|
|
Line 3: |
Line 3: |
| == Executive Summary == | | == Executive Summary == |
|
| |
|
| On July 10 2025, '''{{formatnum:70}}''' patent applications related to Cybersecurity were published, representing 1.0% of all patent applications for the day. This moderate level of activity shows Cybersecurity is gaining significant attention from innovators. | | On July 10 2025, '''{{formatnum:207}}''' patent applications related to Cybersecurity were published, representing 3.0% of all patent applications for the day. This moderate level of activity shows Cybersecurity is gaining significant attention from innovators. |
| | |
| == Market Analysis ==
| |
| | |
| === Leading Organizations ===
| |
| | |
| The top organizations driving Cybersecurity innovation include:
| |
| | |
| * '''[[Capital One Services, LLC patent applications on 2025-07-10|Capital One Services, LLC]]''': 5 applications (7.1% of Cybersecurity patents)
| |
| * '''[[Cisco Technology, Inc. patent applications on 2025-07-10|Cisco Technology, Inc.]]''': 4 applications (5.7% of Cybersecurity patents)
| |
| * '''[[OKTA, INC. patent applications on 2025-07-10|OKTA, INC.]]''': 2 applications (2.9% of Cybersecurity patents)
| |
| * '''[[Micron Technology, Inc. patent applications on 2025-07-10|Micron Technology, Inc.]]''': 2 applications (2.9% of Cybersecurity patents)
| |
| * '''[[MASTERCARD INTERNATIONAL INCORPORATED patent applications on 2025-07-10|MASTERCARD INTERNATIONAL INCORPORATED]]''': 2 applications (2.9% of Cybersecurity patents)
| |
| | |
| These 5 organizations account for 15 applications (21.4% of all Cybersecurity patents), indicating moderate concentration in the field.
| |
| | |
| == Technology Deep Dive ==
| |
| | |
| === Core Innovation Areas ===
| |
| | |
| Patent applications in Cybersecurity encompass several key innovation areas:
| |
| | |
| * '''[https://wikipatents.org/index.php?search=cybersecurity Cybersecurity]''': Core technology area
| |
| * '''[https://wikipatents.org/index.php?search=information+security Information Security]''': Core technology area
| |
| * '''[https://wikipatents.org/index.php?search=encryption Encryption]''': Core technology area
| |
| * '''[https://wikipatents.org/index.php?search=data+protection Data Protection]''': Core technology area
| |
| * '''[https://wikipatents.org/index.php?search=network+security Network Security]''': Core technology area
| |
| * '''[https://wikipatents.org/index.php?search=threat+detection Threat Detection]''': Core technology area
| |
| * '''[https://wikipatents.org/index.php?search=malware Malware]''': Core technology area
| |
| * '''[https://wikipatents.org/index.php?search=intrusion+detection Intrusion Detection]''': Core technology area
| |
| | |
| Emerging areas include:
| |
| | |
| * '''[https://wikipatents.org/index.php?search=zero+trust Zero Trust]''': Developing technology
| |
| * '''[https://wikipatents.org/index.php?search=identity+management Identity Management]''': Developing technology
| |
| * '''[https://wikipatents.org/index.php?search=authentication Authentication]''': Developing technology
| |
| * '''[https://wikipatents.org/index.php?search=cyber+attack Cyber Attack]''': Developing technology
| |
| | |
| === Technical Classification Analysis ===
| |
| | |
| The most active CPC classifications in Cybersecurity include:
| |
| | |
| * '''[[CPC G06F21/32|G06F21/32]]''' (using biometric data, e.g. fingerprints, iris scans or voiceprints): 5 applications (7.1%)
| |
| * '''[[CPC H04L63/08|H04L63/08]]''' ({for authentication of entities (cryptographic mechanisms or cryptographic arrangements for entity authentication): 5 applications (7.1%)
| |
| * '''[[CPC H04W12/06|H04W12/06]]''' (Authentication): 5 applications (7.1%)
| |
| * '''[[CPC H04L9/3213|H04L9/3213]]''' ({using tickets or tokens, e.g. Kerberos (network architectures or network communication protocols for entities authentication using tickets in a packet data network): 5 applications (7.1%)
| |
| * '''[[CPC G06F21/31|G06F21/31]]''' (User authentication): 4 applications (5.7%)
| |
| * '''[[CPC G06F21/554|G06F21/554]]''' ({involving event detection and direct action}): 3 applications (4.3%)
| |
| * '''[[CPC G06N20/00|G06N20/00]]''' (Machine learning): 3 applications (4.3%)
| |
| * '''[[CPC H04L9/3247|H04L9/3247]]''' ({involving digital signatures}): 3 applications (4.3%)
| |
| * '''[[CPC H04L63/0428|H04L63/0428]]''' ({wherein the data content is protected, e.g. by encrypting or encapsulating the payload}): 3 applications (4.3%)
| |
| * '''[[CPC G06F8/60|G06F8/60]]''' (Software deployment): 2 applications (2.9%)
| |
| | |
| === Global Innovation Landscape ===
| |
| | |
| Innovation in Cybersecurity spans multiple countries:
| |
| | |
| * '''[[Inventors from US|US]]''': 161 inventors (65.7%)
| |
| * '''[[Inventors from KR|KR]]''': 16 inventors (6.5%)
| |
| * '''[[Inventors from IN|IN]]''': 11 inventors (4.5%)
| |
| * '''[[Inventors from JP|JP]]''': 9 inventors (3.7%)
| |
| * '''[[Inventors from CN|CN]]''': 8 inventors (3.3%)
| |
| * '''[[Inventors from CA|CA]]''': 6 inventors (2.4%)
| |
| * '''[[Inventors from DE|DE]]''': 6 inventors (2.4%)
| |
| * '''[[Inventors from CH|CH]]''': 5 inventors (2.0%)
| |
| * '''[[Inventors from IT|IT]]''': 5 inventors (2.0%)
| |
| * '''[[Inventors from IL|IL]]''': 4 inventors (1.6%)
| |
| | |
| The United States accounts for 65.7% of inventors in Cybersecurity, indicating strong domestic innovation leadership.
| |
| | |
| === Industry Collaborations ===
| |
| | |
| Notable collaborations in Cybersecurity include:
| |
| | |
| * '''[[Samsung Electronics Co., Ltd. patent applications on 2025-07-10|Samsung Electronics Co., Ltd.]]''' × '''[[Chung Ang University Industry Academic Cooperation Foundation patent applications on 2025-07-10|Chung Ang University Industry Academic Cooperation Foundation]]''': 1 joint applications
| |
| | |
| These collaborations represent 1 joint applications, indicating moderate industry cooperation in Cybersecurity.
| |
| | |
| === Leading Inventors ===
| |
| | |
| Key inventors driving Cybersecurity innovation:
| |
| | |
| * '''[[:Category:Srinath Gundavelli|Srinath Gundavelli]]''': 2 applications
| |
| * '''[[:Category:Avinash Kalyanaraman|Avinash Kalyanaraman]]''': 2 applications
| |
| * '''[[:Category:Arman Rezaee|Arman Rezaee]]''': 2 applications
| |
| * '''[[:Category:Pradeep Kumar Kathail|Pradeep Kumar Kathail]]''': 2 applications
| |
| * '''[[:Category:Doron Drusinsky|Doron Drusinsky]]''': 2 applications
| |
| * '''[[:Category:Kfir Aharon TISHBI|Kfir Aharon TISHBI]]''': 2 applications
| |
| * '''[[:Category:Raanan RAZ|Raanan RAZ]]''': 2 applications
| |
| * '''[[:Category:Ricky CHAN|Ricky CHAN]]''': 2 applications
| |
| * '''[[:Category:Vijaya Basker BALAKRISHNAN|Vijaya Basker BALAKRISHNAN]]''': 2 applications
| |
| * '''[[:Category:Kanishka HETTIARACHCHI|Kanishka HETTIARACHCHI]]''': 2 applications
| |
| | |
| === Recent Patent Applications ===
| |
| | |
| Representative Cybersecurity patent applications from July 10 2025:
| |
| | |
| ==== 20250221635. BLOOD FLOW AUTHENTICATION RING ====
| |
| '''Applicant:''' BIONICS CO., LTD.
| |
| | |
| '''Abstract:''' Provided is a blood flow authentication ring that can achieve focus in a captured image regardless of finger size, can prevent reduction of contrast due to external light, or simplifies personal regis...
| |
| | |
| ==== 20250224941. SOFTWARE CODE CONVERSION SYSTEM FACILITATING INTERPROCESS COMMUNICATION ====
| |
| '''Applicant:''' Truist Bank
| |
| | |
| '''Abstract:''' Systems and methods receive authentication information to access a web-based application configured to transmit API call(s) to a cloud platform hosting LLM(s) trained to interpret from a sequence of t...
| |
| | |
| ==== 20250224947. AUTOMATIC SOFTWARE UPGRADING IN SECURE ENCLAVES FOR TENANT-SPECIFIC ENCRYPTION WORKLOADS ====
| |
| '''Applicant:''' OKTA, INC.
| |
| | |
| '''Abstract:''' Methods, systems, devices, and computer-readable media for automatically updating software in secure enclaves are described. A secrets management system may receive an indication that an updated versi...
| |
| | |
| ==== 20250225215. SYSTEMS AND METHODS FOR ADJUSTING ACCESS PARAMETERS OF AUTHENTICATION TOKENS ====
| |
| '''Applicant:''' Capital One Services, LLC
| |
| | |
| '''Abstract:''' Methods and systems for adjusting access parameters for authentication tokens. In some aspects, the system receives an authorization request associated with a first authorization token for a user acco...
| |
| | |
| ==== 20250225217. EXTENDING EAP FOR SUPPORTING GENERATIVE AI CHALLENGES ====
| |
| '''Applicant:''' Cisco Technology, Inc.
| |
| | |
| '''Abstract:''' Techniques for extending EAP for supporting generative AI challenge-response for secure access are described. The techniques may be performed at least in part by an authentication server. An indicatio...
| |
| | |
| == Market Implications ==
| |
| | |
| === Innovation Intensity ===
| |
| | |
| With 70 applications in a single day, Cybersecurity demonstrates very high innovation intensity, suggesting rapid technological advancement and strong commercial interest.
| |
| | |
| === Competitive Landscape ===
| |
| | |
| Innovation in Cybersecurity involves 53 organizations, indicating a highly competitive and diverse landscape with many players investing in R&D.
| |
| | |
| === Technology Outlook ===
| |
| | |
| Emerging themes in Cybersecurity patents include: authentication, data, user, with, from, suggesting future development in these areas.
| |
| | |
| The current patent activity level suggests Cybersecurity is in a growth phase with increasing market adoption and investment.
| |
| | |
| == Related Technology Areas ==
| |
| | |
| Innovation in Cybersecurity often intersects with other emerging technologies:
| |
| | |
| * '''[[Augmented Reality patent applications on 2025-07-10|Augmented Reality]]''': 5725 applications
| |
| * '''[[Semiconductors patent applications on 2025-07-10|Semiconductors]]''': 1117 applications
| |
| * '''[[Medical Devices patent applications on 2025-07-10|Medical Devices]]''': 195 applications
| |
| * '''[[5G Technology patent applications on 2025-07-10|5G Technology]]''': 145 applications
| |
| * '''[[Generative AI patent applications on 2025-07-10|Generative AI]]''': 99 applications
| |
| * '''[[Renewable Energy patent applications on 2025-07-10|Renewable Energy]]''': 83 applications
| |
| * '''[[Autonomous Vehicles patent applications on 2025-07-10|Autonomous Vehicles]]''': 61 applications
| |
| * '''[[Robotics patent applications on 2025-07-10|Robotics]]''': 54 applications
| |
| | |
| == Analysis Tools ==
| |
| | |
| === Search Resources ===
| |
| | |
| * [https://wikipatents.org/index.php?search=Cybersecurity+20250710 Search all Cybersecurity patents from July 10 2025]
| |
| * [https://wikipatents.org/index.php?search=Cybersecurity Browse all Cybersecurity patents]
| |
| * [[Special:CategoryTree/Cybersecurity Patent Applications|Browse by category]]
| |
| | |
| == See Also ==
| |
| | |
| * [[20250710 Patent Applications Report for July 10 2025|Weekly Patent Summary]]
| |
| * [[Technology Trends in Patent Applications]]
| |
| * [[Cybersecurity Industry Analysis]]
| |
| * [[Patent Analytics and Trends]]
| |
|
| |
|
| [[Category:Cybersecurity]] | | [[Category:Cybersecurity]] |