Flexxon Patents – Insights & Stats (Updated 2024)

Flexxon has a total of 68 patents globally, out of which 39 have been granted. Of these 68 patents, more than 89% patents are active. Singapore is where Flexxon has filed the maximum number of patents, followed by United States of America and Australia. Parallelly, Singaporeseems to be the main focused R&D centre and also is the origin country of Flexxon.

Flexxon was founded in the year 2007. The company is specializing in hardware-based cybersecurity solutions and industrial NAND flash storage devices. It serves sectors like cybersecurity, industrial, medical, and automotive applications.

Do read about some of the most popular patents of Flexxon which have been covered by us in this article and also you can find Flexxon patents information, the worldwide patent filing activity and its patent filing trend over the years, and many other stats over Flexxon patent portfolio.

How many patents does Flexxon have?

Flexxon has a total of 68 patents globally. These patents belong to 7 unique patent families. Out of 68 patents, 62 patents are active.

How Many Patents did Flexxon File Every Year?

Flexxon Patent Filing Trend

Are you wondering why there is a drop in patent filing for the last two years? It is because a patent application can take up to 18 months to get published. Certainly, it doesn’t suggest a decrease in the patent filing.

YearsApplication Year CountPublication Year Count
2024112
2023129
202289
2021138
2020341

How many Flexxon patents are Alive/Dead?

Flexxon Patent Portfolio

How Many Patents did Flexxon File in Different Countries?

Flexxon Worldwide Patent Filing

Countries in which Flexxon Filed Patents

CountryPatents
Singapore7
United States of America6
Australia6
Europe (EPO)5
Korea (South)5
China4
Japan4
Hong Kong (S.A.R.)4
Israel4
Taiwan3
India3
New Zealand3
Austria2
Malaysia2
Germany2
Canada2
Saudi Arabia1
Denmark1
Italy1
Viet Nam1

Where are Research Centres of Flexxon Patents Located?

R&D Centers of Flexxon

List of Flexxon Patents

Flexxon PatentsTitle
US11934523B1System And Method For Securing Data Files
US11928210B2Module And Method For Monitoring Systems Of A Host Device For Security Exploitations
EP4022478B1Methods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
CN117216797BSystem And Method For Protecting Data Files
DE602020031796T2Methods And Systems Using An Ai Coprocessor To Detecting Anomalies Caused By Malware In Storage Devices
AU2023201855B2Module And Method For Authenticating Data Transfer Between A Storage Device And A Host Device
NZ784312BMethods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
SA522440461B1System And Method For Detecting Data Anomalies By Analysing Morphologies Of Cybersecurity Threats
IL286431BModule And Method For Detecting Malicious Activities In A Storage Device
KR102716978B1Methods And Systems For Detecting Anomalies Caused By Malware In Storage Devices Using Ai-Coprocessor
KR102695289B1Module And Method For Authenticating Data Transfer Between A Storage Device And A Host Device
KR102667827B1System And Method For Securing Data Files
EP4379583A1System And Method For Securing Data Files
IN202127031834ASystem And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
AU2023266227A1System And Method For Securing Data Files
TW202424798ASystem And Method For Securing Data Files
IN202334079825ASystem And Method For Securing Data Files
IL304869A1System And Method For Securing Data Files
HK40101631ASystem And Method For Securing Data Files
JP2024080605ASystem And Method For Securing Data Files
US11610026B2Module And Method For Authenticating Data Transfer Between A Storage Device And A Host Device
EP3979118B1Module And Method For Detecting Malicious Activities In A Storage Device
AT1577188TModul Und Verfahren Zur Detektion Bösartiger Aktivitäten In Einer Speichervorrichtung
DE602020011800T2Module And Method For Detecting Malicious Activities In A Storage Device
MY199083ASystem And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
SG10202202093XBModule And Method For Monitoring Systems Of A Host Device For Security Exploitations
SG10202260284YBSystem And Method For Securing Data Files
JP7368668B2A Method And System For Detecting Abnormal Behavior Of Storage Devices Infected With Malware Using An Ai Coprocessor
JP7202030B2Module And Method For Detecting Malicious Movements In The Storage Device
SG10202302682PAMethods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
HK40077489AModule And Method For Authenticating Data Transfer Between A Storage Device And A Host Device
HK40054686A1System And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
EP3899770B1System And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
CN114282228BModule And Method For Detecting Malicious Activity In A Storage Device
CN113632083BSystems And Methods For Detecting Data Anomalies By Analyzing Patterns Of Known And/Or Unknown Cybersecurity Threats
DK3899770T3System And Procedure For Detection Of Data Irregularities By Analysis Of The Morphologies Of Known And/Or Unknown Cyber Security Threats
IT202200066282T2System And Method For Detecting Anomalies Of Data Analyzing Morphologies Of Known And / Or Unknown Cybersecurity Threats
AT1523188TSystem Und Verfahren Zur Erkennung Von Datenanomalien Durch Analyse Von Morphologien Bekannter Und/Oder Unbekannter Cyber-Sicherheitsbedrohungen
IL289367BSystems And Methods For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
JP7092939B2Systems And Methods For Detecting Data Anomalies Through Morphological Analysis Of Known And/Or Unknown Cybersecurity Threats
KR102363182B1Module And Method For Detecting Malicious Activities In A Storage Device
EP4099618A1Module And Method For Authenticating Data Transfer Between A Storage Device And A Host Device
CN113939818AMethods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
HK40060529AMethods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
IN202124034054AModule And Method For Detecting Malicious Activities In A Storage Device
CA3126591A1Module And Method For Detecting Malicious Activities In A Storage Device
MYPI2021004143A0Module And Method For Detecting Malicious Activities In A Storage Device
IL290159AMethods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
AU2022200588A1Module And Method For Authenticating Data Transfer Between A Storage Device And A Host Device
AU2020337754A1Methods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
US11082441B1Systems And Methods For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
US11055443B1Module And Method For Detecting Malicious Activities In A Storage Device
SG10202105796SBModule And Method For Authenticating Data Transfer Between A Storage Device And A Host Device
AU2020223632B2System And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
TWI740627BMethods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
AU2021204804B1Module And Method For Detecting Malicious Activities In A Storage Device
NZ767245BSystem And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
KR102323290B1Systems And Methods For Detecting Data Anomalies By Analyzing Morphologies Of Known And/Or Unknown Cybersecurity Threats
US20210064745A1Methods And Systems Using An Ai Co-Processor To Detect Anomolies Caused By Malware In Storage Devices
WO2021183043A1System And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
WO2021040618A1Methods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
VN82771AModules And Methods Of Control For Hazardous Activities In Storage Equipment
TW202134919ASystem And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
NZ778067AModule And Method For Detecting Malicious Activities In A Storage Device
SG10202004811XAMethods And Systems Using An Ai Co-Processor To Detect Anomalies Caused By Malware In Storage Devices
CA3125101A1System And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats
SG10202009754QBModule And Method For Detecting Malicious Activities In A Storage Device
SG10202002125QASystem And Method For Detecting Data Anomalies By Analysing Morphologies Of Known And/Or Unknown Cybersecurity Threats

What are Flexxon key innovation segments?

What Technologies are Covered by Flexxon?

The chart below distributes patents filed by Flexxon in different countries on the basis of the technology protected in patents. It also represents the markets where Flexxon thinks it’s important to protect particular technology inventions.

R&D Focus: How has Flexxon search focus changed over the years?

EXCLUSIVE INSIGHTS COMING SOON!

Interested in knowing about the areas of innovation that are being protected by Flexxon?

Related Articles

Celcem Patents – Insights & Stats (Updated 2024)

Celcem has a total of 28 patents globally, out of which all patents have been granted. Of these 28 patents, all patents patents are active. Singapore is where Celcem has filed the maximum number of patents. Parallelly, Singapore seems to be the main focused R&D centre and also is the

Read More »

Was this article helpful?

Leave a Comment

Fill the form to get the details:

Fill the form to get the details:

Our comprehensive report provides an in-depth look into the patent portfolio. The report includes a breakdown of the patent portfolio across various technologies, listing the patent along with brief summaries of each patent's technology.