| Application number | Title of the application | Filing Date | Status |
|---|
Array
(
[id] => 15202397
[patent_doc_number] => 10498714
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-03
[patent_title] => Method and system for authentication over a public network using multiple out-of band communications channels to send keys
[patent_app_type] => utility
[patent_app_number] => 15/188275
[patent_app_country] => US
[patent_app_date] => 2016-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3476
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15188275
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/188275 | Method and system for authentication over a public network using multiple out-of band communications channels to send keys | Jun 20, 2016 | Issued |
Array
(
[id] => 16418768
[patent_doc_number] => 10826680
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-03
[patent_title] => Collation system, collation method, and non-transitory recording medium
[patent_app_type] => utility
[patent_app_number] => 15/736121
[patent_app_country] => US
[patent_app_date] => 2016-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16155
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15736121
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/736121 | Collation system, collation method, and non-transitory recording medium | Jun 13, 2016 | Issued |
Array
(
[id] => 16309876
[patent_doc_number] => 10778696
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-15
[patent_title] => Vehicle-mounted relay device for detecting an unauthorized message on a vehicle communication bus
[patent_app_type] => utility
[patent_app_number] => 15/736833
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7916
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 332
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15736833
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/736833 | Vehicle-mounted relay device for detecting an unauthorized message on a vehicle communication bus | Jun 9, 2016 | Issued |
Array
(
[id] => 16149911
[patent_doc_number] => 10708044
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-07
[patent_title] => Pulse generation device using a radioisotope and authentication system
[patent_app_type] => utility
[patent_app_number] => 15/578475
[patent_app_country] => US
[patent_app_date] => 2016-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 39
[patent_no_of_words] => 19863
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 276
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15578475
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/578475 | Pulse generation device using a radioisotope and authentication system | Jun 1, 2016 | Issued |
Array
(
[id] => 15986535
[patent_doc_number] => 10673610
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-02
[patent_title] => System and method for protecting a cryptographic device against fault attacks while performing cryptographic non-linear operations using linear error correcting codes
[patent_app_type] => utility
[patent_app_number] => 15/578033
[patent_app_country] => US
[patent_app_date] => 2016-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 14
[patent_no_of_words] => 5641
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15578033
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/578033 | System and method for protecting a cryptographic device against fault attacks while performing cryptographic non-linear operations using linear error correcting codes | May 26, 2016 | Issued |
Array
(
[id] => 12992497
[patent_doc_number] => 20170346633
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => COMPUTING A SECURE ELLIPTIC CURVE SCALAR MULTIPLICATION USING AN UNSECURED AND SECURE ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 15/166925
[patent_app_country] => US
[patent_app_date] => 2016-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3901
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15166925
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/166925 | Computing a secure elliptic curve scalar multiplication using an unsecured and secure environment | May 26, 2016 | Issued |
Array
(
[id] => 12994318
[patent_doc_number] => 20170347264
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => SYSTEM AND METHOD FOR ESTABLISHING SECURE COMMUNICATION CHANNELS WITH INTERNET THINGS (IOT) DEVICES
[patent_app_type] => utility
[patent_app_number] => 15/167799
[patent_app_country] => US
[patent_app_date] => 2016-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 25002
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15167799
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/167799 | System and method for establishing secure communication channels with internet of things (IoT) devices | May 26, 2016 | Issued |
Array
(
[id] => 12820777
[patent_doc_number] => 20180165431
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-14
[patent_title] => METHOD, APPARATUS AND SYSTEM FOR DEVICE REPLACEMENT DETECTION AND DEVICE RECOMMENDATION
[patent_app_type] => utility
[patent_app_number] => 15/578686
[patent_app_country] => US
[patent_app_date] => 2016-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6171
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15578686
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/578686 | METHOD, APPARATUS AND SYSTEM FOR DEVICE REPLACEMENT DETECTION AND DEVICE RECOMMENDATION | May 23, 2016 | Abandoned |
Array
(
[id] => 14618311
[patent_doc_number] => 10361868
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-07-23
[patent_title] => Cryptographic content-based break-glass scheme for debug of trusted-execution environments in remote systems
[patent_app_type] => utility
[patent_app_number] => 15/161775
[patent_app_country] => US
[patent_app_date] => 2016-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7856
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15161775
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/161775 | Cryptographic content-based break-glass scheme for debug of trusted-execution environments in remote systems | May 22, 2016 | Issued |
Array
(
[id] => 11316640
[patent_doc_number] => 20160352750
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'SCALABLE APPLICATION-AS-A-SERVICE ENVIRONMENT AND SYSTEMS AND METHODS USEFUL IN CONJUNCTION THEREWITH'
[patent_app_type] => utility
[patent_app_number] => 15/161971
[patent_app_country] => US
[patent_app_date] => 2016-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8876
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15161971
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/161971 | Computerized system, method and computer program product, for managing a computer program's operations | May 22, 2016 | Issued |
Array
(
[id] => 11316640
[patent_doc_number] => 20160352750
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'SCALABLE APPLICATION-AS-A-SERVICE ENVIRONMENT AND SYSTEMS AND METHODS USEFUL IN CONJUNCTION THEREWITH'
[patent_app_type] => utility
[patent_app_number] => 15/161971
[patent_app_country] => US
[patent_app_date] => 2016-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8876
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15161971
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/161971 | Computerized system, method and computer program product, for managing a computer program's operations | May 22, 2016 | Issued |
Array
(
[id] => 14674187
[patent_doc_number] => 10375024
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-06
[patent_title] => Cloud-based virtual private access systems and methods
[patent_app_type] => utility
[patent_app_number] => 15/158153
[patent_app_country] => US
[patent_app_date] => 2016-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 19
[patent_no_of_words] => 10396
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15158153
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/158153 | Cloud-based virtual private access systems and methods | May 17, 2016 | Issued |
Array
(
[id] => 12006508
[patent_doc_number] => 20170310662
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-26
[patent_title] => 'Time-Based Local Authentication'
[patent_app_type] => utility
[patent_app_number] => 15/135789
[patent_app_country] => US
[patent_app_date] => 2016-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5310
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15135789
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/135789 | Time based local authentication in an information handling system utilizing asymmetric cryptography | Apr 21, 2016 | Issued |
Array
(
[id] => 14740219
[patent_doc_number] => 10389526
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Methods for quantum key distribution and related devices
[patent_app_type] => utility
[patent_app_number] => 15/135381
[patent_app_country] => US
[patent_app_date] => 2016-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7312
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15135381
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/135381 | Methods for quantum key distribution and related devices | Apr 20, 2016 | Issued |
Array
(
[id] => 17878394
[patent_doc_number] => 11450415
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-09-20
[patent_title] => Methods and systems for health insurance portability and accountability act application compliance
[patent_app_type] => utility
[patent_app_number] => 15/132146
[patent_app_country] => US
[patent_app_date] => 2016-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6604
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 286
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15132146
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/132146 | Methods and systems for health insurance portability and accountability act application compliance | Apr 17, 2016 | Issued |
Array
(
[id] => 14369131
[patent_doc_number] => 10305888
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-28
[patent_title] => Secure data entry via audio tones
[patent_app_type] => utility
[patent_app_number] => 15/089105
[patent_app_country] => US
[patent_app_date] => 2016-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 10720
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15089105
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/089105 | Secure data entry via audio tones | Mar 31, 2016 | Issued |
Array
(
[id] => 11015206
[patent_doc_number] => 20160212160
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'METHOD, DEVICE AND SYSTEM FOR ALERTING AGAINST UNKNOWN MALICIOUS CODES'
[patent_app_type] => utility
[patent_app_number] => 15/081018
[patent_app_country] => US
[patent_app_date] => 2016-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3742
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15081018
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/081018 | Method, device and system for alerting against unknown malicious codes within a network environment | Mar 24, 2016 | Issued |
Array
(
[id] => 11975690
[patent_doc_number] => 20170279844
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-28
[patent_title] => 'IDENTIFYING AND REMEDIATING AT-RISK RESOURCES IN A COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/079160
[patent_app_country] => US
[patent_app_date] => 2016-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6240
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15079160
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/079160 | Identifying and remediating at-risk resources in a computing environment | Mar 23, 2016 | Issued |
Array
(
[id] => 11008171
[patent_doc_number] => 20160205122
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-14
[patent_title] => 'System and Method for Cyber Security Analysis and Human Behavior Prediction'
[patent_app_type] => utility
[patent_app_number] => 15/076089
[patent_app_country] => US
[patent_app_date] => 2016-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10364
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15076089
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/076089 | System and method for cyber security analysis and human behavior prediction | Mar 20, 2016 | Issued |
Array
(
[id] => 14254819
[patent_doc_number] => 10277623
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Method of detection of comptromised accounts
[patent_app_type] => utility
[patent_app_number] => 15/075077
[patent_app_country] => US
[patent_app_date] => 2016-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4699
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 282
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15075077
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/075077 | Method of detection of comptromised accounts | Mar 17, 2016 | Issued |