
Christopher S. Bobish
Examiner (ID: 9233, Phone: (571)270-5289 , Office: P/3746 )
| Most Active Art Unit | 3746 |
| Art Unit(s) | 3746 |
| Total Applications | 1042 |
| Issued Applications | 601 |
| Pending Applications | 85 |
| Abandoned Applications | 386 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19756803
[patent_doc_number] => 20250045368
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-06
[patent_title] => METHOD FOR AUTHENTICATING A USER OF A MOBILE DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/565560
[patent_app_country] => US
[patent_app_date] => 2022-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10057
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18565560
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/565560 | Method for authenticating a user of a mobile device | Jun 13, 2022 | Issued |
Array
(
[id] => 19742119
[patent_doc_number] => 12218973
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-04
[patent_title] => Lookalike domain identification
[patent_app_type] => utility
[patent_app_number] => 17/805796
[patent_app_country] => US
[patent_app_date] => 2022-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 7936
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17805796
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/805796 | Lookalike domain identification | Jun 6, 2022 | Issued |
Array
(
[id] => 17885171
[patent_doc_number] => 20220300648
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-22
[patent_title] => DATA PROCESSING SYSTEMS FOR VERIFICATION OF CONSENT AND NOTICE PROCESSING AND RELATED METHODS
[patent_app_type] => utility
[patent_app_number] => 17/832313
[patent_app_country] => US
[patent_app_date] => 2022-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 72955
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17832313
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/832313 | Data processing systems for verification of consent and notice processing and related methods | Jun 2, 2022 | Issued |
Array
(
[id] => 19957963
[patent_doc_number] => 12328390
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-06-10
[patent_title] => Identity and privacy preservation in asynchronous communications
[patent_app_type] => utility
[patent_app_number] => 17/830398
[patent_app_country] => US
[patent_app_date] => 2022-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 4827
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17830398
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/830398 | Identity and privacy preservation in asynchronous communications | Jun 1, 2022 | Issued |
Array
(
[id] => 18144217
[patent_doc_number] => 20230018068
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-01-19
[patent_title] => METHODS AND SYSTEMS FOR LOCATING ANOMALOUS QUERY ACTIVITY ON DATA STORES
[patent_app_type] => utility
[patent_app_number] => 17/829361
[patent_app_country] => US
[patent_app_date] => 2022-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2925
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17829361
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/829361 | Methods and systems for locating anomalous query activity on data stores | May 31, 2022 | Issued |
Array
(
[id] => 18640322
[patent_doc_number] => 11764955
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-09-19
[patent_title] => Cracking private key of asymmetric cryptosystem
[patent_app_type] => utility
[patent_app_number] => 17/828355
[patent_app_country] => US
[patent_app_date] => 2022-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9577
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17828355
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/828355 | Cracking private key of asymmetric cryptosystem | May 30, 2022 | Issued |
Array
(
[id] => 17854038
[patent_doc_number] => 20220284080
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-08
[patent_title] => User-Specific Watermark for Maintaining Security of Data Files
[patent_app_type] => utility
[patent_app_number] => 17/664923
[patent_app_country] => US
[patent_app_date] => 2022-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5062
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17664923
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/664923 | User-specific watermark for maintaining security of data files | May 24, 2022 | Issued |
Array
(
[id] => 18741971
[patent_doc_number] => 20230350953
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-11-02
[patent_title] => SYSTEM AND METHOD FOR FILE AND FILE SYSTEM INTEGRITY USING META-DATA
[patent_app_type] => utility
[patent_app_number] => 17/734930
[patent_app_country] => US
[patent_app_date] => 2022-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8546
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17734930
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/734930 | SYSTEM AND METHOD FOR FILE AND FILE SYSTEM INTEGRITY USING META-DATA | May 1, 2022 | Abandoned |
Array
(
[id] => 18023030
[patent_doc_number] => 20220374529
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-11-24
[patent_title] => SECURE CRYPTOGRAPHIC SERVER CARD
[patent_app_type] => utility
[patent_app_number] => 17/732511
[patent_app_country] => US
[patent_app_date] => 2022-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4341
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17732511
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/732511 | SECURE CRYPTOGRAPHIC SERVER CARD | Apr 27, 2022 | Pending |
Array
(
[id] => 18136399
[patent_doc_number] => 11562078
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-24
[patent_title] => Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
[patent_app_type] => utility
[patent_app_number] => 17/722551
[patent_app_country] => US
[patent_app_date] => 2022-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16919
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17722551
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/722551 | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system | Apr 17, 2022 | Issued |
Array
(
[id] => 18609172
[patent_doc_number] => 11750662
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-09-05
[patent_title] => Multi-access edge computing services security in mobile networks by parsing application programming interfaces
[patent_app_type] => utility
[patent_app_number] => 17/720213
[patent_app_country] => US
[patent_app_date] => 2022-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11651
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17720213
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/720213 | Multi-access edge computing services security in mobile networks by parsing application programming interfaces | Apr 12, 2022 | Issued |
Array
(
[id] => 18082271
[patent_doc_number] => 20220407883
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-22
[patent_title] => LOCATING SHADOW VULNERABLE DATASTORES FOR CLOUD DATA TABLE/API/DATA LAKE STORES
[patent_app_type] => utility
[patent_app_number] => 17/711031
[patent_app_country] => US
[patent_app_date] => 2022-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2180
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17711031
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/711031 | Locating shadow vulnerable datastores for cloud data table/API/data lake stores | Mar 31, 2022 | Issued |
Array
(
[id] => 19568596
[patent_doc_number] => 12143382
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-11-12
[patent_title] => Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
[patent_app_type] => utility
[patent_app_number] => 17/689667
[patent_app_country] => US
[patent_app_date] => 2022-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 28
[patent_no_of_words] => 18053
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17689667
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/689667 | Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment | Mar 7, 2022 | Issued |
Array
(
[id] => 20389880
[patent_doc_number] => 12489621
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-12-02
[patent_title] => Providing data to be protected in a secured execution environment of a data processing system
[patent_app_type] => utility
[patent_app_number] => 18/551462
[patent_app_country] => US
[patent_app_date] => 2022-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 0
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18551462
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/551462 | Providing data to be protected in a secured execution environment of a data processing system | Mar 6, 2022 | Issued |
Array
(
[id] => 17677895
[patent_doc_number] => 20220191062
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-16
[patent_title] => MULTI-PERIMETER FIREWALL IN THE CLOUD
[patent_app_type] => utility
[patent_app_number] => 17/686870
[patent_app_country] => US
[patent_app_date] => 2022-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14113
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17686870
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/686870 | Multi-perimeter firewall in the cloud | Mar 3, 2022 | Issued |
Array
(
[id] => 20375951
[patent_doc_number] => 12483398
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-11-25
[patent_title] => System and method for proven secret key agreement between initiating unit and responding unit
[patent_app_type] => utility
[patent_app_number] => 18/279886
[patent_app_country] => US
[patent_app_date] => 2022-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2135
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 375
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18279886
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/279886 | System and method for proven secret key agreement between initiating unit and responding unit | Feb 28, 2022 | Issued |
Array
(
[id] => 18705490
[patent_doc_number] => 11792012
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-17
[patent_title] => Distributed biometric comparison framework
[patent_app_type] => utility
[patent_app_number] => 17/683846
[patent_app_country] => US
[patent_app_date] => 2022-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 14697
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17683846
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/683846 | Distributed biometric comparison framework | Feb 28, 2022 | Issued |
Array
(
[id] => 20275483
[patent_doc_number] => 12445270
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-10-14
[patent_title] => On-demand formation of secure user domains
[patent_app_type] => utility
[patent_app_number] => 17/683972
[patent_app_country] => US
[patent_app_date] => 2022-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2334
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17683972
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/683972 | On-demand formation of secure user domains | Feb 28, 2022 | Issued |
Array
(
[id] => 17659797
[patent_doc_number] => 20220180262
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-09
[patent_title] => PRIVACY MANAGEMENT SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 17/679750
[patent_app_country] => US
[patent_app_date] => 2022-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 76806
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17679750
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/679750 | Privacy management systems and methods | Feb 23, 2022 | Issued |
Array
(
[id] => 18520042
[patent_doc_number] => 11709934
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-25
[patent_title] => Preventing unauthorized screen capture activity
[patent_app_type] => utility
[patent_app_number] => 17/586331
[patent_app_country] => US
[patent_app_date] => 2022-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7943
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17586331
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/586331 | Preventing unauthorized screen capture activity | Jan 26, 2022 | Issued |