
Fred A. Silverberg
Examiner (ID: 4845)
| Most Active Art Unit | 3205 |
| Art Unit(s) | 3204, 3202, 3206, 3205, 3101, 2899 |
| Total Applications | 650 |
| Issued Applications | 580 |
| Pending Applications | 0 |
| Abandoned Applications | 70 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11440311
[patent_doc_number] => 20170041332
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'DOMAIN CLASSIFICATION BASED ON DOMAIN NAME SYSTEM (DNS) TRAFFIC'
[patent_app_type] => utility
[patent_app_number] => 15/226242
[patent_app_country] => US
[patent_app_date] => 2016-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 17617
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15226242
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/226242 | DOMAIN CLASSIFICATION BASED ON DOMAIN NAME SYSTEM (DNS) TRAFFIC | Aug 1, 2016 | Abandoned |
Array
(
[id] => 11438340
[patent_doc_number] => 20170039361
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'Method And Device For Fuzzily Inputting Password'
[patent_app_type] => utility
[patent_app_number] => 15/225125
[patent_app_country] => US
[patent_app_date] => 2016-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6695
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15225125
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/225125 | Method And Device For Fuzzily Inputting Password | Jul 31, 2016 | Abandoned |
Array
(
[id] => 11426039
[patent_doc_number] => 20170034185
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'Systems and Methods for Identifying Electronic Messages Containing Malicious Content'
[patent_app_type] => utility
[patent_app_number] => 15/223715
[patent_app_country] => US
[patent_app_date] => 2016-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8158
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15223715
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/223715 | Systems and methods for identifying electronic messages containing malicious content | Jul 28, 2016 | Issued |
Array
(
[id] => 11711830
[patent_doc_number] => 20170180329
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'RECEIVING APPARATUS AND PACKET PROCESSING METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 15/203445
[patent_app_country] => US
[patent_app_date] => 2016-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4273
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15203445
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/203445 | Receiving apparatus and packet processing method thereof | Jul 5, 2016 | Issued |
Array
(
[id] => 14642983
[patent_doc_number] => 10366236
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-30
[patent_title] => Software analysis system, software analysis method, and software analysis program
[patent_app_type] => utility
[patent_app_number] => 15/574199
[patent_app_country] => US
[patent_app_date] => 2016-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 7998
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 288
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15574199
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/574199 | Software analysis system, software analysis method, and software analysis program | Jul 4, 2016 | Issued |
Array
(
[id] => 12128451
[patent_doc_number] => 20180012037
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-11
[patent_title] => 'SECURE OPERATION APPARATUSES AND METHODS THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 15/202060
[patent_app_country] => US
[patent_app_date] => 2016-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5558
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15202060
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/202060 | SECURE OPERATION APPARATUSES AND METHODS THEREFOR | Jul 4, 2016 | Abandoned |
Array
(
[id] => 12123237
[patent_doc_number] => 20180006823
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'MULTI-HOP SECURE CONTENT ROUTING BASED ON CRYPTOGRAPHIC PARTIAL BLIND SIGNATURES AND EMBEDDED TERMS'
[patent_app_type] => utility
[patent_app_number] => 15/200870
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8123
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15200870
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/200870 | MULTI-HOP SECURE CONTENT ROUTING BASED ON CRYPTOGRAPHIC PARTIAL BLIND SIGNATURES AND EMBEDDED TERMS | Jun 30, 2016 | Abandoned |
Array
(
[id] => 12123484
[patent_doc_number] => 20180007070
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'STRING SIMILARITY SCORE'
[patent_app_type] => utility
[patent_app_number] => 15/201077
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6346
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201077
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201077 | STRING SIMILARITY SCORE | Jun 30, 2016 | Abandoned |
Array
(
[id] => 15854935
[patent_doc_number] => 10642753
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-05-05
[patent_title] => System and method for protecting a software component running in virtual machine using a virtualization layer
[patent_app_type] => utility
[patent_app_number] => 15/199876
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 13333
[patent_no_of_claims] => 49
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15199876
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/199876 | System and method for protecting a software component running in virtual machine using a virtualization layer | Jun 29, 2016 | Issued |
Array
(
[id] => 15486471
[patent_doc_number] => 10558586
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-11
[patent_title] => Shippable storage device for executing applications and securely storing data
[patent_app_type] => utility
[patent_app_number] => 15/194074
[patent_app_country] => US
[patent_app_date] => 2016-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12532
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15194074
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/194074 | Shippable storage device for executing applications and securely storing data | Jun 26, 2016 | Issued |
Array
(
[id] => 13711255
[patent_doc_number] => 20170366582
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-21
[patent_title] => Incident Response Plan based on Indicators of Compromise
[patent_app_type] => utility
[patent_app_number] => 15/188281
[patent_app_country] => US
[patent_app_date] => 2016-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11079
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15188281
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/188281 | Incident response plan based on indicators of compromise | Jun 20, 2016 | Issued |
Array
(
[id] => 13696703
[patent_doc_number] => 20170359306
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => NETWORK SECURITY
[patent_app_type] => utility
[patent_app_number] => 15/179547
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 37845
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15179547
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/179547 | Network security | Jun 9, 2016 | Issued |
Array
(
[id] => 14705195
[patent_doc_number] => 10380347
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-13
[patent_title] => Hierarchical runtime analysis framework for defining vulnerabilities
[patent_app_type] => utility
[patent_app_number] => 15/177017
[patent_app_country] => US
[patent_app_date] => 2016-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12197
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15177017
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/177017 | Hierarchical runtime analysis framework for defining vulnerabilities | Jun 7, 2016 | Issued |
Array
(
[id] => 12096376
[patent_doc_number] => 20170353469
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'Search-Page Profile'
[patent_app_type] => utility
[patent_app_number] => 15/173131
[patent_app_country] => US
[patent_app_date] => 2016-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 20773
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15173131
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/173131 | Search-Page Profile | Jun 2, 2016 | Abandoned |
Array
(
[id] => 12736390
[patent_doc_number] => 20180137297
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-17
[patent_title] => SECURITY SYSTEM FOR INDUSTRIAL CONTROL SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/574282
[patent_app_country] => US
[patent_app_date] => 2016-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4772
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15574282
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/574282 | SECURITY SYSTEM FOR INDUSTRIAL CONTROL SYSTEM | Jun 2, 2016 | Abandoned |
Array
(
[id] => 11329246
[patent_doc_number] => 20160359858
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'METHOD FOR SECURING ELECTRONIC DATA BY RESTRICTING ACCESS AND TRANSMISSION OF THE DATA'
[patent_app_type] => utility
[patent_app_number] => 15/170048
[patent_app_country] => US
[patent_app_date] => 2016-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7460
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15170048
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/170048 | Method for securing electronic data by restricting access and transmission of the data | May 31, 2016 | Issued |
Array
(
[id] => 14269961
[patent_doc_number] => 10284560
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Secure unmanned vehicle operation and communication
[patent_app_type] => utility
[patent_app_number] => 15/170817
[patent_app_country] => US
[patent_app_date] => 2016-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5521
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 278
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15170817
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/170817 | Secure unmanned vehicle operation and communication | May 31, 2016 | Issued |
Array
(
[id] => 14957509
[patent_doc_number] => 10440042
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-08
[patent_title] => Domain feature classification and autonomous system vulnerability scanning
[patent_app_type] => utility
[patent_app_number] => 15/158253
[patent_app_country] => US
[patent_app_date] => 2016-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10785
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 565
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15158253
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/158253 | Domain feature classification and autonomous system vulnerability scanning | May 17, 2016 | Issued |
Array
(
[id] => 15378053
[patent_doc_number] => 10530762
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-07
[patent_title] => Electing whether to unify passcodes
[patent_app_type] => utility
[patent_app_number] => 15/156415
[patent_app_country] => US
[patent_app_date] => 2016-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 15845
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 621
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15156415
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/156415 | Electing whether to unify passcodes | May 16, 2016 | Issued |
Array
(
[id] => 15141669
[patent_doc_number] => 10484336
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-19
[patent_title] => Systems and methods for a unique mechanism of providing 'clientless SSLVPN' access to a variety of web-applications through a SSLVPN gateway
[patent_app_type] => utility
[patent_app_number] => 15/154227
[patent_app_country] => US
[patent_app_date] => 2016-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 27
[patent_no_of_words] => 51596
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15154227
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/154227 | Systems and methods for a unique mechanism of providing 'clientless SSLVPN' access to a variety of web-applications through a SSLVPN gateway | May 12, 2016 | Issued |