
Ruixiang Li
Examiner (ID: 14)
| Most Active Art Unit | 1646 |
| Art Unit(s) | 1646, 1674 |
| Total Applications | 1796 |
| Issued Applications | 817 |
| Pending Applications | 188 |
| Abandoned Applications | 809 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17796807
[patent_doc_number] => 20220255899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-11
[patent_title] => ENFORCING A SEGMENTATION POLICY IN CO-EXISTENCE WITH A SYSTEM FIREWALL
[patent_app_type] => utility
[patent_app_number] => 17/730062
[patent_app_country] => US
[patent_app_date] => 2022-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6797
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17730062
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/730062 | Enforcing a segmentation policy in co-existence with a system firewall | Apr 25, 2022 | Issued |
Array
(
[id] => 20376144
[patent_doc_number] => 12483593
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-11-25
[patent_title] => Distributed hybrid model for security as a service
[patent_app_type] => utility
[patent_app_number] => 17/721038
[patent_app_country] => US
[patent_app_date] => 2022-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4384
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17721038
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/721038 | Distributed hybrid model for security as a service | Apr 13, 2022 | Issued |
Array
(
[id] => 19236114
[patent_doc_number] => 20240193309
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-13
[patent_title] => Secure Cryptographic Coprocessor
[patent_app_type] => utility
[patent_app_number] => 18/554124
[patent_app_country] => US
[patent_app_date] => 2022-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 25904
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18554124
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/554124 | Secure Cryptographic Coprocessor | Apr 4, 2022 | Pending |
Array
(
[id] => 18681976
[patent_doc_number] => 20230319650
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-10-05
[patent_title] => SYSTEM & METHODS FOR REDUCING DELAY IN BSS FAST TRANSITIONS BETWEEN ACCESS POINTS ON WI-FI WIRELESS NETWORKS USING OPPORTUNISTIC KEY GENERATION TO PREVENT KEY FAILURE
[patent_app_type] => utility
[patent_app_number] => 17/710766
[patent_app_country] => US
[patent_app_date] => 2022-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3744
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17710766
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/710766 | BSS (basic service set) fast transitions between access points using opportunistic key generation | Mar 30, 2022 | Issued |
Array
(
[id] => 19124235
[patent_doc_number] => 11968237
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-04-23
[patent_title] => IPsec load balancing in a session-aware load balanced cluster (SLBC) network device
[patent_app_type] => utility
[patent_app_number] => 17/710686
[patent_app_country] => US
[patent_app_date] => 2022-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 4208
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 254
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17710686
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/710686 | IPsec load balancing in a session-aware load balanced cluster (SLBC) network device | Mar 30, 2022 | Issued |
Array
(
[id] => 17871885
[patent_doc_number] => 20220294622
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-15
[patent_title] => METHODS AND SYSTEMS TO ESTABLISH TRUSTED PEER-TO-PEER COMMUNICATIONS BETWEEN NODES IN A BLOCKCHAIN NETWORK
[patent_app_type] => utility
[patent_app_number] => 17/707834
[patent_app_country] => US
[patent_app_date] => 2022-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7788
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17707834
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/707834 | Methods and systems to establish trusted peer-to-peer communications between nodes in a blockchain network | Mar 28, 2022 | Issued |
Array
(
[id] => 17902106
[patent_doc_number] => 20220311768
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-29
[patent_title] => METHOD AND SYSTEM FOR DEFINING AND ENFORCING IP TRAFFIC POLICY FOR CONNECTED DEVICES
[patent_app_type] => utility
[patent_app_number] => 17/704327
[patent_app_country] => US
[patent_app_date] => 2022-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13676
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17704327
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/704327 | METHOD AND SYSTEM FOR DEFINING AND ENFORCING IP TRAFFIC POLICY FOR CONNECTED DEVICES | Mar 24, 2022 | Pending |
Array
(
[id] => 17724458
[patent_doc_number] => 20220217180
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-07
[patent_title] => SECURELY MANAGING NETWORK CONNECTIONS
[patent_app_type] => utility
[patent_app_number] => 17/701482
[patent_app_country] => US
[patent_app_date] => 2022-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7990
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17701482
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/701482 | Securely managing network connections | Mar 21, 2022 | Issued |
Array
(
[id] => 19606044
[patent_doc_number] => 20240396924
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => A TOP-DOWN CYBER SECURITY SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 18/691920
[patent_app_country] => US
[patent_app_date] => 2022-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15341
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18691920
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/691920 | A TOP-DOWN CYBER SECURITY SYSTEM AND METHOD | Mar 21, 2022 | Pending |
Array
(
[id] => 18654303
[patent_doc_number] => 20230300149
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-09-21
[patent_title] => Systems and Methods for Contextually Securing Remote Function Calls
[patent_app_type] => utility
[patent_app_number] => 17/695987
[patent_app_country] => US
[patent_app_date] => 2022-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9608
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17695987
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/695987 | Systems and methods for contextually securing remote function calls | Mar 15, 2022 | Issued |
Array
(
[id] => 17902095
[patent_doc_number] => 20220311757
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-29
[patent_title] => CROSS-REGIONAL REPLICATION OF KEYS
[patent_app_type] => utility
[patent_app_number] => 17/687124
[patent_app_country] => US
[patent_app_date] => 2022-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17342
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17687124
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/687124 | Cross-regional replication of keys | Mar 3, 2022 | Issued |
Array
(
[id] => 19927306
[patent_doc_number] => 12301608
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-13
[patent_title] => Identification of one or more services for a user's network-connected smart device using a smart device fingerprint of the network-connected smart device
[patent_app_type] => utility
[patent_app_number] => 17/677237
[patent_app_country] => US
[patent_app_date] => 2022-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5725
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17677237
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/677237 | Identification of one or more services for a user's network-connected smart device using a smart device fingerprint of the network-connected smart device | Feb 21, 2022 | Issued |
Array
(
[id] => 17856420
[patent_doc_number] => 20220286463
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-08
[patent_title] => Managing Admin Controlled Access of External Resources to Group-Based Communication Interfaces via a Group-Based Communication System
[patent_app_type] => utility
[patent_app_number] => 17/676054
[patent_app_country] => US
[patent_app_date] => 2022-02-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 31540
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17676054
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/676054 | Managing admin controlled access of external resources to group-based communication interfaces via a group-based communication system | Feb 17, 2022 | Issued |
Array
(
[id] => 18541887
[patent_doc_number] => 20230247004
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-08-03
[patent_title] => PERSISTENCY OF RESOURCE REQUESTS AND RESPONSES IN PROXIED COMMUNICATIONS
[patent_app_type] => utility
[patent_app_number] => 17/589550
[patent_app_country] => US
[patent_app_date] => 2022-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9834
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17589550
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/589550 | Persistency of resource requests and responses in proxied communications | Jan 30, 2022 | Issued |
Array
(
[id] => 17753837
[patent_doc_number] => 20220232042
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-21
[patent_title] => SYSTEM AND METHOD FOR CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 17/589774
[patent_app_country] => US
[patent_app_date] => 2022-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18501
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 402
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17589774
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/589774 | System and method for cybersecurity analysis and protection using distributed systems | Jan 30, 2022 | Issued |
Array
(
[id] => 18541889
[patent_doc_number] => 20230247006
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-08-03
[patent_title] => EXTENDING A TRUST BOUNDARY BETWEEN CLOUD DOMAINS OF THE SAME ENTITY
[patent_app_type] => utility
[patent_app_number] => 17/588054
[patent_app_country] => US
[patent_app_date] => 2022-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10144
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17588054
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/588054 | Extending a trust boundary between cloud domains of the same entity | Jan 27, 2022 | Issued |
Array
(
[id] => 18951840
[patent_doc_number] => 11895151
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-02-06
[patent_title] => Phishing email campaign identification
[patent_app_type] => utility
[patent_app_number] => 17/574443
[patent_app_country] => US
[patent_app_date] => 2022-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9640
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 289
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17574443
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/574443 | Phishing email campaign identification | Jan 11, 2022 | Issued |
Array
(
[id] => 19017299
[patent_doc_number] => 11924251
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-03-05
[patent_title] => System and method for cybersecurity reconnaissance, analysis, and score generation using distributed systems
[patent_app_type] => utility
[patent_app_number] => 17/567074
[patent_app_country] => US
[patent_app_date] => 2021-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 16837
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 374
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17567074
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/567074 | System and method for cybersecurity reconnaissance, analysis, and score generation using distributed systems | Dec 30, 2021 | Issued |
Array
(
[id] => 19488162
[patent_doc_number] => 12107896
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-10-01
[patent_title] => Automating trust in software upgrades
[patent_app_type] => utility
[patent_app_number] => 17/560599
[patent_app_country] => US
[patent_app_date] => 2021-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 8998
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17560599
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/560599 | Automating trust in software upgrades | Dec 22, 2021 | Issued |
Array
(
[id] => 19581408
[patent_doc_number] => 12147523
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-11-19
[patent_title] => Reader device and method of configuring the same
[patent_app_type] => utility
[patent_app_number] => 17/758829
[patent_app_country] => US
[patent_app_date] => 2021-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 5440
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17758829
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/758829 | Reader device and method of configuring the same | Dec 21, 2021 | Issued |