Search

Fred H. Hu

Examiner (ID: 13208, Phone: (571)270-7689 , Office: P/2666 )

Most Active Art Unit
2666
Art Unit(s)
2666, 2667, 2624, 2663
Total Applications
316
Issued Applications
207
Pending Applications
0
Abandoned Applications
115

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20449343 [patent_doc_number] => 20260006069 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-01 [patent_title] => System And Methods Of Defense Against DDoS Attacks For Applications On A Multi-Substrate Multi-Ingress Shared Infrastructure With Multiple Cloud Architectures [patent_app_type] => utility [patent_app_number] => 18/896115 [patent_app_country] => US [patent_app_date] => 2024-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14834 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18896115 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/896115
System And Methods Of Defense Against DDoS Attacks For Applications On A Multi-Substrate Multi-Ingress Shared Infrastructure With Multiple Cloud Architectures Sep 24, 2024 Pending
Array ( [id] => 20064663 [patent_doc_number] => 20250202885 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-19 [patent_title] => NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS [patent_app_type] => utility [patent_app_number] => 18/816055 [patent_app_country] => US [patent_app_date] => 2024-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1162 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -11 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18816055 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/816055
NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS Aug 26, 2024 Pending
Array ( [id] => 20064663 [patent_doc_number] => 20250202885 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-19 [patent_title] => NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS [patent_app_type] => utility [patent_app_number] => 18/816055 [patent_app_country] => US [patent_app_date] => 2024-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1162 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -11 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18816055 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/816055
NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS Aug 26, 2024 Pending
Array ( [id] => 19819444 [patent_doc_number] => 20250077651 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-03-06 [patent_title] => ABNORMALITY MONITORING DEVICE, CENTER DEVICE, ABNORMALITY MONITORING METHOD, AND ABNORMALITY MONITORING PROGRAM [patent_app_type] => utility [patent_app_number] => 18/805604 [patent_app_country] => US [patent_app_date] => 2024-08-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10018 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 91 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18805604 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/805604
ABNORMALITY MONITORING DEVICE, CENTER DEVICE, ABNORMALITY MONITORING METHOD, AND ABNORMALITY MONITORING PROGRAM Aug 14, 2024 Pending
Array ( [id] => 19606052 [patent_doc_number] => 20240396932 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => METHOD AND SYSTEM FOR GENERATING APPLICATION-LAYER SIGNATURES CHARACTERIZING ADVANCED APPLICATION-LAYER ATTACKS [patent_app_type] => utility [patent_app_number] => 18/794606 [patent_app_country] => US [patent_app_date] => 2024-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15807 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -39 [patent_words_short_claim] => 115 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18794606 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/794606
METHOD AND SYSTEM FOR GENERATING APPLICATION-LAYER SIGNATURES CHARACTERIZING ADVANCED APPLICATION-LAYER ATTACKS Aug 4, 2024 Pending
Array ( [id] => 19606052 [patent_doc_number] => 20240396932 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => METHOD AND SYSTEM FOR GENERATING APPLICATION-LAYER SIGNATURES CHARACTERIZING ADVANCED APPLICATION-LAYER ATTACKS [patent_app_type] => utility [patent_app_number] => 18/794606 [patent_app_country] => US [patent_app_date] => 2024-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15807 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -39 [patent_words_short_claim] => 115 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18794606 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/794606
METHOD AND SYSTEM FOR GENERATING APPLICATION-LAYER SIGNATURES CHARACTERIZING ADVANCED APPLICATION-LAYER ATTACKS Aug 4, 2024 Pending
Array ( [id] => 19606053 [patent_doc_number] => 20240396933 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => METHOD AND SYSTEM FOR METHOD FOR FINETUNING APPLICATION-LAYER SIGNATURES [patent_app_type] => utility [patent_app_number] => 18/794620 [patent_app_country] => US [patent_app_date] => 2024-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15409 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 76 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18794620 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/794620
METHOD AND SYSTEM FOR METHOD FOR FINETUNING APPLICATION-LAYER SIGNATURES Aug 4, 2024 Pending
Array ( [id] => 19576485 [patent_doc_number] => 20240380777 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-14 [patent_title] => DETERMINING ADDITIONAL SIGNALS FOR DETERMINING CYBERSECURITY RISK [patent_app_type] => utility [patent_app_number] => 18/781751 [patent_app_country] => US [patent_app_date] => 2024-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11780 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18781751 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/781751
DETERMINING ADDITIONAL SIGNALS FOR DETERMINING CYBERSECURITY RISK Jul 22, 2024 Pending
Array ( [id] => 20285112 [patent_doc_number] => 20250310354 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-10-02 [patent_title] => RULES PROCESSING SYSTEM [patent_app_type] => utility [patent_app_number] => 18/763507 [patent_app_country] => US [patent_app_date] => 2024-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14822 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 145 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763507 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/763507
RULES PROCESSING SYSTEM Jul 2, 2024 Pending
Array ( [id] => 19660865 [patent_doc_number] => 20240427930 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-26 [patent_title] => DATA AUGMENTATION FOR THREAT INVESTIGATION IN AN ENTERPRISE NETWORK [patent_app_type] => utility [patent_app_number] => 18/759530 [patent_app_country] => US [patent_app_date] => 2024-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 34115 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18759530 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/759530
Data augmentation for threat investigation in an enterprise network Jun 27, 2024 Issued
Array ( [id] => 19501288 [patent_doc_number] => 20240340306 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-10 [patent_title] => DYNAMIC INTELLIGENT CYBER PLAYBOOKS [patent_app_type] => utility [patent_app_number] => 18/627922 [patent_app_country] => US [patent_app_date] => 2024-04-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6641 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 69 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18627922 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/627922
DYNAMIC INTELLIGENT CYBER PLAYBOOKS Apr 4, 2024 Pending
Array ( [id] => 19336502 [patent_doc_number] => 20240250932 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-07-25 [patent_title] => AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER [patent_app_type] => utility [patent_app_number] => 18/626087 [patent_app_country] => US [patent_app_date] => 2024-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6348 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18626087 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/626087
Automated creation of trusted network perimeter Apr 2, 2024 Issued
Array ( [id] => 19647670 [patent_doc_number] => 20240422190 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-19 [patent_title] => SYSTEM AND METHOD FOR CLASSIFYING OBJECTS TO PREVENT THE SPREAD OF MALICIOUS ACTIVITY [patent_app_type] => utility [patent_app_number] => 18/619396 [patent_app_country] => US [patent_app_date] => 2024-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9091 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18619396 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/619396
SYSTEM AND METHOD FOR CLASSIFYING OBJECTS TO PREVENT THE SPREAD OF MALICIOUS ACTIVITY Mar 27, 2024 Pending
Array ( [id] => 19307552 [patent_doc_number] => 20240236133 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-07-11 [patent_title] => Detecting Data Exfiltration and Compromised User Accounts in a Computing Network [patent_app_type] => utility [patent_app_number] => 18/613728 [patent_app_country] => US [patent_app_date] => 2024-03-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9652 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 121 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18613728 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/613728
Detecting data exfiltration and compromised user accounts in a computing network Mar 21, 2024 Issued
Array ( [id] => 19748159 [patent_doc_number] => 20250036724 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-30 [patent_title] => Authorization of Access Rights Licenses [patent_app_type] => utility [patent_app_number] => 18/591911 [patent_app_country] => US [patent_app_date] => 2024-02-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11583 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18591911 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/591911
Authorization of Access Rights Licenses Feb 28, 2024 Pending
Array ( [id] => 19281049 [patent_doc_number] => 20240217523 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-07-04 [patent_title] => System and Method for Controlling Access Based on Preconditioned Activities [patent_app_type] => utility [patent_app_number] => 18/440636 [patent_app_country] => US [patent_app_date] => 2024-02-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11295 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18440636 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/440636
System and Method for Controlling Access Based on Preconditioned Activities Feb 12, 2024 Abandoned
Array ( [id] => 19454012 [patent_doc_number] => 20240314142 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-09-19 [patent_title] => CYBER SECURITY SYSTEM APPLYING NETWORK SEQUENCE PREDICTION USING TRANSFORMERS [patent_app_type] => utility [patent_app_number] => 18/439524 [patent_app_country] => US [patent_app_date] => 2024-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13892 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 132 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18439524 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/439524
CYBER SECURITY SYSTEM APPLYING NETWORK SEQUENCE PREDICTION USING TRANSFORMERS Feb 11, 2024 Pending
Array ( [id] => 19454012 [patent_doc_number] => 20240314142 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-09-19 [patent_title] => CYBER SECURITY SYSTEM APPLYING NETWORK SEQUENCE PREDICTION USING TRANSFORMERS [patent_app_type] => utility [patent_app_number] => 18/439524 [patent_app_country] => US [patent_app_date] => 2024-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13892 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 132 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18439524 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/439524
CYBER SECURITY SYSTEM APPLYING NETWORK SEQUENCE PREDICTION USING TRANSFORMERS Feb 11, 2024 Pending
Array ( [id] => 20140321 [patent_doc_number] => 20250247365 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-07-31 [patent_title] => IN-LINE NEURAL NETWORK BASED ZERO-DAY INTERNET EXPLOIT DETECTION [patent_app_type] => utility [patent_app_number] => 18/438187 [patent_app_country] => US [patent_app_date] => 2024-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6947 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 46 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18438187 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/438187
IN-LINE NEURAL NETWORK BASED ZERO-DAY INTERNET EXPLOIT DETECTION Feb 8, 2024 Pending
Array ( [id] => 20140321 [patent_doc_number] => 20250247365 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-07-31 [patent_title] => IN-LINE NEURAL NETWORK BASED ZERO-DAY INTERNET EXPLOIT DETECTION [patent_app_type] => utility [patent_app_number] => 18/438187 [patent_app_country] => US [patent_app_date] => 2024-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6947 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 46 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18438187 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/438187
IN-LINE NEURAL NETWORK BASED ZERO-DAY INTERNET EXPLOIT DETECTION Feb 8, 2024 Pending
Menu