
Roderick Tolentino
Examiner (ID: 11687, Phone: (571)272-2661 , Office: P/2439 )
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2439, 2134, 2434 |
| Total Applications | 891 |
| Issued Applications | 666 |
| Pending Applications | 60 |
| Abandoned Applications | 188 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19671903
[patent_doc_number] => 12184687
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-12-31
[patent_title] => Techniques for mapping security controls to cyber threats
[patent_app_type] => utility
[patent_app_number] => 18/649492
[patent_app_country] => US
[patent_app_date] => 2024-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11341
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18649492
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/649492 | Techniques for mapping security controls to cyber threats | Apr 28, 2024 | Issued |
Array
(
[id] => 19671902
[patent_doc_number] => 12184686
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-12-31
[patent_title] => IOT device inspection method, and device therefor
[patent_app_type] => utility
[patent_app_number] => 18/647831
[patent_app_country] => US
[patent_app_date] => 2024-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 20
[patent_no_of_words] => 5437
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 416
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18647831
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/647831 | IOT device inspection method, and device therefor | Apr 25, 2024 | Issued |
Array
(
[id] => 19393938
[patent_doc_number] => 20240283808
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-22
[patent_title] => SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTS
[patent_app_type] => utility
[patent_app_number] => 18/628581
[patent_app_country] => US
[patent_app_date] => 2024-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 56746
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18628581
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/628581 | Systems and methods for dynamic valuation of protection products | Apr 4, 2024 | Issued |
Array
(
[id] => 20285126
[patent_doc_number] => 20250310368
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-10-02
[patent_title] => System and Method for Determining Network Pathway Security Vulnerabilities
[patent_app_type] => utility
[patent_app_number] => 18/624317
[patent_app_country] => US
[patent_app_date] => 2024-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1164
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18624317
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/624317 | System and Method for Determining Network Pathway Security Vulnerabilities | Apr 1, 2024 | Pending |
Array
(
[id] => 19766728
[patent_doc_number] => 12225037
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-02-11
[patent_title] => Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context
[patent_app_type] => utility
[patent_app_number] => 18/621304
[patent_app_country] => US
[patent_app_date] => 2024-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10099
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18621304
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/621304 | Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context | Mar 28, 2024 | Issued |
Array
(
[id] => 20285119
[patent_doc_number] => 20250310361
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-10-02
[patent_title] => DEDUPLICATION OF ENDPOINT CONNECTIONS
[patent_app_type] => utility
[patent_app_number] => 18/617404
[patent_app_country] => US
[patent_app_date] => 2024-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12053
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18617404
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/617404 | DEDUPLICATION OF ENDPOINT CONNECTIONS | Mar 25, 2024 | Pending |
Array
(
[id] => 19454001
[patent_doc_number] => 20240314131
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-19
[patent_title] => ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE
[patent_app_type] => utility
[patent_app_number] => 18/603590
[patent_app_country] => US
[patent_app_date] => 2024-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10494
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18603590
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/603590 | Access gateway system for accessing a resource | Mar 12, 2024 | Issued |
Array
(
[id] => 20055015
[patent_doc_number] => 20250193237
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-12
[patent_title] => METHOD FOR DETERMINING FALSE FLAGS OF CYBER ATTACKS AND APPARATUS FOR EXECUTING THE METHOD
[patent_app_type] => utility
[patent_app_number] => 18/841556
[patent_app_country] => US
[patent_app_date] => 2024-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2716
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18841556
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/841556 | Method for determining false flags of cyber attacks and apparatus for executing the method | Mar 11, 2024 | Issued |
Array
(
[id] => 19437166
[patent_doc_number] => 20240305664
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-12
[patent_title] => CYBERSECURITY OPERATIONS MITIGATION MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 18/601572
[patent_app_country] => US
[patent_app_date] => 2024-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18217
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18601572
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/601572 | CYBERSECURITY OPERATIONS MITIGATION MANAGEMENT | Mar 10, 2024 | Pending |
Array
(
[id] => 19748567
[patent_doc_number] => 20250037132
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => TRUST PLATFORM
[patent_app_type] => utility
[patent_app_number] => 18/599550
[patent_app_country] => US
[patent_app_date] => 2024-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11264
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18599550
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/599550 | TRUST PLATFORM | Mar 7, 2024 | Pending |
Array
(
[id] => 20197753
[patent_doc_number] => 20250274463
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-28
[patent_title] => SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS
[patent_app_type] => utility
[patent_app_number] => 18/586982
[patent_app_country] => US
[patent_app_date] => 2024-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6623
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18586982
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/586982 | SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS | Feb 25, 2024 | Pending |
Array
(
[id] => 20197753
[patent_doc_number] => 20250274463
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-28
[patent_title] => SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS
[patent_app_type] => utility
[patent_app_number] => 18/586982
[patent_app_country] => US
[patent_app_date] => 2024-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6623
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18586982
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/586982 | SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS | Feb 25, 2024 | Pending |
Array
(
[id] => 20197753
[patent_doc_number] => 20250274463
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-28
[patent_title] => SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS
[patent_app_type] => utility
[patent_app_number] => 18/586982
[patent_app_country] => US
[patent_app_date] => 2024-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6623
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18586982
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/586982 | SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS | Feb 25, 2024 | Pending |
Array
(
[id] => 19408331
[patent_doc_number] => 20240291842
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-29
[patent_title] => THREAT MITIGATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 18/584994
[patent_app_country] => US
[patent_app_date] => 2024-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 48562
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18584994
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/584994 | THREAT MITIGATION SYSTEM AND METHOD | Feb 21, 2024 | Pending |
Array
(
[id] => 19408331
[patent_doc_number] => 20240291842
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-29
[patent_title] => THREAT MITIGATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 18/584994
[patent_app_country] => US
[patent_app_date] => 2024-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 48562
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18584994
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/584994 | THREAT MITIGATION SYSTEM AND METHOD | Feb 21, 2024 | Pending |
Array
(
[id] => 19214446
[patent_doc_number] => 12003528
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-06-04
[patent_title] => Endogenous dynamic defense architecture-based multi-objective service function chain deployment method
[patent_app_type] => utility
[patent_app_number] => 18/581424
[patent_app_country] => US
[patent_app_date] => 2024-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 5849
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 1094
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18581424
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/581424 | Endogenous dynamic defense architecture-based multi-objective service function chain deployment method | Feb 19, 2024 | Issued |
Array
(
[id] => 19267887
[patent_doc_number] => 20240211591
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-27
[patent_title] => AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS
[patent_app_type] => utility
[patent_app_number] => 18/432037
[patent_app_country] => US
[patent_app_date] => 2024-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12761
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18432037
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/432037 | AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS | Feb 3, 2024 | Issued |
Array
(
[id] => 19254261
[patent_doc_number] => 20240205258
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-20
[patent_title] => CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES
[patent_app_type] => utility
[patent_app_number] => 18/427616
[patent_app_country] => US
[patent_app_date] => 2024-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12016
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18427616
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/427616 | CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES | Jan 29, 2024 | Pending |
Array
(
[id] => 19254261
[patent_doc_number] => 20240205258
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-20
[patent_title] => CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES
[patent_app_type] => utility
[patent_app_number] => 18/427616
[patent_app_country] => US
[patent_app_date] => 2024-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12016
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18427616
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/427616 | CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES | Jan 29, 2024 | Pending |
Array
(
[id] => 19640063
[patent_doc_number] => 12170682
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-12-17
[patent_title] => Application endpoint cybersecurity techniques
[patent_app_type] => utility
[patent_app_number] => 18/425847
[patent_app_country] => US
[patent_app_date] => 2024-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11733
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18425847
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/425847 | Application endpoint cybersecurity techniques | Jan 28, 2024 | Issued |