
Meng Li
Examiner (ID: 7488, Phone: (571)272-8729 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2496, 2437 |
| Total Applications | 645 |
| Issued Applications | 526 |
| Pending Applications | 70 |
| Abandoned Applications | 67 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20292031
[patent_doc_number] => 20250317274
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-10-09
[patent_title] => PARTIALLY HOMOMORPHIC ENCRYPTION (PHE) IN DISTRIBUTED 1-BIT LARGE LANGUAGE MODEL (LLM) ARCHITECTURE
[patent_app_type] => utility
[patent_app_number] => 19/169111
[patent_app_country] => US
[patent_app_date] => 2025-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4749
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19169111
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/169111 | PARTIALLY HOMOMORPHIC ENCRYPTION (PHE) IN DISTRIBUTED 1-BIT LARGE LANGUAGE MODEL (LLM) ARCHITECTURE | Apr 2, 2025 | Issued |
Array
(
[id] => 20244849
[patent_doc_number] => 12425185
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-23
[patent_title] => Confidential computing-based method for customizedly balancing between security and performance of homomorphic encryption
[patent_app_type] => utility
[patent_app_number] => 19/004215
[patent_app_country] => US
[patent_app_date] => 2024-12-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1370
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19004215
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/004215 | Confidential computing-based method for customizedly balancing between security and performance of homomorphic encryption | Dec 27, 2024 | Issued |
Array
(
[id] => 19944596
[patent_doc_number] => 12316741
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-27
[patent_title] => Adaptive homomorphic encryption method based on trusted execution environment
[patent_app_type] => utility
[patent_app_number] => 18/946352
[patent_app_country] => US
[patent_app_date] => 2024-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 0
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 372
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18946352
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/946352 | Adaptive homomorphic encryption method based on trusted execution environment | Nov 12, 2024 | Issued |
Array
(
[id] => 19944596
[patent_doc_number] => 12316741
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-27
[patent_title] => Adaptive homomorphic encryption method based on trusted execution environment
[patent_app_type] => utility
[patent_app_number] => 18/946352
[patent_app_country] => US
[patent_app_date] => 2024-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 0
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 372
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18946352
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/946352 | Adaptive homomorphic encryption method based on trusted execution environment | Nov 12, 2024 | Issued |
Array
(
[id] => 19703560
[patent_doc_number] => 12197591
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-01-14
[patent_title] => System and method for real-time detection of unrestricted file upload vulnerabilities in Node.js applications
[patent_app_type] => utility
[patent_app_number] => 18/807438
[patent_app_country] => US
[patent_app_date] => 2024-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 3545
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18807438
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/807438 | System and method for real-time detection of unrestricted file upload vulnerabilities in Node.js applications | Aug 15, 2024 | Issued |
Array
(
[id] => 20251937
[patent_doc_number] => 20250300806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-25
[patent_title] => A METHOD OF OPTIMIZING LINEAR TRANSFORMATION
[patent_app_type] => utility
[patent_app_number] => 18/789018
[patent_app_country] => US
[patent_app_date] => 2024-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4131
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18789018
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/789018 | A METHOD OF OPTIMIZING LINEAR TRANSFORMATION | Jul 29, 2024 | Pending |
Array
(
[id] => 19772249
[patent_doc_number] => 20250053675
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-13
[patent_title] => DATABASE-BASED DATA PROCESSING METHOD AND DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/784151
[patent_app_country] => US
[patent_app_date] => 2024-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8802
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18784151
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/784151 | DATABASE-BASED DATA PROCESSING METHOD AND DEVICE | Jul 24, 2024 | Pending |
Array
(
[id] => 19591023
[patent_doc_number] => 20240388580
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-21
[patent_title] => Method and System for Detecting Two-Factor Authentication
[patent_app_type] => utility
[patent_app_number] => 18/784410
[patent_app_country] => US
[patent_app_date] => 2024-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8039
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18784410
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/784410 | Method and System for Detecting Two-Factor Authentication | Jul 24, 2024 | Pending |
Array
(
[id] => 19772249
[patent_doc_number] => 20250053675
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-13
[patent_title] => DATABASE-BASED DATA PROCESSING METHOD AND DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/784151
[patent_app_country] => US
[patent_app_date] => 2024-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8802
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18784151
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/784151 | DATABASE-BASED DATA PROCESSING METHOD AND DEVICE | Jul 24, 2024 | Pending |
Array
(
[id] => 19713565
[patent_doc_number] => 20250023707
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-16
[patent_title] => METHOD AND DEVICE WITH HOMOMORPHIC ENCRYPTION OPERATION
[patent_app_type] => utility
[patent_app_number] => 18/768933
[patent_app_country] => US
[patent_app_date] => 2024-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10174
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18768933
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/768933 | METHOD AND DEVICE WITH HOMOMORPHIC ENCRYPTION OPERATION | Jul 9, 2024 | Pending |
Array
(
[id] => 19713565
[patent_doc_number] => 20250023707
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-16
[patent_title] => METHOD AND DEVICE WITH HOMOMORPHIC ENCRYPTION OPERATION
[patent_app_type] => utility
[patent_app_number] => 18/768933
[patent_app_country] => US
[patent_app_date] => 2024-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10174
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18768933
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/768933 | METHOD AND DEVICE WITH HOMOMORPHIC ENCRYPTION OPERATION | Jul 9, 2024 | Pending |
Array
(
[id] => 20020579
[patent_doc_number] => 20250158801
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-15
[patent_title] => DECOUPLED MULTI-PARTY REVERSIBLE DATA HIDING METHOD IN ENCRYPTED DOMAIN
[patent_app_type] => utility
[patent_app_number] => 18/747692
[patent_app_country] => US
[patent_app_date] => 2024-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 0
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 305
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18747692
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/747692 | DECOUPLED MULTI-PARTY REVERSIBLE DATA HIDING METHOD IN ENCRYPTED DOMAIN | Jun 18, 2024 | Pending |
Array
(
[id] => 19501141
[patent_doc_number] => 20240340159
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => ENHANCED ENCRYPTION FOR FACE-RELATED DATA
[patent_app_type] => utility
[patent_app_number] => 18/744901
[patent_app_country] => US
[patent_app_date] => 2024-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13237
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18744901
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/744901 | ENHANCED ENCRYPTION FOR FACE-RELATED DATA | Jun 16, 2024 | Pending |
Array
(
[id] => 19482395
[patent_doc_number] => 20240330437
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-03
[patent_title] => LOGGING FROM USER-DEFINED FUNCTIONS
[patent_app_type] => utility
[patent_app_number] => 18/737362
[patent_app_country] => US
[patent_app_date] => 2024-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12339
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18737362
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/737362 | LOGGING FROM USER-DEFINED FUNCTIONS | Jun 6, 2024 | Pending |
Array
(
[id] => 19633445
[patent_doc_number] => 20240411894
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-12
[patent_title] => SYSTEMS AND METHODS FOR VULNERABILITY REMEDIATION BASED ON AGGREGATE RISK AND SHARED CHARACTERISTICS
[patent_app_type] => utility
[patent_app_number] => 18/732756
[patent_app_country] => US
[patent_app_date] => 2024-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9869
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18732756
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/732756 | SYSTEMS AND METHODS FOR VULNERABILITY REMEDIATION BASED ON AGGREGATE RISK AND SHARED CHARACTERISTICS | Jun 3, 2024 | Pending |
Array
(
[id] => 20166877
[patent_doc_number] => 20250258924
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-14
[patent_title] => AGENTLESS RUNTIME CYBERSECURITY ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 18/662448
[patent_app_country] => US
[patent_app_date] => 2024-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6251
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18662448
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/662448 | AGENTLESS RUNTIME CYBERSECURITY ANALYSIS | May 12, 2024 | Pending |
Array
(
[id] => 20323510
[patent_doc_number] => 20250335598
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-10-30
[patent_title] => Vulnerability Remediation using an Autonomous Artificial-Intelligence Application
[patent_app_type] => utility
[patent_app_number] => 18/650029
[patent_app_country] => US
[patent_app_date] => 2024-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2043
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18650029
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/650029 | Vulnerability Remediation using an Autonomous Artificial-Intelligence Application | Apr 28, 2024 | Pending |
Array
(
[id] => 20298534
[patent_doc_number] => 20250323777
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-10-16
[patent_title] => HYBRID MACHINE LEARNING MODEL ENVIRONMENT WITH HOMOMORPHIC ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 18/635279
[patent_app_country] => US
[patent_app_date] => 2024-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4175
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18635279
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/635279 | HYBRID MACHINE LEARNING MODEL ENVIRONMENT WITH HOMOMORPHIC ENCRYPTION | Apr 14, 2024 | Pending |
Array
(
[id] => 19849247
[patent_doc_number] => 20250094598
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-20
[patent_title] => Managing Implementation Of Application-Code Scanning Processes
[patent_app_type] => utility
[patent_app_number] => 18/627259
[patent_app_country] => US
[patent_app_date] => 2024-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12637
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18627259
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/627259 | Managing Implementation Of Application-Code Scanning Processes | Apr 3, 2024 | Pending |
Array
(
[id] => 19849247
[patent_doc_number] => 20250094598
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-20
[patent_title] => Managing Implementation Of Application-Code Scanning Processes
[patent_app_type] => utility
[patent_app_number] => 18/627259
[patent_app_country] => US
[patent_app_date] => 2024-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12637
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18627259
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/627259 | Managing Implementation Of Application-Code Scanning Processes | Apr 3, 2024 | Pending |