Services

Expertise available
to serious organisations.

Our consulting work is an extension of our research — not a separate line of business. We take on a limited number of engagements per year, in areas where our in-house expertise is directly applicable. We do not offer generic advisory services.

Service areas
3
Engagements per year
Limited · by application
Patent counsel
Miller Thomson LLP
Engagement type
Project-based · no retainers
Inquiries
research@almeidaindustries.com
Service areaswhat we offer
01 / PATENT RESEARCH & CONSULTING
Prior art research, landscape analysis, and technical patent drafting support
We assist organisations in understanding the IP landscape around novel AI and software methods — identifying prior art, mapping competitive patent positions, and providing technical documentation support for novel filings.
AI · Software · Algorithms
02 / AI & ML SOFTWARE AUDITING
Independent technical review of AI and machine learning codebases
We conduct deep technical audits of ML training pipelines, inference systems, and data pipelines — identifying correctness issues, performance bottlenecks, security exposure, and architectural problems that internal teams may not surface.
Training · Inference · Data pipelines
03 / CRYPTO PLATFORM AUDITING
Technical audit of cryptographic systems, protocols, and blockchain infrastructure
We review cryptographic implementations, consensus mechanisms, smart contract logic, and protocol security for correctness and efficiency. Engagements focus on technical rigour — not compliance checkboxes.
Cryptography · Protocols · Smart contracts
01 — Patent Research & Consultingip landscape & technical drafting
Service 01
Patent Research & Consulting
AI · Software · Algorithms
Prior art search & analysis
IP landscape mapping
Claim scope assessment
Technical drafting support
Novelty evaluation
Litigation technical support
We bring first-hand experience filing patents on novel AI methods to bear on client engagements — understanding both what constitutes a protectable invention in this space and what the prior art landscape actually looks like at a technical level.

Most patent work in AI is done by attorneys with limited technical depth or by engineers with no patent process experience. We sit at the intersection — able to assess the genuine novelty of a method, identify the relevant prior art accurately, and communicate the technical substance in a form that survives scrutiny.

Engagements typically involve prior art research across academic literature, existing patent databases, and open-source implementations; an assessment of claim scope and defensibility; and technical documentation support for novel filings. We work alongside existing patent counsel rather than replacing it.

We do not file patents ourselves — we provide the technical foundation that makes filings stronger and more defensible.

Typical deliverables
Prior art report with academic, patent, and open-source coverage
Technical novelty assessment with claim differentiation analysis
Landscape map of related IP held by competitors and research institutions
Technical specification document suitable for patent counsel review
02 — AI & ML Software Auditingindependent technical review
We conduct independent technical audits of AI and ML systems — examining training pipelines, inference stacks, data pipelines, and model serving infrastructure for correctness problems, performance inefficiencies, security exposure, and architectural debt.

ML codebases accumulate technical debt in ways that are distinct from general software: silent numerical errors that don't surface until late training, data pipeline bugs that corrupt model behaviour without raising exceptions, inference optimizations that introduce correctness regressions, and security vulnerabilities specific to model serving and serialization formats.

Our audits are conducted by engineers who have built the same kinds of systems from scratch — not by generalist security firms applying checklists developed for web applications. We know where the failure modes live because we have encountered them in our own work.

Engagements are scoped to specific system components or end-to-end pipeline reviews depending on client need. We provide written findings with technical detail sufficient for an engineering team to act on directly.

Typical deliverables
Technical audit report with prioritised findings and reproduction steps
Performance bottleneck analysis with profiling data and recommended fixes
Security exposure summary covering serialization, serving, and data handling
Architectural assessment with remediation options ranked by impact
Service 02
AI & ML Software Auditing
Training · Inference · Data
Training pipeline correctness
Data pipeline integrity
Inference stack security
Serialization vulnerabilities
Performance bottleneck analysis
Architectural debt assessment
03 — Crypto Platform Auditingcryptographic systems & protocol review
Service 03
Crypto Platform Auditing
Cryptography · Protocols
Cryptographic implementation review
Consensus mechanism analysis
Smart contract logic audit
Protocol security assessment
Key management review
Performance & efficiency analysis
We audit cryptographic systems, blockchain infrastructure, and protocol implementations for technical correctness, security, and efficiency — with a focus on the underlying engineering rather than surface-level compliance.

Cryptographic systems fail in specific, well-understood ways: incorrect implementation of sound primitives, misuse of secure algorithms in insecure compositions, side-channel exposure from timing or memory access patterns, and consensus mechanisms with edge-case vulnerabilities that only manifest under adversarial conditions.

We approach these reviews from an engineering standpoint — examining actual implementation against specification, analysing the threat model for completeness, and assessing whether the chosen cryptographic primitives are appropriate for the stated security goals. Smart contract audits cover logic correctness, reentrancy, economic attack vectors, and gas efficiency.

We do not issue certification stamps. We produce technical findings that a development team can verify, reproduce, and act on.

Typical deliverables
Cryptographic implementation audit with finding severity and reproduction detail
Protocol security assessment against stated threat model
Smart contract review covering logic, attack vectors, and gas efficiency
Written findings report suitable for engineering team and legal review
Engagement termshow we work with clients
Structure
Project-based. Defined scope, fixed deliverables. No open-ended retainers.
Capacity
Limited engagements per year. We do not overcommit.
NDA & confidentiality
Standard mutual NDA executed before any technical disclosure.
To enquire
research@almeidaindustries.com — describe the system and the problem.