
Jennifer Wecker
Examiner (ID: 2478)
| Most Active Art Unit | 1797 |
| Art Unit(s) | 1779, 1797, 4172, 1772 |
| Total Applications | 1151 |
| Issued Applications | 886 |
| Pending Applications | 80 |
| Abandoned Applications | 204 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19236074
[patent_doc_number] => 20240193269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-13
[patent_title] => CLUSTERING AND CLUSTER TRACKING OF CATEGORICAL DATA
[patent_app_type] => utility
[patent_app_number] => 18/414994
[patent_app_country] => US
[patent_app_date] => 2024-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8784
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18414994
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/414994 | Clustering and cluster tracking of categorical data | Jan 16, 2024 | Issued |
Array
(
[id] => 19159919
[patent_doc_number] => 20240152626
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-09
[patent_title] => Security Event Modeling and Threat Detection Using Behavioral, Analytical, and Threat Intelligence Attributes
[patent_app_type] => utility
[patent_app_number] => 18/412189
[patent_app_country] => US
[patent_app_date] => 2024-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12945
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18412189
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/412189 | Quantification of security events using behavioral, analytical, and threat intelligence attributes | Jan 11, 2024 | Issued |
Array
(
[id] => 19303776
[patent_doc_number] => 20240232356
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2024-07-11
[patent_title] => MALWARE DETECTION METHOD, MALWARE DETECTION DEVICE, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/402429
[patent_app_country] => US
[patent_app_date] => 2024-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21186
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18402429
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/402429 | Malware detection method, malware detection device, and recording medium | Jan 1, 2024 | Issued |
Array
(
[id] => 19303776
[patent_doc_number] => 20240232356
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2024-07-11
[patent_title] => MALWARE DETECTION METHOD, MALWARE DETECTION DEVICE, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/402429
[patent_app_country] => US
[patent_app_date] => 2024-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21186
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18402429
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/402429 | Malware detection method, malware detection device, and recording medium | Jan 1, 2024 | Issued |
Array
(
[id] => 19115142
[patent_doc_number] => 20240126892
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-18
[patent_title] => System and Method for Displaying a Scalable Cyber-Risk Assessment of a Computer System
[patent_app_type] => utility
[patent_app_number] => 18/392911
[patent_app_country] => US
[patent_app_date] => 2023-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8988
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18392911
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/392911 | System and method for displaying a scalable cyber-risk assessment of a computer system | Dec 20, 2023 | Issued |
Array
(
[id] => 19099925
[patent_doc_number] => 20240119153
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-11
[patent_title] => SYSTEMS AND METHODS OF DATA SELECTION FOR ITERATIVE TRAINING USING ZERO KNOWLEDGE CLUSTERING
[patent_app_type] => utility
[patent_app_number] => 18/542041
[patent_app_country] => US
[patent_app_date] => 2023-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12835
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18542041
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/542041 | Systems and methods of data selection for iterative training using zero knowledge clustering | Dec 14, 2023 | Issued |
Array
(
[id] => 20434425
[patent_doc_number] => 12505215
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-12-23
[patent_title] => Using artificial intelligence to generate test data to test malware scanner(s)
[patent_app_type] => utility
[patent_app_number] => 18/518958
[patent_app_country] => US
[patent_app_date] => 2023-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3069
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18518958
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/518958 | Using artificial intelligence to generate test data to test malware scanner(s) | Nov 24, 2023 | Issued |
Array
(
[id] => 19177132
[patent_doc_number] => 20240163106
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-16
[patent_title] => Systems and Methods for Green Proof of Stake Consensus Mechanisms
[patent_app_type] => utility
[patent_app_number] => 18/508080
[patent_app_country] => US
[patent_app_date] => 2023-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22261
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18508080
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/508080 | Systems and Methods for Green Proof of Stake Consensus Mechanisms | Nov 12, 2023 | Issued |
Array
(
[id] => 19024174
[patent_doc_number] => 20240080345
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-03-07
[patent_title] => METHOD FOR DETERMINING SECURITY PROTECTION ENABLING MANNER, COMMUNICATION METHOD, AND COMMUNICATION APPARATUS
[patent_app_type] => utility
[patent_app_number] => 18/506241
[patent_app_country] => US
[patent_app_date] => 2023-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 40970
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18506241
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/506241 | METHOD FOR DETERMINING SECURITY PROTECTION ENABLING MANNER, COMMUNICATION METHOD, AND COMMUNICATION APPARATUS | Nov 9, 2023 | Pending |
Array
(
[id] => 20018321
[patent_doc_number] => 20250156543
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-15
[patent_title] => USING APPROXIMATE MEMBERSHIP QUERY FILTERS FOR EFFICIENT CONTROL FLOW INTEGRITY PROTECTION
[patent_app_type] => utility
[patent_app_number] => 18/506639
[patent_app_country] => US
[patent_app_date] => 2023-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3481
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 53
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18506639
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/506639 | Using approximate membership query filters for efficient control flow integrity protection | Nov 9, 2023 | Issued |
Array
(
[id] => 20597230
[patent_doc_number] => 12580960
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-03-17
[patent_title] => Metadata-based detection and prevention of phishing attacks
[patent_app_type] => utility
[patent_app_number] => 18/502895
[patent_app_country] => US
[patent_app_date] => 2023-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 4309
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18502895
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/502895 | Metadata-based detection and prevention of phishing attacks | Nov 5, 2023 | Issued |
Array
(
[id] => 19056148
[patent_doc_number] => 20240098117
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-03-21
[patent_title] => LOW-LATENCY, OUTBOUND MESSAGE MONITORING, CONTROL, AND AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 18/498156
[patent_app_country] => US
[patent_app_date] => 2023-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15854
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18498156
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/498156 | LOW-LATENCY, OUTBOUND MESSAGE MONITORING, CONTROL, AND AUTHENTICATION | Oct 30, 2023 | Abandoned |
Array
(
[id] => 20001023
[patent_doc_number] => 20250139245
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-01
[patent_title] => DETECTION OF ANOMALIES ASSOCIATED WITH INTERFERING PROCESSES
[patent_app_type] => utility
[patent_app_number] => 18/384154
[patent_app_country] => US
[patent_app_date] => 2023-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6537
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18384154
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/384154 | DETECTION OF ANOMALIES ASSOCIATED WITH INTERFERING PROCESSES | Oct 25, 2023 | Abandoned |
Array
(
[id] => 19485442
[patent_doc_number] => 20240333484
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-03
[patent_title] => METHOD FOR ANALYZING QUANTUM VULNERABILITY AND SYSTEM THEREFOR
[patent_app_type] => utility
[patent_app_number] => 18/383249
[patent_app_country] => US
[patent_app_date] => 2023-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8773
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18383249
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/383249 | Method for analyzing quantum vulnerability and system therefor | Oct 23, 2023 | Issued |
Array
(
[id] => 19115131
[patent_doc_number] => 20240126881
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-18
[patent_title] => Program Execution Anomaly Detection for CyberSecurity
[patent_app_type] => utility
[patent_app_number] => 18/485049
[patent_app_country] => US
[patent_app_date] => 2023-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14241
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18485049
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/485049 | Program execution anomaly detection for cybersecurity | Oct 10, 2023 | Issued |
Array
(
[id] => 19748198
[patent_doc_number] => 20250036763
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => RAPID MALWARE SCANNING USING VALIDATED REPUTATION CACHE
[patent_app_type] => utility
[patent_app_number] => 18/377768
[patent_app_country] => US
[patent_app_date] => 2023-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11074
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18377768
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/377768 | RAPID MALWARE SCANNING USING VALIDATED REPUTATION CACHE | Oct 6, 2023 | Abandoned |
Array
(
[id] => 18925763
[patent_doc_number] => 20240028767
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-25
[patent_title] => QUERY PROCESSING USING DATA CLEAN ROOMS
[patent_app_type] => utility
[patent_app_number] => 18/480656
[patent_app_country] => US
[patent_app_date] => 2023-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12038
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18480656
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/480656 | Secure data comparison using data clean rooms | Oct 3, 2023 | Issued |
Array
(
[id] => 19197955
[patent_doc_number] => 11995193
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-05-28
[patent_title] => Architecture of a multi-cloud inspector for any compute type
[patent_app_type] => utility
[patent_app_number] => 18/477179
[patent_app_country] => US
[patent_app_date] => 2023-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7649
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18477179
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/477179 | Architecture of a multi-cloud inspector for any compute type | Sep 27, 2023 | Issued |
Array
(
[id] => 20661271
[patent_doc_number] => 20260113325
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-04-23
[patent_title] => ROUTING MAC ADDRESS MANAGEMENT METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 19/148340
[patent_app_country] => US
[patent_app_date] => 2023-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8449
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19148340
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/148340 | ROUTING MAC ADDRESS MANAGEMENT METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | Sep 25, 2023 | Pending |
Array
(
[id] => 20610170
[patent_doc_number] => 12585772
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-03-24
[patent_title] => Malicious activity detection by modeling end-point events as sequences
[patent_app_type] => utility
[patent_app_number] => 18/470237
[patent_app_country] => US
[patent_app_date] => 2023-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2261
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 327
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18470237
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/470237 | Malicious activity detection by modeling end-point events as sequences | Sep 18, 2023 | Issued |