Tech Center 2400 • Art Units: 2438
This examiner grants 78% of resolved cases
| App # | Title | Status | Assignee |
|---|---|---|---|
| 18255361 | TECHNIQUES FOR TIME-CONTROLLED USER DATA PRIVACY | Non-Final OA | TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) |
| 17590728 | METHODS, DEVICES AND SYSTEMS FOR PREVENTING TRACKING BY USE OF REPLY ATTACKS | Final Rejection | Cypress Semiconductor Corporation |
| 18355290 | ASYNCHRONOUS AUTHORIZATION OF APPLICATION ACCESS TO RESOURCES | Non-Final OA | Microsoft Technology Licensing, LLC |
| 18540932 | Malware Encryption Detection - Host Encrypted Data Communication Algorithm | Final Rejection | International Business Machines Corporation |
| 18844471 | ELECTRONIC CIRCUIT AND METHOD FOR SECURING AND DESYNCHRONIZING REGISTER TRANSFERS TO MITIGATE SIDE CHANNELS ATTACKS | Non-Final OA | THALES DIS FRANCE SAS |
| 18529714 | Method for Protecting an Embedded Machine Learning Model | Final Rejection | Robert Bosch GmbH |
| 18525342 | INTELLIGENT SECURITY FOR ZERO TRUST IN MOBILE NETWORKS WITH SECURITY PLATFORMS USING A PACKET FORWARDING CONTROL PROTOCOL | Final Rejection | Palo Alto Networks, Inc. |
| 18525375 | INTELLIGENT SECURITY FOR ZERO TRUST IN MOBILE NETWORKS WITH SECURITY PLATFORMS USING A DIAMETER PROTOCOL OR A RADIUS PROTOCOL | Final Rejection | Palo Alto Networks, Inc. |
| 18521979 | CONTEXT-BASED CYBERATTACK SIGNATURE GENERATION WITH LARGE LANGUAGE MODELS | Final Rejection | Palo Alto Networks, Inc. |
| 18225026 | SELECTIVE INTELLIGENT ENFORCEMENT AND/OR SELECTIVE OFFLOADING FOR MOBILE NETWORKS USING A SMART NETWORK INTERFACE CARD | Final Rejection | Palo Alto Networks, Inc. |
| 18459133 | MANAGING IMPACT OF POISONED INFERENCES ON INFERENCE CONSUMERS BASED ON USE OF THE INFERENCES BY THE INFERENCE CONSUMERS | Non-Final OA | Dell Products L.P. |
| 18782333 | MICRO-CONTROLLER, SECURE SYSTEM AND PROTECTION METHOD | Final Rejection | Nuvoton Technology Corporation |
| 18794015 | MOBILE DYNAMIC THIN FIREWALL FOR ADVANCED CELLULAR NETWORKS | Non-Final OA | AT&T Intellectual Property I, L.P. |
| 18541893 | SYSTEMS AND METHODS FOR DETECTING SPOOFING ATTACKS ON AN UNMANNED AERIAL SYSTEM | Non-Final OA | The Research Foundation for The State University of New York |
| 18216833 | TECHNIQUES FOR UTILIZING EMBEDDINGS TO MONITOR PROCESS TREES | Non-Final OA | CrowdStrike, Inc. |
| 18630896 | TREATING DATA FLOWS DIFFERENTLY BASED ON LEVEL OF INTEREST | Final Rejection | Darktrace Holdings Limited |
| 18784819 | BACKDOOR ATTACK METHOD AND SYSTEM FOR CLASSIFICATION TASK IN CODE MODEL | Final Rejection | YANGZHOU UNIVERSITY |
| 18777562 | METHOD FOR HANDLING DATA RELATING TO AN AGRICULTURAL MACHINE | Non-Final OA | LEMKEN GMBH & CO. KG |
| 18731316 | Method, Apparatus and External Protection Device for Power-off Monitoring | Final Rejection | BEIJING BEYONDINFO TECHNOLOGY CO., LTD. |
| 18340401 | METHODS AND SYSTEMS FOR REGISTERING INFORMATION IN A PERMISSIONED BLOCKCHAIN AND VERIFYING INTEGRITY OF A PAYLOAD | Final Rejection | u-blox AG |
| 18364391 | SYSTEMS AND METHODS TO CONTROL ACCESS TO COMPONENTS OF VIRTUAL OBJECTS | Non-Final OA | LINDEN RESEARCH, INC. |
IP Author analyzes examiner patterns and generates tailored response strategies with the highest chance of allowance.
Build Your Strategy