
Benjamin E. Lanier
Examiner (ID: 16562, Phone: (571)272-3805 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2437, 2432, 2132 |
| Total Applications | 1332 |
| Issued Applications | 867 |
| Pending Applications | 118 |
| Abandoned Applications | 370 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18296898
[patent_doc_number] => 20230106584
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-04-06
[patent_title] => Securing User-Entered Text In-Transit
[patent_app_type] => utility
[patent_app_number] => 18/062859
[patent_app_country] => US
[patent_app_date] => 2022-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6374
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18062859
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/062859 | Securing user-entered text in-transit | Dec 6, 2022 | Issued |
Array
(
[id] => 20132989
[patent_doc_number] => 12375308
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-29
[patent_title] => Data encryption and decryption using object-based screens and logic blocks
[patent_app_type] => utility
[patent_app_number] => 18/075738
[patent_app_country] => US
[patent_app_date] => 2022-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 62
[patent_figures_cnt] => 69
[patent_no_of_words] => 11821
[patent_no_of_claims] => 48
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18075738
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/075738 | Data encryption and decryption using object-based screens and logic blocks | Dec 5, 2022 | Issued |
Array
(
[id] => 18284842
[patent_doc_number] => 20230100314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-30
[patent_title] => SECURE PERMISSIONING OF ACCESS TO USER ACCOUNTS, INCLUDING SECURE DEAUTHORIZATION OF ACCESS TO USER ACCOUNTS
[patent_app_type] => utility
[patent_app_number] => 18/061948
[patent_app_country] => US
[patent_app_date] => 2022-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 41364
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18061948
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/061948 | Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts | Dec 4, 2022 | Issued |
Array
(
[id] => 19207272
[patent_doc_number] => 20240179171
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-30
[patent_title] => FEEDBACK LOOP FOR AUTOMATED VULNERABILITY SCANNING OF HIDDEN NETWORK SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 18/072022
[patent_app_country] => US
[patent_app_date] => 2022-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5250
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18072022
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/072022 | Feedback loop for automated vulnerability scanning of hidden network systems | Nov 29, 2022 | Issued |
Array
(
[id] => 19205012
[patent_doc_number] => 20240176911
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-30
[patent_title] => DEVICE CERTIFICATION BASED ON DEVICE CAPABILITIES
[patent_app_type] => utility
[patent_app_number] => 18/070101
[patent_app_country] => US
[patent_app_date] => 2022-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8990
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18070101
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/070101 | DEVICE CERTIFICATION BASED ON DEVICE CAPABILITIES | Nov 27, 2022 | Pending |
Array
(
[id] => 18410248
[patent_doc_number] => 20230171601
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-01
[patent_title] => METHOD FOR APPLYING INTEGRITY PROTECTION TO CONTROL INFORMATION SUBFIELD OR OPERATING MODE FIELD AND ASSOCIATED WIRELESS COMMUNCIATION APPARATUS
[patent_app_type] => utility
[patent_app_number] => 17/987829
[patent_app_country] => US
[patent_app_date] => 2022-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4673
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 29
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17987829
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/987829 | METHOD FOR APPLYING INTEGRITY PROTECTION TO CONTROL INFORMATION SUBFIELD OR OPERATING MODE FIELD AND ASSOCIATED WIRELESS COMMUNCIATION APPARATUS | Nov 14, 2022 | Abandoned |
Array
(
[id] => 20216742
[patent_doc_number] => 12413405
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-09
[patent_title] => Encryption device and encryption method with clock gating unit and random-number generator
[patent_app_type] => utility
[patent_app_number] => 17/983716
[patent_app_country] => US
[patent_app_date] => 2022-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 1130
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17983716
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/983716 | Encryption device and encryption method with clock gating unit and random-number generator | Nov 8, 2022 | Issued |
Array
(
[id] => 18925716
[patent_doc_number] => 20240028720
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-25
[patent_title] => SECURE BLOCK CLONING ON RESILIENT FILE SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 17/979065
[patent_app_country] => US
[patent_app_date] => 2022-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5073
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17979065
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/979065 | SECURE BLOCK CLONING ON RESILIENT FILE SYSTEMS | Nov 1, 2022 | Pending |
Array
(
[id] => 18192593
[patent_doc_number] => 20230046112
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-02-16
[patent_title] => RADIO LINK RECOVERY FOR USER EQUIPMENT
[patent_app_type] => utility
[patent_app_number] => 17/976047
[patent_app_country] => US
[patent_app_date] => 2022-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5634
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17976047
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/976047 | Radio link recovery for user equipment | Oct 27, 2022 | Issued |
Array
(
[id] => 18237678
[patent_doc_number] => 20230069988
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-09
[patent_title] => GENERATING ELECTRONIC SIGNATURES
[patent_app_type] => utility
[patent_app_number] => 18/049236
[patent_app_country] => US
[patent_app_date] => 2022-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8760
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18049236
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/049236 | Generating electronic signatures | Oct 23, 2022 | Issued |
Array
(
[id] => 19132018
[patent_doc_number] => 20240137371
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-25
[patent_title] => SYSTEM AND METHOD FOR DETECTING A MALICIOUS COMMAND AND CONTROL CHANNEL USING A SIMPLE MAIL TRANSFER PROTOCOL
[patent_app_type] => utility
[patent_app_number] => 18/047891
[patent_app_country] => US
[patent_app_date] => 2022-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10025
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 55
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18047891
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/047891 | System and method for detecting a malicious command and control channel using a simple mail transfer protocol | Oct 18, 2022 | Issued |
Array
(
[id] => 19132018
[patent_doc_number] => 20240137371
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-25
[patent_title] => SYSTEM AND METHOD FOR DETECTING A MALICIOUS COMMAND AND CONTROL CHANNEL USING A SIMPLE MAIL TRANSFER PROTOCOL
[patent_app_type] => utility
[patent_app_number] => 18/047891
[patent_app_country] => US
[patent_app_date] => 2022-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10025
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 55
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18047891
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/047891 | System and method for detecting a malicious command and control channel using a simple mail transfer protocol | Oct 18, 2022 | Issued |
Array
(
[id] => 19117983
[patent_doc_number] => 20240129733
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-18
[patent_title] => PRIVACY PROTECTION IN NETWORK SLICE AS A SERVICE
[patent_app_type] => utility
[patent_app_number] => 17/966599
[patent_app_country] => US
[patent_app_date] => 2022-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7656
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17966599
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/966599 | PRIVACY PROTECTION IN NETWORK SLICE AS A SERVICE | Oct 13, 2022 | Pending |
Array
(
[id] => 19620329
[patent_doc_number] => 20240406009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-05
[patent_title] => DIGITAL SIGNATURES WITH KEY-DERIVATION
[patent_app_type] => utility
[patent_app_number] => 18/697315
[patent_app_country] => US
[patent_app_date] => 2022-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9136
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18697315
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/697315 | DIGITAL SIGNATURES WITH KEY-DERIVATION | Sep 29, 2022 | Issued |
Array
(
[id] => 19944483
[patent_doc_number] => 12316628
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-27
[patent_title] => Communication apparatus, control method, and non-transitory computer-readable storage medium storing program
[patent_app_type] => utility
[patent_app_number] => 17/948377
[patent_app_country] => US
[patent_app_date] => 2022-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 36
[patent_no_of_words] => 10325
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17948377
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/948377 | Communication apparatus, control method, and non-transitory computer-readable storage medium storing program | Sep 19, 2022 | Issued |
Array
(
[id] => 19583390
[patent_doc_number] => 12149527
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-11-19
[patent_title] => Methods and systems for verifying an identity of a user through contextual knowledge-based authentication
[patent_app_type] => utility
[patent_app_number] => 17/933140
[patent_app_country] => US
[patent_app_date] => 2022-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8514
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 293
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17933140
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/933140 | Methods and systems for verifying an identity of a user through contextual knowledge-based authentication | Sep 18, 2022 | Issued |
Array
(
[id] => 18298940
[patent_doc_number] => 20230108626
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-04-06
[patent_title] => UE CHALLENGE TO A NETWORK BEFORE AUTHENTICATION PROCEDURE
[patent_app_type] => utility
[patent_app_number] => 17/947969
[patent_app_country] => US
[patent_app_date] => 2022-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9879
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17947969
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/947969 | UE challenge to a network before authentication procedure | Sep 18, 2022 | Issued |
Array
(
[id] => 19053388
[patent_doc_number] => 20240095357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-03-21
[patent_title] => NETWORK-STORAGE-BASED ATTACK DETECTION
[patent_app_type] => utility
[patent_app_number] => 17/945637
[patent_app_country] => US
[patent_app_date] => 2022-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11510
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17945637
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/945637 | NETWORK-STORAGE-BASED ATTACK DETECTION | Sep 14, 2022 | Pending |
Array
(
[id] => 19045400
[patent_doc_number] => 11934512
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-03-19
[patent_title] => Method, system, and computer program product for authenticating a device
[patent_app_type] => utility
[patent_app_number] => 17/892270
[patent_app_country] => US
[patent_app_date] => 2022-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 21138
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 344
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17892270
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/892270 | Method, system, and computer program product for authenticating a device | Aug 21, 2022 | Issued |
Array
(
[id] => 19532841
[patent_doc_number] => 20240356743
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-24
[patent_title] => STORING CRYPTOGRAPHIC KEYS SECURELY
[patent_app_type] => utility
[patent_app_number] => 18/683757
[patent_app_country] => US
[patent_app_date] => 2022-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7969
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18683757
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/683757 | STORING CRYPTOGRAPHIC KEYS SECURELY | Aug 11, 2022 | Pending |