
George M. Dombroske
Examiner (ID: 54)
| Most Active Art Unit | 2855 |
| Art Unit(s) | 2605, 2214, 2616, 2855, IPLA |
| Total Applications | 714 |
| Issued Applications | 629 |
| Pending Applications | 43 |
| Abandoned Applications | 47 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13596115
[patent_doc_number] => 20180349606
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => ESCALATION-COMPATIBLE PROCESSING FLOWS FOR ANTI-ABUSE INFRASTRUCTURES
[patent_app_type] => utility
[patent_app_number] => 15/609275
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6114
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15609275
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/609275 | Escalation-compatible processing flows for anti-abuse infrastructures | May 30, 2017 | Issued |
Array
(
[id] => 13600815
[patent_doc_number] => 20180351956
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => INTEGRATED BIOMETRICS FOR APPLICATION SECURITY
[patent_app_type] => utility
[patent_app_number] => 15/610514
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10953
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15610514
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/610514 | Integrated biometrics for application security | May 30, 2017 | Issued |
Array
(
[id] => 12034628
[patent_doc_number] => 20170324727
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-09
[patent_title] => 'Facilitating Network Login'
[patent_app_type] => utility
[patent_app_number] => 15/608268
[patent_app_country] => US
[patent_app_date] => 2017-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 14646
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15608268
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/608268 | Facilitating access to protected content by commonly owned devices of a user | May 29, 2017 | Issued |
Array
(
[id] => 15012837
[patent_doc_number] => 10452564
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Format preserving encryption of object code
[patent_app_type] => utility
[patent_app_number] => 15/496287
[patent_app_country] => US
[patent_app_date] => 2017-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3889
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15496287
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/496287 | Format preserving encryption of object code | Apr 24, 2017 | Issued |
Array
(
[id] => 13097497
[patent_doc_number] => 10068090
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-04
[patent_title] => Systems and methods for detecting undesirable network traffic content
[patent_app_type] => utility
[patent_app_number] => 15/495773
[patent_app_country] => US
[patent_app_date] => 2017-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6800
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 443
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15495773
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/495773 | Systems and methods for detecting undesirable network traffic content | Apr 23, 2017 | Issued |
Array
(
[id] => 11982503
[patent_doc_number] => 20170286657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-05
[patent_title] => 'SECURE STORAGE OF FINGERPRINT RELATED ELEMENTS'
[patent_app_type] => utility
[patent_app_number] => 15/471671
[patent_app_country] => US
[patent_app_date] => 2017-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7711
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15471671
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/471671 | Secure storage of fingerprint related elements | Mar 27, 2017 | Issued |
Array
(
[id] => 14254241
[patent_doc_number] => 10277333
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Techniques for securing body-based communications
[patent_app_type] => utility
[patent_app_number] => 15/463332
[patent_app_country] => US
[patent_app_date] => 2017-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17594
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15463332
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/463332 | Techniques for securing body-based communications | Mar 19, 2017 | Issued |
Array
(
[id] => 11711845
[patent_doc_number] => 20170180344
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'USER AUTHENTICATION OF APPLICATIONS ON THIRD-PARTY DEVICES VIA USER DEVICES'
[patent_app_type] => utility
[patent_app_number] => 15/448521
[patent_app_country] => US
[patent_app_date] => 2017-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7219
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15448521
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/448521 | User authentication of applications on third-party devices via user devices | Mar 1, 2017 | Issued |
Array
(
[id] => 15517569
[patent_doc_number] => 10565373
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-18
[patent_title] => Behavioral analysis of scripting utility usage in an enterprise
[patent_app_type] => utility
[patent_app_number] => 15/437759
[patent_app_country] => US
[patent_app_date] => 2017-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7171
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15437759
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/437759 | Behavioral analysis of scripting utility usage in an enterprise | Feb 20, 2017 | Issued |
Array
(
[id] => 15689755
[patent_doc_number] => 20200099541
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-26
[patent_title] => METHODS OF VERIFYING THAT A FIRST DEVICE AND A SECOND DEVICE ARE PHYSICALLY INTERCONNECTED
[patent_app_type] => utility
[patent_app_number] => 16/471973
[patent_app_country] => US
[patent_app_date] => 2017-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9460
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16471973
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/471973 | Methods of verifying that a first device and a second device are physically interconnected | Feb 9, 2017 | Issued |
Array
(
[id] => 15402743
[patent_doc_number] => 10542039
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-21
[patent_title] => Security against side-channel attack in real-time virtualized networks
[patent_app_type] => utility
[patent_app_number] => 15/427760
[patent_app_country] => US
[patent_app_date] => 2017-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 3889
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15427760
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/427760 | Security against side-channel attack in real-time virtualized networks | Feb 7, 2017 | Issued |
Array
(
[id] => 13336683
[patent_doc_number] => 20180219880
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-02
[patent_title] => Reactive virtual security appliances
[patent_app_type] => utility
[patent_app_number] => 15/418663
[patent_app_country] => US
[patent_app_date] => 2017-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5188
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 52
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15418663
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/418663 | Reactive virtual security appliances | Jan 26, 2017 | Issued |
Array
(
[id] => 12224751
[patent_doc_number] => 20180063110
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'METHODS AND SYSTEMS FOR GENERATING A USER PROFILE'
[patent_app_type] => utility
[patent_app_number] => 15/418650
[patent_app_country] => US
[patent_app_date] => 2017-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10280
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15418650
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/418650 | Methods and systems for generating a user profile | Jan 26, 2017 | Issued |
Array
(
[id] => 11759472
[patent_doc_number] => 20170206341
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-20
[patent_title] => 'STATUTORY LICENSE RESTRICTED DIGITAL MEDIA PLAYBACK ON PORTABLE DEVICES'
[patent_app_type] => utility
[patent_app_number] => 15/391522
[patent_app_country] => US
[patent_app_date] => 2016-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7772
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15391522
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/391522 | Statutory license restricted digital media playback on portable devices | Dec 26, 2016 | Issued |
Array
(
[id] => 13162259
[patent_doc_number] => 10097873
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-09
[patent_title] => Providing remote access to segments of a transmitted program
[patent_app_type] => utility
[patent_app_number] => 15/376155
[patent_app_country] => US
[patent_app_date] => 2016-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4239
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15376155
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/376155 | Providing remote access to segments of a transmitted program | Dec 11, 2016 | Issued |
Array
(
[id] => 11646227
[patent_doc_number] => 09667630
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-30
[patent_title] => 'Authenticating a browser-less data streaming device to a network with an external browser'
[patent_app_type] => utility
[patent_app_number] => 15/280091
[patent_app_country] => US
[patent_app_date] => 2016-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6971
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15280091
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/280091 | Authenticating a browser-less data streaming device to a network with an external browser | Sep 28, 2016 | Issued |
Array
(
[id] => 11518369
[patent_doc_number] => 20170085444
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-23
[patent_title] => 'SYSTEM AND METHOD FOR DYNAMICALLY GROUPING DEVICES BASED ON PRESENT DEVICE CONDITIONS'
[patent_app_type] => utility
[patent_app_number] => 15/275782
[patent_app_country] => US
[patent_app_date] => 2016-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4857
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15275782
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/275782 | System and method for dynamically grouping devices based on present device conditions | Sep 25, 2016 | Issued |
Array
(
[id] => 12264806
[patent_doc_number] => 20180084002
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-22
[patent_title] => 'MALICIOUS HYPERLINK PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 15/270838
[patent_app_country] => US
[patent_app_date] => 2016-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9617
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15270838
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/270838 | MALICIOUS HYPERLINK PROTECTION | Sep 19, 2016 | Abandoned |
Array
(
[id] => 15248785
[patent_doc_number] => 10509918
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-17
[patent_title] => One-time obfuscation for polynomial-size ordered binary decision diagrams (POBDDs)
[patent_app_type] => utility
[patent_app_number] => 15/269367
[patent_app_country] => US
[patent_app_date] => 2016-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6507
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15269367
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/269367 | One-time obfuscation for polynomial-size ordered binary decision diagrams (POBDDs) | Sep 18, 2016 | Issued |
Array
(
[id] => 14736535
[patent_doc_number] => 10387669
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-08-20
[patent_title] => Protecting documents with centralized and discretionary policies
[patent_app_type] => utility
[patent_app_number] => 15/268155
[patent_app_country] => US
[patent_app_date] => 2016-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 34
[patent_no_of_words] => 37029
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 307
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15268155
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/268155 | Protecting documents with centralized and discretionary policies | Sep 15, 2016 | Issued |