
Iyabo Alli
Examiner (ID: 4657)
| Most Active Art Unit | 2877 |
| Art Unit(s) | 2877, 2809 |
| Total Applications | 502 |
| Issued Applications | 409 |
| Pending Applications | 9 |
| Abandoned Applications | 85 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20508519
[patent_doc_number] => 12542804
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-02-03
[patent_title] => Method and system for request identification for security and fairness in serverless functions
[patent_app_type] => utility
[patent_app_number] => 19/169644
[patent_app_country] => US
[patent_app_date] => 2025-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 3075
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19169644
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/169644 | Method and system for request identification for security and fairness in serverless functions | Apr 2, 2025 | Issued |
Array
(
[id] => 20531077
[patent_doc_number] => 12549524
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-02-10
[patent_title] => Secure translator for insecure computing device
[patent_app_type] => utility
[patent_app_number] => 18/990450
[patent_app_country] => US
[patent_app_date] => 2024-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2322
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 249
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18990450
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/990450 | Secure translator for insecure computing device | Dec 19, 2024 | Issued |
Array
(
[id] => 19913249
[patent_doc_number] => 12289480
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-04-29
[patent_title] => Broadcast synchronization with fan engagement platform
[patent_app_type] => utility
[patent_app_number] => 18/978826
[patent_app_country] => US
[patent_app_date] => 2024-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5053
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18978826
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/978826 | Broadcast synchronization with fan engagement platform | Dec 11, 2024 | Issued |
Array
(
[id] => 20029756
[patent_doc_number] => 20250167978
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-22
[patent_title] => CRYPTOGRAPHICALLY SECURE CONTROL USING SECURE MULTI-PARTY COMPUTATION
[patent_app_type] => utility
[patent_app_number] => 18/961865
[patent_app_country] => US
[patent_app_date] => 2024-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21301
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18961865
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/961865 | CRYPTOGRAPHICALLY SECURE CONTROL USING SECURE MULTI-PARTY COMPUTATION | Nov 26, 2024 | Pending |
Array
(
[id] => 20461199
[patent_doc_number] => 20260010627
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-08
[patent_title] => Isolated Snapshot Storage For Fast Ransomware Protection
[patent_app_type] => utility
[patent_app_number] => 18/920338
[patent_app_country] => US
[patent_app_date] => 2024-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3212
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18920338
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/920338 | Isolated Snapshot Storage For Fast Ransomware Protection | Oct 17, 2024 | Pending |
Array
(
[id] => 20054952
[patent_doc_number] => 20250193174
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-12
[patent_title] => SYSTEM AND METHOD FOR IMPROVED USER AUTHENTICATION IN A MULTISYSTEM NETWORK
[patent_app_type] => utility
[patent_app_number] => 18/906943
[patent_app_country] => US
[patent_app_date] => 2024-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11355
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 414
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18906943
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/906943 | SYSTEM AND METHOD FOR IMPROVED USER AUTHENTICATION IN A MULTISYSTEM NETWORK | Oct 3, 2024 | Pending |
Array
(
[id] => 19759074
[patent_doc_number] => 20250047639
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-06
[patent_title] => SYSTEM AND METHOD FOR GENERATING A SIGNATURE OF A SPAM MESSAGE BASED ON CLUSTERING
[patent_app_type] => utility
[patent_app_number] => 18/906240
[patent_app_country] => US
[patent_app_date] => 2024-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5395
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18906240
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/906240 | SYSTEM AND METHOD FOR GENERATING A SIGNATURE OF A SPAM MESSAGE BASED ON CLUSTERING | Oct 3, 2024 | Pending |
Array
(
[id] => 20629501
[patent_doc_number] => 20260093788
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-04-02
[patent_title] => SELF-TO-SELF DELEGATION OWNERSHIP TRANSFERS FOR ENDPOINT DEVICE ONBOARDING
[patent_app_type] => utility
[patent_app_number] => 18/899065
[patent_app_country] => US
[patent_app_date] => 2024-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7497
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18899065
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/899065 | SELF-TO-SELF DELEGATION OWNERSHIP TRANSFERS FOR ENDPOINT DEVICE ONBOARDING | Sep 26, 2024 | Pending |
Array
(
[id] => 20619085
[patent_doc_number] => 20260089191
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-03-26
[patent_title] => SYSTEMS AND METHODS FOR PREVENTING PHISHING ATTACKS
[patent_app_type] => utility
[patent_app_number] => 18/891754
[patent_app_country] => US
[patent_app_date] => 2024-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3186
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18891754
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/891754 | SYSTEMS AND METHODS FOR PREVENTING PHISHING ATTACKS | Sep 19, 2024 | Pending |
Array
(
[id] => 19992734
[patent_doc_number] => 20250130956
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-24
[patent_title] => COMPUTER SYSTEM AND METHOD FOR SYSTEM MEMORY ENCRYPTION AND DECRYPTION
[patent_app_type] => utility
[patent_app_number] => 18/829648
[patent_app_country] => US
[patent_app_date] => 2024-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 0
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 43
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18829648
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/829648 | COMPUTER SYSTEM AND METHOD FOR SYSTEM MEMORY ENCRYPTION AND DECRYPTION | Sep 9, 2024 | Pending |
Array
(
[id] => 19663273
[patent_doc_number] => 20240430338
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-26
[patent_title] => QUIC AND ANYCAST PROXY RESILIENCY
[patent_app_type] => utility
[patent_app_number] => 18/829034
[patent_app_country] => US
[patent_app_date] => 2024-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 32782
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18829034
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/829034 | QUIC AND ANYCAST PROXY RESILIENCY | Sep 8, 2024 | Pending |
Array
(
[id] => 19834504
[patent_doc_number] => 20250086290
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-13
[patent_title] => Method, System, and Computer Program Product for Identifying Library Vulnerabilities
[patent_app_type] => utility
[patent_app_number] => 18/825263
[patent_app_country] => US
[patent_app_date] => 2024-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11830
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18825263
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/825263 | Method, System, and Computer Program Product for Identifying Library Vulnerabilities | Sep 4, 2024 | Pending |
Array
(
[id] => 19867259
[patent_doc_number] => 20250106045
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-27
[patent_title] => TERMINAL, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/824439
[patent_app_country] => US
[patent_app_date] => 2024-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22075
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18824439
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/824439 | TERMINAL, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM | Sep 3, 2024 | Pending |
Array
(
[id] => 19620384
[patent_doc_number] => 20240406064
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-05
[patent_title] => SYSTEMS AND METHODS FOR PROVIDING USER PREFERENCES FOR A CONNECTED DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/800982
[patent_app_country] => US
[patent_app_date] => 2024-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13311
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18800982
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/800982 | SYSTEMS AND METHODS FOR PROVIDING USER PREFERENCES FOR A CONNECTED DEVICE | Aug 11, 2024 | Pending |
Array
(
[id] => 20513535
[patent_doc_number] => 20260037636
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-02-05
[patent_title] => MITIGATING VULNERABILITIES IN A SOFTWARE PROGRAM BASED ON ITS USAGE
[patent_app_type] => utility
[patent_app_number] => 18/790484
[patent_app_country] => US
[patent_app_date] => 2024-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 0
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18790484
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/790484 | MITIGATING VULNERABILITIES IN A SOFTWARE PROGRAM BASED ON ITS USAGE | Jul 30, 2024 | Pending |
Array
(
[id] => 20515556
[patent_doc_number] => 20260039659
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-02-05
[patent_title] => WAKING SILENT NETWORK DEVICES FOR AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 18/791070
[patent_app_country] => US
[patent_app_date] => 2024-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14466
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18791070
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/791070 | WAKING SILENT NETWORK DEVICES FOR AUTHENTICATION | Jul 30, 2024 | Pending |
Array
(
[id] => 19745084
[patent_doc_number] => 20250033649
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => SYSTEMS AND METHODS FOR TRACKING HISTORIC DRIVER DATA ON THE EDGE
[patent_app_type] => utility
[patent_app_number] => 18/783203
[patent_app_country] => US
[patent_app_date] => 2024-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18376
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18783203
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/783203 | SYSTEMS AND METHODS FOR TRACKING HISTORIC DRIVER DATA ON THE EDGE | Jul 23, 2024 | Pending |
Array
(
[id] => 19530506
[patent_doc_number] => 20240354408
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-24
[patent_title] => AUTOMATED THREAT MODEL GENERATION
[patent_app_type] => utility
[patent_app_number] => 18/759286
[patent_app_country] => US
[patent_app_date] => 2024-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22294
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18759286
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/759286 | AUTOMATED THREAT MODEL GENERATION | Jun 27, 2024 | Pending |
Array
(
[id] => 19467016
[patent_doc_number] => 20240320686
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-26
[patent_title] => THIRD-PARTY SERVICE FOR SUGGESTING RESOURCES FOR A RECEIVED MESSAGE
[patent_app_type] => utility
[patent_app_number] => 18/734887
[patent_app_country] => US
[patent_app_date] => 2024-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 30052
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18734887
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/734887 | Third-party service for suggesting resources for a received message | Jun 4, 2024 | Issued |
Array
(
[id] => 19453996
[patent_doc_number] => 20240314126
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-19
[patent_title] => Method for Device Commissioning in a Network System and Network System
[patent_app_type] => utility
[patent_app_number] => 18/672609
[patent_app_country] => US
[patent_app_date] => 2024-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6718
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18672609
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/672609 | Method for device commissioning in a network system and network system | May 22, 2024 | Issued |