18 patent-pending inventions. 3 trademark applications. A published book. The OACIS intellectual property portfolio protects the architecture, the methods, and the brand.
All inventions described below are covered by provisional patent applications filed with the United States Patent and Trademark Office (USPTO) under 35 U.S.C. §111(b). Non-provisional applications are in preparation. Nothing on this page constitutes a license or grant of rights.
Core methods and systems for organizational intelligence, knowledge graph governance, and vendor-neutral enterprise architecture.
Eight-component standard pipeline for organizational knowledge ingestion with Three-Tap source separation (code/config/data) and closed-loop behavioral verification.
Hierarchical trust governance of knowledge graph elements with automatic conflict resolution. AI output is classified as the lowest trust tier, preventing self-referential authority escalation.
Six-level classification with a mandatory seven-stage pre-ingestion pipeline. The C-5 TRAINING partition is physically isolated — unreachable, not merely restricted. AI outputs inherit the most restrictive source classification.
Orthogonal Trust × Confidentiality access control. Every query specifies a trust floor and confidentiality ceiling. Results return only nodes within the authorized rectangle. Upward inheritance on traversal.
Point-in-time organizational reconstruction with statistical drift detection and Monte Carlo simulation. "What did the organization look like 6 months ago?" becomes a query.
Five-phase organizational system transition: Connect → Mirror → Shadow → Canary → Cutover. The knowledge graph serves as a vendor-neutral comparison layer with automated experience verification.
Three-tier ontology (upper/domain/source) with logical mapping — not physical data copy. AI-assisted concept discovery for new source systems. Vendor replacement requires only adapter swap.
Continuous security posture assessment via knowledge graph traversal: CVE → software → asset → business function in five minutes. Graph-derived zero-trust SASE policy generation.
Voiceprint consistency analysis across organizational divisions in multi-platform contact centers. Detects impersonation, behavioral velocity anomalies, and agent misconduct patterns.
Distributed, continuously-updated curated domain ontologies with privacy-preserving network-effect improvement. Subscribers benefit from collective mapping experience without exposing data.
Specific software implementations for contact center fraud detection, caller identity verification, and platform-agnostic operations.
Bayesian-ensemble aggregation of heterogeneous fraud detection signals — phone analysis, graph patterns, vector anomalies, ML models, geolocation, voice biometrics — with configurable aggregation strategies.
Unified cryptographic caller identity verification across 16 heterogeneous contact center platforms through abstract CDR parsers and PASSporT validation.
Voice biometric deepfake detection using spectral analysis, temporal consistency checks, and environmental audio fingerprinting during live contact center interactions.
Knowledge graph traversal to identify coordinated fraud networks through shared phone numbers, addresses, devices, and behavioral patterns across contact center interactions.
Contact center data normalization across 16 platforms into a unified schema. Genesys, Cisco, Avaya, Amazon Connect, Five9, and 11 more — same data model.
Geospatial fraud detection using location-velocity analysis. Flags physically impossible travel between interaction locations within time windows.
Per-interaction AI cost metering and budget enforcement. Track token consumption, model costs, and ROI at the individual interaction level with configurable budget caps.
Contact center API DDoS protection with adaptive rate limiting, traffic fingerprinting, and automated mitigation — purpose-built for telephony workloads.
Filed or in preparation with the United States Patent and Trademark Office via TEAS.
Status: Application pending
Classes: Class 9 (computer software), Class 16 (printed publications), Class 41 (education services), Class 42 (SaaS / software consulting)
Standard character mark. Acronym: Organizations as Code through an Intelligent System.
Status: Application pending
Classes: Class 16 (printed publications), Class 42 (software services)
Descriptive mark filed under acquired distinctiveness claim through published book and industry use.
Status: Application pending
Classes: Class 9 (software framework)
Combined mark for the eight-component pipeline architecture.
Copyright Registration: U.S. Copyright Office, Form TX
ISBN: Registered through Bowker (paperback, hardcover, ebook)
Author: Nathanael Kaseman
The literary work that describes the OACIS architecture, methods, and principles. The book establishes prior art and public disclosure dates for all described inventions.
The OACIS patents protect the architecture. The CX-AIO patents protect the implementation. Together, they create a defensible position across the entire organizational intelligence stack.
For licensing inquiries, partnership discussions, or IP-related questions, contact legal@oacisconsulting.com.