
Benjamin A. Kaplan
Examiner (ID: 16566, Phone: (571)270-3170 , Office: P/2434 )
| Most Active Art Unit | 2434 |
| Art Unit(s) | 2439, 2139, 2434 |
| Total Applications | 729 |
| Issued Applications | 621 |
| Pending Applications | 45 |
| Abandoned Applications | 82 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16796956
[patent_doc_number] => 20210126774
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-29
[patent_title] => System and Method for Application-Independent Compartmentalized Encryption
[patent_app_type] => utility
[patent_app_number] => 16/665190
[patent_app_country] => US
[patent_app_date] => 2019-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5759
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16665190
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/665190 | System and method for application-independent compartmentalized encryption | Oct 27, 2019 | Issued |
Array
(
[id] => 19764781
[patent_doc_number] => 12223072
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-11
[patent_title] => Right-holder terminal, user terminal, and content usage method
[patent_app_type] => utility
[patent_app_number] => 17/287384
[patent_app_country] => US
[patent_app_date] => 2019-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 10190
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17287384
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/287384 | Right-holder terminal, user terminal, and content usage method | Oct 22, 2019 | Issued |
Array
(
[id] => 18805151
[patent_doc_number] => 11838322
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-05
[patent_title] => Phishing site detection device, phishing site detection method and phishing site detection program
[patent_app_type] => utility
[patent_app_number] => 17/291607
[patent_app_country] => US
[patent_app_date] => 2019-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 5546
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17291607
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/291607 | Phishing site detection device, phishing site detection method and phishing site detection program | Oct 9, 2019 | Issued |
Array
(
[id] => 18136383
[patent_doc_number] => 11562062
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-01-24
[patent_title] => Supporting multiple authentication methods on a port of a network device at the same time
[patent_app_type] => utility
[patent_app_number] => 16/573379
[patent_app_country] => US
[patent_app_date] => 2019-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11723
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16573379
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/573379 | Supporting multiple authentication methods on a port of a network device at the same time | Sep 16, 2019 | Issued |
Array
(
[id] => 17600477
[patent_doc_number] => 20220150051
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-12
[patent_title] => MULTI-SOURCE ENTROPY RANDOMNESS AGGREGATION AND DISTRIBUTION NETWORK
[patent_app_type] => utility
[patent_app_number] => 17/433361
[patent_app_country] => US
[patent_app_date] => 2019-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10524
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17433361
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/433361 | Multi-source entropy randomness aggregation and distribution network | Aug 29, 2019 | Issued |
Array
(
[id] => 15277325
[patent_doc_number] => 20190387397
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-19
[patent_title] => Lawful Interception Method, Apparatus, And System
[patent_app_type] => utility
[patent_app_number] => 16/553713
[patent_app_country] => US
[patent_app_date] => 2019-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9748
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16553713
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/553713 | Lawful Interception Method, Apparatus, And System | Aug 27, 2019 | Abandoned |
Array
(
[id] => 15595167
[patent_doc_number] => 20200074118
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => METHOD FOR ENABLING TRUST IN COLLABORATIVE RESEARCH
[patent_app_type] => utility
[patent_app_number] => 16/552705
[patent_app_country] => US
[patent_app_date] => 2019-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7796
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 10
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16552705
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/552705 | Method for enabling trust in collaborative research | Aug 26, 2019 | Issued |
Array
(
[id] => 17209749
[patent_doc_number] => 11170122
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-09
[patent_title] => Method for secure access to data
[patent_app_type] => utility
[patent_app_number] => 16/545445
[patent_app_country] => US
[patent_app_date] => 2019-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4599
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16545445
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/545445 | Method for secure access to data | Aug 19, 2019 | Issued |
Array
(
[id] => 16874653
[patent_doc_number] => 20210168120
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-03
[patent_title] => NETWORK INTERFACE PROTECTED AGAINST ATTACKS
[patent_app_type] => utility
[patent_app_number] => 17/268569
[patent_app_country] => US
[patent_app_date] => 2019-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4624
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17268569
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/268569 | Network interface protected against attacks | Aug 15, 2019 | Issued |
Array
(
[id] => 17382229
[patent_doc_number] => 11240270
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-02-01
[patent_title] => Secure electronic transactions using transport layer security (SETUTLS)
[patent_app_type] => utility
[patent_app_number] => 16/539726
[patent_app_country] => US
[patent_app_date] => 2019-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 12512
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16539726
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/539726 | Secure electronic transactions using transport layer security (SETUTLS) | Aug 12, 2019 | Issued |
Array
(
[id] => 16537711
[patent_doc_number] => 10880335
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-29
[patent_title] => Network security systems and methods
[patent_app_type] => utility
[patent_app_number] => 16/534996
[patent_app_country] => US
[patent_app_date] => 2019-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 15463
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16534996
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/534996 | Network security systems and methods | Aug 6, 2019 | Issued |
Array
(
[id] => 15156333
[patent_doc_number] => 20190356644
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => METHODS FOR AUTHENTICATING PHOTOGRAPHIC IMAGE DATA
[patent_app_type] => utility
[patent_app_number] => 16/531620
[patent_app_country] => US
[patent_app_date] => 2019-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11490
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16531620
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/531620 | Methods for authenticating photographic image data | Aug 4, 2019 | Issued |
Array
(
[id] => 16100773
[patent_doc_number] => 20200204373
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-25
[patent_title] => NETWORK SECURITY SYSTEM AND NETWORK SECURITY METHOD
[patent_app_type] => utility
[patent_app_number] => 16/530800
[patent_app_country] => US
[patent_app_date] => 2019-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6653
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16530800
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/530800 | NETWORK SECURITY SYSTEM AND NETWORK SECURITY METHOD | Aug 1, 2019 | Abandoned |
Array
(
[id] => 16602631
[patent_doc_number] => 20210029162
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-28
[patent_title] => DEVICE ENROLLMENT IN A MANAGEMENT SERVICE
[patent_app_type] => utility
[patent_app_number] => 16/518563
[patent_app_country] => US
[patent_app_date] => 2019-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8568
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16518563
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/518563 | Device enrollment in a management service | Jul 21, 2019 | Issued |
Array
(
[id] => 16219351
[patent_doc_number] => 10735181
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => Performing vector comparison operations in fully homomorphic encryption
[patent_app_type] => utility
[patent_app_number] => 16/514043
[patent_app_country] => US
[patent_app_date] => 2019-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7934
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16514043
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/514043 | Performing vector comparison operations in fully homomorphic encryption | Jul 16, 2019 | Issued |
Array
(
[id] => 15876013
[patent_doc_number] => 20200145410
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => Field Forensic Method to Acquire Adaptable Format Biometric Evidentiary Proof of Having Complied with the Special Consent Provisions of Countries' Data Protection Regulations
[patent_app_type] => utility
[patent_app_number] => 16/457959
[patent_app_country] => US
[patent_app_date] => 2019-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5386
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16457959
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/457959 | Field forensic method to acquire adaptable format biometric evidentiary proof of having complied with the special consent provisions of countries' data protection regulations | Jun 28, 2019 | Issued |
Array
(
[id] => 15778187
[patent_doc_number] => 20200120111
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => METHODS AND APPARATUS TO DETECT AND PREVENT HOST FIREWALL BYPASS THREATS THROUGH A DATA LINK LAYER
[patent_app_type] => utility
[patent_app_number] => 16/453714
[patent_app_country] => US
[patent_app_date] => 2019-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10731
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16453714
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/453714 | Methods and apparatus to detect and prevent host firewall bypass threats through a data link layer | Jun 25, 2019 | Issued |
Array
(
[id] => 15445109
[patent_doc_number] => 20200036738
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => METHOD AND DEVICE FOR DETECTING ANOMALIES IN A COMPUTER NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/453370
[patent_app_country] => US
[patent_app_date] => 2019-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2415
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16453370
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/453370 | Method and device for detecting anomalies in a computer network | Jun 25, 2019 | Issued |
Array
(
[id] => 17811991
[patent_doc_number] => 20220263826
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-18
[patent_title] => DYNAMIC ALLOCATION OF NETWORK SLICE-SPECIFIC CREDENTIALS
[patent_app_type] => utility
[patent_app_number] => 17/621971
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10969
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17621971
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/621971 | Dynamic allocation of network slice-specific credentials | Jun 23, 2019 | Issued |
Array
(
[id] => 17979559
[patent_doc_number] => 11496444
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-11-08
[patent_title] => Enforcing access control to resources of an indexing system using resource paths
[patent_app_type] => utility
[patent_app_number] => 16/450658
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8672
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450658
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450658 | Enforcing access control to resources of an indexing system using resource paths | Jun 23, 2019 | Issued |