Search

Jeffrey D. Popham

Examiner (ID: 9258, Phone: (571)272-7215 , Office: P/2491 )

Most Active Art Unit
2491
Art Unit(s)
2432, 2491, 2437, 2137
Total Applications
612
Issued Applications
214
Pending Applications
74
Abandoned Applications
333

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 17809646 [patent_doc_number] => 20220261481 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-08-18 [patent_title] => SOFTWARE PACKER-AGNOSTIC UNPACKING OF PACKED EXECUTABLES [patent_app_type] => utility [patent_app_number] => 17/175321 [patent_app_country] => US [patent_app_date] => 2021-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5188 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17175321 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/175321
SOFTWARE PACKER-AGNOSTIC UNPACKING OF PACKED EXECUTABLES Feb 11, 2021 Abandoned
Array ( [id] => 17763674 [patent_doc_number] => 20220237286 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-07-28 [patent_title] => KERNEL BASED EXPLOITATION DETECTION AND PREVENTION USING GRAMMATICALLY STRUCTURED RULES [patent_app_type] => utility [patent_app_number] => 17/161497 [patent_app_country] => US [patent_app_date] => 2021-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6910 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17161497 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/161497
KERNEL BASED EXPLOITATION DETECTION AND PREVENTION USING GRAMMATICALLY STRUCTURED RULES Jan 27, 2021 Pending
Array ( [id] => 16982714 [patent_doc_number] => 20210226951 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-07-22 [patent_title] => AUTOMATED AUTHENTICATION AND AUTHORIZATION IN A COMMUNICATION SYSTEM [patent_app_type] => utility [patent_app_number] => 17/155089 [patent_app_country] => US [patent_app_date] => 2021-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 55299 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17155089 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/155089
Automated authentication and authorization in a communication system Jan 21, 2021 Issued
Array ( [id] => 17693748 [patent_doc_number] => 20220201041 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-06-23 [patent_title] => Administrative policy override in microsegmentation [patent_app_type] => utility [patent_app_number] => 17/131908 [patent_app_country] => US [patent_app_date] => 2020-12-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14319 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17131908 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/131908
Administrative policy override in microsegmentation Dec 22, 2020 Pending
Array ( [id] => 17432753 [patent_doc_number] => 20220060463 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-02-24 [patent_title] => METHOD FOR MANAGING NETWORK DEVICES, APPARATUS, AND COMPUTER READABLE STORAGE MEDIUM [patent_app_type] => utility [patent_app_number] => 17/133276 [patent_app_country] => US [patent_app_date] => 2020-12-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4037 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 359 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17133276 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/133276
METHOD FOR MANAGING NETWORK DEVICES, APPARATUS, AND COMPUTER READABLE STORAGE MEDIUM Dec 22, 2020 Abandoned
Array ( [id] => 19956520 [patent_doc_number] => 12326934 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-06-10 [patent_title] => Detecting suspicious activation of an application in a computer device [patent_app_type] => utility [patent_app_number] => 17/130180 [patent_app_country] => US [patent_app_date] => 2020-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 0 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 176 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17130180 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/130180
Detecting suspicious activation of an application in a computer device Dec 21, 2020 Issued
Array ( [id] => 18508363 [patent_doc_number] => 11706195 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-07-18 [patent_title] => Micro-segmentation of virtual computing elements [patent_app_type] => utility [patent_app_number] => 17/121867 [patent_app_country] => US [patent_app_date] => 2020-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 4345 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17121867 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/121867
Micro-segmentation of virtual computing elements Dec 14, 2020 Issued
Array ( [id] => 16716738 [patent_doc_number] => 20210083885 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-18 [patent_title] => MANAGING COMMUNICATIONS AMONG CONSENSUS NODES AND CLIENT NODES [patent_app_type] => utility [patent_app_number] => 17/107584 [patent_app_country] => US [patent_app_date] => 2020-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6201 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17107584 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/107584
Managing communications among consensus nodes and client nodes Nov 29, 2020 Issued
Array ( [id] => 17614090 [patent_doc_number] => 20220156370 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-05-19 [patent_title] => OBFUSCATED IDENTIFIER DETECTION METHOD BASED ON NATURAL LANGUAGE PROCESSING AND RECORDING MEDIUM AND APPARATUS FOR PERFORMING THE SAME [patent_app_type] => utility [patent_app_number] => 17/278781 [patent_app_country] => US [patent_app_date] => 2020-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4878 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17278781 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/278781
OBFUSCATED IDENTIFIER DETECTION METHOD BASED ON NATURAL LANGUAGE PROCESSING AND RECORDING MEDIUM AND APPARATUS FOR PERFORMING THE SAME Nov 24, 2020 Pending
Array ( [id] => 16887740 [patent_doc_number] => 20210173937 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-06-10 [patent_title] => CYBER ATTACK DETECTION SYSTEM [patent_app_type] => utility [patent_app_number] => 16/953283 [patent_app_country] => US [patent_app_date] => 2020-11-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7861 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16953283 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/953283
CYBER ATTACK DETECTION SYSTEM Nov 18, 2020 Pending
Array ( [id] => 17616706 [patent_doc_number] => 20220158986 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-05-19 [patent_title] => NON-STORED MULTIPLE FACTOR VERIFICATION [patent_app_type] => utility [patent_app_number] => 16/950404 [patent_app_country] => US [patent_app_date] => 2020-11-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11301 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16950404 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/950404
NON-STORED MULTIPLE FACTOR VERIFICATION Nov 16, 2020 Pending
Array ( [id] => 17616706 [patent_doc_number] => 20220158986 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-05-19 [patent_title] => NON-STORED MULTIPLE FACTOR VERIFICATION [patent_app_type] => utility [patent_app_number] => 16/950404 [patent_app_country] => US [patent_app_date] => 2020-11-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11301 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16950404 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/950404
NON-STORED MULTIPLE FACTOR VERIFICATION Nov 16, 2020 Pending
Array ( [id] => 19222726 [patent_doc_number] => 20240187430 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-06-06 [patent_title] => INTERNET OF THINGS SECURITY ANALYTICS AND SOLUTIONS WITH DEEP LEARNING [patent_app_type] => utility [patent_app_number] => 17/773491 [patent_app_country] => US [patent_app_date] => 2020-11-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13119 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17773491 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/773491
INTERNET OF THINGS SECURITY ANALYTICS AND SOLUTIONS WITH DEEP LEARNING Nov 1, 2020 Pending
Array ( [id] => 19357766 [patent_doc_number] => 12058235 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-08-06 [patent_title] => Doubly linked blockchain [patent_app_type] => utility [patent_app_number] => 17/065212 [patent_app_country] => US [patent_app_date] => 2020-10-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 8658 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 245 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17065212 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/065212
Doubly linked blockchain Oct 6, 2020 Issued
Array ( [id] => 17522155 [patent_doc_number] => 20220108004 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-04-07 [patent_title] => TRUSTED EXECUTION ENVIRONMENT (TEE) DETECTION OF SYSTEMIC MALWARE IN A COMPUTING SYSTEM THAT HOSTS THE TEE [patent_app_type] => utility [patent_app_number] => 16/948925 [patent_app_country] => US [patent_app_date] => 2020-10-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6229 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 77 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16948925 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/948925
TRUSTED EXECUTION ENVIRONMENT (TEE) DETECTION OF SYSTEMIC MALWARE IN A COMPUTING SYSTEM THAT HOSTS THE TEE Oct 5, 2020 Abandoned
Array ( [id] => 17510493 [patent_doc_number] => 20220103597 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-31 [patent_title] => DYNAMIC OPTIMIZATION OF CLIENT APPLICATION ACCESS VIA A SECURE ACCESS SERVICE EDGE (SASE) NETWORK OPTIMIZATION CONTROLLER (NOC) [patent_app_type] => utility [patent_app_number] => 17/037105 [patent_app_country] => US [patent_app_date] => 2020-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15308 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17037105 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/037105
DYNAMIC OPTIMIZATION OF CLIENT APPLICATION ACCESS VIA A SECURE ACCESS SERVICE EDGE (SASE) NETWORK OPTIMIZATION CONTROLLER (NOC) Sep 28, 2020 Abandoned
Array ( [id] => 17510439 [patent_doc_number] => 20220103543 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-31 [patent_title] => SECURE AUTHENTICATION METHOD FOR PERFORMING A HOST OPERATION USING A DELEGATED AUTHORIZATION MECHANISM [patent_app_type] => utility [patent_app_number] => 17/032780 [patent_app_country] => US [patent_app_date] => 2020-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7546 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 147 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17032780 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/032780
SECURE AUTHENTICATION METHOD FOR PERFORMING A HOST OPERATION USING A DELEGATED AUTHORIZATION MECHANISM Sep 24, 2020 Abandoned
Array ( [id] => 17507796 [patent_doc_number] => 20220100899 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-31 [patent_title] => PROTECTING SENSITIVE DATA IN DOCUMENTS [patent_app_type] => utility [patent_app_number] => 17/032592 [patent_app_country] => US [patent_app_date] => 2020-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9016 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 172 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17032592 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/032592
Protecting sensitive data in documents Sep 24, 2020 Issued
Array ( [id] => 17464903 [patent_doc_number] => 20220078209 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-10 [patent_title] => ENHANCED TRUSTED APPLICATION MANAGER UTILIZING INTELLIGENCE FROM A SECURE ACCESS SERVER EDGE (SASE) [patent_app_type] => utility [patent_app_number] => 17/014875 [patent_app_country] => US [patent_app_date] => 2020-09-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11498 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 58 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17014875 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/014875
ENHANCED TRUSTED APPLICATION MANAGER UTILIZING INTELLIGENCE FROM A SECURE ACCESS SERVER EDGE (SASE) Sep 7, 2020 Pending
Array ( [id] => 19415653 [patent_doc_number] => 12081503 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-09-03 [patent_title] => Determining authenticity of reported user action in cybersecurity risk assessment [patent_app_type] => utility [patent_app_number] => 16/942023 [patent_app_country] => US [patent_app_date] => 2020-07-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7850 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 198 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16942023 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/942023
Determining authenticity of reported user action in cybersecurity risk assessment Jul 28, 2020 Issued
Menu