
Dennis Haszko
Examiner (ID: 3114)
| Most Active Art Unit | 2102 |
| Art Unit(s) | 2102 |
| Total Applications | 235 |
| Issued Applications | 204 |
| Pending Applications | 0 |
| Abandoned Applications | 31 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18951802
[patent_doc_number] => 11895113
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-06
[patent_title] => Collaborative risk aware authentication
[patent_app_type] => utility
[patent_app_number] => 17/291090
[patent_app_country] => US
[patent_app_date] => 2019-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 25838
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17291090
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/291090 | Collaborative risk aware authentication | Aug 29, 2019 | Issued |
Array
(
[id] => 17804029
[patent_doc_number] => 11418346
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-16
[patent_title] => System and method for recognition of biometric information in shared vehicle
[patent_app_type] => utility
[patent_app_number] => 16/557142
[patent_app_country] => US
[patent_app_date] => 2019-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 11403
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16557142
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/557142 | System and method for recognition of biometric information in shared vehicle | Aug 29, 2019 | Issued |
Array
(
[id] => 17245840
[patent_doc_number] => 20210365584
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-25
[patent_title] => PORTABLE REPUTATION BROKERING USING LINKED BLOCKCHAINS AND SHARED EVENTS
[patent_app_type] => utility
[patent_app_number] => 17/271485
[patent_app_country] => US
[patent_app_date] => 2019-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14370
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17271485
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/271485 | Portable reputation brokering using linked blockchains and shared events | Aug 27, 2019 | Issued |
Array
(
[id] => 16987463
[patent_doc_number] => 11074639
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-27
[patent_title] => Cloud-based item storage system
[patent_app_type] => utility
[patent_app_number] => 16/541339
[patent_app_country] => US
[patent_app_date] => 2019-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8938
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16541339
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/541339 | Cloud-based item storage system | Aug 14, 2019 | Issued |
Array
(
[id] => 15215581
[patent_doc_number] => 20190370477
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => Systems & Methods for Automated Threat Model Generation from Third Party Diagram Files
[patent_app_type] => utility
[patent_app_number] => 16/542263
[patent_app_country] => US
[patent_app_date] => 2019-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 25127
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16542263
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/542263 | Systems and methods for automated threat model generation from third party diagram files | Aug 14, 2019 | Issued |
Array
(
[id] => 16758831
[patent_doc_number] => 10977382
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-13
[patent_title] => Storing data from a sensor device into a neighboring device
[patent_app_type] => utility
[patent_app_number] => 16/536949
[patent_app_country] => US
[patent_app_date] => 2019-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6708
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16536949
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/536949 | Storing data from a sensor device into a neighboring device | Aug 8, 2019 | Issued |
Array
(
[id] => 16945136
[patent_doc_number] => 11057397
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-06
[patent_title] => Computerized system for complying with certain critical infrastructure protection requirements
[patent_app_type] => utility
[patent_app_number] => 16/531843
[patent_app_country] => US
[patent_app_date] => 2019-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 4120
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16531843
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/531843 | Computerized system for complying with certain critical infrastructure protection requirements | Aug 4, 2019 | Issued |
Array
(
[id] => 16945136
[patent_doc_number] => 11057397
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-06
[patent_title] => Computerized system for complying with certain critical infrastructure protection requirements
[patent_app_type] => utility
[patent_app_number] => 16/531843
[patent_app_country] => US
[patent_app_date] => 2019-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 4120
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16531843
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/531843 | Computerized system for complying with certain critical infrastructure protection requirements | Aug 4, 2019 | Issued |
Array
(
[id] => 16945136
[patent_doc_number] => 11057397
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-06
[patent_title] => Computerized system for complying with certain critical infrastructure protection requirements
[patent_app_type] => utility
[patent_app_number] => 16/531843
[patent_app_country] => US
[patent_app_date] => 2019-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 4120
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16531843
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/531843 | Computerized system for complying with certain critical infrastructure protection requirements | Aug 4, 2019 | Issued |
Array
(
[id] => 16945136
[patent_doc_number] => 11057397
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-06
[patent_title] => Computerized system for complying with certain critical infrastructure protection requirements
[patent_app_type] => utility
[patent_app_number] => 16/531843
[patent_app_country] => US
[patent_app_date] => 2019-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 4120
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16531843
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/531843 | Computerized system for complying with certain critical infrastructure protection requirements | Aug 4, 2019 | Issued |
Array
(
[id] => 15156435
[patent_doc_number] => 20190356695
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => METHOD AND APPARATUS FOR DECRYPTION OF ENCRYPTED SSL DATA FROM PACKET TRACES
[patent_app_type] => utility
[patent_app_number] => 16/530529
[patent_app_country] => US
[patent_app_date] => 2019-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2602
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16530529
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/530529 | Method and apparatus for decryption of encrypted SSL data from packet traces | Aug 1, 2019 | Issued |
Array
(
[id] => 16616080
[patent_doc_number] => 20210034733
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-04
[patent_title] => Runtime Device Firmware Verification Using Trust Chaining
[patent_app_type] => utility
[patent_app_number] => 16/526467
[patent_app_country] => US
[patent_app_date] => 2019-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7145
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16526467
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/526467 | Runtime device firmware verification using trust chaining | Jul 29, 2019 | Issued |
Array
(
[id] => 18609108
[patent_doc_number] => 11750598
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-09-05
[patent_title] => Multi-legged network attribution using tracking tokens and attribution stack
[patent_app_type] => utility
[patent_app_number] => 16/517004
[patent_app_country] => US
[patent_app_date] => 2019-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 14064
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517004
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/517004 | Multi-legged network attribution using tracking tokens and attribution stack | Jul 18, 2019 | Issued |
Array
(
[id] => 15095063
[patent_doc_number] => 20190342343
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-07
[patent_title] => CYBER RISK ANALYSIS AND REMEDIATION USING NETWORK MONITORED SENSORS AND METHODS OF USE
[patent_app_type] => utility
[patent_app_number] => 16/513186
[patent_app_country] => US
[patent_app_date] => 2019-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8440
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16513186
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/513186 | Cyber risk analysis and remediation using network monitored sensors and methods of use | Jul 15, 2019 | Issued |
Array
(
[id] => 15353289
[patent_doc_number] => 20200014536
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-09
[patent_title] => CRYPTOGRAPHIC KEY SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 16/504945
[patent_app_country] => US
[patent_app_date] => 2019-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5960
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16504945
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/504945 | CRYPTOGRAPHIC KEY SYSTEM AND METHOD | Jul 7, 2019 | Abandoned |
Array
(
[id] => 17701214
[patent_doc_number] => 11374951
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-28
[patent_title] => Threat mitigation system and method
[patent_app_type] => utility
[patent_app_number] => 16/433006
[patent_app_country] => US
[patent_app_date] => 2019-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 21145
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 295
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16433006
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/433006 | Threat mitigation system and method | Jun 5, 2019 | Issued |
Array
(
[id] => 17024217
[patent_doc_number] => 20210248088
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-08-12
[patent_title] => CRYPTOGRAPHY MODULE AND METHOD FOR OPERATING SAME
[patent_app_type] => utility
[patent_app_number] => 17/053225
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5722
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17053225
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/053225 | Cryptography module for controlling device | May 21, 2019 | Issued |
Array
(
[id] => 17024217
[patent_doc_number] => 20210248088
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-08-12
[patent_title] => CRYPTOGRAPHY MODULE AND METHOD FOR OPERATING SAME
[patent_app_type] => utility
[patent_app_number] => 17/053225
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5722
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17053225
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/053225 | Cryptography module for controlling device | May 21, 2019 | Issued |
Array
(
[id] => 14782907
[patent_doc_number] => 20190266351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-29
[patent_title] => TECHNOLOGIES FOR PRESENTING PUBLIC AND PRIVATE IMAGES
[patent_app_type] => utility
[patent_app_number] => 16/412845
[patent_app_country] => US
[patent_app_date] => 2019-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13194
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16412845
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/412845 | TECHNOLOGIES FOR PRESENTING PUBLIC AND PRIVATE IMAGES | May 14, 2019 | Abandoned |
Array
(
[id] => 14906299
[patent_doc_number] => 20190296915
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-26
[patent_title] => Method and System for Implementing Automatic Transaction Rebroadcasting for Transient Blockchains
[patent_app_type] => utility
[patent_app_number] => 16/409449
[patent_app_country] => US
[patent_app_date] => 2019-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 31888
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16409449
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/409449 | Method and system for implementing automatic transaction rebroadcasting for transient blockchains | May 9, 2019 | Issued |