
Sarah Su
Examiner (ID: 9118, Phone: (571)270-3835 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 813 |
| Issued Applications | 638 |
| Pending Applications | 48 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20502679
[patent_doc_number] => 20260032142
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-29
[patent_title] => PERSONALIZED VISUAL INTERFACES FOR QUANTIFYING AND COMMUNICATING PERSONALIZED PHISHING EXPOSURE RISK FOR INCREASED SECURITY
[patent_app_type] => utility
[patent_app_number] => 18/781656
[patent_app_country] => US
[patent_app_date] => 2024-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12713
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18781656
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/781656 | PERSONALIZED VISUAL INTERFACES FOR QUANTIFYING AND COMMUNICATING PERSONALIZED PHISHING EXPOSURE RISK FOR INCREASED SECURITY | Jul 22, 2024 | Pending |
Array
(
[id] => 19533059
[patent_doc_number] => 20240356961
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-24
[patent_title] => OPTIMIZING NETWORKS MICROSEGMENTATION POLICY FOR CYBER RESILIENCE
[patent_app_type] => utility
[patent_app_number] => 18/762162
[patent_app_country] => US
[patent_app_date] => 2024-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14910
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18762162
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/762162 | OPTIMIZING NETWORKS MICROSEGMENTATION POLICY FOR CYBER RESILIENCE | Jul 1, 2024 | Pending |
Array
(
[id] => 20430517
[patent_doc_number] => 20250392610
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-12-25
[patent_title] => CYBERSECURITY VULNERABILITY DETECTION WITH ARTIFICIAL INTELLIGENCE MODELS
[patent_app_type] => utility
[patent_app_number] => 18/753724
[patent_app_country] => US
[patent_app_date] => 2024-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2435
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18753724
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/753724 | CYBERSECURITY VULNERABILITY DETECTION WITH ARTIFICIAL INTELLIGENCE MODELS | Jun 24, 2024 | Pending |
Array
(
[id] => 19499449
[patent_doc_number] => 20240338467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => ZERO-KNOWLEDGE PROTECTION FOR SIDE CHANNELS IN DATA PROTECTION TO THE CLOUD
[patent_app_type] => utility
[patent_app_number] => 18/750328
[patent_app_country] => US
[patent_app_date] => 2024-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7581
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18750328
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/750328 | ZERO-KNOWLEDGE PROTECTION FOR SIDE CHANNELS IN DATA PROTECTION TO THE CLOUD | Jun 20, 2024 | Pending |
Array
(
[id] => 20081690
[patent_doc_number] => 12355777
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-08
[patent_title] => Conference security for user groups
[patent_app_type] => utility
[patent_app_number] => 18/742430
[patent_app_country] => US
[patent_app_date] => 2024-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6264
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742430
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/742430 | Conference security for user groups | Jun 12, 2024 | Issued |
Array
(
[id] => 19485711
[patent_doc_number] => 20240333753
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-03
[patent_title] => SECURITY MODEL UTILIZING MULTI-CHANNEL DATA WITH VULNERABILITY REMEDIATION CIRCUITRY
[patent_app_type] => utility
[patent_app_number] => 18/742234
[patent_app_country] => US
[patent_app_date] => 2024-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 39023
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742234
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/742234 | Security model utilizing multi-channel data with vulnerability remediation circuitry | Jun 12, 2024 | Issued |
Array
(
[id] => 19647668
[patent_doc_number] => 20240422188
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-19
[patent_title] => SECURITY DETERMINATION DEVICE, SECURE SYSTEM DESIGN DEVICE, SECURITY DETERMINATION METHOD, AND NON-TRANSITORY STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/738361
[patent_app_country] => US
[patent_app_date] => 2024-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10812
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 56
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18738361
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/738361 | SECURITY DETERMINATION DEVICE, SECURE SYSTEM DESIGN DEVICE, SECURITY DETERMINATION METHOD, AND NON-TRANSITORY STORAGE MEDIUM | Jun 9, 2024 | Pending |
Array
(
[id] => 19887631
[patent_doc_number] => 12273370
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-04-08
[patent_title] => System and method for detecting cybersecurity risks in managed artificial intelligence models
[patent_app_type] => utility
[patent_app_number] => 18/672749
[patent_app_country] => US
[patent_app_date] => 2024-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10306
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18672749
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/672749 | System and method for detecting cybersecurity risks in managed artificial intelligence models | May 22, 2024 | Issued |
Array
(
[id] => 19583421
[patent_doc_number] => 12149558
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-11-19
[patent_title] => Cybersecurity architectures for multi-contextual risk quantification
[patent_app_type] => utility
[patent_app_number] => 18/669528
[patent_app_country] => US
[patent_app_date] => 2024-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 35389
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 262
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18669528
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/669528 | Cybersecurity architectures for multi-contextual risk quantification | May 20, 2024 | Issued |
Array
(
[id] => 19766734
[patent_doc_number] => 12225043
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-11
[patent_title] => Systems and methods for security process analysis
[patent_app_type] => utility
[patent_app_number] => 18/667464
[patent_app_country] => US
[patent_app_date] => 2024-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7611
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18667464
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/667464 | Systems and methods for security process analysis | May 16, 2024 | Issued |
Array
(
[id] => 19408338
[patent_doc_number] => 20240291849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-29
[patent_title] => METHOD FOR OBTAINING SECURITY CLASSIFICATION RESULT AND COMMUNICATION APPARATUS
[patent_app_type] => utility
[patent_app_number] => 18/659239
[patent_app_country] => US
[patent_app_date] => 2024-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 36264
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18659239
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/659239 | METHOD FOR OBTAINING SECURITY CLASSIFICATION RESULT AND COMMUNICATION APPARATUS | May 8, 2024 | Pending |
Array
(
[id] => 20353769
[patent_doc_number] => 20250350621
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-11-13
[patent_title] => CVE LABELING FOR EXPLOITS USING PROOF-OF-CONCEPT AND LLM
[patent_app_type] => utility
[patent_app_number] => 18/656657
[patent_app_country] => US
[patent_app_date] => 2024-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 748
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18656657
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/656657 | CVE labeling for exploits using proof-of-concept and LLM | May 6, 2024 | Issued |
Array
(
[id] => 19547649
[patent_doc_number] => 20240364685
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-31
[patent_title] => UNIVERSAL AUTHENTICATOR APPARATUS FOR OBTAINING HOST SERVICES
[patent_app_type] => utility
[patent_app_number] => 18/649633
[patent_app_country] => US
[patent_app_date] => 2024-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15041
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18649633
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/649633 | Universal authenticator apparatus for obtaining host services | Apr 28, 2024 | Issued |
Array
(
[id] => 20440547
[patent_doc_number] => 12511385
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-12-30
[patent_title] => Ransomware attack onset detection
[patent_app_type] => utility
[patent_app_number] => 18/641798
[patent_app_country] => US
[patent_app_date] => 2024-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 2449
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18641798
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/641798 | Ransomware attack onset detection | Apr 21, 2024 | Issued |
Array
(
[id] => 20398167
[patent_doc_number] => 20250373642
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-12-04
[patent_title] => Cybersecurity Command Line Assessment
[patent_app_type] => utility
[patent_app_number] => 18/639506
[patent_app_country] => US
[patent_app_date] => 2024-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8555
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18639506
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/639506 | Cybersecurity Command Line Assessment | Apr 17, 2024 | Pending |
Array
(
[id] => 19576482
[patent_doc_number] => 20240380774
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-14
[patent_title] => SYSTEMS AND METHODS FOR AUTOMATED RISK-BASED NETWORK SECURITY FOCUS
[patent_app_type] => utility
[patent_app_number] => 18/622676
[patent_app_country] => US
[patent_app_date] => 2024-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18778
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18622676
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/622676 | Systems and methods for automated risk-based network security focus | Mar 28, 2024 | Issued |
Array
(
[id] => 19782411
[patent_doc_number] => 12231459
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-02-18
[patent_title] => Technique and method for detection and display of the cybersecurity risk context of a cloud environment
[patent_app_type] => utility
[patent_app_number] => 18/618684
[patent_app_country] => US
[patent_app_date] => 2024-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9964
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18618684
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/618684 | Technique and method for detection and display of the cybersecurity risk context of a cloud environment | Mar 26, 2024 | Issued |
Array
(
[id] => 19663224
[patent_doc_number] => 20240430289
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-26
[patent_title] => AUTOMATED PRIORITIZATION OF CYBER RISK TO DIGITAL IDENTITIES
[patent_app_type] => utility
[patent_app_number] => 18/609300
[patent_app_country] => US
[patent_app_date] => 2024-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12375
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18609300
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/609300 | Automated prioritization of cyber risk to digital identities | Mar 18, 2024 | Issued |
Array
(
[id] => 20236727
[patent_doc_number] => 20250294046
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-18
[patent_title] => AUTOMATED VULNERABILITY EXCEPTION PROCESS
[patent_app_type] => utility
[patent_app_number] => 18/604262
[patent_app_country] => US
[patent_app_date] => 2024-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5571
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18604262
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/604262 | Automated vulnerability exception process | Mar 12, 2024 | Issued |
Array
(
[id] => 20216951
[patent_doc_number] => 12413615
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-09
[patent_title] => Attack path and graph creation based on user and system profiling
[patent_app_type] => utility
[patent_app_number] => 18/600442
[patent_app_country] => US
[patent_app_date] => 2024-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6510
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18600442
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/600442 | Attack path and graph creation based on user and system profiling | Mar 7, 2024 | Issued |