Search

Fred A. Silverberg

Examiner (ID: 4845)

Most Active Art Unit
3205
Art Unit(s)
3204, 3202, 3206, 3205, 3101, 2899
Total Applications
650
Issued Applications
580
Pending Applications
0
Abandoned Applications
70

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11747453 [patent_doc_number] => 20170201526 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-13 [patent_title] => 'System and method for protecting sections inside a file' [patent_app_type] => utility [patent_app_number] => 14/941618 [patent_app_country] => US [patent_app_date] => 2015-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 1676 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14941618 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/941618
System and method for protecting sections inside a file Nov 14, 2015 Abandoned
Array ( [id] => 11607051 [patent_doc_number] => 20170124354 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-05-04 [patent_title] => 'INTEGRATED CIRCUIT LIFECYCLE SECURITY WITH REDUNDANT AND OVERLAPPING CROSSCHECKS' [patent_app_type] => utility [patent_app_number] => 14/930194 [patent_app_country] => US [patent_app_date] => 2015-11-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8213 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14930194 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/930194
Integrated circuit lifecycle security with redundant and overlapping crosschecks Nov 1, 2015 Issued
Array ( [id] => 11477011 [patent_doc_number] => 20170063794 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-02 [patent_title] => 'Creating and Using Remote Device Management Attribute Rule Data Store' [patent_app_type] => utility [patent_app_number] => 14/929405 [patent_app_country] => US [patent_app_date] => 2015-11-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 29 [patent_figures_cnt] => 29 [patent_no_of_words] => 29386 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929405 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/929405
Creating and using remote device management attribute rule data store Oct 31, 2015 Issued
Array ( [id] => 11477124 [patent_doc_number] => 20170063907 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-02 [patent_title] => 'Multi-Stage Network Security Threat Detection' [patent_app_type] => utility [patent_app_number] => 14/929047 [patent_app_country] => US [patent_app_date] => 2015-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 116 [patent_figures_cnt] => 116 [patent_no_of_words] => 76400 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929047 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/929047
Multi-Stage Network Security Threat Detection Oct 29, 2015 Abandoned
Array ( [id] => 15017451 [patent_doc_number] => 10454900 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-22 [patent_title] => Remote authentication and passwordless password reset [patent_app_type] => utility [patent_app_number] => 14/866217 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8511 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 144 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866217 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/866217
Remote authentication and passwordless password reset Sep 24, 2015 Issued
Array ( [id] => 14330897 [patent_doc_number] => 10296467 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-21 [patent_title] => Securing writes to memory modules having memory controllers [patent_app_type] => utility [patent_app_number] => 14/865675 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3268 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865675 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/865675
Securing writes to memory modules having memory controllers Sep 24, 2015 Issued
Array ( [id] => 10803791 [patent_doc_number] => 20160149948 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-26 [patent_title] => 'Automated Cyber Threat Mitigation Coordinator' [patent_app_type] => utility [patent_app_number] => 14/866198 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2721 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866198 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/866198
Automated Cyber Threat Mitigation Coordinator Sep 24, 2015 Abandoned
Array ( [id] => 15017585 [patent_doc_number] => 10454967 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-10-22 [patent_title] => Clustering computer security attacks by threat actor based on attack features [patent_app_type] => utility [patent_app_number] => 14/865451 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 4866 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865451 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/865451
Clustering computer security attacks by threat actor based on attack features Sep 24, 2015 Issued
Array ( [id] => 15430117 [patent_doc_number] => 10548006 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-01-28 [patent_title] => System and method for authorizing a subscriber device [patent_app_type] => utility [patent_app_number] => 14/866088 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4107 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866088 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/866088
System and method for authorizing a subscriber device Sep 24, 2015 Issued
Array ( [id] => 11533607 [patent_doc_number] => 20170093586 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-30 [patent_title] => 'TECHNIQUES FOR MANAGING CERTIFICATES ON A COMPUTING DEVICE' [patent_app_type] => utility [patent_app_number] => 14/865448 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 16179 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865448 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/865448
TECHNIQUES FOR MANAGING CERTIFICATES ON A COMPUTING DEVICE Sep 24, 2015 Abandoned
Array ( [id] => 11533849 [patent_doc_number] => 20170093829 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-30 [patent_title] => 'CUMULATIVE AUTHENTICATION FOR STEP-UP INCREASED AUTHENTICATION FACTORS' [patent_app_type] => utility [patent_app_number] => 14/866043 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7710 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866043 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/866043
Cumulative authentication for step-up increased authentication factors Sep 24, 2015 Issued
Array ( [id] => 11531489 [patent_doc_number] => 20170091467 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-30 [patent_title] => 'PROVABLE TRACEABILITY' [patent_app_type] => utility [patent_app_number] => 14/866470 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 12344 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866470 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/866470
Provable traceability Sep 24, 2015 Issued
Array ( [id] => 11531482 [patent_doc_number] => 20170091460 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-30 [patent_title] => 'COMPUTER SYSTEM FOR DISCOVERY OF VULNERABILITIES IN APPLICATIONS INCLUDING GUIDED TESTER PATHS BASED ON APPLICATION COVERAGE MEASURES' [patent_app_type] => utility [patent_app_number] => 14/866332 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8108 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866332 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/866332
Computer system for discovery of vulnerabilities in applications including guided tester paths based on application coverage measures Sep 24, 2015 Issued
Array ( [id] => 11533848 [patent_doc_number] => 20170093828 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-30 [patent_title] => 'SYSTEM AND METHOD FOR DETECTING WHETHER AUTOMATIC LOGIN TO A WEBSITE HAS SUCCEEDED' [patent_app_type] => utility [patent_app_number] => 14/865881 [patent_app_country] => US [patent_app_date] => 2015-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7107 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865881 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/865881
SYSTEM AND METHOD FOR DETECTING WHETHER AUTOMATIC LOGIN TO A WEBSITE HAS SUCCEEDED Sep 24, 2015 Abandoned
Array ( [id] => 18840851 [patent_doc_number] => 11848940 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-12-19 [patent_title] => Cumulative trajectory of cyber reconnaissance indicators [patent_app_type] => utility [patent_app_number] => 14/839327 [patent_app_country] => US [patent_app_date] => 2015-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5865 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 762 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14839327 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/839327
Cumulative trajectory of cyber reconnaissance indicators Aug 27, 2015 Issued
Array ( [id] => 10465150 [patent_doc_number] => 20150350165 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'SYSTEM AND METHOD FOR DYNAMICALLY ALLOCATING RESOURCES' [patent_app_type] => utility [patent_app_number] => 14/823591 [patent_app_country] => US [patent_app_date] => 2015-08-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4851 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823591 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/823591
SYSTEM AND METHOD FOR DYNAMICALLY ALLOCATING RESOURCES Aug 10, 2015 Abandoned
Array ( [id] => 12741787 [patent_doc_number] => 20180139096 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-17 [patent_title] => COMPOSITION CONSTRAINTS FOR NETWORK POLICIES [patent_app_type] => utility [patent_app_number] => 15/574270 [patent_app_country] => US [patent_app_date] => 2015-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6616 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 78 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15574270 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/574270
COMPOSITION CONSTRAINTS FOR NETWORK POLICIES May 14, 2015 Abandoned
Array ( [id] => 13270011 [patent_doc_number] => 10147092 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-12-04 [patent_title] => System and method for signing and authenticating secure transactions through a communications network [patent_app_type] => utility [patent_app_number] => 14/390497 [patent_app_country] => US [patent_app_date] => 2012-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 6 [patent_no_of_words] => 3298 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 849 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14390497 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/390497
System and method for signing and authenticating secure transactions through a communications network Apr 2, 2012 Issued
Menu