| Application number | Title of the application | Filing Date | Status |
|---|
Array
(
[id] => 18225212
[patent_doc_number] => 20230064206
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-02
[patent_title] => QUERY ANALYSIS USING A PROTECTIVE LAYER AT THE DATA SOURCE
[patent_app_type] => utility
[patent_app_number] => 17/899950
[patent_app_country] => US
[patent_app_date] => 2022-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16904
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17899950
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/899950 | Query analysis using a protective layer at the data source | Aug 30, 2022 | Issued |
Array
(
[id] => 18098937
[patent_doc_number] => 20220417278
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-29
[patent_title] => SYSTEMS AND METHODS FOR AN ARTIFICIAL INTELLIGENCE DRIVEN AGENT
[patent_app_type] => utility
[patent_app_number] => 17/897212
[patent_app_country] => US
[patent_app_date] => 2022-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12046
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17897212
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/897212 | Systems and methods for an artificial intelligence driven agent | Aug 27, 2022 | Issued |
Array
(
[id] => 18556318
[patent_doc_number] => 20230254335
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-08-10
[patent_title] => MODEL BASED METHODOLOGY FOR TRANSLATING HIGH-LEVEL CYBER THREAT DESCRIPTIONS INTO SYSTEM-SPECIFIC ACTIONABLE DEFENSE TACTICS
[patent_app_type] => utility
[patent_app_number] => 17/821569
[patent_app_country] => US
[patent_app_date] => 2022-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13207
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17821569
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/821569 | Model based methodology for translating high-level cyber threat descriptions into system-specific actionable defense tactics | Aug 22, 2022 | Issued |
Array
(
[id] => 18079759
[patent_doc_number] => 20220405371
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-22
[patent_title] => CONTENT AUTHENTICATION AND VALIDATION VIA MULTI-FACTOR DIGITAL TOKENS, SYSTEMS, AND METHODS
[patent_app_type] => utility
[patent_app_number] => 17/890482
[patent_app_country] => US
[patent_app_date] => 2022-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19165
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17890482
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/890482 | Content authentication and validation via multi-factor digital tokens, systems, and methods | Aug 17, 2022 | Issued |
Array
(
[id] => 19782413
[patent_doc_number] => 12231461
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-18
[patent_title] => Prioritizing security controls using a cyber digital twin simulator
[patent_app_type] => utility
[patent_app_number] => 17/818784
[patent_app_country] => US
[patent_app_date] => 2022-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 20
[patent_no_of_words] => 12334
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17818784
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/818784 | Prioritizing security controls using a cyber digital twin simulator | Aug 9, 2022 | Issued |
Array
(
[id] => 18756300
[patent_doc_number] => 20230359748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-11-09
[patent_title] => SYSTEM AND METHOD FACILITATING ENCRYPTION PRESERVING FORMAT AS A DISTRIBUTED PROCESSING LIBRARY
[patent_app_type] => utility
[patent_app_number] => 18/246406
[patent_app_country] => US
[patent_app_date] => 2022-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8272
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18246406
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/246406 | SYSTEM AND METHOD FACILITATING ENCRYPTION PRESERVING FORMAT AS A DISTRIBUTED PROCESSING LIBRARY | Jul 26, 2022 | Pending |
Array
(
[id] => 18194781
[patent_doc_number] => 20230048300
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-02-16
[patent_title] => MAINTAINING CRYPTO TOKENS WITH IMPROVED BONDING CURVE
[patent_app_type] => utility
[patent_app_number] => 17/862325
[patent_app_country] => US
[patent_app_date] => 2022-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11772
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17862325
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/862325 | MAINTAINING CRYPTO TOKENS WITH IMPROVED BONDING CURVE | Jul 10, 2022 | Abandoned |
Array
(
[id] => 18140141
[patent_doc_number] => 20230013980
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-01-19
[patent_title] => FRAME INVALIDATION IN BUS SYSTEM VIA RECEIVE LINE
[patent_app_type] => utility
[patent_app_number] => 17/860931
[patent_app_country] => US
[patent_app_date] => 2022-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5752
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17860931
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/860931 | FRAME INVALIDATION IN BUS SYSTEM VIA RECEIVE LINE | Jul 7, 2022 | Pending |
Array
(
[id] => 18140141
[patent_doc_number] => 20230013980
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-01-19
[patent_title] => FRAME INVALIDATION IN BUS SYSTEM VIA RECEIVE LINE
[patent_app_type] => utility
[patent_app_number] => 17/860931
[patent_app_country] => US
[patent_app_date] => 2022-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5752
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17860931
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/860931 | FRAME INVALIDATION IN BUS SYSTEM VIA RECEIVE LINE | Jul 7, 2022 | Pending |
Array
(
[id] => 19421773
[patent_doc_number] => 20240297897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-05
[patent_title] => SYSTEMS AND METHODS FOR MAPPING A NETWORKED ENVIRONMENT WITH CROSS ACCOUNT CLUSTERING TO MONITORING AND/OR DETECT FRAUDULENT ENTITY NETWORKS
[patent_app_type] => utility
[patent_app_number] => 18/575468
[patent_app_country] => US
[patent_app_date] => 2022-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10428
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18575468
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/575468 | SYSTEMS AND METHODS FOR MAPPING A NETWORKED ENVIRONMENT WITH CROSS ACCOUNT CLUSTERING TO MONITORING AND/OR DETECT FRAUDULENT ENTITY NETWORKS | Jun 29, 2022 | Pending |
Array
(
[id] => 19443156
[patent_doc_number] => 12093421
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-09-17
[patent_title] => Systems and methods for managing tokens and filtering data to control data access
[patent_app_type] => utility
[patent_app_number] => 17/849911
[patent_app_country] => US
[patent_app_date] => 2022-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 13
[patent_no_of_words] => 20573
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17849911
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/849911 | Systems and methods for managing tokens and filtering data to control data access | Jun 26, 2022 | Issued |
Array
(
[id] => 18864533
[patent_doc_number] => 20230418969
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-12-28
[patent_title] => DATA PRIVACY WORKLOAD DISTRIBUTION IN A MULTI-TENANT HYBRID CLOUD COMPUTING ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 17/808233
[patent_app_country] => US
[patent_app_date] => 2022-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7591
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17808233
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/808233 | Data privacy workload distribution in a multi-tenant hybrid cloud computing environment | Jun 21, 2022 | Issued |
Array
(
[id] => 19640037
[patent_doc_number] => 12170656
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-12-17
[patent_title] => Authenticated assessment of network system assets
[patent_app_type] => utility
[patent_app_number] => 17/808078
[patent_app_country] => US
[patent_app_date] => 2022-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 29607
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17808078
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/808078 | Authenticated assessment of network system assets | Jun 20, 2022 | Issued |
Array
(
[id] => 19377438
[patent_doc_number] => 12069026
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-08-20
[patent_title] => Power line communication (PLC) denial of service attack
[patent_app_type] => utility
[patent_app_number] => 17/808105
[patent_app_country] => US
[patent_app_date] => 2022-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 23
[patent_no_of_words] => 20431
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17808105
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/808105 | Power line communication (PLC) denial of service attack | Jun 20, 2022 | Issued |
Array
(
[id] => 19874555
[patent_doc_number] => 12267434
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-04-01
[patent_title] => System and method for deploying a generated work
[patent_app_type] => utility
[patent_app_number] => 17/808044
[patent_app_country] => US
[patent_app_date] => 2022-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 5910
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17808044
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/808044 | System and method for deploying a generated work | Jun 20, 2022 | Issued |
Array
(
[id] => 18195393
[patent_doc_number] => 20230048912
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-02-16
[patent_title] => AUTHENTICATION PROCESSING SERVICES FOR GENERATING HIGH-ENTROPY CRYPTOGRAPHIC KEYS
[patent_app_type] => utility
[patent_app_number] => 17/840969
[patent_app_country] => US
[patent_app_date] => 2022-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 30762
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17840969
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/840969 | Authentication processing services for generating high-entropy cryptographic keys | Jun 14, 2022 | Issued |
Array
(
[id] => 18142397
[patent_doc_number] => 20230016241
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-01-19
[patent_title] => HIGHLY FLEXIBLE, SCALABLE MULTI BLOCKCHAIN, HIERARCHICAL DATA SHARING AND DATA STORING SYSTEM AND METHOD THEREOF
[patent_app_type] => utility
[patent_app_number] => 17/664760
[patent_app_country] => US
[patent_app_date] => 2022-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6031
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 67
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17664760
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/664760 | Highly flexible, scalable multi blockchain, hierarchical data sharing and data storing system and method thereof | May 23, 2022 | Issued |
Array
(
[id] => 20259827
[patent_doc_number] => 12432195
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-30
[patent_title] => Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities
[patent_app_type] => utility
[patent_app_number] => 17/923483
[patent_app_country] => US
[patent_app_date] => 2022-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 26
[patent_no_of_words] => 21139
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17923483
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/923483 | Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities | May 16, 2022 | Issued |
Array
(
[id] => 20259827
[patent_doc_number] => 12432195
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-30
[patent_title] => Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities
[patent_app_type] => utility
[patent_app_number] => 17/923483
[patent_app_country] => US
[patent_app_date] => 2022-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 26
[patent_no_of_words] => 21139
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17923483
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/923483 | Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities | May 16, 2022 | Issued |
Array
(
[id] => 19286882
[patent_doc_number] => 20240223362
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-04
[patent_title] => SYSTEM AND METHOD FOR DISTRIBUTION OF ENCRYPTED TRAFFIC IN A MULTIPLE INDEPENDENT LEVEL SECURITY ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 17/757298
[patent_app_country] => US
[patent_app_date] => 2022-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9461
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17757298
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/757298 | SYSTEM AND METHOD FOR DISTRIBUTION OF ENCRYPTED TRAFFIC IN A MULTIPLE INDEPENDENT LEVEL SECURITY ENVIRONMENT | May 9, 2022 | Abandoned |