
Benjamin E. Lanier
Examiner (ID: 16562, Phone: (571)272-3805 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2437, 2432, 2132 |
| Total Applications | 1332 |
| Issued Applications | 867 |
| Pending Applications | 118 |
| Abandoned Applications | 370 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17643621
[patent_doc_number] => 20220171359
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-02
[patent_title] => SAFETY SYSTEM AND MAINTENANCE METHOD
[patent_app_type] => utility
[patent_app_number] => 17/434958
[patent_app_country] => US
[patent_app_date] => 2020-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12914
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17434958
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/434958 | SAFETY SYSTEM AND MAINTENANCE METHOD | Feb 13, 2020 | Abandoned |
Array
(
[id] => 19672000
[patent_doc_number] => 12184785
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-12-31
[patent_title] => Storage virtualization architecture with hybrid blockchain and the method thereof
[patent_app_type] => utility
[patent_app_number] => 17/793591
[patent_app_country] => US
[patent_app_date] => 2020-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5061
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17793591
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/793591 | Storage virtualization architecture with hybrid blockchain and the method thereof | Jan 21, 2020 | Issued |
Array
(
[id] => 16122609
[patent_doc_number] => 20200213327
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-02
[patent_title] => METHOD AND APPARATUS FOR PROVIDING VENDOR REMOTE SUPPORT AND MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/745440
[patent_app_country] => US
[patent_app_date] => 2020-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9111
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16745440
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/745440 | METHOD AND APPARATUS FOR PROVIDING VENDOR REMOTE SUPPORT AND MANAGEMENT | Jan 16, 2020 | Abandoned |
Array
(
[id] => 16690939
[patent_doc_number] => 20210073417
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-11
[patent_title] => Case storage system
[patent_app_type] => utility
[patent_app_number] => 16/743277
[patent_app_country] => US
[patent_app_date] => 2020-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3997
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16743277
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/743277 | Case storage system | Jan 14, 2020 | Abandoned |
Array
(
[id] => 16965144
[patent_doc_number] => 20210216643
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-15
[patent_title] => Predicting Exploitability of Software Vulnerabilities and Recommending Alternate Software Packages
[patent_app_type] => utility
[patent_app_number] => 16/743146
[patent_app_country] => US
[patent_app_date] => 2020-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7185
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16743146
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/743146 | Predicting exploitability of software vulnerabilities and recommending alternate software packages | Jan 14, 2020 | Issued |
Array
(
[id] => 18670822
[patent_doc_number] => 11777743
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-03
[patent_title] => Method for securely providing a personalized electronic identity on a terminal
[patent_app_type] => utility
[patent_app_number] => 17/421079
[patent_app_country] => US
[patent_app_date] => 2020-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11336
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 306
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17421079
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/421079 | Method for securely providing a personalized electronic identity on a terminal | Jan 7, 2020 | Issued |
Array
(
[id] => 16921813
[patent_doc_number] => 20210194905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-24
[patent_title] => Graphical temporal graph pattern editor
[patent_app_type] => utility
[patent_app_number] => 16/725207
[patent_app_country] => US
[patent_app_date] => 2019-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12311
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16725207
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/725207 | Graphical temporal graph pattern editor | Dec 22, 2019 | Issued |
Array
(
[id] => 17456855
[patent_doc_number] => 11271728
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-08
[patent_title] => Secure key management
[patent_app_type] => utility
[patent_app_number] => 16/723140
[patent_app_country] => US
[patent_app_date] => 2019-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11957
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 293
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16723140
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/723140 | Secure key management | Dec 19, 2019 | Issued |
Array
(
[id] => 16101999
[patent_doc_number] => 20200204986
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-25
[patent_title] => Uplink Data Compression In Mobile Communications
[patent_app_type] => utility
[patent_app_number] => 16/720509
[patent_app_country] => US
[patent_app_date] => 2019-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6109
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16720509
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/720509 | Uplink Data Compression In Mobile Communications | Dec 18, 2019 | Abandoned |
Array
(
[id] => 19371122
[patent_doc_number] => 12063223
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-08-13
[patent_title] => Security event analysis and remediation system
[patent_app_type] => utility
[patent_app_number] => 16/711345
[patent_app_country] => US
[patent_app_date] => 2019-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17748
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16711345
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/711345 | Security event analysis and remediation system | Dec 10, 2019 | Issued |
Array
(
[id] => 17253138
[patent_doc_number] => 11188630
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-11-30
[patent_title] => Dynamic enrollment using biometric tokenization
[patent_app_type] => utility
[patent_app_number] => 16/706124
[patent_app_country] => US
[patent_app_date] => 2019-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 10555
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16706124
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/706124 | Dynamic enrollment using biometric tokenization | Dec 5, 2019 | Issued |
Array
(
[id] => 15654683
[patent_doc_number] => 20200089872
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-19
[patent_title] => ENCLAVE POOL SHARED KEY
[patent_app_type] => utility
[patent_app_number] => 16/693701
[patent_app_country] => US
[patent_app_date] => 2019-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10267
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16693701
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/693701 | Enclave pool shared key | Nov 24, 2019 | Issued |
Array
(
[id] => 17063947
[patent_doc_number] => 11108566
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-31
[patent_title] => Methods and systems for using digital signatures to create trusted digital asset transfers
[patent_app_type] => utility
[patent_app_number] => 16/693158
[patent_app_country] => US
[patent_app_date] => 2019-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 19572
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16693158
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/693158 | Methods and systems for using digital signatures to create trusted digital asset transfers | Nov 21, 2019 | Issued |
Array
(
[id] => 17395035
[patent_doc_number] => 11244049
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-02-08
[patent_title] => Use of an application controller to monitor and control software file and application environments
[patent_app_type] => utility
[patent_app_number] => 16/692599
[patent_app_country] => US
[patent_app_date] => 2019-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 16367
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16692599
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/692599 | Use of an application controller to monitor and control software file and application environments | Nov 21, 2019 | Issued |
Array
(
[id] => 16929227
[patent_doc_number] => 11050729
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-29
[patent_title] => Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
[patent_app_type] => utility
[patent_app_number] => 16/688192
[patent_app_country] => US
[patent_app_date] => 2019-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 41257
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16688192
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/688192 | Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts | Nov 18, 2019 | Issued |
Array
(
[id] => 16826598
[patent_doc_number] => 20210141891
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-13
[patent_title] => IDENTIFYING SOFTWARE PROVENANCE
[patent_app_type] => utility
[patent_app_number] => 16/681867
[patent_app_country] => US
[patent_app_date] => 2019-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4964
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16681867
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/681867 | IDENTIFYING SOFTWARE PROVENANCE | Nov 12, 2019 | Abandoned |
Array
(
[id] => 15908563
[patent_doc_number] => 20200153803
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => CRYPTOGRAPHIC DATASHARE CONTROL FOR BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 16/672761
[patent_app_country] => US
[patent_app_date] => 2019-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5680
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16672761
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/672761 | Cryptographic datashare control for blockchain | Nov 3, 2019 | Issued |
Array
(
[id] => 16897352
[patent_doc_number] => 11038917
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-15
[patent_title] => System and methods for building statistical models of malicious elements of web pages
[patent_app_type] => utility
[patent_app_number] => 16/671316
[patent_app_country] => US
[patent_app_date] => 2019-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 9600
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16671316
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/671316 | System and methods for building statistical models of malicious elements of web pages | Oct 31, 2019 | Issued |
Array
(
[id] => 15567135
[patent_doc_number] => 20200067979
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-27
[patent_title] => METHOD FOR IDENTIFYING PHISHING WEBSITES AND HINDERING ASSOCIATED ACTIVITY
[patent_app_type] => utility
[patent_app_number] => 16/669935
[patent_app_country] => US
[patent_app_date] => 2019-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7006
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16669935
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/669935 | Method for identifying phishing websites and hindering associated activity | Oct 30, 2019 | Issued |
Array
(
[id] => 17559970
[patent_doc_number] => 11316701
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-04-26
[patent_title] => Decentralized system for generation and deployment of digital certificates
[patent_app_type] => utility
[patent_app_number] => 16/660401
[patent_app_country] => US
[patent_app_date] => 2019-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5002
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16660401
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/660401 | Decentralized system for generation and deployment of digital certificates | Oct 21, 2019 | Issued |