal behavior | Jul 12, 2020 | Issued |
Array
(
[id] => 18235094
[patent_doc_number] => 11599653
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-03-07
[patent_title] => Systems and methods for controlled access to policy data on blockchain
[patent_app_type] => utility
[patent_app_number] => 16/916398
[patent_app_country] => US
[patent_app_date] => 2020-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 20471
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16916398
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/916398 | Systems and methods for controlled access to policy data on blockchain | Jun 29, 2020 | Issued |
Array
(
[id] => 18030986
[patent_doc_number] => 11514176
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-11-29
[patent_title] => Systems and methods for controlled access to blockchain data
[patent_app_type] => utility
[patent_app_number] => 16/915931
[patent_app_country] => US
[patent_app_date] => 2020-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 20463
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16915931
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/915931 | Systems and methods for controlled access to blockchain data | Jun 28, 2020 | Issued |
Array
(
[id] => 17218751
[patent_doc_number] => 20210352089
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-11
[patent_title] => METHODS AND APPARATUS FOR NETWORK DETECTION OF MALICIOUS DATA STREAMS INSIDE BINARY FILES
[patent_app_type] => utility
[patent_app_number] => 16/914246
[patent_app_country] => US
[patent_app_date] => 2020-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14209
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16914246
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/914246 | Methods and apparatus for network detection of malicious data streams inside binary files | Jun 25, 2020 | Issued |
Array
(
[id] => 16594963
[patent_doc_number] => 10904252
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-01-26
[patent_title] => Multi-node authentication method and apparatus based on block chain
[patent_app_type] => utility
[patent_app_number] => 16/911262
[patent_app_country] => US
[patent_app_date] => 2020-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5169
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16911262
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/911262 | Multi-node authentication method and apparatus based on block chain | Jun 23, 2020 | Issued |
Array
(
[id] => 17238911
[patent_doc_number] => 11182792
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-23
[patent_title] => Personal digital key initialization and registration for secure transactions
[patent_app_type] => utility
[patent_app_number] => 16/893155
[patent_app_country] => US
[patent_app_date] => 2020-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 17
[patent_no_of_words] => 12810
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16893155
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/893155 | Personal digital key initialization and registration for secure transactions | Jun 3, 2020 | Issued |
Array
(
[id] => 16488860
[patent_doc_number] => 20200382474
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-03
[patent_title] => System And Method For Encryption, Storage And Transmission Of Digital Information
[patent_app_type] => utility
[patent_app_number] => 16/886921
[patent_app_country] => US
[patent_app_date] => 2020-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6352
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16886921
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/886921 | System and method for encryption, storage and transmission of digital information | May 28, 2020 | Issued |
Array
(
[id] => 16302163
[patent_doc_number] => 20200287886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-10
[patent_title] => ESTABLISHING A TRUSTED LOGIN PROCEDURE
[patent_app_type] => utility
[patent_app_number] => 16/884966
[patent_app_country] => US
[patent_app_date] => 2020-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10306
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884966
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/884966 | Establishing a trusted login procedure | May 26, 2020 | Issued |
Array
(
[id] => 16302163
[patent_doc_number] => 20200287886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-10
[patent_title] => ESTABLISHING A TRUSTED LOGIN PROCEDURE
[patent_app_type] => utility
[patent_app_number] => 16/884966
[patent_app_country] => US
[patent_app_date] => 2020-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10306
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884966
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/884966 | Establishing a trusted login procedure | May 26, 2020 | Issued |
Array
(
[id] => 16302163
[patent_doc_number] => 20200287886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-10
[patent_title] => ESTABLISHING A TRUSTED LOGIN PROCEDURE
[patent_app_type] => utility
[patent_app_number] => 16/884966
[patent_app_country] => US
[patent_app_date] => 2020-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10306
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884966
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/884966 | Establishing a trusted login procedure | May 26, 2020 | Issued |
Array
(
[id] => 17264322
[patent_doc_number] => 20210377307
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-02
[patent_title] => REINFORCEMENT LEARNING FOR APPLICATION RESPONSES USING DECEPTION TECHNOLOGY
[patent_app_type] => utility
[patent_app_number] => 16/884521
[patent_app_country] => US
[patent_app_date] => 2020-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7966
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884521
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/884521 | Reinforcement learning for application responses using deception technology | May 26, 2020 | Issued |
Array
(
[id] => 16302163
[patent_doc_number] => 20200287886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-10
[patent_title] => ESTABLISHING A TRUSTED LOGIN PROCEDURE
[patent_app_type] => utility
[patent_app_number] => 16/884966
[patent_app_country] => US
[patent_app_date] => 2020-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10306
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884966
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/884966 | Establishing a trusted login procedure | May 26, 2020 | Issued |