
Jennifer Wecker
Examiner (ID: 2478)
| Most Active Art Unit | 1797 |
| Art Unit(s) | 1779, 1797, 4172, 1772 |
| Total Applications | 1151 |
| Issued Applications | 886 |
| Pending Applications | 80 |
| Abandoned Applications | 204 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19819465
[patent_doc_number] => 20250077672
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-06
[patent_title] => Systems and Methods for Countering Persistent Malware
[patent_app_type] => utility
[patent_app_number] => 18/461134
[patent_app_country] => US
[patent_app_date] => 2023-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14632
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18461134
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/461134 | Systems and methods for countering persistent malware | Sep 4, 2023 | Issued |
Array
(
[id] => 19956523
[patent_doc_number] => 12326937
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-06-10
[patent_title] => Real time intrusion detection
[patent_app_type] => utility
[patent_app_number] => 18/241310
[patent_app_country] => US
[patent_app_date] => 2023-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3454
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18241310
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/241310 | Real time intrusion detection | Aug 31, 2023 | Issued |
Array
(
[id] => 19952142
[patent_doc_number] => 12323520
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-06-03
[patent_title] => Management of recipient credentials leveraging private keys on keystores read by provisioned devices
[patent_app_type] => utility
[patent_app_number] => 18/236361
[patent_app_country] => US
[patent_app_date] => 2023-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 9443
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18236361
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/236361 | Management of recipient credentials leveraging private keys on keystores read by provisioned devices | Aug 20, 2023 | Issued |
Array
(
[id] => 19750606
[patent_doc_number] => 20250039171
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => COMPUTERIZED SYSTEM AND METHOD FOR WEARABLE IDENTITY MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 18/360093
[patent_app_country] => US
[patent_app_date] => 2023-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8524
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18360093
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/360093 | COMPUTERIZED SYSTEM AND METHOD FOR WEARABLE IDENTITY MANAGEMENT | Jul 26, 2023 | Issued |
Array
(
[id] => 18907123
[patent_doc_number] => 20240022608
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-18
[patent_title] => METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR DATA PROTECTION SIMULATION AND OPTIMIZATION IN A COMPUTER NETWORK
[patent_app_type] => utility
[patent_app_number] => 18/359091
[patent_app_country] => US
[patent_app_date] => 2023-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11528
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18359091
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/359091 | Method, apparatus, and computer-readable medium for data protection simulation and optimization in a computer network | Jul 25, 2023 | Issued |
Array
(
[id] => 19795036
[patent_doc_number] => 12235985
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-25
[patent_title] => Privilege based access checks for query results
[patent_app_type] => utility
[patent_app_number] => 18/359360
[patent_app_country] => US
[patent_app_date] => 2023-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10087
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18359360
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/359360 | Privilege based access checks for query results | Jul 25, 2023 | Issued |
Array
(
[id] => 19085076
[patent_doc_number] => 20240111877
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-04
[patent_title] => DELIVERING AUGMENTED THREAT ASSESSMENT VALUES TO A SECURITY THREAT MANAGEMENT FACILITY
[patent_app_type] => utility
[patent_app_number] => 18/346156
[patent_app_country] => US
[patent_app_date] => 2023-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15868
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18346156
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/346156 | DELIVERING AUGMENTED THREAT ASSESSMENT VALUES TO A SECURITY THREAT MANAGEMENT FACILITY | Jun 29, 2023 | Pending |
Array
(
[id] => 18728175
[patent_doc_number] => 20230342468
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-10-26
[patent_title] => SYSTEM AND METHOD FOR IDENTIFYING COMPROMISED ELECTRONIC CONTROLLER USING INTENTIONALLY INDUCED ERROR
[patent_app_type] => utility
[patent_app_number] => 18/215678
[patent_app_country] => US
[patent_app_date] => 2023-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7641
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18215678
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/215678 | System and method for identifying compromised electronic controller using intentionally induced error | Jun 27, 2023 | Issued |
Array
(
[id] => 20388380
[patent_doc_number] => 12488107
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-12-02
[patent_title] => Identification of variants of artificial intelligence generated malware
[patent_app_type] => utility
[patent_app_number] => 18/208016
[patent_app_country] => US
[patent_app_date] => 2023-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 3399
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18208016
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/208016 | Identification of variants of artificial intelligence generated malware | Jun 8, 2023 | Issued |
Array
(
[id] => 18614584
[patent_doc_number] => 20230281321
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-09-07
[patent_title] => SECURE APPLICATION DEVELOPMENT USING DISTRIBUTED LEDGERS
[patent_app_type] => utility
[patent_app_number] => 18/316878
[patent_app_country] => US
[patent_app_date] => 2023-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7867
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18316878
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/316878 | Secure application development using distributed ledgers | May 11, 2023 | Issued |
Array
(
[id] => 18586837
[patent_doc_number] => 20230269102
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-08-24
[patent_title] => Method for Collecting and Managing Event Data of a Vehicle
[patent_app_type] => utility
[patent_app_number] => 18/309928
[patent_app_country] => US
[patent_app_date] => 2023-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6381
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18309928
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/309928 | Method for collecting and managing event data of a vehicle | Apr 30, 2023 | Issued |
Array
(
[id] => 20359225
[patent_doc_number] => 12475222
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-11-18
[patent_title] => Method and apparatus for mapping similarity spaces
[patent_app_type] => utility
[patent_app_number] => 18/306849
[patent_app_country] => US
[patent_app_date] => 2023-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7216
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 280
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18306849
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/306849 | Method and apparatus for mapping similarity spaces | Apr 24, 2023 | Issued |
Array
(
[id] => 20258105
[patent_doc_number] => 12430457
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-30
[patent_title] => Reversing symmetric encryptions using keys found in snapshots--per-file keys, random and transmitted outside
[patent_app_type] => utility
[patent_app_number] => 18/297118
[patent_app_country] => US
[patent_app_date] => 2023-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 0
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18297118
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/297118 | Reversing symmetric encryptions using keys found in snapshots--per-file keys, random and transmitted outside | Apr 6, 2023 | Issued |
Array
(
[id] => 18678205
[patent_doc_number] => 20230315852
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-10-05
[patent_title] => THREAT MITIGATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 18/130231
[patent_app_country] => US
[patent_app_date] => 2023-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 42881
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18130231
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/130231 | Threat mitigation system and method | Apr 2, 2023 | Issued |
Array
(
[id] => 19829515
[patent_doc_number] => 12250315
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-03-11
[patent_title] => Computer network systems for cryptographically-secured, token-based operations and methods of use thereof
[patent_app_type] => utility
[patent_app_number] => 18/186753
[patent_app_country] => US
[patent_app_date] => 2023-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 25021
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 373
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18186753
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/186753 | Computer network systems for cryptographically-secured, token-based operations and methods of use thereof | Mar 19, 2023 | Issued |
Array
(
[id] => 18616733
[patent_doc_number] => 20230283472
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-09-07
[patent_title] => Credential-Free Authentication Systems and Methods
[patent_app_type] => utility
[patent_app_number] => 18/108580
[patent_app_country] => US
[patent_app_date] => 2023-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8015
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18108580
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/108580 | Credential-free authentication systems and methods | Feb 10, 2023 | Issued |
Array
(
[id] => 18554172
[patent_doc_number] => 20230252185
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-08-10
[patent_title] => APPARATUSES AND METHODS FOR REVEALING USER IDENTIFIERS ON AN IMMUTABLE SEQUENTIAL LISTING
[patent_app_type] => utility
[patent_app_number] => 18/105566
[patent_app_country] => US
[patent_app_date] => 2023-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17624
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18105566
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/105566 | APPARATUSES AND METHODS FOR REVEALING USER IDENTIFIERS ON AN IMMUTABLE SEQUENTIAL LISTING | Feb 2, 2023 | Abandoned |
Array
(
[id] => 18407860
[patent_doc_number] => 20230169213
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-01
[patent_title] => QUERY PROCESSING USING DATA CLEAN ROOMS
[patent_app_type] => utility
[patent_app_number] => 18/162701
[patent_app_country] => US
[patent_app_date] => 2023-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12016
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18162701
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/162701 | Query processing using data clean rooms | Jan 30, 2023 | Issued |
Array
(
[id] => 20359228
[patent_doc_number] => 12475225
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-11-18
[patent_title] => Aggressive embedding dropout in embedding-based malware detection
[patent_app_type] => utility
[patent_app_number] => 18/160467
[patent_app_country] => US
[patent_app_date] => 2023-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 2956
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18160467
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/160467 | Aggressive embedding dropout in embedding-based malware detection | Jan 26, 2023 | Issued |
Array
(
[id] => 18409734
[patent_doc_number] => 20230171087
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-01
[patent_title] => Server Side Authentication
[patent_app_type] => utility
[patent_app_number] => 18/159207
[patent_app_country] => US
[patent_app_date] => 2023-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7966
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18159207
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/159207 | Server side authentication | Jan 24, 2023 | Issued |