
Stephen T. Gundry
Examiner (ID: 1011, Phone: (571)270-0507 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435 |
| Total Applications | 638 |
| Issued Applications | 551 |
| Pending Applications | 64 |
| Abandoned Applications | 52 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20062000
[patent_doc_number] => 20250200222
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-19
[patent_title] => PERSONALLY IDENTIFIABLE INFORMATION SCRUBBER WITH LANGUAGE MODELS
[patent_app_type] => utility
[patent_app_number] => 18/981911
[patent_app_country] => US
[patent_app_date] => 2024-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7337
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18981911
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/981911 | Personally identifiable information scrubber with language models | Dec 15, 2024 | Issued |
Array
(
[id] => 19887642
[patent_doc_number] => 12273381
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-04-08
[patent_title] => Detection of machine learning model attacks obfuscated in unicode
[patent_app_type] => utility
[patent_app_number] => 18/945370
[patent_app_country] => US
[patent_app_date] => 2024-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 7731
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18945370
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/945370 | Detection of machine learning model attacks obfuscated in unicode | Nov 11, 2024 | Issued |
Array
(
[id] => 19887642
[patent_doc_number] => 12273381
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-04-08
[patent_title] => Detection of machine learning model attacks obfuscated in unicode
[patent_app_type] => utility
[patent_app_number] => 18/945370
[patent_app_country] => US
[patent_app_date] => 2024-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 7731
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18945370
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/945370 | Detection of machine learning model attacks obfuscated in unicode | Nov 11, 2024 | Issued |
Array
(
[id] => 20359238
[patent_doc_number] => 12475235
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-11-18
[patent_title] => Generative cybersecurity exploit discovery and evaluation
[patent_app_type] => utility
[patent_app_number] => 18/900216
[patent_app_country] => US
[patent_app_date] => 2024-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 22594
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18900216
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/900216 | Generative cybersecurity exploit discovery and evaluation | Sep 26, 2024 | Issued |
Array
(
[id] => 20027396
[patent_doc_number] => 20250165618
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-22
[patent_title] => GENERATIVE CYBERSECURITY EXPLOIT DISCOVERY AND EVALUATION
[patent_app_type] => utility
[patent_app_number] => 18/900430
[patent_app_country] => US
[patent_app_date] => 2024-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22594
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18900430
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/900430 | Generative cybersecurity exploit discovery and evaluation | Sep 26, 2024 | Issued |
Array
(
[id] => 19880525
[patent_doc_number] => 20250112782
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-03
[patent_title] => IMAGING DEVICE, IMAGING METHOD, AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/889687
[patent_app_country] => US
[patent_app_date] => 2024-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4734
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18889687
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/889687 | IMAGING DEVICE, IMAGING METHOD, AND STORAGE MEDIUM | Sep 18, 2024 | Pending |
Array
(
[id] => 19887633
[patent_doc_number] => 12273372
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-04-08
[patent_title] => Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment
[patent_app_type] => utility
[patent_app_number] => 18/888967
[patent_app_country] => US
[patent_app_date] => 2024-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10131
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18888967
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/888967 | Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment | Sep 17, 2024 | Issued |
Array
(
[id] => 19822780
[patent_doc_number] => 20250080987
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-06
[patent_title] => Randomized Timeouts for Wireless Operations
[patent_app_type] => utility
[patent_app_number] => 18/818915
[patent_app_country] => US
[patent_app_date] => 2024-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3766
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 62
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18818915
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/818915 | Randomized Timeouts for Wireless Operations | Aug 28, 2024 | Pending |
Array
(
[id] => 19647673
[patent_doc_number] => 20240422193
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-19
[patent_title] => WEB SERVICE-BASED MONITORING AND DETECTION OF FRAUDULENT OR UNAUTHORIZED USE OF CALLING SERVICE
[patent_app_type] => utility
[patent_app_number] => 18/819405
[patent_app_country] => US
[patent_app_date] => 2024-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19420
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18819405
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/819405 | Web service-based monitoring and detection of fraudulent or unauthorized use of calling service | Aug 28, 2024 | Issued |
Array
(
[id] => 19822780
[patent_doc_number] => 20250080987
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-06
[patent_title] => Randomized Timeouts for Wireless Operations
[patent_app_type] => utility
[patent_app_number] => 18/818915
[patent_app_country] => US
[patent_app_date] => 2024-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3766
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 62
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18818915
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/818915 | Randomized Timeouts for Wireless Operations | Aug 28, 2024 | Pending |
Array
(
[id] => 19819442
[patent_doc_number] => 20250077649
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-06
[patent_title] => INSTRUCTION MONITORING MODULE
[patent_app_type] => utility
[patent_app_number] => 18/810040
[patent_app_country] => US
[patent_app_date] => 2024-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2613
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18810040
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/810040 | INSTRUCTION MONITORING MODULE | Aug 19, 2024 | Pending |
Array
(
[id] => 19603505
[patent_doc_number] => 20240394385
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 18/795484
[patent_app_country] => US
[patent_app_date] => 2024-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8682
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795484
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/795484 | SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION | Aug 5, 2024 | Pending |
Array
(
[id] => 19603505
[patent_doc_number] => 20240394385
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 18/795484
[patent_app_country] => US
[patent_app_date] => 2024-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8682
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795484
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/795484 | SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION | Aug 5, 2024 | Pending |
Array
(
[id] => 19603486
[patent_doc_number] => 20240394366
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => Detecting and mitigating application security threats based on threat change patterns
[patent_app_type] => utility
[patent_app_number] => 18/795134
[patent_app_country] => US
[patent_app_date] => 2024-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9767
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795134
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/795134 | Detecting and mitigating application security threats based on threat change patterns | Aug 4, 2024 | Pending |
Array
(
[id] => 19603486
[patent_doc_number] => 20240394366
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => Detecting and mitigating application security threats based on threat change patterns
[patent_app_type] => utility
[patent_app_number] => 18/795134
[patent_app_country] => US
[patent_app_date] => 2024-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9767
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795134
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/795134 | Detecting and mitigating application security threats based on threat change patterns | Aug 4, 2024 | Pending |
Array
(
[id] => 19605860
[patent_doc_number] => 20240396740
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => LATTICE-BASED CRYPTOGRAPHIC DIGITAL SIGNATURE SCHEME UTILISING MASKING
[patent_app_type] => utility
[patent_app_number] => 18/793108
[patent_app_country] => US
[patent_app_date] => 2024-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4995
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18793108
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/793108 | LATTICE-BASED CRYPTOGRAPHIC DIGITAL SIGNATURE SCHEME UTILISING MASKING | Aug 1, 2024 | Pending |
Array
(
[id] => 19605860
[patent_doc_number] => 20240396740
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => LATTICE-BASED CRYPTOGRAPHIC DIGITAL SIGNATURE SCHEME UTILISING MASKING
[patent_app_type] => utility
[patent_app_number] => 18/793108
[patent_app_country] => US
[patent_app_date] => 2024-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4995
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18793108
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/793108 | LATTICE-BASED CRYPTOGRAPHIC DIGITAL SIGNATURE SCHEME UTILISING MASKING | Aug 1, 2024 | Pending |
Array
(
[id] => 19905560
[patent_doc_number] => 12282565
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-04-22
[patent_title] => Generative cybersecurity exploit synthesis and mitigation
[patent_app_type] => utility
[patent_app_number] => 18/792523
[patent_app_country] => US
[patent_app_date] => 2024-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 17072
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18792523
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/792523 | Generative cybersecurity exploit synthesis and mitigation | Jul 31, 2024 | Issued |
Array
(
[id] => 19933788
[patent_doc_number] => 12306992
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-20
[patent_title] => Anonymity algorithm-based data sharing privacy protection method
[patent_app_type] => utility
[patent_app_number] => 18/779132
[patent_app_country] => US
[patent_app_date] => 2024-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6621
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 321
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18779132
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/779132 | Anonymity algorithm-based data sharing privacy protection method | Jul 21, 2024 | Issued |
Array
(
[id] => 19547476
[patent_doc_number] => 20240364512
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-31
[patent_title] => KEY RECOVERY BASED ON CONTACTLESS CARD AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 18/767089
[patent_app_country] => US
[patent_app_date] => 2024-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14301
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18767089
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/767089 | KEY RECOVERY BASED ON CONTACTLESS CARD AUTHENTICATION | Jul 8, 2024 | Pending |