
Sosina Abebe
Examiner (ID: 17268, Phone: (571)270-7929 , Office: P/2627 )
| Most Active Art Unit | 2626 |
| Art Unit(s) | 2629, 2626, 2696, 2627, 2692 |
| Total Applications | 498 |
| Issued Applications | 346 |
| Pending Applications | 41 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18041471
[patent_doc_number] => 20220385688
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-01
[patent_title] => SYSTEMS AND METHODS FOR EMERGENCY SHUTDOWN AND RESTORE OF ACCESS ENTITLEMENTS RESPONSIVE TO SECURITY BREACH
[patent_app_type] => utility
[patent_app_number] => 17/883805
[patent_app_country] => US
[patent_app_date] => 2022-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7013
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17883805
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/883805 | Systems and methods for emergency shutdown and restore of access entitlements responsive to security breach | Aug 8, 2022 | Issued |
Array
(
[id] => 18840855
[patent_doc_number] => 11848944
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-12-19
[patent_title] => Dynamic analysis for detecting harmful content
[patent_app_type] => utility
[patent_app_number] => 17/881351
[patent_app_country] => US
[patent_app_date] => 2022-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13795
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17881351
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/881351 | Dynamic analysis for detecting harmful content | Aug 3, 2022 | Issued |
Array
(
[id] => 18689275
[patent_doc_number] => 11785028
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-10-10
[patent_title] => Dynamic analysis for detecting harmful content
[patent_app_type] => utility
[patent_app_number] => 17/878030
[patent_app_country] => US
[patent_app_date] => 2022-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13757
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17878030
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/878030 | Dynamic analysis for detecting harmful content | Jul 30, 2022 | Issued |
Array
(
[id] => 18020122
[patent_doc_number] => 20220371621
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-11-24
[patent_title] => STATEFUL RULE GENERATION FOR BEHAVIOR BASED THREAT DETECTION
[patent_app_type] => utility
[patent_app_number] => 17/871906
[patent_app_country] => US
[patent_app_date] => 2022-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12320
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17871906
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/871906 | Stateful rule generation for behavior based threat detection | Jul 22, 2022 | Issued |
Array
(
[id] => 18009949
[patent_doc_number] => 20220368716
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-11-17
[patent_title] => SYSTEMS AND METHODS FOR IMPROVED NETWORK VULNERABILITY SCANNING AND REPORTING
[patent_app_type] => utility
[patent_app_number] => 17/867790
[patent_app_country] => US
[patent_app_date] => 2022-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5122
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17867790
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/867790 | SYSTEMS AND METHODS FOR IMPROVED NETWORK VULNERABILITY SCANNING AND REPORTING | Jul 18, 2022 | Abandoned |
Array
(
[id] => 18907099
[patent_doc_number] => 20240022584
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-18
[patent_title] => SYSTEMS AND METHODS FOR BLOCKCHAIN-BASED CYBER THREAT MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 17/864518
[patent_app_country] => US
[patent_app_date] => 2022-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19854
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 502
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17864518
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/864518 | Systems and methods for blockchain-based cyber threat management | Jul 13, 2022 | Issued |
Array
(
[id] => 17984847
[patent_doc_number] => 20220350884
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-11-03
[patent_title] => SYSTEMS AND METHODS FOR CYBER SECURITY THREAT DETECTION AND EXPEDITED GENERATION OF INVESTIGATION STORYBOARDS USING INTELLIGENT CYBER SECURITY AUTOMATIONS
[patent_app_type] => utility
[patent_app_number] => 17/859800
[patent_app_country] => US
[patent_app_date] => 2022-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11287
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17859800
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/859800 | Systems and methods for cyber security threat detection and expedited generation of investigation storyboards using intelligent cyber security automations | Jul 6, 2022 | Issued |
Array
(
[id] => 20110379
[patent_doc_number] => 12361103
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-15
[patent_title] => Interoperability of real-world and metaverse systems
[patent_app_type] => utility
[patent_app_number] => 17/853730
[patent_app_country] => US
[patent_app_date] => 2022-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6996
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17853730
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/853730 | Interoperability of real-world and metaverse systems | Jun 28, 2022 | Issued |
Array
(
[id] => 19907243
[patent_doc_number] => 12284265
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-04-22
[patent_title] => Optimal profile selection for FHE based analytical models
[patent_app_type] => utility
[patent_app_number] => 17/809036
[patent_app_country] => US
[patent_app_date] => 2022-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 1249
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17809036
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/809036 | Optimal profile selection for FHE based analytical models | Jun 26, 2022 | Issued |
Array
(
[id] => 19671837
[patent_doc_number] => 12184621
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-12-31
[patent_title] => Method and apparatus for authenticating encrypted communication
[patent_app_type] => utility
[patent_app_number] => 17/808867
[patent_app_country] => US
[patent_app_date] => 2022-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 5238
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17808867
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/808867 | Method and apparatus for authenticating encrypted communication | Jun 23, 2022 | Issued |
Array
(
[id] => 20110455
[patent_doc_number] => 12361179
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-15
[patent_title] => Authorization management of multiparty communications
[patent_app_type] => utility
[patent_app_number] => 17/807626
[patent_app_country] => US
[patent_app_date] => 2022-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3322
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17807626
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/807626 | Authorization management of multiparty communications | Jun 16, 2022 | Issued |
Array
(
[id] => 20081685
[patent_doc_number] => 12355772
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-08
[patent_title] => Resource access control
[patent_app_type] => utility
[patent_app_number] => 17/807574
[patent_app_country] => US
[patent_app_date] => 2022-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7432
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17807574
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/807574 | Resource access control | Jun 16, 2022 | Issued |
Array
(
[id] => 18256372
[patent_doc_number] => 20230083411
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-16
[patent_title] => PROCESSOR WITH AN ELLIPTIC CURVE CRYPTOGRAPHIC ALGORITHM AND A DATA PROCESSING METHOD THEREOF
[patent_app_type] => utility
[patent_app_number] => 17/837559
[patent_app_country] => US
[patent_app_date] => 2022-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18702
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17837559
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/837559 | Processor with an elliptic curve cryptographic algorithm and a data processing method thereof | Jun 9, 2022 | Issued |
Array
(
[id] => 18797809
[patent_doc_number] => 11831661
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-11-28
[patent_title] => Multi-tiered approach to payload detection for incoming communications
[patent_app_type] => utility
[patent_app_number] => 17/831335
[patent_app_country] => US
[patent_app_date] => 2022-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13537
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17831335
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/831335 | Multi-tiered approach to payload detection for incoming communications | Jun 1, 2022 | Issued |
Array
(
[id] => 18283585
[patent_doc_number] => 20230099057
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-30
[patent_title] => TECHNIQUES FOR MANAGING SOFTWARE APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 17/664206
[patent_app_country] => US
[patent_app_date] => 2022-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7565
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17664206
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/664206 | Techniques for managing software applications | May 18, 2022 | Issued |
Array
(
[id] => 18773042
[patent_doc_number] => 20230367871
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-11-16
[patent_title] => EVENT-TRIGGERED FORENSICS CAPTURE
[patent_app_type] => utility
[patent_app_number] => 17/745477
[patent_app_country] => US
[patent_app_date] => 2022-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15092
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17745477
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/745477 | Event-triggered forensics capture | May 15, 2022 | Issued |
Array
(
[id] => 17839536
[patent_doc_number] => 20220276841
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-01
[patent_title] => COMMUNICATION DATA TEXT CONFUSION ENCRYPTION METHOD
[patent_app_type] => utility
[patent_app_number] => 17/663252
[patent_app_country] => US
[patent_app_date] => 2022-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5227
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17663252
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/663252 | COMMUNICATION DATA TEXT CONFUSION ENCRYPTION METHOD | May 12, 2022 | Abandoned |
Array
(
[id] => 19721528
[patent_doc_number] => 12207083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-01-21
[patent_title] => WWAN-WLAN aggregation security
[patent_app_type] => utility
[patent_app_number] => 17/742212
[patent_app_country] => US
[patent_app_date] => 2022-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 12783
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17742212
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/742212 | WWAN-WLAN aggregation security | May 10, 2022 | Issued |
Array
(
[id] => 17999877
[patent_doc_number] => 11500985
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-11-15
[patent_title] => Static and dynamic correlation of software development pipeline events
[patent_app_type] => utility
[patent_app_number] => 17/731738
[patent_app_country] => US
[patent_app_date] => 2022-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11530
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17731738
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/731738 | Static and dynamic correlation of software development pipeline events | Apr 27, 2022 | Issued |
Array
(
[id] => 19138809
[patent_doc_number] => 11973797
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-04-30
[patent_title] => Threat mitigation system and method
[patent_app_type] => utility
[patent_app_number] => 17/729221
[patent_app_country] => US
[patent_app_date] => 2022-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 32
[patent_no_of_words] => 26344
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17729221
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/729221 | Threat mitigation system and method | Apr 25, 2022 | Issued |