Search

Yonas A. Bayou

Examiner (ID: 16390, Phone: (571)272-7610 , Office: P/2434 )

Most Active Art Unit
2434
Art Unit(s)
2434, 2499, 2134
Total Applications
942
Issued Applications
748
Pending Applications
78
Abandoned Applications
145

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 19307475 [patent_doc_number] => 20240236056 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-07-11 [patent_title] => AUTHENTICATING WORK ORDER REQUESTS IN A MULTIPLE NODE ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 18/151158 [patent_app_country] => US [patent_app_date] => 2023-01-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6281 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18151158 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/151158
Authenticating work order requests in a multiple node environment Jan 5, 2023 Issued
Array ( [id] => 19284164 [patent_doc_number] => 20240220640 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-07-04 [patent_title] => COMBINED PROTECTION OF SYMMETRIC-KEY PRIMITIVES AGAINST SIDE-CHANNEL AND FAULT ATTACKS [patent_app_type] => utility [patent_app_number] => 18/148638 [patent_app_country] => US [patent_app_date] => 2022-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10830 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18148638 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/148638
COMBINED PROTECTION OF SYMMETRIC-KEY PRIMITIVES AGAINST SIDE-CHANNEL AND FAULT ATTACKS Dec 29, 2022 Abandoned
Array ( [id] => 18358492 [patent_doc_number] => 11646903 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2023-05-09 [patent_title] => Systems and methods for generating shell-wrapped self-executing programs for conducting cryptographically secure actions [patent_app_type] => utility [patent_app_number] => 18/063052 [patent_app_country] => US [patent_app_date] => 2022-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 13254 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 112 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18063052 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/063052
Systems and methods for generating shell-wrapped self-executing programs for conducting cryptographically secure actions Dec 6, 2022 Issued
Array ( [id] => 18457473 [patent_doc_number] => 20230198755 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-06-22 [patent_title] => APPARATUS AND METHOD FOR DETECTING ERRORS DURING DATA ENCRYPTION [patent_app_type] => utility [patent_app_number] => 18/076899 [patent_app_country] => US [patent_app_date] => 2022-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11882 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 89 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18076899 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/076899
Apparatus and method for detecting errors during data encryption Dec 6, 2022 Issued
Array ( [id] => 18285922 [patent_doc_number] => 20230101394 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-03-30 [patent_title] => MONITORING INFORMATION-SECURITY COVERAGE TO IDENTIFY AN EXPLOITABLE WEAKNESS IN THE INFORMATION-SECURING COVERAGE [patent_app_type] => utility [patent_app_number] => 18/074070 [patent_app_country] => US [patent_app_date] => 2022-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12199 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 85 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18074070 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/074070
Monitoring information-security coverage to identify an exploitable weakness in the information-securing coverage Dec 1, 2022 Issued
Array ( [id] => 19635714 [patent_doc_number] => 20240414163 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-12 [patent_title] => ACCESS MANAGEMENT SYSTEM AND ASSOCIATED COMPUTER-IMPLEMENTED METHODS [patent_app_type] => utility [patent_app_number] => 18/712198 [patent_app_country] => US [patent_app_date] => 2022-11-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8308 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18712198 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/712198
ACCESS MANAGEMENT SYSTEM AND ASSOCIATED COMPUTER-IMPLEMENTED METHODS Nov 22, 2022 Pending
Array ( [id] => 19635714 [patent_doc_number] => 20240414163 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-12 [patent_title] => ACCESS MANAGEMENT SYSTEM AND ASSOCIATED COMPUTER-IMPLEMENTED METHODS [patent_app_type] => utility [patent_app_number] => 18/712198 [patent_app_country] => US [patent_app_date] => 2022-11-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8308 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18712198 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/712198
ACCESS MANAGEMENT SYSTEM AND ASSOCIATED COMPUTER-IMPLEMENTED METHODS Nov 22, 2022 Pending
Array ( [id] => 18892116 [patent_doc_number] => 11870900 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-01-09 [patent_title] => Detecting vulnerable encryption keys in network communication systems [patent_app_type] => utility [patent_app_number] => 17/991318 [patent_app_country] => US [patent_app_date] => 2022-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 11438 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17991318 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/991318
Detecting vulnerable encryption keys in network communication systems Nov 20, 2022 Issued
Array ( [id] => 18272470 [patent_doc_number] => 20230093712 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-03-23 [patent_title] => SYSTEMS AND METHODS FOR IMPLEMENTING A MACHINE LEARNING APPROACH TO MODELING ENTITY BEHAVIOR [patent_app_type] => utility [patent_app_number] => 17/991119 [patent_app_country] => US [patent_app_date] => 2022-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13471 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 179 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17991119 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/991119
Systems and methods for implementing a machine learning approach to modeling entity behavior Nov 20, 2022 Issued
Array ( [id] => 18395753 [patent_doc_number] => 20230163974 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-05-25 [patent_title] => SYSTEMS AND METHODS FOR MESSAGE AUTHENTICATION USING EFFICIENT SIGNATURES AND SECRET SHARING [patent_app_type] => utility [patent_app_number] => 17/989965 [patent_app_country] => US [patent_app_date] => 2022-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7117 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17989965 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/989965
SYSTEMS AND METHODS FOR MESSAGE AUTHENTICATION USING EFFICIENT SIGNATURES AND SECRET SHARING Nov 17, 2022 Pending
Array ( [id] => 18239178 [patent_doc_number] => 20230071489 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-03-09 [patent_title] => Method of and system for providing access to access restricted content to a user [patent_app_type] => utility [patent_app_number] => 17/986919 [patent_app_country] => US [patent_app_date] => 2022-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6723 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 83 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17986919 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/986919
Method of and system for providing access to access restricted content to a user Nov 14, 2022 Abandoned
Array ( [id] => 19063982 [patent_doc_number] => 11943247 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-03-26 [patent_title] => Systems and methods for detection and mitigation of malicious encryption [patent_app_type] => utility [patent_app_number] => 17/982257 [patent_app_country] => US [patent_app_date] => 2022-11-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 13171 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17982257 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/982257
Systems and methods for detection and mitigation of malicious encryption Nov 6, 2022 Issued
Array ( [id] => 18828307 [patent_doc_number] => 11843605 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-12-12 [patent_title] => Methods and systems for data traffic based adaptive security [patent_app_type] => utility [patent_app_number] => 18/051240 [patent_app_country] => US [patent_app_date] => 2022-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 28134 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 205 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18051240 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/051240
Methods and systems for data traffic based adaptive security Oct 30, 2022 Issued
Array ( [id] => 20176568 [patent_doc_number] => 12395328 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-08-19 [patent_title] => Identity checking method using user terminals [patent_app_type] => utility [patent_app_number] => 18/046563 [patent_app_country] => US [patent_app_date] => 2022-10-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 0 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18046563 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/046563
Identity checking method using user terminals Oct 13, 2022 Issued
Array ( [id] => 19924886 [patent_doc_number] => 12299167 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-05-13 [patent_title] => Techniques for data classification and for protecting cloud environments from cybersecurity threats using data classification [patent_app_type] => utility [patent_app_number] => 18/046204 [patent_app_country] => US [patent_app_date] => 2022-10-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 2442 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 250 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18046204 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/046204
Techniques for data classification and for protecting cloud environments from cybersecurity threats using data classification Oct 12, 2022 Issued
Array ( [id] => 18951787 [patent_doc_number] => 11895098 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-02-06 [patent_title] => Storing encrypted chunksets of data in a vast storage network [patent_app_type] => utility [patent_app_number] => 17/937286 [patent_app_country] => US [patent_app_date] => 2022-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 10 [patent_no_of_words] => 6234 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17937286 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/937286
Storing encrypted chunksets of data in a vast storage network Sep 29, 2022 Issued
Array ( [id] => 18609125 [patent_doc_number] => 11750615 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2023-09-05 [patent_title] => Securing development and operations pipelines [patent_app_type] => utility [patent_app_number] => 17/937300 [patent_app_country] => US [patent_app_date] => 2022-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8422 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17937300 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/937300
Securing development and operations pipelines Sep 29, 2022 Issued
Array ( [id] => 18976390 [patent_doc_number] => 20240056482 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-02-15 [patent_title] => EXPEDITED RECOVERY BASED ON DATA STORAGE MANAGEMENT INTEGRATION WITH CYBER THREAT DECEPTION [patent_app_type] => utility [patent_app_number] => 17/954189 [patent_app_country] => US [patent_app_date] => 2022-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 42426 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 254 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17954189 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/954189
Expedited recovery based on data storage management integration with cyber threat deception Sep 26, 2022 Issued
Array ( [id] => 18319358 [patent_doc_number] => 20230117486 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-04-20 [patent_title] => ANTI TAMPER PROCESSING [patent_app_type] => utility [patent_app_number] => 17/931336 [patent_app_country] => US [patent_app_date] => 2022-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 33160 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 92 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17931336 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/931336
ANTI TAMPER PROCESSING Sep 11, 2022 Pending
Array ( [id] => 19911646 [patent_doc_number] => 12287856 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-04-29 [patent_title] => Computer-based systems applying textual embedding space software engines to authentication question and answers for identifying a user and methods of use thereof [patent_app_type] => utility [patent_app_number] => 17/942401 [patent_app_country] => US [patent_app_date] => 2022-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 12 [patent_no_of_words] => 10171 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 407 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17942401 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/942401
Computer-based systems applying textual embedding space software engines to authentication question and answers for identifying a user and methods of use thereof Sep 11, 2022 Issued
Menu