
Sosina Abebe
Examiner (ID: 17268, Phone: (571)270-7929 , Office: P/2627 )
| Most Active Art Unit | 2626 |
| Art Unit(s) | 2629, 2626, 2696, 2627, 2692 |
| Total Applications | 498 |
| Issued Applications | 346 |
| Pending Applications | 41 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18561851
[patent_doc_number] => 11727096
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-08-15
[patent_title] => User interface competence based authentication
[patent_app_type] => utility
[patent_app_number] => 17/185561
[patent_app_country] => US
[patent_app_date] => 2021-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4675
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17185561
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/185561 | User interface competence based authentication | Feb 24, 2021 | Issued |
Array
(
[id] => 18805647
[patent_doc_number] => 11838824
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-05
[patent_title] => Remote and shared access for network connected devices
[patent_app_type] => utility
[patent_app_number] => 17/183534
[patent_app_country] => US
[patent_app_date] => 2021-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 14487
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17183534
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/183534 | Remote and shared access for network connected devices | Feb 23, 2021 | Issued |
Array
(
[id] => 19198410
[patent_doc_number] => 11995650
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-28
[patent_title] => Method, device and system for verifying virtual code based on sphere
[patent_app_type] => utility
[patent_app_number] => 17/170698
[patent_app_country] => US
[patent_app_date] => 2021-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 20014
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17170698
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/170698 | Method, device and system for verifying virtual code based on sphere | Feb 7, 2021 | Issued |
Array
(
[id] => 18918156
[patent_doc_number] => 11880435
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-01-23
[patent_title] => Determination of intermediate representations of discovered document structures
[patent_app_type] => utility
[patent_app_number] => 17/167316
[patent_app_country] => US
[patent_app_date] => 2021-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7032
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17167316
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/167316 | Determination of intermediate representations of discovered document structures | Feb 3, 2021 | Issued |
Array
(
[id] => 17320334
[patent_doc_number] => 20210409384
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-30
[patent_title] => PORT LEVEL POLICY ISOLATION IN OVERLAY NETWORKS
[patent_app_type] => utility
[patent_app_number] => 17/164488
[patent_app_country] => US
[patent_app_date] => 2021-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16981
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17164488
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/164488 | Port level policy isolation in overlay networks | Jan 31, 2021 | Issued |
Array
(
[id] => 17560141
[patent_doc_number] => 11316875
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-26
[patent_title] => Method and system for analyzing cybersecurity threats and improving defensive intelligence
[patent_app_type] => utility
[patent_app_number] => 17/162483
[patent_app_country] => US
[patent_app_date] => 2021-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 11109
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17162483
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/162483 | Method and system for analyzing cybersecurity threats and improving defensive intelligence | Jan 28, 2021 | Issued |
Array
(
[id] => 19182731
[patent_doc_number] => 11989320
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-21
[patent_title] => Hidden electronic file system within non-hidden electronic file system
[patent_app_type] => utility
[patent_app_number] => 17/156946
[patent_app_country] => US
[patent_app_date] => 2021-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 4656
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17156946
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/156946 | Hidden electronic file system within non-hidden electronic file system | Jan 24, 2021 | Issued |
Array
(
[id] => 17710160
[patent_doc_number] => 20220210168
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-30
[patent_title] => FACILITATING IDENTIFICATION OF COMPROMISED DEVICES BY NETWORK ACCESS CONTROL (NAC) OR UNIFIED THREAT MANAGEMENT (UTM) SECURITY SERVICES BY LEVERAGING CONTEXT FROM AN ENDPOINT DETECTION AND RESPONSE (EDR) AGENT
[patent_app_type] => utility
[patent_app_number] => 17/139896
[patent_app_country] => US
[patent_app_date] => 2020-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8605
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17139896
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/139896 | Facilitating identification of compromised devices by network access control (NAC) or unified threat management (UTM) security services by leveraging context from an endpoint detection and response (EDR) agent | Dec 30, 2020 | Issued |
Array
(
[id] => 16859513
[patent_doc_number] => 20210160258
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-27
[patent_title] => THREAT MITIGATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 17/105125
[patent_app_country] => US
[patent_app_date] => 2020-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 26341
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 47
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17105125
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/105125 | Threat mitigation system and method | Nov 24, 2020 | Issued |
Array
(
[id] => 17478674
[patent_doc_number] => 20220086178
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-17
[patent_title] => EFFICIENT MONITORING OF NETWORK ACTIVITY IN A CLOUD COMPUTING ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 17/018355
[patent_app_country] => US
[patent_app_date] => 2020-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11751
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17018355
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/018355 | Efficient monitoring of network activity in a cloud computing environment | Sep 10, 2020 | Issued |
Array
(
[id] => 16678760
[patent_doc_number] => 20210067526
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-04
[patent_title] => SECURITY MONITORING AT OPERATING SYSTEM KERNEL LEVEL
[patent_app_type] => utility
[patent_app_number] => 16/991592
[patent_app_country] => US
[patent_app_date] => 2020-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18879
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16991592
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/991592 | Security monitoring at operating system kernel level | Aug 11, 2020 | Issued |
Array
(
[id] => 18549146
[patent_doc_number] => 11722510
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-08
[patent_title] => Monitoring and preventing remote user automated cyber attacks
[patent_app_type] => utility
[patent_app_number] => 16/988863
[patent_app_country] => US
[patent_app_date] => 2020-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 12322
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16988863
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/988863 | Monitoring and preventing remote user automated cyber attacks | Aug 9, 2020 | Issued |
Array
(
[id] => 17819521
[patent_doc_number] => 11425151
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => Client-side attack detection via simulation
[patent_app_type] => utility
[patent_app_number] => 16/985737
[patent_app_country] => US
[patent_app_date] => 2020-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 9822
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985737
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/985737 | Client-side attack detection via simulation | Aug 4, 2020 | Issued |
Array
(
[id] => 18001941
[patent_doc_number] => 11503063
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-15
[patent_title] => Systems and methods for detecting hidden vulnerabilities in enterprise networks
[patent_app_type] => utility
[patent_app_number] => 16/985605
[patent_app_country] => US
[patent_app_date] => 2020-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 11016
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985605
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/985605 | Systems and methods for detecting hidden vulnerabilities in enterprise networks | Aug 4, 2020 | Issued |
Array
(
[id] => 18220468
[patent_doc_number] => 11595426
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-28
[patent_title] => Risk based virtual workspace delivery
[patent_app_type] => utility
[patent_app_number] => 16/937992
[patent_app_country] => US
[patent_app_date] => 2020-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8546
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16937992
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/937992 | Risk based virtual workspace delivery | Jul 23, 2020 | Issued |
Array
(
[id] => 17218766
[patent_doc_number] => 20210352104
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-11
[patent_title] => DETECTING MALICIOUS ACTIVITY IN A CLUSTER
[patent_app_type] => utility
[patent_app_number] => 16/916648
[patent_app_country] => US
[patent_app_date] => 2020-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9273
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16916648
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/916648 | DETECTING MALICIOUS ACTIVITY IN A CLUSTER | Jun 29, 2020 | Abandoned |
Array
(
[id] => 16610387
[patent_doc_number] => 10911418
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-02-02
[patent_title] => Port level policy isolation in overlay networks
[patent_app_type] => utility
[patent_app_number] => 16/913114
[patent_app_country] => US
[patent_app_date] => 2020-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 16925
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16913114
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/913114 | Port level policy isolation in overlay networks | Jun 25, 2020 | Issued |
Array
(
[id] => 16906166
[patent_doc_number] => 20210185082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-17
[patent_title] => COMPUTERIZED SYSTEM AND METHOD FOR SECURELY DISTRIBUTING AND EXCHANGING CYBER-THREAT INFORMATION IN A STANDARDIZED FORMAT
[patent_app_type] => utility
[patent_app_number] => 16/900446
[patent_app_country] => US
[patent_app_date] => 2020-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8695
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -2
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16900446
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/900446 | Computerized system and method for securely distributing and exchanging cyber-threat information in a standardized format | Jun 11, 2020 | Issued |
Array
(
[id] => 17942759
[patent_doc_number] => 11477231
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-18
[patent_title] => System and method for vulnerability remediation prioritization
[patent_app_type] => utility
[patent_app_number] => 16/897760
[patent_app_country] => US
[patent_app_date] => 2020-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6976
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16897760
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/897760 | System and method for vulnerability remediation prioritization | Jun 9, 2020 | Issued |
Array
(
[id] => 17279035
[patent_doc_number] => 20210385233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-09
[patent_title] => TARGET AWARE ADAPTIVE APPLICATION FOR ANOMALY DETECTION AT THE NETWORK EDGE
[patent_app_type] => utility
[patent_app_number] => 16/895481
[patent_app_country] => US
[patent_app_date] => 2020-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7476
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16895481
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/895481 | Target aware adaptive application for anomaly detection at the network edge | Jun 7, 2020 | Issued |