Patents & Trademarks

18 patent-pending inventions. 3 trademark applications. A published book. The OACIS intellectual property portfolio protects the architecture, the methods, and the brand.

Patent Pending

All inventions described below are covered by provisional patent applications filed with the United States Patent and Trademark Office (USPTO) under 35 U.S.C. §111(b). Non-provisional applications are in preparation. Nothing on this page constitutes a license or grant of rights.

OACIS Architecture — 10 Inventions

Core methods and systems for organizational intelligence, knowledge graph governance, and vendor-neutral enterprise architecture.

Invention 1

Conveyor Pipeline

Eight-component standard pipeline for organizational knowledge ingestion with Three-Tap source separation (code/config/data) and closed-loop behavioral verification.

Invention 2

Seven-Level Trust Hierarchy

Hierarchical trust governance of knowledge graph elements with automatic conflict resolution. AI output is classified as the lowest trust tier, preventing self-referential authority escalation.

Invention 3

Confidentiality Classification

Six-level classification with a mandatory seven-stage pre-ingestion pipeline. The C-5 TRAINING partition is physically isolated — unreachable, not merely restricted. AI outputs inherit the most restrictive source classification.

Invention 4

Two-Dimensional Governance Grid

Orthogonal Trust × Confidentiality access control. Every query specifies a trust floor and confidentiality ceiling. Results return only nodes within the authorized rectangle. Upward inheritance on traversal.

Invention 5

Temporal Knowledge Graph

Point-in-time organizational reconstruction with statistical drift detection and Monte Carlo simulation. "What did the organization look like 6 months ago?" becomes a query.

Invention 6

Canary Migration Pattern

Five-phase organizational system transition: Connect → Mirror → Shadow → Canary → Cutover. The knowledge graph serves as a vendor-neutral comparison layer with automated experience verification.

Invention 7

Ontology-Mediated Integration

Three-tier ontology (upper/domain/source) with logical mapping — not physical data copy. AI-assisted concept discovery for new source systems. Vendor replacement requires only adapter swap.

Invention 8

Threat Graph + OSCAL

Continuous security posture assessment via knowledge graph traversal: CVE → software → asset → business function in five minutes. Graph-derived zero-trust SASE policy generation.

Invention 9

Cross-Division Voiceprint Fraud

Voiceprint consistency analysis across organizational divisions in multi-platform contact centers. Detects impersonation, behavioral velocity anomalies, and agent misconduct patterns.

Invention 10

Ontology Subscription Service

Distributed, continuously-updated curated domain ontologies with privacy-preserving network-effect improvement. Subscribers benefit from collective mapping experience without exposing data.

CX-AIO Platform — 8 Inventions

Specific software implementations for contact center fraud detection, caller identity verification, and platform-agnostic operations.

CX-AIO 1

Multi-Signal Fraud Scoring

Bayesian-ensemble aggregation of heterogeneous fraud detection signals — phone analysis, graph patterns, vector anomalies, ML models, geolocation, voice biometrics — with configurable aggregation strategies.

CX-AIO 2

Cross-Platform STIR/SHAKEN

Unified cryptographic caller identity verification across 16 heterogeneous contact center platforms through abstract CDR parsers and PASSporT validation.

CX-AIO 3

Deepfake Detection Pipeline

Voice biometric deepfake detection using spectral analysis, temporal consistency checks, and environmental audio fingerprinting during live contact center interactions.

CX-AIO 4

Graph-Based Fraud Ring Detection

Knowledge graph traversal to identify coordinated fraud networks through shared phone numbers, addresses, devices, and behavioral patterns across contact center interactions.

CX-AIO 5

Platform-Agnostic Normalization

Contact center data normalization across 16 platforms into a unified schema. Genesys, Cisco, Avaya, Amazon Connect, Five9, and 11 more — same data model.

CX-AIO 6

Location-Velocity Fraud

Geospatial fraud detection using location-velocity analysis. Flags physically impossible travel between interaction locations within time windows.

CX-AIO 7

AI Cost Metering

Per-interaction AI cost metering and budget enforcement. Track token consumption, model costs, and ROI at the individual interaction level with configurable budget caps.

CX-AIO 8

Adaptive DDoS Protection

Contact center API DDoS protection with adaptive rate limiting, traffic fingerprinting, and automated mitigation — purpose-built for telephony workloads.

Trademark Applications

Filed or in preparation with the United States Patent and Trademark Office via TEAS.

OACIS™

Status: Application pending

Classes: Class 9 (computer software), Class 16 (printed publications), Class 41 (education services), Class 42 (SaaS / software consulting)

Standard character mark. Acronym: Organizations as Code through an Intelligent System.

Organizations as Code™

Status: Application pending

Classes: Class 16 (printed publications), Class 42 (software services)

Descriptive mark filed under acquired distinctiveness claim through published book and industry use.

OACIS Conveyor™

Status: Application pending

Classes: Class 9 (software framework)

Combined mark for the eight-component pipeline architecture.

Copyright & Publication

Organizations as Code: The Intelligent System Revolution

Copyright Registration: U.S. Copyright Office, Form TX

ISBN: Registered through Bowker (paperback, hardcover, ebook)

Author: Nathanael Kaseman

The literary work that describes the OACIS architecture, methods, and principles. The book establishes prior art and public disclosure dates for all described inventions.

IP Strategy

The OACIS patents protect the architecture. The CX-AIO patents protect the implementation. Together, they create a defensible position across the entire organizational intelligence stack.

Architecture Patents (OACIS)

  • Industry-agnostic methods
  • Knowledge graph governance
  • Pipeline patterns
  • Ontology architecture
  • Migration methodology

Implementation Patents (CX-AIO)

  • Contact center specific
  • Fraud detection algorithms
  • Signal processing
  • Multi-platform normalization
  • Cost metering & DDoS

For licensing inquiries, partnership discussions, or IP-related questions, contact legal@oacisconsulting.com.