Search

Christian Chace

Supervisory Patent Examiner (ID: 13249, Phone: (571)272-4190 , Office: P/2131 )

Most Active Art Unit
2186
Art Unit(s)
2131, 2187, 2129, 2165, 3665, 2186, 2189, 2752
Total Applications
433
Issued Applications
345
Pending Applications
22
Abandoned Applications
66

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20617008 [patent_doc_number] => 20260087107 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-03-26 [patent_title] => MARKING ATTRIBUTION DATA IN GENERATED CONTENT [patent_app_type] => utility [patent_app_number] => 19/406759 [patent_app_country] => US [patent_app_date] => 2025-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 39321 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19406759 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/406759
MARKING ATTRIBUTION DATA IN GENERATED CONTENT Dec 1, 2025 Pending
Array ( [id] => 19759110 [patent_doc_number] => 20250047675 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-02-06 [patent_title] => CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING [patent_app_type] => utility [patent_app_number] => 18/927424 [patent_app_country] => US [patent_app_date] => 2024-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14115 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18927424 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/927424
CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING Oct 24, 2024 Pending
Array ( [id] => 19994675 [patent_doc_number] => 20250132897 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-24 [patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING [patent_app_type] => utility [patent_app_number] => 18/913618 [patent_app_country] => US [patent_app_date] => 2024-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11335 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913618 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/913618
LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING Oct 10, 2024 Pending
Array ( [id] => 20589454 [patent_doc_number] => 20260075052 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-03-12 [patent_title] => SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS [patent_app_type] => utility [patent_app_number] => 18/883764 [patent_app_country] => US [patent_app_date] => 2024-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4641 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 352 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18883764 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/883764
SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS Sep 11, 2024 Pending
Array ( [id] => 20234600 [patent_doc_number] => 20250291919 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-09-18 [patent_title] => MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD [patent_app_type] => utility [patent_app_number] => 18/830111 [patent_app_country] => US [patent_app_date] => 2024-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 982 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -13 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18830111 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/830111
MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD Sep 9, 2024 Pending
Array ( [id] => 19645292 [patent_doc_number] => 20240419812 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-19 [patent_title] => EXPLOIT PREDICTION BASED ON MACHINE LEARNING [patent_app_type] => utility [patent_app_number] => 18/817448 [patent_app_country] => US [patent_app_date] => 2024-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6967 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18817448 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/817448
EXPLOIT PREDICTION BASED ON MACHINE LEARNING Aug 27, 2024 Pending
Array ( [id] => 19713593 [patent_doc_number] => 20250023735 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-16 [patent_title] => HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES [patent_app_type] => utility [patent_app_number] => 18/813160 [patent_app_country] => US [patent_app_date] => 2024-08-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12265 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18813160 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/813160
HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES Aug 22, 2024 Pending
Array ( [id] => 19924881 [patent_doc_number] => 12299162 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-05-13 [patent_title] => Systems and methods for end point integration and mapping [patent_app_type] => utility [patent_app_number] => 18/808778 [patent_app_country] => US [patent_app_date] => 2024-08-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 40732 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 235 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18808778 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/808778
Systems and methods for end point integration and mapping Aug 18, 2024 Issued
Array ( [id] => 19942280 [patent_doc_number] => 12314409 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-05-27 [patent_title] => Remote ownership and content control of media files on untrusted systems [patent_app_type] => utility [patent_app_number] => 18/806828 [patent_app_country] => US [patent_app_date] => 2024-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6997 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18806828 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/806828
Remote ownership and content control of media files on untrusted systems Aug 15, 2024 Issued
Array ( [id] => 20462923 [patent_doc_number] => 20260012353 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-08 [patent_title] => Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections [patent_app_type] => utility [patent_app_number] => 18/763974 [patent_app_country] => US [patent_app_date] => 2024-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13851 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 258 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763974 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/763974
Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections Jul 2, 2024 Pending
Array ( [id] => 19748238 [patent_doc_number] => 20250036803 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-30 [patent_title] => Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation [patent_app_type] => utility [patent_app_number] => 18/760772 [patent_app_country] => US [patent_app_date] => 2024-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7598 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 64 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18760772 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/760772
Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation Jun 30, 2024 Pending
Array ( [id] => 19532837 [patent_doc_number] => 20240356739 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-24 [patent_title] => RANGE CONSTRAINED DEVICE CONFIGURATION [patent_app_type] => utility [patent_app_number] => 18/759366 [patent_app_country] => US [patent_app_date] => 2024-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6671 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18759366 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/759366
RANGE CONSTRAINED DEVICE CONFIGURATION Jun 27, 2024 Pending
Array ( [id] => 20204945 [patent_doc_number] => 12407736 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-09-02 [patent_title] => Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity [patent_app_type] => utility [patent_app_number] => 18/753432 [patent_app_country] => US [patent_app_date] => 2024-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2282 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 219 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18753432 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/753432
Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity Jun 24, 2024 Issued
Array ( [id] => 19499428 [patent_doc_number] => 20240338446 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-10 [patent_title] => Attribute-based detection of malicious software and code packers [patent_app_type] => utility [patent_app_number] => 18/744788 [patent_app_country] => US [patent_app_date] => 2024-06-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4465 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 168 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18744788 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/744788
Attribute-based detection of malicious software and code packers Jun 16, 2024 Pending
Array ( [id] => 19485712 [patent_doc_number] => 20240333754 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-03 [patent_title] => SOFTWARE RELEASE TRACKING AND LOGGING [patent_app_type] => utility [patent_app_number] => 18/742570 [patent_app_country] => US [patent_app_date] => 2024-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19807 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742570 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/742570
Software release tracking and logging Jun 12, 2024 Issued
Array ( [id] => 19617791 [patent_doc_number] => 20240403471 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-05 [patent_title] => SECURE CREDENTIALING SYSTEMS AND METHODS [patent_app_type] => utility [patent_app_number] => 18/738422 [patent_app_country] => US [patent_app_date] => 2024-06-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7142 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18738422 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/738422
Secure credentialing systems and methods Jun 9, 2024 Issued
Array ( [id] => 19482275 [patent_doc_number] => 20240330317 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-03 [patent_title] => Import and Export in Blockchain Environments [patent_app_type] => utility [patent_app_number] => 18/737643 [patent_app_country] => US [patent_app_date] => 2024-06-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9214 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18737643 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/737643
Import and Export in Blockchain Environments Jun 6, 2024 Pending
Array ( [id] => 20079533 [patent_doc_number] => 12353601 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-07-08 [patent_title] => Synthesizing user transactional data for de-identifying sensitive information [patent_app_type] => utility [patent_app_number] => 18/732294 [patent_app_country] => US [patent_app_date] => 2024-06-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 0 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18732294 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/732294
Synthesizing user transactional data for de-identifying sensitive information Jun 2, 2024 Issued
Array ( [id] => 20236556 [patent_doc_number] => 20250293875 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-09-18 [patent_title] => DISTRIBUTION OF SECURITY KEYS IN A STORAGE NETWORK [patent_app_type] => utility [patent_app_number] => 18/677668 [patent_app_country] => US [patent_app_date] => 2024-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1089 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18677668 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/677668
DISTRIBUTION OF SECURITY KEYS IN A STORAGE NETWORK May 28, 2024 Pending
Array ( [id] => 19532828 [patent_doc_number] => 20240356730 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-24 [patent_title] => COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR HIGHLY SECURE, HIGH SPEED ENCRYPTION AND TRANSMISSION OF DATA [patent_app_type] => utility [patent_app_number] => 18/660978 [patent_app_country] => US [patent_app_date] => 2024-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6298 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18660978 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/660978
COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR HIGHLY SECURE, HIGH SPEED ENCRYPTION AND TRANSMISSION OF DATA May 9, 2024 Pending
Menu