27 pending office actions
| App # | Title | Examiner | Art Unit | Status | Filed |
|---|---|---|---|---|---|
| 17986084 | PROVIDING RELEVANT INFORMATION DURING VIDEO PLAYBACK | DUBASKY, GIGI L | 2421 | Final Rejection | Nov 14, 2022 |
| 17968200 | RECOMMENDING NETWORK SECURITY RULE UPDATES BASED ON CHANGES IN THE NETWORK DATA | LEE, GIL H | 2446 | Non-Final OA | Oct 18, 2022 |
| 17967388 | SYSTEMS AND METHODS FOR AUTOMATICALLY SCALING CLUSTERS OR APPLICATIONS IN A CLOUD ENVIRONMENT | SWIFT, CHARLES M | 2196 | Final Rejection | Oct 17, 2022 |
| 17936397 | AUTO-SCALING HOST MACHINES | HU, SELINA ELISA | 2193 | Final Rejection | Sep 29, 2022 |
| 17947248 | UNICODE BASED ESTIMATION OF TEXT INTELLIGIBILITY | PULLIAS, JESSE SCOTT | 2655 | Final Rejection | Sep 19, 2022 |
| 17933201 | INTELLIGENT GENERATION OF THUMBNAIL IMAGES FOR MESSAGING APPLICATIONS | DRYDEN, EMMA ELIZABETH | 2677 | Final Rejection | Sep 19, 2022 |
| 17814925 | LOCATION-BASED PROXY FOR VIRTUAL MEETING OPTIMIZATION | GREENE, JOSEPH L | 2443 | Final Rejection | Jul 26, 2022 |
| 17870471 | MITIGATION OF VISUAL CONFUSION WHILE TRANSFERRING RICH TEXT DATA ACROSS APPLICATIONS WITH INVERSELY COLORED THEMES | ONAT, UMUT | 2194 | Final Rejection | Jul 21, 2022 |
| 17868378 | SYSTEM AND METHOD FOR COMBINING CYBER-SECURITY THREAT DETECTIONS | WILLIAMS, JEFFERY L | 2495 | Final Rejection | Jul 19, 2022 |
| 17861477 | SECURE INPUT METHOD EDITOR FOR VIRTUAL APPLICATIONS | SONG, HEE K | 2497 | Final Rejection | Jul 11, 2022 |
| 17860637 | User Interface Activation in a Secure Network System | MACILWINEN, JOHN MOORE JAIN | 2454 | Final Rejection | Jul 08, 2022 |
| 17860718 | EVALUATING THE QUALITY OF INTEGRATIONS FOR EXECUTING SEARCHES USING APPLICATION PROGRAMMING INTERFACES | DORAISWAMY, RANJIT P | 2166 | Final Rejection | Jul 08, 2022 |
| 17859336 | INACTIVITY LOGOFF ADJUSTMENT BASED ON SCHEDULED EVENTS | RONI, SYED A | 2432 | Final Rejection | Jul 07, 2022 |
| 17847678 | TASK MANAGEMENT TOOL | MANSFIELD, THOMAS L | 3624 | Non-Final OA | Jun 23, 2022 |
| 17664959 | COMPUTING DEVICE AND RELATED METHODS FOR PROVIDING ENHANCED COMPUTING RESOURCE ALLOCATIONS FOR APPLICATIONS | AKBARI, FARAZ TIMA | 2196 | Final Rejection | May 25, 2022 |
| 17729564 | END-POINT INSTANCE INDEXING AND OWNER POP SELECTION IN GATEWAY SERVICE TICKETING | DUONG, THAO DUC | 2446 | Final Rejection | Apr 26, 2022 |
| 17721999 | SYSTEMS AND METHODS FOR CREATING WORKFLOWS BY CHAINING MICROAPPS IN A WORKSPACE PLATFORM | TRAN, KENNETH PHUOC | 2196 | Final Rejection | Apr 15, 2022 |
| 17658473 | RESOURCE RECOMMENDATION SERVICE BASED ON USER EXPERTISE | SINGH, GURKANWALJIT | 3625 | Non-Final OA | Apr 08, 2022 |
| 17699236 | GENERATION OF MULTIPLE LIMITED-SCOPE ACCESS TOKENS | BENGZON, GREG C | 2444 | Final Rejection | Mar 21, 2022 |
| 17592240 | REMOTE BROWSER SESSION PRESENTATION WITH LOCAL BROWSER TABS | LIN, SHERMAN L | 2447 | Non-Final OA | Feb 03, 2022 |
| 17572834 | SYSTEMS AND METHODS FOR WATERMARKING AUDIO OF SAAS APPLICATIONS | TRACY JR., EDWARD | 2656 | Final Rejection | Jan 11, 2022 |
| 17570140 | Secure Display of Sensitive Content | STRAUB, D'ARCY WINSTON | 2491 | Final Rejection | Jan 06, 2022 |
| 17646910 | DISTRIBUTED WORKSPACE SUPPORT OF SINGLE SIGN-ON FOR WEB APPLICATIONS | NAJI, YOUNES | 2445 | Non-Final OA | Jan 04, 2022 |
| 17515288 | DYNAMIC SECURITY CHALLENGE AUTHENTICATION | LEUNG, ROBERT B | 2494 | Non-Final OA | Oct 29, 2021 |
| 17508326 | SYSTEMS AND METHODS FOR DETECTING AND PREDICTING VIRTUAL CPU RESOURCE STARVATION OF A VIRTUAL MACHINE | WOOD, WILLIAM C | 2193 | Final Rejection | Oct 22, 2021 |
| 17401768 | SCREEN SHARE FEATURE FOR ONLINE MEETINGS | SWARTZ, STEPHEN S | 3625 | Non-Final OA | Aug 13, 2021 |
| 16941001 | Secure Token Transfer between Untrusted Entities | AYALA, KEVIN ALEXIS | 2496 | Non-Final OA | Jul 28, 2020 |
IP Author helps IP teams respond to office actions faster with AI-generated responses, examiner analytics, and prosecution intelligence.
Start Free Trial