
Paul R. Fisher
Examiner (ID: 17490)
| Most Active Art Unit | 3689 |
| Art Unit(s) | 3689, 2498 |
| Total Applications | 551 |
| Issued Applications | 127 |
| Pending Applications | 44 |
| Abandoned Applications | 391 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20513524
[patent_doc_number] => 20260037625
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-02-05
[patent_title] => MODEL PERFORMANCE EVALUATION
[patent_app_type] => utility
[patent_app_number] => 19/222328
[patent_app_country] => US
[patent_app_date] => 2025-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3666
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19222328
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/222328 | MODEL PERFORMANCE EVALUATION | May 28, 2025 | Pending |
Array
(
[id] => 19756814
[patent_doc_number] => 20250045379
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-06
[patent_title] => SYSTEMS AND METHODS FOR CONTEXTUAL ALERT ENRICHMENT IN COMPUTING INFRASTRUCTURE AND REMEDIATION THEREOF
[patent_app_type] => utility
[patent_app_number] => 18/923095
[patent_app_country] => US
[patent_app_date] => 2024-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8903
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18923095
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/923095 | Systems and methods for contextual alert enrichment in computing infrastructure and remediation thereof | Oct 21, 2024 | Issued |
Array
(
[id] => 20070930
[patent_doc_number] => 20250209152
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-26
[patent_title] => METHOD FOR DEVICE SHARING CONNECTION, ELECTRONIC DEVICE, AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/907239
[patent_app_country] => US
[patent_app_date] => 2024-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7401
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18907239
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/907239 | METHOD FOR DEVICE SHARING CONNECTION, ELECTRONIC DEVICE, AND STORAGE MEDIUM | Oct 3, 2024 | Pending |
Array
(
[id] => 20543799
[patent_doc_number] => 20260050690
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-02-19
[patent_title] => Trusted Execution Environment for a Measurement Platform
[patent_app_type] => utility
[patent_app_number] => 18/907066
[patent_app_country] => US
[patent_app_date] => 2024-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2292
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18907066
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/907066 | Trusted Execution Environment for a Measurement Platform | Oct 3, 2024 | Pending |
Array
(
[id] => 20631025
[patent_doc_number] => 20260095314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-04-02
[patent_title] => DISTRIBUTED MANAGEMENT OF BLUEPRINTS
[patent_app_type] => utility
[patent_app_number] => 18/901129
[patent_app_country] => US
[patent_app_date] => 2024-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4575
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18901129
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/901129 | DISTRIBUTED MANAGEMENT OF BLUEPRINTS | Sep 29, 2024 | Pending |
Array
(
[id] => 20617060
[patent_doc_number] => 20260087160
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-03-26
[patent_title] => CATALOG SERVICE CONFIGURATION BASED ON A PRIVILEGE MODEL AND TWO-WAY SYNCHRONIZATION
[patent_app_type] => utility
[patent_app_number] => 18/893231
[patent_app_country] => US
[patent_app_date] => 2024-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18237
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18893231
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/893231 | CATALOG SERVICE CONFIGURATION BASED ON A PRIVILEGE MODEL AND TWO-WAY SYNCHRONIZATION | Sep 22, 2024 | Pending |
Array
(
[id] => 20520488
[patent_doc_number] => 20260044597
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-02-12
[patent_title] => IDENTIFYING DEVIATIONS OF SYSTEM OR ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 18/796579
[patent_app_country] => US
[patent_app_date] => 2024-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3193
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18796579
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/796579 | IDENTIFYING DEVIATIONS OF SYSTEM OR ENVIRONMENT | Aug 6, 2024 | Pending |
Array
(
[id] => 20513520
[patent_doc_number] => 20260037621
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-02-05
[patent_title] => Identifying Atypical Activity Involving an Entity in a Computer System
[patent_app_type] => utility
[patent_app_number] => 18/789389
[patent_app_country] => US
[patent_app_date] => 2024-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3679
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18789389
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/789389 | Identifying atypical activity involving an entity in a computer system | Jul 29, 2024 | Issued |
Array
(
[id] => 19795023
[patent_doc_number] => 12235972
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-02-25
[patent_title] => Security analysis method and system based on protocol state
[patent_app_type] => utility
[patent_app_number] => 18/767953
[patent_app_country] => US
[patent_app_date] => 2024-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 5092
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 463
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18767953
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/767953 | Security analysis method and system based on protocol state | Jul 8, 2024 | Issued |
Array
(
[id] => 19634383
[patent_doc_number] => 20240412832
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-12
[patent_title] => HEALTH CARE INFORMATION SYSTEM PROVIDING ADDITIONAL DATA FIELDS IN PATIENT DATA
[patent_app_type] => utility
[patent_app_number] => 18/750179
[patent_app_country] => US
[patent_app_date] => 2024-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13813
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18750179
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/750179 | Health care information system providing additional data fields in patient data | Jun 20, 2024 | Issued |
Array
(
[id] => 20689568
[patent_doc_number] => 12619718
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-05-05
[patent_title] => Detection and prevention of login attacks
[patent_app_type] => utility
[patent_app_number] => 18/604001
[patent_app_country] => US
[patent_app_date] => 2024-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 1101
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18604001
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/604001 | Detection and prevention of login attacks | Mar 12, 2024 | Issued |
Array
(
[id] => 20181388
[patent_doc_number] => 20250265346
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-21
[patent_title] => SOFTWARE BILL OF MATERIALS RISK ASSESSMENT BASED ON VULNERABILITY AND REMEDIATION HISTORY
[patent_app_type] => utility
[patent_app_number] => 18/442564
[patent_app_country] => US
[patent_app_date] => 2024-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3356
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18442564
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/442564 | SOFTWARE BILL OF MATERIALS RISK ASSESSMENT BASED ON VULNERABILITY AND REMEDIATION HISTORY | Feb 14, 2024 | Pending |
Array
(
[id] => 20181386
[patent_doc_number] => 20250265344
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-21
[patent_title] => MACHINE-LEARNING BASED POLICY TRANSLATION FOR SHIFT LEFT IAC SECURITY
[patent_app_type] => utility
[patent_app_number] => 18/442428
[patent_app_country] => US
[patent_app_date] => 2024-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1165
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18442428
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/442428 | MACHINE-LEARNING BASED POLICY TRANSLATION FOR SHIFT LEFT IAC SECURITY | Feb 14, 2024 | Pending |
Array
(
[id] => 20181387
[patent_doc_number] => 20250265345
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-21
[patent_title] => Vulnerability Defense System for Large Language Models
[patent_app_type] => utility
[patent_app_number] => 18/442531
[patent_app_country] => US
[patent_app_date] => 2024-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1126
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18442531
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/442531 | Vulnerability Defense System for Large Language Models | Feb 14, 2024 | Pending |
Array
(
[id] => 19205222
[patent_doc_number] => 20240177121
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-30
[patent_title] => VEHICLE TELEMATICS SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 18/431328
[patent_app_country] => US
[patent_app_date] => 2024-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14405
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18431328
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/431328 | Vehicle telematics systems and methods | Feb 1, 2024 | Issued |
Array
(
[id] => 19347712
[patent_doc_number] => 20240256676
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-01
[patent_title] => METHOD FOR IDENTIFYING ONE OR MORE EXPLOITABLE VULNERABILITIES IN DEVICE FIRMWARE OF AN IOT DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/428318
[patent_app_country] => US
[patent_app_date] => 2024-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6026
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18428318
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/428318 | METHOD FOR IDENTIFYING ONE OR MORE EXPLOITABLE VULNERABILITIES IN DEVICE FIRMWARE OF AN IOT DEVICE | Jan 30, 2024 | Pending |
Array
(
[id] => 20537763
[patent_doc_number] => 12554840
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-02-17
[patent_title] => System and method for integrating machine learning optimizations into a storage system datapath
[patent_app_type] => utility
[patent_app_number] => 18/425127
[patent_app_country] => US
[patent_app_date] => 2024-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3686
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18425127
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/425127 | System and method for integrating machine learning optimizations into a storage system datapath | Jan 28, 2024 | Issued |
Array
(
[id] => 19899611
[patent_doc_number] => 12277535
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-04-15
[patent_title] => Machine learning based vehicle service recommendation system
[patent_app_type] => utility
[patent_app_number] => 18/421029
[patent_app_country] => US
[patent_app_date] => 2024-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 1213
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18421029
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/421029 | Machine learning based vehicle service recommendation system | Jan 23, 2024 | Issued |
Array
(
[id] => 20123497
[patent_doc_number] => 20250238528
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-07-24
[patent_title] => ENCRYPTING DATA AT REST AND DATA IN MOTION WITH TRUSTWORTHY ENERGY AWARENESS
[patent_app_type] => utility
[patent_app_number] => 18/421167
[patent_app_country] => US
[patent_app_date] => 2024-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1150
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18421167
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/421167 | ENCRYPTING DATA AT REST AND DATA IN MOTION WITH TRUSTWORTHY ENERGY AWARENESS | Jan 23, 2024 | Pending |
Array
(
[id] => 20123490
[patent_doc_number] => 20250238521
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-07-24
[patent_title] => DETECTING SECURITY ISSUES IN FORKED PROJECTS
[patent_app_type] => utility
[patent_app_number] => 18/420627
[patent_app_country] => US
[patent_app_date] => 2024-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15245
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18420627
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/420627 | Detecting security issues in forked projects | Jan 22, 2024 | Issued |