ONAPSIS INC has a total of 26 patent applications. It increased the IP activity by 16.0%. Its first patent ever was published in 2015. It filed its patents most often in EPO (European Patent Office), United States and Australia. Its main competitors in its focus markets digital networks, computer technology and telecommunications are XSTREAM LOGIC INC, SHENZHEN SANGFOR ELECTRONIC TECH CO LTD and SENSELOCK SOFTWARE TECH CO LTD.
# | Country | Total Patents | |
---|---|---|---|
#1 | EPO (European Patent Office) | 9 | |
#2 | United States | 7 | |
#3 | Australia | 4 | |
#4 | Canada | 4 | |
#5 | WIPO (World Intellectual Property Organization) | 2 |
# | Industry | |
---|---|---|
#1 | Digital networks | |
#2 | Computer technology | |
#3 | Telecommunications |
# | Technology | |
---|---|---|
#1 | Digital information transmission | |
#2 | Electric digital data processing | |
#3 | Wireless communication networks |
# | Name | Total Patents |
---|---|---|
#1 | Gutesman Ezequiel David | 10 |
#2 | Abraham Sergio Javier | 9 |
#3 | Abraham Sergio | 7 |
#4 | Etchegoyen Juan Pablo Perez | 6 |
#5 | Artuso Pablo Agustin | 6 |
#6 | Burroni Javier | 5 |
#7 | Russ Fernando | 4 |
#8 | Rapisardi Julian | 4 |
#9 | Muller Pablo | 4 |
#10 | Fausto Emiliano José | 3 |
Publication | Filing date | Title |
---|---|---|
US2019324879A1 | System and method for detecting and preventing changes in business-critical applications that modify its state to non-secure and/or non-compliant | |
EP3444741A1 | Generating rules to detect security vulnerabilities based on vulnerability primitives with entry point finder | |
AU2018201045A1 | System and method for event-based data acquisition in real-time applications | |
US2019050579A1 | Entry point finder | |
US2019050574A1 | Automatic impact detection after patch implementation with entry point finder | |
US2019050575A1 | Checking for unnecessary privileges with entry point finder | |
US2018060593A1 | System and method for fast probabilistic querying role-based access control systems | |
US2016119373A1 | System and method for automatic calculation of cyber-risk in business-critical applications | |
WO2016069608A1 | Real-time segregation of duties for business-critical applications |