
Fred A. Silverberg
Examiner (ID: 4845)
| Most Active Art Unit | 3205 |
| Art Unit(s) | 3204, 3202, 3206, 3205, 3101, 2899 |
| Total Applications | 650 |
| Issued Applications | 580 |
| Pending Applications | 0 |
| Abandoned Applications | 70 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11747453
[patent_doc_number] => 20170201526
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-13
[patent_title] => 'System and method for protecting sections inside a file'
[patent_app_type] => utility
[patent_app_number] => 14/941618
[patent_app_country] => US
[patent_app_date] => 2015-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1676
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14941618
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/941618 | System and method for protecting sections inside a file | Nov 14, 2015 | Abandoned |
Array
(
[id] => 11607051
[patent_doc_number] => 20170124354
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-04
[patent_title] => 'INTEGRATED CIRCUIT LIFECYCLE SECURITY WITH REDUNDANT AND OVERLAPPING CROSSCHECKS'
[patent_app_type] => utility
[patent_app_number] => 14/930194
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8213
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14930194
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/930194 | Integrated circuit lifecycle security with redundant and overlapping crosschecks | Nov 1, 2015 | Issued |
Array
(
[id] => 11477011
[patent_doc_number] => 20170063794
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'Creating and Using Remote Device Management Attribute Rule Data Store'
[patent_app_type] => utility
[patent_app_number] => 14/929405
[patent_app_country] => US
[patent_app_date] => 2015-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 29
[patent_no_of_words] => 29386
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929405
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/929405 | Creating and using remote device management attribute rule data store | Oct 31, 2015 | Issued |
Array
(
[id] => 11477124
[patent_doc_number] => 20170063907
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'Multi-Stage Network Security Threat Detection'
[patent_app_type] => utility
[patent_app_number] => 14/929047
[patent_app_country] => US
[patent_app_date] => 2015-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 116
[patent_figures_cnt] => 116
[patent_no_of_words] => 76400
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929047
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/929047 | Multi-Stage Network Security Threat Detection | Oct 29, 2015 | Abandoned |
Array
(
[id] => 15017451
[patent_doc_number] => 10454900
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Remote authentication and passwordless password reset
[patent_app_type] => utility
[patent_app_number] => 14/866217
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8511
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866217
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866217 | Remote authentication and passwordless password reset | Sep 24, 2015 | Issued |
Array
(
[id] => 14330897
[patent_doc_number] => 10296467
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-21
[patent_title] => Securing writes to memory modules having memory controllers
[patent_app_type] => utility
[patent_app_number] => 14/865675
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3268
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865675
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/865675 | Securing writes to memory modules having memory controllers | Sep 24, 2015 | Issued |
Array
(
[id] => 10803791
[patent_doc_number] => 20160149948
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'Automated Cyber Threat Mitigation Coordinator'
[patent_app_type] => utility
[patent_app_number] => 14/866198
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2721
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866198
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866198 | Automated Cyber Threat Mitigation Coordinator | Sep 24, 2015 | Abandoned |
Array
(
[id] => 15017585
[patent_doc_number] => 10454967
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-22
[patent_title] => Clustering computer security attacks by threat actor based on attack features
[patent_app_type] => utility
[patent_app_number] => 14/865451
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 4866
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865451
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/865451 | Clustering computer security attacks by threat actor based on attack features | Sep 24, 2015 | Issued |
Array
(
[id] => 15430117
[patent_doc_number] => 10548006
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-28
[patent_title] => System and method for authorizing a subscriber device
[patent_app_type] => utility
[patent_app_number] => 14/866088
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4107
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866088
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866088 | System and method for authorizing a subscriber device | Sep 24, 2015 | Issued |
Array
(
[id] => 11533607
[patent_doc_number] => 20170093586
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'TECHNIQUES FOR MANAGING CERTIFICATES ON A COMPUTING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/865448
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16179
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865448
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/865448 | TECHNIQUES FOR MANAGING CERTIFICATES ON A COMPUTING DEVICE | Sep 24, 2015 | Abandoned |
Array
(
[id] => 11533849
[patent_doc_number] => 20170093829
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'CUMULATIVE AUTHENTICATION FOR STEP-UP INCREASED AUTHENTICATION FACTORS'
[patent_app_type] => utility
[patent_app_number] => 14/866043
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7710
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866043
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866043 | Cumulative authentication for step-up increased authentication factors | Sep 24, 2015 | Issued |
Array
(
[id] => 11531489
[patent_doc_number] => 20170091467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'PROVABLE TRACEABILITY'
[patent_app_type] => utility
[patent_app_number] => 14/866470
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12344
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866470
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866470 | Provable traceability | Sep 24, 2015 | Issued |
Array
(
[id] => 11531482
[patent_doc_number] => 20170091460
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'COMPUTER SYSTEM FOR DISCOVERY OF VULNERABILITIES IN APPLICATIONS INCLUDING GUIDED TESTER PATHS BASED ON APPLICATION COVERAGE MEASURES'
[patent_app_type] => utility
[patent_app_number] => 14/866332
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8108
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866332
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866332 | Computer system for discovery of vulnerabilities in applications including guided tester paths based on application coverage measures | Sep 24, 2015 | Issued |
Array
(
[id] => 11533848
[patent_doc_number] => 20170093828
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'SYSTEM AND METHOD FOR DETECTING WHETHER AUTOMATIC LOGIN TO A WEBSITE HAS SUCCEEDED'
[patent_app_type] => utility
[patent_app_number] => 14/865881
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7107
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865881
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/865881 | SYSTEM AND METHOD FOR DETECTING WHETHER AUTOMATIC LOGIN TO A WEBSITE HAS SUCCEEDED | Sep 24, 2015 | Abandoned |
Array
(
[id] => 18840851
[patent_doc_number] => 11848940
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-19
[patent_title] => Cumulative trajectory of cyber reconnaissance indicators
[patent_app_type] => utility
[patent_app_number] => 14/839327
[patent_app_country] => US
[patent_app_date] => 2015-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5865
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 762
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14839327
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/839327 | Cumulative trajectory of cyber reconnaissance indicators | Aug 27, 2015 | Issued |
Array
(
[id] => 10465150
[patent_doc_number] => 20150350165
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'SYSTEM AND METHOD FOR DYNAMICALLY ALLOCATING RESOURCES'
[patent_app_type] => utility
[patent_app_number] => 14/823591
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4851
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823591
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823591 | SYSTEM AND METHOD FOR DYNAMICALLY ALLOCATING RESOURCES | Aug 10, 2015 | Abandoned |
Array
(
[id] => 12741787
[patent_doc_number] => 20180139096
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-17
[patent_title] => COMPOSITION CONSTRAINTS FOR NETWORK POLICIES
[patent_app_type] => utility
[patent_app_number] => 15/574270
[patent_app_country] => US
[patent_app_date] => 2015-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6616
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15574270
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/574270 | COMPOSITION CONSTRAINTS FOR NETWORK POLICIES | May 14, 2015 | Abandoned |
Array
(
[id] => 13270011
[patent_doc_number] => 10147092
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => System and method for signing and authenticating secure transactions through a communications network
[patent_app_type] => utility
[patent_app_number] => 14/390497
[patent_app_country] => US
[patent_app_date] => 2012-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 3298
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 849
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14390497
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/390497 | System and method for signing and authenticating secure transactions through a communications network | Apr 2, 2012 | Issued |