
Ruixiang Li
Examiner (ID: 14)
| Most Active Art Unit | 1646 |
| Art Unit(s) | 1646, 1674 |
| Total Applications | 1796 |
| Issued Applications | 817 |
| Pending Applications | 188 |
| Abandoned Applications | 809 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19350403
[patent_doc_number] => 20240259367
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-01
[patent_title] => REMOTE ACCESS COMPUTER SECURITY
[patent_app_type] => utility
[patent_app_number] => 18/634726
[patent_app_country] => US
[patent_app_date] => 2024-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13750
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18634726
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/634726 | REMOTE ACCESS COMPUTER SECURITY | Apr 11, 2024 | Pending |
Array
(
[id] => 19874490
[patent_doc_number] => 12267369
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-04-01
[patent_title] => Cybersecurity analysis and protection using distributed systems
[patent_app_type] => utility
[patent_app_number] => 18/622996
[patent_app_country] => US
[patent_app_date] => 2024-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 33
[patent_no_of_words] => 18537
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 227
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18622996
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/622996 | Cybersecurity analysis and protection using distributed systems | Mar 30, 2024 | Issued |
Array
(
[id] => 19322520
[patent_doc_number] => 20240244068
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-18
[patent_title] => SYSTEM AND METHODS FOR DETECTING AUTHENTICATION OBJECT FORGERY OR MANIPULATION ATTACKS
[patent_app_type] => utility
[patent_app_number] => 18/619162
[patent_app_country] => US
[patent_app_date] => 2024-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22212
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -40
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18619162
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/619162 | System and methods for detecting authentication object forgery or manipulation attacks | Mar 27, 2024 | Issued |
Array
(
[id] => 19742100
[patent_doc_number] => 12218954
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-04
[patent_title] => Systems and methods for contextually securing remote function calls
[patent_app_type] => utility
[patent_app_number] => 18/607698
[patent_app_country] => US
[patent_app_date] => 2024-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9654
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18607698
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/607698 | Systems and methods for contextually securing remote function calls | Mar 17, 2024 | Issued |
Array
(
[id] => 20703300
[patent_doc_number] => 12626012
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-05-12
[patent_title] => User identification system and method for fraud detection
[patent_app_type] => utility
[patent_app_number] => 18/606465
[patent_app_country] => US
[patent_app_date] => 2024-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7378
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18606465
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/606465 | User Identification System And Method For Fraud Detection | Mar 14, 2024 | Issued |
Array
(
[id] => 20236539
[patent_doc_number] => 20250293858
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-18
[patent_title] => SYSTEMS AND METHODS FOR SECURELY MANAGING ACCESS TO VEHICLE DATA
[patent_app_type] => utility
[patent_app_number] => 18/606837
[patent_app_country] => US
[patent_app_date] => 2024-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 0
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18606837
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/606837 | SYSTEMS AND METHODS FOR SECURELY MANAGING ACCESS TO VEHICLE DATA | Mar 14, 2024 | Pending |
Array
(
[id] => 19365698
[patent_doc_number] => 20240267732
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-08
[patent_title] => CONTROL PLANE ONLY MOBILE DEVICE NETWORK ACCESS AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 18/605155
[patent_app_country] => US
[patent_app_date] => 2024-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10678
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18605155
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/605155 | CONTROL PLANE ONLY MOBILE DEVICE NETWORK ACCESS AUTHENTICATION | Mar 13, 2024 | Pending |
Array
(
[id] => 19287139
[patent_doc_number] => 20240223619
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-04
[patent_title] => CUSTOMIZABLE CERTIFICATE VALIDATION POLICY
[patent_app_type] => utility
[patent_app_number] => 18/605425
[patent_app_country] => US
[patent_app_date] => 2024-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8505
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18605425
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/605425 | CUSTOMIZABLE CERTIFICATE VALIDATION POLICY | Mar 13, 2024 | Pending |
Array
(
[id] => 19965791
[patent_doc_number] => 12335317
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-06-17
[patent_title] => Cybersecurity reconnaissance, analysis, and scoring using distributed systems
[patent_app_type] => utility
[patent_app_number] => 18/593909
[patent_app_country] => US
[patent_app_date] => 2024-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 11740
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18593909
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/593909 | Cybersecurity reconnaissance, analysis, and scoring using distributed systems | Mar 1, 2024 | Issued |
Array
(
[id] => 19980998
[patent_doc_number] => 12348491
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-01
[patent_title] => System and method for segmenting transit capabilities within a multi-cloud architecture
[patent_app_type] => utility
[patent_app_number] => 18/587387
[patent_app_country] => US
[patent_app_date] => 2024-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 1131
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18587387
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/587387 | System and method for segmenting transit capabilities within a multi-cloud architecture | Feb 25, 2024 | Issued |
Array
(
[id] => 20160320
[patent_doc_number] => 12386952
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-12
[patent_title] => Addressable smart agent data technology to detect unauthorized transaction activity
[patent_app_type] => utility
[patent_app_number] => 18/437347
[patent_app_country] => US
[patent_app_date] => 2024-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5018
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18437347
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/437347 | Addressable smart agent data technology to detect unauthorized transaction activity | Feb 8, 2024 | Issued |
Array
(
[id] => 20103912
[patent_doc_number] => 20250233848
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-07-17
[patent_title] => METHOD, DEVICE, AND PROGRAM PRODUCT FOR PROTECTING INTERNET-OF-THINGS DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/433695
[patent_app_country] => US
[patent_app_date] => 2024-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2312
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18433695
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/433695 | METHOD, DEVICE, AND PROGRAM PRODUCT FOR PROTECTING INTERNET-OF-THINGS DEVICE | Feb 5, 2024 | Pending |
Array
(
[id] => 19207281
[patent_doc_number] => 20240179180
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-30
[patent_title] => PHISHING EMAIL CAMPAIGN IDENTIFICATION
[patent_app_type] => utility
[patent_app_number] => 18/433090
[patent_app_country] => US
[patent_app_date] => 2024-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9665
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18433090
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/433090 | Phishing email campaign identification | Feb 4, 2024 | Issued |
Array
(
[id] => 20125242
[patent_doc_number] => 20250240273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-07-24
[patent_title] => System And Method For Remotely Filtering Network Traffic Of A Customer Premise Device
[patent_app_type] => utility
[patent_app_number] => 18/418801
[patent_app_country] => US
[patent_app_date] => 2024-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2455
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -30
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18418801
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/418801 | System And Method For Remotely Filtering Network Traffic Of A Customer Premise Device | Jan 21, 2024 | Pending |
Array
(
[id] => 19254002
[patent_doc_number] => 20240204999
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-20
[patent_title] => METHODS AND SYSTEMS OF MULTI-USER QUANTUM KEY DISTRIBUTION AND MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 18/414952
[patent_app_country] => US
[patent_app_date] => 2024-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10509
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18414952
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/414952 | METHODS AND SYSTEMS OF MULTI-USER QUANTUM KEY DISTRIBUTION AND MANAGEMENT | Jan 16, 2024 | Pending |
Array
(
[id] => 19780244
[patent_doc_number] => 12229277
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-18
[patent_title] => Source code clustering for automatically identifying false positives generated through static application security testing
[patent_app_type] => utility
[patent_app_number] => 18/409538
[patent_app_country] => US
[patent_app_date] => 2024-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8331
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 301
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18409538
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/409538 | Source code clustering for automatically identifying false positives generated through static application security testing | Jan 9, 2024 | Issued |
Array
(
[id] => 19766683
[patent_doc_number] => 12224992
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-11
[patent_title] => AI-driven defensive cybersecurity strategy analysis and recommendation system
[patent_app_type] => utility
[patent_app_number] => 18/402662
[patent_app_country] => US
[patent_app_date] => 2024-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 40
[patent_no_of_words] => 24523
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18402662
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/402662 | AI-driven defensive cybersecurity strategy analysis and recommendation system | Jan 1, 2024 | Issued |
Array
(
[id] => 20090062
[patent_doc_number] => 20250219998
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-07-03
[patent_title] => SECURITY MANAGING MODULE AND SECURITY MANAGING METHOD FOR ENDPOINT DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/397438
[patent_app_country] => US
[patent_app_date] => 2023-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1877
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18397438
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/397438 | SECURITY MANAGING MODULE AND SECURITY MANAGING METHOD FOR ENDPOINT DEVICE | Dec 26, 2023 | Pending |
Array
(
[id] => 20073351
[patent_doc_number] => 20250211573
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-26
[patent_title] => UTILIZING SIMULATION NODE TAGS WITHIN NETWORK SIMULATIONS
[patent_app_type] => utility
[patent_app_number] => 18/394092
[patent_app_country] => US
[patent_app_date] => 2023-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4623
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18394092
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/394092 | Utilizing simulation node tags within network simulations | Dec 21, 2023 | Issued |
Array
(
[id] => 19734594
[patent_doc_number] => 12212606
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-01-28
[patent_title] => Trusted-code generated requests
[patent_app_type] => utility
[patent_app_number] => 18/391457
[patent_app_country] => US
[patent_app_date] => 2023-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 22330
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18391457
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/391457 | Trusted-code generated requests | Dec 19, 2023 | Issued |