Tech Center 2400 • Art Units: 2431 2436
This examiner grants 84% of resolved cases
| App # | Title | Status | Assignee |
|---|---|---|---|
| 18637146 | SYSTEMS AND METHODS FOR CORRESPONDENCE FRAUD MITIGATION | Final Rejection | Wells Fargo Bank, N.A. |
| 18648201 | IDENTIFYING THREATS USING AGGREGATED SECURITY DATA AND TRAINED MODELS | Final Rejection | MASTERCARD INTERNATIONAL INCORPORATED |
| 18857556 | Using Multi-Perspective Image Sensors for Topographical Feature Authentication | Non-Final OA | Google LLC |
| 18892250 | AUTOMATIC VERIFICATION OF DECENTRAILIZED PROTOCOLS | Non-Final OA | PayPal, Inc. |
| 18589798 | INFORMATION PROCESSING EQUIPMENT, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM | Final Rejection | KABUSHIKI KAISHA TOSHIBA |
| 18559429 | Method for defending against an attempt to disconnect two entities, and associated system | Final Rejection | ORANGE |
| 18802630 | Hybrid Approach To Data Governance | Non-Final OA | Egnyte, Inc. |
| 18109208 | MANAGING AN ENCRYPTED CONNECTION WITH A CLOUD SERVICE PROVIDER | Non-Final OA | Oracle International Corporation |
| 18835279 | PERFORMING A TRUST EVALUATION SERVICE AT A NETWORK FUNCTION | Non-Final OA | Lenovo (Singapore) Pte. Ltd. |
| 18869758 | IDENTITY VERIFICATION METHOD FOR HANDSHAKE PROCESS FOR TLCP PROTOCOL | Non-Final OA | Alipay (Hangzhou) Information Technology Co., Ltd. |
| 18961594 | Malicious C&C channel to fixed IP detection based on packet volume | Non-Final OA | Palo Alto Networks, Inc. |
| 18758234 | PROACTIVELY DISCOVERING MALICIOUS DOMAINS THROUGH GUIDED CRAWLING OF ATTACK INFRASTRUCTURE | Non-Final OA | Palo Alto Networks, Inc. |
| 18620606 | SCALABLE DOMAIN-LEVEL SINKHOLING AND INTERACTION OF NETWORK TRAFFIC | Final Rejection | Palo Alto Networks, Inc. |
| 18830696 | SECURITY ASSESSMENT METHOD AND APPARATUS, ELECTRONIC DEVICE, AND READABLE STORAGE MEDIUM | Non-Final OA | VIVO MOBILE COMMUNICATION CO., LTD. |
| 18182260 | SYSTEMS AND METHODS FOR BIOMETRIC IDENTIFICATION | Final Rejection | TMRW Group IP |
| 18912009 | SYSTEMS AND METHODS OF NETWORK SECURITY ANOMALY DETECTION | Non-Final OA | L3Harris Technologies, Inc. |
| 18607364 | Process-Aware Identity Firewall | Non-Final OA | VMware LLC |
| 18819954 | Data Plane Management Systems and Methods Using Native Modules | Non-Final OA | F5, Inc. |
| 18883469 | Efficient Access Control for Network Event Data | Non-Final OA | Censys, Inc. |
| 18833112 | Conditional Filtering For Time-Deterministic Firewall | Non-Final OA | HOCHSCHULE ESSLINGEN |
| 18650276 | Dynamic Language Model Prompts for Fraud Detection | Non-Final OA | Bitdefender IPR Management Ltd. |
| 18370631 | SYSTEMS, METHODS, AND DEVICES FOR IDENTITY VERIFICATON | Non-Final OA | BitsProof Inc. |
IP Author analyzes examiner patterns and generates tailored response strategies with the highest chance of allowance.
Build Your Strategy