
Sarah Su
Examiner (ID: 9118, Phone: (571)270-3835 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 813 |
| Issued Applications | 638 |
| Pending Applications | 48 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20147552
[patent_doc_number] => 12381903
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-05
[patent_title] => Modeling cyberspace operations and operation effectiveness
[patent_app_type] => utility
[patent_app_number] => 18/178264
[patent_app_country] => US
[patent_app_date] => 2023-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7193
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18178264
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/178264 | Modeling cyberspace operations and operation effectiveness | Mar 2, 2023 | Issued |
Array
(
[id] => 19350452
[patent_doc_number] => 20240259416
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-01
[patent_title] => ADAPTIVE PROTECTION MECHANISMS LOOP
[patent_app_type] => utility
[patent_app_number] => 18/112090
[patent_app_country] => US
[patent_app_date] => 2023-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20723
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18112090
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/112090 | Adaptive protection mechanisms loop | Feb 20, 2023 | Issued |
Array
(
[id] => 20029965
[patent_doc_number] => 20250168187
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-22
[patent_title] => METHODS AND APPARATUS FOR ENHANCED SECURITY IN FEDERATED LEARNING MACHINE LEARNING OPERATIONS IN A COMMUNICATION NETWORK
[patent_app_type] => utility
[patent_app_number] => 18/834858
[patent_app_country] => US
[patent_app_date] => 2023-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7929
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18834858
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/834858 | Methods and apparatus for enhanced security in federated learning machine learning operations in a communication network | Jan 30, 2023 | Issued |
Array
(
[id] => 19162281
[patent_doc_number] => 20240154988
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-09
[patent_title] => SYSTEM CONFIGURED TO DETECT AND BLOCK THE DISTRIBUTION OF MALICIOUS CONTENT THAT IS ATTRIBUTABLE TO AN ENTITY
[patent_app_type] => utility
[patent_app_number] => 18/158314
[patent_app_country] => US
[patent_app_date] => 2023-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8759
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18158314
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/158314 | System configured to detect and block the distribution of malicious content that is attributable to an entity | Jan 22, 2023 | Issued |
Array
(
[id] => 18365817
[patent_doc_number] => 20230147408
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-05-11
[patent_title] => CLIENT REPUTATION DRIVEN ROLE-BASED ACCESS CONTROL
[patent_app_type] => utility
[patent_app_number] => 18/151578
[patent_app_country] => US
[patent_app_date] => 2023-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11562
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18151578
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/151578 | CLIENT REPUTATION DRIVEN ROLE-BASED ACCESS CONTROL | Jan 8, 2023 | Pending |
Array
(
[id] => 18813996
[patent_doc_number] => 20230388333
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-11-30
[patent_title] => SYSTEMS AND METHODS FOR SOCIAL NETWORK ANALYSIS ON DARK WEB FORUMS TO PREDICT ENTERPRISE CYBER INCIDENTS
[patent_app_type] => utility
[patent_app_number] => 18/150577
[patent_app_country] => US
[patent_app_date] => 2023-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17114
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18150577
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/150577 | Systems and methods for social network analysis on dark web forums to predict enterprise cyber incidents | Jan 4, 2023 | Issued |
Array
(
[id] => 19197948
[patent_doc_number] => 11995186
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-28
[patent_title] => Ransomware attack onset detection
[patent_app_type] => utility
[patent_app_number] => 18/145222
[patent_app_country] => US
[patent_app_date] => 2022-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 8112
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18145222
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/145222 | Ransomware attack onset detection | Dec 21, 2022 | Issued |
Array
(
[id] => 19933792
[patent_doc_number] => 12306996
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-20
[patent_title] => Integrating data privacy integration protocols across system landscapes
[patent_app_type] => utility
[patent_app_number] => 18/077476
[patent_app_country] => US
[patent_app_date] => 2022-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 14267
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18077476
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/077476 | Integrating data privacy integration protocols across system landscapes | Dec 7, 2022 | Issued |
Array
(
[id] => 18441046
[patent_doc_number] => 20230188342
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-15
[patent_title] => METHOD OF DESIGNING ONE-WAY COMPUTATIONAL SYSTEM IN QAP-BASED HOMOMORPHIC ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 18/077260
[patent_app_country] => US
[patent_app_date] => 2022-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5767
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18077260
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/077260 | Method of designing one-way computational system in QAP-based homomorphic encryption | Dec 7, 2022 | Issued |
Array
(
[id] => 18951830
[patent_doc_number] => 11895141
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-02-06
[patent_title] => Apparatus and method for analyzing organization digital security
[patent_app_type] => utility
[patent_app_number] => 18/073289
[patent_app_country] => US
[patent_app_date] => 2022-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 16034
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 36
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18073289
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/073289 | Apparatus and method for analyzing organization digital security | Nov 30, 2022 | Issued |
Array
(
[id] => 19094798
[patent_doc_number] => 11956272
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-04-09
[patent_title] => Identifying legitimate websites to remove false positives from domain discovery analysis
[patent_app_type] => utility
[patent_app_number] => 17/992180
[patent_app_country] => US
[patent_app_date] => 2022-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 20
[patent_no_of_words] => 13974
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17992180
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/992180 | Identifying legitimate websites to remove false positives from domain discovery analysis | Nov 21, 2022 | Issued |
Array
(
[id] => 19214445
[patent_doc_number] => 12003527
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-06-04
[patent_title] => Automatically detecting vulnerability regressions
[patent_app_type] => utility
[patent_app_number] => 17/991126
[patent_app_country] => US
[patent_app_date] => 2022-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6944
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17991126
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/991126 | Automatically detecting vulnerability regressions | Nov 20, 2022 | Issued |
Array
(
[id] => 19973184
[patent_doc_number] => 12341809
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-06-24
[patent_title] => Defending against volumetric attacks
[patent_app_type] => utility
[patent_app_number] => 17/988128
[patent_app_country] => US
[patent_app_date] => 2022-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 5481
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17988128
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/988128 | Defending against volumetric attacks | Nov 15, 2022 | Issued |
Array
(
[id] => 19063988
[patent_doc_number] => 11943253
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-03-26
[patent_title] => Systems and methods for determination of level of security to apply to a group before display of user data
[patent_app_type] => utility
[patent_app_number] => 17/986861
[patent_app_country] => US
[patent_app_date] => 2022-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 16682
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17986861
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/986861 | Systems and methods for determination of level of security to apply to a group before display of user data | Nov 13, 2022 | Issued |
Array
(
[id] => 20346848
[patent_doc_number] => 12470585
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-11-11
[patent_title] => System and method for simulation of cyberattacks with execution confirmation
[patent_app_type] => utility
[patent_app_number] => 18/013772
[patent_app_country] => US
[patent_app_date] => 2022-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4692
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18013772
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/013772 | System and method for simulation of cyberattacks with execution confirmation | Oct 30, 2022 | Issued |
Array
(
[id] => 19154500
[patent_doc_number] => 11979427
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-07
[patent_title] => System and method for computation of ransomware susceptibility
[patent_app_type] => utility
[patent_app_number] => 17/966791
[patent_app_country] => US
[patent_app_date] => 2022-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6450
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17966791
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/966791 | System and method for computation of ransomware susceptibility | Oct 14, 2022 | Issued |
Array
(
[id] => 18840863
[patent_doc_number] => 11848952
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-19
[patent_title] => Systems and methods for identifying access anomalies using network graphs
[patent_app_type] => utility
[patent_app_number] => 17/964227
[patent_app_country] => US
[patent_app_date] => 2022-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9002
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 258
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17964227
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/964227 | Systems and methods for identifying access anomalies using network graphs | Oct 11, 2022 | Issued |
Array
(
[id] => 20259693
[patent_doc_number] => 12432061
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-30
[patent_title] => Content protection system
[patent_app_type] => utility
[patent_app_number] => 17/961053
[patent_app_country] => US
[patent_app_date] => 2022-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7989
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 320
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17961053
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/961053 | Content protection system | Oct 5, 2022 | Issued |
Array
(
[id] => 18425124
[patent_doc_number] => 20230179589
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-08
[patent_title] => SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 17/937821
[patent_app_country] => US
[patent_app_date] => 2022-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19618
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17937821
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/937821 | Systems and methods for cryptographic authentication | Oct 3, 2022 | Issued |
Array
(
[id] => 19030650
[patent_doc_number] => 11930022
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-03-12
[patent_title] => Cloud-based orchestration of incident response using multi-feed security event classifications
[patent_app_type] => utility
[patent_app_number] => 17/958579
[patent_app_country] => US
[patent_app_date] => 2022-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8237
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17958579
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/958579 | Cloud-based orchestration of incident response using multi-feed security event classifications | Oct 2, 2022 | Issued |