
Christian Chace
Supervisory Patent Examiner (ID: 13249, Phone: (571)272-4190 , Office: P/2131 )
| Most Active Art Unit | 2186 |
| Art Unit(s) | 2131, 2187, 2129, 2165, 3665, 2186, 2189, 2752 |
| Total Applications | 433 |
| Issued Applications | 345 |
| Pending Applications | 22 |
| Abandoned Applications | 66 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20617008
[patent_doc_number] => 20260087107
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-03-26
[patent_title] => MARKING ATTRIBUTION DATA IN GENERATED CONTENT
[patent_app_type] => utility
[patent_app_number] => 19/406759
[patent_app_country] => US
[patent_app_date] => 2025-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 39321
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19406759
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/406759 | MARKING ATTRIBUTION DATA IN GENERATED CONTENT | Dec 1, 2025 | Pending |
Array
(
[id] => 19759110
[patent_doc_number] => 20250047675
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-06
[patent_title] => CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING
[patent_app_type] => utility
[patent_app_number] => 18/927424
[patent_app_country] => US
[patent_app_date] => 2024-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14115
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18927424
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/927424 | CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING | Oct 24, 2024 | Pending |
Array
(
[id] => 19994675
[patent_doc_number] => 20250132897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-24
[patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING
[patent_app_type] => utility
[patent_app_number] => 18/913618
[patent_app_country] => US
[patent_app_date] => 2024-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11335
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913618
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/913618 | LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING | Oct 10, 2024 | Pending |
Array
(
[id] => 20589454
[patent_doc_number] => 20260075052
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-03-12
[patent_title] => SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS
[patent_app_type] => utility
[patent_app_number] => 18/883764
[patent_app_country] => US
[patent_app_date] => 2024-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4641
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 352
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18883764
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/883764 | SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS | Sep 11, 2024 | Pending |
Array
(
[id] => 20234600
[patent_doc_number] => 20250291919
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-18
[patent_title] => MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD
[patent_app_type] => utility
[patent_app_number] => 18/830111
[patent_app_country] => US
[patent_app_date] => 2024-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 982
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18830111
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/830111 | MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD | Sep 9, 2024 | Pending |
Array
(
[id] => 19645292
[patent_doc_number] => 20240419812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-19
[patent_title] => EXPLOIT PREDICTION BASED ON MACHINE LEARNING
[patent_app_type] => utility
[patent_app_number] => 18/817448
[patent_app_country] => US
[patent_app_date] => 2024-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6967
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18817448
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/817448 | EXPLOIT PREDICTION BASED ON MACHINE LEARNING | Aug 27, 2024 | Pending |
Array
(
[id] => 19713593
[patent_doc_number] => 20250023735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-16
[patent_title] => HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES
[patent_app_type] => utility
[patent_app_number] => 18/813160
[patent_app_country] => US
[patent_app_date] => 2024-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12265
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18813160
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/813160 | HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES | Aug 22, 2024 | Pending |
Array
(
[id] => 19924881
[patent_doc_number] => 12299162
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-13
[patent_title] => Systems and methods for end point integration and mapping
[patent_app_type] => utility
[patent_app_number] => 18/808778
[patent_app_country] => US
[patent_app_date] => 2024-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 40732
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18808778
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/808778 | Systems and methods for end point integration and mapping | Aug 18, 2024 | Issued |
Array
(
[id] => 19942280
[patent_doc_number] => 12314409
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-27
[patent_title] => Remote ownership and content control of media files on untrusted systems
[patent_app_type] => utility
[patent_app_number] => 18/806828
[patent_app_country] => US
[patent_app_date] => 2024-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6997
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18806828
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/806828 | Remote ownership and content control of media files on untrusted systems | Aug 15, 2024 | Issued |
Array
(
[id] => 20462923
[patent_doc_number] => 20260012353
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-08
[patent_title] => Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections
[patent_app_type] => utility
[patent_app_number] => 18/763974
[patent_app_country] => US
[patent_app_date] => 2024-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13851
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 258
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763974
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/763974 | Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections | Jul 2, 2024 | Pending |
Array
(
[id] => 19748238
[patent_doc_number] => 20250036803
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation
[patent_app_type] => utility
[patent_app_number] => 18/760772
[patent_app_country] => US
[patent_app_date] => 2024-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7598
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18760772
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/760772 | Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation | Jun 30, 2024 | Pending |
Array
(
[id] => 19532837
[patent_doc_number] => 20240356739
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-24
[patent_title] => RANGE CONSTRAINED DEVICE CONFIGURATION
[patent_app_type] => utility
[patent_app_number] => 18/759366
[patent_app_country] => US
[patent_app_date] => 2024-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6671
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18759366
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/759366 | RANGE CONSTRAINED DEVICE CONFIGURATION | Jun 27, 2024 | Pending |
Array
(
[id] => 20204945
[patent_doc_number] => 12407736
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-02
[patent_title] => Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity
[patent_app_type] => utility
[patent_app_number] => 18/753432
[patent_app_country] => US
[patent_app_date] => 2024-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2282
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18753432
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/753432 | Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity | Jun 24, 2024 | Issued |
Array
(
[id] => 19499428
[patent_doc_number] => 20240338446
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => Attribute-based detection of malicious software and code packers
[patent_app_type] => utility
[patent_app_number] => 18/744788
[patent_app_country] => US
[patent_app_date] => 2024-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4465
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18744788
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/744788 | Attribute-based detection of malicious software and code packers | Jun 16, 2024 | Pending |
Array
(
[id] => 19485712
[patent_doc_number] => 20240333754
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-03
[patent_title] => SOFTWARE RELEASE TRACKING AND LOGGING
[patent_app_type] => utility
[patent_app_number] => 18/742570
[patent_app_country] => US
[patent_app_date] => 2024-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19807
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742570
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/742570 | Software release tracking and logging | Jun 12, 2024 | Issued |
Array
(
[id] => 19617791
[patent_doc_number] => 20240403471
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-05
[patent_title] => SECURE CREDENTIALING SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 18/738422
[patent_app_country] => US
[patent_app_date] => 2024-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7142
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18738422
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/738422 | Secure credentialing systems and methods | Jun 9, 2024 | Issued |
Array
(
[id] => 19482275
[patent_doc_number] => 20240330317
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-03
[patent_title] => Import and Export in Blockchain Environments
[patent_app_type] => utility
[patent_app_number] => 18/737643
[patent_app_country] => US
[patent_app_date] => 2024-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9214
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18737643
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/737643 | Import and Export in Blockchain Environments | Jun 6, 2024 | Pending |
Array
(
[id] => 20079533
[patent_doc_number] => 12353601
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-08
[patent_title] => Synthesizing user transactional data for de-identifying sensitive information
[patent_app_type] => utility
[patent_app_number] => 18/732294
[patent_app_country] => US
[patent_app_date] => 2024-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 0
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18732294
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/732294 | Synthesizing user transactional data for de-identifying sensitive information | Jun 2, 2024 | Issued |
Array
(
[id] => 20236556
[patent_doc_number] => 20250293875
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-18
[patent_title] => DISTRIBUTION OF SECURITY KEYS IN A STORAGE NETWORK
[patent_app_type] => utility
[patent_app_number] => 18/677668
[patent_app_country] => US
[patent_app_date] => 2024-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1089
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18677668
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/677668 | DISTRIBUTION OF SECURITY KEYS IN A STORAGE NETWORK | May 28, 2024 | Pending |
Array
(
[id] => 19532828
[patent_doc_number] => 20240356730
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-24
[patent_title] => COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR HIGHLY SECURE, HIGH SPEED ENCRYPTION AND TRANSMISSION OF DATA
[patent_app_type] => utility
[patent_app_number] => 18/660978
[patent_app_country] => US
[patent_app_date] => 2024-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6298
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18660978
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/660978 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR HIGHLY SECURE, HIGH SPEED ENCRYPTION AND TRANSMISSION OF DATA | May 9, 2024 | Pending |