
Fred H. Hu
Examiner (ID: 13208, Phone: (571)270-7689 , Office: P/2666 )
| Most Active Art Unit | 2666 |
| Art Unit(s) | 2666, 2667, 2624, 2663 |
| Total Applications | 316 |
| Issued Applications | 207 |
| Pending Applications | 0 |
| Abandoned Applications | 115 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20162202
[patent_doc_number] => 12388846
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-12
[patent_title] => Method and system for processing data packages
[patent_app_type] => utility
[patent_app_number] => 18/191614
[patent_app_country] => US
[patent_app_date] => 2023-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 17
[patent_no_of_words] => 9590
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18191614
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/191614 | Method and system for processing data packages | Mar 27, 2023 | Issued |
Array
(
[id] => 18681418
[patent_doc_number] => 20230319087
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-10-05
[patent_title] => SYSTEMS, METHODS, AND DEVICES FOR PREVENTING CREDENTIAL PASSING ATTACKS
[patent_app_type] => utility
[patent_app_number] => 18/182979
[patent_app_country] => US
[patent_app_date] => 2023-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12556
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18182979
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/182979 | Systems, methods, and devices for preventing credential passing attacks | Mar 12, 2023 | Issued |
Array
(
[id] => 19287119
[patent_doc_number] => 20240223599
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-04
[patent_title] => TECHNIQUES FOR GENERATING APPLICATION-LAYER SIGNATURES CHARACTERIZING ADVANCED APPLICATION-LAYER FLOOD ATTACK TOOLS
[patent_app_type] => utility
[patent_app_number] => 18/176667
[patent_app_country] => US
[patent_app_date] => 2023-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10131
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -41
[patent_words_short_claim] => 22
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18176667
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/176667 | TECHNIQUES FOR GENERATING APPLICATION-LAYER SIGNATURES CHARACTERIZING ADVANCED APPLICATION-LAYER FLOOD ATTACK TOOLS | Feb 28, 2023 | Pending |
Array
(
[id] => 19287119
[patent_doc_number] => 20240223599
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-04
[patent_title] => TECHNIQUES FOR GENERATING APPLICATION-LAYER SIGNATURES CHARACTERIZING ADVANCED APPLICATION-LAYER FLOOD ATTACK TOOLS
[patent_app_type] => utility
[patent_app_number] => 18/176667
[patent_app_country] => US
[patent_app_date] => 2023-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10131
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -41
[patent_words_short_claim] => 22
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18176667
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/176667 | TECHNIQUES FOR GENERATING APPLICATION-LAYER SIGNATURES CHARACTERIZING ADVANCED APPLICATION-LAYER FLOOD ATTACK TOOLS | Feb 28, 2023 | Pending |
Array
(
[id] => 19408350
[patent_doc_number] => 20240291861
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-29
[patent_title] => COMPUTER SOFTWARE IMPLEMENTED CYBERSECURITY FOR MATRIX BARCODE INTERACTION WITH SMART DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/114577
[patent_app_country] => US
[patent_app_date] => 2023-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8999
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18114577
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/114577 | Computer software implemented cybersecurity for matrix barcode interaction with smart device | Feb 26, 2023 | Issued |
Array
(
[id] => 19408350
[patent_doc_number] => 20240291861
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-29
[patent_title] => COMPUTER SOFTWARE IMPLEMENTED CYBERSECURITY FOR MATRIX BARCODE INTERACTION WITH SMART DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/114577
[patent_app_country] => US
[patent_app_date] => 2023-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8999
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18114577
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/114577 | Computer software implemented cybersecurity for matrix barcode interaction with smart device | Feb 26, 2023 | Issued |
Array
(
[id] => 19190156
[patent_doc_number] => 20240169069
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-23
[patent_title] => METHOD AND SYSTEM FOR IDENTIFYING AN OPTIMIZED SET OF CODE COMMITS TO PERFORM VULNERABILITY REMEDIATION
[patent_app_type] => utility
[patent_app_number] => 18/157849
[patent_app_country] => US
[patent_app_date] => 2023-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9511
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18157849
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/157849 | Method and system for identifying an optimized set of code commits to perform vulnerability remediation | Jan 22, 2023 | Issued |
Array
(
[id] => 18395931
[patent_doc_number] => 20230164152
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-05-25
[patent_title] => MALICIOUS INCIDENT VISUALIZATION
[patent_app_type] => utility
[patent_app_number] => 18/094580
[patent_app_country] => US
[patent_app_date] => 2023-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13137
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18094580
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/094580 | Malicious incident visualization | Jan 8, 2023 | Issued |
Array
(
[id] => 19287115
[patent_doc_number] => 20240223595
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-04
[patent_title] => SYSTEM AND METHOD FOR DETECTING AND COUNTERING MALICIOUS CODE
[patent_app_type] => utility
[patent_app_number] => 18/149193
[patent_app_country] => US
[patent_app_date] => 2023-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16086
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18149193
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/149193 | System and method for detecting and countering malicious code | Jan 2, 2023 | Issued |
Array
(
[id] => 18767702
[patent_doc_number] => 11818120
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-11-14
[patent_title] => Non-custodial tool for building decentralized computer applications
[patent_app_type] => utility
[patent_app_number] => 18/148934
[patent_app_country] => US
[patent_app_date] => 2022-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 5974
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18148934
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/148934 | Non-custodial tool for building decentralized computer applications | Dec 29, 2022 | Issued |
Array
(
[id] => 18925737
[patent_doc_number] => 20240028741
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-25
[patent_title] => CONTROL FLOW INTEGRITY MONITORING BASED INSIGHTS
[patent_app_type] => utility
[patent_app_number] => 18/084007
[patent_app_country] => US
[patent_app_date] => 2022-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 27197
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18084007
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/084007 | CONTROL FLOW INTEGRITY MONITORING BASED INSIGHTS | Dec 18, 2022 | Pending |
Array
(
[id] => 18925737
[patent_doc_number] => 20240028741
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-25
[patent_title] => CONTROL FLOW INTEGRITY MONITORING BASED INSIGHTS
[patent_app_type] => utility
[patent_app_number] => 18/084007
[patent_app_country] => US
[patent_app_date] => 2022-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 27197
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18084007
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/084007 | CONTROL FLOW INTEGRITY MONITORING BASED INSIGHTS | Dec 18, 2022 | Pending |
Array
(
[id] => 18407853
[patent_doc_number] => 20230169206
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-01
[patent_title] => HYGIENE COMPLIANCE DATA CHANNEL
[patent_app_type] => utility
[patent_app_number] => 18/060186
[patent_app_country] => US
[patent_app_date] => 2022-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20874
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 70
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18060186
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/060186 | Hygiene compliance data channel | Nov 29, 2022 | Issued |
Array
(
[id] => 19207273
[patent_doc_number] => 20240179172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-30
[patent_title] => VULNERABILITY SCANNING OF HIDDEN NETWORK SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 18/072057
[patent_app_country] => US
[patent_app_date] => 2022-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5250
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18072057
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/072057 | VULNERABILITY SCANNING OF HIDDEN NETWORK SYSTEMS | Nov 29, 2022 | Pending |
Array
(
[id] => 18951821
[patent_doc_number] => 11895132
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-06
[patent_title] => Command and control steganographic communications detection engine
[patent_app_type] => utility
[patent_app_number] => 18/058390
[patent_app_country] => US
[patent_app_date] => 2022-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6858
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18058390
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/058390 | Command and control steganographic communications detection engine | Nov 22, 2022 | Issued |
Array
(
[id] => 19177301
[patent_doc_number] => 20240163275
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-16
[patent_title] => NETWORK INTRUSION DETECTION IN A LARGE-SCALE AUTHENICATION SCENARIO
[patent_app_type] => utility
[patent_app_number] => 17/988494
[patent_app_country] => US
[patent_app_date] => 2022-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8387
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17988494
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/988494 | NETWORK INTRUSION DETECTION IN A LARGE-SCALE AUTHENICATION SCENARIO | Nov 15, 2022 | Pending |
Array
(
[id] => 19177301
[patent_doc_number] => 20240163275
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-16
[patent_title] => NETWORK INTRUSION DETECTION IN A LARGE-SCALE AUTHENICATION SCENARIO
[patent_app_type] => utility
[patent_app_number] => 17/988494
[patent_app_country] => US
[patent_app_date] => 2022-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8387
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17988494
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/988494 | NETWORK INTRUSION DETECTION IN A LARGE-SCALE AUTHENICATION SCENARIO | Nov 15, 2022 | Pending |
Array
(
[id] => 19144801
[patent_doc_number] => 20240143730
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-02
[patent_title] => MULTI-FACTOR AUTHENTICATION USING BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 18/050952
[patent_app_country] => US
[patent_app_date] => 2022-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9635
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18050952
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/050952 | MULTI-FACTOR AUTHENTICATION USING BLOCKCHAIN | Oct 27, 2022 | Pending |
Array
(
[id] => 19117564
[patent_doc_number] => 20240129314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-18
[patent_title] => ACCESS ENFORCEMENT THROUGH AUTHENTICATION VERIFICATION ENTITY (AVE)
[patent_app_type] => utility
[patent_app_number] => 17/967416
[patent_app_country] => US
[patent_app_date] => 2022-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17198
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17967416
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/967416 | Access enforcement through authentication verification entity (AVE) | Oct 16, 2022 | Issued |
Array
(
[id] => 20119302
[patent_doc_number] => 12369035
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-22
[patent_title] => Terminal device verification method and apparatus
[patent_app_type] => utility
[patent_app_number] => 17/957906
[patent_app_country] => US
[patent_app_date] => 2022-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 26170
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17957906
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/957906 | Terminal device verification method and apparatus | Sep 29, 2022 | Issued |