Search

Lisa C. Lewis

Examiner (ID: 10645)

Most Active Art Unit
2495
Art Unit(s)
4124, 2436, 2433, 2495
Total Applications
828
Issued Applications
667
Pending Applications
43
Abandoned Applications
130

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20515348 [patent_doc_number] => 20260039451 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-02-05 [patent_title] => ADVANCED ENCRYPTION STANDARD WITH FREQUENT S-BOX UPDATE AND FUSION FUNCTION APPLICATION [patent_app_type] => utility [patent_app_number] => 19/344096 [patent_app_country] => US [patent_app_date] => 2025-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7670 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 272 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19344096 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/344096
ADVANCED ENCRYPTION STANDARD WITH FREQUENT S-BOX UPDATE AND FUSION FUNCTION APPLICATION Sep 28, 2025 Pending
Array ( [id] => 20052399 [patent_doc_number] => 20250190621 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-12 [patent_title] => SELECTIVELY DE-IDENTIFYING DATA [patent_app_type] => utility [patent_app_number] => 19/057912 [patent_app_country] => US [patent_app_date] => 2025-02-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9082 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 85 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19057912 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/057912
SELECTIVELY DE-IDENTIFYING DATA Feb 18, 2025 Pending
Array ( [id] => 19994677 [patent_doc_number] => 20250132899 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-24 [patent_title] => SECRET MATERIAL EXCHANGE AND AUTHENTICATION CRYPTOGRAPHY OPERATIONS [patent_app_type] => utility [patent_app_number] => 19/007913 [patent_app_country] => US [patent_app_date] => 2025-01-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6511 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -3 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19007913 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/007913
SECRET MATERIAL EXCHANGE AND AUTHENTICATION CRYPTOGRAPHY OPERATIONS Jan 1, 2025 Pending
Array ( [id] => 20052343 [patent_doc_number] => 20250190565 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-12 [patent_title] => CYBER SECURITY USING MODELS INCLUDING A MODEL TRAINED ON A NORMAL BEHAVIOR [patent_app_type] => utility [patent_app_number] => 18/988523 [patent_app_country] => US [patent_app_date] => 2024-12-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1147 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18988523 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/988523
CYBER SECURITY USING MODELS INCLUDING A MODEL TRAINED ON A NORMAL BEHAVIOR Dec 18, 2024 Pending
Array ( [id] => 20573404 [patent_doc_number] => 20260067334 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-03-05 [patent_title] => Cross-domain Identity Management (SCIM)-based policy generation for application segments [patent_app_type] => utility [patent_app_number] => 18/918432 [patent_app_country] => US [patent_app_date] => 2024-10-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15621 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18918432 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/918432
Cross-domain Identity Management (SCIM)-based policy generation for application segments Oct 16, 2024 Pending
Array ( [id] => 19887522 [patent_doc_number] => 12273258 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-04-08 [patent_title] => System and method for determining code reachability in a networked computing environment [patent_app_type] => utility [patent_app_number] => 18/917690 [patent_app_country] => US [patent_app_date] => 2024-10-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 11124 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18917690 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/917690
System and method for determining code reachability in a networked computing environment Oct 15, 2024 Issued
Array ( [id] => 19867241 [patent_doc_number] => 20250106027 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-03-27 [patent_title] => CRYPTOGRAPHIC SYSTEMS AND METHODS FOR PROVIDING SERVICES TO AUTHENTICATED USERS [patent_app_type] => utility [patent_app_number] => 18/905376 [patent_app_country] => US [patent_app_date] => 2024-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11779 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18905376 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/905376
CRYPTOGRAPHIC SYSTEMS AND METHODS FOR PROVIDING SERVICES TO AUTHENTICATED USERS Oct 2, 2024 Pending
Array ( [id] => 19686622 [patent_doc_number] => 20250005167 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-02 [patent_title] => MODEL-BASED CONFIDENCE RANKING OF WEB APPLICATION VULNERABILITIES [patent_app_type] => utility [patent_app_number] => 18/883033 [patent_app_country] => US [patent_app_date] => 2024-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11628 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18883033 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/883033
MODEL-BASED CONFIDENCE RANKING OF WEB APPLICATION VULNERABILITIES Sep 11, 2024 Pending
Array ( [id] => 19663044 [patent_doc_number] => 20240430109 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-26 [patent_title] => PUF BASED KEY GENERATION FOR LATTICE AND CODE CRYPTOGRAPHY [patent_app_type] => utility [patent_app_number] => 18/823414 [patent_app_country] => US [patent_app_date] => 2024-09-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7152 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -3 [patent_words_short_claim] => 72 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18823414 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/823414
PUF BASED KEY GENERATION FOR LATTICE AND CODE CRYPTOGRAPHY Sep 2, 2024 Pending
Array ( [id] => 20502527 [patent_doc_number] => 20260031990 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-29 [patent_title] => METHODS FOR USER-AWARE TRUSTWORTHY DIRECT SERVICE INTERACTION IN WIRELESS NETWORKS [patent_app_type] => utility [patent_app_number] => 18/781195 [patent_app_country] => US [patent_app_date] => 2024-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 17417 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18781195 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/781195
METHODS FOR USER-AWARE TRUSTWORTHY DIRECT SERVICE INTERACTION IN WIRELESS NETWORKS Jul 22, 2024 Pending
Array ( [id] => 20489057 [patent_doc_number] => 20260025260 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-22 [patent_title] => Verifiable Key Exchange for Cryptography [patent_app_type] => utility [patent_app_number] => 18/778025 [patent_app_country] => US [patent_app_date] => 2024-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5804 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 176 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18778025 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/778025
Verifiable Key Exchange for Cryptography Jul 18, 2024 Pending
Array ( [id] => 20668140 [patent_doc_number] => 12609926 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2026-04-21 [patent_title] => Multi-tier tokenization with long term token [patent_app_type] => utility [patent_app_number] => 18/778425 [patent_app_country] => US [patent_app_date] => 2024-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8554 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 97 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18778425 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/778425
Multi-tier tokenization with long term token Jul 18, 2024 Issued
Array ( [id] => 20529282 [patent_doc_number] => 12547719 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2026-02-10 [patent_title] => Anomaly detection using change blocks and disk extents [patent_app_type] => utility [patent_app_number] => 18/775540 [patent_app_country] => US [patent_app_date] => 2024-07-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 0 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 78 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18775540 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/775540
Anomaly detection using change blocks and disk extents Jul 16, 2024 Issued
Array ( [id] => 20489082 [patent_doc_number] => 20260025285 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-22 [patent_title] => SERVER AUTHENTICITY VERIFICATION USING A CHAIN OF NESTED PROOFS [patent_app_type] => utility [patent_app_number] => 18/774753 [patent_app_country] => US [patent_app_date] => 2024-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9534 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18774753 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/774753
SERVER AUTHENTICITY VERIFICATION USING A CHAIN OF NESTED PROOFS Jul 15, 2024 Issued
Array ( [id] => 19750405 [patent_doc_number] => 20250038970 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-30 [patent_title] => QUANTUM KEY DISTRIBUTION (QKD) METHOD, QKD END-NODE AND QKD NETWORK [patent_app_type] => utility [patent_app_number] => 18/772648 [patent_app_country] => US [patent_app_date] => 2024-07-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6744 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18772648 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/772648
QUANTUM KEY DISTRIBUTION (QKD) METHOD, QKD END-NODE AND QKD NETWORK Jul 14, 2024 Pending
Array ( [id] => 19973251 [patent_doc_number] => 12341876 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-06-24 [patent_title] => Cryptographic key management and transfer [patent_app_type] => utility [patent_app_number] => 18/770575 [patent_app_country] => US [patent_app_date] => 2024-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 1230 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 57 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18770575 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/770575
Cryptographic key management and transfer Jul 10, 2024 Issued
Array ( [id] => 20423698 [patent_doc_number] => 20250385783 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-12-18 [patent_title] => SECURITY GRAPH CONSTRUCTION ALGORITHM BASED ON PRIVATE SET INTERSECTION AND SECRET SHARING [patent_app_type] => utility [patent_app_number] => 18/766149 [patent_app_country] => US [patent_app_date] => 2024-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3909 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18766149 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/766149
SECURITY GRAPH CONSTRUCTION ALGORITHM BASED ON PRIVATE SET INTERSECTION AND SECRET SHARING Jul 7, 2024 Pending
Array ( [id] => 20495794 [patent_doc_number] => 12537678 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2026-01-27 [patent_title] => Security device and operation method thereof [patent_app_type] => utility [patent_app_number] => 18/763526 [patent_app_country] => US [patent_app_date] => 2024-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 3285 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763526 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/763526
Security device and operation method thereof Jul 2, 2024 Issued
Array ( [id] => 20449311 [patent_doc_number] => 20260006037 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-01 [patent_title] => SYSTEMS AND METHODS FOR USING ARTIFICIAL INTELLIGENCE FOR FRAUD DETECTION USING AN ENUMERATION DETECTION SYSTEM [patent_app_type] => utility [patent_app_number] => 18/754586 [patent_app_country] => US [patent_app_date] => 2024-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2310 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18754586 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/754586
SYSTEMS AND METHODS FOR USING ARTIFICIAL INTELLIGENCE FOR FRAUD DETECTION USING AN ENUMERATION DETECTION SYSTEM Jun 25, 2024 Pending
Array ( [id] => 19485469 [patent_doc_number] => 20240333511 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-03 [patent_title] => CRYPTOGRAPHIC AUTHENTICATION TO CONTROL ACCESS TO STORAGE DEVICES [patent_app_type] => utility [patent_app_number] => 18/742425 [patent_app_country] => US [patent_app_date] => 2024-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11244 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742425 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/742425
CRYPTOGRAPHIC AUTHENTICATION TO CONTROL ACCESS TO STORAGE DEVICES Jun 12, 2024 Pending
Menu