Search

Fatoumata Traore

Examiner (ID: 8560, Phone: (571)270-1685 , Office: P/2436 )

Most Active Art Unit
2436
Art Unit(s)
2436, 2136
Total Applications
761
Issued Applications
599
Pending Applications
35
Abandoned Applications
143

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 17637142 [patent_doc_number] => 11347866 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-05-31 [patent_title] => Cybersecurity assessment and risk management tool [patent_app_type] => utility [patent_app_number] => 16/780672 [patent_app_country] => US [patent_app_date] => 2020-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 8271 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 220 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16780672 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/780672
Cybersecurity assessment and risk management tool Feb 2, 2020 Issued
Array ( [id] => 18358625 [patent_doc_number] => 11647037 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-05-09 [patent_title] => Penetration tests of systems under test [patent_app_type] => utility [patent_app_number] => 16/776881 [patent_app_country] => US [patent_app_date] => 2020-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 5624 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 220 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16776881 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/776881
Penetration tests of systems under test Jan 29, 2020 Issued
Array ( [id] => 17225611 [patent_doc_number] => 11178128 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-11-16 [patent_title] => Integrating sensitive data from a data provider into instances of third-party applications executed on user devices [patent_app_type] => utility [patent_app_number] => 16/750682 [patent_app_country] => US [patent_app_date] => 2020-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 11 [patent_no_of_words] => 11560 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 214 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16750682 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/750682
Integrating sensitive data from a data provider into instances of third-party applications executed on user devices Jan 22, 2020 Issued
Array ( [id] => 19680460 [patent_doc_number] => 12192339 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-01-07 [patent_title] => Secure computation apparatus, secure computation method, and program [patent_app_type] => utility [patent_app_number] => 17/792147 [patent_app_country] => US [patent_app_date] => 2020-01-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4569 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 206 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17792147 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/792147
Secure computation apparatus, secure computation method, and program Jan 19, 2020 Issued
Array ( [id] => 15875659 [patent_doc_number] => 20200145233 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-05-07 [patent_title] => SYSTEM AND METHOD FOR IMPLEMENTING BLOCKCHAIN-BASED DIGITAL CERTIFICATES [patent_app_type] => utility [patent_app_number] => 16/738195 [patent_app_country] => US [patent_app_date] => 2020-01-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11488 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16738195 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/738195
System and method for implementing blockchain-based digital certificates Jan 8, 2020 Issued
Array ( [id] => 18529324 [patent_doc_number] => 11716335 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-08-01 [patent_title] => Detection and restriction of unwanted messages through time interval cluster analysis [patent_app_type] => utility [patent_app_number] => 16/733306 [patent_app_country] => US [patent_app_date] => 2020-01-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 5464 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16733306 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/733306
Detection and restriction of unwanted messages through time interval cluster analysis Jan 2, 2020 Issued
Array ( [id] => 17894048 [patent_doc_number] => 11457043 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-09-27 [patent_title] => Enforcing micro-segmentation policies for physical and virtual application components in data centers [patent_app_type] => utility [patent_app_number] => 16/731167 [patent_app_country] => US [patent_app_date] => 2019-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9624 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 328 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16731167 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/731167
Enforcing micro-segmentation policies for physical and virtual application components in data centers Dec 30, 2019 Issued
Array ( [id] => 15843587 [patent_doc_number] => 20200137076 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-04-30 [patent_title] => STOLEN CREDENTIAL USE PREVENTION ON A WEB SERVICE [patent_app_type] => utility [patent_app_number] => 16/730364 [patent_app_country] => US [patent_app_date] => 2019-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5738 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16730364 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/730364
STOLEN CREDENTIAL USE PREVENTION ON A WEB SERVICE Dec 29, 2019 Abandoned
Array ( [id] => 17970347 [patent_doc_number] => 11487882 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-11-01 [patent_title] => Vulnerability influence evaluation system [patent_app_type] => utility [patent_app_number] => 16/722383 [patent_app_country] => US [patent_app_date] => 2019-12-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 20 [patent_no_of_words] => 8136 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 238 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16722383 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/722383
Vulnerability influence evaluation system Dec 19, 2019 Issued
Array ( [id] => 16501675 [patent_doc_number] => 10867063 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-12-15 [patent_title] => Dynamic shared data object masking [patent_app_type] => utility [patent_app_number] => 16/698142 [patent_app_country] => US [patent_app_date] => 2019-11-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 15091 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 264 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16698142 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/698142
Dynamic shared data object masking Nov 26, 2019 Issued
Array ( [id] => 16974586 [patent_doc_number] => 11070573 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-07-20 [patent_title] => Process tree and tags [patent_app_type] => utility [patent_app_number] => 16/698918 [patent_app_country] => US [patent_app_date] => 2019-11-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 38 [patent_figures_cnt] => 41 [patent_no_of_words] => 25750 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16698918 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/698918
Process tree and tags Nov 26, 2019 Issued
Array ( [id] => 16782930 [patent_doc_number] => 20210120009 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-04-22 [patent_title] => SYSTEM AND METHOD FOR VERIFYING DEVICE SECURITY [patent_app_type] => utility [patent_app_number] => 16/690864 [patent_app_country] => US [patent_app_date] => 2019-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8782 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 50 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16690864 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/690864
System and method for verifying device security Nov 20, 2019 Issued
Array ( [id] => 17449501 [patent_doc_number] => 20220070006 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-03 [patent_title] => METHODS, DEVICES AND SYSTEM FOR THE SECURITY-PROTECTED PROVISION OF SETS OF DATA [patent_app_type] => utility [patent_app_number] => 17/423221 [patent_app_country] => US [patent_app_date] => 2019-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 34621 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 71 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17423221 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/423221
Methods, devices and system for the security-protected provision of sets of data Nov 17, 2019 Issued
Array ( [id] => 16849289 [patent_doc_number] => 20210150034 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-05-20 [patent_title] => COMPUTER SYSTEM VULNERABILITY LOCKDOWN MODE [patent_app_type] => utility [patent_app_number] => 16/686482 [patent_app_country] => US [patent_app_date] => 2019-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5989 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 91 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16686482 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/686482
Computer system vulnerability lockdown mode Nov 17, 2019 Issued
Array ( [id] => 16454917 [patent_doc_number] => 20200364343 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-11-19 [patent_title] => SYSTEMS AND METHODS FOR AUTOMATED SYSTEM REQUIREMENT ANALYSIS [patent_app_type] => utility [patent_app_number] => 16/683185 [patent_app_country] => US [patent_app_date] => 2019-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13871 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16683185 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/683185
Systems and methods for automated system requirement analysis Nov 12, 2019 Issued
Array ( [id] => 15567073 [patent_doc_number] => 20200067948 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-02-27 [patent_title] => FEATURE ENGINEERING FOR WEB-BASED ANOMALY DETECTION [patent_app_type] => utility [patent_app_number] => 16/666092 [patent_app_country] => US [patent_app_date] => 2019-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 41395 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16666092 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/666092
FEATURE ENGINEERING FOR WEB-BASED ANOMALY DETECTION Oct 27, 2019 Abandoned
Array ( [id] => 18520050 [patent_doc_number] => 11709942 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-07-25 [patent_title] => Generating protection barrier instructions for executable code [patent_app_type] => utility [patent_app_number] => 16/601688 [patent_app_country] => US [patent_app_date] => 2019-10-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6001 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 156 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16601688 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/601688
Generating protection barrier instructions for executable code Oct 14, 2019 Issued
Array ( [id] => 16764462 [patent_doc_number] => 20210110044 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-04-15 [patent_title] => Self-Targeting Method of Automated Cybersecurity Analysis on an Operating System [patent_app_type] => utility [patent_app_number] => 16/597227 [patent_app_country] => US [patent_app_date] => 2019-10-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2737 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16597227 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/597227
Self-targeting method of automated cybersecurity analysis on an operating system Oct 8, 2019 Issued
Array ( [id] => 15505569 [patent_doc_number] => 20200052973 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-02-13 [patent_title] => Cybersecurity Incident Response and Security Operation System Employing Playbook Generation Through Custom Machine Learning [patent_app_type] => utility [patent_app_number] => 16/594538 [patent_app_country] => US [patent_app_date] => 2019-10-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6465 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 243 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16594538 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/594538
Cybersecurity incident response and security operation system employing playbook generation through custom machine learning Oct 6, 2019 Issued
Array ( [id] => 19942270 [patent_doc_number] => 12314399 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-05-27 [patent_title] => Security risk analysis assistance device, method, and computer-readable medium [patent_app_type] => utility [patent_app_number] => 17/762491 [patent_app_country] => US [patent_app_date] => 2019-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 14 [patent_no_of_words] => 4626 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 315 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17762491 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/762491
Security risk analysis assistance device, method, and computer-readable medium Sep 26, 2019 Issued
Menu