
Robert Fuatovich Tavlykaev
Examiner (ID: 3031, Phone: (571)270-5634 , Office: P/2883 )
| Most Active Art Unit | 2883 |
| Art Unit(s) | 2883, 2896 |
| Total Applications | 998 |
| Issued Applications | 608 |
| Pending Applications | 75 |
| Abandoned Applications | 346 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18480221
[patent_doc_number] => 11693962
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-04
[patent_title] => Malware clustering based on function call graph similarity
[patent_app_type] => utility
[patent_app_number] => 17/240284
[patent_app_country] => US
[patent_app_date] => 2021-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 14076
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17240284
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/240284 | Malware clustering based on function call graph similarity | Apr 25, 2021 | Issued |
Array
(
[id] => 17261261
[patent_doc_number] => 20210374246
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-02
[patent_title] => SYSTEMS AND METHODS FOR MANAGING CYBERSECURITY ALERTS
[patent_app_type] => utility
[patent_app_number] => 17/236594
[patent_app_country] => US
[patent_app_date] => 2021-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9184
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17236594
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/236594 | Systems and methods for managing cybersecurity alerts | Apr 20, 2021 | Issued |
Array
(
[id] => 18997889
[patent_doc_number] => 11914734
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-27
[patent_title] => System and method for protecting content
[patent_app_type] => utility
[patent_app_number] => 17/235753
[patent_app_country] => US
[patent_app_date] => 2021-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5985
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17235753
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/235753 | System and method for protecting content | Apr 19, 2021 | Issued |
Array
(
[id] => 16965153
[patent_doc_number] => 20210216652
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-15
[patent_title] => Document-Level Attribute-Based Access Control
[patent_app_type] => utility
[patent_app_number] => 17/217589
[patent_app_country] => US
[patent_app_date] => 2021-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6368
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17217589
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/217589 | Document-level attribute-based access control | Mar 29, 2021 | Issued |
Array
(
[id] => 18858512
[patent_doc_number] => 11856115
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-26
[patent_title] => Physical unclonable function (PUF) security key generation
[patent_app_type] => utility
[patent_app_number] => 17/215765
[patent_app_country] => US
[patent_app_date] => 2021-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 4608
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17215765
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/215765 | Physical unclonable function (PUF) security key generation | Mar 28, 2021 | Issued |
Array
(
[id] => 17289705
[patent_doc_number] => 11206277
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-12-21
[patent_title] => Method and apparatus for detecting abnormal behavior in network
[patent_app_type] => utility
[patent_app_number] => 17/200622
[patent_app_country] => US
[patent_app_date] => 2021-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7503
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17200622
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/200622 | Method and apparatus for detecting abnormal behavior in network | Mar 11, 2021 | Issued |
Array
(
[id] => 17017375
[patent_doc_number] => 11087017
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-08-10
[patent_title] => Systems, methods, and computer-readable media for utilizing anonymous sharding techniques to protect distributed data
[patent_app_type] => utility
[patent_app_number] => 17/196400
[patent_app_country] => US
[patent_app_date] => 2021-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7728
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17196400
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/196400 | Systems, methods, and computer-readable media for utilizing anonymous sharding techniques to protect distributed data | Mar 8, 2021 | Issued |
Array
(
[id] => 18561851
[patent_doc_number] => 11727096
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-08-15
[patent_title] => User interface competence based authentication
[patent_app_type] => utility
[patent_app_number] => 17/185561
[patent_app_country] => US
[patent_app_date] => 2021-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4675
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17185561
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/185561 | User interface competence based authentication | Feb 24, 2021 | Issued |
Array
(
[id] => 18805647
[patent_doc_number] => 11838824
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-05
[patent_title] => Remote and shared access for network connected devices
[patent_app_type] => utility
[patent_app_number] => 17/183534
[patent_app_country] => US
[patent_app_date] => 2021-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 14487
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17183534
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/183534 | Remote and shared access for network connected devices | Feb 23, 2021 | Issued |
Array
(
[id] => 19198410
[patent_doc_number] => 11995650
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-28
[patent_title] => Method, device and system for verifying virtual code based on sphere
[patent_app_type] => utility
[patent_app_number] => 17/170698
[patent_app_country] => US
[patent_app_date] => 2021-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 20014
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17170698
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/170698 | Method, device and system for verifying virtual code based on sphere | Feb 7, 2021 | Issued |
Array
(
[id] => 18918156
[patent_doc_number] => 11880435
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-01-23
[patent_title] => Determination of intermediate representations of discovered document structures
[patent_app_type] => utility
[patent_app_number] => 17/167316
[patent_app_country] => US
[patent_app_date] => 2021-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7032
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17167316
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/167316 | Determination of intermediate representations of discovered document structures | Feb 3, 2021 | Issued |
Array
(
[id] => 17320334
[patent_doc_number] => 20210409384
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-30
[patent_title] => PORT LEVEL POLICY ISOLATION IN OVERLAY NETWORKS
[patent_app_type] => utility
[patent_app_number] => 17/164488
[patent_app_country] => US
[patent_app_date] => 2021-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16981
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17164488
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/164488 | Port level policy isolation in overlay networks | Jan 31, 2021 | Issued |
Array
(
[id] => 17560141
[patent_doc_number] => 11316875
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-26
[patent_title] => Method and system for analyzing cybersecurity threats and improving defensive intelligence
[patent_app_type] => utility
[patent_app_number] => 17/162483
[patent_app_country] => US
[patent_app_date] => 2021-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 11109
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17162483
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/162483 | Method and system for analyzing cybersecurity threats and improving defensive intelligence | Jan 28, 2021 | Issued |
Array
(
[id] => 19182731
[patent_doc_number] => 11989320
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-21
[patent_title] => Hidden electronic file system within non-hidden electronic file system
[patent_app_type] => utility
[patent_app_number] => 17/156946
[patent_app_country] => US
[patent_app_date] => 2021-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 4656
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17156946
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/156946 | Hidden electronic file system within non-hidden electronic file system | Jan 24, 2021 | Issued |
Array
(
[id] => 17710160
[patent_doc_number] => 20220210168
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-30
[patent_title] => FACILITATING IDENTIFICATION OF COMPROMISED DEVICES BY NETWORK ACCESS CONTROL (NAC) OR UNIFIED THREAT MANAGEMENT (UTM) SECURITY SERVICES BY LEVERAGING CONTEXT FROM AN ENDPOINT DETECTION AND RESPONSE (EDR) AGENT
[patent_app_type] => utility
[patent_app_number] => 17/139896
[patent_app_country] => US
[patent_app_date] => 2020-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8605
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17139896
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/139896 | Facilitating identification of compromised devices by network access control (NAC) or unified threat management (UTM) security services by leveraging context from an endpoint detection and response (EDR) agent | Dec 30, 2020 | Issued |
Array
(
[id] => 16859513
[patent_doc_number] => 20210160258
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-27
[patent_title] => THREAT MITIGATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 17/105125
[patent_app_country] => US
[patent_app_date] => 2020-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 26341
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 47
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17105125
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/105125 | Threat mitigation system and method | Nov 24, 2020 | Issued |
Array
(
[id] => 17478674
[patent_doc_number] => 20220086178
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-17
[patent_title] => EFFICIENT MONITORING OF NETWORK ACTIVITY IN A CLOUD COMPUTING ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 17/018355
[patent_app_country] => US
[patent_app_date] => 2020-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11751
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17018355
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/018355 | Efficient monitoring of network activity in a cloud computing environment | Sep 10, 2020 | Issued |
Array
(
[id] => 16678760
[patent_doc_number] => 20210067526
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-04
[patent_title] => SECURITY MONITORING AT OPERATING SYSTEM KERNEL LEVEL
[patent_app_type] => utility
[patent_app_number] => 16/991592
[patent_app_country] => US
[patent_app_date] => 2020-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18879
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16991592
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/991592 | Security monitoring at operating system kernel level | Aug 11, 2020 | Issued |
Array
(
[id] => 18549146
[patent_doc_number] => 11722510
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-08
[patent_title] => Monitoring and preventing remote user automated cyber attacks
[patent_app_type] => utility
[patent_app_number] => 16/988863
[patent_app_country] => US
[patent_app_date] => 2020-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 12322
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16988863
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/988863 | Monitoring and preventing remote user automated cyber attacks | Aug 9, 2020 | Issued |
Array
(
[id] => 18001941
[patent_doc_number] => 11503063
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-15
[patent_title] => Systems and methods for detecting hidden vulnerabilities in enterprise networks
[patent_app_type] => utility
[patent_app_number] => 16/985605
[patent_app_country] => US
[patent_app_date] => 2020-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 11016
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985605
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/985605 | Systems and methods for detecting hidden vulnerabilities in enterprise networks | Aug 4, 2020 | Issued |