Search

Sosina Abebe

Examiner (ID: 17268, Phone: (571)270-7929 , Office: P/2627 )

Most Active Art Unit
2626
Art Unit(s)
2629, 2626, 2696, 2627, 2692
Total Applications
498
Issued Applications
346
Pending Applications
41
Abandoned Applications
126

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 18561851 [patent_doc_number] => 11727096 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2023-08-15 [patent_title] => User interface competence based authentication [patent_app_type] => utility [patent_app_number] => 17/185561 [patent_app_country] => US [patent_app_date] => 2021-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4675 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 80 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17185561 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/185561
User interface competence based authentication Feb 24, 2021 Issued
Array ( [id] => 18805647 [patent_doc_number] => 11838824 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-12-05 [patent_title] => Remote and shared access for network connected devices [patent_app_type] => utility [patent_app_number] => 17/183534 [patent_app_country] => US [patent_app_date] => 2021-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 14487 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17183534 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/183534
Remote and shared access for network connected devices Feb 23, 2021 Issued
Array ( [id] => 19198410 [patent_doc_number] => 11995650 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-05-28 [patent_title] => Method, device and system for verifying virtual code based on sphere [patent_app_type] => utility [patent_app_number] => 17/170698 [patent_app_country] => US [patent_app_date] => 2021-02-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 14 [patent_no_of_words] => 20014 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17170698 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/170698
Method, device and system for verifying virtual code based on sphere Feb 7, 2021 Issued
Array ( [id] => 18918156 [patent_doc_number] => 11880435 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-01-23 [patent_title] => Determination of intermediate representations of discovered document structures [patent_app_type] => utility [patent_app_number] => 17/167316 [patent_app_country] => US [patent_app_date] => 2021-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7032 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17167316 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/167316
Determination of intermediate representations of discovered document structures Feb 3, 2021 Issued
Array ( [id] => 17320334 [patent_doc_number] => 20210409384 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-12-30 [patent_title] => PORT LEVEL POLICY ISOLATION IN OVERLAY NETWORKS [patent_app_type] => utility [patent_app_number] => 17/164488 [patent_app_country] => US [patent_app_date] => 2021-02-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 16981 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => 0 [patent_words_short_claim] => 285 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17164488 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/164488
Port level policy isolation in overlay networks Jan 31, 2021 Issued
Array ( [id] => 17560141 [patent_doc_number] => 11316875 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-04-26 [patent_title] => Method and system for analyzing cybersecurity threats and improving defensive intelligence [patent_app_type] => utility [patent_app_number] => 17/162483 [patent_app_country] => US [patent_app_date] => 2021-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 11109 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17162483 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/162483
Method and system for analyzing cybersecurity threats and improving defensive intelligence Jan 28, 2021 Issued
Array ( [id] => 19182731 [patent_doc_number] => 11989320 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-05-21 [patent_title] => Hidden electronic file system within non-hidden electronic file system [patent_app_type] => utility [patent_app_number] => 17/156946 [patent_app_country] => US [patent_app_date] => 2021-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 4656 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17156946 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/156946
Hidden electronic file system within non-hidden electronic file system Jan 24, 2021 Issued
Array ( [id] => 17710160 [patent_doc_number] => 20220210168 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-06-30 [patent_title] => FACILITATING IDENTIFICATION OF COMPROMISED DEVICES BY NETWORK ACCESS CONTROL (NAC) OR UNIFIED THREAT MANAGEMENT (UTM) SECURITY SERVICES BY LEVERAGING CONTEXT FROM AN ENDPOINT DETECTION AND RESPONSE (EDR) AGENT [patent_app_type] => utility [patent_app_number] => 17/139896 [patent_app_country] => US [patent_app_date] => 2020-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8605 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17139896 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/139896
Facilitating identification of compromised devices by network access control (NAC) or unified threat management (UTM) security services by leveraging context from an endpoint detection and response (EDR) agent Dec 30, 2020 Issued
Array ( [id] => 16859513 [patent_doc_number] => 20210160258 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-05-27 [patent_title] => THREAT MITIGATION SYSTEM AND METHOD [patent_app_type] => utility [patent_app_number] => 17/105125 [patent_app_country] => US [patent_app_date] => 2020-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 26341 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 47 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17105125 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/105125
Threat mitigation system and method Nov 24, 2020 Issued
Array ( [id] => 17478674 [patent_doc_number] => 20220086178 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-17 [patent_title] => EFFICIENT MONITORING OF NETWORK ACTIVITY IN A CLOUD COMPUTING ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 17/018355 [patent_app_country] => US [patent_app_date] => 2020-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11751 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17018355 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/018355
Efficient monitoring of network activity in a cloud computing environment Sep 10, 2020 Issued
Array ( [id] => 16678760 [patent_doc_number] => 20210067526 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-04 [patent_title] => SECURITY MONITORING AT OPERATING SYSTEM KERNEL LEVEL [patent_app_type] => utility [patent_app_number] => 16/991592 [patent_app_country] => US [patent_app_date] => 2020-08-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18879 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16991592 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/991592
Security monitoring at operating system kernel level Aug 11, 2020 Issued
Array ( [id] => 18549146 [patent_doc_number] => 11722510 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-08-08 [patent_title] => Monitoring and preventing remote user automated cyber attacks [patent_app_type] => utility [patent_app_number] => 16/988863 [patent_app_country] => US [patent_app_date] => 2020-08-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 11 [patent_no_of_words] => 12322 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16988863 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/988863
Monitoring and preventing remote user automated cyber attacks Aug 9, 2020 Issued
Array ( [id] => 17819521 [patent_doc_number] => 11425151 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-08-23 [patent_title] => Client-side attack detection via simulation [patent_app_type] => utility [patent_app_number] => 16/985737 [patent_app_country] => US [patent_app_date] => 2020-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 9822 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 187 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985737 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/985737
Client-side attack detection via simulation Aug 4, 2020 Issued
Array ( [id] => 18001941 [patent_doc_number] => 11503063 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-11-15 [patent_title] => Systems and methods for detecting hidden vulnerabilities in enterprise networks [patent_app_type] => utility [patent_app_number] => 16/985605 [patent_app_country] => US [patent_app_date] => 2020-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 11016 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 90 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985605 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/985605
Systems and methods for detecting hidden vulnerabilities in enterprise networks Aug 4, 2020 Issued
Array ( [id] => 18220468 [patent_doc_number] => 11595426 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-02-28 [patent_title] => Risk based virtual workspace delivery [patent_app_type] => utility [patent_app_number] => 16/937992 [patent_app_country] => US [patent_app_date] => 2020-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8546 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16937992 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/937992
Risk based virtual workspace delivery Jul 23, 2020 Issued
Array ( [id] => 17218766 [patent_doc_number] => 20210352104 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-11-11 [patent_title] => DETECTING MALICIOUS ACTIVITY IN A CLUSTER [patent_app_type] => utility [patent_app_number] => 16/916648 [patent_app_country] => US [patent_app_date] => 2020-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9273 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16916648 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/916648
DETECTING MALICIOUS ACTIVITY IN A CLUSTER Jun 29, 2020 Abandoned
Array ( [id] => 16610387 [patent_doc_number] => 10911418 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-02-02 [patent_title] => Port level policy isolation in overlay networks [patent_app_type] => utility [patent_app_number] => 16/913114 [patent_app_country] => US [patent_app_date] => 2020-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 16925 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 285 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16913114 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/913114
Port level policy isolation in overlay networks Jun 25, 2020 Issued
Array ( [id] => 16906166 [patent_doc_number] => 20210185082 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-06-17 [patent_title] => COMPUTERIZED SYSTEM AND METHOD FOR SECURELY DISTRIBUTING AND EXCHANGING CYBER-THREAT INFORMATION IN A STANDARDIZED FORMAT [patent_app_type] => utility [patent_app_number] => 16/900446 [patent_app_country] => US [patent_app_date] => 2020-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8695 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -2 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16900446 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/900446
Computerized system and method for securely distributing and exchanging cyber-threat information in a standardized format Jun 11, 2020 Issued
Array ( [id] => 17942759 [patent_doc_number] => 11477231 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-10-18 [patent_title] => System and method for vulnerability remediation prioritization [patent_app_type] => utility [patent_app_number] => 16/897760 [patent_app_country] => US [patent_app_date] => 2020-06-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6976 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 215 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16897760 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/897760
System and method for vulnerability remediation prioritization Jun 9, 2020 Issued
Array ( [id] => 17279035 [patent_doc_number] => 20210385233 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-12-09 [patent_title] => TARGET AWARE ADAPTIVE APPLICATION FOR ANOMALY DETECTION AT THE NETWORK EDGE [patent_app_type] => utility [patent_app_number] => 16/895481 [patent_app_country] => US [patent_app_date] => 2020-06-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7476 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16895481 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/895481
Target aware adaptive application for anomaly detection at the network edge Jun 7, 2020 Issued
Menu