16 pending office actions
| App # | Title | Examiner | Art Unit | Status | Filed |
|---|---|---|---|---|---|
| 18952512 | TECHNIQUES FOR CYBERSECURITY RISK-BASED FIREWALL CONFIGURATION | SU, SARAH | 2431 | Non-Final OA | Nov 19, 2024 |
| 18944939 | TECHNIQUES FOR REDUCTION OF STORAGE EVENTS IN A CLOUD COMPUTING ENVIRONMENT | RIAD, AMINE | 2113 | Final Rejection | Nov 12, 2024 |
| 18944959 | APPLICATION ENDPOINT CYBERSECURITY TECHNIQUES | TOLENTINO, RODERICK | 2439 | Non-Final OA | Nov 12, 2024 |
| 18798386 | CYBERSECURITY VULNERABILITY VALIDATION TECHNIQUES UTILIZING RUNTIME DATA, STATIC ANALYSIS AND DYNAMIC INSPECTION | TOLENTINO, RODERICK | 2439 | Non-Final OA | Aug 08, 2024 |
| 18798397 | SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYS | ABRISHAMKAR, KAVEH | 2494 | Non-Final OA | Aug 08, 2024 |
| 18798377 | LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYS | ABRISHAMKAR, KAVEH | 2494 | Non-Final OA | Aug 08, 2024 |
| 18779911 | TECHNIQUES FOR VIRTUAL PRIVATE CLOUD FLOW LOGS AGGREGATION | RIAD, AMINE | 2113 | Final Rejection | Jul 22, 2024 |
| 18361366 | SYSTEM AND METHOD FOR DETECTING MALICIOUS ACTIVITY BASED ON SET DETECTION | ABYANEH, ALI S | 2437 | Final Rejection | Jul 28, 2023 |
| 18361376 | TECHNIQUES FOR DETECTING CYBERSECURITY EVENTS BASED ON MULTIPLE SOURCES | ABYANEH, ALI S | 2437 | Final Rejection | Jul 28, 2023 |
| 18333020 | SYSTEM AND METHOD FOR APPLYING A UNIFIED SECURITY POLICY ON A SOFTWARE CONTAINER | KNACKSTEDT, JACOB BENEDICT | 2408 | Non-Final OA | Jun 12, 2023 |
| 18162412 | TECHNIQUES FOR CLOUD DETECTION AND RESPONSE FROM CLOUD LOGS UTILIZING A SECURITY GRAPH | ABYANEH, ALI S | 2437 | Final Rejection | Jan 31, 2023 |
| 18162406 | TECHNIQUES FOR CLOUD COMPUTING FORENSICS UTILIZING A SECURITY GRAPH | BROWN, CHRISTOPHER J | 2439 | Final Rejection | Jan 31, 2023 |
| 18161652 | TECHNIQUES FOR PRIORITIZING RISK AND MITIGATION IN CLOUD BASED COMPUTING ENVIRONMENTS | SRIRAM, ADITYA | 2491 | Final Rejection | Jan 30, 2023 |
| 18146074 | SYSTEM AND METHOD FOR ENCRYPTED DISK INSPECTION | PATEL, HARESH N | 2496 | Non-Final OA | Dec 23, 2022 |
| 18146076 | SYSTEM AND METHOD FOR ENCRYPTED DISK INSPECTION | AHSAN, SYED M | 2491 | Non-Final OA | Dec 23, 2022 |
| 18060763 | TECHNIQUES FOR DETECTING CYBERSECURITY VULNERABILITIES IN A CLOUD BASED COMPUTING ENVIRONMENT BASED ON FORENSIC ANALYSIS OF CLOUD LOGS | MAAZOUZ, GHIZLANE | 2499 | Final Rejection | Dec 01, 2022 |
IP Author helps IP teams respond to office actions faster with AI-generated responses, examiner analytics, and prosecution intelligence.
Start Free Trial