
Katherine A. Faley
Examiner (ID: 14055, Phone: (571)272-3453 , Office: P/2652 )
| Most Active Art Unit | 2652 |
| Art Unit(s) | 2652, 2693 |
| Total Applications | 504 |
| Issued Applications | 328 |
| Pending Applications | 41 |
| Abandoned Applications | 149 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19583797
[patent_doc_number] => 12149940
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-11-19
[patent_title] => Wireless communication method between a client object and a server object
[patent_app_type] => utility
[patent_app_number] => 17/642095
[patent_app_country] => US
[patent_app_date] => 2020-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4080
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17642095
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/642095 | Wireless communication method between a client object and a server object | Aug 4, 2020 | Issued |
Array
(
[id] => 16457223
[patent_doc_number] => 20200366649
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => SESSION SETUP IN NETWORK APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/940920
[patent_app_country] => US
[patent_app_date] => 2020-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8875
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16940920
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/940920 | Session setup in network applications | Jul 27, 2020 | Issued |
Array
(
[id] => 16625937
[patent_doc_number] => 20210044590
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-11
[patent_title] => REQUEST FILTERING AND DATA REDACTION FOR ACCESS CONTROL
[patent_app_type] => utility
[patent_app_number] => 16/941121
[patent_app_country] => US
[patent_app_date] => 2020-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9440
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16941121
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/941121 | REQUEST FILTERING AND DATA REDACTION FOR ACCESS CONTROL | Jul 27, 2020 | Abandoned |
Array
(
[id] => 17834621
[patent_doc_number] => 20220271925
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-25
[patent_title] => METHOD FOR THE INITIAL SETUP AND OF A MACHINE DATA COMMUNICATION NETWORK, METHOD FOR REPLACING A HARDWARE COMPONENT
[patent_app_type] => utility
[patent_app_number] => 17/632856
[patent_app_country] => US
[patent_app_date] => 2020-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5804
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17632856
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/632856 | Method for the initial setup and of a machine data communication network, method for replacing a hardware component | Jul 26, 2020 | Issued |
Array
(
[id] => 18220460
[patent_doc_number] => 11595418
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-28
[patent_title] => Graphical connection viewer for discovery of suspect network traffic
[patent_app_type] => utility
[patent_app_number] => 16/947148
[patent_app_country] => US
[patent_app_date] => 2020-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5858
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16947148
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/947148 | Graphical connection viewer for discovery of suspect network traffic | Jul 20, 2020 | Issued |
Array
(
[id] => 16426153
[patent_doc_number] => 20200351351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-05
[patent_title] => RESOURCE BASED FRAMEWORK TO SUPPORT SERVICE PROGRAMMABILITY FOR A 5G OR OTHER NEXT GENERATION MOBILE CORE NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/934140
[patent_app_country] => US
[patent_app_date] => 2020-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8126
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16934140
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/934140 | Resource based framework to support service programmability for a 5G or other next generation mobile core network | Jul 20, 2020 | Issued |
Array
(
[id] => 17788830
[patent_doc_number] => 11411976
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Resource-efficient generation of analytical attack graphs
[patent_app_type] => utility
[patent_app_number] => 16/924483
[patent_app_country] => US
[patent_app_date] => 2020-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 15011
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16924483
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/924483 | Resource-efficient generation of analytical attack graphs | Jul 8, 2020 | Issued |
Array
(
[id] => 18138021
[patent_doc_number] => 11563721
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-24
[patent_title] => Methods and systems for network address translation (NAT) traversal using a meet-in-the-middle proxy
[patent_app_type] => utility
[patent_app_number] => 16/907279
[patent_app_country] => US
[patent_app_date] => 2020-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7771
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16907279
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/907279 | Methods and systems for network address translation (NAT) traversal using a meet-in-the-middle proxy | Jun 20, 2020 | Issued |
Array
(
[id] => 17819935
[patent_doc_number] => 11425569
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => Secure communication in mobile digital pages
[patent_app_type] => utility
[patent_app_number] => 16/901560
[patent_app_country] => US
[patent_app_date] => 2020-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 22131
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 270
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16901560
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/901560 | Secure communication in mobile digital pages | Jun 14, 2020 | Issued |
Array
(
[id] => 18262305
[patent_doc_number] => 11610007
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-03-21
[patent_title] => Application of security parameters for content
[patent_app_type] => utility
[patent_app_number] => 16/892211
[patent_app_country] => US
[patent_app_date] => 2020-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 10208
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16892211
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/892211 | Application of security parameters for content | Jun 2, 2020 | Issued |
Array
(
[id] => 17264044
[patent_doc_number] => 20210377029
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-02
[patent_title] => DYNAMIC SEGMENTATION OF NETWORK TRAFFIC BY USE OF PRE-SHARED KEYS
[patent_app_type] => utility
[patent_app_number] => 16/889945
[patent_app_country] => US
[patent_app_date] => 2020-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10018
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16889945
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/889945 | Dynamic segmentation of network traffic by use of pre-shared keys | Jun 1, 2020 | Issued |
Array
(
[id] => 17879481
[patent_doc_number] => 11451517
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-20
[patent_title] => Secure and auditable proxy technology using trusted execution environments
[patent_app_type] => utility
[patent_app_number] => 16/884071
[patent_app_country] => US
[patent_app_date] => 2020-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5058
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884071
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/884071 | Secure and auditable proxy technology using trusted execution environments | May 26, 2020 | Issued |
Array
(
[id] => 17819463
[patent_doc_number] => 11425092
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => System and method for analytics based WAF service configuration
[patent_app_type] => utility
[patent_app_number] => 16/883373
[patent_app_country] => US
[patent_app_date] => 2020-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3852
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16883373
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/883373 | System and method for analytics based WAF service configuration | May 25, 2020 | Issued |
Array
(
[id] => 17827183
[patent_doc_number] => 11432152
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-30
[patent_title] => Method and apparatus for detecting and handling evil twin access points
[patent_app_type] => utility
[patent_app_number] => 16/866477
[patent_app_country] => US
[patent_app_date] => 2020-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 25
[patent_no_of_words] => 12547
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16866477
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/866477 | Method and apparatus for detecting and handling evil twin access points | May 3, 2020 | Issued |
Array
(
[id] => 17204418
[patent_doc_number] => 20210344513
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-04
[patent_title] => METHOD AND SYSTEM FOR HANDLING DYNAMIC CYBERSECURITY POSTURE OF A V2X ENTITY
[patent_app_type] => utility
[patent_app_number] => 16/861936
[patent_app_country] => US
[patent_app_date] => 2020-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20093
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16861936
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/861936 | Method and system for handling dynamic cybersecurity posture of a V2X entity | Apr 28, 2020 | Issued |
Array
(
[id] => 17629440
[patent_doc_number] => 20220164455
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-26
[patent_title] => LOCAL/HYBRID BLOCKCHAIN FOR OIL AND GAS OPERATIONS INTEGRITY
[patent_app_type] => utility
[patent_app_number] => 17/594098
[patent_app_country] => US
[patent_app_date] => 2020-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23212
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -25
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17594098
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/594098 | Local/hybrid blockchain for oil and gas operations integrity | Apr 1, 2020 | Issued |
Array
(
[id] => 16179638
[patent_doc_number] => 20200226607
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-16
[patent_title] => RISK MONITORING SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/836358
[patent_app_country] => US
[patent_app_date] => 2020-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 32428
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16836358
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/836358 | Risk monitoring system | Mar 30, 2020 | Issued |
Array
(
[id] => 16181352
[patent_doc_number] => 20200228321
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-16
[patent_title] => VERIFYING AN IDENTITY BASED ON MULTIPLE DISTRIBUTED DATA SOURCES USING A BLOCKCHAIN TO SAFEGUARD THE IDENTITY
[patent_app_type] => utility
[patent_app_number] => 16/832627
[patent_app_country] => US
[patent_app_date] => 2020-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7559
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16832627
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/832627 | Verifying an identity based on multiple distributed data sources using a blockchain to safeguard the identity | Mar 26, 2020 | Issued |
Array
(
[id] => 19184579
[patent_doc_number] => 11991189
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-21
[patent_title] => Intrusion detection for computer systems
[patent_app_type] => utility
[patent_app_number] => 17/441394
[patent_app_country] => US
[patent_app_date] => 2020-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 15843
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17441394
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/441394 | Intrusion detection for computer systems | Mar 10, 2020 | Issued |
Array
(
[id] => 16271221
[patent_doc_number] => 20200272709
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-27
[patent_title] => DISTRIBUTION AND ENFORCEMENT OF PER-FEATURE-SET SOFTWARE APPLICATION LICENSING
[patent_app_type] => utility
[patent_app_number] => 16/809132
[patent_app_country] => US
[patent_app_date] => 2020-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12895
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16809132
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/809132 | Distribution and enforcement of per-feature-set software application licensing | Mar 3, 2020 | Issued |