Defending digital infrastructure through innovation
Ch. 29Cybersecurity
Having examined blockchain and the relationship between speculative market cycles and patent filing behavior, this chapter turns to cybersecurity, a domain whose growth trajectory is shaped by escalating digital threats and regulatory mandates.
As the digital economy has expanded, so too has the attack surface that threatens it. Cybersecurity — the protection of networks, systems, and data from unauthorized access and malicious exploitation — has become one of the most active domains in the United States patent system. This chapter examines the trajectory of cybersecurity-related patents, from early cryptographic methods through the current era of network defense, zero-trust architectures, and AI-driven threat detection.
Growth Trajectory
Figure 1
Cybersecurity Patents Grew More Than 15x From 1,126 in 2000 to 17,323 in 2022, Coinciding With Major Breaches and Regulation
Annual cybersecurity patent count by CPC codes, tracking growth trajectory.
Loading visualization…
Annual count of utility patents classified under cybersecurity-related CPC codes, 1976–2025. The most prominent pattern is the sustained growth beginning in the early 2000s, with notable acceleration observed in periods coinciding with the Snowden disclosures (2013) and the SolarWinds attack (2020). Grant year shown. Application dates are typically 2–3 years earlier.
The growth in cybersecurity patents coincides with the expansion of the digital economy, with acceleration observed in periods overlapping with major security incidents such as the Snowden disclosures (2013), WannaCry ransomware campaign (2017), and SolarWinds attack (2020).
Figure 2
Cybersecurity's Share of Total Patents Rose From 0.71% in 2000 to 5.25% in 2024, a Structural Shift
Cybersecurity patents as a share of all utility patents, showing reallocation toward security technologies.
Loading visualization…
Percentage of all utility patents classified under cybersecurity-related CPC codes. The upward trend indicates that cybersecurity patenting growth is not merely tracking overall patent growth but represents a genuine reallocation of inventive effort.
The growing share of cybersecurity patents among all patents demonstrates that security innovation is outpacing overall patent growth, reflecting the growing strategic importance of digital defense.
Cybersecurity Subfields
Figure 3
Network Security Leads at 35% of Cybersecurity Patents, Surpassing Cryptography (18%) in 2003
Patent counts by cybersecurity subfield over time, based on CPC group codes.
Loading visualization…
Patent counts by cybersecurity subfield over time, based on CPC classifications. Network security surpassed cryptography around 2003 and has been the dominant subfield since, while data protection, authentication, and system security have all experienced rapid growth.
The diversification of cybersecurity subfields coincides with the expanding attack surface: as digital systems have grown more complex, the defensive patent landscape has broadened from encryption-centric approaches to encompass network defense, identity management, and data protection.
Leading Organizations
Figure 4
IBM (14,174 Patents) Leads Cybersecurity Patenting, Followed by Intel (4,512), Microsoft, and Cisco
Organizations ranked by cybersecurity patent count, showing concentration among tech and defense firms.
Loading visualization…
Organizations ranked by total cybersecurity-related patents. The data indicate a concentration among large technology firms with dedicated security research divisions, reflecting the substantial investment required to develop and maintain defensive technologies.
The concentration of cybersecurity patents among major technology firms is consistent with the high barriers to entry in security R&D: deep expertise in cryptography and network protocols, access to large-scale operational data for threat detection, and the strategic value of defensive patent portfolios.
Top Inventors
Figure 5
The Most Prolific Cybersecurity Inventor, Kia Silverbrook, Holds 572 Patents Across Major Technology Firms
Primary inventors ranked by total cybersecurity-related patents. The distribution exhibits pronounced skewness, with a small number of highly productive individuals accounting for a disproportionate share of total cybersecurity patent output.
The concentration of cybersecurity patenting among a small cohort of prolific inventors reflects the deep specialization required in areas such as cryptographic algorithm design, network protocol security, and threat analysis.
Geographic Distribution
Figure 6
The US Accounts for 61% of Cybersecurity Patents (139,440); Japan, China, India, and Israel Follow
Countries ranked by cybersecurity patents based on inventor location.
Loading visualization…
Countries ranked by total cybersecurity-related patents based on primary inventor location. The United States maintains a substantial lead, while the presence of Israel reflects that nation's well-documented specialization in cybersecurity innovation.
The geographic distribution of cybersecurity patents reflects the concentration of major technology firms and security research laboratories in the United States, while Israel's strong presence relative to its size underscores its recognized specialization in defensive and adversarial cybersecurity capabilities.
Figure 7
California (49,451) Leads US Cybersecurity Patenting, Then Washington (12,229) and Texas (11,115)
US states ranked by cybersecurity patents based on inventor location.
Loading visualization…
US states ranked by total cybersecurity-related patents based on primary inventor location. California's lead is consistent with Silicon Valley's concentration of technology firms, while the strong showing of Virginia and Maryland reflects the proximity of defense contractors and intelligence agencies to Washington, DC.
The geographic clustering of cybersecurity patents in California, the DC corridor, and Texas reflects the dual nature of cybersecurity innovation — driven both by commercial technology firms and by defense and intelligence sector demand.
Quality Indicators
Figure 8
Cybersecurity Technology Scope Rose From 2.04 to 2.42 CPC Subclasses (2014–2024)
Average claims, backward citations, and technology scope for cybersecurity patents by year.
Loading visualization…
Average claims, backward citations, and technology scope for cybersecurity-related patents by year. The upward trend in technology scope suggests that cybersecurity patents are becoming increasingly interdisciplinary, spanning multiple CPC subclasses as security capabilities are integrated across diverse technology systems.
Rising technology scope indicates that cybersecurity patents increasingly span multiple technology domains, consistent with the integration of security features into networking, cloud computing, IoT, and enterprise software.
Cybersecurity Patenting Strategies
The leading cybersecurity patent holders pursue markedly different strategies. Some firms concentrate on cryptographic methods and data protection, while others distribute their portfolios across network security, authentication, and system security. A comparison of subfield portfolios across major holders reveals where each organization concentrates its inventive effort and identifies areas of strategic differentiation.
Cross-Domain Diffusion
Cybersecurity is increasingly embedded across multiple technology domains rather than existing as an isolated specialty. By tracking how frequently cybersecurity-classified patents also carry CPC codes from other technology areas, it is possible to measure the diffusion of security capabilities into healthcare, manufacturing, telecommunications, and other sectors.
Figure 9
Cybersecurity Patents: 3.44% Co-Occurrence With Section B and 2.59% With Section A in 2024
Cybersecurity patents co-classified with other CPC sections, measuring cross-sector diffusion.
Loading visualization…
Percentage of cybersecurity patents that also carry CPC codes from other sections. Rising lines indicate cybersecurity diffusing into that sector. The most notable pattern is the increasing co-occurrence with Operations & Transport (Section B) and Human Necessities (Section A, encompassing healthcare).
The rising co-occurrence of cybersecurity patents with other CPC sections reflects the pervasive integration of security capabilities across technology domains, consistent with cybersecurity's evolution from a standalone discipline to an embedded requirement of modern digital systems.
Team Composition and Attribution
Cybersecurity patents increasingly involve larger inventor teams and corporate assignees, reflecting the multidisciplinary nature of modern security research. Average team sizes for cybersecurity patents have tracked closely with non-cybersecurity patents, with both exhibiting an upward trend that reflects the broader shift toward collaborative invention.
Figure 10
Cybersecurity and Non-Cybersecurity Teams Average 3.2 Inventors per Patent in 2024
Average inventors per patent for cybersecurity vs. non-cybersecurity utility patents by year.
Loading visualization…
Average number of inventors per patent for cybersecurity-related versus non-cybersecurity utility patents. Both categories show a similar upward trend, reflecting the broader shift toward collaborative research across all technology domains.
Cybersecurity patent team sizes have tracked closely with non-cybersecurity patents, both exhibiting steady growth that reflects the increasing complexity and multidisciplinary nature of modern invention.
Figure 11
Corporate Assignees Account for 99% of Cybersecurity Patents, Growing as Security Became Strategic
Distribution of cybersecurity patents by assignee type (corporate, university, government, individual) over time.
Loading visualization…
Distribution of cybersecurity patent assignees by type (corporate, university, government, individual) over time. The data reveal that corporate assignees account for the vast majority of cybersecurity patents, with the corporate share increasing since 2010 as firms expanded their security research divisions.
The dominance of corporate assignees in cybersecurity patenting reflects the strategic and commercial value of security technologies, while the relatively modest university share suggests that cybersecurity innovation is concentrated primarily in applied research within industry settings.
Having documented the growth of cybersecurity in the patent system, the trajectory of security innovation illuminates broader patterns in how the technology sector responds to evolving threats. The organizational strategies behind cybersecurity patenting are explored further in Assignee Composition, while the convergence of security and artificial intelligence reflects dynamics examined in the AI patents chapter.
Analytical Deep Dives
For metric definitions and cross-domain comparisons, see the ACT 6 Overview.
Figure 12
Incumbents Account for 91% of Cybersecurity Patents in 2024, With Entrants Contributing 9%
Annual patent counts decomposed by entrants (first patent in domain that year) versus incumbents.
Loading visualization…
Entrants are assignees filing their first cybersecurity patent in a given year. Incumbents had at least one prior-year patent. Grant year shown.
Figure 13
Cybersecurity Top-Decile Citation Share Declined From 38.5% in 1990 to 18.3% by 2020 as the Field Matured
Share of domain patents in the top decile of system-wide forward citations by grant year × CPC section.
Loading visualization…
Top decile computed relative to all utility patents in the same grant year and primary CPC section. Rising share indicates domain quality outpacing the system; falling share indicates dilution.
Figure 14
Top-4 Concentration in Cybersecurity Patents Declined From 32.4% in 1980 to 9.4% by 2025 (Through September)
Share of annual patents held by the top 4 organizations, measuring concentration in cybersecurity.
Loading visualization…
CR4 computed as the sum of the top 4 organizations' annual patent counts divided by total cybersecurity patents. The early high concentration reflects IBM's pioneering role in cryptographic research (including DES). The steady decline mirrors the expansion of cybersecurity into network security, cloud security, and endpoint protection.
The concentration trajectory is consistent with cybersecurity's evolution from a specialized cryptographic discipline dominated by a few research labs to a broad security sector where threat diversity is associated with a fragmented competitive landscape.
Figure 15
Cybersecurity Subfield Diversity Increased From 0.83 in 1978 to 0.94 by 2025 (Through September)
Normalized Shannon entropy of subfield distributions, measuring evenness across cybersecurity.
Loading visualization…
Normalized Shannon entropy of cybersecurity subfield patent distributions. The increase from 0.83 to 0.94 reflects the transition from cryptography-dominated patenting to a balanced distribution across network security, data protection, authentication, and access control.
The high starting entropy of 0.83 suggests cybersecurity was already relatively diversified by the late 1970s, unlike AI or biotechnology which started from narrow bases. The further increase reflects the proliferation of new attack vectors and corresponding defensive innovations.
Figure 16
2010s Cybersecurity Entrants Average 105.8 Patents/Year versus 77.9 for 1970s Entrants
Mean patents per active year for top organizations grouped by decade of first cybersecurity filing.
Loading visualization…
Mean patents per active year for top cybersecurity organizations grouped by entry decade. The 1.4x increase from 1970s to 2010s entrants is moderate, reflecting the domain's sustained high barriers to entry consistent with the specialized expertise required for security research.
The velocity dip for 1980s entrants (44.1/yr) is notable, suggesting that mid-period entrants during the personal computing era patented less intensively than both early cryptographic pioneers and later cloud-security specialists.
Figure 17
Cybersecurity Filings Peaked at 18,090 in 2019 While Grants Reached 17,323 in 2022 — a 3-Year Pipeline
Annual patent filings versus grants for cybersecurity, showing the examination lag during peak growth.
Loading visualization…
Cybersecurity patent filings peaked in 2019 and have since moderated, while grants continued climbing through 2022. The multi-year gap reflects both the volume of applications and the technical complexity of security-related patent examination.
Data coverage: January 1976 through September 2025. All 2025 figures reflect partial-year data.