Search

Roderick Tolentino

Examiner (ID: 11687, Phone: (571)272-2661 , Office: P/2439 )

Most Active Art Unit
2439
Art Unit(s)
2439, 2134, 2434
Total Applications
891
Issued Applications
666
Pending Applications
60
Abandoned Applications
188

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 19671903 [patent_doc_number] => 12184687 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-12-31 [patent_title] => Techniques for mapping security controls to cyber threats [patent_app_type] => utility [patent_app_number] => 18/649492 [patent_app_country] => US [patent_app_date] => 2024-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11341 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 206 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18649492 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/649492
Techniques for mapping security controls to cyber threats Apr 28, 2024 Issued
Array ( [id] => 19671902 [patent_doc_number] => 12184686 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-12-31 [patent_title] => IOT device inspection method, and device therefor [patent_app_type] => utility [patent_app_number] => 18/647831 [patent_app_country] => US [patent_app_date] => 2024-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 20 [patent_no_of_words] => 5437 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 416 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18647831 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/647831
IOT device inspection method, and device therefor Apr 25, 2024 Issued
Array ( [id] => 19393938 [patent_doc_number] => 20240283808 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-22 [patent_title] => SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTS [patent_app_type] => utility [patent_app_number] => 18/628581 [patent_app_country] => US [patent_app_date] => 2024-04-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 56746 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18628581 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/628581
Systems and methods for dynamic valuation of protection products Apr 4, 2024 Issued
Array ( [id] => 20285126 [patent_doc_number] => 20250310368 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-10-02 [patent_title] => System and Method for Determining Network Pathway Security Vulnerabilities [patent_app_type] => utility [patent_app_number] => 18/624317 [patent_app_country] => US [patent_app_date] => 2024-04-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1164 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18624317 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/624317
System and Method for Determining Network Pathway Security Vulnerabilities Apr 1, 2024 Pending
Array ( [id] => 19766728 [patent_doc_number] => 12225037 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-02-11 [patent_title] => Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context [patent_app_type] => utility [patent_app_number] => 18/621304 [patent_app_country] => US [patent_app_date] => 2024-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10099 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 142 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18621304 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/621304
Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context Mar 28, 2024 Issued
Array ( [id] => 20285119 [patent_doc_number] => 20250310361 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-10-02 [patent_title] => DEDUPLICATION OF ENDPOINT CONNECTIONS [patent_app_type] => utility [patent_app_number] => 18/617404 [patent_app_country] => US [patent_app_date] => 2024-03-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12053 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18617404 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/617404
DEDUPLICATION OF ENDPOINT CONNECTIONS Mar 25, 2024 Pending
Array ( [id] => 19454001 [patent_doc_number] => 20240314131 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-09-19 [patent_title] => ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE [patent_app_type] => utility [patent_app_number] => 18/603590 [patent_app_country] => US [patent_app_date] => 2024-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10494 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18603590 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/603590
Access gateway system for accessing a resource Mar 12, 2024 Issued
Array ( [id] => 20055015 [patent_doc_number] => 20250193237 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-12 [patent_title] => METHOD FOR DETERMINING FALSE FLAGS OF CYBER ATTACKS AND APPARATUS FOR EXECUTING THE METHOD [patent_app_type] => utility [patent_app_number] => 18/841556 [patent_app_country] => US [patent_app_date] => 2024-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2716 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18841556 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/841556
Method for determining false flags of cyber attacks and apparatus for executing the method Mar 11, 2024 Issued
Array ( [id] => 19437166 [patent_doc_number] => 20240305664 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-09-12 [patent_title] => CYBERSECURITY OPERATIONS MITIGATION MANAGEMENT [patent_app_type] => utility [patent_app_number] => 18/601572 [patent_app_country] => US [patent_app_date] => 2024-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18217 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 91 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18601572 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/601572
CYBERSECURITY OPERATIONS MITIGATION MANAGEMENT Mar 10, 2024 Pending
Array ( [id] => 19748567 [patent_doc_number] => 20250037132 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-30 [patent_title] => TRUST PLATFORM [patent_app_type] => utility [patent_app_number] => 18/599550 [patent_app_country] => US [patent_app_date] => 2024-03-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11264 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18599550 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/599550
TRUST PLATFORM Mar 7, 2024 Pending
Array ( [id] => 20197753 [patent_doc_number] => 20250274463 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-08-28 [patent_title] => SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS [patent_app_type] => utility [patent_app_number] => 18/586982 [patent_app_country] => US [patent_app_date] => 2024-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6623 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18586982 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/586982
SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS Feb 25, 2024 Pending
Array ( [id] => 20197753 [patent_doc_number] => 20250274463 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-08-28 [patent_title] => SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS [patent_app_type] => utility [patent_app_number] => 18/586982 [patent_app_country] => US [patent_app_date] => 2024-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6623 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18586982 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/586982
SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS Feb 25, 2024 Pending
Array ( [id] => 20197753 [patent_doc_number] => 20250274463 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-08-28 [patent_title] => SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS [patent_app_type] => utility [patent_app_number] => 18/586982 [patent_app_country] => US [patent_app_date] => 2024-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6623 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18586982 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/586982
SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS Feb 25, 2024 Pending
Array ( [id] => 19408331 [patent_doc_number] => 20240291842 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-29 [patent_title] => THREAT MITIGATION SYSTEM AND METHOD [patent_app_type] => utility [patent_app_number] => 18/584994 [patent_app_country] => US [patent_app_date] => 2024-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 48562 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18584994 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/584994
THREAT MITIGATION SYSTEM AND METHOD Feb 21, 2024 Pending
Array ( [id] => 19408331 [patent_doc_number] => 20240291842 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-29 [patent_title] => THREAT MITIGATION SYSTEM AND METHOD [patent_app_type] => utility [patent_app_number] => 18/584994 [patent_app_country] => US [patent_app_date] => 2024-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 48562 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18584994 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/584994
THREAT MITIGATION SYSTEM AND METHOD Feb 21, 2024 Pending
Array ( [id] => 19214446 [patent_doc_number] => 12003528 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-06-04 [patent_title] => Endogenous dynamic defense architecture-based multi-objective service function chain deployment method [patent_app_type] => utility [patent_app_number] => 18/581424 [patent_app_country] => US [patent_app_date] => 2024-02-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 5849 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 1094 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18581424 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/581424
Endogenous dynamic defense architecture-based multi-objective service function chain deployment method Feb 19, 2024 Issued
Array ( [id] => 19267887 [patent_doc_number] => 20240211591 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-06-27 [patent_title] => AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS [patent_app_type] => utility [patent_app_number] => 18/432037 [patent_app_country] => US [patent_app_date] => 2024-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12761 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 265 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18432037 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/432037
AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS Feb 3, 2024 Issued
Array ( [id] => 19254261 [patent_doc_number] => 20240205258 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-06-20 [patent_title] => CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES [patent_app_type] => utility [patent_app_number] => 18/427616 [patent_app_country] => US [patent_app_date] => 2024-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12016 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18427616 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/427616
CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES Jan 29, 2024 Pending
Array ( [id] => 19254261 [patent_doc_number] => 20240205258 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-06-20 [patent_title] => CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES [patent_app_type] => utility [patent_app_number] => 18/427616 [patent_app_country] => US [patent_app_date] => 2024-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12016 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18427616 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/427616
CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES Jan 29, 2024 Pending
Array ( [id] => 19640063 [patent_doc_number] => 12170682 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-12-17 [patent_title] => Application endpoint cybersecurity techniques [patent_app_type] => utility [patent_app_number] => 18/425847 [patent_app_country] => US [patent_app_date] => 2024-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 11733 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18425847 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/425847
Application endpoint cybersecurity techniques Jan 28, 2024 Issued
Menu