
Alvin E. Oberley
Examiner (ID: 12243)
| Most Active Art Unit | 2604 |
| Art Unit(s) | 2126, 2899, 3104, 2606, 2755, 2604, 2151, 2609 |
| Total Applications | 548 |
| Issued Applications | 425 |
| Pending Applications | 3 |
| Abandoned Applications | 120 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18951845
[patent_doc_number] => 11895156
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-06
[patent_title] => Securing network resources from known threats
[patent_app_type] => utility
[patent_app_number] => 17/931595
[patent_app_country] => US
[patent_app_date] => 2022-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13947
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17931595
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/931595 | Securing network resources from known threats | Sep 12, 2022 | Issued |
Array
(
[id] => 18480217
[patent_doc_number] => 11693958
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-07-04
[patent_title] => Processing and storing event data in a knowledge graph format for anomaly detection
[patent_app_type] => utility
[patent_app_number] => 17/940523
[patent_app_country] => US
[patent_app_date] => 2022-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 14
[patent_no_of_words] => 7980
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17940523
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/940523 | Processing and storing event data in a knowledge graph format for anomaly detection | Sep 7, 2022 | Issued |
Array
(
[id] => 18138067
[patent_doc_number] => 11563767
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-01-24
[patent_title] => Automated effective template generation
[patent_app_type] => utility
[patent_app_number] => 17/899316
[patent_app_country] => US
[patent_app_date] => 2022-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 16099
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17899316
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/899316 | Automated effective template generation | Aug 29, 2022 | Issued |
Array
(
[id] => 19293328
[patent_doc_number] => 12032681
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-07-09
[patent_title] => System for cyber-attack simulation using artificial intelligence modeling
[patent_app_type] => utility
[patent_app_number] => 17/896974
[patent_app_country] => US
[patent_app_date] => 2022-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9337
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17896974
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/896974 | System for cyber-attack simulation using artificial intelligence modeling | Aug 25, 2022 | Issued |
Array
(
[id] => 18992201
[patent_doc_number] => 20240064170
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-02-22
[patent_title] => SUSPICIOUS DOMAIN DETECTION FOR THREAT INTELLIGENCE
[patent_app_type] => utility
[patent_app_number] => 17/820388
[patent_app_country] => US
[patent_app_date] => 2022-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11419
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17820388
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/820388 | SUSPICIOUS DOMAIN DETECTION FOR THREAT INTELLIGENCE | Aug 16, 2022 | Pending |
Array
(
[id] => 20112334
[patent_doc_number] => 12363076
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-15
[patent_title] => Network exposure function (NEF) for SUCI-based UE-initiated service authorization
[patent_app_type] => utility
[patent_app_number] => 17/809614
[patent_app_country] => US
[patent_app_date] => 2022-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 2281
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17809614
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/809614 | Network exposure function (NEF) for SUCI-based UE-initiated service authorization | Jun 28, 2022 | Issued |
Array
(
[id] => 18060431
[patent_doc_number] => 20220391517
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-08
[patent_title] => Ephemeral Data Storage
[patent_app_type] => utility
[patent_app_number] => 17/805329
[patent_app_country] => US
[patent_app_date] => 2022-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11046
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17805329
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/805329 | Ephemeral data storage | Jun 2, 2022 | Issued |
Array
(
[id] => 18255442
[patent_doc_number] => 20230082481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-16
[patent_title] => DETECTING PHISHING WEBSITES VIA A MACHINE LEARNING-BASED SYSTEM USING URL FEATURE HASHES, HTML ENCODINGS AND EMBEDDED IMAGES OF CONTENT PAGES
[patent_app_type] => utility
[patent_app_number] => 17/745701
[patent_app_country] => US
[patent_app_date] => 2022-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13703
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17745701
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/745701 | Detecting phishing websites via a machine learning-based system using URL feature hashes, HTML encodings and embedded images of content pages | May 15, 2022 | Issued |
Array
(
[id] => 18767730
[patent_doc_number] => 11818148
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-11-14
[patent_title] => Optimized analysis for detecting harmful content
[patent_app_type] => utility
[patent_app_number] => 17/744712
[patent_app_country] => US
[patent_app_date] => 2022-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12142
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17744712
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/744712 | Optimized analysis for detecting harmful content | May 14, 2022 | Issued |
Array
(
[id] => 18236876
[patent_doc_number] => 11601451
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-03-07
[patent_title] => Optimized analysis for detecting harmful content
[patent_app_type] => utility
[patent_app_number] => 17/744704
[patent_app_country] => US
[patent_app_date] => 2022-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12103
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17744704
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/744704 | Optimized analysis for detecting harmful content | May 14, 2022 | Issued |
Array
(
[id] => 18828320
[patent_doc_number] => 11843618
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-12-12
[patent_title] => Optimized analysis for detecting harmful content
[patent_app_type] => utility
[patent_app_number] => 17/744714
[patent_app_country] => US
[patent_app_date] => 2022-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12141
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17744714
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/744714 | Optimized analysis for detecting harmful content | May 14, 2022 | Issued |
Array
(
[id] => 18730567
[patent_doc_number] => 20230344867
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-10-26
[patent_title] => DETECTING PHISHING PDFS WITH AN IMAGE-BASED DEEP LEARNING APPROACH
[patent_app_type] => utility
[patent_app_number] => 17/734956
[patent_app_country] => US
[patent_app_date] => 2022-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9448
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 55
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17734956
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/734956 | Detecting phishing PDFs with an image-based deep learning approach | May 1, 2022 | Issued |
Array
(
[id] => 19742114
[patent_doc_number] => 12218968
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-02-04
[patent_title] => Methods and techniques for real-time detection of infected IoT devices
[patent_app_type] => utility
[patent_app_number] => 17/717474
[patent_app_country] => US
[patent_app_date] => 2022-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 22221
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17717474
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/717474 | Methods and techniques for real-time detection of infected IoT devices | Apr 10, 2022 | Issued |
Array
(
[id] => 18017370
[patent_doc_number] => 11509689
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-22
[patent_title] => Systems and methods for intelligent phishing threat detection and phishing threat remediation in a cyber security threat detection and mitigation platform
[patent_app_type] => utility
[patent_app_number] => 17/696151
[patent_app_country] => US
[patent_app_date] => 2022-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9665
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 272
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17696151
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/696151 | Systems and methods for intelligent phishing threat detection and phishing threat remediation in a cyber security threat detection and mitigation platform | Mar 15, 2022 | Issued |
Array
(
[id] => 19640116
[patent_doc_number] => 12170735
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-12-17
[patent_title] => Chip device and method for a randomized logic encryption
[patent_app_type] => utility
[patent_app_number] => 17/675480
[patent_app_country] => US
[patent_app_date] => 2022-02-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5336
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17675480
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/675480 | Chip device and method for a randomized logic encryption | Feb 17, 2022 | Issued |
Array
(
[id] => 18572127
[patent_doc_number] => 20230262464
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-08-17
[patent_title] => CLIENT MAC SOURCE ADDRESS RANDOMIZATION BY MESH NODES IN WIRELESS MESH NETWORKS
[patent_app_type] => utility
[patent_app_number] => 17/673464
[patent_app_country] => US
[patent_app_date] => 2022-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10449
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17673464
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/673464 | Client mac source address randomization by mesh nodes in wireless mesh networks | Feb 15, 2022 | Issued |
Array
(
[id] => 18984575
[patent_doc_number] => 11909773
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-20
[patent_title] => Continuous improvement of security detection rules
[patent_app_type] => utility
[patent_app_number] => 17/587303
[patent_app_country] => US
[patent_app_date] => 2022-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 17031
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17587303
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/587303 | Continuous improvement of security detection rules | Jan 27, 2022 | Issued |
Array
(
[id] => 19611553
[patent_doc_number] => 12160442
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-12-03
[patent_title] => Validating network security alerting pipeline using synthetic network security events
[patent_app_type] => utility
[patent_app_number] => 17/587340
[patent_app_country] => US
[patent_app_date] => 2022-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12898
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 359
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17587340
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/587340 | Validating network security alerting pipeline using synthetic network security events | Jan 27, 2022 | Issued |
Array
(
[id] => 19329700
[patent_doc_number] => 12047396
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-07-23
[patent_title] => System and method for monitoring security attack chains
[patent_app_type] => utility
[patent_app_number] => 17/561612
[patent_app_country] => US
[patent_app_date] => 2021-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8801
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17561612
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/561612 | System and method for monitoring security attack chains | Dec 22, 2021 | Issued |
Array
(
[id] => 19811224
[patent_doc_number] => 12242618
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-03-04
[patent_title] => Multi-tenant cryptography implementation compliance
[patent_app_type] => utility
[patent_app_number] => 17/645251
[patent_app_country] => US
[patent_app_date] => 2021-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13942
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17645251
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/645251 | Multi-tenant cryptography implementation compliance | Dec 19, 2021 | Issued |