32 pending office actions
| App # | Title | Examiner | Art Unit | Status | Filed |
|---|---|---|---|---|---|
| 18920701 | EFFICACY SCORING METRIC FOR AN ACCESS CONTROL POLICY LIST | MAI, KEVIN S | 2499 | Non-Final OA | Oct 18, 2024 |
| 18902728 | MITIGATION OF ROGUE WI-FI 6E COMPATIBLE ACCESS POINTS | TRUONG, LAN DAI T | 2444 | Non-Final OA | Sep 30, 2024 |
| 18898306 | DETECTING PHISHING WEBPAGES VIA TEXTUAL ANALYSIS FROM SCREENSHOTS | DO, KHANG D | 2492 | Non-Final OA | Sep 26, 2024 |
| 18894191 | PREEMPTIVE NETWORK REMEDIATION OF WIRELESS NETWORK ISSUES WITH ARTIFICIAL INTELLIGENCE TO PREVENT USER SWITCHES TO WIRED NETWORKS | KEEHN, RICHARD G | 2444 | Non-Final OA | Sep 24, 2024 |
| 18789875 | ENDPOINT CLIENT APPLICATION AUTHENTICATION AND ACCESS CONTROL ON ZERO-TRUST NETWORKS | TURCHEN, JAMES R | 2439 | Non-Final OA | Jul 31, 2024 |
| 18756220 | AUTOMATICALLY ASSOCIATING SECURITY POLICY WITH A USER ON VIDEO BASED ON WI-FI DATA | WILLIAMS, CLAYTON R | 2443 | Final Rejection | Jun 27, 2024 |
| 18744051 | SYSTEMS AND METHODS FOR SECURE, SCALABLE ZERO TRUST SECURITY PROCESSING | SALEHI, HELAI | 2433 | Final Rejection | Jun 14, 2024 |
| 18669162 | METHODS FOR APPLYING GENERATIVE AI WITH SECRECY GUARANTEES | VANG, MENG | 2443 | Final Rejection | May 20, 2024 |
| 18647655 | SYSTEMS AND METHODS FOR NETWORK MONITORING OF A NETWORK USING SUPERVISED MACHINE LEARNING AND REINFORCEMENT LEARNING | NGUYEN, PHUOC H | 2451 | Final Rejection | Apr 26, 2024 |
| 18621471 | SYSTEMS AND METHODS FOR SECURE, SCALABLE ZERO TRUST SECURITY PROCESSING | SALEHI, HELAI | 2433 | Final Rejection | Mar 29, 2024 |
| 18619834 | THREAT-INFORMED ADVERSARY ATTACK SIMULATION | ALI, AFAQ | 2434 | Final Rejection | Mar 28, 2024 |
| 18615389 | ASSET CRAWLING WITH INTERNET ARCHIVES FOR ENHANCED WEB APPLICATION SCANNING | HAILU, TESHOME | 2434 | Final Rejection | Mar 25, 2024 |
| 18401549 | AUTOMOTIVE SECURITY CONFIGURATION MANAGEMENT | NGUYEN, DUY KHUONG THANH | 2199 | Final Rejection | Dec 31, 2023 |
| 18401570 | TRANSPARENT PROXY MODE AUTHENTICATION IN DNS DDOS MITIGATION | MACILWINEN, JOHN MOORE JAIN | 2454 | Final Rejection | Dec 31, 2023 |
| 18401593 | MANAGEMENT OF WIRELESS AND WIRED MULTICAST TRAFFIC | CHENG, CHI TANG P | 2463 | Non-Final OA | Dec 31, 2023 |
| 18400233 | INSIDER THREAT REPORTING MECHANISM | WILLIAMS, JEFFERY L | 2495 | Final Rejection | Dec 29, 2023 |
| 18542268 | ZTNA TOKEN BASED FORWARDING PATH GENERATION MECHANISM | SARKER, SANCHIT K | 2495 | Non-Final OA | Dec 15, 2023 |
| 18542285 | DISRUPTING CONNECTIONS BETWEEN ROGUE ACCESS POINTS AND ROGUE STATIONS WITH SPOOFED BSS TRANSITION MANAGEMENT REQUEST FRAMES | HUANG, WEN WU | 2648 | Non-Final OA | Dec 15, 2023 |
| 18542262 | PROACTIVELY ASSIST ROAMING OF WI-FI 6E STATIONS WITH SMART-MANAGEMENT OF FAST BSS TRANSITION | RIVAS, SALVADOR E | 2413 | Non-Final OA | Dec 15, 2023 |
| 18525623 | PERFORMING FINGERPRINT-BASED DATA LOSS PREVENTION (DLP) USING INFORMATION OBTAINED FROM CLOUD-NATIVE SERVICES | VAUGHAN, MICHAEL R | 2431 | Final Rejection | Nov 30, 2023 |
| 18240900 | MANAGEMENT OF RAISED SECURITY EVENTS AT A DATA PROCESSING SYSTEM | DAY, JASMINE MOCHEN | 2499 | Final Rejection | Aug 31, 2023 |
| 18238081 | SYSTEMS AND METHODS FOR HARDWARE ASSISTED INITIAL AND SUBSEQUENT EVENT DETECTION | NAJI, YOUNES | 2445 | Final Rejection | Aug 25, 2023 |
| 18208098 | SYSTEMS AND METHODS FOR EDGE PROCESSING USING SELECTIVELY SUSPENDED NETWORK SECURITY | AHMED, MAHABUB S | 2434 | Final Rejection | Jun 09, 2023 |
| 18311307 | Identifying An Attack Surface Of A Cloud Deployment | RONI, SYED A | 2432 | Final Rejection | May 03, 2023 |
| 17957337 | INTERNET OF THINGS (IOT) DEVICE IDENTIFICATION USING TRAFFIC PATTERNS | KOBROSLI, SHADI HASSAN | 2492 | Final Rejection | Sep 30, 2022 |
| 17888683 | SYSTEMS AND METHODS FOR DETECTING INSIDER ATTACKS ON A COMMUNICATION NETWORK | KHADKA, AMIT | 2432 | Final Rejection | Aug 16, 2022 |
| 17837815 | Monitoring a Cloud Environment | SHAW, PETER C | 2493 | Final Rejection | Jun 10, 2022 |
| 17829280 | INGESTING EVENT DATA INTO A DATA WAREHOUSE | LE, UYEN T | 2156 | Final Rejection | May 31, 2022 |
| 17566810 | AUTOMATED RESPONSE TO COMPUTER VULNERABILITIES | LE, THANH T | 2495 | Final Rejection | Dec 31, 2021 |
| 17378616 | Machine Learning Systems and Methods for Using an Orthogonality Heuristic to Identify an Ignored Labeling Target | MAIDO, MAGGIE T | 2129 | Non-Final OA | Jul 16, 2021 |
| 17364691 | ENFORCING JAVASCRIPT FOR MITB DETECTION | HABTEGEORGIS, MATTHIAS | 2491 | Final Rejection | Jun 30, 2021 |
| 16836753 | PORTABLE, HARDWARE-BASED AUTHENTICATION CLIENT TO ENFORCE USER-TO-SITE NETWORK ACCESS CONTROL RESTRICTIONS | DAVIS, ZACHARY A | 2492 | Final Rejection | Mar 31, 2020 |
IP Author helps IP teams respond to office actions faster with AI-generated responses, examiner analytics, and prosecution intelligence.
Start Free Trial