Tech Center 2400 • Art Units: 2137 2437 2492
This examiner grants 54% of resolved cases
| App # | Title | Status | Assignee |
|---|---|---|---|
| 18604008 | THREAT MODELING AT SCALE | Final Rejection | Wells Fargo Bank, N.A. |
| 18933808 | AUTHENTICATION DEVICE AND AUTHENTICATION METHOD | Non-Final OA | DENSO CORPORATION |
| 17735443 | Forecasting Malware Capabilities from Cyber Attack Memory Images | Final Rejection | Georgia Tech Research Corporation |
| 17618212 | Methods, UE and Network Node for Handling System Information | Final Rejection | Telefonaktiebolaget LM Ericsson (publ) |
| 18785740 | VIRTUALIZING DISCRETE AND MIGRATABLE TRUSTED PLATFORM MODULES (TPMS) | Non-Final OA | Microsoft Technology Licensing, LLC |
| 18122630 | INFORMATION PROCESSING APPARATUS AND FUNCTION OPERATION CONTROL METHOD OF THE SAME | Final Rejection | SHARP KABUSHIKI KAISHA |
| 18588673 | Container Image Vulnerability Scanning Based on Vulnerability Signatures | Non-Final OA | International Business Machines Corporation |
| 18434628 | POLICY-DRIVEN KERNEL EXTENSION SECURITY | Non-Final OA | International Business Machines Corporation |
| 16424588 | APPROXIMATE HASH VERIFICATION FOR BLOCKCHAIN | Final Rejection | International Business Machines Corporation |
| 18450035 | ELECTRONIC PROTECTION OF SENSITIVE INFORMATION VIA DATA EMBEDDING AND NOISE ADDITION | Non-Final OA | PAYPAL, INC. |
| 18089398 | Systems And Methods For Securing Input/Output Data | Non-Final OA | Intel Corporation |
| 18135582 | METHODS AND SYSTEMS FOR SHARING PRIVATE DATA | Non-Final OA | Adeia Guides Inc. |
| 18431415 | TRUSTED NETWORK TO PREVENT REPLACEMENT AND CLONING ATTACKS | Non-Final OA | Micron Technology, Inc. |
| 18237247 | SECURE BOOT PROCEDURE | Non-Final OA | Micron Technology, Inc. |
| 18682080 | METHOD AND SYSTEM FOR GENERATING A SECRET KEY USING NON-COMMUNICATING ENTITIES | Non-Final OA | Visa International Service Association |
| 17466830 | PROTECTIONS FOR SENSITIVE CONTENT ITEMS IN A CONTENT MANAGEMENT SYSTEM | Non-Final OA | Dropbox, Inc. |
| 17211178 | CLOUD-BASED IDENTITY PROVIDER INTERWORKING FOR NETWORK ACCESS AUTHENTICATION | Final Rejection | Cisco Technology, Inc. |
| 17859895 | PER-HOST ACCESS LISTS | Non-Final OA | Arista Networks, Inc. |
| 18656520 | AUTOMATED THREAT MODELING USING APPLICATION RELATIONSHIPS | Non-Final OA | Amazon Technologies, Inc. |
| 18676775 | REMOTE TRIGGERING OF EVENTS BY PERSONAL DEVICES | Final Rejection | WHP Workflow Solutions, Inc. |
| 18429177 | TOPOLOGICAL CO-RELATION | Non-Final OA | Palo Alto Networks, Inc. |
| 18735997 | CLUSTERED CONTINUOUS DATA CONTENT INTEGRITY COMPROMISE DETECTION | Non-Final OA | Dell Products L.P. |
| 18861955 | CALCULATION RESULT DISTRIBUTION DEVICE, CALCULATION RESULT PROTECTION SYSTEM, AND CALCULATION RESULT DISTRIBUTION METHOD | Non-Final OA | NTT, Inc. |
| 18681498 | COMPACT ADAPTIVELY SECURE FUNCTIONAL ENCRYPTION FOR ATTRIBUTE-WEIGHTED SUMS | Non-Final OA | NTT RESEARCH, INC. |
| 17168577 | SYSTEMS AND METHODS FOR DEVICE LOCATION VERIFICATION | Non-Final OA | Boost SubscriberCo L.L.C. |
| 17918070 | RELATIONSHIP-BASED ACCESS CONTROL FOR IOT NETWORKS | Final Rejection | Schneider Electric USA, Inc. |
| 16836753 | PORTABLE, HARDWARE-BASED AUTHENTICATION CLIENT TO ENFORCE USER-TO-SITE NETWORK ACCESS CONTROL RESTRICTIONS | Final Rejection | Fortinet, Inc. |
| 17348750 | DEVICE-TO-DEVICE AUTHENTICATION METHOD AND PROGRAM BASED ON VIRTUAL AUTHENTICATION CODE | Non-Final OA | SSENSTONE INC. |
| 18758283 | SYSTEM AND METHOD FOR ADAPTIVE DETECTION ENGINE CONFIGURATION BASED ON ENVIRONMENTAL SECURITY RANKING | Non-Final OA | Acronis International GmbH |
| 17460195 | METHODS, APPARATUS AND SYSTEMS FOR BUILDING AND/OR IMPLEMENTING DETECTION SYSTEMS USING ARTIFICIAL INTELLIGENCE | Non-Final OA | Ribbon Communications Operating Company, Inc. |
IP Author analyzes examiner patterns and generates tailored response strategies with the highest chance of allowance.
Build Your Strategy