
Philip Kannan
Examiner (ID: 14981)
| Most Active Art Unit | 3508 |
| Art Unit(s) | 3502, 3627, 3508, 3623, 3509, 3628, 3507, 3504, 2899 |
| Total Applications | 1556 |
| Issued Applications | 1475 |
| Pending Applications | 13 |
| Abandoned Applications | 68 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17167223
[patent_doc_number] => 11153338
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-19
[patent_title] => Preventing network attacks
[patent_app_type] => utility
[patent_app_number] => 16/429738
[patent_app_country] => US
[patent_app_date] => 2019-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11632
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16429738
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/429738 | Preventing network attacks | Jun 2, 2019 | Issued |
Array
(
[id] => 17879546
[patent_doc_number] => 11451584
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-20
[patent_title] => Detecting a remote exploitation attack
[patent_app_type] => utility
[patent_app_number] => 16/427470
[patent_app_country] => US
[patent_app_date] => 2019-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2495
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16427470
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/427470 | Detecting a remote exploitation attack | May 30, 2019 | Issued |
Array
(
[id] => 16457283
[patent_doc_number] => 20200366709
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => Security system with adaptive parsing
[patent_app_type] => utility
[patent_app_number] => 16/412850
[patent_app_country] => US
[patent_app_date] => 2019-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6349
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16412850
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/412850 | Security system with adaptive parsing | May 14, 2019 | Issued |
Array
(
[id] => 17284829
[patent_doc_number] => 11201878
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-14
[patent_title] => Bus-off attack prevention circuit
[patent_app_type] => utility
[patent_app_number] => 16/402535
[patent_app_country] => US
[patent_app_date] => 2019-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 15
[patent_no_of_words] => 10384
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16402535
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/402535 | Bus-off attack prevention circuit | May 2, 2019 | Issued |
Array
(
[id] => 15032159
[patent_doc_number] => 20190327084
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-24
[patent_title] => METHOD FOR SELECTING CONSENSUS NODE USING NONCE AND METHOD AND APPARATUS FOR GENERATING BLOCKCHAIN USING THE SAME
[patent_app_type] => utility
[patent_app_number] => 16/389620
[patent_app_country] => US
[patent_app_date] => 2019-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7403
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16389620
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/389620 | Method for selecting consensus node using nonce and method and apparatus for generating blockchain using the same | Apr 18, 2019 | Issued |
Array
(
[id] => 16395560
[patent_doc_number] => 20200336501
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-22
[patent_title] => SENSITIVE DATA DETECTION IN COMMUNICATION DATA
[patent_app_type] => utility
[patent_app_number] => 16/389557
[patent_app_country] => US
[patent_app_date] => 2019-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11243
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16389557
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/389557 | Sensitive data detection in communication data | Apr 18, 2019 | Issued |
Array
(
[id] => 17108250
[patent_doc_number] => 11128482
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-21
[patent_title] => Metering cloud workloads at edge computing devices
[patent_app_type] => utility
[patent_app_number] => 16/389622
[patent_app_country] => US
[patent_app_date] => 2019-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6539
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16389622
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/389622 | Metering cloud workloads at edge computing devices | Apr 18, 2019 | Issued |
Array
(
[id] => 15521111
[patent_doc_number] => 10567164
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Process efficient preprocessing for any encryption standard
[patent_app_type] => utility
[patent_app_number] => 16/388583
[patent_app_country] => US
[patent_app_date] => 2019-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4493
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16388583
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/388583 | Process efficient preprocessing for any encryption standard | Apr 17, 2019 | Issued |
Array
(
[id] => 17439989
[patent_doc_number] => 11265336
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-01
[patent_title] => Detecting anomalies in networks
[patent_app_type] => utility
[patent_app_number] => 16/368281
[patent_app_country] => US
[patent_app_date] => 2019-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5799
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16368281
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/368281 | Detecting anomalies in networks | Mar 27, 2019 | Issued |
Array
(
[id] => 16349467
[patent_doc_number] => 20200314118
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => DETECTING A MISSING SECURITY ALERT USING A MACHINE LEARNING MODEL
[patent_app_type] => utility
[patent_app_number] => 16/368704
[patent_app_country] => US
[patent_app_date] => 2019-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10202
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16368704
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/368704 | Detecting a missing security alert using a machine learning model | Mar 27, 2019 | Issued |
Array
(
[id] => 17909579
[patent_doc_number] => 11463455
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-10-04
[patent_title] => Identification and deobfuscation of obfuscated text in digital content
[patent_app_type] => utility
[patent_app_number] => 16/363887
[patent_app_country] => US
[patent_app_date] => 2019-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 7727
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16363887
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/363887 | Identification and deobfuscation of obfuscated text in digital content | Mar 24, 2019 | Issued |
Array
(
[id] => 15261901
[patent_doc_number] => 20190379684
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => SYSTEMS AND METHODS TO SHOW DETAILED STRUCTURE IN A SECURITY EVENTS GRAPH
[patent_app_type] => utility
[patent_app_number] => 16/361039
[patent_app_country] => US
[patent_app_date] => 2019-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8930
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 44
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16361039
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/361039 | Systems and methods to show detailed structure in a security events graph | Mar 20, 2019 | Issued |
Array
(
[id] => 17182286
[patent_doc_number] => 11159542
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-26
[patent_title] => Cloud view detection of virtual machine brute force attacks
[patent_app_type] => utility
[patent_app_number] => 16/361077
[patent_app_country] => US
[patent_app_date] => 2019-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7412
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16361077
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/361077 | Cloud view detection of virtual machine brute force attacks | Mar 20, 2019 | Issued |
Array
(
[id] => 17717572
[patent_doc_number] => 11381579
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-05
[patent_title] => Identifying fraudulent requests for content
[patent_app_type] => utility
[patent_app_number] => 16/354289
[patent_app_country] => US
[patent_app_date] => 2019-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 14836
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 380
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16354289
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/354289 | Identifying fraudulent requests for content | Mar 14, 2019 | Issued |
Array
(
[id] => 14575453
[patent_doc_number] => 20190215335
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-07-11
[patent_title] => METHOD AND SYSTEM FOR DELAYING MESSAGE DELIVERY TO USERS CATEGORIZED WITH LOW LEVEL OF AWARENESS TO SUSPICIUS MESSAGES
[patent_app_type] => utility
[patent_app_number] => 16/299197
[patent_app_country] => US
[patent_app_date] => 2019-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7653
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16299197
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/299197 | METHOD AND SYSTEM FOR DELAYING MESSAGE DELIVERY TO USERS CATEGORIZED WITH LOW LEVEL OF AWARENESS TO SUSPICIUS MESSAGES | Mar 11, 2019 | Abandoned |
Array
(
[id] => 16302199
[patent_doc_number] => 20200287922
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-10
[patent_title] => ANOMALY DETECTION FOR A NETWORKING DEVICE BASED ON MONITORING RELATED SETS OF COUNTERS
[patent_app_type] => utility
[patent_app_number] => 16/296373
[patent_app_country] => US
[patent_app_date] => 2019-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6970
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16296373
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/296373 | Anomaly detection for a networking device based on monitoring related sets of counters | Mar 7, 2019 | Issued |
Array
(
[id] => 16195274
[patent_doc_number] => 20200236123
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-23
[patent_title] => DETECTION OF ANOMALIES IN COMMUNITIES BASED ON ACCESS PATTERNS BY USERS
[patent_app_type] => utility
[patent_app_number] => 16/297513
[patent_app_country] => US
[patent_app_date] => 2019-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7429
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16297513
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/297513 | Detection of anomalies in communities based on access patterns by users | Mar 7, 2019 | Issued |
Array
(
[id] => 18343883
[patent_doc_number] => 11641370
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-05-02
[patent_title] => Attribute-based policies for integrity monitoring and network intrusion detection
[patent_app_type] => utility
[patent_app_number] => 16/975561
[patent_app_country] => US
[patent_app_date] => 2019-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 32915
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 399
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16975561
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/975561 | Attribute-based policies for integrity monitoring and network intrusion detection | Mar 6, 2019 | Issued |
Array
(
[id] => 14857451
[patent_doc_number] => 10417455
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-17
[patent_title] => Hardware security module
[patent_app_type] => utility
[patent_app_number] => 16/294178
[patent_app_country] => US
[patent_app_date] => 2019-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7278
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16294178
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/294178 | Hardware security module | Mar 5, 2019 | Issued |
Array
(
[id] => 14814259
[patent_doc_number] => 20190273739
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO A BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 16/291809
[patent_app_country] => US
[patent_app_date] => 2019-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4757
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16291809
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/291809 | Systems and methods for controlling access to a blockchain | Mar 3, 2019 | Issued |