
Lisa C. Lewis
Examiner (ID: 10645)
| Most Active Art Unit | 2495 |
| Art Unit(s) | 4124, 2436, 2433, 2495 |
| Total Applications | 828 |
| Issued Applications | 667 |
| Pending Applications | 43 |
| Abandoned Applications | 130 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20515348
[patent_doc_number] => 20260039451
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-02-05
[patent_title] => ADVANCED ENCRYPTION STANDARD WITH FREQUENT S-BOX UPDATE AND FUSION FUNCTION APPLICATION
[patent_app_type] => utility
[patent_app_number] => 19/344096
[patent_app_country] => US
[patent_app_date] => 2025-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7670
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 272
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19344096
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/344096 | ADVANCED ENCRYPTION STANDARD WITH FREQUENT S-BOX UPDATE AND FUSION FUNCTION APPLICATION | Sep 28, 2025 | Pending |
Array
(
[id] => 20052399
[patent_doc_number] => 20250190621
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-12
[patent_title] => SELECTIVELY DE-IDENTIFYING DATA
[patent_app_type] => utility
[patent_app_number] => 19/057912
[patent_app_country] => US
[patent_app_date] => 2025-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9082
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19057912
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/057912 | SELECTIVELY DE-IDENTIFYING DATA | Feb 18, 2025 | Pending |
Array
(
[id] => 19994677
[patent_doc_number] => 20250132899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-24
[patent_title] => SECRET MATERIAL EXCHANGE AND AUTHENTICATION CRYPTOGRAPHY OPERATIONS
[patent_app_type] => utility
[patent_app_number] => 19/007913
[patent_app_country] => US
[patent_app_date] => 2025-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6511
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19007913
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/007913 | SECRET MATERIAL EXCHANGE AND AUTHENTICATION CRYPTOGRAPHY OPERATIONS | Jan 1, 2025 | Pending |
Array
(
[id] => 20052343
[patent_doc_number] => 20250190565
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-12
[patent_title] => CYBER SECURITY USING MODELS INCLUDING A MODEL TRAINED ON A NORMAL BEHAVIOR
[patent_app_type] => utility
[patent_app_number] => 18/988523
[patent_app_country] => US
[patent_app_date] => 2024-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1147
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18988523
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/988523 | CYBER SECURITY USING MODELS INCLUDING A MODEL TRAINED ON A NORMAL BEHAVIOR | Dec 18, 2024 | Pending |
Array
(
[id] => 20573404
[patent_doc_number] => 20260067334
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-03-05
[patent_title] => Cross-domain Identity Management (SCIM)-based policy generation for application segments
[patent_app_type] => utility
[patent_app_number] => 18/918432
[patent_app_country] => US
[patent_app_date] => 2024-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15621
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18918432
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/918432 | Cross-domain Identity Management (SCIM)-based policy generation for application segments | Oct 16, 2024 | Pending |
Array
(
[id] => 19887522
[patent_doc_number] => 12273258
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-04-08
[patent_title] => System and method for determining code reachability in a networked computing environment
[patent_app_type] => utility
[patent_app_number] => 18/917690
[patent_app_country] => US
[patent_app_date] => 2024-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11124
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18917690
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/917690 | System and method for determining code reachability in a networked computing environment | Oct 15, 2024 | Issued |
Array
(
[id] => 19867241
[patent_doc_number] => 20250106027
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-27
[patent_title] => CRYPTOGRAPHIC SYSTEMS AND METHODS FOR PROVIDING SERVICES TO AUTHENTICATED USERS
[patent_app_type] => utility
[patent_app_number] => 18/905376
[patent_app_country] => US
[patent_app_date] => 2024-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11779
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18905376
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/905376 | CRYPTOGRAPHIC SYSTEMS AND METHODS FOR PROVIDING SERVICES TO AUTHENTICATED USERS | Oct 2, 2024 | Pending |
Array
(
[id] => 19686622
[patent_doc_number] => 20250005167
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-02
[patent_title] => MODEL-BASED CONFIDENCE RANKING OF WEB APPLICATION VULNERABILITIES
[patent_app_type] => utility
[patent_app_number] => 18/883033
[patent_app_country] => US
[patent_app_date] => 2024-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11628
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18883033
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/883033 | MODEL-BASED CONFIDENCE RANKING OF WEB APPLICATION VULNERABILITIES | Sep 11, 2024 | Pending |
Array
(
[id] => 19663044
[patent_doc_number] => 20240430109
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-26
[patent_title] => PUF BASED KEY GENERATION FOR LATTICE AND CODE CRYPTOGRAPHY
[patent_app_type] => utility
[patent_app_number] => 18/823414
[patent_app_country] => US
[patent_app_date] => 2024-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7152
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18823414
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/823414 | PUF BASED KEY GENERATION FOR LATTICE AND CODE CRYPTOGRAPHY | Sep 2, 2024 | Pending |
Array
(
[id] => 20502527
[patent_doc_number] => 20260031990
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-29
[patent_title] => METHODS FOR USER-AWARE TRUSTWORTHY DIRECT SERVICE INTERACTION IN WIRELESS NETWORKS
[patent_app_type] => utility
[patent_app_number] => 18/781195
[patent_app_country] => US
[patent_app_date] => 2024-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17417
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18781195
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/781195 | METHODS FOR USER-AWARE TRUSTWORTHY DIRECT SERVICE INTERACTION IN WIRELESS NETWORKS | Jul 22, 2024 | Pending |
Array
(
[id] => 20489057
[patent_doc_number] => 20260025260
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-22
[patent_title] => Verifiable Key Exchange for Cryptography
[patent_app_type] => utility
[patent_app_number] => 18/778025
[patent_app_country] => US
[patent_app_date] => 2024-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5804
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18778025
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/778025 | Verifiable Key Exchange for Cryptography | Jul 18, 2024 | Pending |
Array
(
[id] => 20668140
[patent_doc_number] => 12609926
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-04-21
[patent_title] => Multi-tier tokenization with long term token
[patent_app_type] => utility
[patent_app_number] => 18/778425
[patent_app_country] => US
[patent_app_date] => 2024-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8554
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18778425
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/778425 | Multi-tier tokenization with long term token | Jul 18, 2024 | Issued |
Array
(
[id] => 20529282
[patent_doc_number] => 12547719
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2026-02-10
[patent_title] => Anomaly detection using change blocks and disk extents
[patent_app_type] => utility
[patent_app_number] => 18/775540
[patent_app_country] => US
[patent_app_date] => 2024-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 0
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18775540
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/775540 | Anomaly detection using change blocks and disk extents | Jul 16, 2024 | Issued |
Array
(
[id] => 20489082
[patent_doc_number] => 20260025285
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-22
[patent_title] => SERVER AUTHENTICITY VERIFICATION USING A CHAIN OF NESTED PROOFS
[patent_app_type] => utility
[patent_app_number] => 18/774753
[patent_app_country] => US
[patent_app_date] => 2024-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9534
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18774753
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/774753 | SERVER AUTHENTICITY VERIFICATION USING A CHAIN OF NESTED PROOFS | Jul 15, 2024 | Issued |
Array
(
[id] => 19750405
[patent_doc_number] => 20250038970
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => QUANTUM KEY DISTRIBUTION (QKD) METHOD, QKD END-NODE AND QKD NETWORK
[patent_app_type] => utility
[patent_app_number] => 18/772648
[patent_app_country] => US
[patent_app_date] => 2024-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6744
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18772648
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/772648 | QUANTUM KEY DISTRIBUTION (QKD) METHOD, QKD END-NODE AND QKD NETWORK | Jul 14, 2024 | Pending |
Array
(
[id] => 19973251
[patent_doc_number] => 12341876
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-06-24
[patent_title] => Cryptographic key management and transfer
[patent_app_type] => utility
[patent_app_number] => 18/770575
[patent_app_country] => US
[patent_app_date] => 2024-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 1230
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18770575
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/770575 | Cryptographic key management and transfer | Jul 10, 2024 | Issued |
Array
(
[id] => 20423698
[patent_doc_number] => 20250385783
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-12-18
[patent_title] => SECURITY GRAPH CONSTRUCTION ALGORITHM BASED ON PRIVATE SET INTERSECTION AND SECRET SHARING
[patent_app_type] => utility
[patent_app_number] => 18/766149
[patent_app_country] => US
[patent_app_date] => 2024-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3909
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18766149
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/766149 | SECURITY GRAPH CONSTRUCTION ALGORITHM BASED ON PRIVATE SET INTERSECTION AND SECRET SHARING | Jul 7, 2024 | Pending |
Array
(
[id] => 20495794
[patent_doc_number] => 12537678
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-01-27
[patent_title] => Security device and operation method thereof
[patent_app_type] => utility
[patent_app_number] => 18/763526
[patent_app_country] => US
[patent_app_date] => 2024-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 3285
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763526
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/763526 | Security device and operation method thereof | Jul 2, 2024 | Issued |
Array
(
[id] => 20449311
[patent_doc_number] => 20260006037
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-01
[patent_title] => SYSTEMS AND METHODS FOR USING ARTIFICIAL INTELLIGENCE FOR FRAUD DETECTION USING AN ENUMERATION DETECTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 18/754586
[patent_app_country] => US
[patent_app_date] => 2024-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2310
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18754586
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/754586 | SYSTEMS AND METHODS FOR USING ARTIFICIAL INTELLIGENCE FOR FRAUD DETECTION USING AN ENUMERATION DETECTION SYSTEM | Jun 25, 2024 | Pending |
Array
(
[id] => 19485469
[patent_doc_number] => 20240333511
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-03
[patent_title] => CRYPTOGRAPHIC AUTHENTICATION TO CONTROL ACCESS TO STORAGE DEVICES
[patent_app_type] => utility
[patent_app_number] => 18/742425
[patent_app_country] => US
[patent_app_date] => 2024-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11244
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742425
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/742425 | CRYPTOGRAPHIC AUTHENTICATION TO CONTROL ACCESS TO STORAGE DEVICES | Jun 12, 2024 | Pending |