Anabel Ton
Examiner (ID: 8080, Phone: (571)272-2382 , Office: P/2875 )
Most Active Art Unit | 2875 |
Art Unit(s) | 2875 |
Total Applications | 2154 |
Issued Applications | 1750 |
Pending Applications | 76 |
Abandoned Applications | 327 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 15871259
[patent_doc_number] => 20200143033
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => Enforcing Trusted Application Settings for Shared Code Libraries
[patent_app_type] => utility
[patent_app_number] => 16/735700
[patent_app_country] => US
[patent_app_date] => 2020-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5143
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16735700
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/735700 | Enforcing trusted application settings for shared code libraries | Jan 6, 2020 | Issued |
Array
(
[id] => 18136028
[patent_doc_number] => 11561704
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-24
[patent_title] => Artificial intelligence (AI) assisted anomaly detection of intrusion in storage systems
[patent_app_type] => utility
[patent_app_number] => 16/729133
[patent_app_country] => US
[patent_app_date] => 2019-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6474
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16729133
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/729133 | Artificial intelligence (AI) assisted anomaly detection of intrusion in storage systems | Dec 26, 2019 | Issued |
Array
(
[id] => 17817530
[patent_doc_number] => 11423145
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => Methods and arrangements for multi-layer in-vehicle network intrusion detection and characterization
[patent_app_type] => utility
[patent_app_number] => 16/727565
[patent_app_country] => US
[patent_app_date] => 2019-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 22
[patent_no_of_words] => 21763
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16727565
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/727565 | Methods and arrangements for multi-layer in-vehicle network intrusion detection and characterization | Dec 25, 2019 | Issued |
Array
(
[id] => 15876015
[patent_doc_number] => 20200145411
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => BIOMETRIC CLOUD AUTHENTICATION GATEWAY DATABASE SYSTEM AND METHOD OF USE
[patent_app_type] => utility
[patent_app_number] => 16/725401
[patent_app_country] => US
[patent_app_date] => 2019-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10589
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16725401
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/725401 | Biometric cloud authentication gateway database system and method of use | Dec 22, 2019 | Issued |
Array
(
[id] => 16903481
[patent_doc_number] => 20210182397
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-17
[patent_title] => Ransomware Detection and Mitigation
[patent_app_type] => utility
[patent_app_number] => 16/711819
[patent_app_country] => US
[patent_app_date] => 2019-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16097
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16711819
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/711819 | Ransomware detection and mitigation | Dec 11, 2019 | Issued |
Array
(
[id] => 17942699
[patent_doc_number] => 11477171
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-18
[patent_title] => Client authentication management based upon modeling
[patent_app_type] => utility
[patent_app_number] => 16/699112
[patent_app_country] => US
[patent_app_date] => 2019-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12524
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16699112
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/699112 | Client authentication management based upon modeling | Nov 28, 2019 | Issued |
Array
(
[id] => 15941759
[patent_doc_number] => 20200162513
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-21
[patent_title] => CONNECTING A CLOUD NETWORK TO THE INTERNET
[patent_app_type] => utility
[patent_app_number] => 16/688846
[patent_app_country] => US
[patent_app_date] => 2019-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21084
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -39
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16688846
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/688846 | Connecting a cloud network to the internet | Nov 18, 2019 | Issued |
Array
(
[id] => 15445127
[patent_doc_number] => 20200036747
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => KEY THROTTLING TO MITIGATE UNAUTHORIZED FILE ACCESS
[patent_app_type] => utility
[patent_app_number] => 16/589489
[patent_app_country] => US
[patent_app_date] => 2019-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 39402
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16589489
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/589489 | Key throttling to mitigate unauthorized file access | Sep 30, 2019 | Issued |
Array
(
[id] => 15371625
[patent_doc_number] => 20200021577
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-16
[patent_title] => CONTAINER INDEPENDENT SECURE FILE SYSTEM FOR SECURITY APPLICATION CONTAINERS
[patent_app_type] => utility
[patent_app_number] => 16/583321
[patent_app_country] => US
[patent_app_date] => 2019-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4785
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16583321
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/583321 | Container independent secure file system for security application containers | Sep 25, 2019 | Issued |
Array
(
[id] => 15353591
[patent_doc_number] => 20200014687
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-09
[patent_title] => IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALS
[patent_app_type] => utility
[patent_app_number] => 16/576006
[patent_app_country] => US
[patent_app_date] => 2019-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8874
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16576006
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/576006 | Identifying accounts having shared credentials | Sep 18, 2019 | Issued |
Array
(
[id] => 17788802
[patent_doc_number] => 11411948
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Systems and methods for applying attestation tokens to LISP messages
[patent_app_type] => utility
[patent_app_number] => 16/574771
[patent_app_country] => US
[patent_app_date] => 2019-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 12423
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16574771
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/574771 | Systems and methods for applying attestation tokens to LISP messages | Sep 17, 2019 | Issued |
Array
(
[id] => 16003493
[patent_doc_number] => 20200177617
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMS
[patent_app_type] => utility
[patent_app_number] => 16/554833
[patent_app_country] => US
[patent_app_date] => 2019-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12633
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16554833
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/554833 | Generating attack graphs in agile security platforms | Aug 28, 2019 | Issued |
Array
(
[id] => 18155075
[patent_doc_number] => 11568055
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-31
[patent_title] => System and method for automatically detecting a security vulnerability in a source code using a machine learning model
[patent_app_type] => utility
[patent_app_number] => 16/549019
[patent_app_country] => US
[patent_app_date] => 2019-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7010
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16549019
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/549019 | System and method for automatically detecting a security vulnerability in a source code using a machine learning model | Aug 22, 2019 | Issued |
Array
(
[id] => 18155094
[patent_doc_number] => 11568074
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-31
[patent_title] => Memory system
[patent_app_type] => utility
[patent_app_number] => 16/549506
[patent_app_country] => US
[patent_app_date] => 2019-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 18
[patent_no_of_words] => 12780
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16549506
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/549506 | Memory system | Aug 22, 2019 | Issued |
Array
(
[id] => 16661764
[patent_doc_number] => 20210058401
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-25
[patent_title] => METHODS AND APPARATUS TO DECONFLICT MALWARE OR CONTENT REMEDIATION
[patent_app_type] => utility
[patent_app_number] => 16/547250
[patent_app_country] => US
[patent_app_date] => 2019-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16471
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16547250
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/547250 | Methods and apparatus to deconflict malware or content remediation | Aug 20, 2019 | Issued |
Array
(
[id] => 18132205
[patent_doc_number] => 11558425
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Dynamic access controls using verifiable claims
[patent_app_type] => utility
[patent_app_number] => 16/527425
[patent_app_country] => US
[patent_app_date] => 2019-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4783
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16527425
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/527425 | Dynamic access controls using verifiable claims | Jul 30, 2019 | Issued |
Array
(
[id] => 15047891
[patent_doc_number] => 20190334950
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-31
[patent_title] => PRIVATE KEY OPERATIONS
[patent_app_type] => utility
[patent_app_number] => 16/506046
[patent_app_country] => US
[patent_app_date] => 2019-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17650
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16506046
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/506046 | PRIVATE KEY OPERATIONS | Jul 8, 2019 | Abandoned |
Array
(
[id] => 17425336
[patent_doc_number] => 11258806
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-02-22
[patent_title] => System and method for automatically associating cybersecurity intelligence to cyberthreat actors
[patent_app_type] => utility
[patent_app_number] => 16/450579
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9720
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450579
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450579 | System and method for automatically associating cybersecurity intelligence to cyberthreat actors | Jun 23, 2019 | Issued |
Array
(
[id] => 16411119
[patent_doc_number] => 10819693
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-27
[patent_title] => Disposable browsers and authentication techniques for a secure online user environment
[patent_app_type] => utility
[patent_app_number] => 16/450866
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11535
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450866
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450866 | Disposable browsers and authentication techniques for a secure online user environment | Jun 23, 2019 | Issued |
Array
(
[id] => 15258267
[patent_doc_number] => 20190377867
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => THREAT MITIGATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 16/433032
[patent_app_country] => US
[patent_app_date] => 2019-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21240
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16433032
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/433032 | Threat mitigation system and method | Jun 5, 2019 | Issued |