Search

Zheren J. Yang

Examiner (ID: 8995, Phone: (571)272-6604 , Office: P/1781 )

Most Active Art Unit
1781
Art Unit(s)
1781
Total Applications
601
Issued Applications
302
Pending Applications
72
Abandoned Applications
237

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20236723 [patent_doc_number] => 20250294042 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-09-18 [patent_title] => ENCRYPTED INTERSTITIAL TECHNIQUES FOR WEB SECURITY [patent_app_type] => utility [patent_app_number] => 18/648754 [patent_app_country] => US [patent_app_date] => 2024-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5735 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 176 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18648754 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/648754
ENCRYPTED INTERSTITIAL TECHNIQUES FOR WEB SECURITY Apr 28, 2024 Pending
Array ( [id] => 19671903 [patent_doc_number] => 12184687 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-12-31 [patent_title] => Techniques for mapping security controls to cyber threats [patent_app_type] => utility [patent_app_number] => 18/649492 [patent_app_country] => US [patent_app_date] => 2024-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11341 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 206 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18649492 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/649492
Techniques for mapping security controls to cyber threats Apr 28, 2024 Issued
Array ( [id] => 19671902 [patent_doc_number] => 12184686 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-12-31 [patent_title] => IOT device inspection method, and device therefor [patent_app_type] => utility [patent_app_number] => 18/647831 [patent_app_country] => US [patent_app_date] => 2024-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 20 [patent_no_of_words] => 5437 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 416 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18647831 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/647831
IOT device inspection method, and device therefor Apr 25, 2024 Issued
Array ( [id] => 19530149 [patent_doc_number] => 20240354051 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-24 [patent_title] => Multi-User Media Playback System [patent_app_type] => utility [patent_app_number] => 18/635595 [patent_app_country] => US [patent_app_date] => 2024-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 23954 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 213 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18635595 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/635595
Multi-User Media Playback System Apr 14, 2024 Pending
Array ( [id] => 20539480 [patent_doc_number] => 12556563 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2026-02-17 [patent_title] => Computer method for ranked ensemble filtering of computer network transmissions [patent_app_type] => utility [patent_app_number] => 18/631736 [patent_app_country] => US [patent_app_date] => 2024-04-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 9267 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 184 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18631736 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/631736
Computer method for ranked ensemble filtering of computer network transmissions Apr 9, 2024 Issued
Array ( [id] => 19393938 [patent_doc_number] => 20240283808 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-22 [patent_title] => SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTS [patent_app_type] => utility [patent_app_number] => 18/628581 [patent_app_country] => US [patent_app_date] => 2024-04-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 56746 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18628581 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/628581
Systems and methods for dynamic valuation of protection products Apr 4, 2024 Issued
Array ( [id] => 20704978 [patent_doc_number] => 12627701 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2026-05-12 [patent_title] => System and method for determining network pathway security vulnerabilities [patent_app_type] => utility [patent_app_number] => 18/624317 [patent_app_country] => US [patent_app_date] => 2024-04-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1164 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 297 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18624317 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/624317
System and method for determining network pathway security vulnerabilities Apr 1, 2024 Issued
Array ( [id] => 19766728 [patent_doc_number] => 12225037 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-02-11 [patent_title] => Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context [patent_app_type] => utility [patent_app_number] => 18/621304 [patent_app_country] => US [patent_app_date] => 2024-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10099 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 142 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18621304 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/621304
Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context Mar 28, 2024 Issued
Array ( [id] => 20539479 [patent_doc_number] => 12556562 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2026-02-17 [patent_title] => Deduplication of endpoint connections [patent_app_type] => utility [patent_app_number] => 18/617404 [patent_app_country] => US [patent_app_date] => 2024-03-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 12054 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18617404 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/617404
Deduplication of endpoint connections Mar 25, 2024 Issued
Array ( [id] => 19454001 [patent_doc_number] => 20240314131 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-09-19 [patent_title] => ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCE [patent_app_type] => utility [patent_app_number] => 18/603590 [patent_app_country] => US [patent_app_date] => 2024-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10494 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18603590 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/603590
Access gateway system for accessing a resource Mar 12, 2024 Issued
Array ( [id] => 20055015 [patent_doc_number] => 20250193237 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-12 [patent_title] => METHOD FOR DETERMINING FALSE FLAGS OF CYBER ATTACKS AND APPARATUS FOR EXECUTING THE METHOD [patent_app_type] => utility [patent_app_number] => 18/841556 [patent_app_country] => US [patent_app_date] => 2024-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2716 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18841556 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/841556
Method for determining false flags of cyber attacks and apparatus for executing the method Mar 11, 2024 Issued
Array ( [id] => 19437166 [patent_doc_number] => 20240305664 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-09-12 [patent_title] => CYBERSECURITY OPERATIONS MITIGATION MANAGEMENT [patent_app_type] => utility [patent_app_number] => 18/601572 [patent_app_country] => US [patent_app_date] => 2024-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18217 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 91 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18601572 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/601572
Cybersecurity operations mitigation management Mar 10, 2024 Issued
Array ( [id] => 19748567 [patent_doc_number] => 20250037132 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-30 [patent_title] => TRUST PLATFORM [patent_app_type] => utility [patent_app_number] => 18/599550 [patent_app_country] => US [patent_app_date] => 2024-03-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11264 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18599550 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/599550
TRUST PLATFORM Mar 7, 2024 Pending
Array ( [id] => 20197753 [patent_doc_number] => 20250274463 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-08-28 [patent_title] => SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS [patent_app_type] => utility [patent_app_number] => 18/586982 [patent_app_country] => US [patent_app_date] => 2024-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6623 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18586982 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/586982
SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKS Feb 25, 2024 Pending
Array ( [id] => 20565492 [patent_doc_number] => 12568110 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2026-03-03 [patent_title] => Threat mitigation system and method [patent_app_type] => utility [patent_app_number] => 18/584994 [patent_app_country] => US [patent_app_date] => 2024-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 44 [patent_figures_cnt] => 44 [patent_no_of_words] => 44229 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18584994 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/584994
Threat mitigation system and method Feb 21, 2024 Issued
Array ( [id] => 19214446 [patent_doc_number] => 12003528 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-06-04 [patent_title] => Endogenous dynamic defense architecture-based multi-objective service function chain deployment method [patent_app_type] => utility [patent_app_number] => 18/581424 [patent_app_country] => US [patent_app_date] => 2024-02-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 5849 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 1094 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18581424 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/581424
Endogenous dynamic defense architecture-based multi-objective service function chain deployment method Feb 19, 2024 Issued
Array ( [id] => 19267887 [patent_doc_number] => 20240211591 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-06-27 [patent_title] => AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS [patent_app_type] => utility [patent_app_number] => 18/432037 [patent_app_country] => US [patent_app_date] => 2024-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12761 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 265 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18432037 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/432037
AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATS Feb 3, 2024 Issued
Array ( [id] => 19254261 [patent_doc_number] => 20240205258 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-06-20 [patent_title] => CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES [patent_app_type] => utility [patent_app_number] => 18/427616 [patent_app_country] => US [patent_app_date] => 2024-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12016 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18427616 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/427616
CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCES Jan 29, 2024 Pending
Array ( [id] => 19640063 [patent_doc_number] => 12170682 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-12-17 [patent_title] => Application endpoint cybersecurity techniques [patent_app_type] => utility [patent_app_number] => 18/425847 [patent_app_country] => US [patent_app_date] => 2024-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 11733 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18425847 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/425847
Application endpoint cybersecurity techniques Jan 28, 2024 Issued
Array ( [id] => 19488165 [patent_doc_number] => 12107899 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-10-01 [patent_title] => TTP based automated playbook generation method and system performing the same [patent_app_type] => utility [patent_app_number] => 18/420458 [patent_app_country] => US [patent_app_date] => 2024-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6454 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 264 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18420458 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/420458
TTP based automated playbook generation method and system performing the same Jan 22, 2024 Issued
Menu