
Gary S. Gracia
Examiner (ID: 13531, Phone: (571)270-5192 , Office: P/2491 )
| Most Active Art Unit | 2491 |
| Art Unit(s) | 2491, 2499 |
| Total Applications | 887 |
| Issued Applications | 676 |
| Pending Applications | 71 |
| Abandoned Applications | 161 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13572453
[patent_doc_number] => 20180337774
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => PRIVATE KEY DECRYPTION SYSTEM AND METHOD OF USE
[patent_app_type] => utility
[patent_app_number] => 16/034716
[patent_app_country] => US
[patent_app_date] => 2018-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6431
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16034716
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/034716 | Private key decryption system and method of use | Jul 12, 2018 | Issued |
Array
(
[id] => 15871329
[patent_doc_number] => 20200143068
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => METHOD FOR AUTHORIZING FIELD VALUE OF FORM FIELD BY MEANS OF THIRD PARTY FIELD
[patent_app_type] => utility
[patent_app_number] => 16/630412
[patent_app_country] => US
[patent_app_date] => 2018-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8173
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16630412
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/630412 | Method for authorizing field value of form field by means of third party field | Jul 9, 2018 | Issued |
Array
(
[id] => 13530361
[patent_doc_number] => 20180316723
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => EFFICIENT USE OF IPSEC TUNNELS IN MULTI-PATH ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 16/028106
[patent_app_country] => US
[patent_app_date] => 2018-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7206
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16028106
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/028106 | Efficient use of IPsec tunnels in multi-path environment | Jul 4, 2018 | Issued |
Array
(
[id] => 13544843
[patent_doc_number] => 20180323968
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-08
[patent_title] => Physically Unclonable Function Circuits and Methods of Performing Key Enrollment in Physically Unclonable Function Circuits
[patent_app_type] => utility
[patent_app_number] => 16/023626
[patent_app_country] => US
[patent_app_date] => 2018-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8717
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16023626
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/023626 | Physically unclonable function circuits and methods of performing key enrollment in physically unclonable function circuits | Jun 28, 2018 | Issued |
Array
(
[id] => 13516407
[patent_doc_number] => 20180309746
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-25
[patent_title] => TECHNOLOGIES FOR TOKEN-BASED AUTHENTICATION AND AUTHORIZATION OF DISTRIBUTED COMPUTING RESOURCES
[patent_app_type] => utility
[patent_app_number] => 16/010869
[patent_app_country] => US
[patent_app_date] => 2018-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12185
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16010869
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/010869 | Technologies for token-based authentication and authorization of distributed computing resources | Jun 17, 2018 | Issued |
Array
(
[id] => 15261629
[patent_doc_number] => 20190379548
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING CERTIFICATES
[patent_app_type] => utility
[patent_app_number] => 16/001600
[patent_app_country] => US
[patent_app_date] => 2018-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13908
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 74
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16001600
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/001600 | Method and system for reduced V2X receiver processing load using certificates | Jun 5, 2018 | Issued |
Array
(
[id] => 17327416
[patent_doc_number] => 11218448
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-04
[patent_title] => Aggregating alerts of malicious events for computer security
[patent_app_type] => utility
[patent_app_number] => 16/000779
[patent_app_country] => US
[patent_app_date] => 2018-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7637
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16000779
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/000779 | Aggregating alerts of malicious events for computer security | Jun 4, 2018 | Issued |
Array
(
[id] => 15220177
[patent_doc_number] => 20190372775
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => AUTHENTICATION IN DISTRIBUTION SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 15/991574
[patent_app_country] => US
[patent_app_date] => 2018-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8423
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15991574
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/991574 | Authentication in distribution systems | May 28, 2018 | Issued |
Array
(
[id] => 13437429
[patent_doc_number] => 20180270257
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-20
[patent_title] => Dectection of invalid port accesses in port-scrambling-based networks
[patent_app_type] => utility
[patent_app_number] => 15/980719
[patent_app_country] => US
[patent_app_date] => 2018-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6068
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15980719
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/980719 | Detection of invalid port accesses in port-scrambling-based networks | May 14, 2018 | Issued |
Array
(
[id] => 17574975
[patent_doc_number] => 11323257
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-03
[patent_title] => Encryption of beacons
[patent_app_type] => utility
[patent_app_number] => 16/610109
[patent_app_country] => US
[patent_app_date] => 2018-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6056
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16610109
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/610109 | Encryption of beacons | Apr 26, 2018 | Issued |
Array
(
[id] => 16279170
[patent_doc_number] => 10762201
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-01
[patent_title] => Apparatus and method for conducting endpoint-network-monitoring
[patent_app_type] => utility
[patent_app_number] => 15/959037
[patent_app_country] => US
[patent_app_date] => 2018-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 14743
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 324
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15959037
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/959037 | Apparatus and method for conducting endpoint-network-monitoring | Apr 19, 2018 | Issued |
Array
(
[id] => 16880156
[patent_doc_number] => 11030306
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-08
[patent_title] => Method for executing a program intended to be interpreted by a virtual machine protected against fault injection attacks
[patent_app_type] => utility
[patent_app_number] => 15/957855
[patent_app_country] => US
[patent_app_date] => 2018-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 5776
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15957855
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/957855 | Method for executing a program intended to be interpreted by a virtual machine protected against fault injection attacks | Apr 18, 2018 | Issued |
Array
(
[id] => 16187876
[patent_doc_number] => 10721223
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-21
[patent_title] => Method and apparatus for secure device provisioning in an industrial control system
[patent_app_type] => utility
[patent_app_number] => 15/951464
[patent_app_country] => US
[patent_app_date] => 2018-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5234
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15951464
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/951464 | Method and apparatus for secure device provisioning in an industrial control system | Apr 11, 2018 | Issued |
Array
(
[id] => 16331111
[patent_doc_number] => 20200302077
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-24
[patent_title] => SYSTEM AND METHOD FOR SECURING ACCESS TO ELECTRONIC DATA
[patent_app_type] => utility
[patent_app_number] => 16/646807
[patent_app_country] => US
[patent_app_date] => 2018-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11278
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16646807
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/646807 | SYSTEM AND METHOD FOR SECURING ACCESS TO ELECTRONIC DATA | Apr 6, 2018 | Abandoned |
Array
(
[id] => 17631623
[patent_doc_number] => 20220166638
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-26
[patent_title] => Securing Distributed Elements Connected To A Network with Addressable Physically Unclonable Functions
[patent_app_type] => utility
[patent_app_number] => 16/494100
[patent_app_country] => US
[patent_app_date] => 2018-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7182
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16494100
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/494100 | Securing distributed elements connected to a network with addressable physically unclonable functions | Mar 29, 2018 | Issued |
Array
(
[id] => 14941037
[patent_doc_number] => 20190306157
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-03
[patent_title] => AUTHENTICATING AND AUTHORIZING USERS WITH JWT AND TOKENIZATION
[patent_app_type] => utility
[patent_app_number] => 15/942266
[patent_app_country] => US
[patent_app_date] => 2018-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5873
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15942266
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/942266 | Authenticating and authorizing users with JWT and tokenization | Mar 29, 2018 | Issued |
Array
(
[id] => 16737911
[patent_doc_number] => 10963564
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-30
[patent_title] => Selection of restore point based on detection of malware attack
[patent_app_type] => utility
[patent_app_number] => 15/942009
[patent_app_country] => US
[patent_app_date] => 2018-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 11347
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15942009
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/942009 | Selection of restore point based on detection of malware attack | Mar 29, 2018 | Issued |
Array
(
[id] => 14544303
[patent_doc_number] => 20190207773
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-07-04
[patent_title] => SELF DESCRIBING DATA PACKETS GENERATED AT AN ISSUING INSTRUMENT
[patent_app_type] => utility
[patent_app_number] => 15/940645
[patent_app_country] => US
[patent_app_date] => 2018-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 50921
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15940645
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/940645 | Self describing data packets generated at an issuing instrument | Mar 28, 2018 | Issued |
Array
(
[id] => 17064166
[patent_doc_number] => 11108787
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-08-31
[patent_title] => Securing a network device by forecasting an attack event using a recurrent neural network
[patent_app_type] => utility
[patent_app_number] => 15/940571
[patent_app_country] => US
[patent_app_date] => 2018-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6063
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15940571
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/940571 | Securing a network device by forecasting an attack event using a recurrent neural network | Mar 28, 2018 | Issued |
Array
(
[id] => 16669538
[patent_doc_number] => 10938804
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-02
[patent_title] => Method for operating a field device of automation technology and an operating unit for carrying out the method
[patent_app_type] => utility
[patent_app_number] => 15/938203
[patent_app_country] => US
[patent_app_date] => 2018-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4840
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15938203
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/938203 | Method for operating a field device of automation technology and an operating unit for carrying out the method | Mar 27, 2018 | Issued |