Qomplx LLC

United States of America

Back to Profile

1-100 of 351 for Qomplx LLC Sort by
Query
Aggregations
IP Type
        Patent 335
        Trademark 16
Jurisdiction
        United States 334
        World 17
Date
New (last 4 weeks) 1
2026 April (MTD) 1
2026 February 2
2026 January 1
2025 December 6
See more
IPC Class
H04L 9/40 - Network security protocols 175
G06F 16/951 - IndexingWeb crawling techniques 128
G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries 112
G06N 20/00 - Machine learning 47
H04L 29/06 - Communication control; Communication processing characterised by a protocol 46
See more
NICE Class
42 - Scientific, technological and industrial services, research and design 16
35 - Advertising and business services 1
Status
Pending 116
Registered / In Force 235
  1     2     3     4        Next Page

1.

ARTIFICIAL INTELLIGENCE-DRIVEN DRUG DISCOVERY AND MANAGEMENT PLATFORM

      
Application Number 18900608
Status Pending
Filing Date 2024-09-27
First Publication Date 2026-04-02
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

The proposed AI drug discovery platform represents a new approach to pharmaceutical research and development, integrating cutting-edge artificial intelligence and machine learning technologies across the entire drug discovery pipeline. This comprehensive system leverages multi-modal data integration, quantum-classical hybrid computing, environmental factor analysis, and digital twin simulations to address the complexities of drug discovery and development. By combining advanced predictive modeling, generative design, and virtual clinical trial capabilities, the platform aims to significantly accelerate the identification and optimization of novel therapeutic compounds while improving safety and efficacy predictions. The system's modular architecture incorporates state-of-the-art techniques in protein design, biomarker discovery, and personalized medicine, enabling a more holistic and precise approach to drug development.

IPC Classes  ?

  • G16B 5/00 - ICT specially adapted for modelling or simulations in systems biology, e.g. gene-regulatory networks, protein interaction networks or metabolic networks
  • G16B 15/30 - Drug targeting using structural dataDocking or binding prediction
  • G16B 40/20 - Supervised data analysis

2.

Dynamic Cyberattack Mission Planning and Analysis

      
Application Number 19365134
Status Pending
Filing Date 2025-10-21
First Publication Date 2026-02-12
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

Cybersecurity mission planning and analysis uses artificial intelligence systems to make red and blue team exercises more comprehensive and effective by supplementing individual expertise, reducing reliance on intuition, and eliminating gaps in knowledge. In an embodiment, a platform for cyberattack missions planning and analysis by red and blue teams is coordinated by a control center. An incident generator generates cyberattack scenarios and events using data from external databases and an internal attack knowledge manager having a knowledge graph of data about the network under attack in conjunction with one or more machine learning algorithms configured to identify potential network vulnerabilities. Red are guided by a machine learning algorithm configured to provide suggestions as to potential successful attack paths. Blue teams are guided by a machine learning algorithm configured to provide suggestions as to potential successful attack paths.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

3.

AI-Optimized Memory Fabric for Large Contexts and Multimodal Workloads

      
Application Number 19365156
Status Pending
Filing Date 2025-10-21
First Publication Date 2026-02-12
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A coherent, intelligent, packet-switched memory fabric enables predictive, cache-coherent access across distributed compute, accelerator, and memory resources using a Memory-Fabric Transaction Layer Protocol (MF-TLP). MF-TLP defines routable packet formats for read, write, vectorized, atomic, reduction, collective, and predictive-prefetch transactions executed by memory-centric network interface controllers (MC-NICs). Each MC-NIC performs packet parsing, address translation, coherence management, and near-memory arithmetic or tensor operations while coordinating with MF-TLP-aware switches providing hierarchical directory control, multi-path routing, and in-network aggregation. Vectorized and multimodal packets encode multiple addresses or tensor offsets to reduce scatter/gather overhead, and programmable caching and quality-of-service modules manage tiered memory and tenant fairness. MF-TLP supports extension headers for predictive prefetch, collective coordination, and tenant governance, operating across hierarchical leaf-spine topologies using Ultra-Ethernet Transport, InfiniBand, or CXL fabrics. The system delivers scalable, low-latency, memory-centric orchestration for large-language-model training, multimodal AI, and data-intensive analytics.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

4.

Federated Distributed Computational Graph Platform for Advanced Robotic Integration in Precision Oncological and Gene Therapies

      
Application Number 19321156
Status Pending
Filing Date 2025-09-05
First Publication Date 2026-01-01
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure oncological therapy optimization through robotic integration. The system establishes a distributed graph architecture with secure communication channels connecting computational nodes, implementing encryption protocols for cross-institutional data exchange. Each node contains processing capabilities for fluorescence-guided imaging, uncertainty quantification, and expert knowledge integration while maintaining hierarchical knowledge graphs of oncological biomarkers, interventions, and outcomes. The system coordinates domain-specific knowledge through token-space communication and implements an advanced robotic integration system for surgical interventions using spatiotemporal tumor mapping, multi-modal fluorescence imaging, surgical robot coordination, and space-time stabilized mesh management. Key capabilities include wavelength-specific multi-modal fluorescence detection, combined epistemic and aleatoric uncertainty estimation, tensor-based data integration with adaptive dimensionality control, and light cone search for adaptive treatment optimization—all while maintaining strict privacy controls.

IPC Classes  ?

  • G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
  • G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
  • G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
  • G16H 20/40 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to mechanical, radiation or invasive therapies, e.g. surgery, laser therapy, dialysis or acupuncture
  • G16H 30/40 - ICT specially adapted for the handling or processing of medical images for processing medical images, e.g. editing
  • G16H 40/63 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for local operation
  • G16H 50/50 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for simulation or modelling of medical disorders
  • G16H 80/00 - ICT specially adapted for facilitating communication between medical practitioners or patients, e.g. for collaborative diagnosis, therapy or health monitoring
  • H04L 9/40 - Network security protocols

5.

AI Serving Hardware and Software Frontier Enhancements

      
Application Number 19308299
Status Pending
Filing Date 2025-08-24
First Publication Date 2025-12-25
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A computer system implements a unified framework integrating an adaptive elastic funnel (AEF) with a convergent intelligence fabric (CIF) for multi-agent AI collaboration. The system provides a universal multi-modal key-value subsystem for sharing partial computations, implements hybrid placement strategies for dynamic memory management, and incorporates quantum-resistant secure enclaves. The architecture integrates hardware acceleration through GPU-FPGA hybrid caching and neuromorphic processors, applies adaptive energy and thermal management across hardware generations, and implements autonomous flash resource orchestration with multi-dimensional wear management. The system orchestrates tensor workflows using hierarchical scheduling, enables cross-agent collaboration with privacy preservation, and supports continuous learning without catastrophic forgetting. This integration delivers unprecedented computational efficiency and security in high-dimensional decision-making environments while supporting incremental adoption through modular interfaces.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06N 3/063 - Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means

6.

System and method for efficient scene continuity in visual and multimedia using generative artificial intelligence

      
Application Number 18736517
Grant Number 12499515
Status In Force
Filing Date 2024-06-06
First Publication Date 2025-12-11
Grant Date 2025-12-16
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for generating multimedia artifacts with managed scene continuity in visual and multimedia using an AI-based and scene continuity aware media generation platform. The system receives a user or AI agent specification or simulation result(s), selects or trains generative models based on the specification, preprocesses relevant data, and generates scene narrative or frame-specific, sequence specific or broader continuity aware content using the selected or trained model(s). The generated content may be further enhanced using frame interpolation and view synthesis techniques to create smooth transitions or novel viewpoints or to aid in more efficient transmission or viewing or persistence of resultant content. The system enables efficient and customizable generation of high-quality scene continuity aware content for various applications in visual and multimedia production using neuro-symbolic and simulation enhanced compression, representation and generation processes.

IPC Classes  ?

  • G06T 5/60 - Image enhancement or restoration using machine learning, e.g. neural networks

7.

DETECTION AND MITIGATION OF DATA COMPROMISES IN ADVERSARIAL ENVIRONMENTS

      
Application Number 18639844
Status Pending
Filing Date 2024-04-18
First Publication Date 2025-12-04
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

Detection and mitigation of data source compromises in an adversarial information environment, featuring the ability to scan for, ingest and process, and then use relational, wide column, and graph stores for capturing entity data, their relationships, and actions associated with them. Metadata is gathered and linked to the ingested data, which provides a broader contextual view of the environment leading up to and during an event of interest. Data quality analysis is conducted as data is ingested in order to identify if a data source may be compromised. The results are used to manage the reputation of the contributing data sources.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

8.

ARTIFICIAL INTELLIGENCE-POWERED LARGE-SCALE CONTENT GENERATOR

      
Application Number 18780457
Status Pending
Filing Date 2024-07-22
First Publication Date 2025-12-04
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

An AI-powered content generation system that creates consistent, coherent, and engaging multi-modal content by integrating multiple specialized AI components. The system analyzes user input, identifies key elements, and maintains continuity throughout the generation process. It incorporates a feedback loop to learn and adapt based on user preferences, enabling personalized content experiences. The modular architecture allows for seamless integration of AI components focusing on text, images, audio, and interactive elements. The system ensures consistency across modalities and over extended periods, while managing rights, licenses, and royalties using blockchain technology. This advanced platform revolutionizes content creation, consumption, and management in the digital age.

IPC Classes  ?

  • G06N 3/0475 - Generative networks
  • G06N 3/0442 - Recurrent networks, e.g. Hopfield networks characterised by memory or gating, e.g. long short-term memory [LSTM] or gated recurrent units [GRU]
  • G06N 3/045 - Combinations of networks
  • G06N 3/0464 - Convolutional networks [CNN, ConvNet]
  • G06N 3/094 - Adversarial learning

9.

Artificial intelligence-powered music registry, collaboration, and workflow management system

      
Application Number 18679404
Grant Number 12536517
Status In Force
Filing Date 2024-05-30
First Publication Date 2025-12-04
Grant Date 2026-01-27
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

An AI-powered music registry, collaboration, and workflow management platform that addresses the challenges faced by music industry participants in the digital age. The system comprises a segmentation and hashing subsystem for musical pieces, segments, and isolated elements, enabling the evaluation of uniqueness and the consideration of individual creators' contributions. An artificial intelligence (AI) and machine learning (ML) subsystem is employed for extracting and isolating individual instruments, vocals, and performer contributions, while a component-level tracking module enables enhanced crediting and royalty distribution.

IPC Classes  ?

  • G06Q 20/14 - Payment architectures specially adapted for billing systems
  • G06F 16/483 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
  • G06F 16/683 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
  • G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
  • G06F 16/908 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
  • G06Q 10/101 - Collaborative creation, e.g. joint development of products or services
  • G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems

10.

MOBILE ENERGY AND DATA PLANNING AND OPTIMIZATION

      
Application Number 18679439
Status Pending
Filing Date 2024-05-30
First Publication Date 2025-12-04
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for artificial intelligence enhanced mobile energy and data and network control, planning and optimization. The present invention relates to a system and method for optimizing energy and data and network use in mobile platforms, such as facilities, vehicles, tools, and devices. The system leverages AI, data analytics, and context-aware techniques to collect, process, and analyze data from various sources, including sensors, weather data, and spatial and temporal data with locality aware computing, transport, storage and networking across assets that may be owned or operated by multiple stakeholders. By considering a variety of factors, the system generates optimized recommendations for data storage, compute, transmission, device settings, fleet management, and physical and virtual route planning and logic locality planning. The invention offers benefits, including improved energy efficiency, enhanced data and network management, increased operational efficiency, and cost savings.

IPC Classes  ?

  • G01C 21/34 - Route searchingRoute guidance
  • G01C 21/36 - Input/output arrangements for on-board computers

11.

SYSTEM AND METHODS FOR CROSS PLATFORM ENGAGEMENT ORIENTED ARTIFICIAL INTELLIGENCE ENHANCED PROGRAMMING

      
Application Number 18668139
Status Pending
Filing Date 2024-05-18
First Publication Date 2025-11-20
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A platform for dynamically generating application experiences. The platform comprises a design management system, an agent orchestration system, an analytics system, a model management system, a user management system, and databases for storing design elements and templates. The design management system provides a portal for application owners/designers to create UX/UI designs, allowing them to select design elements from a set of categories or templates. The platform gathers existing websites/applications to identify common design patterns, stored in a design catalogue database, and suggests historical interfaces for design exploration. It enables the generation of templated applications that integrate with legacy systems. The agent orchestration system parses user specifications, selects generative AI systems, and generates UX/UI content based on the specifications. The analytics system collects and analyzes data to provide insights for improving UX/UI design and optimizing website performance. The model management system trains and maintains generative AI models used for content generation.

IPC Classes  ?

  • G06F 8/38 - Creation or generation of source code for implementing user interfaces
  • G06F 8/10 - Requirements analysisSpecification techniques
  • G06F 8/35 - Creation or generation of source code model driven
  • G06F 40/205 - Parsing

12.

MULTI-FACTOR AUTHENTICATION KIOSK

      
Application Number 18665556
Status Pending
Filing Date 2024-05-15
First Publication Date 2025-11-20
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Park, David
  • Hopper, Jason

Abstract

The provided system and methods describe a Multi-factor Authentication (MFA) kiosk that utilizes various sensors to capture biometric, behavioral, and physiological data for authentication. The kiosk includes a user interface, a set of sensors, and services such as kiosk management, rules configuration, sensor management, and an authentication service. The sensors, both integrated and external, gather diverse data, including facial recognition, fingerprint scans, voice recognition, gait analysis, and more, constructing a physical profile for authentication. The system incorporates a rules service for configuring authentication policies and a sensor management service to optimize sensor performance. Authentication service uses a scoring model, potentially a deep learning algorithm like an autoencoder, to generate an authentication score based on inputs from sensors, rules, and previous attempts. Security measures include encryption, isolation of components, and compliance with data protection regulations. A plurality of MFA kiosks may form an authentication network.

IPC Classes  ?

  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

13.

AI–ENABLED TELEMATICS FOR ELECTRONIC ENTERTAINMENT, SIMULATION, TRAINING AND REMOTE OPERATIONS SYSTEMS

      
Application Number 18665577
Status Pending
Filing Date 2024-05-16
First Publication Date 2025-11-20
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method AI-enabled telematics and actuation for electronic entertainment, simulation, training, and remote operations systems. The system and method disclosed support neuro symbolic reasoning and generative AI enabled experience generation to allow a user or collection of users to experience a wide range of realistic scenarios where the user can pick and choose an experience that best fits their individual or collective preferences. Additionally, the system and method have wide applications to a variety of environments, including but not limited to, racing, sports, military training, vehicle and aircraft operation, and training simulations. The proposed system and method enable realistic, immersive video game, simulation, training, and remote operations environments which are applicable to a wide range of devices, platforms, and mediums for recreational, commercial, industrial, and security uses.

IPC Classes  ?

  • A63F 13/65 - Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor automatically by game devices or servers from real world data, e.g. measurement in live racing competition
  • G06N 20/00 - Machine learning

14.

SYSTEM AND METHOD FOR AI-DRIVEN MULTI-MODAL CONTENT GENERATION AND IMMERSIVE INTERACTION EXPERIENCES

      
Application Number 18909960
Status Pending
Filing Date 2024-10-09
First Publication Date 2025-11-20
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for creating complex, immersive, and interactive digital content is disclosed. The system integrates advanced artificial intelligence, multi-modal input processing, cloud-based shared environments, and immersive hardware to generate, optimize, and deliver rich interactive experiences. The platform supports content mashups, custom scenario generation, and adaptive AI behaviors, enabling the creation of unique and engaging digital environments across various media formats.

IPC Classes  ?

  • A63F 13/67 - Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor adaptively or by learning from player actions, e.g. skill level adjustment or by storing successful combat sequences for re-use
  • A63F 13/285 - Generating tactile feedback signals via the game input device, e.g. force feedback
  • A63F 13/355 - Performing operations on behalf of clients with restricted processing capabilities, e.g. servers transform changing game scene into an encoded video stream for transmitting to a mobile phone or a thin client
  • A63F 13/65 - Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor automatically by game devices or servers from real world data, e.g. measurement in live racing competition
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06T 19/00 - Manipulating 3D models or images for computer graphics

15.

PERSONAL HEALTH DATABASE PLATFORM WITH SPATIOTEMPORAL MODELING AND SIMULATION

      
Application Number 18801361
Status Pending
Filing Date 2024-08-12
First Publication Date 2025-11-13
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A spatiotemporal modeling system for Personal Health Database (PHDB) platforms integrates diverse health data types into a comprehensive 4D model of an individual's health status. By combining genomic, imaging, clinical, and real-time health data, the system creates a dynamic, time-based representation of the user's anatomy and physiology. This model enables real-time analysis, pattern recognition, and predictive forecasting of health outcomes. The system preprocesses and aligns data from various sources, constructs a detailed spatial framework, and continuously updates the model with new inputs. Through interactive visualizations, it provides users and healthcare providers with intuitive, personalized insights for improved health management and decision-making.

IPC Classes  ?

  • G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
  • G16H 20/00 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
  • G16H 50/30 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for calculating health indicesICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for individual health risk assessment
  • G16H 50/50 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for simulation or modelling of medical disorders

16.

Federated Distributed Computational Graph Platform with Advanced Multi-Expert Integration and Adaptive Uncertainty Quantification for Precision Oncological Therapy

      
Application Number 19277321
Status Pending
Filing Date 2025-07-22
First Publication Date 2025-11-13
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure oncological therapy optimization through multi-expert integration and advanced uncertainty quantification. The system implements a multi-expert integration framework that coordinates domain-specific knowledge through token-space communication for precision oncological treatment, while maintaining secure cross-institutional data exchange. The architecture coordinates multi-scale spatiotemporal synchronization across computational nodes, with each node containing local processing capabilities for fluorescence-guided imaging, uncertainty quantification, and expert knowledge integration. Through a distributed graph architecture, the system enables advanced fluorescence imaging with wavelength-specific targeting, multi-level uncertainty estimation combining epistemic and aleatoric approaches, and multi-scale tensor-based integration with adaptive dimensionality control. The system implements light cone search and planning for adaptive treatment strategy optimization, enabling medical institutions and research organizations to collaborate on complex oncological therapy projects while maintaining strict data privacy controls.

IPC Classes  ?

  • G16H 20/00 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
  • G16H 50/30 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for calculating health indicesICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for individual health risk assessment

17.

RANDOM ENTITY SELECTION WITH A FUZZY BLOCKLIST CAPABILITY

      
Application Number 18653977
Status Pending
Filing Date 2024-05-03
First Publication Date 2025-11-06
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Park, David
  • Hopper, Jason

Abstract

A system and methods for selecting a random entity with a fuzzy blocklist capability, comprising a range editor which acts on data received by either a plurality of databases or a possible address map; and an advanced random number generator. The range editor allows for breaking data into either desirable or blocked chunks which may be normalized and passed to the advanced random number generator. The advanced random number generator may select a random value from within a randomly selected chunk. Various methods for randomly selecting both a chunk and a value may be used to maximize the efficiency of the method and system.

IPC Classes  ?

  • G06N 7/02 - Computing arrangements based on specific mathematical models using fuzzy logic
  • G06F 7/58 - Random or pseudo-random number generators

18.

Federated Distributed Computational Graph Platform for Oncological Therapy and Biological Systems Analysis With Neurosymbolic Deep Learning

      
Application Number 19267388
Status Pending
Filing Date 2025-07-11
First Publication Date 2025-11-06
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure drug discovery and resistance tracking through hybrid simulation capabilities. The system implements a hybrid simulation orchestrator that coordinates molecular dynamics simulations with machine learning models for drug discovery analysis, while maintaining secure cross-institutional data exchange. The architecture coordinates multi-scale spatiotemporal synchronization across computational nodes, with each node containing local processing capabilities for molecular dynamics simulation and resistance pattern detection. Through a distributed graph architecture, the system enables real-world clinical data integration, resistance evolution tracking, and multi-scale tensor-based analysis with adaptive dimensionality control. The system implements real-time drug response prediction through multi-modal data analysis, enabling pharmaceutical companies and research institutions to collaborate on complex drug discovery projects while maintaining strict data privacy controls.

IPC Classes  ?

  • G16C 20/30 - Prediction of properties of chemical compounds, compositions or mixtures
  • G06N 5/01 - Dynamic search techniquesHeuristicsDynamic treesBranch-and-bound
  • G16C 20/50 - Molecular design, e.g. of drugs
  • G16C 20/70 - Machine learning, data mining or chemometrics
  • G16C 20/90 - Programming languagesComputing architecturesDatabase systemsData warehousing

19.

Event-Triggered Reauthentication of At-Risk and Compromised Systems and Accounts

      
Application Number 19185166
Status Pending
Filing Date 2025-04-21
First Publication Date 2025-10-23
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method that detects and mitigates zero-day exploits and other vulnerabilities by analyzing event logs and external databases, forcing reauthentication of at-risk and comprised systems and accounts during an identified threat or potential security risk.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation

20.

System and Method for Cybersecurity Threat Detection and Prevention with Discrete Event Simulation

      
Application Number 19096605
Status Pending
Filing Date 2025-03-31
First Publication Date 2025-10-16
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for comprehensive data loss prevention and compliance management designed to identify and prevent cybersecurity attacks on modern, highly-interconnected networks, to identify attacks before data loss occurs, using a combination of human level, device level, system level, and organizational level monitoring and protection.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data

21.

Cybersecurity Analysis and Protection Using Distributed Systems

      
Application Number 19096623
Status Pending
Filing Date 2025-03-31
First Publication Date 2025-10-16
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • James, Michael
  • Sellers, Andrew
  • Shaikh, Farooq

Abstract

Cybersecurity reconnaissance, analysis, and scoring uses distributed, cloud or edge-based pools of computing services to provide sufficient scalability for analysis of IT/OT networks using only publicly available characterizations. An in-memory associative array manages a queue of configuration and vulnerability search tasks through at least one public-facing proxy network which uses configurable search nodes to approach the target network with search tools in a desired manner to control certain aspects of the search in order to obtain the desired results, especially when target network behavior adjusts based on counterparty characteristics. A data packet modifier reveals IP addresses of threat actors behind port scans and subsequently block the threat actors.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques
  • H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]

22.

Dynamic experience curation platform

      
Application Number 18636264
Grant Number 12468770
Status In Force
Filing Date 2024-04-16
First Publication Date 2025-08-21
Grant Date 2025-11-11
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A dynamic experience curation platform utilizing AI and ML techniques, including neural networks and generative models, to enhance user interactions with content on the Internet. The platform employs an Experience Broker (EB) service to disintermediate user devices from the internet (or other content/information sources), improving security and user experience. It processes content requests, extracts relevant information, filters out unwanted content like ads, transforms, combines, and/or mutates existing content, and generates curated content consistent with user preferences and other constraints. The platform's generative AI process renders content into a user interface consistent with user preferences. It allows for personalized content delivery across devices, including virtual and augmented reality environments. The platform supports a spectrum of personalization, allowing users to fine-tune their content consumption experience. Additionally, it manages user sessions across devices and integrates various databases for storing user profiles, preferences, and other relevant information.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G09B 21/00 - Teaching, or communicating with, the blind, deaf or mute

23.

ADAPTIVE INTELLIGENT MULTI-MODAL MEDIA PROCESSING AND DELIVERY SYSTEM

      
Application Number 18900460
Status Pending
Filing Date 2024-09-27
First Publication Date 2025-08-21
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

This invention introduces an adaptive system for multi-modal media processing and delivery, addressing challenges in modern digital content distribution. The technology dynamically analyzes and processes media content in real-time, optimizing delivery across diverse devices, networks, and content types. Key features include adaptive processing that adjusts compression, encoding, and delivery protocols based on content characteristics and delivery constraints. The system incorporates artificial intelligence for continuous improvement, learning from historical data and user feedback. It addresses network variability and device diversity, adapting to changing conditions and optimizing content for different platforms. Security and personalization features enable protected content distribution and tailored user experiences. The invention's cross-media optimization approach allows efficient handling of various media formats within a unified framework. Its scalable, modular design suits applications from consumer streaming to enterprise-level distribution. This comprehensive solution aims to enhance content distribution efficiency and user experience in the complex, evolving digital media landscape.

IPC Classes  ?

  • H04N 19/189 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding
  • H04N 19/136 - Incoming video signal characteristics or properties
  • H04N 19/162 - User input
  • H04N 19/164 - Feedback from the receiver or from the transmission channel
  • H04N 19/42 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation

24.

DYNAMIC EXPERIENCE CURATION PLATFORM

      
Application Number US2025016164
Publication Number 2025/175256
Status In Force
Filing Date 2025-02-15
Publication Date 2025-08-21
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A dynamic experience curation platform utilizing Al and ML techniques, including neural networks and generative models, to enhance user interactions with content on the Internet. The platform employs an Experience Broker (EB) service to disintermediate user devices from the internet (or other content/information sources), improving security and user experience. It processes content requests, extracts relevant information, filters out unwanted content like ads. transforms, combines, and/or mutates existing content, and generates curated content consistent with user preferences and other constraints. The platform's generative Al process renders content into a user interface consistent with user preferences. It allows for personalized content delivery across devices, including virtual and augmented reality environments. The platform supports a spectrum of personalization, allowing users to fine-tune their content consumption experience. Additionally, it manages user sessions across devices and integrates various databases for storing user profiles, preferences, and other relevant information.

IPC Classes  ?

  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G09B 21/00 - Teaching, or communicating with, the blind, deaf or mute

25.

COMPUTING PLATFORM FOR NEURO-SYMBOLIC ARTIFICIAL INTELLIGENCE APPLICATIONS

      
Application Number 18656612
Status Pending
Filing Date 2024-05-07
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A distributed generative artificial intelligence (AI) reasoning and action platform that utilizes a cloud-based computing architecture for neuro-symbolic reasoning. The platform comprises systems for distributed computation, curation, marketplace integration, and context management. A distributed computational graph (DCG) orchestrates complex workflows for building and deploying generative AI models, incorporating expert judgment and external data sources. A context computing system aggregates contextual data, while a curation system provides curated responses from trained models. Marketplaces offer data, algorithms, and expert judgment for purchase or integration. The platform enables enterprises to construct user-defined workflows and incorporate trained models into their business processes, leveraging enterprise-specific knowledge. The platform facilitates flexible and scalable integration of machine learning models into software applications, supported by a dynamic and adaptive DCG architecture.

IPC Classes  ?

26.

Composite symbolic and non-symbolic artificial intelligence system for advanced reasoning and automation

      
Application Number 18668137
Grant Number 12536213
Status In Force
Filing Date 2024-05-18
First Publication Date 2025-08-14
Grant Date 2026-01-27
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A composite AI system and method for advanced reasoning and automation that integrates symbolic knowledge graphs and algorithms with non-symbolic, or connectionist, models such as neural embeddings. A hierarchical architecture enables dynamically distributed, cooperative reasoning through layperson and expert-led challenge-based verification, model blending, model fitness and retraining and selection, comprehensive feedback loops at individual model or model blend or process flow with or without supervision, and specialized routing of processing to account for various operational risk, regulatory, legal, privacy, or economic considerations. Models, datasets, knowledge bases, simulations and simulation components, and embeddings are iteratively refined using knowledge graph elements and model, process, simulation or flow/process optimal hyperparameters which are recorded and tracked. Extraction of symbolic representations from connectionist models links them to curated ontologies of facts and principles.

IPC Classes  ?

27.

ADAPTIVE CONTROL AND ANAYSIS SYSTEM FOR SPIRITS PRODUCTION

      
Application Number 18809270
Status Pending
Filing Date 2024-08-19
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

Integrated intelligent system for beverage production, including distilled spirits and various brewed or fermented products, combining traditional methods with advanced technologies. System incorporates controlled fermentation unit, advanced distillation apparatus, and accelerated aging unit using novel methods like ultrasonic waves and thermal cycling. Real-time analysis system employs multiple sensors for continuous chemical composition monitoring throughout production process. Intelligent control mechanism optimizes processes and adjusts parameters dynamically. Chemical fingerprinting system enables precise quality control and authenticity verification. Flexible interface allows for customization of beverage profiles based on desired flavor characteristics and market demands. Specialized unit creates complex non- alcoholic alternatives. System adapts to different production scales and beverage types. Represents significant advancement in beverage production technology, offering unprecedented control, consistency, efficiency, and rapid product development across various beverage categories.

IPC Classes  ?

  • G01N 33/14 - Beverages
  • C12G 3/02 - Preparation of other alcoholic beverages by fermentation
  • C12H 1/22 - Ageing or ripening by storing, e.g. lagering of beer
  • C12H 3/00 - Methods for reducing the alcohol content of fermented solutions or alcoholic beverages to obtain low-alcohol or non-alcoholic beverages

28.

SYSTEM AND METHODS FOR AI-ENHANCED CELLULAR MODELING AND SIMULATION

      
Application Number 18952932
Status Pending
Filing Date 2024-11-19
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

The AI-enhanced cellular modeling and simulation platform is a computational system designed to enhance biomedical research and development and personalized medicine and wellness. This platform integrates simulation modeling, machine learning and artificial intelligence, multi-omics data, and sophisticated data fusion and decision-support techniques to create comprehensive models of cellular systems and processes across multiple scales. It enables researchers and clinicians to simulate complex biological interactions, predict disease progression, and design or optimize treatment strategies or medical devices with improved accuracy and efficacy. The system's architecture allows for integration of various components, including real-time data processing, federated learning, and quantum computing enhancements. From personalized drug discovery and cancer therapies to synthetic biology and epidemiological analysis, this platform offers powerful tools for understanding and manipulating cellular systems and bioengineered systems. By bridging the gap between molecular-level interactions between cells and materials and organism-wide effects, it enables significant advancements in healthcare and biological sciences.

IPC Classes  ?

  • G16C 20/50 - Molecular design, e.g. of drugs
  • G16C 20/30 - Prediction of properties of chemical compounds, compositions or mixtures
  • G16C 20/80 - Data visualisation

29.

FEDERATED DISTRIBUTED GRAPH-BASED COMPUTING PLATFORM WITH HARDWARE MANAGEMENT

      
Application Number 19009889
Status Pending
Filing Date 2025-01-03
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed AI reasoning and action platform utilizing decentralized, partially observable hierarchical computing for neuro-symbolic reasoning. It features a federated Distributed Computational Graph (DCG) system integrating core components like pipeline orchestration, transformers, and marketplaces. The platform enables privacy-preserving dynamic resource allocation, intelligent task scheduling, and variable information sharing across diverse computing environments. By coordinating with an AI-based operating system and analyzing performance metrics, environmental conditions, and resource availability, the system optimizes efficiency across AI workloads and decision-making processes. This results in an adaptive, power-efficient, and scalable AI-enabled data processing system capable of handling complex tasks while maintaining peak performance under various operating conditions.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

30.

AI AGENT DECISION PLATFORM WITH DEONTIC REASONING

      
Application Number 19041999
Status Pending
Filing Date 2025-01-31
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for extending AI-enhanced decision platforms with deontic and normative reasoning capabilities that enhance adjustably autonomous decision-making through a novel integration of symbolic and neural approaches. The invention uses hierarchical and fuzzy deontic logic implementations alongside connectionist AI/ML to manage obligations, permissions, and prohibitions while maintaining observer awareness to achieve goals while incorporating knowledge across multiple expert domains. The system employs dynamic event and spatio-temporal knowledge graphs along with debate mechanisms, enabling high-assurance automated reasoning while preserving explainability through neuro-symbolic integration. In at least one embodiment, the invention operates through a federated distributed computational graph architecture that allows for arbitrary scaling while maintaining coherence, consistency and supporting compound workflows. The invention provides a framework for AI systems to make logically consistent, ethically-aware decisions by combining deontic reasoning with multi-agent coordination, token space communications and knowledge, including on intermediate results, enabling automated decision-making for a variety of applications.

IPC Classes  ?

  • G06N 3/047 - Probabilistic or stochastic networks
  • G06N 3/042 - Knowledge-based neural networksLogical representations of neural networks

31.

PHYSICS-ENHANCED FEDERATED DISTRIBUTED COMPUTATIONAL GRAPH ARCHITECTURE FOR BIOLOGICAL SYSTEM ENGINEERING AND ANALYSIS

      
Application Number 19078008
Status Pending
Filing Date 2025-03-12
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure collaboration across multiple institutions for biological data analysis. The system consists of interconnected computational nodes managed by a centralized or decentralized federation manager, depending on the deployment model. Each node contains specialized components that work together to process biological data while preserving privacy. These components include a local computational engine that handles data processing, a privacy preservation module that protects sensitive information, a knowledge integration component that manages biological data relationships by connecting various data sources, and a communication interface that enables secure information exchange between nodes. The federation manager coordinates all computational activities across the network while ensuring data privacy is maintained throughout the process. This architecture allows research institutions to collaborate on complex biological analysis tasks without compromising their sensitive data, enabling breakthrough discoveries through shared computational resources and expertise while maintaining the security, compliance, and confidentiality required in biological research.

IPC Classes  ?

  • G06N 5/043 - Distributed expert systemsBlackboards
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition
  • G16B 50/20 - Heterogeneous data integration

32.

PLATFORM FOR ORCHESTRATING FAULT-TOLERANT, SECURITY-ENHANCED NETWORKS OF COLLABORATIVE AND NEGOTIATING AGENTS WITH DYNAMIC RESOURCE MANAGEMENT

      
Application Number 19079358
Status Pending
Filing Date 2025-03-13
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A scalable platform for orchestrating networks of specialized AI multi-agent networks that enables secure collaboration through token-based protocols and real-time result streaming with advanced dynamic chain-of-thought pruning. The central orchestration engine manages domain-specific agents, implementing sophisticated multi-branch reasoning with contribution-estimation layers that evaluate each agent's utility using Shapley value-inspired metrics. The system employs information-theoretic and gradient-based surprise metric to guide memory updates and dynamic reasoning expansion, preventing local minima stagnation while preserving valuable insights through adaptive forgetting mechanisms. The platform unifies Monte Carlo tree search with contribution-aware estimation to detect high-synergy expert combinations while maintaining privacy through partial data approaches. It scales across distributed computing environments, enabling complex collaborative tasks like materials discovery, product engineering and manufacturing process design, biomedical research, and drug development. The system supports multi-party economic rewards through systematic contribution effort, cost and importance tracking, while standardized interfaces manage security, privacy, and policy constraints across heterogeneous agents.

IPC Classes  ?

  • G06N 3/047 - Probabilistic or stochastic networks
  • G06N 3/042 - Knowledge-based neural networksLogical representations of neural networks

33.

PLATFORM FOR ORCHESTRATING A SCALABLE, PRIVACY-ENABLED NETWORK OF COLLABORATIVE AND NEGOTIATING AGENTS UTILIZING MODULAR HYBRID COMPUTING ARCHITECTURE

      
Application Number 19080768
Status Pending
Filing Date 2025-03-14
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A scalable platform for orchestrating networks of collaborative AI agents utilizing modular hybrid computing architecture. The platform integrates classical, quantum, and neuromorphic computing paradigms through hardware-accelerated translation layers and cross-paradigm coordination mechanisms. A central orchestration engine manages interactions between domain-specific AI agents, dynamically distributing workloads across heterogeneous computing cores based on task complexity, computational requirements, and resource availability. The platform employs hardware-accelerated translation between paradigms, enabling efficient cross-paradigm information exchange while maintaining semantic consistency and computation integrity across different architectures. Specialized monitoring and optimization systems continuously adjust resource allocation and fine-tune performance across computing paradigms. Advanced cache management and fault tolerance mechanisms ensure reliable operation, while privacy-preservation techniques enable secure collaboration. The platform's modular architecture supports integration of different computational approaches, enabling complex multi-domain problem solving that leverages the unique advantages of each paradigm while maintaining system-wide efficiency, scalability, and coherence.

IPC Classes  ?

  • G06N 3/047 - Probabilistic or stochastic networks
  • G06N 3/042 - Knowledge-based neural networksLogical representations of neural networks

34.

Federated Distributed Computational Graph Platform for Oncological Therapy and Biological Systems Analysis

      
Application Number 19094812
Status Pending
Filing Date 2025-03-29
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure biological data analysis and genomic medicine with enhanced oncological therapy capabilities. The system implements patient-specific tumor-on-a-chip analysis through microfluidic control systems and cellular heterogeneity preservation, while integrating fluorescence-enhanced diagnostics using CRISPR-LNP targeting and robotic surgical navigation. The architecture coordinates spatiotemporal analysis of gene therapy delivery through molecular imaging and immune response tracking, and implements bridge RNA integration with multi-target synchronization. Treatment selection is optimized through multi-criteria scoring and patient-specific simulation modeling. Each federated node contains a local processing unit for biological data analysis, privacy preservation protocols, and a hierarchical knowledge graph structure. The system implements cross-species genetic analysis, environmental response modeling, and multi-scale tensor-based data integration, enabling research institutions to collaborate on complex, large-scale biological analyses while maintaining strict data privacy controls.

IPC Classes  ?

  • G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
  • A61B 34/30 - Surgical robots
  • G16B 50/30 - Data warehousingComputing architectures
  • G16B 50/40 - Encryption of genetic data
  • G16H 30/40 - ICT specially adapted for the handling or processing of medical images for processing medical images, e.g. editing

35.

Federated Distributed Computational Graph Platform for Oncological Therapy and Biological Systems Analysis with Neurosymbolic Deep Learning

      
Application Number 19171168
Status Pending
Filing Date 2025-04-04
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure biological data analysis and genomic medicine through hybrid simulation capabilities. The system implements a hybrid simulation orchestrator that coordinates classical numerical simulations with machine learning models for biological system analysis, while maintaining secure cross-institutional data exchange. The architecture coordinates multi-scale spatiotemporal synchronization across computational nodes, with each node containing local processing capabilities for biological data analysis and privacy preservation protocols. The system implements cellular machinery assembly analysis, real-time patient data integration, and multi-modal image integration with spatiotemporal health data annotation. Through a distributed graph architecture, the system enables cross-species genetic analysis, environmental response modeling, and multi-scale tensor-based data integration with adaptive dimensionality control. The system implements real-time therapeutic response prediction through multi-modal data analysis, enabling research institutions to collaborate on complex biological analyses while maintaining strict data privacy controls.

IPC Classes  ?

  • G16B 5/00 - ICT specially adapted for modelling or simulations in systems biology, e.g. gene-regulatory networks, protein interaction networks or metabolic networks
  • G16B 20/00 - ICT specially adapted for functional genomics or proteomics, e.g. genotype-phenotype associations
  • G16B 40/20 - Supervised data analysis
  • H04L 9/40 - Network security protocols

36.

PLATFORM FOR INTEGRATION OF MACHINE LEARNING MODELS UTILIZING MARKETPLACES AND CROWD AND EXPERT JUDGMENT AND KNOWLEDGE CORPORA

      
Application Number 18733830
Status Pending
Filing Date 2024-06-04
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for flexibly incorporating machine learning models into applications using a marketplace platform and distributed computational graph (DCG) architecture. The DCG enables dynamic selection, creation and incorporation of trained models with data sources and marketplaces for data, algorithms, simulation models, ontologies, knowledge corpora, and crowd or expert judgment. Multiple models can be used in series or parallel. An expert judgment marketplace allows human and artificial intelligence (AI) experts to score the accuracy of training data and model outputs. Consumers can select and rank AI agents or experts based on the helpfulness of their judgments. A symbolic knowledge corpora and retrieval augmented generation (RAG) marketplace enables selling access to proprietary datasets as RAGs and knowledge bases. The system includes knowledge corpora and RAG marketplaces with domain-specific components and user experience customization.

IPC Classes  ?

37.

SYSTEM AND METHOD FOR AI BASED DYNAMIC USER EXPERIENCE CURATION

      
Application Number 18731326
Status Pending
Filing Date 2024-06-02
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for AI based user experience curation across multiple scenarios and finite time horizons of interest. The present invention integrates connectionist and symbolic AI techniques to generate coherent, relevant, and personalized content across various domains. The invention bridges the gap between connectionist AI and symbolic AI, enabling more adaptive, immersive, and engaging user experiences while prioritizing security and traceability and contextualization considerations behind recommendations or content generation. The platform furthers dynamic and tailored user interactions with digital systems across individual interactions, preferences, sequences and ongoing engagements across sessions by leveraging the power of analytics, deep learning, and AI to create truly intelligent, dynamic, and responsive user experiences enhanced with optimization and planning faculties.

IPC Classes  ?

  • G06F 9/451 - Execution arrangements for user interfaces
  • A63F 13/40 - Processing input control signals of video game devices, e.g. signals generated by the player or derived from the environment

38.

ADVANCED MODEL MANAGEMENT PLATFORM FOR OPTIMIZING AND SECURING AI SYSTEMS INCLUDING LARGE LANGUAGE MODELS

      
Application Number 18731339
Status Pending
Filing Date 2024-06-02
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

An advanced model management platform for optimizing and securing generative artificial intelligence systems such as large language models (LLMs) and diffusion models. The platform incorporates various techniques to address the limitations of current generative AI systems, such as hallucination, lack of validation, security vulnerabilities, and inadequate model management. The system employs reinforcement learning algorithms for model optimization, retrieval augmented generation (RAG) for hallucination mitigation, domain-specific validation against expert knowledge, model distillation and similarity scoring for security, adversarial training for robustness, and attention mechanism search and model blending for advanced management and neuro symbolic AI routine combinations. By integrating these techniques, the platform significantly improves the performance, reliability, and security of generative AI across a wide range of tasks and domains leveraging the best elements of symbolic and connectionist techniques alongside automated planning and modeling simulation.

IPC Classes  ?

39.

FEDERATED DISTRIBUTED GRAPH-BASED COMPUTING PLATFORM

      
Application Number 19008636
Status Pending
Filing Date 2025-01-03
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed AI reasoning and action platform utilizing decentralized, partially observable hierarchical computing for neuro-symbolic reasoning. It features a federated Distributed Computational Graph (DCG) system integrating core components like pipeline orchestration, transformers, and marketplaces. The platform enables privacy-preserving dynamic resource allocation, intelligent task scheduling, and variable information sharing across diverse computing environments. By coordinating with an AI-based operating system and analyzing performance metrics, environmental conditions, and resource availability, the system optimizes efficiency across AI workloads and decision-making processes. This results in an adaptive, power-efficient, and scalable AI-enabled data processing system capable of handling complex tasks while maintaining peak performance under various operating conditions.

IPC Classes  ?

  • G06N 3/042 - Knowledge-based neural networksLogical representations of neural networks

40.

PLATFORM FOR ORCHESTRATING A SCALABLE, PRIVACY-ENABLED NETWORK OF COLLABORATIVE AND NEGOTIATING AGENTS

      
Application Number 19056728
Status Pending
Filing Date 2025-02-18
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A platform for coordinating networks of specialized AI agents that enables secure collaboration through token-based communication and real-time result streaming. The system features a central orchestration engine managing interactions between domain-specific expert agents, with memory management and optional encryption for secure data handling. The platform uses efficient communication protocols for knowledge compression and faster reasoning, while a standardized agent interface system handles security, privacy, and policy requirements. It scales across distributed computing environments to enable complex collaborative tasks like personalized content creation, materials discovery, and drug development while optimizing resource usage and maintaining data privacy.

IPC Classes  ?

  • G06N 3/047 - Probabilistic or stochastic networks
  • G06N 3/042 - Knowledge-based neural networksLogical representations of neural networks

41.

FEDERATED DISTRIBUTED COMPUTATIONAL GRAPH ARCHITECTURE FOR BIOLOGICAL SYSTEM ENGINEERING AND ANALYSIS

      
Application Number 19060600
Status Pending
Filing Date 2025-02-21
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure collaboration across institutions for unified biological and multiomics data analysis. It comprises interconnected computational nodes managed by a central federation manager. Each node includes specialized components: a local computational engine for biological data processing, a privacy-preservation system, a knowledge integration component leveraging dynamic knowledge graphs, and a secure communication interface. The federation manager coordinates computational activities while ensuring security, privacy, legality, and contractual adherence. This architecture allows institutions, citizen scientists, and patients to collaborate on complex biological analyses without compromising sensitive data. By enabling shared computational resources and expertise, the system facilitates breakthrough discoveries while maintaining confidentiality. Additionally, it supports pro-rata or contractually defined participation in resultant benefits or knowledge, ensuring equitable collaboration.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

42.

AI AGENT DECISION PLATFORM WITH DEONTIC REASONING AND QUANTUM-INSPIRED TOKEN MANAGEMENT

      
Application Number 19078256
Status Pending
Filing Date 2025-03-12
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for extending AI-enhanced decision platforms with deontic and normative reasoning capabilities that enhance adjustably autonomous decision-making through a novel integration of symbolic and neural approaches alongside quantum-inspired token management. The invention uses hierarchical and fuzzy deontic logic implementations and quantum-inspired state representations that combine complex amplitudes and phase information to manage obligations, permissions, and prohibitions while maintaining observer awareness to achieve complex goals while incorporating knowledge across multiple expert domains. The system employs dynamic event and spatio-temporal knowledge graphs along with debate mechanisms, enabling high-assurance automated reasoning while preserving explainability through neuro-symbolic integration and information-theoretic metrics. The platform is capable of operating through a federated distributed computational graph architecture that allows for arbitrary scaling while maintaining system coherence and logical consistency using quantum-inspired token operations and phase alignment transformations for optimizing information transfer between states.

IPC Classes  ?

  • G06N 5/02 - Knowledge representationSymbolic representation

43.

PHYSICS-ENHANCED FEDERATED DISTRIBUTED COMPUTATIONAL GRAPH ARCHITECTURE FOR MULTI-SPECIES BIOLOGICAL SYSTEM ENGINEERING AND ANALYSIS

      
Application Number 19079023
Status Pending
Filing Date 2025-03-13
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure collaboration across multiple institutions for multi-species biological data analysis. The system consists of interconnected computational nodes managed by a central federation manager. Each node contains specialized components that work together to process multi-species biological data while preserving privacy. These components include a local computational engine that handles data processing, a physics-information integration subsystem that combines physical state calculations with information-theoretic optimization, a privacy preservation module that protects sensitive information, a knowledge integration component that manages biological data relationships, and a communication interface that enables secure information exchange between nodes. The federation manager coordinates all computational activities and manages resource allocations across the network while ensuring data privacy is maintained throughout the process. This architecture allows research institutions to collaboratively analyze complex, multi-species biological systems through integrated physics-based modeling and information-theoretic approaches while maintaining security and confidentiality.

IPC Classes  ?

  • G16B 50/30 - Data warehousingComputing architectures
  • G16B 40/10 - Signal processing, e.g. from mass spectrometry [MS] or from PCR
  • G16B 50/10 - OntologiesAnnotations

44.

FEDERATED DISTRIBUTED COMPUTATIONAL GRAPH PLATFORM FOR ADVANCED BIOLOGICAL ENGINEERING AND ANALYSIS

      
Application Number 19080613
Status Pending
Filing Date 2025-03-14
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure, privacy-preserving biological data analysis and engineering through interconnected nodes coordinated in a distributed graph architecture. A federation manager allocates resources, manages data flow and lineage, establishes privacy boundaries, and maintains cross-institutional knowledge relationships. Each node contains a processing unit for biological data analysis, privacy preservation protocols for secure multi-party computation, a knowledge graph structure with supporting data stores, and encrypted network connections. The federation manager enforces all computation and data exchange through secure channels while maintaining privacy, security, and contractual boundaries. This architecture enables research institutions to collaborate on complex biological analyses without compromising sensitive data, facilitating breakthrough discoveries through shared computational resources while maintaining strict data privacy and security controls.

IPC Classes  ?

45.

Federated Distributed Computational Graph Platform for Genomic Medicine and Biological System Analysis

      
Application Number 19091855
Status Pending
Filing Date 2025-03-27
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A federated distributed computational system enables secure, multi-institutional biological data analysis and genomic medicine through interconnected, decentralized nodes in a federated distributed graph architecture. A federation manager coordinates computational resource allocation, control and data flows, establishes privacy and security boundaries, implements multi-scale spatiotemporal analysis and simulation modeling, models cross-species or intrapopulation elements, and maintains cross-institutional knowledge relationships. Each node includes a local processing unit for biological data analysis, including multiomics and gene editing, privacy-preserving protocols for secure multi-party computation, a hierarchical knowledge graph for managing multi-domain biological relationships across spatial and temporal scales, and encrypted network connections. The system implements cross-species genetic analysis via phylogenetic integration, environmental response modeling through spatiotemporal tracking, and multi-scale tensor-based data integration with adaptive dimensionality control. This architecture enables research institutions to collaborate on complex biological analyses and genomic medicine applications while maintaining strict data privacy and security controls.

IPC Classes  ?

  • G16B 5/00 - ICT specially adapted for modelling or simulations in systems biology, e.g. gene-regulatory networks, protein interaction networks or metabolic networks
  • G16B 20/00 - ICT specially adapted for functional genomics or proteomics, e.g. genotype-phenotype associations
  • G16B 40/20 - Supervised data analysis
  • G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems

46.

Convergent Intelligence Fabric for Multi-Domain Orchestration of Distributed Agents with Hierarchical Memory Architecture and Quantum-Resistant Trust Mechanisms

      
Application Number 19183827
Status Pending
Filing Date 2025-04-19
First Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for implementing a convergent intelligence fabric (CIF) for distributed artificial intelligence operations. The CIF architecture integrates tensor-theoretic foundations, probabilistic cache management, precision-aware memory operations, quantum-resistant security, and neural-based optimization within a unified framework. The system orchestrates asynchronous, multi-hop data flow among computational resources while maintaining data security through per-block encryption and identity-based access control. Key components include a universal multi-model KV cache subsystem, agent-parallel disaggregation pipelines, reinforcement learning-based orchestration, and neuromorphic memory integration. Advanced implementations incorporate graphon-enhanced memory for sparse graph sequences, multi-modal cognitive persistent memory, and quantum-resistant asynchronous multi-domain trust protocols. The system enables efficient cross-agent collaboration, sophisticated knowledge sharing, and secure cross-domain operations while optimizing computational resources and maintaining strict privacy guarantees across distributed AI deployments.

IPC Classes  ?

47.

DISTRIBUTED GRAPH-BASED COMPUTING PLATFORM FOR NEURO-SYMBOLIC ARTIFICIAL INTELLIGENCE APPLICATIONS

      
Application Number US2025015141
Publication Number 2025/171357
Status In Force
Filing Date 2025-02-07
Publication Date 2025-08-14
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A distributed generative artificial intelligence (AT) reasoning and action platform that utilizes a cloud-based computing architecture for neuro-symbolic reasoning. The platform comprises systems for distributed computation, curation, marketplace integration, and context management. A distributed computational graph (DCG) orchestrates complex workflows for building and deploying generative Al models, incorporating expert judgment and external data sources. A context computing system aggregates contextual data, while a curation system provides curated responses from trained models. Marketplaces offer data, algorithms, and expert judgment for purchase or integration. The platform enables enterprises to construct user-defined workflows and incorporate trained models into their business processes, leveraging enterprise-specific knowledge. The platform facilitates flexible and scalable integration of machine learning models into software applications, supported by a dynamic and adaptive DCG architecture.

IPC Classes  ?

48.

DYNAMIC CYBERATTACK MISSION PLANNING AND ANALYSIS

      
Application Number US2024036206
Publication Number 2025/165396
Status In Force
Filing Date 2024-06-28
Publication Date 2025-08-07
Owner QOMPLX LLC. (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for cybersecurity mission planning and analysis which uses artificial intelligence systems to make red and blue team exercises more comprehensive and effective by supplementing individual expertise, reducing reliance on intuition, and eliminating gaps in knowledge. In an embodiment, a platform for cyberattack missions planning and analysis by red and blue teams is coordinated by a control center. An incident generator generates cyberattack scenarios and events using data from external databases and an internal attack knowledge manager having a knowledge graph of data about the network under attack in conjunction with one or more machine learning algorithms configured to identify potential network vulnerabilities. Red are guided by a machine learning algorithm configured to provide suggestions as to potential successful attack paths. Blue teams are guided by a machine learning algorithm configured to provide suggestions as to potential successful attack paths.

49.

Discrete compatibility filtering using genomic data

      
Application Number 18662988
Grant Number 12373600
Status In Force
Filing Date 2024-05-13
First Publication Date 2025-07-29
Grant Date 2025-07-29
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system is disclosed for discreetly assessing the compatibility of two or more human genomes across diverse elements, activities, and engagement platforms relevant to potential mating scenarios. The genomic data is subjected to encryption, with the option of employing homomorphic encryption to safeguard user privacy and security. Processing of the data is facilitated through a personal health database processing system, which may be cloud-based or edge-based. The application of homomorphic encryption ensures that the genomic information of individual users remains encrypted during processing, with the outcome limited to the display of progeny compatibility to the respective end users.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

50.

HOST-LEVEL TICKET FORGERY DETECTION AND EXTENSION TO NETWORK ENDPOINTS

      
Application Number US2024039961
Publication Number 2025/147293
Status In Force
Filing Date 2024-07-28
Publication Date 2025-07-10
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for detection and prevention of ticket forgery cyberattacks by improving host-level analytics and monitoring and extending the improved host-level analytics and monitoring to endpoints of a network. The methodology described herein comprises the use of a ticket-granting log extension utility which stores every logon session on a network, queries the local ticket cache, and generates additional custom data as a part of an event log stream such as a start time, end time, renew time, and related session data. This comprehensive log extension data can be used to identify certain types of ticket forgery cyberattacks by comparing the user session name with the client name identified in the ticket presented for access to network resources and other means. This host-level ticket forgery detection can be extended to network endpoints for additional security.

51.

AI-DRIVEN DEFENSIVE CYBERSECURITY STRATEGY ANALYSIS AND RECOMMENDATION SYSTEM

      
Application Number US2025010142
Publication Number 2025/147550
Status In Force
Filing Date 2025-01-02
Publication Date 2025-07-10
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity improvements to networked systems based on a cost/benefit analysis. The system and method use machine learning algorithms to run simulated attack and defense strategies against a model of the networked system created using a directed graph. Recommendations are generated based on an analysis of the simulation results against a variety of cost/benefit indicators.

IPC Classes  ?

  • G06N 7/00 - Computing arrangements based on specific mathematical models
  • G06N 20/00 - Machine learning
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/60 - Protecting data

52.

COLLABORATIVE GENERATIVE ARTIFICIAL INTELLIGENCE CONTENT IDENTIFICATION AND VERIFICATION

      
Application Number US2024061809
Publication Number 2025/137726
Status In Force
Filing Date 2024-12-23
Publication Date 2025-06-26
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

The Generative Al Content Verification Exchange systematically registers and stores content generated by Al-enabled or enhanced services. Upon submission, the system categorizes content into distinct groups, then deconstructs it into multiple segments using various methods. Each segment is assigned a unique hash value, termed a "part identifier," ensuring individualized identification. This registration process, combining grouping, segmentation, and hashing, enhances content traceability and retrieval. The resulting database not only organizes generated content by groups but also allows for efficient and secure referencing of specific content segments. The systematic registration and storage framework enable streamlined management of diverse generative Al-generated content for various applications, such as registration, analysis, search, and verification by diverse counterparties.

IPC Classes  ?

  • G06N 3/0475 - Generative networks
  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06T 7/00 - Image analysis

53.

COLLABORATIVE GENERATIVE ARTIFICIAL INTELLIGENCE CONTENT IDENTIFICATION AND VERIFICATION

      
Application Number 18395482
Status Pending
Filing Date 2023-12-23
First Publication Date 2025-06-26
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

The Generative AI Content Verification Exchange systematically registers and stores content generated by AI-enabled or enhanced services. Upon submission, the system categorizes content into distinct groups, then deconstructs it into multiple segments using various methods. Each segment is assigned a unique hash value, termed a “part identifier,” ensuring individualized identification. This registration process, combining grouping, segmentation, and hashing, enhances content traceability and retrieval. The resulting database not only organizes generated content by groups but also allows for efficient and secure referencing of specific content segments. The systematic registration and storage framework enable streamlined management of diverse generative AI-generated content for various applications, such as registration, analysis, search, and verification by diverse counterparties.

IPC Classes  ?

  • G06F 16/22 - IndexingData structures thereforStorage structures

54.

COLLABORATIVE GENERATIVE ARTIFICIAL INTELLIGENCE CONTENT IDENTIFICATION AND VERIFICATION

      
Application Number 18669534
Status Pending
Filing Date 2024-05-21
First Publication Date 2025-06-26
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

The Generative AI Content Verification Exchange systematically registers and stores content generated by AI and real people alike. Upon submission, the system categorizes content into distinct groups, then deconstructs it into multiple segments using various methods. Each segment is assigned a unique hash value, termed a “part identifier,” ensuring individualized identification. This registration process, combining grouping, segmentation, and hashing, enhances content traceability and retrieval. The resulting database not only organizes generated content by groups but also allows for efficient and secure referencing of specific content segments. A content similarity score may be generated by comparing hash values against a large corpus of registered content. The similarity score is indicative of the likelihood, or not, of an input content being in part registered content.

IPC Classes  ?

55.

SYSTEM AND METHOD FOR CREATING DOMAIN SPECIFIC LANGUAGES FOR DIGITAL ENVIRONMENT SIMULATIONS

      
Application Number 19061963
Status Pending
Filing Date 2025-02-24
First Publication Date 2025-06-26
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and methods for the creation of domain-specific languages that are both domain-agnostic and language-agnostic for use in a multi-language abstract digital simulation model generation and execution, comprising an onboarding module that creates domain specific models from declarative languages, domain-specific language engine, that uses the declarative domain-specific models to create a domain specific language, a meta-model structuring and creation system, meta-model mapping table, remote server, simulation execution process, computer domain-specific language, and methods for user-creation and editing of meta-models, simulation models, and parametrization of simulation environments, actors, objects, and events in real-time using heuristic searching.

IPC Classes  ?

  • G06F 30/20 - Design optimisation, verification or simulation
  • G06F 8/10 - Requirements analysisSpecification techniques
  • G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms
  • G06N 5/01 - Dynamic search techniquesHeuristicsDynamic treesBranch-and-bound
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

56.

COLLABORATIVE GENERATIVE ARTIFICIAL INTELLIGENCE CONTENT IDENTIFICATION AND VERIFICATION

      
Application Number 18679386
Status Pending
Filing Date 2024-05-30
First Publication Date 2025-06-26
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

The Generative AI Content Verification Exchange processes system obtained data and user input data, creating a set of hash values using a robust hashing algorithm. It then compares these hash values against a registry of content. If an exact match or sufficient similarity is detected, the system indicates that the input content, or component of input content, is likely a copy or generated by an AI tool. This approach enables users to discern whether the content is original and if it is probabilistically likely to have originated from an generative AI process or from humans. It has applications in content authenticity verification, aiding users in identifying content utilization, distribution dynamics, AI-generated content and promoting transparency and trust in online interactions and content.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

57.

SYSTEM FOR AUTOMATED CAPTURE AND ANALYSIS OF BUSINESS INFORMATION FOR RELIABLE BUSINESS VENTURE OUTCOME PREDICTION

      
Application Number 19061860
Status Pending
Filing Date 2025-02-24
First Publication Date 2025-06-12
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system for fully integrated collection of business impacting data, analysis of that data and generation of both analysis-driven business decisions and analysis driven simulations of alternate candidate business actions has been devised and reduced to practice. This business operating system may be used predict the outcome of enacting candidate business decisions based upon past and current business data retrieved from both within the corporation and from a plurality of external sources pre-programmed into the system. Both single parameter set and multiple parameter set analyses are supported. Risk to value estimates of candidate decisions are also calculated.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

58.

PLATFORM FOR AUTONOMOUS MANAGEMENT OF RISK TRANSFER

      
Application Number 19056660
Status Pending
Filing Date 2025-02-18
First Publication Date 2025-06-12
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Borole, Anant
  • Amin, Bharat
  • Ismail, Raveem

Abstract

Autonomous management of risk transfer is provided using an automated underwriting processor that creates a contract block by compiling the request into a computational graph-based format, links the contract block to the requester, stores the contract block into memory, retrieves a plurality of available underwriting agreements from memory, and creates an offer list by perform computational graph operations on the contract block to determine viable risk-transfer agreements; and presenting the offer list to the requester.

IPC Classes  ?

  • G06Q 40/08 - Insurance
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06N 3/006 - Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
  • G06N 3/02 - Neural networks
  • G06N 5/045 - Explanation of inferenceExplainable artificial intelligence [XAI]Interpretable artificial intelligence
  • G06N 5/046 - Forward inferencingProduction systems
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06N 20/00 - Machine learning
  • G06Q 30/0202 - Market predictions or forecasting for commercial activities
  • G06Q 30/0601 - Electronic shopping [e-shopping]

59.

SYSTEM AND METHOD FOR COMPARATIVE EVALUATION OF SECURITY TOOLS IN ISOLATED ENVIRONMENTS

      
Application Number 19049927
Status Pending
Filing Date 2025-02-10
First Publication Date 2025-06-05
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Kelley, Richard

Abstract

A system and method for the secure and private demonstration of cloud-based cyber-security tools. Using an advanced sandboxing design patterns, isolated instances of virtual networks allow a potential client to compare their existing cyber defense tools against a set of cloud-based tools. Capitalizing on non-persistent and secure sandboxes allow the invention to demonstrate fully functional and devastating cyber-attacks while guaranteeing strict privacy and security to both existing customers and potential ones. Additionally, instantiating separate sandboxed observed systems in a single multi-tenant infrastructure provide each customer with the ability to rapidly create actual representations of their enterprise environment offering the most realistic and accurate demonstration and comparison between products.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

60.

RATING ORGANIZATION CYBERSECURITY USING PROBE-BASED NETWORK RECONNAISSANCE TECHNIQUES

      
Application Number 19030768
Status Pending
Filing Date 2025-01-17
First Publication Date 2025-05-29
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and methods for cybersecurity rating using active and passive external reconnaissance, comprising a web crawler that send message prompts to external hosts and receives responses from external hosts, a time-series data store that produces time-series data from the message responses, and a directed computational graph module that probes, scans, and fingerprints devices within a cyber-physical graph and analyzes the results as time-series data to produce a weighted score representing the overall cybersecurity state of an organization.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

61.

AI-DRIVEN DEFENSIVE CYBERSECURITY STRATEGY ANALYSIS AND RECOMMENDATION SYSTEM

      
Application Number 19031055
Status Pending
Filing Date 2025-01-17
First Publication Date 2025-05-29
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity improvements to networked systems based on a cost/benefit analysis. The system and method use machine learning algorithms to run simulated attack and defense strategies against a model of the networked system created using a directed graph. Recommendations are generated based on an analysis of the simulation results against a variety of cost/benefit indicators.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

62.

AI-CONTROLLED SENSOR NETWORK FOR THREAT MAPPING AND CHARACTERIZATION AND RISK ADJUSTED RESPONSE

      
Application Number 19041944
Status Pending
Filing Date 2025-01-30
First Publication Date 2025-05-29
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for an AI-controlled sensor network for threat mapping and characterization. The system deploys a network of honeypots and sensors across various geographic locations and network segments, collecting and aggregating data on network traffic and potential threats. An AI orchestrator analyzes this data using advanced machine learning models, generating dynamic honeypot profiles and a comprehensive threat landscape. The system can adapt in real-time to emerging threats, optimize resource allocation, and provide actionable intelligence. By correlating data across multiple points, the system offers enhanced threat detection capabilities and proactive cybersecurity measures, surpassing traditional security information and event management (SIEM) tools.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/909 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06N 5/01 - Dynamic search techniquesHeuristicsDynamic treesBranch-and-bound
  • G06N 5/045 - Explanation of inferenceExplainable artificial intelligence [XAI]Interpretable artificial intelligence
  • G06N 5/046 - Forward inferencingProduction systems
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06N 20/00 - Machine learning
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

63.

SYSTEM AND METHODS FOR CREATION AND USE OF META-MODELS IN SIMULATED ENVIRONMENTS

      
Application Number 19031006
Status Pending
Filing Date 2025-01-17
First Publication Date 2025-05-22
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for generating and applying meta-models in simulated environments, in which an agent simulation is selected, one or more agent goals are received, and agents are created which are individual instances of the agent simulation with each agent having at least one of the agent goals, wherein the agents are used in the execution of an environment simulation which dynamically changes based on the collective behavior of the agents. The agents operate in the environment simulation using meta-models which describe how the agents interact with other agent and how the agents interact within the simulation.

IPC Classes  ?

  • G06N 3/006 - Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
  • G06F 8/30 - Creation or generation of source code
  • G06F 8/41 - Compilation
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 30/27 - Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
  • G06Q 10/067 - Enterprise or organisation modelling
  • H04L 41/0813 - Configuration setting characterised by the conditions triggering a change of settings
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • H04L 41/149 - Network analysis or design for prediction of maintenance
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network

64.

CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATION

      
Application Number 19030944
Status Pending
Filing Date 2025-01-17
First Publication Date 2025-05-22
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Kelley, Richard

Abstract

A system and method for correlating network event anomalies to identify attack information, that identifies anomalous events within the network, identifies correlations between anomalies and other network events and resources, generates a behavior graph describing an attack pathway derived from the correlations, and determines an attack point of origin using the behavior graph.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

65.

PROBE-BASED RISK ANALYSIS FOR MULTI-FACTOR AUTHENTICATION

      
Application Number 19019318
Status Pending
Filing Date 2025-01-13
First Publication Date 2025-05-15
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system for probe-based risk analysis for multi-factor authentication having a multi-dimensional time series data server configured to monitor and record a network's traffic data and to serve the traffic data to other modules and a directed computational graph module configured to probe connection destinations for a response, analyze any received responses, and determine a verification score needed before granting access based at least in part on the analysis of the received responses. A plurality of verification methods build up a user's verification score to required level to gain access.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation

66.

SYSTEM AND METHOD FOR AI BASED TAILORED ADVERTISING CONTENT GENERATION

      
Application Number 19019344
Status Pending
Filing Date 2025-01-13
First Publication Date 2025-05-15
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for AI-driven advertising and content generation that integrates connectionist and symbolic AI techniques to deliver personalized, contextually relevant user experiences. The invention leverages specialized agent networks, knowledge graphs, and retrieval-augmented generation to create dynamic, adaptive content with seamlessly integrated advertisements. It employs a sophisticated ad integration layer and experience broker to ensure relevance and engagement. The system prioritizes security, traceability, and user preferences while optimizing ad placement and content delivery. By bridging connectionist and symbolic AI, the platform enables immersive, tailored interactions across multiple scenarios and time horizons, enhancing user engagement and advertiser value in an AI-driven digital landscape.

IPC Classes  ?

67.

MACHINE LEARNING SYSTEM AND METHOD FOR NETWORK SECURITY IMPROVEMENT

      
Application Number 19006152
Status Pending
Filing Date 2024-12-30
First Publication Date 2025-04-24
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity improvements to networked systems based on a cost/benefit analysis. The system and method use machine learning algorithms to run simulated attack and defense strategies against a model of the networked system created using a directed graph. Recommendations are generated based on an analysis of the simulation results against a variety of cost/benefit indicators.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

68.

DATA SET AND ALGORITHM VALIDATION, BIAS CHARACTERIZATION, AND VALUATION

      
Application Number 18957620
Status Pending
Filing Date 2024-11-22
First Publication Date 2025-03-13
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for providing access and agency to individual entities and people over their data for the purpose of data set validation to facilitate data set and algorithm bias certification and scoring. A first data set is filtered to extract its core information content and to create a certified data set. A certified model is created by training a machine learning algorithm on the certified data set, which certified model is then used to evaluate the bias of subsequent data sets. The data set may be given a value score which represents the overall validity of the data set and its bias characterization. A bias characterization audit can help identify the root causes of bias outcomes from predictive software and algorithms that perform third party tasks and services. The score can be used as a metric to further facilitate market transactions.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

69.

CYBERSECURITY RISK ANALYSIS AND ANOMALY DETECTION USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE

      
Application Number 18796255
Status Pending
Filing Date 2024-08-06
First Publication Date 2025-02-06
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Kelley, Richard

Abstract

A system and method for cybersecurity risk analysis and anomaly detection using active and passive external reconnaissance, that identifies critical network entities within a cyber-physical graph, identifies anomalous events within the network, determines the risk of identified anomalies based on the value of the entities involved, and determines an effectiveness score for the network based on the identified risks.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

70.

SYSTEM AND METHOD FOR ATTACKER INTERDICTION USING TRACK AND TRACE USER AND ENTITY BEHAVIOR ANALYSIS

      
Application Number US2024039960
Publication Number 2025/029704
Status In Force
Filing Date 2024-07-28
Publication Date 2025-02-06
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelly, Richard

Abstract

A system and method for attacker interdiction using user-level network trace and tracking which leverages the uniqueness of verified authentication objects as metadata tags on captured network packets to gain insight at the user-level of how a network and various applications interact. The tagged network packets may be tracked, and the resulting data formed into a trace and track dataset to create one or more user-level dependency graphs alongside captured temporal dynamics. The trace and track dataset may be enriched with application trace information and runtime instruction data to improve the dependency graphs and provide deeper insight into application and user security on a given network. Attacks may be detected by analyzing the dependency graphs, and attacker interdiction may be implemented by actively orchestrating network security and IT devices using SOAR workflows.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

71.

Host-level ticket forgery detection and extension to network endpoints

      
Application Number 18361811
Grant Number 12500929
Status In Force
Filing Date 2023-07-28
First Publication Date 2025-01-30
Grant Date 2025-12-16
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for detection and prevention of ticket forgery cyberattacks by improving host-level analytics and monitoring and extending the improved host-level analytics and monitoring to endpoints of a network. The methodology described herein comprises the use of a ticket-granting log extension utility which stores every logon session on a network, queries the local ticket cache, and generates additional custom data as a part of an event log stream such as a start time, end time, renew time, and related session data. This comprehensive log extension data can be used to identify certain types of ticket forgery cyberattacks by comparing the user session name with the client name identified in the ticket presented for access to network resources and other means. This host-level ticket forgery detection can be extended to network endpoints for additional security.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • G06F 11/00 - Error detectionError correctionMonitoring
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

72.

SYSTEM AND METHOD FOR CYBER EXPLOITATION PATH ANALYSIS AND RESPONSE USING FEDERATED NETWORKS

      
Application Number US2024039441
Publication Number 2025/024615
Status In Force
Filing Date 2024-07-24
Publication Date 2025-01-30
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for cyber exploitation path analysis and response using federated networks to minimize network exposure and maximize network resilience, with the ability to simulate complex and large scale network traffic through the use of federated training networks, by gathering network entity information, establishing baseline behaviors for each entity, and monitoring each entity for behavioral anomalies that might indicate cybersecurity concerns. Further, the system and method involve incorporating network topology information into the analysis by generating a model of the network, annotating the model with risk and criticality information for each entity in the model and with a vulnerability level between entities, and using the model to evaluate cybersecurity risks to the network. Lastly, network attack path analysis and automated task planning for minimizing network exposure and maximizing resiliency is performed with machine learning, generative adversarial networks, hierarchical task networks, and Monte Carlo search trees.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning
  • G06N 7/06 - Simulation on general purpose computers

73.

SYSTEM AND METHOD FOR TRACK AND TRACE USER AND ENTITY BEHAVIOR ANALYSIS

      
Application Number US2024040090
Publication Number 2025/024860
Status In Force
Filing Date 2024-07-29
Publication Date 2025-01-30
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for user-level network trace and tracking which leverages the uniqueness of verified authentication objects as metadata tags on captured network packets to gain insight at the user-level of how a network and various applications interact. The tagged network packets may be tracked, and the resulting data formed into a trace and track dataset to create one or more user-level dependency graphs alongside captured temporal dynamics. The trace and track dataset may be enriched with application trace information and runtime instruction data to improve the executable graph and provide deeper insight into application and user security on a given network.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/40 - Network security protocols
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

74.

SYSTEM AND METHOD FOR TRACK AND TRACE USER AND ENTITY BEHAVIOR ANALYSIS

      
Application Number 18359883
Status Pending
Filing Date 2023-07-27
First Publication Date 2025-01-30
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for user-level network trace and tracking which leverages the uniqueness of verified authentication objects as metadata tags on captured network packets to gain insight at the user-level of how a network and various applications interact. The tagged network packets may be tracked, and the resulting data formed into a trace and track dataset to create one or more user-level dependency graphs alongside captured temporal dynamics. The trace and track dataset may be enriched with application trace information and runtime instruction data to improve the executable graph and provide deeper insight into application and user security on a given network.

IPC Classes  ?

75.

System and method for enterprise-wide data utilization tracking and risk reporting

      
Application Number 18359895
Grant Number 12500823
Status In Force
Filing Date 2023-07-27
First Publication Date 2025-01-30
Grant Date 2025-12-16
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for comprehensive data utilization and tracking comprising an ontological engine which in some embodiments is configured to create and curate various industry-specific ontologies which can be used to provide deeper context to an enterprise's network traffic and data transmission. The system and method further comprise a tagging and tracking engine configured to inspect network packets, apply a first tag associated with an authentication object, apply a second tag associated with an identified ontology, and track the tagged packets as they traverse the enterprise network, generating data utilization tracking information as the packets move through the network. A scoring engine may leverage the data utilization tracking information in combination with user entity and behavior data to compute a risk score associated with data utilization on the enterprise network.

IPC Classes  ?

  • H04L 43/028 - Capturing of monitoring data by filtering
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/40 - Network security protocols
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation
  • H04L 67/50 - Network services

76.

System and method for attacker interdiction using track and trace user and entity behavior analysis

      
Application Number 18361799
Grant Number 12537848
Status In Force
Filing Date 2023-07-28
First Publication Date 2025-01-30
Grant Date 2026-01-27
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for attacker interdiction using user-level network trace and tracking which leverages the uniqueness of verified authentication objects as metadata tags on captured network packets to gain insight at the user-level of how a network and various applications interact. The tagged network packets may be tracked, and the resulting data formed into a trace and track dataset to create one or more user-level dependency graphs alongside captured temporal dynamics. The trace and track dataset may be enriched with application trace information and runtime instruction data to improve the dependency graphs and provide deeper insight into application and user security on a given network. Attacks may be detected by analyzing the dependency graphs, and attacker interdiction may be implemented by actively orchestrating network security and IT devices using SOAR workflows.

IPC Classes  ?

77.

SYSTEM AND METHOD FOR ENTERPRISE-WIDE DATA UTILIZATION TRACKING AND RISK REPORTING

      
Application Number US2024039959
Publication Number 2025/024838
Status In Force
Filing Date 2024-07-28
Publication Date 2025-01-30
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for comprehensive data utilization and tracking comprising an ontological engine which in some embodiments is configured to create and curate various industry-specific ontologies which can be used to provide deeper context to an enterprise's network traffic and data transmission. The system and method further comprise a tagging and tracking engine configured to inspect network packets, apply a first tag associated with an authentication object, apply a second tag associated with an identified ontology, and track the tagged packets as they traverse the enterprise network, generating data utilization tracking information as the packets move through the network. A scoring engine may leverage the data utilization tracking information in combination with user entity' and behavior data to compute a risk score associated with data utilization on the enterprise network.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 16/36 - Creation of semantic tools, e.g. ontology or thesauri
  • H04H 60/33 - Arrangements for monitoring the users' behaviour or opinions
  • H04W 12/67 - Risk-dependent, e.g. selecting a security level depending on risk profiles

78.

Collaborative cloud identity and credential forgery and abuse defense

      
Application Number 18354658
Grant Number 12494916
Status In Force
Filing Date 2023-07-19
First Publication Date 2025-01-23
Grant Date 2025-12-09
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for providing a cloud identity verification exchange service which ingests a plurality of identity assertion data from various Identity Providers and/or Service Providers and aggregates the ingested plurality of data into a master global authentication ledger. The system and method comprise: a data ingestion engine configured for acquiring, extracting, and loading data into the system as well as providing hashing capabilities; a metadata manager for collecting, organizing, and cataloguing ingested data based on collected metadata; and database for storing the master global authentication ledger. The master ledger acts as a central repository that consolidates authentication objects from various Identity Providers, allowing for centralized authentication management, auditing, reporting, and analysis. It provides a comprehensive view of authentication activities across multiple systems and enables the tracking of user authentication events across different identity providers.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

79.

PRIVILEGE ASSURANCE OF ENTERPRISE COMPUTER NETWORK ENVIRONMENTS USING LATERAL MOVEMENT DETECTION AND PREVENTION

      
Application Number 18909882
Status Pending
Filing Date 2024-10-08
First Publication Date 2025-01-23
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Kelley, Richard

Abstract

A system and method for the privilege assurance of enterprise computer network environments using lateral movement detection and prevention. The system uses local session monitors to monitor logon sessions within a network, generating and verifying event logs and authentication records to ensure the legitimacy of authenticated user sessions and to revoke credentials when an illicit session is detected, halting lateral movement in real-time.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

80.

A SYSTEM AND METHOD FOR CYBER EXPLOITATION PATH ANALYSIS AND TASK PLAN OPTIMIZATION

      
Application Number US2024038627
Publication Number 2025/019721
Status In Force
Filing Date 2024-07-18
Publication Date 2025-01-23
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for cyber exploitation path analysis and task plan optimization to minimize network exposure and maximize network resilience. The system and method involve gathering network entity information, establishing baseline behaviors for each entity, and monitoring each entity for behavioral anomalies that might indicate cybersecurity concerns. Further, the system and method involve incorporating network topology information into the analysis by generating a model of the network, annotating the model with risk and criticality information for each entity in the model and with a vulnerability level between entities, and using the model to evaluate cybersecurity risks to the network. Lastly, network attack path analysis and automated task planning for minimizing network exposure and maximizing resiliency is performed with machine learning, generative adversarial networks, hierarchical task networks, and Monte Carlo search trees.

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning
  • H04L 43/00 - Arrangements for monitoring or testing data switching networks
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity

81.

KERBEROS INTERDICTION AND DECRYPTION FOR REAL-TIME ANALYSIS

      
Application Number US2024038629
Publication Number 2025/019722
Status In Force
Filing Date 2024-07-18
Publication Date 2025-01-23
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and methods for Kerberos protocol collection, interdiction and decryption for realtime analysis to aid in both operational and security functions in SSO-enabled networks, using agent processes that intercept and decrypt Kerberos traffic to identify compromised credentials and accounts in real-time without exposing sensitive information.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04L 9/28 - Arrangements for secret or secure communicationsNetwork security protocols using particular encryption algorithm
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

82.

COLLABORATIVE CLOUD IDENTITY AND CREDENTIAL FORGERY AND ABUSE DEFENSE

      
Application Number US2024038630
Publication Number 2025/019723
Status In Force
Filing Date 2024-07-18
Publication Date 2025-01-23
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for providing a cloud identity verification exchange service which ingests a plurality of identity assertion data from various Identity Providers and/or Service Providers and aggregates the ingested plurality of data into a master global authentication ledger. The system and method comprise: a data ingestion engine configured for acquiring, extracting, and loading data into the system as well as providing hashing capabilities; a metadata manager for collecting, organizing, and cataloguing ingested data based on collected metadata; and database for storing the master global authentication ledger. The master ledger acts as a central repository that consolidates authentication objects from various Identity Providers, allowing for centralized authentication management, auditing, reporting, and analysis. It provides a comprehensive view of authentication activities across multiple systems and enables the tracking of user authentication events across different identity providers.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals

83.

Kerberos interdiction and decryption for real-time analysis

      
Application Number 18354664
Grant Number 12500767
Status In Force
Filing Date 2023-07-19
First Publication Date 2025-01-23
Grant Date 2025-12-16
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and methods for Kerberos protocol collection, interdiction and decryption for real-time analysis to aid in both operational and security functions in SSO-enabled networks, using agent processes that intercept and decrypt Kerberos traffic to identify compromised credentials and accounts in real-time without exposing sensitive information.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

84.

Correlating network event anomalies using active and passive external reconnaissance to identify attack information

      
Application Number 18892283
Grant Number 12301627
Status In Force
Filing Date 2024-09-20
First Publication Date 2025-01-23
Grant Date 2025-05-13
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Kelley, Richard

Abstract

A system and method for correlating network event anomalies to identify attack information, that identifies anomalous events within the network, identifies correlations between anomalies and other network events and resources, generates a behavior graph describing an attack pathway derived from the correlations, and determines an attack point of origin using the behavior graph.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

85.

PRIVILEGE ASSURANCE OF ENTERPRISE COMPUTER NETWORK ENVIRONMENTS USING ATTACK PATH DETECTION AND PREDICTION

      
Application Number 18893894
Status Pending
Filing Date 2024-09-23
First Publication Date 2025-01-09
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Kelley, Richard

Abstract

A system and method for the privilege assurance of enterprise computer network environments using attack path detection and prediction. The system uses local session monitors to monitor logon sessions within a network, track session details, and log session and network host details. Cyber-physical graphs are produced and used to identify paths within the network based on the logged information, and to apply risk weighting to the identified paths and determine likely attack paths an attacker may use.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

86.

Contextual and risk-based multi-factor authentication

      
Application Number 18885510
Grant Number 12231426
Status In Force
Filing Date 2024-09-13
First Publication Date 2025-01-09
Grant Date 2025-02-18
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Macleod, Ian

Abstract

A system for contextual and risk-based multi-factor authentication having a multi-dimensional time series data server configured to monitor and record a network's traffic data and to serve the traffic data to other modules and a directed computation graph module configured to receive network traffic data from the multi-dimensional time series data server, determine a network traffic baseline from the network traffic data, and determine a verification score needed before granting access based at least in part by the network traffic baseline. A plurality of verification methods build up a user's verification score to required level to gain access.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation

87.

Correlating network event anomalies using active and passive external reconnaissance to identify attack information

      
Application Number 18892295
Grant Number 12301628
Status In Force
Filing Date 2024-09-20
First Publication Date 2025-01-09
Grant Date 2025-05-13
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Kelley, Richard

Abstract

A system and method for correlating network event anomalies to identify attack information, that identifies anomalous events within the network, identifies correlations between anomalies and other network events and resources, generates a behavior graph describing an attack pathway derived from the correlations, and determines an attack point of origin using the behavior graph.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

88.

Dynamic cyberattack mission planning and analysis

      
Application Number 18343716
Grant Number 12452284
Status In Force
Filing Date 2023-06-28
First Publication Date 2025-01-02
Grant Date 2025-10-21
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for cybersecurity mission planning and analysis which uses artificial intelligence systems to make red and blue team exercises more comprehensive and effective by supplementing individual expertise, reducing reliance on intuition, and eliminating gaps in knowledge. In an embodiment, a platform for cyberattack missions planning and analysis by red and blue teams is coordinated by a control center. An incident generator generates cyberattack scenarios and events using data from external databases and an internal attack knowledge manager having a knowledge graph of data about the network under attack in conjunction with one or more machine learning algorithms configured to identify potential network vulnerabilities. Red are guided by a machine learning algorithm configured to provide suggestions as to potential successful attack paths. Blue teams are guided by a machine learning algorithm configured to provide suggestions as to potential successful attack paths.

IPC Classes  ?

89.

Contextual and risk-based multi-factor authentication

      
Application Number 18885474
Grant Number 12218934
Status In Force
Filing Date 2024-09-13
First Publication Date 2025-01-02
Grant Date 2025-02-04
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Macleod, Ian

Abstract

A system for contextual and risk-based multi-factor authentication having a multi-dimensional time series data server configured to monitor and record a network's traffic data and to serve the traffic data to other modules and a directed computation graph module configured to receive network traffic data from the multi-dimensional time series data server, determine a network traffic baseline from the network traffic data, and determine a verification score needed before granting access based at least in part by the network traffic baseline. A plurality of verification methods build up a user's verification score to required level to gain access.

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/40 - Network security protocols
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation

90.

SYSTEM AND METHOD FOR INTERNET ACTIVITY AND HEALTH FORECASTING AND INTERNET NOISE ANALYSIS

      
Application Number US2024035131
Publication Number 2024/263997
Status In Force
Filing Date 2024-06-21
Publication Date 2024-12-26
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for large-scale internet health forecasting and internet noise analysis. The system and method feature the ability7 to scan for, ingest and process, and then use various data stores for capturing entity data, their relationships, and actions associated with them. This data forms the basis for cvber enrichment service databases which can used to provide information responsive to user submitted queries as well as to produce large-scale (e.g., Internet scale) simulation models using statistical models, generative ML models, massively multiplayer online gaming simulation systems, or full discrete event simulation engines or some combination. User submitted queries can be ran against the raw data or against simulations to provide simulation results that can be used improve cy bersecurity for an organization against actual observed behaviors or simulations.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/248 - Presentation of query results
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

91.

DYNAMIC AUTHENTICATION ATTACK DETECTION AND ENFORCEMENT AT NETWORK, APPLICATION, AND HOST LEVEL

      
Application Number US2024034871
Publication Number 2024/263817
Status In Force
Filing Date 2024-06-20
Publication Date 2024-12-26
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for dynamic authentication attack detection an enforcement at the network, application, and host level that enables zero trust network security principles when combined with stateful authentication object tracking, authentication object manipulation and forgery7 detection, and assessment of authentication and identity7 attack surface. The methodology involves gathering all authentication objects issued by a network, storing the authentication objects in a centralized location for use in stateful deterministic authentication object tracking, scoring the completeness of the authentication risk observations, and intervening in authentication processes when the potential risk is too great.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols

92.

DYNAMIC AUTHENTICATION REVOCATION UTILIZING PRIVILEGE ASSURANCE

      
Application Number US2024033461
Publication Number 2024/258881
Status In Force
Filing Date 2024-06-11
Publication Date 2024-12-19
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for the dynamic authentication revocation using privilege assurance of enterprise computer network environments using lateral movement detection and prevention. The system uses local session monitors to monitor logon sessions within a network, generating and verifying event logs and authentication records to ensure the legitimacy of authenticated user sessions and to revoke credentials when an illicit session is detected and further removing potentially compromised network components from the network, halting lateral movement in real-time.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
  • H04W 12/08 - Access security
  • H04W 12/082 - Access security using revocation of authorisation

93.

NETWORK AUTHENTICATION TOXICITY ASSESSMENT

      
Application Number US2024033463
Publication Number 2024/258883
Status In Force
Filing Date 2024-06-11
Publication Date 2024-12-19
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for scoring and enforcing authentication standards that actually enable zero trust network security principles when combined with stateful authentication object tracking, authentication object manipulation and forgery detection, and assessment of authentication and identity attack surface. The methodology involves gathering all authentication objects issued by a network, storing the authentication objects in a centralized location for use in stateful deterministic authentication object tracking, scoring the completeness of the authentication observations, assessing the quality of the authentication observations, and assigning organization-specific penalty functions.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols

94.

PARAMETRIC ANALYSIS OF INTEGRATED OPERATIONAL AND INFORMATION TECHNOLOGY SYSTEMS

      
Application Number 18803617
Status Pending
Filing Date 2024-08-13
First Publication Date 2024-12-12
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for analyzing integrated operational technology and information technology systems with sufficient granularity to predict key elements of their composite behavior. The system and method involve creating high-fidelity models of the operational technology and information technology systems using one or more cyber-physical graphs, performing parametric analyses of the models to identify key components, scaling the parametric analyses of the models to analyze the key components at a greater level of granularity, and iteratively improving the models via ongoing search and testing against observed data from the real-world systems.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

95.

HIGHLY SCALABLE FOUR-DIMENSIONAL GEOSPATIAL DATA SYSTEM FOR SIMULATED WORLDS

      
Application Number 18813475
Status Pending
Filing Date 2024-08-23
First Publication Date 2024-12-12
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for providing time-series geospatial data and a world-scale simulation platform used to generate simulated-world environments by rendering data-dense geographical regions corresponding to heterogenous sourced data and formats for highly scalable parallel simulations, and comprised of a multi-dimensional time-series database used for enabling query support across multiple simulations via individual simulation and entity swimlanes for cyber, physical and cyber-physical entities and regions.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - IndexingWeb crawling techniques

96.

Dynamic authentication revocation utilizing privilege assurance

      
Application Number 18333421
Grant Number 12500888
Status In Force
Filing Date 2023-06-12
First Publication Date 2024-12-12
Grant Date 2025-12-16
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard

Abstract

A system and method for the dynamic authentication revocation using privilege assurance of enterprise computer network environments using lateral movement detection and prevention. The system uses local session monitors to monitor logon sessions within a network, generating and verifying event logs and authentication records to ensure the legitimacy of authenticated user sessions and to revoke credentials when an illicit session is detected and further removing potentially compromised network components from the network, halting lateral movement in real-time.

IPC Classes  ?

97.

AI-driven defensive cybersecurity strategy analysis and recommendation system

      
Application Number 18402662
Grant Number 12224992
Status In Force
Filing Date 2024-01-02
First Publication Date 2024-12-05
Grant Date 2025-02-11
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity improvements to networked systems based on a cost/benefit analysis. The system and method use machine learning algorithms to run simulated attack and defense strategies against a model of the networked system created using a directed graph. Recommendations are generated based on an analysis of the simulation results against a variety of cost/benefit indicators.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

98.

Rapid predictive analysis of very large data sets using the distributed computational graph

      
Application Number 18779064
Grant Number 12155693
Status In Force
Filing Date 2024-07-21
First Publication Date 2024-11-26
Grant Date 2024-11-26
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system for fully integrated collection of business impacting data, analysis of that data and generation of both analysis driven business decisions and analysis driven simulations of alternate candidate business actions has been devised and reduced to practice. This business operating system may be used to monitor and predictively warn of events that impact the security of business infrastructure and may also be employed to monitor client-facing services supported by both software and hardware to alert in case of reduction or failure and also predict deficiency, service reduction or failure based on current event data.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/40 - Network security protocols

99.

COMPOSITE SYMBOLIC AND NON-SYMBOLIC ARTIFICIAL INTELLIGENCE SYSTEM FOR ADVANCED REASONING AND SEMANTIC SEARCH

      
Application Number 18783404
Status Pending
Filing Date 2024-07-24
First Publication Date 2024-11-21
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Kelley, Richard
  • Hopper, Jason
  • Park, David

Abstract

A semantic search system integrates with an AI platform to provide advanced search capabilities by leveraging automatically generated ontologies and knowledge graphs. The system employs natural language processing, machine learning, and large language models to create, update, and align ontologies from diverse data sources. It supports context-aware query interpretation, personalized results, and complex reasoning by incorporating user context, feedback, and domain knowledge. The system optimizes search performance and efficiency through indexing techniques, distributed computing, and continuous learning. With a modular architecture and scalable infrastructure, the semantic search system enables users to retrieve relevant, meaningful, and context-specific information from vast amounts of structured and unstructured data. The integration of the semantic search system with the AI platform's components, such as knowledge graphs and model blending, enhances the platform's overall reasoning, decision-making, and problem-solving capabilities, empowering users with intelligent and intuitive search experiences across various domains and applications.

IPC Classes  ?

100.

ONGOING TRIGGER-BASED SCANNING OF CYBER-PHYSICAL ASSETS

      
Application Number 18789647
Status Pending
Filing Date 2024-07-30
First Publication Date 2024-11-21
Owner QOMPLX LLC (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for trigger-based scanning of cyber-physical assets, including a distributed operating system, parameter evaluation engine, at least one cyber-physical asset, at least one crypt-ledger, a network, and a scanner that detects trigger conditions and events and performs scans of cyber-physical assets based on the trigger and any relevant stored scan rules before storing scan results as time-series data.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/909 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06N 5/01 - Dynamic search techniquesHeuristicsDynamic treesBranch-and-bound
  • G06N 5/045 - Explanation of inferenceExplainable artificial intelligence [XAI]Interpretable artificial intelligence
  • G06N 5/046 - Forward inferencingProduction systems
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06N 20/00 - Machine learning
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  1     2     3     4        Next Page