
Rowina J. Cattungal
Examiner (ID: 9113, Phone: (571)270-5922 , Office: P/2486 )
| Most Active Art Unit | 2425 |
| Art Unit(s) | 2425, 2486 |
| Total Applications | 601 |
| Issued Applications | 424 |
| Pending Applications | 64 |
| Abandoned Applications | 128 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17957296
[patent_doc_number] => 11483418
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-25
[patent_title] => Plugin management for internet of things (IoT) network optimization
[patent_app_type] => utility
[patent_app_number] => 16/110011
[patent_app_country] => US
[patent_app_date] => 2018-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12665
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16110011
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/110011 | Plugin management for internet of things (IoT) network optimization | Aug 22, 2018 | Issued |
Array
(
[id] => 17684175
[patent_doc_number] => 11368445
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-21
[patent_title] => Local encryption for single sign-on
[patent_app_type] => utility
[patent_app_number] => 16/106848
[patent_app_country] => US
[patent_app_date] => 2018-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6721
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16106848
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/106848 | Local encryption for single sign-on | Aug 20, 2018 | Issued |
Array
(
[id] => 16974375
[patent_doc_number] => 11070360
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-20
[patent_title] => Parallel transaction validation and block generation in a blockchain
[patent_app_type] => utility
[patent_app_number] => 16/101708
[patent_app_country] => US
[patent_app_date] => 2018-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 10162
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16101708
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/101708 | Parallel transaction validation and block generation in a blockchain | Aug 12, 2018 | Issued |
Array
(
[id] => 17425127
[patent_doc_number] => 11258596
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-02-22
[patent_title] => System to generate a signature key and method of operating the same
[patent_app_type] => utility
[patent_app_number] => 16/102628
[patent_app_country] => US
[patent_app_date] => 2018-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5335
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16102628
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/102628 | System to generate a signature key and method of operating the same | Aug 12, 2018 | Issued |
Array
(
[id] => 15941733
[patent_doc_number] => 20200162500
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-21
[patent_title] => MODELING CYBER-PHYSICAL ATTACK PATHS IN THE INTERNET-OF-THINGS
[patent_app_type] => utility
[patent_app_number] => 16/634591
[patent_app_country] => US
[patent_app_date] => 2018-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14485
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16634591
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/634591 | Modeling cyber-physical attack paths in the internet-of-things | Aug 12, 2018 | Issued |
Array
(
[id] => 20190552
[patent_doc_number] => 12401686
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-26
[patent_title] => Detecting changes to web page characteristics using machine learning
[patent_app_type] => utility
[patent_app_number] => 16/636282
[patent_app_country] => US
[patent_app_date] => 2018-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 5854
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 378
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16636282
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/636282 | Detecting changes to web page characteristics using machine learning | Jul 29, 2018 | Issued |
Array
(
[id] => 16874697
[patent_doc_number] => 20210168164
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-03
[patent_title] => DETECTING MALICIOUS CONFIGURATION CHANGE FOR WEB APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/636280
[patent_app_country] => US
[patent_app_date] => 2018-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10653
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16636280
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/636280 | DETECTING MALICIOUS CONFIGURATION CHANGE FOR WEB APPLICATIONS | Jul 29, 2018 | Abandoned |
Array
(
[id] => 15301827
[patent_doc_number] => 20190394049
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-26
[patent_title] => DYNAMICALLY ANALYZING THIRD-PARTY APPLICATION WEBSITE CERTIFICATES ACROSS USERS TO DETECT MALICIOUS ACTIVITY
[patent_app_type] => utility
[patent_app_number] => 16/039275
[patent_app_country] => US
[patent_app_date] => 2018-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5384
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16039275
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/039275 | Dynamically analyzing third-party application website certificates across users to detect malicious activity | Jul 17, 2018 | Issued |
Array
(
[id] => 16203058
[patent_doc_number] => 10728252
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-28
[patent_title] => Client application based access control in cloud security systems for mobile devices
[patent_app_type] => utility
[patent_app_number] => 16/029558
[patent_app_country] => US
[patent_app_date] => 2018-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 13181
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16029558
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/029558 | Client application based access control in cloud security systems for mobile devices | Jul 6, 2018 | Issued |
Array
(
[id] => 15705589
[patent_doc_number] => 10608989
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Real time dynamic client access control
[patent_app_type] => utility
[patent_app_number] => 16/027537
[patent_app_country] => US
[patent_app_date] => 2018-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11950
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 394
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16027537
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/027537 | Real time dynamic client access control | Jul 4, 2018 | Issued |
Array
(
[id] => 16173952
[patent_doc_number] => 10715540
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-14
[patent_title] => Protection from malicious and/or harmful content in cloud-based service scenarios
[patent_app_type] => utility
[patent_app_number] => 16/019786
[patent_app_country] => US
[patent_app_date] => 2018-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7492
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 268
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019786
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/019786 | Protection from malicious and/or harmful content in cloud-based service scenarios | Jun 26, 2018 | Issued |
Array
(
[id] => 13907179
[patent_doc_number] => 20190042794
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-07
[patent_title] => SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA
[patent_app_type] => utility
[patent_app_number] => 16/010004
[patent_app_country] => US
[patent_app_date] => 2018-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11359
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16010004
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/010004 | SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA | Jun 14, 2018 | Abandoned |
Array
(
[id] => 13449529
[patent_doc_number] => 20180276307
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-27
[patent_title] => IDENTIFYING WEBPAGES ACCESSIBLE BY UNAUTHORIZED USERS VIA URL GUESSING OR NETWORK SNIFFING
[patent_app_type] => utility
[patent_app_number] => 15/995823
[patent_app_country] => US
[patent_app_date] => 2018-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7589
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15995823
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/995823 | Identifying webpages accessible by unauthorized users via URL guessing or network sniffing | May 31, 2018 | Issued |
Array
(
[id] => 16419003
[patent_doc_number] => 10826917
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-03
[patent_title] => Malicious data scan service
[patent_app_type] => utility
[patent_app_number] => 15/969580
[patent_app_country] => US
[patent_app_date] => 2018-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 11459
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15969580
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/969580 | Malicious data scan service | May 1, 2018 | Issued |
Array
(
[id] => 13390683
[patent_doc_number] => 20180246884
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-30
[patent_title] => ENTERPRISE-LEVEL DATA PROTECTION WITH VARIABLE DATA GRANULARITY AND DATA DISCLOSURE CONTROL WITH HIERARCHICAL SUMMARIZATION, TOPICAL STRUCTURING, AND TRAVERSAL AUDIT
[patent_app_type] => utility
[patent_app_number] => 15/965877
[patent_app_country] => US
[patent_app_date] => 2018-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11340
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15965877
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/965877 | Enterprise-level data protection with variable data granularity and data disclosure control with hierarchical summarization, topical structuring, and traversal audit | Apr 27, 2018 | Issued |
Array
(
[id] => 14890655
[patent_doc_number] => 10425387
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-24
[patent_title] => Credentials enforcement using a firewall
[patent_app_type] => utility
[patent_app_number] => 15/945129
[patent_app_country] => US
[patent_app_date] => 2018-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 17722
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15945129
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/945129 | Credentials enforcement using a firewall | Apr 3, 2018 | Issued |
Array
(
[id] => 15505843
[patent_doc_number] => 20200053110
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => METHOD OF DETECTING ABNORMAL BEHAVIOR OF USER OF COMPUTER NETWORK SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/498910
[patent_app_country] => US
[patent_app_date] => 2018-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5440
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16498910
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/498910 | METHOD OF DETECTING ABNORMAL BEHAVIOR OF USER OF COMPUTER NETWORK SYSTEM | Mar 25, 2018 | Abandoned |
Array
(
[id] => 17151600
[patent_doc_number] => 11144678
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-12
[patent_title] => System with secure SoC connections among IP and multiple GPIOs, and corresponding method
[patent_app_type] => utility
[patent_app_number] => 15/916067
[patent_app_country] => US
[patent_app_date] => 2018-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 6219
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 326
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916067
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/916067 | System with secure SoC connections among IP and multiple GPIOs, and corresponding method | Mar 7, 2018 | Issued |
Array
(
[id] => 14845303
[patent_doc_number] => 20190281052
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => SYSTEMS AND METHODS FOR SECURING AN AUTOMOTIVE CONTROLLER NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/916059
[patent_app_country] => US
[patent_app_date] => 2018-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18286
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 297
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916059
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/916059 | SYSTEMS AND METHODS FOR SECURING AN AUTOMOTIVE CONTROLLER NETWORK | Mar 7, 2018 | Abandoned |
Array
(
[id] => 13418023
[patent_doc_number] => 20180260554
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-13
[patent_title] => PORTABLE KEYS FOR MANAGING ACCESS TO MOBILE DEVICES
[patent_app_type] => utility
[patent_app_number] => 15/916246
[patent_app_country] => US
[patent_app_date] => 2018-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13371
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916246
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/916246 | Portable keys for managing access to mobile devices | Mar 7, 2018 | Issued |