
David Bochna
Examiner (ID: 16580, Phone: (571)272-7078 , Office: P/3679 )
| Most Active Art Unit | 3679 |
| Art Unit(s) | 3679, 3629, 3626 |
| Total Applications | 2979 |
| Issued Applications | 2309 |
| Pending Applications | 164 |
| Abandoned Applications | 540 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17848971
[patent_doc_number] => 11438363
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-06
[patent_title] => Network exposure detection and security assessment tool
[patent_app_type] => utility
[patent_app_number] => 16/839120
[patent_app_country] => US
[patent_app_date] => 2020-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 9747
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16839120
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/839120 | Network exposure detection and security assessment tool | Apr 2, 2020 | Issued |
Array
(
[id] => 18899694
[patent_doc_number] => 20240015179
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-11
[patent_title] => SYSTEMS AND METHODS FOR IDENTIFYING WEBSITE CONTENT MANIPULATION
[patent_app_type] => utility
[patent_app_number] => 16/828529
[patent_app_country] => US
[patent_app_date] => 2020-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9635
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16828529
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/828529 | SYSTEMS AND METHODS FOR IDENTIFYING WEBSITE CONTENT MANIPULATION | Mar 23, 2020 | Abandoned |
Array
(
[id] => 17430568
[patent_doc_number] => 20220058277
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-24
[patent_title] => INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 17/275870
[patent_app_country] => US
[patent_app_date] => 2020-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7812
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17275870
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/275870 | Information processing apparatus, information processing method and program | Mar 10, 2020 | Issued |
Array
(
[id] => 17086583
[patent_doc_number] => 20210281590
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-09
[patent_title] => Device Anomaly Detection
[patent_app_type] => utility
[patent_app_number] => 16/809423
[patent_app_country] => US
[patent_app_date] => 2020-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15245
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16809423
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/809423 | Device anomaly detection | Mar 3, 2020 | Issued |
Array
(
[id] => 16725011
[patent_doc_number] => 20210092158
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-25
[patent_title] => METHOD, APPARATUS, DEVICE, TERMINAL, AND MEDIUM FOR DEFENDING AGAINST ATTACKING BEHAVIOR
[patent_app_type] => utility
[patent_app_number] => 16/809394
[patent_app_country] => US
[patent_app_date] => 2020-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10972
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16809394
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/809394 | METHOD, APPARATUS, DEVICE, TERMINAL, AND MEDIUM FOR DEFENDING AGAINST ATTACKING BEHAVIOR | Mar 3, 2020 | Abandoned |
Array
(
[id] => 16775020
[patent_doc_number] => 10986150
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-20
[patent_title] => Load balancing in a dynamic scalable services mesh
[patent_app_type] => utility
[patent_app_number] => 16/807128
[patent_app_country] => US
[patent_app_date] => 2020-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12208
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16807128
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/807128 | Load balancing in a dynamic scalable services mesh | Mar 1, 2020 | Issued |
Array
(
[id] => 18263873
[patent_doc_number] => 11611584
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-03-21
[patent_title] => Smart bits
[patent_app_type] => utility
[patent_app_number] => 16/807072
[patent_app_country] => US
[patent_app_date] => 2020-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3749
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16807072
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/807072 | Smart bits | Mar 1, 2020 | Issued |
Array
(
[id] => 16579793
[patent_doc_number] => 20210014195
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-14
[patent_title] => REAL TIME DYNAMIC CLIENT ACCESS CONTROL
[patent_app_type] => utility
[patent_app_number] => 16/800385
[patent_app_country] => US
[patent_app_date] => 2020-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12004
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 343
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16800385
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/800385 | Real time dynamic client access control | Feb 24, 2020 | Issued |
Array
(
[id] => 17026497
[patent_doc_number] => 20210250369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-08-12
[patent_title] => SYSTEM AND METHOD FOR PROVIDING CYBER SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/787760
[patent_app_country] => US
[patent_app_date] => 2020-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11309
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16787760
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/787760 | System and method for providing cyber security | Feb 10, 2020 | Issued |
Array
(
[id] => 18332580
[patent_doc_number] => 11637842
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-04-25
[patent_title] => Detection of security intrusion in a computing system
[patent_app_type] => utility
[patent_app_number] => 16/779516
[patent_app_country] => US
[patent_app_date] => 2020-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8174
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 295
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16779516
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/779516 | Detection of security intrusion in a computing system | Jan 30, 2020 | Issued |
Array
(
[id] => 15941673
[patent_doc_number] => 20200162470
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-21
[patent_title] => LIMITING USER ACCESS TO SUSPICIOUS OBJECTS OF A SOCIAL NETWORK SERVICE BASED ON SOCIAL LINKS
[patent_app_type] => utility
[patent_app_number] => 16/774043
[patent_app_country] => US
[patent_app_date] => 2020-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6966
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16774043
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/774043 | Limiting user access to suspicious objects of a social network service based on social links | Jan 27, 2020 | Issued |
Array
(
[id] => 16952758
[patent_doc_number] => 20210211450
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-08
[patent_title] => METHOD AND SYSTEM FOR PRIORITIZING AND REMEDIATING SECURITY VULNERABILITIES BASED ON ADAPTIVE SCORING
[patent_app_type] => utility
[patent_app_number] => 16/732730
[patent_app_country] => US
[patent_app_date] => 2020-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13114
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16732730
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/732730 | Method and system for prioritizing and remediating security vulnerabilities based on adaptive scoring | Jan 1, 2020 | Issued |
Array
(
[id] => 16242627
[patent_doc_number] => 20200259861
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => IDENTIFYING AND CLASSIFYING COMMUNITY ATTACKS
[patent_app_type] => utility
[patent_app_number] => 16/730926
[patent_app_country] => US
[patent_app_date] => 2019-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9605
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16730926
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/730926 | Identifying and classifying community attacks | Dec 29, 2019 | Issued |
Array
(
[id] => 17732175
[patent_doc_number] => 11388592
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-12
[patent_title] => Security context handling in 5G during handover
[patent_app_type] => utility
[patent_app_number] => 16/714494
[patent_app_country] => US
[patent_app_date] => 2019-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 31
[patent_no_of_words] => 21583
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 33
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16714494
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/714494 | Security context handling in 5G during handover | Dec 12, 2019 | Issued |
Array
(
[id] => 18609144
[patent_doc_number] => 11750634
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-09-05
[patent_title] => Threat detection model development for network-based systems
[patent_app_type] => utility
[patent_app_number] => 16/712571
[patent_app_country] => US
[patent_app_date] => 2019-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11771
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16712571
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/712571 | Threat detection model development for network-based systems | Dec 11, 2019 | Issued |
Array
(
[id] => 16023013
[patent_doc_number] => 20200186350
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-11
[patent_title] => SECURE COMPUTING HARDWARE APPARATUS
[patent_app_type] => utility
[patent_app_number] => 16/701802
[patent_app_country] => US
[patent_app_date] => 2019-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 27289
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16701802
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/701802 | Secure computing hardware apparatus | Dec 2, 2019 | Issued |
Array
(
[id] => 17732129
[patent_doc_number] => 11388546
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-12
[patent_title] => Systems and methods for monitoring for and lowering the risk of addiction-related or restriction violation-related behavior(s)
[patent_app_type] => utility
[patent_app_number] => 16/700601
[patent_app_country] => US
[patent_app_date] => 2019-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 21
[patent_no_of_words] => 35211
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16700601
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/700601 | Systems and methods for monitoring for and lowering the risk of addiction-related or restriction violation-related behavior(s) | Dec 1, 2019 | Issued |
Array
(
[id] => 16859519
[patent_doc_number] => 20210160264
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-27
[patent_title] => METHOD FOR PRIVACY PRESERVING ANOMALY DETECTION IN IOT
[patent_app_type] => utility
[patent_app_number] => 16/695251
[patent_app_country] => US
[patent_app_date] => 2019-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5085
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16695251
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/695251 | Method for privacy preserving anomaly detection in IoT | Nov 25, 2019 | Issued |
Array
(
[id] => 17093866
[patent_doc_number] => 11122069
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-14
[patent_title] => Detecting compromised social media accounts by analyzing affinity groups
[patent_app_type] => utility
[patent_app_number] => 16/695468
[patent_app_country] => US
[patent_app_date] => 2019-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10246
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16695468
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/695468 | Detecting compromised social media accounts by analyzing affinity groups | Nov 25, 2019 | Issued |
Array
(
[id] => 19732665
[patent_doc_number] => 12210662
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-01-28
[patent_title] => Protected peripheral ports
[patent_app_type] => utility
[patent_app_number] => 17/286584
[patent_app_country] => US
[patent_app_date] => 2019-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3126
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17286584
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/286584 | Protected peripheral ports | Nov 25, 2019 | Issued |