
Yonas A. Bayou
Examiner (ID: 16390, Phone: (571)272-7610 , Office: P/2434 )
| Most Active Art Unit | 2434 |
| Art Unit(s) | 2434, 2499, 2134 |
| Total Applications | 942 |
| Issued Applications | 748 |
| Pending Applications | 78 |
| Abandoned Applications | 145 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19307475
[patent_doc_number] => 20240236056
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-11
[patent_title] => AUTHENTICATING WORK ORDER REQUESTS IN A MULTIPLE NODE ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 18/151158
[patent_app_country] => US
[patent_app_date] => 2023-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6281
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18151158
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/151158 | Authenticating work order requests in a multiple node environment | Jan 5, 2023 | Issued |
Array
(
[id] => 19284164
[patent_doc_number] => 20240220640
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-04
[patent_title] => COMBINED PROTECTION OF SYMMETRIC-KEY PRIMITIVES AGAINST SIDE-CHANNEL AND FAULT ATTACKS
[patent_app_type] => utility
[patent_app_number] => 18/148638
[patent_app_country] => US
[patent_app_date] => 2022-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10830
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18148638
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/148638 | COMBINED PROTECTION OF SYMMETRIC-KEY PRIMITIVES AGAINST SIDE-CHANNEL AND FAULT ATTACKS | Dec 29, 2022 | Abandoned |
Array
(
[id] => 18358492
[patent_doc_number] => 11646903
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-05-09
[patent_title] => Systems and methods for generating shell-wrapped self-executing programs for conducting cryptographically secure actions
[patent_app_type] => utility
[patent_app_number] => 18/063052
[patent_app_country] => US
[patent_app_date] => 2022-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 13254
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18063052
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/063052 | Systems and methods for generating shell-wrapped self-executing programs for conducting cryptographically secure actions | Dec 6, 2022 | Issued |
Array
(
[id] => 18457473
[patent_doc_number] => 20230198755
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-22
[patent_title] => APPARATUS AND METHOD FOR DETECTING ERRORS DURING DATA ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 18/076899
[patent_app_country] => US
[patent_app_date] => 2022-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11882
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18076899
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/076899 | Apparatus and method for detecting errors during data encryption | Dec 6, 2022 | Issued |
Array
(
[id] => 18285922
[patent_doc_number] => 20230101394
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-30
[patent_title] => MONITORING INFORMATION-SECURITY COVERAGE TO IDENTIFY AN EXPLOITABLE WEAKNESS IN THE INFORMATION-SECURING COVERAGE
[patent_app_type] => utility
[patent_app_number] => 18/074070
[patent_app_country] => US
[patent_app_date] => 2022-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12199
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18074070
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/074070 | Monitoring information-security coverage to identify an exploitable weakness in the information-securing coverage | Dec 1, 2022 | Issued |
Array
(
[id] => 19635714
[patent_doc_number] => 20240414163
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-12
[patent_title] => ACCESS MANAGEMENT SYSTEM AND ASSOCIATED COMPUTER-IMPLEMENTED METHODS
[patent_app_type] => utility
[patent_app_number] => 18/712198
[patent_app_country] => US
[patent_app_date] => 2022-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8308
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18712198
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/712198 | ACCESS MANAGEMENT SYSTEM AND ASSOCIATED COMPUTER-IMPLEMENTED METHODS | Nov 22, 2022 | Pending |
Array
(
[id] => 19635714
[patent_doc_number] => 20240414163
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-12
[patent_title] => ACCESS MANAGEMENT SYSTEM AND ASSOCIATED COMPUTER-IMPLEMENTED METHODS
[patent_app_type] => utility
[patent_app_number] => 18/712198
[patent_app_country] => US
[patent_app_date] => 2022-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8308
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18712198
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/712198 | ACCESS MANAGEMENT SYSTEM AND ASSOCIATED COMPUTER-IMPLEMENTED METHODS | Nov 22, 2022 | Pending |
Array
(
[id] => 18892116
[patent_doc_number] => 11870900
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-01-09
[patent_title] => Detecting vulnerable encryption keys in network communication systems
[patent_app_type] => utility
[patent_app_number] => 17/991318
[patent_app_country] => US
[patent_app_date] => 2022-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 11438
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17991318
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/991318 | Detecting vulnerable encryption keys in network communication systems | Nov 20, 2022 | Issued |
Array
(
[id] => 18272470
[patent_doc_number] => 20230093712
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-23
[patent_title] => SYSTEMS AND METHODS FOR IMPLEMENTING A MACHINE LEARNING APPROACH TO MODELING ENTITY BEHAVIOR
[patent_app_type] => utility
[patent_app_number] => 17/991119
[patent_app_country] => US
[patent_app_date] => 2022-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13471
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17991119
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/991119 | Systems and methods for implementing a machine learning approach to modeling entity behavior | Nov 20, 2022 | Issued |
Array
(
[id] => 18395753
[patent_doc_number] => 20230163974
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-05-25
[patent_title] => SYSTEMS AND METHODS FOR MESSAGE AUTHENTICATION USING EFFICIENT SIGNATURES AND SECRET SHARING
[patent_app_type] => utility
[patent_app_number] => 17/989965
[patent_app_country] => US
[patent_app_date] => 2022-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7117
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17989965
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/989965 | SYSTEMS AND METHODS FOR MESSAGE AUTHENTICATION USING EFFICIENT SIGNATURES AND SECRET SHARING | Nov 17, 2022 | Pending |
Array
(
[id] => 18239178
[patent_doc_number] => 20230071489
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-09
[patent_title] => Method of and system for providing access to access restricted content to a user
[patent_app_type] => utility
[patent_app_number] => 17/986919
[patent_app_country] => US
[patent_app_date] => 2022-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6723
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17986919
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/986919 | Method of and system for providing access to access restricted content to a user | Nov 14, 2022 | Abandoned |
Array
(
[id] => 19063982
[patent_doc_number] => 11943247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-03-26
[patent_title] => Systems and methods for detection and mitigation of malicious encryption
[patent_app_type] => utility
[patent_app_number] => 17/982257
[patent_app_country] => US
[patent_app_date] => 2022-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13171
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17982257
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/982257 | Systems and methods for detection and mitigation of malicious encryption | Nov 6, 2022 | Issued |
Array
(
[id] => 18828307
[patent_doc_number] => 11843605
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-12
[patent_title] => Methods and systems for data traffic based adaptive security
[patent_app_type] => utility
[patent_app_number] => 18/051240
[patent_app_country] => US
[patent_app_date] => 2022-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 28134
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18051240
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/051240 | Methods and systems for data traffic based adaptive security | Oct 30, 2022 | Issued |
Array
(
[id] => 20176568
[patent_doc_number] => 12395328
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-19
[patent_title] => Identity checking method using user terminals
[patent_app_type] => utility
[patent_app_number] => 18/046563
[patent_app_country] => US
[patent_app_date] => 2022-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 0
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18046563
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/046563 | Identity checking method using user terminals | Oct 13, 2022 | Issued |
Array
(
[id] => 19924886
[patent_doc_number] => 12299167
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-13
[patent_title] => Techniques for data classification and for protecting cloud environments from cybersecurity threats using data classification
[patent_app_type] => utility
[patent_app_number] => 18/046204
[patent_app_country] => US
[patent_app_date] => 2022-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2442
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18046204
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/046204 | Techniques for data classification and for protecting cloud environments from cybersecurity threats using data classification | Oct 12, 2022 | Issued |
Array
(
[id] => 18951787
[patent_doc_number] => 11895098
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-06
[patent_title] => Storing encrypted chunksets of data in a vast storage network
[patent_app_type] => utility
[patent_app_number] => 17/937286
[patent_app_country] => US
[patent_app_date] => 2022-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 10
[patent_no_of_words] => 6234
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17937286
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/937286 | Storing encrypted chunksets of data in a vast storage network | Sep 29, 2022 | Issued |
Array
(
[id] => 18609125
[patent_doc_number] => 11750615
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-09-05
[patent_title] => Securing development and operations pipelines
[patent_app_type] => utility
[patent_app_number] => 17/937300
[patent_app_country] => US
[patent_app_date] => 2022-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8422
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17937300
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/937300 | Securing development and operations pipelines | Sep 29, 2022 | Issued |
Array
(
[id] => 18976390
[patent_doc_number] => 20240056482
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-02-15
[patent_title] => EXPEDITED RECOVERY BASED ON DATA STORAGE MANAGEMENT INTEGRATION WITH CYBER THREAT DECEPTION
[patent_app_type] => utility
[patent_app_number] => 17/954189
[patent_app_country] => US
[patent_app_date] => 2022-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 42426
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 254
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17954189
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/954189 | Expedited recovery based on data storage management integration with cyber threat deception | Sep 26, 2022 | Issued |
Array
(
[id] => 18319358
[patent_doc_number] => 20230117486
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-04-20
[patent_title] => ANTI TAMPER PROCESSING
[patent_app_type] => utility
[patent_app_number] => 17/931336
[patent_app_country] => US
[patent_app_date] => 2022-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 33160
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17931336
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/931336 | ANTI TAMPER PROCESSING | Sep 11, 2022 | Pending |
Array
(
[id] => 19911646
[patent_doc_number] => 12287856
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-04-29
[patent_title] => Computer-based systems applying textual embedding space software engines to authentication question and answers for identifying a user and methods of use thereof
[patent_app_type] => utility
[patent_app_number] => 17/942401
[patent_app_country] => US
[patent_app_date] => 2022-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 10171
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 407
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17942401
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/942401 | Computer-based systems applying textual embedding space software engines to authentication question and answers for identifying a user and methods of use thereof | Sep 11, 2022 | Issued |