Ira S Lazarus
Examiner (ID: 4475)
Most Active Art Unit | 3402 |
Art Unit(s) | 3406, 3743, 3402, 3749, 3401 |
Total Applications | 674 |
Issued Applications | 600 |
Pending Applications | 19 |
Abandoned Applications | 55 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 17788570
[patent_doc_number] => 11411714
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Apparatus and method for performing operation using approximation function
[patent_app_type] => utility
[patent_app_number] => 16/884957
[patent_app_country] => US
[patent_app_date] => 2020-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3488
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884957
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/884957 | Apparatus and method for performing operation using approximation function | May 26, 2020 | Issued |
Array
(
[id] => 16286953
[patent_doc_number] => 20200280555
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-03
[patent_title] => Method and System for Detecting Two-Factor Authentication
[patent_app_type] => utility
[patent_app_number] => 16/877605
[patent_app_country] => US
[patent_app_date] => 2020-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7992
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16877605
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/877605 | Method and system for detecting two-factor authentication | May 18, 2020 | Issued |
Array
(
[id] => 18579759
[patent_doc_number] => 11736304
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-22
[patent_title] => Secure authentication of remote equipment
[patent_app_type] => utility
[patent_app_number] => 16/877726
[patent_app_country] => US
[patent_app_date] => 2020-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8133
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16877726
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/877726 | Secure authentication of remote equipment | May 18, 2020 | Issued |
Array
(
[id] => 18997893
[patent_doc_number] => 11914738
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-27
[patent_title] => Categorizing a sensitive data field in a dataset
[patent_app_type] => utility
[patent_app_number] => 17/267838
[patent_app_country] => US
[patent_app_date] => 2020-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 14912
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17267838
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/267838 | Categorizing a sensitive data field in a dataset | May 13, 2020 | Issued |
Array
(
[id] => 17202370
[patent_doc_number] => 20210342465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-04
[patent_title] => SECURITY CONTROL MANAGEMENT FOR INFORMATION SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/862795
[patent_app_country] => US
[patent_app_date] => 2020-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6929
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16862795
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/862795 | Security control management for information security | Apr 29, 2020 | Issued |
Array
(
[id] => 17202334
[patent_doc_number] => 20210342429
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-04
[patent_title] => AUTOMATIC ANONYMOUS VISITOR IDENTITY RESOLUTION USING MACHINE LEARNING
[patent_app_type] => utility
[patent_app_number] => 16/862149
[patent_app_country] => US
[patent_app_date] => 2020-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12123
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16862149
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/862149 | Automatic anonymous visitor identity resolution using machine learning | Apr 28, 2020 | Issued |
Array
(
[id] => 17781201
[patent_doc_number] => 20220247551
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-04
[patent_title] => METHODS AND SYSTEMS FOR PRIVACY PRESERVING EVALUATION OF MACHINE LEARNING MODELS
[patent_app_type] => utility
[patent_app_number] => 17/605836
[patent_app_country] => US
[patent_app_date] => 2020-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 34914
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 58
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17605836
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/605836 | METHODS AND SYSTEMS FOR PRIVACY PRESERVING EVALUATION OF MACHINE LEARNING MODELS | Apr 22, 2020 | Pending |
Array
(
[id] => 18521440
[patent_doc_number] => 11711340
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-25
[patent_title] => Protecting communication link between content delivery network and content origin server
[patent_app_type] => utility
[patent_app_number] => 16/853083
[patent_app_country] => US
[patent_app_date] => 2020-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6707
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16853083
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/853083 | Protecting communication link between content delivery network and content origin server | Apr 19, 2020 | Issued |
Array
(
[id] => 16363452
[patent_doc_number] => 20200320203
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-08
[patent_title] => CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATION
[patent_app_type] => utility
[patent_app_number] => 16/841232
[patent_app_country] => US
[patent_app_date] => 2020-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9456
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16841232
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/841232 | Continuous risk assessment for electronic protected health information | Apr 5, 2020 | Issued |
Array
(
[id] => 17731749
[patent_doc_number] => 11388158
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-12
[patent_title] => System and method for authenticating clients
[patent_app_type] => utility
[patent_app_number] => 16/839543
[patent_app_country] => US
[patent_app_date] => 2020-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 7443
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16839543
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/839543 | System and method for authenticating clients | Apr 2, 2020 | Issued |
Array
(
[id] => 16211447
[patent_doc_number] => 20200244437
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-30
[patent_title] => METHOD AND DEVICE FOR SECURITY ASSESSMENT OF ENCRYPTION MODELS
[patent_app_type] => utility
[patent_app_number] => 16/836725
[patent_app_country] => US
[patent_app_date] => 2020-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9747
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16836725
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/836725 | Method and device for security assessment of encryption models | Mar 30, 2020 | Issued |
Array
(
[id] => 17977634
[patent_doc_number] => 11494496
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-08
[patent_title] => Measuring overfitting of machine learning computer model and susceptibility to security threats
[patent_app_type] => utility
[patent_app_number] => 16/833884
[patent_app_country] => US
[patent_app_date] => 2020-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 20
[patent_no_of_words] => 19493
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833884
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/833884 | Measuring overfitting of machine learning computer model and susceptibility to security threats | Mar 29, 2020 | Issued |
Array
(
[id] => 16330887
[patent_doc_number] => 20200301853
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-24
[patent_title] => Hacking-Resistant Computer Design
[patent_app_type] => utility
[patent_app_number] => 16/833355
[patent_app_country] => US
[patent_app_date] => 2020-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11327
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833355
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/833355 | Hacking-resistant computer design | Mar 26, 2020 | Issued |
Array
(
[id] => 16330887
[patent_doc_number] => 20200301853
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-24
[patent_title] => Hacking-Resistant Computer Design
[patent_app_type] => utility
[patent_app_number] => 16/833355
[patent_app_country] => US
[patent_app_date] => 2020-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11327
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833355
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/833355 | Hacking-resistant computer design | Mar 26, 2020 | Issued |
Array
(
[id] => 16330887
[patent_doc_number] => 20200301853
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-24
[patent_title] => Hacking-Resistant Computer Design
[patent_app_type] => utility
[patent_app_number] => 16/833355
[patent_app_country] => US
[patent_app_date] => 2020-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11327
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833355
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/833355 | Hacking-resistant computer design | Mar 26, 2020 | Issued |
Array
(
[id] => 16472563
[patent_doc_number] => 20200374101
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-26
[patent_title] => ENCRYPTION PROCESSING SYSTEM, ENCRYPTION PROCESSING DEVICE AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/832136
[patent_app_country] => US
[patent_app_date] => 2020-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11268
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16832136
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/832136 | Encryption processing system, encryption processing device and recording medium | Mar 26, 2020 | Issued |
Array
(
[id] => 16330887
[patent_doc_number] => 20200301853
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-24
[patent_title] => Hacking-Resistant Computer Design
[patent_app_type] => utility
[patent_app_number] => 16/833355
[patent_app_country] => US
[patent_app_date] => 2020-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11327
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833355
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/833355 | Hacking-resistant computer design | Mar 26, 2020 | Issued |
Array
(
[id] => 17771452
[patent_doc_number] => 11403395
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-08-02
[patent_title] => Method of using a dynamic rule engine with an application
[patent_app_type] => utility
[patent_app_number] => 16/831415
[patent_app_country] => US
[patent_app_date] => 2020-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6549
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16831415
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/831415 | Method of using a dynamic rule engine with an application | Mar 25, 2020 | Issued |
Array
(
[id] => 17131598
[patent_doc_number] => 20210306367
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-30
[patent_title] => REDUCING ATTACK SURFACE BY SELECTIVELY COLLOCATING APPLICATIONS ON HOST COMPUTERS
[patent_app_type] => utility
[patent_app_number] => 16/827798
[patent_app_country] => US
[patent_app_date] => 2020-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11246
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 62
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16827798
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/827798 | Reducing attack surface by selectively collocating applications on host computers | Mar 23, 2020 | Issued |
Array
(
[id] => 18054736
[patent_doc_number] => 11528134
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-12-13
[patent_title] => Authentication using transformation verification
[patent_app_type] => utility
[patent_app_number] => 16/828294
[patent_app_country] => US
[patent_app_date] => 2020-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9442
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16828294
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/828294 | Authentication using transformation verification | Mar 23, 2020 | Issued |