Difference between revisions of "Cybersecurity Patent Application Trends 2024"

From WikiPatents
Jump to navigation Jump to search
(Updating Cybersecurity Patent Application Trends 2024)
 
(Updating Cybersecurity Patent Application Trends 2024)
 
Line 7: Line 7:
  
 
=== Top CPC Codes ===
 
=== Top CPC Codes ===
* [[:Category:CPC_G06F21/602|G06F21/602]] ({Providing cryptographic facilities or services})
+
* [[:Category:CPC_G06F21/602|G06F21/602]] (No explanation available)
 
** Count: 85 patents
 
** Count: 85 patents
 
** Example: [[20240232391. USING INQ TO OPTIMIZE END-TO-END ENCRYPTION MANAGEMENT WITH BACKUP APPLIANCES simplified abstract (EMC IP Holding Company LLC)]]
 
** Example: [[20240232391. USING INQ TO OPTIMIZE END-TO-END ENCRYPTION MANAGEMENT WITH BACKUP APPLIANCES simplified abstract (EMC IP Holding Company LLC)]]
* [[:Category:CPC_H04L9/008|H04L9/008]] ({involving homomorphic encryption})
+
* [[:Category:CPC_H04L9/008|H04L9/008]] (No explanation available)
 
** Count: 70 patents
 
** Count: 70 patents
 
** Example: [[20240235809. METHOD FOR HOMOMORPHIC ENCRYPTION OR DECRYPTION IN CONSIDERATION OF SPATIAL COMPLEXITY simplified abstract (CRYPTO LAB INC.)]]
 
** Example: [[20240235809. METHOD FOR HOMOMORPHIC ENCRYPTION OR DECRYPTION IN CONSIDERATION OF SPATIAL COMPLEXITY simplified abstract (CRYPTO LAB INC.)]]
* [[:Category:CPC_H04L63/20|H04L63/20]] ({for managing network security; network security policies in general  (filtering policies)
+
* [[:Category:CPC_H04L63/20|H04L63/20]] (No explanation available)
 
** Count: 66 patents
 
** Count: 66 patents
 
** Example: [[20240236043. Signature reporting system and method simplified abstract (Sophos Limited)]]
 
** Example: [[20240236043. Signature reporting system and method simplified abstract (Sophos Limited)]]
* [[:Category:CPC_H04L63/0428|H04L63/0428]] ({wherein the data content is protected, e.g. by encrypting or encapsulating the payload})
+
* [[:Category:CPC_H04L63/0428|H04L63/0428]] (No explanation available)
 
** Count: 64 patents
 
** Count: 64 patents
 
** Example: [[20240236053. SECURE INTERFACES FOR NEURAL DEVICES simplified abstract (PRECISION NEUROSCIENCE CORPORATION)]]
 
** Example: [[20240236053. SECURE INTERFACES FOR NEURAL DEVICES simplified abstract (PRECISION NEUROSCIENCE CORPORATION)]]
* [[:Category:CPC_H04L63/1416|H04L63/1416]] ({Event detection, e.g. attack signature detection})
+
* [[:Category:CPC_H04L63/1416|H04L63/1416]] (No explanation available)
 
** Count: 62 patents
 
** Count: 62 patents
 
** Example: [[20240236120. MANAGING AND DEPLOYING CUSTOM INTRUSION DETECTION SYSTEM SIGNATURE POLICIES simplified abstract (Visa International Service Association)]]
 
** Example: [[20240236120. MANAGING AND DEPLOYING CUSTOM INTRUSION DETECTION SYSTEM SIGNATURE POLICIES simplified abstract (Visa International Service Association)]]
* [[:Category:CPC_H04L9/14|H04L9/14]] (using a plurality of keys or algorithms)
+
* [[:Category:CPC_H04L9/14|H04L9/14]] (No explanation available)
 
** Count: 60 patents
 
** Count: 60 patents
 
** Example: [[20240235821. SYSTEMS AND METHODS FOR CONFIGURING A NETWORKED SYSTEM TO PERFORM THRESHOLD MULTI-PARTY COMPUTATION simplified abstract (PayPal, Inc.)]]
 
** Example: [[20240235821. SYSTEMS AND METHODS FOR CONFIGURING A NETWORKED SYSTEM TO PERFORM THRESHOLD MULTI-PARTY COMPUTATION simplified abstract (PayPal, Inc.)]]
* [[:Category:CPC_H04L63/1425|H04L63/1425]] ({Traffic logging, e.g. anomaly detection})
+
* [[:Category:CPC_H04L63/1425|H04L63/1425]] (No explanation available)
 
** Count: 54 patents
 
** Count: 54 patents
 
** Example: [[20240236055. METHOD FOR SECURE NETWORK COMMUNICATION AND SYSTEM THEREOF simplified abstract (SAMSUNG SDS CO., LTD.)]]
 
** Example: [[20240236055. METHOD FOR SECURE NETWORK COMMUNICATION AND SYSTEM THEREOF simplified abstract (SAMSUNG SDS CO., LTD.)]]
* [[:Category:CPC_H04L63/1433|H04L63/1433]] ({Vulnerability analysis})
+
* [[:Category:CPC_H04L63/1433|H04L63/1433]] (No explanation available)
 
** Count: 44 patents
 
** Count: 44 patents
 
** Example: [[20240232767. SYSTEMS AND METHODS FOR MONITORING INFORMATION SECURITY EFFECTIVENESS simplified abstract (RiskRecon Inc.)]]
 
** Example: [[20240232767. SYSTEMS AND METHODS FOR MONITORING INFORMATION SECURITY EFFECTIVENESS simplified abstract (RiskRecon Inc.)]]
* [[:Category:CPC_H04L9/0618|H04L9/0618]] ({Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation})
+
* [[:Category:CPC_H04L9/0618|H04L9/0618]] (No explanation available)
 
** Count: 39 patents
 
** Count: 39 patents
 
** Example: [[20240235810. CRYPTOGRAPHIC PROCESSOR FOR FULLY HOMOMORPHIC ENCRYPTION (FHE) APPLICATIONS simplified abstract (THE GOVERNING COUNCIL OF THE UNIVERSITY OF TORONTO)]]
 
** Example: [[20240235810. CRYPTOGRAPHIC PROCESSOR FOR FULLY HOMOMORPHIC ENCRYPTION (FHE) APPLICATIONS simplified abstract (THE GOVERNING COUNCIL OF THE UNIVERSITY OF TORONTO)]]
* [[:Category:CPC_H04L9/0825|H04L9/0825]] ({using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates})
+
* [[:Category:CPC_H04L9/0825|H04L9/0825]] (No explanation available)
 
** Count: 38 patents
 
** Count: 38 patents
 
** Example: [[20240235820. METHOD AND APPARATUS FOR SHARING KEYS FOR ENCRYPTION AND/OR DECRYPTION simplified abstract (Marvell Asia Pte Ltd)]]
 
** Example: [[20240235820. METHOD AND APPARATUS FOR SHARING KEYS FOR ENCRYPTION AND/OR DECRYPTION simplified abstract (Marvell Asia Pte Ltd)]]
Line 44: Line 44:
 
* Number of Cybersecurity patents: 36
 
* Number of Cybersecurity patents: 36
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_G06F12/1408|G06F12/1408]] ({by using cryptography  (for digital transmission): 8 patents
+
** [[:Category:CPC_G06F12/1408|G06F12/1408]] (No explanation available): 8 patents
** [[:Category:CPC_H04L9/008|H04L9/008]] ({involving homomorphic encryption}): 7 patents
+
** [[:Category:CPC_H04L9/008|H04L9/008]] (No explanation available): 7 patents
** [[:Category:CPC_G06F21/602|G06F21/602]] ({Providing cryptographic facilities or services}): 6 patents
+
** [[:Category:CPC_G06F21/602|G06F21/602]] (No explanation available): 6 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240031140. EFFICIENT LOW-OVERHEAD SIDE-CHANNEL PROTECTION FOR POLYNOMIAL MULTIPLICATION IN POST-QUANTUM ENCRYPTION simplified abstract (Intel Corporation)]] (20240125)
 
** [[20240031140. EFFICIENT LOW-OVERHEAD SIDE-CHANNEL PROTECTION FOR POLYNOMIAL MULTIPLICATION IN POST-QUANTUM ENCRYPTION simplified abstract (Intel Corporation)]] (20240125)
Line 54: Line 54:
 
* Number of Cybersecurity patents: 16
 
* Number of Cybersecurity patents: 16
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_H04L9/0825|H04L9/0825]] ({using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates}): 3 patents
+
** [[:Category:CPC_H04L9/0825|H04L9/0825]] (No explanation available): 3 patents
** [[:Category:CPC_G06Q2220/00|G06Q2220/00]] (Business processing using cryptography  (postage metering system using cryptography): 3 patents
+
** [[:Category:CPC_G06Q2220/00|G06Q2220/00]] (No explanation available): 3 patents
** [[:Category:CPC_H04L9/0894|H04L9/0894]] ({Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage}): 2 patents
+
** [[:Category:CPC_H04L9/0894|H04L9/0894]] (No explanation available): 2 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240039946. CYBERSECURITY RISK ASSESSMENT AND REMEDIATION TOOL simplified abstract (Capital One Services, LLC)]] (20240201)
 
** [[20240039946. CYBERSECURITY RISK ASSESSMENT AND REMEDIATION TOOL simplified abstract (Capital One Services, LLC)]] (20240201)
Line 64: Line 64:
 
* Number of Cybersecurity patents: 16
 
* Number of Cybersecurity patents: 16
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_H04L63/1416|H04L63/1416]] ({Event detection, e.g. attack signature detection}): 5 patents
+
** [[:Category:CPC_H04L63/1416|H04L63/1416]] (No explanation available): 5 patents
** [[:Category:CPC_G06F21/554|G06F21/554]] ({involving event detection and direct action}): 2 patents
+
** [[:Category:CPC_G06F21/554|G06F21/554]] (No explanation available): 2 patents
** [[:Category:CPC_G06F21/53|G06F21/53]] (by executing in a restricted environment, e.g. sandbox or secure virtual machine): 2 patents
+
** [[:Category:CPC_G06F21/53|G06F21/53]] (No explanation available): 2 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240086524. SYSTEM AND METHOD FOR AGENTLESS HOST CONFIGURATION DETECTION IN A COMPUTING ENVIRONMENT simplified abstract (Wiz, Inc.)]] (20240314)
 
** [[20240086524. SYSTEM AND METHOD FOR AGENTLESS HOST CONFIGURATION DETECTION IN A COMPUTING ENVIRONMENT simplified abstract (Wiz, Inc.)]] (20240314)
Line 74: Line 74:
 
* Number of Cybersecurity patents: 15
 
* Number of Cybersecurity patents: 15
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_G06F21/602|G06F21/602]] ({Providing cryptographic facilities or services}): 8 patents
+
** [[:Category:CPC_G06F21/602|G06F21/602]] (No explanation available): 8 patents
** [[:Category:CPC_G06F21/6218|G06F21/6218]] ({to a system of files or objects, e.g. local or distributed file system or database}): 3 patents
+
** [[:Category:CPC_G06F21/6218|G06F21/6218]] (No explanation available): 3 patents
** [[:Category:CPC_G06F21/78|G06F21/78]] (to assure secure storage of data  (address-based protection against unauthorised use of memory): 2 patents
+
** [[:Category:CPC_G06F21/78|G06F21/78]] (No explanation available): 2 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240086335. SYSTEMS AND METHODS OF SUPPORTING DEDUPLICATION AND COMPRESSION OF ENCRYPTED STORAGE VOLUMES simplified abstract (Dell Products L.P.)]] (20240314)
 
** [[20240086335. SYSTEMS AND METHODS OF SUPPORTING DEDUPLICATION AND COMPRESSION OF ENCRYPTED STORAGE VOLUMES simplified abstract (Dell Products L.P.)]] (20240314)
Line 84: Line 84:
 
* Number of Cybersecurity patents: 14
 
* Number of Cybersecurity patents: 14
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_H04L63/1416|H04L63/1416]] ({Event detection, e.g. attack signature detection}): 3 patents
+
** [[:Category:CPC_H04L63/1416|H04L63/1416]] (No explanation available): 3 patents
** [[:Category:CPC_H04L63/083|H04L63/083]] ({using passwords  (cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code): 2 patents
+
** [[:Category:CPC_H04L63/083|H04L63/083]] (No explanation available): 2 patents
** [[:Category:CPC_H04L63/1425|H04L63/1425]] ({Traffic logging, e.g. anomaly detection}): 2 patents
+
** [[:Category:CPC_H04L63/1425|H04L63/1425]] (No explanation available): 2 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240073200. INFORMATION SECURITY SYSTEM AND METHOD FOR PHISHING THREAT PREVENTION USING TOKENS simplified abstract (Bank of America Corporation)]] (20240229)
 
** [[20240073200. INFORMATION SECURITY SYSTEM AND METHOD FOR PHISHING THREAT PREVENTION USING TOKENS simplified abstract (Bank of America Corporation)]] (20240229)
Line 94: Line 94:
 
* Number of Cybersecurity patents: 14
 
* Number of Cybersecurity patents: 14
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_H04L63/20|H04L63/20]] ({for managing network security; network security policies in general  (filtering policies): 8 patents
+
** [[:Category:CPC_H04L63/20|H04L63/20]] (No explanation available): 8 patents
** [[:Category:CPC_H04L63/029|H04L63/029]] ({Firewall traversal, e.g. tunnelling or, creating pinholes}): 4 patents
+
** [[:Category:CPC_H04L63/029|H04L63/029]] (No explanation available): 4 patents
** [[:Category:CPC_H04L63/0263|H04L63/0263]] ({Rule management}): 3 patents
+
** [[:Category:CPC_H04L63/0263|H04L63/0263]] (No explanation available): 3 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240214420. APPLICATION FIREWALL simplified abstract (Sophos Limited)]] (20240627)
 
** [[20240214420. APPLICATION FIREWALL simplified abstract (Sophos Limited)]] (20240627)
Line 104: Line 104:
 
* Number of Cybersecurity patents: 13
 
* Number of Cybersecurity patents: 13
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_H04L63/20|H04L63/20]] ({for managing network security; network security policies in general  (filtering policies): 3 patents
+
** [[:Category:CPC_H04L63/20|H04L63/20]] (No explanation available): 3 patents
** [[:Category:CPC_H04L63/0485|H04L63/0485]] ({Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up}): 2 patents
+
** [[:Category:CPC_H04L63/0485|H04L63/0485]] (No explanation available): 2 patents
** [[:Category:CPC_H04L12/4633|H04L12/4633]] ({Interconnection of networks using encapsulation techniques, e.g. tunneling}): 2 patents
+
** [[:Category:CPC_H04L12/4633|H04L12/4633]] (No explanation available): 2 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240223544. HIGH BANDWIDTH ENCRYPTION ENGINES IN A MULTIPATHING IP NETWORK simplified abstract (Cisco Technology, Inc.)]] (20240704)
 
** [[20240223544. HIGH BANDWIDTH ENCRYPTION ENGINES IN A MULTIPATHING IP NETWORK simplified abstract (Cisco Technology, Inc.)]] (20240704)
Line 114: Line 114:
 
* Number of Cybersecurity patents: 12
 
* Number of Cybersecurity patents: 12
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_H04L9/0869|H04L9/0869]] ({involving random numbers or seeds}): 4 patents
+
** [[:Category:CPC_H04L9/0869|H04L9/0869]] (No explanation available): 4 patents
** [[:Category:CPC_H04L9/008|H04L9/008]] ({involving homomorphic encryption}): 3 patents
+
** [[:Category:CPC_H04L9/008|H04L9/008]] (No explanation available): 3 patents
** [[:Category:CPC_G06F13/4282|G06F13/4282]] (Bus transfer protocol, e.g. handshake; Synchronisation): 2 patents
+
** [[:Category:CPC_G06F13/4282|G06F13/4282]] (No explanation available): 2 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240072992. HOMOMORPHIC ENCRYPTION OPERATOR, STORAGE DEVICE INCLUDING THE SAME, AND LEVEL CONFIGURATION METHOD THEREOF simplified abstract (Samsung Electronics Co., Ltd.)]] (20240229)
 
** [[20240072992. HOMOMORPHIC ENCRYPTION OPERATOR, STORAGE DEVICE INCLUDING THE SAME, AND LEVEL CONFIGURATION METHOD THEREOF simplified abstract (Samsung Electronics Co., Ltd.)]] (20240229)
Line 124: Line 124:
 
* Number of Cybersecurity patents: 11
 
* Number of Cybersecurity patents: 11
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_H04L63/1425|H04L63/1425]] ({Traffic logging, e.g. anomaly detection}): 2 patents
+
** [[:Category:CPC_H04L63/1425|H04L63/1425]] (No explanation available): 2 patents
** [[:Category:CPC_G06F21/602|G06F21/602]] ({Providing cryptographic facilities or services}): 2 patents
+
** [[:Category:CPC_G06F21/602|G06F21/602]] (No explanation available): 2 patents
** [[:Category:CPC_H04L9/30|H04L9/30]] (Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy): 2 patents
+
** [[:Category:CPC_H04L9/30|H04L9/30]] (No explanation available): 2 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240089100. USING A SECURE ENCLAVE TO SATISFY RETENTION AND EXPUNGEMENT REQUIREMENTS WITH RESPECT TO PRIVATE DATA simplified abstract (Microsoft Technology Licensing, LLC)]] (20240314)
 
** [[20240089100. USING A SECURE ENCLAVE TO SATISFY RETENTION AND EXPUNGEMENT REQUIREMENTS WITH RESPECT TO PRIVATE DATA simplified abstract (Microsoft Technology Licensing, LLC)]] (20240314)
Line 134: Line 134:
 
* Number of Cybersecurity patents: 10
 
* Number of Cybersecurity patents: 10
 
* Top CPC codes:
 
* Top CPC codes:
** [[:Category:CPC_G06F21/64|G06F21/64]] (Protecting data integrity, e.g. using checksums, certificates or signatures): 2 patents
+
** [[:Category:CPC_G06F21/64|G06F21/64]] (No explanation available): 2 patents
** [[:Category:CPC_H04L63/0263|H04L63/0263]] ({Rule management}): 2 patents
+
** [[:Category:CPC_H04L63/0263|H04L63/0263]] (No explanation available): 2 patents
** [[:Category:CPC_G06N20/00|G06N20/00]] (Machine learning): 2 patents
+
** [[:Category:CPC_G06N20/00|G06N20/00]] (No explanation available): 2 patents
 
* Recent patents:
 
* Recent patents:
 
** [[20240098114. System and Method for Identifying and Managing Cybersecurity Top Threats simplified abstract (Google LLC)]] (20240321)
 
** [[20240098114. System and Method for Identifying and Managing Cybersecurity Top Threats simplified abstract (Google LLC)]] (20240321)
Line 150: Line 150:
 
[[File:Emerging_Technology_Areas_in_Cybersecurity.png|border|800px]]
 
[[File:Emerging_Technology_Areas_in_Cybersecurity.png|border|800px]]
  
* [[:Category:CPC_H04W76/14|H04W76/14]] (Direct-mode setup)
+
* [[:Category:CPC_H04W76/14|H04W76/14]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240048990. BLUETOOTH CONNECTION METHOD AND SYSTEM, INTELLIGENT TERMINAL, AND COMPUTER STORAGE MEDIUM simplified abstract (SHENZHEN TCL NEW TECHNOLOGY CO., LTD.)]]
 
** Example: [[20240048990. BLUETOOTH CONNECTION METHOD AND SYSTEM, INTELLIGENT TERMINAL, AND COMPUTER STORAGE MEDIUM simplified abstract (SHENZHEN TCL NEW TECHNOLOGY CO., LTD.)]]
* [[:Category:CPC_H04L9/0662|H04L9/0662]] ({with particular pseudorandom sequence generator})
+
* [[:Category:CPC_H04L9/0662|H04L9/0662]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240048534. NETWORK SECURITY DEVICES AND METHOD simplified abstract (Wattre, Inc.)]]
 
** Example: [[20240048534. NETWORK SECURITY DEVICES AND METHOD simplified abstract (Wattre, Inc.)]]
* [[:Category:CPC_H04L67/52|H04L67/52]] (specially adapted for the location of the user terminal)
+
* [[:Category:CPC_H04L67/52|H04L67/52]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240048434. TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS simplified abstract (PARRABLE INC.)]]
 
** Example: [[20240048434. TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS simplified abstract (PARRABLE INC.)]]
* [[:Category:CPC_H04L61/4547|H04L61/4547]] ({for personal communications, i.e. using a personal identifier})
+
* [[:Category:CPC_H04L61/4547|H04L61/4547]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240048434. TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS simplified abstract (PARRABLE INC.)]]
 
** Example: [[20240048434. TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS simplified abstract (PARRABLE INC.)]]
* [[:Category:CPC_H04L41/0266|H04L41/0266]] (using meta-data, objects or commands for formatting management information, e.g. using eXtensible markup language [XML])
+
* [[:Category:CPC_H04L41/0266|H04L41/0266]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240048434. TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS simplified abstract (PARRABLE INC.)]]
 
** Example: [[20240048434. TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS simplified abstract (PARRABLE INC.)]]
* [[:Category:CPC_H04L41/0293|H04L41/0293]] ({for accessing web services by means of a binding identification of the management service or element})
+
* [[:Category:CPC_H04L41/0293|H04L41/0293]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240048434. TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS simplified abstract (PARRABLE INC.)]]
 
** Example: [[20240048434. TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS simplified abstract (PARRABLE INC.)]]
* [[:Category:CPC_H04L2209/601|H04L2209/601]] (TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION  (arrangements common to telegraphic and telephonic communication)
+
* [[:Category:CPC_H04L2209/601|H04L2209/601]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240048360. METHOD FOR PROCESSING MULTI-SOURCE DATA simplified abstract (JINGDONG TECHNOLOGY HOLDING CO., LTD.)]]
 
** Example: [[20240048360. METHOD FOR PROCESSING MULTI-SOURCE DATA simplified abstract (JINGDONG TECHNOLOGY HOLDING CO., LTD.)]]
* [[:Category:CPC_H04L67/1074|H04L67/1074]] (for supporting data block transmission mechanisms  (file transfer)
+
* [[:Category:CPC_H04L67/1074|H04L67/1074]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240048357. SYMMETRIC ENCRYPTION FOR PRIVATE SMART CONTRACTS AMONG MULTIPLE PARTIES IN A PRIVATE PEER-TO-PEER NETWORK simplified abstract (Experian Information Solutions, Inc.)]]
 
** Example: [[20240048357. SYMMETRIC ENCRYPTION FOR PRIVATE SMART CONTRACTS AMONG MULTIPLE PARTIES IN A PRIVATE PEER-TO-PEER NETWORK simplified abstract (Experian Information Solutions, Inc.)]]
* [[:Category:CPC_G06F17/10|G06F17/10]] (Complex mathematical operations {(function generation by table look-up)
+
* [[:Category:CPC_G06F17/10|G06F17/10]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240048353. ENCRYPTION PROCESSING DEVICE AND ENCRYPTION PROCESSING METHOD simplified abstract (AXELL CORPORATION)]]
 
** Example: [[20240048353. ENCRYPTION PROCESSING DEVICE AND ENCRYPTION PROCESSING METHOD simplified abstract (AXELL CORPORATION)]]
* [[:Category:CPC_G06F21/46|G06F21/46]] (ELECTRIC DIGITAL DATA PROCESSING  (computer systems based on specific computational models)
+
* [[:Category:CPC_G06F21/46|G06F21/46]] (No explanation available)
 
** Count: 1 patents
 
** Count: 1 patents
 
** Example: [[20240045972. BUILDING MANAGEMENT SYSTEM WITH CYBER HEALTH DASHBOARD simplified abstract (Johnson Controls Tyco IP Holdings LLP)]]
 
** Example: [[20240045972. BUILDING MANAGEMENT SYSTEM WITH CYBER HEALTH DASHBOARD simplified abstract (Johnson Controls Tyco IP Holdings LLP)]]

Latest revision as of 03:47, 16 July 2024

Cybersecurity Patent Application Filing Activity

Cybersecurity patent applications in 2024

Cybersecurity Monthly Patent Applications 2024 - Up to June 2024.png

Top Technology Areas in Cybersecurity

Top Technology Areas in Cybersecurity 2024 - Up to June 2024.png

Top CPC Codes

Top Companies in Cybersecurity

Top Companies in Cybersecurity.png

Intel Corporation

Capital One Services, LLC

Wiz, Inc.

Dell Products L.P.

Bank of America Corporation

Sophos Limited

Cisco Technology, Inc.

Samsung Electronics Co., Ltd.

Microsoft Technology Licensing, LLC

Google LLC

New Companies in Cybersecurity (Last Month)

800px

No new companies detected in the last month.

Emerging Technology Areas in Cybersecurity

Emerging Technology Areas in Cybersecurity.png

Top Companies in Emerging Cybersecurity Technologies

Top Companies in Emerging Cybersecurity Technologies.png