16 pending office actions
| App # | Title | Examiner | Art Unit | Status | Filed |
|---|---|---|---|---|---|
| 19193340 | Data discovery and classification using sampling-based scanning techniques | HARPER, ELIYAH STONE | 2166 | Non-Final OA | Apr 29, 2025 |
| 19184935 | SYSTEMS AND METHODS FOR QUERY TERM ANALYTICS | UDDIN, MOHAMMED R | 2161 | Non-Final OA | Apr 21, 2025 |
| 18953263 | Using Signed Tokens to Verify Short Message Service (SMS) Message Bodies | TABOR, AMARE F | 2434 | Non-Final OA | Nov 20, 2024 |
| 18950923 | MACHINE LEARNING UNIFORM RESOURCE LOCATOR (URL) CLASSIFIER | GUNDRY, STEPHEN T | 2435 | Non-Final OA | Nov 18, 2024 |
| 18935843 | Detecting and Preventing Transmission of Spam Messages Using Modified Source Numbers | KNACKSTEDT, JACOB BENEDICT | 2408 | Non-Final OA | Nov 04, 2024 |
| 18910709 | FOCUSED IMAGE GRABBING | AHSAN, SYED M | 2491 | Non-Final OA | Oct 09, 2024 |
| 18892952 | Preventing Disclosure of Sensitive Information in Attempting to Utilize Generative Artificial Intelligence (AI) Through an In-line Interface | KHAN, MOEEN | 2436 | Non-Final OA | Sep 23, 2024 |
| 18823945 | Dynamically Controlling Access to Linked Content in Electronic Communications | CHAI, LONGBIT | 2431 | Non-Final OA | Sep 04, 2024 |
| 18842501 | System and Method for Light Data File Upload Prevention | RAHIM, MONJUR | 2436 | Non-Final OA | Aug 29, 2024 |
| 18788410 | Determining Authenticity of Reported User Action in Cybersecurity Risk Assessment | POPHAM, JEFFREY D | 2432 | Non-Final OA | Jul 30, 2024 |
| 18738285 | System and Method for Scalable File Filtering Using Wildcards | PERUNGAVOOR, VENKATANARAY | 2492 | Non-Final OA | Jun 10, 2024 |
| 18703346 | DETECTING INSIDER USER BEHAVIOR THREATS BY COMPARING A USER’S BEHAVIOR TO THE USER’S PRIOR BEHAVIOR | POUDEL, SAMIKSHYA NMN | 2436 | Non-Final OA | Apr 21, 2024 |
| 18631318 | Methods and Systems for People Centric Data Discovery | MINCEY, JERMAINE A | 2159 | Final Rejection | Apr 10, 2024 |
| 17760783 | System and Method to enable Shared SaaS Multi-Tenancy using Customer Data Storage, Customer-controlled Data Encryption Keys | SHAW, BRIAN F | 2432 | Non-Final OA | Mar 16, 2022 |
| 17760527 | MANAGING AND ROUTING OF ENDPOINT TELEMETRY USING REALMS | LOPEZ, MIGUEL ALEXANDER | 2496 | Non-Final OA | Mar 15, 2022 |
| 17486014 | Context-Aware Cybersecurity Training Systems, Apparatuses, and Methods | GEBREMICHAEL, BRUK A | 3715 | Final Rejection | Sep 27, 2021 |
IP Author helps IP teams respond to office actions faster with AI-generated responses, examiner analytics, and prosecution intelligence.
Start Free Trial