20 pending office actions
| App # | Title | Examiner | Art Unit | Status | Filed |
|---|---|---|---|---|---|
| 18948775 | Zero Trust Network Branch | HOFFMAN, BRANDON S | 2433 | Non-Final OA | Nov 15, 2024 |
| 18926986 | Encrypted traffic inspection in a cloud-based security system | HOFFMAN, BRANDON S | 2433 | Non-Final OA | Oct 25, 2024 |
| 18924682 | Vulnerabilities and Protections in Large Language Models | SARKER, SANCHIT K | 2495 | Non-Final OA | Oct 23, 2024 |
| 18914829 | Memory surge protection for application segmentation models | YOON, ALEXANDER J | 2135 | Final Rejection | Oct 14, 2024 |
| 18910792 | Kill-chain reconstruction | KIM, HEE SOO | 2443 | Non-Final OA | Oct 09, 2024 |
| 18746510 | Systems and methods for extensible, modular, and hierarchical step-up authentication | LE, CHAU D | 2408 | Non-Final OA | Jun 18, 2024 |
| 18640560 | Detecting and Fixing Collisions in Artificial Intelligence Agents | MANOHARAN, SHASHIDHAR SHANKAR | 2655 | Non-Final OA | Apr 19, 2024 |
| 18594541 | Cloud-based tunnel protocol systems and methods for multiple ports and protocols | HABTEGEORGIS, MATTHIAS | 2491 | Non-Final OA | Mar 04, 2024 |
| 18581011 | Systems and methods for enforcing policy based on assigned user risk scores in a cloud-based system | BROWN, ANTHONY D | 2408 | Final Rejection | Feb 19, 2024 |
| 18419441 | Zero-trust connectivity for Subscriber Identity Module (SIM) enabled equipment | CHOI, EUNSOOK | 2467 | Non-Final OA | Jan 22, 2024 |
| 18417534 | Hyper-customized customer defined machine learning models | CHANG, TOM Y | 2455 | Non-Final OA | Jan 19, 2024 |
| 18472081 | User Interface workflow for natural language querying | HU, XIAOQIN | 2168 | Final Rejection | Sep 21, 2023 |
| 18354883 | Systems and methods for policy-based distributed packet capture | JAKOVAC, RYAN J | 2445 | Non-Final OA | Jul 19, 2023 |
| 18346411 | Application server protection by maintaining cross-session inspection context | ZHENG, BIN QING | 2499 | Non-Final OA | Jul 03, 2023 |
| 18327182 | Systems and methods for browser isolation via a virtualized Graphics Processing Unit (GPU) | GALERA, PATRICK PAUL CONTRER | 2617 | Non-Final OA | Jun 01, 2023 |
| 18114430 | Posture control for cloud environments | HABTEGEORGIS, MATTHIAS | 2491 | Final Rejection | Feb 27, 2023 |
| 17509154 | Identity intelligence in cloud-based services | HENNING, MATTHEW T | 2491 | Non-Final OA | Oct 25, 2021 |
| 17341513 | Machine learning to determine domain reputation, content classification, phishing sites, and command and control sites | FEITL, LEAH M | 2147 | Non-Final OA | Jun 08, 2021 |
| 17131908 | Administrative policy override in microsegmentation | POPHAM, JEFFREY D | 2432 | Non-Final OA | Dec 23, 2020 |
| 17079768 | Utilizing Machine Learning to detect malicious Office documents | FARAMARZI, GITA | 2496 | Final Rejection | Oct 26, 2020 |
IP Author helps IP teams respond to office actions faster with AI-generated responses, examiner analytics, and prosecution intelligence.
Start Free Trial