56 pending office actions
| App # | Title | Examiner | Art Unit | Status | Filed |
|---|---|---|---|---|---|
| 19067270 | AUTO GENERATING BUILD TIME POLICIES FROM RUN TIME POLICIES FOR SHIFT LEFT SECURITY | ROBINSON, GRETA LEE | 2163 | Non-Final OA | Feb 28, 2025 |
| 18961594 | Malicious C&C channel to fixed IP detection based on packet volume | LEE, MICHAEL M | 2436 | Non-Final OA | Nov 27, 2024 |
| 18947964 | AUTOMATIC NETWORK SIGNATURE GENERATION | VAUGHAN, MICHAEL R | 2431 | Non-Final OA | Nov 14, 2024 |
| 18940388 | NATURAL LANGUAGE TO CUSTOMIZE DATA VISUALIZATION | OWYANG, MICHELLE N | 2168 | Final Rejection | Nov 07, 2024 |
| 18931476 | AUTOMATICALLY DETECTING UNKNOWN PACKERS | LITTLE, VANCE M | 2494 | Non-Final OA | Oct 30, 2024 |
| 18925278 | MALWARE ANALYSIS THROUGH VIRTUAL MACHINE FORKING | WILLIAMS, JEFFERY L | 2495 | Non-Final OA | Oct 24, 2024 |
| 18899226 | TOKEN FREQUENCY BASED DATA MATCHING | SHAIFER HARRIMAN, DANT B | 2434 | Non-Final OA | Sep 27, 2024 |
| 18784438 | PERMANENT IDENTIFIER BASED SECURITY FOR REMOTE UES IN MOBILE NETWORKS | JOO, JOSHUA | 2445 | Final Rejection | Jul 25, 2024 |
| 18773921 | ZERO SHOT DETECTION OF LLM GENERATED PHISHING EMAILS | LAM, PHILIP HUNG FAI | 2656 | Non-Final OA | Jul 16, 2024 |
| 18774568 | MACHINE LEARNING PIPELINE FOR DETECTING ZERO-DAY PHISHING KIT SOURCE CODES | ANDERSON, MICHAEL D | 2433 | Non-Final OA | Jul 16, 2024 |
| 18767688 | PRIVACY-AWARE DYNAMIC ATTACK PATH EXPLAINER | SHAW, BRIAN F | 2432 | Non-Final OA | Jul 09, 2024 |
| 18759092 | ROOT DOMAIN BENIGNITY EVALUATION | SHIN, KYUNG H | 2447 | Non-Final OA | Jun 28, 2024 |
| 18758234 | PROACTIVELY DISCOVERING MALICIOUS DOMAINS THROUGH GUIDED CRAWLING OF ATTACK INFRASTRUCTURE | LEE, MICHAEL M | 2436 | Non-Final OA | Jun 28, 2024 |
| 18680876 | VISCAD: VISUAL-GUIDED CAMPAIGN AUTO-DISCOVERY | HOLLISTER, JAMES ROSS | 2499 | Non-Final OA | May 31, 2024 |
| 18665654 | BROWSER ISOLATION | OSMAN, RAMY M | 2457 | Final Rejection | May 16, 2024 |
| 18656645 | MAINTAINING STABLE UNIFORM RESOURCE LOCATOR VERDICTS WITH INTELLIGENT RECRAWLING | WORKU, SARON MATTHEWOS | 2408 | Non-Final OA | May 07, 2024 |
| 18648539 | UNSTRUCTURED DATA EXTRACTION WITH LARGE LANGUAGE MODELS FOR QUERY RESOLUTION | LOWEN, NICHOLAS DANIEL | 2653 | Non-Final OA | Apr 29, 2024 |
| 18649259 | DEEP LEARNING IN A DATA PLANE | ABDULLAH, SAAD AHMAD | 2431 | Final Rejection | Apr 29, 2024 |
| 18644580 | MITIGATING PHISHING ATTEMPTS | TAYLOR, SAKINAH W | 2407 | Final Rejection | Apr 24, 2024 |
| 18638388 | MACHINE LEARNING-BASED CONTENT DISARM AND RECONSTRUCTION WITH WEB BROWSER PREFETCHING | ALMEIDA, DEVIN E | 2492 | Final Rejection | Apr 17, 2024 |
| 18621872 | GRAMMAR POWERED RETRIEVAL AUGMENTED GENERATION FOR DOMAIN SPECIFIC LANGUAGES | MAY, ROBERT F | 2154 | Non-Final OA | Mar 29, 2024 |
| 18620606 | SCALABLE DOMAIN-LEVEL SINKHOLING AND INTERACTION OF NETWORK TRAFFIC | LEE, MICHAEL M | 2436 | Final Rejection | Mar 28, 2024 |
| 18614920 | USER INTERFACE NAVIGATION FOR WEB APPLICATIONS WITH RETRIEVAL-AUGMENTED GENERATION | OBISESAN, AUGUSTINE KUNLE | 2156 | Final Rejection | Mar 25, 2024 |
| 18598830 | NATURAL LANGUAGE QUERY TO DOMAIN-SPECIFIC DATABASE QUERY CONVERSION WITH LANGUAGE MODELS | GMAHL, NAVNEET K | 2166 | Final Rejection | Mar 07, 2024 |
| 18588860 | TWO-STAGE ANOMALOUS DEVICE DETECTION | ANYAN, BARBARA BURGESS | 2457 | Non-Final OA | Feb 27, 2024 |
| 18432878 | INTERWORKING OF STUN AND ALG | MCBETH, WILLIAM C | 2449 | Non-Final OA | Feb 05, 2024 |
| 18429191 | SECURITY POLICY ANALYSIS | ZOUBAIR, NOURA | 2434 | Final Rejection | Jan 31, 2024 |
| 18429177 | TOPOLOGICAL CO-RELATION | DAVIS, ZACHARY A | 2492 | Non-Final OA | Jan 31, 2024 |
| 18429198 | SECURITY POLICY ANALYSIS | HAILU, TESHOME | 2434 | Non-Final OA | Jan 31, 2024 |
| 18425625 | CONTEXT-BASED POLICY MAPPING FOR SECURITY COMPLIANCE | WYSZYNSKI, AUBREY H | 2434 | Final Rejection | Jan 29, 2024 |
| 18416765 | ADAPTIVE RATE LIMITER BASED ON TRANSACTIONAL HEURISTICS AND ARTIFICIAL INTELLIGENCE | GUZMAN, JAVIER O | 2446 | Non-Final OA | Jan 18, 2024 |
| 18544763 | MULTI-FACTOR AUTHENTICATION FATIGUE ATTACK DETECTION AND BLOCKING | POTRATZ, DANIEL B | 2491 | Non-Final OA | Dec 19, 2023 |
| 18535122 | THREAT INTELLIGENCE DIALOGUE SYSTEM FOR INTERFACING WITH A PROPRIETARY THREAT INTELLIGENCE DATABASE | SMITH, SEAN THOMAS | 2659 | Final Rejection | Dec 11, 2023 |
| 18533943 | SECURITY RULE CONVERSION AND PERFORMANCE EVALUATION | WYSZYNSKI, AUBREY H | 2434 | Final Rejection | Dec 08, 2023 |
| 18530458 | Managing Cloud-Based Networks | GREENE, JOSEPH L | 2443 | Final Rejection | Dec 06, 2023 |
| 18525342 | INTELLIGENT SECURITY FOR ZERO TRUST IN MOBILE NETWORKS WITH SECURITY PLATFORMS USING A PACKET FORWARDING CONTROL PROTOCOL | HERZOG, MADHURI R | 2438 | Final Rejection | Nov 30, 2023 |
| 18525375 | INTELLIGENT SECURITY FOR ZERO TRUST IN MOBILE NETWORKS WITH SECURITY PLATFORMS USING A DIAMETER PROTOCOL OR A RADIUS PROTOCOL | HERZOG, MADHURI R | 2438 | Final Rejection | Nov 30, 2023 |
| 18521979 | CONTEXT-BASED CYBERATTACK SIGNATURE GENERATION WITH LARGE LANGUAGE MODELS | HERZOG, MADHURI R | 2438 | Final Rejection | Nov 28, 2023 |
| 18468962 | MACHINE LEARNING-BASED FILTERING OF FALSE POSITIVE PATTERN MATCHES FOR PERSONALLY IDENTIFIABLE INFORMATION | ALMEIDA, DEVIN E | 2492 | Non-Final OA | Sep 18, 2023 |
| 18229062 | ADVANCED THREAT PREVENTION | ALI, AFAQ | 2434 | Non-Final OA | Aug 01, 2023 |
| 18228397 | ASSET SECURITY AND RISK POSTURE VISUALIZATION | BENGZON, GREG C | 2444 | Non-Final OA | Jul 31, 2023 |
| 18227601 | INTRUSION PREVENTION BASED ON INFECTION CHAINS | CELANI, NICHOLAS P | 2449 | Non-Final OA | Jul 28, 2023 |
| 18227817 | DETECTING FRAUDULENT E-COMMERCE WEBSITES | BALLOU, MAAME BOAKYEWAA | 3629 | Non-Final OA | Jul 28, 2023 |
| 18225026 | SELECTIVE INTELLIGENT ENFORCEMENT AND/OR SELECTIVE OFFLOADING FOR MOBILE NETWORKS USING A SMART NETWORK INTERFACE CARD | HERZOG, MADHURI R | 2438 | Final Rejection | Jul 21, 2023 |
| 18355486 | KERNEL SPACE FEATURE GENERATION FOR USER SPACE MACHINE LEARNING-BASED MALICIOUS NETWORK TRAFFIC DETECTION | TRUONG, THONG P | 2433 | Final Rejection | Jul 20, 2023 |
| 18353348 | TAILORED RECOMMENDATION OF SOFTWARE UPDATES TO NETWORK ELEMENTS | SMITH, CHENECA | 2192 | Non-Final OA | Jul 17, 2023 |
| 18347764 | HYPERVISOR-BASED MONITORING OF SAMPLES EXECUTING IN A VIRTUAL MACHINE VIA AMSI INTERCEPTION | STEINLE, ANDREW J | 2497 | Non-Final OA | Jul 06, 2023 |
| 18324219 | DATA SECURITY RISK POSTURE | VU, TAYLOR P | 2437 | Final Rejection | May 26, 2023 |
| 18161238 | SIMILARITY HASHING OF BINARY FILE FEATURE SETS FOR CLUSTERING AND MALICIOUS DETECTION | NARRAMORE, BLAKE I | 2438 | Non-Final OA | Jan 30, 2023 |
| 18072452 | DEPENDENCY EMULATION FOR EXECUTABLE SAMPLES | POPHAM, JEFFREY D | 2432 | Non-Final OA | Nov 30, 2022 |
| 18052140 | CONTRASTIVE CREDIBILITY PROPAGATION FOR SEMI-SUPERVISED LEARNING | SHALU, ZELALEM W | 2145 | Final Rejection | Nov 02, 2022 |
| 17877199 | METHOD TO CLASSIFY COMPLIANCE PROTOCOLS FOR SAAS APPS BASED ON WEB PAGE CONTENT | NGUYEN, LOAN T | 2165 | Non-Final OA | Jul 29, 2022 |
| 17814005 | DATA SLICING FOR INTERNET ASSET ATTRIBUTION | PHAKOUSONH, DARAVANH | 2121 | Final Rejection | Jul 21, 2022 |
| 17862877 | SEQUENTIAL DUAL MACHINE LEARNING MODELS FOR EFFECTIVE CLOUD DETECTION ENGINES | ALI, AFAQ | 2434 | Final Rejection | Jul 12, 2022 |
| 17649704 | SECURE MULTI-ENTERPRISE WIRELESS NETWORK | DHAKAD, RUPALI | 2437 | Final Rejection | Feb 02, 2022 |
| 15948931 | IoT DEVICE SECURITY | SAVENKOV, VADIM | 2432 | Non-Final OA | Apr 09, 2018 |
IP Author helps IP teams respond to office actions faster with AI-generated responses, examiner analytics, and prosecution intelligence.
Start Free Trial