Search

Robert Fuatovich Tavlykaev

Examiner (ID: 3031, Phone: (571)270-5634 , Office: P/2883 )

Most Active Art Unit
2883
Art Unit(s)
2883, 2896
Total Applications
998
Issued Applications
608
Pending Applications
75
Abandoned Applications
346

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 18480221 [patent_doc_number] => 11693962 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-07-04 [patent_title] => Malware clustering based on function call graph similarity [patent_app_type] => utility [patent_app_number] => 17/240284 [patent_app_country] => US [patent_app_date] => 2021-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 14076 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 233 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17240284 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/240284
Malware clustering based on function call graph similarity Apr 25, 2021 Issued
Array ( [id] => 17261261 [patent_doc_number] => 20210374246 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-12-02 [patent_title] => SYSTEMS AND METHODS FOR MANAGING CYBERSECURITY ALERTS [patent_app_type] => utility [patent_app_number] => 17/236594 [patent_app_country] => US [patent_app_date] => 2021-04-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9184 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 112 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17236594 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/236594
Systems and methods for managing cybersecurity alerts Apr 20, 2021 Issued
Array ( [id] => 18997889 [patent_doc_number] => 11914734 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-02-27 [patent_title] => System and method for protecting content [patent_app_type] => utility [patent_app_number] => 17/235753 [patent_app_country] => US [patent_app_date] => 2021-04-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5985 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17235753 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/235753
System and method for protecting content Apr 19, 2021 Issued
Array ( [id] => 16965153 [patent_doc_number] => 20210216652 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-07-15 [patent_title] => Document-Level Attribute-Based Access Control [patent_app_type] => utility [patent_app_number] => 17/217589 [patent_app_country] => US [patent_app_date] => 2021-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6368 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17217589 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/217589
Document-level attribute-based access control Mar 29, 2021 Issued
Array ( [id] => 18858512 [patent_doc_number] => 11856115 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-12-26 [patent_title] => Physical unclonable function (PUF) security key generation [patent_app_type] => utility [patent_app_number] => 17/215765 [patent_app_country] => US [patent_app_date] => 2021-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 4608 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 63 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17215765 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/215765
Physical unclonable function (PUF) security key generation Mar 28, 2021 Issued
Array ( [id] => 17289705 [patent_doc_number] => 11206277 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-12-21 [patent_title] => Method and apparatus for detecting abnormal behavior in network [patent_app_type] => utility [patent_app_number] => 17/200622 [patent_app_country] => US [patent_app_date] => 2021-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7503 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 212 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17200622 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/200622
Method and apparatus for detecting abnormal behavior in network Mar 11, 2021 Issued
Array ( [id] => 17017375 [patent_doc_number] => 11087017 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-08-10 [patent_title] => Systems, methods, and computer-readable media for utilizing anonymous sharding techniques to protect distributed data [patent_app_type] => utility [patent_app_number] => 17/196400 [patent_app_country] => US [patent_app_date] => 2021-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7728 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17196400 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/196400
Systems, methods, and computer-readable media for utilizing anonymous sharding techniques to protect distributed data Mar 8, 2021 Issued
Array ( [id] => 18561851 [patent_doc_number] => 11727096 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2023-08-15 [patent_title] => User interface competence based authentication [patent_app_type] => utility [patent_app_number] => 17/185561 [patent_app_country] => US [patent_app_date] => 2021-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4675 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 80 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17185561 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/185561
User interface competence based authentication Feb 24, 2021 Issued
Array ( [id] => 18805647 [patent_doc_number] => 11838824 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-12-05 [patent_title] => Remote and shared access for network connected devices [patent_app_type] => utility [patent_app_number] => 17/183534 [patent_app_country] => US [patent_app_date] => 2021-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 14487 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17183534 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/183534
Remote and shared access for network connected devices Feb 23, 2021 Issued
Array ( [id] => 19198410 [patent_doc_number] => 11995650 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-05-28 [patent_title] => Method, device and system for verifying virtual code based on sphere [patent_app_type] => utility [patent_app_number] => 17/170698 [patent_app_country] => US [patent_app_date] => 2021-02-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 14 [patent_no_of_words] => 20014 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17170698 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/170698
Method, device and system for verifying virtual code based on sphere Feb 7, 2021 Issued
Array ( [id] => 18918156 [patent_doc_number] => 11880435 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-01-23 [patent_title] => Determination of intermediate representations of discovered document structures [patent_app_type] => utility [patent_app_number] => 17/167316 [patent_app_country] => US [patent_app_date] => 2021-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7032 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17167316 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/167316
Determination of intermediate representations of discovered document structures Feb 3, 2021 Issued
Array ( [id] => 17320334 [patent_doc_number] => 20210409384 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-12-30 [patent_title] => PORT LEVEL POLICY ISOLATION IN OVERLAY NETWORKS [patent_app_type] => utility [patent_app_number] => 17/164488 [patent_app_country] => US [patent_app_date] => 2021-02-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 16981 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => 0 [patent_words_short_claim] => 285 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17164488 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/164488
Port level policy isolation in overlay networks Jan 31, 2021 Issued
Array ( [id] => 17560141 [patent_doc_number] => 11316875 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-04-26 [patent_title] => Method and system for analyzing cybersecurity threats and improving defensive intelligence [patent_app_type] => utility [patent_app_number] => 17/162483 [patent_app_country] => US [patent_app_date] => 2021-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 11109 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17162483 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/162483
Method and system for analyzing cybersecurity threats and improving defensive intelligence Jan 28, 2021 Issued
Array ( [id] => 19182731 [patent_doc_number] => 11989320 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-05-21 [patent_title] => Hidden electronic file system within non-hidden electronic file system [patent_app_type] => utility [patent_app_number] => 17/156946 [patent_app_country] => US [patent_app_date] => 2021-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 4656 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17156946 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/156946
Hidden electronic file system within non-hidden electronic file system Jan 24, 2021 Issued
Array ( [id] => 17710160 [patent_doc_number] => 20220210168 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-06-30 [patent_title] => FACILITATING IDENTIFICATION OF COMPROMISED DEVICES BY NETWORK ACCESS CONTROL (NAC) OR UNIFIED THREAT MANAGEMENT (UTM) SECURITY SERVICES BY LEVERAGING CONTEXT FROM AN ENDPOINT DETECTION AND RESPONSE (EDR) AGENT [patent_app_type] => utility [patent_app_number] => 17/139896 [patent_app_country] => US [patent_app_date] => 2020-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8605 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17139896 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/139896
Facilitating identification of compromised devices by network access control (NAC) or unified threat management (UTM) security services by leveraging context from an endpoint detection and response (EDR) agent Dec 30, 2020 Issued
Array ( [id] => 16859513 [patent_doc_number] => 20210160258 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-05-27 [patent_title] => THREAT MITIGATION SYSTEM AND METHOD [patent_app_type] => utility [patent_app_number] => 17/105125 [patent_app_country] => US [patent_app_date] => 2020-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 26341 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 47 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17105125 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/105125
Threat mitigation system and method Nov 24, 2020 Issued
Array ( [id] => 17478674 [patent_doc_number] => 20220086178 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-17 [patent_title] => EFFICIENT MONITORING OF NETWORK ACTIVITY IN A CLOUD COMPUTING ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 17/018355 [patent_app_country] => US [patent_app_date] => 2020-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11751 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17018355 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/018355
Efficient monitoring of network activity in a cloud computing environment Sep 10, 2020 Issued
Array ( [id] => 16678760 [patent_doc_number] => 20210067526 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-04 [patent_title] => SECURITY MONITORING AT OPERATING SYSTEM KERNEL LEVEL [patent_app_type] => utility [patent_app_number] => 16/991592 [patent_app_country] => US [patent_app_date] => 2020-08-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18879 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16991592 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/991592
Security monitoring at operating system kernel level Aug 11, 2020 Issued
Array ( [id] => 18549146 [patent_doc_number] => 11722510 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-08-08 [patent_title] => Monitoring and preventing remote user automated cyber attacks [patent_app_type] => utility [patent_app_number] => 16/988863 [patent_app_country] => US [patent_app_date] => 2020-08-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 11 [patent_no_of_words] => 12322 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16988863 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/988863
Monitoring and preventing remote user automated cyber attacks Aug 9, 2020 Issued
Array ( [id] => 18001941 [patent_doc_number] => 11503063 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-11-15 [patent_title] => Systems and methods for detecting hidden vulnerabilities in enterprise networks [patent_app_type] => utility [patent_app_number] => 16/985605 [patent_app_country] => US [patent_app_date] => 2020-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 11016 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 90 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985605 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/985605
Systems and methods for detecting hidden vulnerabilities in enterprise networks Aug 4, 2020 Issued
Menu