TRUST LTD has a total of 19 patent applications. It decreased the IP activity by 50.0%. Its first patent ever was published in 2017. It filed its patents most often in United States, Singapore and EPO (European Patent Office). Its main competitors in its focus markets computer technology, digital networks and it methods for management are ILLUSIVE NETWORKS LTD, SHANGHAI YUNDUN INFORMATION TECH CO LTD and YUAN ZHENNAN.
# | Country | Total Patents | |
---|---|---|---|
#1 | United States | 7 | |
#2 | Singapore | 4 | |
#3 | EPO (European Patent Office) | 3 | |
#4 | Russian Federation | 3 | |
#5 | Netherlands | 2 |
# | Industry | |
---|---|---|
#1 | Computer technology | |
#2 | Digital networks | |
#3 | IT methods for management |
# | Technology | |
---|---|---|
#1 | Digital information transmission | |
#2 | Electric digital data processing | |
#3 | Specific computer systems | |
#4 | Data processing systems |
# | Name | Total Patents |
---|---|---|
#1 | Volkov Dmitry Aleksandrovich | 8 |
#2 | Kalinin Alexander Sergeevich | 5 |
#3 | Mileshin Philipp Alekseevich | 3 |
#4 | Astanov Zafar Taxirovich | 2 |
#5 | Alexander Sergeevich Kalinin | 2 |
#6 | Lazarenko Aleksandr Vyacheslavovich | 2 |
#7 | Sachkov Ilya Konstantinovich | 2 |
#8 | Volokov Dmitry | 1 |
#9 | Konstantinovich Sachkov Ilya | 1 |
#10 | Zafar Taxirovich Astanov | 1 |
Publication | Filing date | Title |
---|---|---|
SG10201908952YA | Method and computing device for identifying suspicious users in message exchange systems | |
RU2701040C1 | Method and a computer for informing on malicious web resources | |
RU2681699C1 | Method and server for searching related network resources | |
RU2677361C1 | Method and system of decentralized identification of malware programs | |
EP3343872A1 | System and method for gathering information to detect phishing activity | |
EP3343870A1 | System and method for detecting phishing web pages field of technology | |
US2018012021A1 | Method of and system for analysis of interaction patterns of malware with control centers for detection of cyber attack |