Search

Stephen T. Gundry

Examiner (ID: 1011, Phone: (571)270-0507 , Office: P/2435 )

Most Active Art Unit
2435
Art Unit(s)
2435
Total Applications
638
Issued Applications
551
Pending Applications
64
Abandoned Applications
52

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20062000 [patent_doc_number] => 20250200222 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-19 [patent_title] => PERSONALLY IDENTIFIABLE INFORMATION SCRUBBER WITH LANGUAGE MODELS [patent_app_type] => utility [patent_app_number] => 18/981911 [patent_app_country] => US [patent_app_date] => 2024-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7337 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 86 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18981911 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/981911
Personally identifiable information scrubber with language models Dec 15, 2024 Issued
Array ( [id] => 19887642 [patent_doc_number] => 12273381 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-04-08 [patent_title] => Detection of machine learning model attacks obfuscated in unicode [patent_app_type] => utility [patent_app_number] => 18/945370 [patent_app_country] => US [patent_app_date] => 2024-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 16 [patent_no_of_words] => 7731 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18945370 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/945370
Detection of machine learning model attacks obfuscated in unicode Nov 11, 2024 Issued
Array ( [id] => 19887642 [patent_doc_number] => 12273381 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-04-08 [patent_title] => Detection of machine learning model attacks obfuscated in unicode [patent_app_type] => utility [patent_app_number] => 18/945370 [patent_app_country] => US [patent_app_date] => 2024-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 16 [patent_no_of_words] => 7731 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18945370 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/945370
Detection of machine learning model attacks obfuscated in unicode Nov 11, 2024 Issued
Array ( [id] => 20359238 [patent_doc_number] => 12475235 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-11-18 [patent_title] => Generative cybersecurity exploit discovery and evaluation [patent_app_type] => utility [patent_app_number] => 18/900216 [patent_app_country] => US [patent_app_date] => 2024-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 22594 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18900216 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/900216
Generative cybersecurity exploit discovery and evaluation Sep 26, 2024 Issued
Array ( [id] => 20027396 [patent_doc_number] => 20250165618 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-05-22 [patent_title] => GENERATIVE CYBERSECURITY EXPLOIT DISCOVERY AND EVALUATION [patent_app_type] => utility [patent_app_number] => 18/900430 [patent_app_country] => US [patent_app_date] => 2024-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 22594 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18900430 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/900430
Generative cybersecurity exploit discovery and evaluation Sep 26, 2024 Issued
Array ( [id] => 19880525 [patent_doc_number] => 20250112782 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-03 [patent_title] => IMAGING DEVICE, IMAGING METHOD, AND STORAGE MEDIUM [patent_app_type] => utility [patent_app_number] => 18/889687 [patent_app_country] => US [patent_app_date] => 2024-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4734 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 66 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18889687 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/889687
IMAGING DEVICE, IMAGING METHOD, AND STORAGE MEDIUM Sep 18, 2024 Pending
Array ( [id] => 19887633 [patent_doc_number] => 12273372 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-04-08 [patent_title] => Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment [patent_app_type] => utility [patent_app_number] => 18/888967 [patent_app_country] => US [patent_app_date] => 2024-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10131 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 131 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18888967 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/888967
Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment Sep 17, 2024 Issued
Array ( [id] => 19822780 [patent_doc_number] => 20250080987 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-03-06 [patent_title] => Randomized Timeouts for Wireless Operations [patent_app_type] => utility [patent_app_number] => 18/818915 [patent_app_country] => US [patent_app_date] => 2024-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3766 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 62 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18818915 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/818915
Randomized Timeouts for Wireless Operations Aug 28, 2024 Pending
Array ( [id] => 19647673 [patent_doc_number] => 20240422193 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-19 [patent_title] => WEB SERVICE-BASED MONITORING AND DETECTION OF FRAUDULENT OR UNAUTHORIZED USE OF CALLING SERVICE [patent_app_type] => utility [patent_app_number] => 18/819405 [patent_app_country] => US [patent_app_date] => 2024-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19420 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18819405 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/819405
Web service-based monitoring and detection of fraudulent or unauthorized use of calling service Aug 28, 2024 Issued
Array ( [id] => 19822780 [patent_doc_number] => 20250080987 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-03-06 [patent_title] => Randomized Timeouts for Wireless Operations [patent_app_type] => utility [patent_app_number] => 18/818915 [patent_app_country] => US [patent_app_date] => 2024-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3766 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 62 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18818915 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/818915
Randomized Timeouts for Wireless Operations Aug 28, 2024 Pending
Array ( [id] => 19819442 [patent_doc_number] => 20250077649 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-03-06 [patent_title] => INSTRUCTION MONITORING MODULE [patent_app_type] => utility [patent_app_number] => 18/810040 [patent_app_country] => US [patent_app_date] => 2024-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2613 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 66 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18810040 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/810040
INSTRUCTION MONITORING MODULE Aug 19, 2024 Pending
Array ( [id] => 19603505 [patent_doc_number] => 20240394385 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION [patent_app_type] => utility [patent_app_number] => 18/795484 [patent_app_country] => US [patent_app_date] => 2024-08-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8682 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 256 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795484 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/795484
SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION Aug 5, 2024 Pending
Array ( [id] => 19603505 [patent_doc_number] => 20240394385 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION [patent_app_type] => utility [patent_app_number] => 18/795484 [patent_app_country] => US [patent_app_date] => 2024-08-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8682 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 256 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795484 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/795484
SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION Aug 5, 2024 Pending
Array ( [id] => 19603486 [patent_doc_number] => 20240394366 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => Detecting and mitigating application security threats based on threat change patterns [patent_app_type] => utility [patent_app_number] => 18/795134 [patent_app_country] => US [patent_app_date] => 2024-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9767 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 195 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795134 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/795134
Detecting and mitigating application security threats based on threat change patterns Aug 4, 2024 Pending
Array ( [id] => 19603486 [patent_doc_number] => 20240394366 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => Detecting and mitigating application security threats based on threat change patterns [patent_app_type] => utility [patent_app_number] => 18/795134 [patent_app_country] => US [patent_app_date] => 2024-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9767 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 195 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795134 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/795134
Detecting and mitigating application security threats based on threat change patterns Aug 4, 2024 Pending
Array ( [id] => 19605860 [patent_doc_number] => 20240396740 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => LATTICE-BASED CRYPTOGRAPHIC DIGITAL SIGNATURE SCHEME UTILISING MASKING [patent_app_type] => utility [patent_app_number] => 18/793108 [patent_app_country] => US [patent_app_date] => 2024-08-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4995 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 273 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18793108 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/793108
LATTICE-BASED CRYPTOGRAPHIC DIGITAL SIGNATURE SCHEME UTILISING MASKING Aug 1, 2024 Pending
Array ( [id] => 19605860 [patent_doc_number] => 20240396740 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => LATTICE-BASED CRYPTOGRAPHIC DIGITAL SIGNATURE SCHEME UTILISING MASKING [patent_app_type] => utility [patent_app_number] => 18/793108 [patent_app_country] => US [patent_app_date] => 2024-08-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4995 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 273 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18793108 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/793108
LATTICE-BASED CRYPTOGRAPHIC DIGITAL SIGNATURE SCHEME UTILISING MASKING Aug 1, 2024 Pending
Array ( [id] => 19905560 [patent_doc_number] => 12282565 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-04-22 [patent_title] => Generative cybersecurity exploit synthesis and mitigation [patent_app_type] => utility [patent_app_number] => 18/792523 [patent_app_country] => US [patent_app_date] => 2024-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 17072 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 140 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18792523 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/792523
Generative cybersecurity exploit synthesis and mitigation Jul 31, 2024 Issued
Array ( [id] => 19933788 [patent_doc_number] => 12306992 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-05-20 [patent_title] => Anonymity algorithm-based data sharing privacy protection method [patent_app_type] => utility [patent_app_number] => 18/779132 [patent_app_country] => US [patent_app_date] => 2024-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6621 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 321 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18779132 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/779132
Anonymity algorithm-based data sharing privacy protection method Jul 21, 2024 Issued
Array ( [id] => 19547476 [patent_doc_number] => 20240364512 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-31 [patent_title] => KEY RECOVERY BASED ON CONTACTLESS CARD AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 18/767089 [patent_app_country] => US [patent_app_date] => 2024-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14301 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 89 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18767089 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/767089
KEY RECOVERY BASED ON CONTACTLESS CARD AUTHENTICATION Jul 8, 2024 Pending
Menu