
Zheren J. Yang
Examiner (ID: 8995, Phone: (571)272-6604 , Office: P/1781 )
| Most Active Art Unit | 1781 |
| Art Unit(s) | 1781 |
| Total Applications | 601 |
| Issued Applications | 302 |
| Pending Applications | 72 |
| Abandoned Applications | 237 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20236723
[patent_doc_number] => 20250294042
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-18
[patent_title] => ENCRYPTED INTERSTITIAL TECHNIQUES FOR WEB SECURITY
[patent_app_type] => utility
[patent_app_number] => 18/648754
[patent_app_country] => US
[patent_app_date] => 2024-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5735
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18648754
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/648754 | ENCRYPTED INTERSTITIAL TECHNIQUES FOR WEB SECURITY | Apr 28, 2024 | Pending |
Array
(
[id] => 19671903
[patent_doc_number] => 12184687
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-12-31
[patent_title] => Techniques for mapping security controls to cyber threats
[patent_app_type] => utility
[patent_app_number] => 18/649492
[patent_app_country] => US
[patent_app_date] => 2024-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11341
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18649492
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/649492 | Techniques for mapping security controls to cyber threats | Apr 28, 2024 | Issued |
Array
(
[id] => 19671902
[patent_doc_number] => 12184686
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-12-31
[patent_title] => IOT device inspection method, and device therefor
[patent_app_type] => utility
[patent_app_number] => 18/647831
[patent_app_country] => US
[patent_app_date] => 2024-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 20
[patent_no_of_words] => 5437
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 416
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18647831
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/647831 | IOT device inspection method, and device therefor | Apr 25, 2024 | Issued |
Array
(
[id] => 19530149
[patent_doc_number] => 20240354051
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-24
[patent_title] => Multi-User Media Playback System
[patent_app_type] => utility
[patent_app_number] => 18/635595
[patent_app_country] => US
[patent_app_date] => 2024-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23954
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18635595
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/635595 | Multi-User Media Playback System | Apr 14, 2024 | Pending |
Array
(
[id] => 20539480
[patent_doc_number] => 12556563
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-02-17
[patent_title] => Computer method for ranked ensemble filtering of computer network transmissions
[patent_app_type] => utility
[patent_app_number] => 18/631736
[patent_app_country] => US
[patent_app_date] => 2024-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9267
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18631736
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/631736 | Computer method for ranked ensemble filtering of computer network transmissions | Apr 9, 2024 | Issued |
Array
(
[id] => 19393938
[patent_doc_number] => 20240283808
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-22
[patent_title] => SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTS
[patent_app_type] => utility
[patent_app_number] => 18/628581
[patent_app_country] => US
[patent_app_date] => 2024-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 56746
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18628581
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/628581 | Systems and methods for dynamic valuation of protection products | Apr 4, 2024 | Issued |
Array
(
[id] => 20704978
[patent_doc_number] => 12627701
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-05-12
[patent_title] => System and method for determining network pathway security vulnerabilities
[patent_app_type] => utility
[patent_app_number] => 18/624317
[patent_app_country] => US
[patent_app_date] => 2024-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1164
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 297
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18624317
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/624317 | System and method for determining network pathway security vulnerabilities | Apr 1, 2024 | Issued |
Array
(
[id] => 19766728
[patent_doc_number] => 12225037
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-02-11
[patent_title] => Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context
[patent_app_type] => utility
[patent_app_number] => 18/621304
[patent_app_country] => US
[patent_app_date] => 2024-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10099
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18621304
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/621304 | Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context | Mar 28, 2024 | Issued |
Array
(
[id] => 20539479
[patent_doc_number] => 12556562
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-02-17
[patent_title] => Deduplication of endpoint connections
[patent_app_type] => utility
[patent_app_number] => 18/617404
[patent_app_country] => US
[patent_app_date] => 2024-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12054
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18617404
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/617404 | Deduplication of endpoint connections | Mar 25, 2024 | Issued |
Array
(
[id] => 19454001
[patent_doc_number] => 20240314131
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-19
[patent_title] => ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE
[patent_app_type] => utility
[patent_app_number] => 18/603590
[patent_app_country] => US
[patent_app_date] => 2024-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10494
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18603590
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/603590 | Access gateway system for accessing a resource | Mar 12, 2024 | Issued |
Array
(
[id] => 20055015
[patent_doc_number] => 20250193237
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-12
[patent_title] => METHOD FOR DETERMINING FALSE FLAGS OF CYBER ATTACKS AND APPARATUS FOR EXECUTING THE METHOD
[patent_app_type] => utility
[patent_app_number] => 18/841556
[patent_app_country] => US
[patent_app_date] => 2024-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2716
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18841556
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/841556 | Method for determining false flags of cyber attacks and apparatus for executing the method | Mar 11, 2024 | Issued |
Array
(
[id] => 19437166
[patent_doc_number] => 20240305664
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-12
[patent_title] => CYBERSECURITY OPERATIONS MITIGATION MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 18/601572
[patent_app_country] => US
[patent_app_date] => 2024-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18217
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18601572
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/601572 | Cybersecurity operations mitigation management | Mar 10, 2024 | Issued |
Array
(
[id] => 19748567
[patent_doc_number] => 20250037132
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => TRUST PLATFORM
[patent_app_type] => utility
[patent_app_number] => 18/599550
[patent_app_country] => US
[patent_app_date] => 2024-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11264
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18599550
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/599550 | TRUST PLATFORM | Mar 7, 2024 | Pending |
Array
(
[id] => 20197753
[patent_doc_number] => 20250274463
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-28
[patent_title] => SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS
[patent_app_type] => utility
[patent_app_number] => 18/586982
[patent_app_country] => US
[patent_app_date] => 2024-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6623
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18586982
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/586982 | SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS | Feb 25, 2024 | Pending |
Array
(
[id] => 20565492
[patent_doc_number] => 12568110
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-03-03
[patent_title] => Threat mitigation system and method
[patent_app_type] => utility
[patent_app_number] => 18/584994
[patent_app_country] => US
[patent_app_date] => 2024-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 44
[patent_figures_cnt] => 44
[patent_no_of_words] => 44229
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18584994
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/584994 | Threat mitigation system and method | Feb 21, 2024 | Issued |
Array
(
[id] => 19214446
[patent_doc_number] => 12003528
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-06-04
[patent_title] => Endogenous dynamic defense architecture-based multi-objective service function chain deployment method
[patent_app_type] => utility
[patent_app_number] => 18/581424
[patent_app_country] => US
[patent_app_date] => 2024-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 5849
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 1094
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18581424
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/581424 | Endogenous dynamic defense architecture-based multi-objective service function chain deployment method | Feb 19, 2024 | Issued |
Array
(
[id] => 19267887
[patent_doc_number] => 20240211591
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-27
[patent_title] => AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS
[patent_app_type] => utility
[patent_app_number] => 18/432037
[patent_app_country] => US
[patent_app_date] => 2024-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12761
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18432037
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/432037 | AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS | Feb 3, 2024 | Issued |
Array
(
[id] => 19254261
[patent_doc_number] => 20240205258
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-20
[patent_title] => CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES
[patent_app_type] => utility
[patent_app_number] => 18/427616
[patent_app_country] => US
[patent_app_date] => 2024-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12016
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18427616
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/427616 | CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES | Jan 29, 2024 | Pending |
Array
(
[id] => 19640063
[patent_doc_number] => 12170682
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-12-17
[patent_title] => Application endpoint cybersecurity techniques
[patent_app_type] => utility
[patent_app_number] => 18/425847
[patent_app_country] => US
[patent_app_date] => 2024-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11733
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18425847
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/425847 | Application endpoint cybersecurity techniques | Jan 28, 2024 | Issued |
Array
(
[id] => 19488165
[patent_doc_number] => 12107899
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-10-01
[patent_title] => TTP based automated playbook generation method and system performing the same
[patent_app_type] => utility
[patent_app_number] => 18/420458
[patent_app_country] => US
[patent_app_date] => 2024-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6454
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18420458
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/420458 | TTP based automated playbook generation method and system performing the same | Jan 22, 2024 | Issued |