
Jeffrey D. Popham
Examiner (ID: 9258, Phone: (571)272-7215 , Office: P/2491 )
| Most Active Art Unit | 2491 |
| Art Unit(s) | 2432, 2491, 2437, 2137 |
| Total Applications | 612 |
| Issued Applications | 214 |
| Pending Applications | 74 |
| Abandoned Applications | 333 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17809646
[patent_doc_number] => 20220261481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-18
[patent_title] => SOFTWARE PACKER-AGNOSTIC UNPACKING OF PACKED EXECUTABLES
[patent_app_type] => utility
[patent_app_number] => 17/175321
[patent_app_country] => US
[patent_app_date] => 2021-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5188
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17175321
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/175321 | SOFTWARE PACKER-AGNOSTIC UNPACKING OF PACKED EXECUTABLES | Feb 11, 2021 | Abandoned |
Array
(
[id] => 17763674
[patent_doc_number] => 20220237286
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-28
[patent_title] => KERNEL BASED EXPLOITATION DETECTION AND PREVENTION USING GRAMMATICALLY STRUCTURED RULES
[patent_app_type] => utility
[patent_app_number] => 17/161497
[patent_app_country] => US
[patent_app_date] => 2021-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6910
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17161497
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/161497 | KERNEL BASED EXPLOITATION DETECTION AND PREVENTION USING GRAMMATICALLY STRUCTURED RULES | Jan 27, 2021 | Pending |
Array
(
[id] => 16982714
[patent_doc_number] => 20210226951
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-22
[patent_title] => AUTOMATED AUTHENTICATION AND AUTHORIZATION IN A COMMUNICATION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 17/155089
[patent_app_country] => US
[patent_app_date] => 2021-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 55299
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17155089
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/155089 | Automated authentication and authorization in a communication system | Jan 21, 2021 | Issued |
Array
(
[id] => 17693748
[patent_doc_number] => 20220201041
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-23
[patent_title] => Administrative policy override in microsegmentation
[patent_app_type] => utility
[patent_app_number] => 17/131908
[patent_app_country] => US
[patent_app_date] => 2020-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14319
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17131908
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/131908 | Administrative policy override in microsegmentation | Dec 22, 2020 | Pending |
Array
(
[id] => 17432753
[patent_doc_number] => 20220060463
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-24
[patent_title] => METHOD FOR MANAGING NETWORK DEVICES, APPARATUS, AND COMPUTER READABLE STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 17/133276
[patent_app_country] => US
[patent_app_date] => 2020-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4037
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 359
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17133276
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/133276 | METHOD FOR MANAGING NETWORK DEVICES, APPARATUS, AND COMPUTER READABLE STORAGE MEDIUM | Dec 22, 2020 | Abandoned |
Array
(
[id] => 19956520
[patent_doc_number] => 12326934
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-06-10
[patent_title] => Detecting suspicious activation of an application in a computer device
[patent_app_type] => utility
[patent_app_number] => 17/130180
[patent_app_country] => US
[patent_app_date] => 2020-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 0
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17130180
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/130180 | Detecting suspicious activation of an application in a computer device | Dec 21, 2020 | Issued |
Array
(
[id] => 18508363
[patent_doc_number] => 11706195
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-18
[patent_title] => Micro-segmentation of virtual computing elements
[patent_app_type] => utility
[patent_app_number] => 17/121867
[patent_app_country] => US
[patent_app_date] => 2020-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 4345
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17121867
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/121867 | Micro-segmentation of virtual computing elements | Dec 14, 2020 | Issued |
Array
(
[id] => 16716738
[patent_doc_number] => 20210083885
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-18
[patent_title] => MANAGING COMMUNICATIONS AMONG CONSENSUS NODES AND CLIENT NODES
[patent_app_type] => utility
[patent_app_number] => 17/107584
[patent_app_country] => US
[patent_app_date] => 2020-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6201
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17107584
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/107584 | Managing communications among consensus nodes and client nodes | Nov 29, 2020 | Issued |
Array
(
[id] => 17614090
[patent_doc_number] => 20220156370
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-19
[patent_title] => OBFUSCATED IDENTIFIER DETECTION METHOD BASED ON NATURAL LANGUAGE PROCESSING AND RECORDING MEDIUM AND APPARATUS FOR PERFORMING THE SAME
[patent_app_type] => utility
[patent_app_number] => 17/278781
[patent_app_country] => US
[patent_app_date] => 2020-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4878
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17278781
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/278781 | OBFUSCATED IDENTIFIER DETECTION METHOD BASED ON NATURAL LANGUAGE PROCESSING AND RECORDING MEDIUM AND APPARATUS FOR PERFORMING THE SAME | Nov 24, 2020 | Pending |
Array
(
[id] => 16887740
[patent_doc_number] => 20210173937
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-10
[patent_title] => CYBER ATTACK DETECTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/953283
[patent_app_country] => US
[patent_app_date] => 2020-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7861
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16953283
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/953283 | CYBER ATTACK DETECTION SYSTEM | Nov 18, 2020 | Pending |
Array
(
[id] => 17616706
[patent_doc_number] => 20220158986
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-19
[patent_title] => NON-STORED MULTIPLE FACTOR VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/950404
[patent_app_country] => US
[patent_app_date] => 2020-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11301
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16950404
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/950404 | NON-STORED MULTIPLE FACTOR VERIFICATION | Nov 16, 2020 | Pending |
Array
(
[id] => 17616706
[patent_doc_number] => 20220158986
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-19
[patent_title] => NON-STORED MULTIPLE FACTOR VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/950404
[patent_app_country] => US
[patent_app_date] => 2020-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11301
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16950404
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/950404 | NON-STORED MULTIPLE FACTOR VERIFICATION | Nov 16, 2020 | Pending |
Array
(
[id] => 19222726
[patent_doc_number] => 20240187430
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-06
[patent_title] => INTERNET OF THINGS SECURITY ANALYTICS AND SOLUTIONS WITH DEEP LEARNING
[patent_app_type] => utility
[patent_app_number] => 17/773491
[patent_app_country] => US
[patent_app_date] => 2020-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13119
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17773491
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/773491 | INTERNET OF THINGS SECURITY ANALYTICS AND SOLUTIONS WITH DEEP LEARNING | Nov 1, 2020 | Pending |
Array
(
[id] => 19357766
[patent_doc_number] => 12058235
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-08-06
[patent_title] => Doubly linked blockchain
[patent_app_type] => utility
[patent_app_number] => 17/065212
[patent_app_country] => US
[patent_app_date] => 2020-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 8658
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17065212
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/065212 | Doubly linked blockchain | Oct 6, 2020 | Issued |
Array
(
[id] => 17522155
[patent_doc_number] => 20220108004
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-04-07
[patent_title] => TRUSTED EXECUTION ENVIRONMENT (TEE) DETECTION OF SYSTEMIC MALWARE IN A COMPUTING SYSTEM THAT HOSTS THE TEE
[patent_app_type] => utility
[patent_app_number] => 16/948925
[patent_app_country] => US
[patent_app_date] => 2020-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6229
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16948925
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/948925 | TRUSTED EXECUTION ENVIRONMENT (TEE) DETECTION OF SYSTEMIC MALWARE IN A COMPUTING SYSTEM THAT HOSTS THE TEE | Oct 5, 2020 | Abandoned |
Array
(
[id] => 17510493
[patent_doc_number] => 20220103597
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-31
[patent_title] => DYNAMIC OPTIMIZATION OF CLIENT APPLICATION ACCESS VIA A SECURE ACCESS SERVICE EDGE (SASE) NETWORK OPTIMIZATION CONTROLLER (NOC)
[patent_app_type] => utility
[patent_app_number] => 17/037105
[patent_app_country] => US
[patent_app_date] => 2020-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15308
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17037105
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/037105 | DYNAMIC OPTIMIZATION OF CLIENT APPLICATION ACCESS VIA A SECURE ACCESS SERVICE EDGE (SASE) NETWORK OPTIMIZATION CONTROLLER (NOC) | Sep 28, 2020 | Abandoned |
Array
(
[id] => 17510439
[patent_doc_number] => 20220103543
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-31
[patent_title] => SECURE AUTHENTICATION METHOD FOR PERFORMING A HOST OPERATION USING A DELEGATED AUTHORIZATION MECHANISM
[patent_app_type] => utility
[patent_app_number] => 17/032780
[patent_app_country] => US
[patent_app_date] => 2020-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7546
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17032780
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/032780 | SECURE AUTHENTICATION METHOD FOR PERFORMING A HOST OPERATION USING A DELEGATED AUTHORIZATION MECHANISM | Sep 24, 2020 | Abandoned |
Array
(
[id] => 17507796
[patent_doc_number] => 20220100899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-31
[patent_title] => PROTECTING SENSITIVE DATA IN DOCUMENTS
[patent_app_type] => utility
[patent_app_number] => 17/032592
[patent_app_country] => US
[patent_app_date] => 2020-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9016
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17032592
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/032592 | Protecting sensitive data in documents | Sep 24, 2020 | Issued |
Array
(
[id] => 17464903
[patent_doc_number] => 20220078209
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-10
[patent_title] => ENHANCED TRUSTED APPLICATION MANAGER UTILIZING INTELLIGENCE FROM A SECURE ACCESS SERVER EDGE (SASE)
[patent_app_type] => utility
[patent_app_number] => 17/014875
[patent_app_country] => US
[patent_app_date] => 2020-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11498
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 58
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17014875
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/014875 | ENHANCED TRUSTED APPLICATION MANAGER UTILIZING INTELLIGENCE FROM A SECURE ACCESS SERVER EDGE (SASE) | Sep 7, 2020 | Pending |
Array
(
[id] => 19415653
[patent_doc_number] => 12081503
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-09-03
[patent_title] => Determining authenticity of reported user action in cybersecurity risk assessment
[patent_app_type] => utility
[patent_app_number] => 16/942023
[patent_app_country] => US
[patent_app_date] => 2020-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7850
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16942023
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/942023 | Determining authenticity of reported user action in cybersecurity risk assessment | Jul 28, 2020 | Issued |