
Madhuri R. Herzog
Examiner (ID: 18727, Phone: (571)270-3359 , Office: P/2438 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 4144, 2438 |
| Total Applications | 705 |
| Issued Applications | 520 |
| Pending Applications | 75 |
| Abandoned Applications | 138 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19445516
[patent_doc_number] => 12095817
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-09-17
[patent_title] => Intent-based enterprise security using dynamic learning of network segment prefixes
[patent_app_type] => utility
[patent_app_number] => 17/301278
[patent_app_country] => US
[patent_app_date] => 2021-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11604
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17301278
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/301278 | Intent-based enterprise security using dynamic learning of network segment prefixes | Mar 29, 2021 | Issued |
Array
(
[id] => 19445516
[patent_doc_number] => 12095817
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-09-17
[patent_title] => Intent-based enterprise security using dynamic learning of network segment prefixes
[patent_app_type] => utility
[patent_app_number] => 17/301278
[patent_app_country] => US
[patent_app_date] => 2021-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11604
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17301278
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/301278 | Intent-based enterprise security using dynamic learning of network segment prefixes | Mar 29, 2021 | Issued |
Array
(
[id] => 16965568
[patent_doc_number] => 20210217067
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-15
[patent_title] => SYSTEMS AND METHODS TO CONTROL ACCESS TO COMPONENTS OF VIRTUAL OBJECTS
[patent_app_type] => utility
[patent_app_number] => 17/214252
[patent_app_country] => US
[patent_app_date] => 2021-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9186
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17214252
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/214252 | Systems and methods to control access to components of virtual objects | Mar 25, 2021 | Issued |
Array
(
[id] => 16952603
[patent_doc_number] => 20210211295
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-08
[patent_title] => CONSENSUS VERIFICATION METHOD, APPARATUS, AND DEVICE
[patent_app_type] => utility
[patent_app_number] => 17/207278
[patent_app_country] => US
[patent_app_date] => 2021-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10182
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17207278
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/207278 | Consensus verification method, apparatus, and device | Mar 18, 2021 | Issued |
Array
(
[id] => 19199854
[patent_doc_number] => 11997113
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-28
[patent_title] => Treating data flows differently based on level of interest
[patent_app_type] => utility
[patent_app_number] => 17/187377
[patent_app_country] => US
[patent_app_date] => 2021-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 18813
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17187377
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/187377 | Treating data flows differently based on level of interest | Feb 25, 2021 | Issued |
Array
(
[id] => 16889863
[patent_doc_number] => 20210176061
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-10
[patent_title] => Providing Single Sign-On (SSO) in disjoint networks with non-overlapping authentication protocols
[patent_app_type] => utility
[patent_app_number] => 17/180821
[patent_app_country] => US
[patent_app_date] => 2021-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10445
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17180821
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/180821 | Providing single sign-on (SSO) in disjoint networks with non-overlapping authentication protocols | Feb 20, 2021 | Issued |
Array
(
[id] => 17401821
[patent_doc_number] => 20220043911
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-10
[patent_title] => METHOD AND SYSTEM FOR GENERATING A LIST OF INDICATORS OF COMPROMISE
[patent_app_type] => utility
[patent_app_number] => 17/178320
[patent_app_country] => US
[patent_app_date] => 2021-02-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12236
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 326
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17178320
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/178320 | Method and system for generating a list of indicators of compromise | Feb 17, 2021 | Issued |
Array
(
[id] => 17809652
[patent_doc_number] => 20220261487
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-18
[patent_title] => RISK-BASED ACCESS TO COMPUTING ENVIRONMENT SECRETS
[patent_app_type] => utility
[patent_app_number] => 17/176945
[patent_app_country] => US
[patent_app_date] => 2021-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23531
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17176945
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/176945 | Risk-based access to computing environment secrets | Feb 15, 2021 | Issued |
Array
(
[id] => 20306239
[patent_doc_number] => 12452244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-10-21
[patent_title] => Virtual service authorization
[patent_app_type] => utility
[patent_app_number] => 17/173584
[patent_app_country] => US
[patent_app_date] => 2021-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7083
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 332
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17173584
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/173584 | Virtual service authorization | Feb 10, 2021 | Issued |
Array
(
[id] => 17796643
[patent_doc_number] => 20220255735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-11
[patent_title] => BLINDING TECHNIQUES FOR POST-QUANTUM PUBLIC KEYS
[patent_app_type] => utility
[patent_app_number] => 17/170595
[patent_app_country] => US
[patent_app_date] => 2021-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11179
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17170595
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/170595 | BLINDING TECHNIQUES FOR POST-QUANTUM PUBLIC KEYS | Feb 7, 2021 | Abandoned |
Array
(
[id] => 17763694
[patent_doc_number] => 20220237306
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-28
[patent_title] => METHOD AND SYSTEM FOR LIMITING DATA ACCESSIBILITY IN COMPOSED SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 17/160597
[patent_app_country] => US
[patent_app_date] => 2021-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20550
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17160597
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/160597 | Method and system for limiting data accessibility in composed systems | Jan 27, 2021 | Issued |
Array
(
[id] => 19124292
[patent_doc_number] => 11968294
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-04-23
[patent_title] => Data management method and apparatus for blockchain system, medium, and electronic device
[patent_app_type] => utility
[patent_app_number] => 17/148258
[patent_app_country] => US
[patent_app_date] => 2021-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 17
[patent_no_of_words] => 12521
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 306
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17148258
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/148258 | Data management method and apparatus for blockchain system, medium, and electronic device | Jan 12, 2021 | Issued |
Array
(
[id] => 17724202
[patent_doc_number] => 20220216924
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-07
[patent_title] => SYSTEM AND METHOD FOR QUANTUM-ENABLED CYBER SECURITY IN A WIRELESS MOBILE NETWORK
[patent_app_type] => utility
[patent_app_number] => 17/140542
[patent_app_country] => US
[patent_app_date] => 2021-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17630
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17140542
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/140542 | System and method for quantum-enabled cyber security in a wireless mobile network | Jan 3, 2021 | Issued |
Array
(
[id] => 19278181
[patent_doc_number] => 12028316
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-07-02
[patent_title] => Automating IOT device identification using statistical payload fingerprints
[patent_app_type] => utility
[patent_app_number] => 17/133177
[patent_app_country] => US
[patent_app_date] => 2020-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 18
[patent_no_of_words] => 9545
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17133177
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/133177 | Automating IOT device identification using statistical payload fingerprints | Dec 22, 2020 | Issued |
Array
(
[id] => 16890398
[patent_doc_number] => 20210176596
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-10
[patent_title] => Peer-to-peer geolocation system
[patent_app_type] => utility
[patent_app_number] => 17/122506
[patent_app_country] => US
[patent_app_date] => 2020-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5511
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17122506
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/122506 | Peer-to-peer geolocation system | Dec 14, 2020 | Abandoned |
Array
(
[id] => 18493568
[patent_doc_number] => 11698986
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-07-11
[patent_title] => Decentralized encryption and decryption of blockchain data
[patent_app_type] => utility
[patent_app_number] => 17/119500
[patent_app_country] => US
[patent_app_date] => 2020-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12850
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17119500
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/119500 | Decentralized encryption and decryption of blockchain data | Dec 10, 2020 | Issued |
Array
(
[id] => 18925762
[patent_doc_number] => 20240028766
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-25
[patent_title] => TECHNIQUES FOR TIME-CONTROLLED USER DATA PRIVACY
[patent_app_type] => utility
[patent_app_number] => 18/255361
[patent_app_country] => US
[patent_app_date] => 2020-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 25591
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18255361
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/255361 | TECHNIQUES FOR TIME-CONTROLLED USER DATA PRIVACY | Dec 7, 2020 | Pending |
Array
(
[id] => 16675982
[patent_doc_number] => 20210064748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-04
[patent_title] => SYSTEM AND METHOD FOR DETECTING MALICIOUS FILES BY A USER COMPUTER
[patent_app_type] => utility
[patent_app_number] => 17/098706
[patent_app_country] => US
[patent_app_date] => 2020-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7930
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17098706
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/098706 | System and method for detecting malicious files by a user computer | Nov 15, 2020 | Issued |
Array
(
[id] => 16829262
[patent_doc_number] => 20210144555
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-13
[patent_title] => METHOD AND ELECTRONIC DEVICE FOR DETERMINING SECURITY THREAT ON RADIO ACCESS NETWORK
[patent_app_type] => utility
[patent_app_number] => 17/091275
[patent_app_country] => US
[patent_app_date] => 2020-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18750
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17091275
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/091275 | Method and electronic device for determining security threat on radio access network | Nov 5, 2020 | Issued |
Array
(
[id] => 16795003
[patent_doc_number] => 20210124820
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-29
[patent_title] => APPLICATION PROGRAM INTEGRITY VERIFICATION METHOD AND NETWORK DEVICE
[patent_app_type] => utility
[patent_app_number] => 17/090588
[patent_app_country] => US
[patent_app_date] => 2020-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6927
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17090588
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/090588 | APPLICATION PROGRAM INTEGRITY VERIFICATION METHOD AND NETWORK DEVICE | Nov 4, 2020 | Abandoned |