
Daniel B. Potratz
Examiner (ID: 14957, Phone: (571)270-5329 , Office: P/2491 )
| Most Active Art Unit | 2491 |
| Art Unit(s) | 2491 |
| Total Applications | 524 |
| Issued Applications | 357 |
| Pending Applications | 48 |
| Abandoned Applications | 129 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18178653
[patent_doc_number] => 20230039382
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-02-09
[patent_title] => ADAPTIVE DETECTION OF SECURITY THREATS THROUGH RETRAINING OF COMPUTER-IMPLEMENTED MODELS
[patent_app_type] => utility
[patent_app_number] => 17/871765
[patent_app_country] => US
[patent_app_date] => 2022-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14506
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17871765
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/871765 | Adaptive detection of security threats through retraining of computer-implemented models | Jul 21, 2022 | Issued |
Array
(
[id] => 18904898
[patent_doc_number] => 20240020383
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-18
[patent_title] => METHOD AND CIRCUIT FOR PROTECTING AN ELECTRONIC DEVICE FROM A SIDE-CHANNEL ATTACK
[patent_app_type] => utility
[patent_app_number] => 17/812244
[patent_app_country] => US
[patent_app_date] => 2022-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6383
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 56
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17812244
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/812244 | METHOD AND CIRCUIT FOR PROTECTING AN ELECTRONIC DEVICE FROM A SIDE-CHANNEL ATTACK | Jul 12, 2022 | Abandoned |
Array
(
[id] => 19628013
[patent_doc_number] => 12166879
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-12-10
[patent_title] => Rejection of masked polynomials
[patent_app_type] => utility
[patent_app_number] => 17/811669
[patent_app_country] => US
[patent_app_date] => 2022-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 5451
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17811669
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/811669 | Rejection of masked polynomials | Jul 10, 2022 | Issued |
Array
(
[id] => 18145359
[patent_doc_number] => 20230019214
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-01-19
[patent_title] => Devices, Systems, Software, and Methods for Efficient Data Processing for Fully Homomorphic Encryption, Post-Quantum Cryptography, Artificial Intelligence, and other Applications
[patent_app_type] => utility
[patent_app_number] => 17/851408
[patent_app_country] => US
[patent_app_date] => 2022-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18030
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17851408
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/851408 | Devices, Systems, Software, and Methods for Efficient Data Processing for Fully Homomorphic Encryption, Post-Quantum Cryptography, Artificial Intelligence, and other Applications | Jun 27, 2022 | Pending |
Array
(
[id] => 17888263
[patent_doc_number] => 20220303741
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-22
[patent_title] => MTC KEY MANAGEMENT FOR SENDING KEY FROM NETWORK TO UE
[patent_app_type] => utility
[patent_app_number] => 17/832762
[patent_app_country] => US
[patent_app_date] => 2022-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3013
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17832762
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/832762 | MTC KEY MANAGEMENT FOR SENDING KEY FROM NETWORK TO UE | Jun 5, 2022 | Abandoned |
Array
(
[id] => 17832529
[patent_doc_number] => 20220269833
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-25
[patent_title] => MAINTENANCE OF ACCESS FOR SECURITY ENABLEMENT ON A HOST SYSTEM
[patent_app_type] => utility
[patent_app_number] => 17/742155
[patent_app_country] => US
[patent_app_date] => 2022-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8641
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17742155
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/742155 | Maintenance of access for security enablement on a host system | May 10, 2022 | Issued |
Array
(
[id] => 18881601
[patent_doc_number] => 20240004970
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-04
[patent_title] => IDENTIFICATION OF A USER REQUESTING AN ELECTRONIC DOCUMENT
[patent_app_type] => utility
[patent_app_number] => 18/042311
[patent_app_country] => US
[patent_app_date] => 2022-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6709
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18042311
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/042311 | IDENTIFICATION OF A USER REQUESTING AN ELECTRONIC DOCUMENT | May 10, 2022 | Pending |
Array
(
[id] => 18728172
[patent_doc_number] => 20230342465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-10-26
[patent_title] => System and Method for Antimalware Application Adversarial Machine Learning
[patent_app_type] => utility
[patent_app_number] => 17/725802
[patent_app_country] => US
[patent_app_date] => 2022-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14362
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17725802
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/725802 | System and method for antimalware application adversarial machine learning | Apr 20, 2022 | Issued |
Array
(
[id] => 19426828
[patent_doc_number] => 12086248
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-09-10
[patent_title] => System and method for antimalware application adversarial machine learning
[patent_app_type] => utility
[patent_app_number] => 17/725796
[patent_app_country] => US
[patent_app_date] => 2022-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 14283
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17725796
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/725796 | System and method for antimalware application adversarial machine learning | Apr 20, 2022 | Issued |
Array
(
[id] => 17809574
[patent_doc_number] => 20220261409
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-18
[patent_title] => EXTRAPOLATING TRENDS IN TRUST SCORES
[patent_app_type] => utility
[patent_app_number] => 17/660167
[patent_app_country] => US
[patent_app_date] => 2022-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 27030
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17660167
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/660167 | Extrapolating trends in trust scores | Apr 20, 2022 | Issued |
Array
(
[id] => 18728174
[patent_doc_number] => 20230342467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-10-26
[patent_title] => STORAGE IDENTITY VALIDATION FOR A SUPPLY CHAIN
[patent_app_type] => utility
[patent_app_number] => 17/659938
[patent_app_country] => US
[patent_app_date] => 2022-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9145
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 45
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17659938
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/659938 | STORAGE IDENTITY VALIDATION FOR A SUPPLY CHAIN | Apr 19, 2022 | Pending |
Array
(
[id] => 18041441
[patent_doc_number] => 20220385658
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-01
[patent_title] => VOICE CONTROL OF ENDPOINT DEVICES THROUGH A MULTI-SERVICES GATEWAY DEVICE AT THE USER PREMISES
[patent_app_type] => utility
[patent_app_number] => 17/717688
[patent_app_country] => US
[patent_app_date] => 2022-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 26287
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17717688
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/717688 | VOICE CONTROL OF ENDPOINT DEVICES THROUGH A MULTI-SERVICES GATEWAY DEVICE AT THE USER PREMISES | Apr 10, 2022 | Abandoned |
Array
(
[id] => 19313218
[patent_doc_number] => 12039032
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-07-16
[patent_title] => Method for the execution of a binary code by a microprocessor
[patent_app_type] => utility
[patent_app_number] => 17/656039
[patent_app_country] => US
[patent_app_date] => 2022-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 7046
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 556
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17656039
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/656039 | Method for the execution of a binary code by a microprocessor | Mar 22, 2022 | Issued |
Array
(
[id] => 18654304
[patent_doc_number] => 20230300150
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-09-21
[patent_title] => USE OF A TRUST SCORE PLAN
[patent_app_type] => utility
[patent_app_number] => 17/655140
[patent_app_country] => US
[patent_app_date] => 2022-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 24319
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17655140
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/655140 | USE OF A TRUST SCORE PLAN | Mar 15, 2022 | Pending |
Array
(
[id] => 18651852
[patent_doc_number] => 20230297688
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-09-21
[patent_title] => DETERMINING SECURITY RISKS IN BINARY SOFTWARE CODE USING A SOFTWARE RELATIONSHIP MODEL
[patent_app_type] => utility
[patent_app_number] => 17/695473
[patent_app_country] => US
[patent_app_date] => 2022-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8992
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17695473
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/695473 | DETERMINING SECURITY RISKS IN BINARY SOFTWARE CODE USING A SOFTWARE RELATIONSHIP MODEL | Mar 14, 2022 | Issued |
Array
(
[id] => 19377493
[patent_doc_number] => 12069083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-08-20
[patent_title] => Assessing security risks of users in a computing network
[patent_app_type] => utility
[patent_app_number] => 17/693838
[patent_app_country] => US
[patent_app_date] => 2022-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 28729
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17693838
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/693838 | Assessing security risks of users in a computing network | Mar 13, 2022 | Issued |
Array
(
[id] => 19138784
[patent_doc_number] => 11973772
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-04-30
[patent_title] => Multistage analysis of emails to identify security threats
[patent_app_type] => utility
[patent_app_number] => 17/677822
[patent_app_country] => US
[patent_app_date] => 2022-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 40
[patent_no_of_words] => 20690
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17677822
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/677822 | Multistage analysis of emails to identify security threats | Feb 21, 2022 | Issued |
Array
(
[id] => 18968627
[patent_doc_number] => 11902429
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-13
[patent_title] => Distributed secure multi party computation
[patent_app_type] => utility
[patent_app_number] => 17/649171
[patent_app_country] => US
[patent_app_date] => 2022-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 15018
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 416
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17649171
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/649171 | Distributed secure multi party computation | Jan 26, 2022 | Issued |
Array
(
[id] => 17584183
[patent_doc_number] => 20220141038
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-05
[patent_title] => METHOD OF RSA SIGNATURE OR DECRYPTION PROTECTED USING A HOMOMORPHIC ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 17/574005
[patent_app_country] => US
[patent_app_date] => 2022-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9627
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 361
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17574005
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/574005 | Method of RSA signature or decryption protected using a homomorphic encryption | Jan 11, 2022 | Issued |
Array
(
[id] => 17584378
[patent_doc_number] => 20220141233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-05
[patent_title] => PROTECTION CONFIGURATION FOR APPLICATION PROGRAMMING INTERFACES
[patent_app_type] => utility
[patent_app_number] => 17/574190
[patent_app_country] => US
[patent_app_date] => 2022-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19253
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17574190
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/574190 | Protection configuration for application programming interfaces | Jan 11, 2022 | Issued |