
Fatoumata Traore
Examiner (ID: 8560, Phone: (571)270-1685 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2136 |
| Total Applications | 761 |
| Issued Applications | 599 |
| Pending Applications | 35 |
| Abandoned Applications | 143 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17637142
[patent_doc_number] => 11347866
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-31
[patent_title] => Cybersecurity assessment and risk management tool
[patent_app_type] => utility
[patent_app_number] => 16/780672
[patent_app_country] => US
[patent_app_date] => 2020-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 8271
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16780672
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/780672 | Cybersecurity assessment and risk management tool | Feb 2, 2020 | Issued |
Array
(
[id] => 18358625
[patent_doc_number] => 11647037
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-05-09
[patent_title] => Penetration tests of systems under test
[patent_app_type] => utility
[patent_app_number] => 16/776881
[patent_app_country] => US
[patent_app_date] => 2020-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5624
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16776881
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/776881 | Penetration tests of systems under test | Jan 29, 2020 | Issued |
Array
(
[id] => 17225611
[patent_doc_number] => 11178128
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-16
[patent_title] => Integrating sensitive data from a data provider into instances of third-party applications executed on user devices
[patent_app_type] => utility
[patent_app_number] => 16/750682
[patent_app_country] => US
[patent_app_date] => 2020-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 11560
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16750682
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/750682 | Integrating sensitive data from a data provider into instances of third-party applications executed on user devices | Jan 22, 2020 | Issued |
Array
(
[id] => 19680460
[patent_doc_number] => 12192339
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-01-07
[patent_title] => Secure computation apparatus, secure computation method, and program
[patent_app_type] => utility
[patent_app_number] => 17/792147
[patent_app_country] => US
[patent_app_date] => 2020-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4569
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17792147
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/792147 | Secure computation apparatus, secure computation method, and program | Jan 19, 2020 | Issued |
Array
(
[id] => 15875659
[patent_doc_number] => 20200145233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => SYSTEM AND METHOD FOR IMPLEMENTING BLOCKCHAIN-BASED DIGITAL CERTIFICATES
[patent_app_type] => utility
[patent_app_number] => 16/738195
[patent_app_country] => US
[patent_app_date] => 2020-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11488
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16738195
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/738195 | System and method for implementing blockchain-based digital certificates | Jan 8, 2020 | Issued |
Array
(
[id] => 18529324
[patent_doc_number] => 11716335
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-01
[patent_title] => Detection and restriction of unwanted messages through time interval cluster analysis
[patent_app_type] => utility
[patent_app_number] => 16/733306
[patent_app_country] => US
[patent_app_date] => 2020-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 5464
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16733306
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/733306 | Detection and restriction of unwanted messages through time interval cluster analysis | Jan 2, 2020 | Issued |
Array
(
[id] => 17894048
[patent_doc_number] => 11457043
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-27
[patent_title] => Enforcing micro-segmentation policies for physical and virtual application components in data centers
[patent_app_type] => utility
[patent_app_number] => 16/731167
[patent_app_country] => US
[patent_app_date] => 2019-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9624
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 328
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16731167
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/731167 | Enforcing micro-segmentation policies for physical and virtual application components in data centers | Dec 30, 2019 | Issued |
Array
(
[id] => 15843587
[patent_doc_number] => 20200137076
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => STOLEN CREDENTIAL USE PREVENTION ON A WEB SERVICE
[patent_app_type] => utility
[patent_app_number] => 16/730364
[patent_app_country] => US
[patent_app_date] => 2019-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5738
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16730364
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/730364 | STOLEN CREDENTIAL USE PREVENTION ON A WEB SERVICE | Dec 29, 2019 | Abandoned |
Array
(
[id] => 17970347
[patent_doc_number] => 11487882
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-01
[patent_title] => Vulnerability influence evaluation system
[patent_app_type] => utility
[patent_app_number] => 16/722383
[patent_app_country] => US
[patent_app_date] => 2019-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 20
[patent_no_of_words] => 8136
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16722383
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/722383 | Vulnerability influence evaluation system | Dec 19, 2019 | Issued |
Array
(
[id] => 16501675
[patent_doc_number] => 10867063
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-15
[patent_title] => Dynamic shared data object masking
[patent_app_type] => utility
[patent_app_number] => 16/698142
[patent_app_country] => US
[patent_app_date] => 2019-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 15091
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16698142
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/698142 | Dynamic shared data object masking | Nov 26, 2019 | Issued |
Array
(
[id] => 16974586
[patent_doc_number] => 11070573
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-07-20
[patent_title] => Process tree and tags
[patent_app_type] => utility
[patent_app_number] => 16/698918
[patent_app_country] => US
[patent_app_date] => 2019-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 41
[patent_no_of_words] => 25750
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16698918
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/698918 | Process tree and tags | Nov 26, 2019 | Issued |
Array
(
[id] => 16782930
[patent_doc_number] => 20210120009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-22
[patent_title] => SYSTEM AND METHOD FOR VERIFYING DEVICE SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/690864
[patent_app_country] => US
[patent_app_date] => 2019-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8782
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 50
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16690864
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/690864 | System and method for verifying device security | Nov 20, 2019 | Issued |
Array
(
[id] => 17449501
[patent_doc_number] => 20220070006
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-03
[patent_title] => METHODS, DEVICES AND SYSTEM FOR THE SECURITY-PROTECTED PROVISION OF SETS OF DATA
[patent_app_type] => utility
[patent_app_number] => 17/423221
[patent_app_country] => US
[patent_app_date] => 2019-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 34621
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17423221
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/423221 | Methods, devices and system for the security-protected provision of sets of data | Nov 17, 2019 | Issued |
Array
(
[id] => 16849289
[patent_doc_number] => 20210150034
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-20
[patent_title] => COMPUTER SYSTEM VULNERABILITY LOCKDOWN MODE
[patent_app_type] => utility
[patent_app_number] => 16/686482
[patent_app_country] => US
[patent_app_date] => 2019-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5989
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16686482
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/686482 | Computer system vulnerability lockdown mode | Nov 17, 2019 | Issued |
Array
(
[id] => 16454917
[patent_doc_number] => 20200364343
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => SYSTEMS AND METHODS FOR AUTOMATED SYSTEM REQUIREMENT ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 16/683185
[patent_app_country] => US
[patent_app_date] => 2019-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13871
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16683185
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/683185 | Systems and methods for automated system requirement analysis | Nov 12, 2019 | Issued |
Array
(
[id] => 15567073
[patent_doc_number] => 20200067948
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-27
[patent_title] => FEATURE ENGINEERING FOR WEB-BASED ANOMALY DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/666092
[patent_app_country] => US
[patent_app_date] => 2019-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 41395
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16666092
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/666092 | FEATURE ENGINEERING FOR WEB-BASED ANOMALY DETECTION | Oct 27, 2019 | Abandoned |
Array
(
[id] => 18520050
[patent_doc_number] => 11709942
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-25
[patent_title] => Generating protection barrier instructions for executable code
[patent_app_type] => utility
[patent_app_number] => 16/601688
[patent_app_country] => US
[patent_app_date] => 2019-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6001
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16601688
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/601688 | Generating protection barrier instructions for executable code | Oct 14, 2019 | Issued |
Array
(
[id] => 16764462
[patent_doc_number] => 20210110044
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-15
[patent_title] => Self-Targeting Method of Automated Cybersecurity Analysis on an Operating System
[patent_app_type] => utility
[patent_app_number] => 16/597227
[patent_app_country] => US
[patent_app_date] => 2019-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2737
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16597227
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/597227 | Self-targeting method of automated cybersecurity analysis on an operating system | Oct 8, 2019 | Issued |
Array
(
[id] => 15505569
[patent_doc_number] => 20200052973
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => Cybersecurity Incident Response and Security Operation System Employing Playbook Generation Through Custom Machine Learning
[patent_app_type] => utility
[patent_app_number] => 16/594538
[patent_app_country] => US
[patent_app_date] => 2019-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6465
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16594538
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/594538 | Cybersecurity incident response and security operation system employing playbook generation through custom machine learning | Oct 6, 2019 | Issued |
Array
(
[id] => 19942270
[patent_doc_number] => 12314399
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-27
[patent_title] => Security risk analysis assistance device, method, and computer-readable medium
[patent_app_type] => utility
[patent_app_number] => 17/762491
[patent_app_country] => US
[patent_app_date] => 2019-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 4626
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 315
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17762491
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/762491 | Security risk analysis assistance device, method, and computer-readable medium | Sep 26, 2019 | Issued |