| Application number | Title of the application | Filing Date | Status |
|---|
Array
(
[id] => 13757041
[patent_doc_number] => 10171483
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-01
[patent_title] => Utilizing endpoint asset awareness for network intrusion detection
[patent_app_type] => utility
[patent_app_number] => 13/974440
[patent_app_country] => US
[patent_app_date] => 2013-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5543
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 276
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13974440
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/974440 | Utilizing endpoint asset awareness for network intrusion detection | Aug 22, 2013 | Issued |
Array
(
[id] => 11452505
[patent_doc_number] => 09576153
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-21
[patent_title] => 'Device and method for providing information from a backend component to a frontend component by a secure device management abstraction and unification module'
[patent_app_type] => utility
[patent_app_number] => 13/974619
[patent_app_country] => US
[patent_app_date] => 2013-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8984
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 328
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13974619
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/974619 | Device and method for providing information from a backend component to a frontend component by a secure device management abstraction and unification module | Aug 22, 2013 | Issued |
Array
(
[id] => 10178134
[patent_doc_number] => 09208339
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-08
[patent_title] => 'Verifying Applications in Virtual Environments Using a Trusted Security Zone'
[patent_app_type] => utility
[patent_app_number] => 13/964112
[patent_app_country] => US
[patent_app_date] => 2013-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 11787
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13964112
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/964112 | Verifying Applications in Virtual Environments Using a Trusted Security Zone | Aug 11, 2013 | Issued |
Array
(
[id] => 9163848
[patent_doc_number] => 20130312125
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'METHOD AND APPARATUS FOR SECURE TRUSTED TIME TECHNIQUES'
[patent_app_type] => utility
[patent_app_number] => 13/949677
[patent_app_country] => US
[patent_app_date] => 2013-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10821
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13949677
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/949677 | Method and apparatus for protecting time values in wireless communications | Jul 23, 2013 | Issued |
Array
(
[id] => 9147308
[patent_doc_number] => 20130301831
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-14
[patent_title] => 'DATA STRUCTURE OF MULTIMEDIA FILE FORMAT, ENCRYPTING METHOD AND DEVICE THEREOF, AND DECRYPTING METHOD AND DEVICE THEREOF'
[patent_app_type] => utility
[patent_app_number] => 13/941937
[patent_app_country] => US
[patent_app_date] => 2013-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7689
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13941937
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/941937 | Data structure of multimedia file format, encrypting method and device thereof, and decrypting method and device thereof | Jul 14, 2013 | Issued |
Array
(
[id] => 9150789
[patent_doc_number] => 20130305312
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-14
[patent_title] => 'METHOD AND SYSTEM FOR AUTHENTICATION BY DEFINING A DEMANDED LEVEL OF SECURITY'
[patent_app_type] => utility
[patent_app_number] => 13/941882
[patent_app_country] => US
[patent_app_date] => 2013-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8122
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13941882
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/941882 | Method and system for authentication by defining a demanded level of security | Jul 14, 2013 | Issued |
Array
(
[id] => 10552278
[patent_doc_number] => 09276919
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-01
[patent_title] => 'System and method for recognizing malicious credential guessing attacks'
[patent_app_type] => utility
[patent_app_number] => 13/940625
[patent_app_country] => US
[patent_app_date] => 2013-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 17409
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13940625
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/940625 | System and method for recognizing malicious credential guessing attacks | Jul 11, 2013 | Issued |
Array
(
[id] => 9829562
[patent_doc_number] => 08938802
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-20
[patent_title] => 'System and method for run-time attack prevention'
[patent_app_type] => utility
[patent_app_number] => 13/932888
[patent_app_country] => US
[patent_app_date] => 2013-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10055
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13932888
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/932888 | System and method for run-time attack prevention | Jun 30, 2013 | Issued |
Array
(
[id] => 11788374
[patent_doc_number] => 09397877
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-19
[patent_title] => 'Method and apparatus for concurrent filtering of multiple components of streaming data'
[patent_app_type] => utility
[patent_app_number] => 13/927019
[patent_app_country] => US
[patent_app_date] => 2013-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 54
[patent_figures_cnt] => 54
[patent_no_of_words] => 23560
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13927019
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/927019 | Method and apparatus for concurrent filtering of multiple components of streaming data | Jun 24, 2013 | Issued |
Array
(
[id] => 9193410
[patent_doc_number] => 20130332725
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-12
[patent_title] => 'INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/903161
[patent_app_country] => US
[patent_app_date] => 2013-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 8184
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13903161
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/903161 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM | May 27, 2013 | Abandoned |
Array
(
[id] => 10179904
[patent_doc_number] => 09210128
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-08
[patent_title] => 'Filtering of applications for access to an enterprise network'
[patent_app_type] => utility
[patent_app_number] => 13/902820
[patent_app_country] => US
[patent_app_date] => 2013-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 3552
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13902820
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/902820 | Filtering of applications for access to an enterprise network | May 25, 2013 | Issued |
Array
(
[id] => 10072722
[patent_doc_number] => 09111082
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-18
[patent_title] => 'Secure electronic identification device'
[patent_app_type] => utility
[patent_app_number] => 13/902834
[patent_app_country] => US
[patent_app_date] => 2013-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 7
[patent_no_of_words] => 5072
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13902834
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/902834 | Secure electronic identification device | May 25, 2013 | Issued |
Array
(
[id] => 10029660
[patent_doc_number] => 09071579
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-06-30
[patent_title] => 'System for sender/receiver to send or receive mood related, time sensitive or secretive content/messages'
[patent_app_type] => utility
[patent_app_number] => 13/902801
[patent_app_country] => US
[patent_app_date] => 2013-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 39
[patent_figures_cnt] => 40
[patent_no_of_words] => 12536
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13902801
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/902801 | System for sender/receiver to send or receive mood related, time sensitive or secretive content/messages | May 24, 2013 | Issued |
Array
(
[id] => 10009807
[patent_doc_number] => 09053329
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-09
[patent_title] => 'Systems and methods for validated secure data access'
[patent_app_type] => utility
[patent_app_number] => 13/901401
[patent_app_country] => US
[patent_app_date] => 2013-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 18
[patent_no_of_words] => 9771
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13901401
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/901401 | Systems and methods for validated secure data access | May 22, 2013 | Issued |
Array
(
[id] => 12337824
[patent_doc_number] => 09948614
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-17
[patent_title] => Remote device initialization using asymmetric cryptography
[patent_app_type] => utility
[patent_app_number] => 13/901248
[patent_app_country] => US
[patent_app_date] => 2013-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2731
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13901248
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/901248 | Remote device initialization using asymmetric cryptography | May 22, 2013 | Issued |
Array
(
[id] => 10948857
[patent_doc_number] => 20140351878
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-27
[patent_title] => 'LOCATION-AWARE RATE-LIMITING METHOD FOR MITIGATION OF DENIAL-OF-SERVICE ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 13/900576
[patent_app_country] => US
[patent_app_date] => 2013-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4059
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13900576
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/900576 | Location-aware rate-limiting method for mitigation of denial-of-service attacks | May 22, 2013 | Issued |
Array
(
[id] => 9424590
[patent_doc_number] => 20140109241
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-17
[patent_title] => 'Data Protection Method and Electronic Device'
[patent_app_type] => utility
[patent_app_number] => 13/900562
[patent_app_country] => US
[patent_app_date] => 2013-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 2338
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13900562
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/900562 | Data protection method and electronic device capable of creating a private folder having a same name as a public folder to hide private data | May 22, 2013 | Issued |
Array
(
[id] => 10503528
[patent_doc_number] => 09231931
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-05
[patent_title] => 'Method and apparatus of constructing secure infra-structure for using embedded universal integrated circuit card'
[patent_app_type] => utility
[patent_app_number] => 13/901126
[patent_app_country] => US
[patent_app_date] => 2013-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 12
[patent_no_of_words] => 8315
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13901126
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/901126 | Method and apparatus of constructing secure infra-structure for using embedded universal integrated circuit card | May 22, 2013 | Issued |
Array
(
[id] => 9044505
[patent_doc_number] => 20130247143
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-19
[patent_title] => 'SYSTEM AND METHOD FOR CONFIGURING DEVICES FOR SECURE OPERATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/891350
[patent_app_country] => US
[patent_app_date] => 2013-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6204
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13891350
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/891350 | System and method for configuring devices for secure operations | May 9, 2013 | Issued |
Array
(
[id] => 9033485
[patent_doc_number] => 20130236123
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-12
[patent_title] => 'DIGITAL ANTI-COUNTERFEITING SOFTWARE METHOD AND APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 13/868601
[patent_app_country] => US
[patent_app_date] => 2013-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 10821
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13868601
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/868601 | DIGITAL ANTI-COUNTERFEITING SOFTWARE METHOD AND APPARATUS | Apr 22, 2013 | Abandoned |