David J Walczak
Examiner (ID: 15568, Phone: (571)272-4895 , Office: P/3754 )
Most Active Art Unit | 3754 |
Art Unit(s) | 2403, 2832, 2899, 3751, 3105, 3754 |
Total Applications | 4576 |
Issued Applications | 3558 |
Pending Applications | 210 |
Abandoned Applications | 807 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 14693151
[patent_doc_number] => 20190245691
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-08
[patent_title] => REUSE SYSTEM, KEY GENERATION DEVICE, DATA SECURITY DEVICE, IN-VEHICLE COMPUTER, REUSE METHOD, AND COMPUTER PROGRAM
[patent_app_type] => utility
[patent_app_number] => 16/315891
[patent_app_country] => US
[patent_app_date] => 2017-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15856
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16315891
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/315891 | Reuse system, key generation device, data security device, in-vehicle computer, reuse method, and computer program | Jul 25, 2017 | Issued |
Array
(
[id] => 12140384
[patent_doc_number] => 20180018467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-18
[patent_title] => 'DECRYPTING FILES FOR DATA LEAKAGE PROTECTION IN AN ENTERPRISE NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/657850
[patent_app_country] => US
[patent_app_date] => 2017-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4053
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15657850
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/657850 | Decrypting files for data leakage protection in an enterprise network | Jul 23, 2017 | Issued |
Array
(
[id] => 16431811
[patent_doc_number] => 10831897
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-10
[patent_title] => Selective enforcement of secure boot database entries in an information handling system
[patent_app_type] => utility
[patent_app_number] => 15/650795
[patent_app_country] => US
[patent_app_date] => 2017-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 8572
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15650795
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/650795 | Selective enforcement of secure boot database entries in an information handling system | Jul 13, 2017 | Issued |
Array
(
[id] => 12142270
[patent_doc_number] => 20180020353
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-18
[patent_title] => 'ENHANCED SECURE PROVISIONING FOR HOTSPOTS'
[patent_app_type] => utility
[patent_app_number] => 15/650778
[patent_app_country] => US
[patent_app_date] => 2017-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7492
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15650778
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/650778 | Enhanced secure provisioning for hotspots | Jul 13, 2017 | Issued |
Array
(
[id] => 13834383
[patent_doc_number] => 20190020676
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-17
[patent_title] => MOBILE SECURITY COUNTERMEASURES
[patent_app_type] => utility
[patent_app_number] => 15/648310
[patent_app_country] => US
[patent_app_date] => 2017-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8797
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15648310
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/648310 | Mobile security countermeasures | Jul 11, 2017 | Issued |
Array
(
[id] => 14674271
[patent_doc_number] => 10375066
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-06
[patent_title] => Authentication method and system by garbled circuit
[patent_app_type] => utility
[patent_app_number] => 15/648300
[patent_app_country] => US
[patent_app_date] => 2017-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 10
[patent_no_of_words] => 7434
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 591
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15648300
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/648300 | Authentication method and system by garbled circuit | Jul 11, 2017 | Issued |
Array
(
[id] => 17003404
[patent_doc_number] => 11082236
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-03
[patent_title] => Method for providing secure digital signatures
[patent_app_type] => utility
[patent_app_number] => 16/317215
[patent_app_country] => US
[patent_app_date] => 2017-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 7876
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16317215
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/317215 | Method for providing secure digital signatures | Jul 11, 2017 | Issued |
Array
(
[id] => 15705699
[patent_doc_number] => 10609045
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Autonomic incident triage prioritization by performance modifier and temporal decay parameters
[patent_app_type] => utility
[patent_app_number] => 15/741182
[patent_app_country] => US
[patent_app_date] => 2017-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8914
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 278
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15741182
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/741182 | Autonomic incident triage prioritization by performance modifier and temporal decay parameters | Jun 28, 2017 | Issued |
Array
(
[id] => 14400111
[patent_doc_number] => 10313355
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => Client side security management for an operations, administration and maintenance system for wireless clients
[patent_app_type] => utility
[patent_app_number] => 15/630802
[patent_app_country] => US
[patent_app_date] => 2017-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3744
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630802
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/630802 | Client side security management for an operations, administration and maintenance system for wireless clients | Jun 21, 2017 | Issued |
Array
(
[id] => 13632033
[patent_doc_number] => 20180367571
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-20
[patent_title] => MOBILE USER IDENTITY AND/OR SIM-BASED IOT IDENTITY AND APPLICATION IDENTITY BASED SECURITY ENFORCEMENT IN SERVICE PROVIDER NETWORKS
[patent_app_type] => utility
[patent_app_number] => 15/624440
[patent_app_country] => US
[patent_app_date] => 2017-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18106
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15624440
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/624440 | Mobile user identity and/or SIM-based IoT identity and application identity based security enforcement in service provider networks | Jun 14, 2017 | Issued |
Array
(
[id] => 13711217
[patent_doc_number] => 20170366563
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-21
[patent_title] => Agentless ransomware detection and recovery
[patent_app_type] => utility
[patent_app_number] => 15/623401
[patent_app_country] => US
[patent_app_date] => 2017-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3904
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15623401
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/623401 | Agentless ransomware detection and recovery | Jun 14, 2017 | Abandoned |
Array
(
[id] => 14998291
[patent_doc_number] => 20190318103
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-17
[patent_title] => SECURE INITIATION AND TRANSFER OF A CRYPTOGRAPHIC DATABASE AND/OR A CRYPTOGRAPHIC UNIT
[patent_app_type] => utility
[patent_app_number] => 16/309588
[patent_app_country] => US
[patent_app_date] => 2017-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 26442
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16309588
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/309588 | Secure initiation and transfer of a cryptographic database and/or a cryptographic unit | Jun 12, 2017 | Issued |
Array
(
[id] => 12214047
[patent_doc_number] => 09910856
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-06
[patent_title] => 'Information source agent systems and methods for distributed data storage and management using content signatures'
[patent_app_type] => utility
[patent_app_number] => 15/620559
[patent_app_country] => US
[patent_app_date] => 2017-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 19360
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15620559
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/620559 | Information source agent systems and methods for distributed data storage and management using content signatures | Jun 11, 2017 | Issued |
Array
(
[id] => 13097689
[patent_doc_number] => 10068187
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-09-04
[patent_title] => Generation and use of trained file classifiers for malware detection
[patent_app_type] => utility
[patent_app_number] => 15/610173
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13575
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15610173
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/610173 | Generation and use of trained file classifiers for malware detection | May 30, 2017 | Issued |
Array
(
[id] => 14365405
[patent_doc_number] => 10304010
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-28
[patent_title] => Generation and use of trained file classifiers for malware detection
[patent_app_type] => utility
[patent_app_number] => 15/610191
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13575
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15610191
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/610191 | Generation and use of trained file classifiers for malware detection | May 30, 2017 | Issued |
Array
(
[id] => 13083941
[patent_doc_number] => 10062038
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-08-28
[patent_title] => Generation and use of trained file classifiers for malware detection
[patent_app_type] => utility
[patent_app_number] => 15/610228
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13575
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15610228
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/610228 | Generation and use of trained file classifiers for malware detection | May 30, 2017 | Issued |
Array
(
[id] => 11946840
[patent_doc_number] => 20170250991
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-31
[patent_title] => 'METHOD AND SYSTEM FOR IMPLEMENTING THIRD-PARTY AUTHENTICATION BASED ON GRAY LIST'
[patent_app_type] => utility
[patent_app_number] => 15/593487
[patent_app_country] => US
[patent_app_date] => 2017-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6189
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15593487
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/593487 | METHOD AND SYSTEM FOR IMPLEMENTING THIRD-PARTY AUTHENTICATION BASED ON GRAY LIST | May 11, 2017 | Abandoned |
Array
(
[id] => 12108469
[patent_doc_number] => 09864956
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-09
[patent_title] => 'Generation and use of trained file classifiers for malware detection'
[patent_app_type] => utility
[patent_app_number] => 15/583565
[patent_app_country] => US
[patent_app_date] => 2017-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13990
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15583565
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/583565 | Generation and use of trained file classifiers for malware detection | Apr 30, 2017 | Issued |
Array
(
[id] => 13821237
[patent_doc_number] => 10187407
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-22
[patent_title] => Collaborative phishing attack detection
[patent_app_type] => utility
[patent_app_number] => 15/583970
[patent_app_country] => US
[patent_app_date] => 2017-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7160
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 473
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15583970
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/583970 | Collaborative phishing attack detection | Apr 30, 2017 | Issued |
Array
(
[id] => 14319267
[patent_doc_number] => 20190149337
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-16
[patent_title] => IMPLEMENTING LOGIC GATE FUNCTIONALITY USING A BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 16/097546
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17434
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16097546
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/097546 | IMPLEMENTING LOGIC GATE FUNCTIONALITY USING A BLOCKCHAIN | Apr 27, 2017 | Pending |