Patents by Inventor SYED KAMRAN HASAN

SYED KAMRAN HASAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220030009
    Abstract: COMPUTER SECURITY SYSTEM BASED ON ARTIFICIAL INTELLIGENCE includes Critical Infrastructure Protection & Retribution (CIPR) through Cloud & Tiered Information Security (CTIS), Machine Clandestine Intelligence (MACINT) & Retribution through Covert Operations in Cyberspace, Logically Inferred Zero-database A-priori Realtime Defense (LIZARD), Critical Thinking Memory & Perception (CTMP), Lexical Objectivity Mining (LOM), Linear Atomic Quantum Information Transfer (LAQIT) and Universal BCHAIN Everything Connections (UBEC) system with Base Connection Harmonization Attaching Integrated Nodes.
    Type: Application
    Filed: May 22, 2021
    Publication date: January 27, 2022
    Inventor: Syed Kamran HASAN
  • Publication number: 20220014547
    Abstract: Method and device for managing security in a computer network include algorithms of iterative intelligence growth, iterative evolution, and evolution pathways; sub-algorithms of information type identifier, conspiracy detection, media scanner, privilege isolation analysis, user risk management and foreign entities management; and modules of security behavior, creativity, artificial threat, automated growth guidance, response/generic parser, security review module and monitoring interaction system. Applications include malware predictive tracking, clandestine machine intelligence retribution through covert operations in cyberspace, logically inferred zero-database a-priori realtime defense, critical infrastructure protection & retribution through cloud & tiered information security, and critical thinking memory & perception.
    Type: Application
    Filed: July 19, 2021
    Publication date: January 13, 2022
    Inventor: Syed Kamran HASAN
  • Publication number: 20180285840
    Abstract: A Universal BCHAIN Everyone/Everything/Everywhere Connections (UBEC) system comprises UBEC applications that operate in accordance with the BCHAIN Protocol, BCHAIN network that comprises a plurality of BCHAIN Nodes, which operate software in accordance with the BCHAIN Protocol, Appchains, which comprise data storing, serving and computational programs that operate directly upon the BCHAIN Network and Legislated UBEC Independent Governing Intelligence (LUIGI) that comprise an artificially intelligent control mechanism in a UBEC Platform.
    Type: Application
    Filed: January 23, 2018
    Publication date: October 4, 2018
    Inventor: SYED KAMRAN HASAN
  • Publication number: 20170214701
    Abstract: COMPUTER SECURITY SYSTEM BASED ON ARTIFICIAL INTELLIGENCE includes Critical Infrastructure Protection & Retribution (CIPR) through Cloud & Tiered Information Security (CTIS), Machine Clandestine Intelligence (MACINT) & Retribution through Covert Operations in Cyberspace, Logically Inferred Zero-database A-priori Realtime Defense (LIZARD), Critical Thinking Memory & Perception (CTMP), Lexical Objectivity Mining (LOM), Linear Atomic Quantum Information Transfer (LAQT) and Universal BCHAIN Everything Connections (UBEC) system with Base Connection Harmonization Attaching Integrated Nodes.
    Type: Application
    Filed: January 24, 2017
    Publication date: July 27, 2017
    Inventor: SYED KAMRAN HASAN
  • Publication number: 20170076391
    Abstract: A system of perpetual giving comprises donor entities, endowment fund entities, business entities, a control board, an investment allocator and a profit allocator. The donor entities invest to the endowment fund entities and the endowment fund entities return profit to the donor entities. Tax write-off is applied between tax paid by the donor entities and investment by the donor entities to the endowment fund entities. The endowment fund entities invest to the business entities and the business entities return profit to the endowment fund entities. The investment allocator makes investment recommendation to the control board. The control board provides investment preferences to the investment allocator. The profit allocator makes recommendation regarding reinvestment fund for the business entities and delegated fund for the control board. Each allocator comprises a pattern matching module and a static variables module. The system uses creativity module and CTMP module.
    Type: Application
    Filed: September 14, 2016
    Publication date: March 16, 2017
    Inventor: SYED KAMRAN HASAN
  • Publication number: 20160330219
    Abstract: Method and device for managing security in a computer network include algorithms of iterative intelligence growth, iterative evolution, and evolution pathways; sub-algorithms of information type identifier, conspiracy detection, media scanner, privilege isolation analysis, user risk management and foreign entities management; and modules of security behavior, creativity, artificial threat, automated growth guidance, response/generic parser, security review module and monitoring interaction system. Applications include malware predictive tracking, clandestine machine intelligence retribution through covert operations in cyberspace, logically inferred zero-database a-priori realtime defense, critical infrastructure protection & retribution through cloud & tiered information security, and critical thinking memory & perception.
    Type: Application
    Filed: May 4, 2016
    Publication date: November 10, 2016
    Inventor: SYED KAMRAN HASAN