Search

Deborah C. Lambkin

Examiner (ID: 14966)

Most Active Art Unit
1626
Art Unit(s)
1209, 1616, 1626, 1625, 1613
Total Applications
1483
Issued Applications
1141
Pending Applications
140
Abandoned Applications
202

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20447241 [patent_doc_number] => 20260003963 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-01 [patent_title] => SYSTEM AND METHOD FOR ADAPTIVE DETECTION ENGINE CONFIGURATION BASED ON ENVIRONMENTAL SECURITY RANKING [patent_app_type] => utility [patent_app_number] => 18/758283 [patent_app_country] => US [patent_app_date] => 2024-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7792 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 327 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18758283 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/758283
SYSTEM AND METHOD FOR ADAPTIVE DETECTION ENGINE CONFIGURATION BASED ON ENVIRONMENTAL SECURITY RANKING Jun 27, 2024 Pending
Array ( [id] => 20409054 [patent_doc_number] => 20250378163 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-12-11 [patent_title] => CLUSTERED CONTINUOUS DATA CONTENT INTEGRITY COMPROMISE DETECTION [patent_app_type] => utility [patent_app_number] => 18/735997 [patent_app_country] => US [patent_app_date] => 2024-06-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3495 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18735997 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/735997
CLUSTERED CONTINUOUS DATA CONTENT INTEGRITY COMPROMISE DETECTION Jun 5, 2024 Pending
Array ( [id] => 19454434 [patent_doc_number] => 20240314564 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-09-19 [patent_title] => REMOTE TRIGGERING OF EVENTS BY PERSONAL DEVICES [patent_app_type] => utility [patent_app_number] => 18/676775 [patent_app_country] => US [patent_app_date] => 2024-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8167 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18676775 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/676775
REMOTE TRIGGERING OF EVENTS BY PERSONAL DEVICES May 28, 2024 Pending
Array ( [id] => 19453980 [patent_doc_number] => 20240314110 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-09-19 [patent_title] => SIGNCRYPTED ENVELOPE MESSAGE [patent_app_type] => utility [patent_app_number] => 18/670919 [patent_app_country] => US [patent_app_date] => 2024-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10825 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18670919 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/670919
SIGNCRYPTED ENVELOPE MESSAGE May 21, 2024 Abandoned
Array ( [id] => 19405939 [patent_doc_number] => 20240289450 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-29 [patent_title] => AUTOMATED THREAT MODELING USING APPLICATION RELATIONSHIPS [patent_app_type] => utility [patent_app_number] => 18/656520 [patent_app_country] => US [patent_app_date] => 2024-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9263 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18656520 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/656520
AUTOMATED THREAT MODELING USING APPLICATION RELATIONSHIPS May 5, 2024 Pending
Array ( [id] => 19350847 [patent_doc_number] => 20240259811 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-01 [patent_title] => DEVICE IDENTIFIER COUNTERFEITING PREVENTION METHOD AND APPARATUS, AND ELECTRONIC DEVICE [patent_app_type] => utility [patent_app_number] => 18/635634 [patent_app_country] => US [patent_app_date] => 2024-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6869 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 98 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18635634 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/635634
DEVICE IDENTIFIER COUNTERFEITING PREVENTION METHOD AND APPARATUS, AND ELECTRONIC DEVICE Apr 14, 2024 Pending
Array ( [id] => 20483371 [patent_doc_number] => 12531848 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2026-01-20 [patent_title] => Systems and methods for managing device association [patent_app_type] => utility [patent_app_number] => 18/623916 [patent_app_country] => US [patent_app_date] => 2024-04-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 15883 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18623916 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/623916
Systems and methods for managing device association Mar 31, 2024 Issued
Array ( [id] => 20234609 [patent_doc_number] => 20250291928 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-09-18 [patent_title] => THREAT MODELING AT SCALE [patent_app_type] => utility [patent_app_number] => 18/604008 [patent_app_country] => US [patent_app_date] => 2024-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2057 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 147 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18604008 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/604008
THREAT MODELING AT SCALE Mar 12, 2024 Pending
Array ( [id] => 20195699 [patent_doc_number] => 20250272409 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-08-28 [patent_title] => Container Image Vulnerability Scanning Based on Vulnerability Signatures [patent_app_type] => utility [patent_app_number] => 18/588673 [patent_app_country] => US [patent_app_date] => 2024-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9517 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18588673 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/588673
Container Image Vulnerability Scanning Based on Vulnerability Signatures Feb 26, 2024 Pending
Array ( [id] => 20152383 [patent_doc_number] => 20250252221 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-08-07 [patent_title] => POLICY-DRIVEN KERNEL EXTENSION SECURITY [patent_app_type] => utility [patent_app_number] => 18/434628 [patent_app_country] => US [patent_app_date] => 2024-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2532 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18434628 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/434628
POLICY-DRIVEN KERNEL EXTENSION SECURITY Feb 5, 2024 Pending
Array ( [id] => 19365185 [patent_doc_number] => 20240267219 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-08 [patent_title] => TRUSTED COMPUTE ENVIRONMENT USING A SECURE ELEMENT AND DEVICE IDENTITY COMPOSITION ENGINE (DICE) [patent_app_type] => utility [patent_app_number] => 18/431653 [patent_app_country] => US [patent_app_date] => 2024-02-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7604 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 52 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18431653 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/431653
TRUSTED COMPUTE ENVIRONMENT USING A SECURE ELEMENT AND DEVICE IDENTITY COMPOSITION ENGINE (DICE) Feb 1, 2024 Pending
Array ( [id] => 19365199 [patent_doc_number] => 20240267233 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-08 [patent_title] => TRUSTED NETWORK TO PREVENT REPLACEMENT AND CLONING ATTACKS [patent_app_type] => utility [patent_app_number] => 18/431415 [patent_app_country] => US [patent_app_date] => 2024-02-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9413 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 56 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18431415 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/431415
TRUSTED NETWORK TO PREVENT REPLACEMENT AND CLONING ATTACKS Feb 1, 2024 Pending
Array ( [id] => 19482420 [patent_doc_number] => 20240330462 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-03 [patent_title] => STORAGE DEVICE PERFORMING DATA RECOVERY IN MULTI-TENANCY ENVIRONMENT AND OPERATION METHOD THEREOF [patent_app_type] => utility [patent_app_number] => 18/429852 [patent_app_country] => US [patent_app_date] => 2024-02-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18531 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18429852 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/429852
STORAGE DEVICE PERFORMING DATA RECOVERY IN MULTI-TENANCY ENVIRONMENT AND OPERATION METHOD THEREOF Jan 31, 2024 Pending
Array ( [id] => 19635746 [patent_doc_number] => 20240414195 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-12 [patent_title] => TOPOLOGICAL CO-RELATION [patent_app_type] => utility [patent_app_number] => 18/429177 [patent_app_country] => US [patent_app_date] => 2024-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15276 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 95 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18429177 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/429177
TOPOLOGICAL CO-RELATION Jan 30, 2024 Pending
Array ( [id] => 19576492 [patent_doc_number] => 20240380784 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-14 [patent_title] => IMPLEMENTING DECOYS IN A NETWORK ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 18/421006 [patent_app_country] => US [patent_app_date] => 2024-01-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18403 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18421006 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/421006
Implementing decoys in a network environment Jan 23, 2024 Issued
Array ( [id] => 19162084 [patent_doc_number] => 20240154791 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-05-09 [patent_title] => ELECTRONIC DEVICE, METHOD OF CONTROLLING ELECTRONIC DEVICE, AND PROGRAM [patent_app_type] => utility [patent_app_number] => 18/416060 [patent_app_country] => US [patent_app_date] => 2024-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11499 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -7 [patent_words_short_claim] => 112 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18416060 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/416060
ELECTRONIC DEVICE, METHOD OF CONTROLLING ELECTRONIC DEVICE, AND PROGRAM Jan 17, 2024 Pending
Array ( [id] => 18925771 [patent_doc_number] => 20240028775 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-01-25 [patent_title] => HARDWARE PROTECTION OF INLINE CRYPTOGRAPHIC PROCESSOR [patent_app_type] => utility [patent_app_number] => 18/480815 [patent_app_country] => US [patent_app_date] => 2023-10-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2515 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18480815 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/480815
Hardware protection of inline cryptographic processor Oct 3, 2023 Issued
Array ( [id] => 18847341 [patent_doc_number] => 20230409745 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-12-21 [patent_title] => BUDGET TRACKING IN A DIFFERENTIALLY PRIVATE DATABASE SYSTEM [patent_app_type] => utility [patent_app_number] => 18/461342 [patent_app_country] => US [patent_app_date] => 2023-09-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 17252 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18461342 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/461342
Budget tracking in a differentially private database system Sep 4, 2023 Issued
Array ( [id] => 19822340 [patent_doc_number] => 20250080547 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-03-06 [patent_title] => Information Security AI-Based Border Endpoint Zero-Day Block [patent_app_type] => utility [patent_app_number] => 18/240099 [patent_app_country] => US [patent_app_date] => 2023-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7253 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 469 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18240099 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/240099
Information Security AI-Based Border Endpoint Zero-Day Block Aug 29, 2023 Pending
Array ( [id] => 19006213 [patent_doc_number] => 20240070284 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-02-29 [patent_title] => SECURE BOOT PROCEDURE [patent_app_type] => utility [patent_app_number] => 18/237247 [patent_app_country] => US [patent_app_date] => 2023-08-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7907 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18237247 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/237247
SECURE BOOT PROCEDURE Aug 22, 2023 Pending
Menu