
Thomas A. Gyorfi
Examiner (ID: 15960, Phone: (571)272-3849 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2135, 2435 |
| Total Applications | 855 |
| Issued Applications | 577 |
| Pending Applications | 86 |
| Abandoned Applications | 214 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19726258
[patent_doc_number] => 20250029009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-23
[patent_title] => SOFTWARE APPLICATION FOR CONTINUALLY ASSESSING, PROCESSING, AND REMEDIATING CYBER-RISK IN REAL TIME
[patent_app_type] => utility
[patent_app_number] => 18/800852
[patent_app_country] => US
[patent_app_date] => 2024-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8230
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18800852
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/800852 | SOFTWARE APPLICATION FOR CONTINUALLY ASSESSING, PROCESSING, AND REMEDIATING CYBER-RISK IN REAL TIME | Aug 11, 2024 | Pending |
Array
(
[id] => 19606025
[patent_doc_number] => 20240396905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => COMPUTER SYSTEM ATTACK DETECTION
[patent_app_type] => utility
[patent_app_number] => 18/763984
[patent_app_country] => US
[patent_app_date] => 2024-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9519
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763984
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/763984 | COMPUTER SYSTEM ATTACK DETECTION | Jul 2, 2024 | Pending |
Array
(
[id] => 19499422
[patent_doc_number] => 20240338440
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => METHOD TO PREVENT ROOT LEVEL ACCESS ATTACK AND MEASURABLE SLA SECURITY AND COMPLIANCE PLATFORM
[patent_app_type] => utility
[patent_app_number] => 18/745774
[patent_app_country] => US
[patent_app_date] => 2024-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18056
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18745774
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/745774 | Method to prevent root level access attack and measurable SLA security and compliance platform | Jun 16, 2024 | Issued |
Array
(
[id] => 19635728
[patent_doc_number] => 20240414177
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-12
[patent_title] => SYSTEM AND METHOD FOR UTILIZING LARGE LANGUAGE MODELS AS A LOGICAL COMPONENT TO ENHANCE REACTIVE AND PROACTIVE SECURITY WITHIN A CYBERSECURITY SYSTEM
[patent_app_type] => utility
[patent_app_number] => 18/737564
[patent_app_country] => US
[patent_app_date] => 2024-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 32009
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 70
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18737564
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/737564 | SYSTEM AND METHOD FOR UTILIZING LARGE LANGUAGE MODELS AS A LOGICAL COMPONENT TO ENHANCE REACTIVE AND PROACTIVE SECURITY WITHIN A CYBERSECURITY SYSTEM | Jun 6, 2024 | Pending |
Array
(
[id] => 19663235
[patent_doc_number] => 20240430300
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-26
[patent_title] => COMMUNICATION APPARATUS, IMAGE GENERATION SYSTEM, CONTROL METHOD THEREOF, AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/677058
[patent_app_country] => US
[patent_app_date] => 2024-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6946
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18677058
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/677058 | COMMUNICATION APPARATUS, IMAGE GENERATION SYSTEM, CONTROL METHOD THEREOF, AND STORAGE MEDIUM | May 28, 2024 | Pending |
Array
(
[id] => 19663235
[patent_doc_number] => 20240430300
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-26
[patent_title] => COMMUNICATION APPARATUS, IMAGE GENERATION SYSTEM, CONTROL METHOD THEREOF, AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/677058
[patent_app_country] => US
[patent_app_date] => 2024-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6946
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18677058
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/677058 | COMMUNICATION APPARATUS, IMAGE GENERATION SYSTEM, CONTROL METHOD THEREOF, AND STORAGE MEDIUM | May 28, 2024 | Pending |
Array
(
[id] => 20080019
[patent_doc_number] => 12354090
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-08
[patent_title] => Blockchain-based method and system for specifying the recipient of an electronic communication
[patent_app_type] => utility
[patent_app_number] => 18/648445
[patent_app_country] => US
[patent_app_date] => 2024-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 3666
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18648445
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/648445 | Blockchain-based method and system for specifying the recipient of an electronic communication | Apr 27, 2024 | Issued |
Array
(
[id] => 19981156
[patent_doc_number] => 12348651
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-01
[patent_title] => Electronic system for convergent distribution of electronic digital certificates
[patent_app_type] => utility
[patent_app_number] => 18/648430
[patent_app_country] => US
[patent_app_date] => 2024-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12045
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18648430
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/648430 | Electronic system for convergent distribution of electronic digital certificates | Apr 27, 2024 | Issued |
Array
(
[id] => 19365349
[patent_doc_number] => 20240267383
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-08
[patent_title] => SYSTEM, METHOD AND COMPUTER-READABLE MEDIUM FOR UTILIZING A SHARED COMPUTER SYSTEM
[patent_app_type] => utility
[patent_app_number] => 18/634080
[patent_app_country] => US
[patent_app_date] => 2024-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8551
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18634080
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/634080 | SYSTEM, METHOD AND COMPUTER-READABLE MEDIUM FOR UTILIZING A SHARED COMPUTER SYSTEM | Apr 11, 2024 | Pending |
Array
(
[id] => 20299014
[patent_doc_number] => 20250324257
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-10-16
[patent_title] => MOBILE DEVICE SECURITY PROFILING
[patent_app_type] => utility
[patent_app_number] => 18/632369
[patent_app_country] => US
[patent_app_date] => 2024-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3323
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18632369
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/632369 | MOBILE DEVICE SECURITY PROFILING | Apr 10, 2024 | Pending |
Array
(
[id] => 19894098
[patent_doc_number] => 20250119410
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-10
[patent_title] => TRANSITIVELY AUTHENTICATED REVERSE PROXY
[patent_app_type] => utility
[patent_app_number] => 18/631353
[patent_app_country] => US
[patent_app_date] => 2024-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12680
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18631353
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/631353 | TRANSITIVELY AUTHENTICATED REVERSE PROXY | Apr 9, 2024 | Pending |
Array
(
[id] => 19894098
[patent_doc_number] => 20250119410
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-10
[patent_title] => TRANSITIVELY AUTHENTICATED REVERSE PROXY
[patent_app_type] => utility
[patent_app_number] => 18/631353
[patent_app_country] => US
[patent_app_date] => 2024-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12680
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18631353
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/631353 | TRANSITIVELY AUTHENTICATED REVERSE PROXY | Apr 9, 2024 | Pending |
Array
(
[id] => 19501274
[patent_doc_number] => 20240340292
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => COGNITIVE FRAMEWORK AND IMPLEMENTATION METHODS FOR BUSINESS OPERATIONS INTELLIGENCE
[patent_app_type] => utility
[patent_app_number] => 18/625046
[patent_app_country] => US
[patent_app_date] => 2024-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8412
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18625046
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/625046 | COGNITIVE FRAMEWORK AND IMPLEMENTATION METHODS FOR BUSINESS OPERATIONS INTELLIGENCE | Apr 1, 2024 | Pending |
Array
(
[id] => 19501274
[patent_doc_number] => 20240340292
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => COGNITIVE FRAMEWORK AND IMPLEMENTATION METHODS FOR BUSINESS OPERATIONS INTELLIGENCE
[patent_app_type] => utility
[patent_app_number] => 18/625046
[patent_app_country] => US
[patent_app_date] => 2024-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8412
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18625046
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/625046 | COGNITIVE FRAMEWORK AND IMPLEMENTATION METHODS FOR BUSINESS OPERATIONS INTELLIGENCE | Apr 1, 2024 | Pending |
Array
(
[id] => 20252125
[patent_doc_number] => 20250300994
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-25
[patent_title] => SYSTEMS AND METHODS FOR ANTI-FRAUD MESSAGE INSPECTION
[patent_app_type] => utility
[patent_app_number] => 18/613572
[patent_app_country] => US
[patent_app_date] => 2024-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1106
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18613572
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/613572 | SYSTEMS AND METHODS FOR ANTI-FRAUD MESSAGE INSPECTION | Mar 21, 2024 | Pending |
Array
(
[id] => 20236737
[patent_doc_number] => 20250294056
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-18
[patent_title] => Generating Deceptions using Web Assembly Binaries
[patent_app_type] => utility
[patent_app_number] => 18/606309
[patent_app_country] => US
[patent_app_date] => 2024-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2341
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18606309
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/606309 | Generating Deceptions using Web Assembly Binaries | Mar 14, 2024 | Issued |
Array
(
[id] => 19393936
[patent_doc_number] => 20240283806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-22
[patent_title] => NETWORK ANOMALY DETECTION
[patent_app_type] => utility
[patent_app_number] => 18/581779
[patent_app_country] => US
[patent_app_date] => 2024-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4690
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18581779
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/581779 | NETWORK ANOMALY DETECTION | Feb 19, 2024 | Pending |
Array
(
[id] => 19393936
[patent_doc_number] => 20240283806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-22
[patent_title] => NETWORK ANOMALY DETECTION
[patent_app_type] => utility
[patent_app_number] => 18/581779
[patent_app_country] => US
[patent_app_date] => 2024-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4690
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18581779
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/581779 | NETWORK ANOMALY DETECTION | Feb 19, 2024 | Pending |
Array
(
[id] => 19935945
[patent_doc_number] => 12309158
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-20
[patent_title] => Systems and methods for accessing cloud resources from a local development environment
[patent_app_type] => utility
[patent_app_number] => 18/433231
[patent_app_country] => US
[patent_app_date] => 2024-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2762
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18433231
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/433231 | Systems and methods for accessing cloud resources from a local development environment | Feb 4, 2024 | Issued |
Array
(
[id] => 19365363
[patent_doc_number] => 20240267397
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-08
[patent_title] => INTERCEPTING WORTHLESS REQUESTS AT THE NETWORK EDGE USING MACHINE LEARNING
[patent_app_type] => utility
[patent_app_number] => 18/431852
[patent_app_country] => US
[patent_app_date] => 2024-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9255
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18431852
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/431852 | INTERCEPTING WORTHLESS REQUESTS AT THE NETWORK EDGE USING MACHINE LEARNING | Feb 1, 2024 | Pending |