
Jacob Lipman
Examiner (ID: 2695, Phone: (571)272-3837 , Office: P/2434 )
| Most Active Art Unit | 2434 |
| Art Unit(s) | 2434, 2134, 2431 |
| Total Applications | 1119 |
| Issued Applications | 889 |
| Pending Applications | 87 |
| Abandoned Applications | 173 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13697529
[patent_doc_number] => 20170359719
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => KEY GENERATION METHOD, DEVICE, AND SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/688343
[patent_app_country] => US
[patent_app_date] => 2017-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21279
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15688343
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/688343 | KEY GENERATION METHOD, DEVICE, AND SYSTEM | Aug 27, 2017 | Abandoned |
Array
(
[id] => 13727189
[patent_doc_number] => 20170374550
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-28
[patent_title] => System for Using Mobile Terminals as Keys for Vehicles
[patent_app_type] => utility
[patent_app_number] => 15/683187
[patent_app_country] => US
[patent_app_date] => 2017-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7298
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15683187
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/683187 | System for using mobile terminals as keys for vehicles | Aug 21, 2017 | Issued |
Array
(
[id] => 12993070
[patent_doc_number] => 20170346831
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => VNF PACKAGE OPERATION METHOD AND APPARATUS
[patent_app_type] => utility
[patent_app_number] => 15/677407
[patent_app_country] => US
[patent_app_date] => 2017-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12839
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15677407
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/677407 | VNF package operation method and apparatus | Aug 14, 2017 | Issued |
Array
(
[id] => 12094759
[patent_doc_number] => 20170351852
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'IDENTITY AUTHENTICATION METHOD, SERVER, AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 15/675139
[patent_app_country] => US
[patent_app_date] => 2017-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5461
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15675139
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/675139 | Identity authentication method, server, and storage medium | Aug 10, 2017 | Issued |
Array
(
[id] => 14123863
[patent_doc_number] => 10248792
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-02
[patent_title] => Detection and healing of vulnerabilities in computer code
[patent_app_type] => utility
[patent_app_number] => 15/674084
[patent_app_country] => US
[patent_app_date] => 2017-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9865
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15674084
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/674084 | Detection and healing of vulnerabilities in computer code | Aug 9, 2017 | Issued |
Array
(
[id] => 12224470
[patent_doc_number] => 20180062830
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'HARDWARE MASKED SUBSTITUTION BOX FOR THE DATA ENCRYPTION STANDARD'
[patent_app_type] => utility
[patent_app_number] => 15/673284
[patent_app_country] => US
[patent_app_date] => 2017-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10318
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15673284
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/673284 | Hardware masked substitution box for the data encryption standard | Aug 8, 2017 | Issued |
Array
(
[id] => 12189687
[patent_doc_number] => 20180048624
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-15
[patent_title] => 'EXTENSIBLE, PLUG-N-PLAY, PRIVATE, SECURE NETWORK GATEWAY'
[patent_app_type] => utility
[patent_app_number] => 15/671755
[patent_app_country] => US
[patent_app_date] => 2017-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4256
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15671755
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/671755 | EXTENSIBLE, PLUG-N-PLAY, PRIVATE, SECURE NETWORK GATEWAY | Aug 7, 2017 | Abandoned |
Array
(
[id] => 12061012
[patent_doc_number] => 20170337357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'SYSTEM AND METHOD FOR MANAGING, TRACKING, AND UTILIZING COPY AND/OR PASTE EVENTS'
[patent_app_type] => utility
[patent_app_number] => 15/670209
[patent_app_country] => US
[patent_app_date] => 2017-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7055
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15670209
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/670209 | SYSTEM AND METHOD FOR MANAGING, TRACKING, AND UTILIZING COPY AND/OR PASTE EVENTS | Aug 6, 2017 | Abandoned |
Array
(
[id] => 14887473
[patent_doc_number] => 10423780
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-09-24
[patent_title] => System and method for synthesis of correct-by-construction cryptographic software from specification
[patent_app_type] => utility
[patent_app_number] => 15/669506
[patent_app_country] => US
[patent_app_date] => 2017-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7407
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15669506
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/669506 | System and method for synthesis of correct-by-construction cryptographic software from specification | Aug 3, 2017 | Issued |
Array
(
[id] => 15735497
[patent_doc_number] => 10616193
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => Processing resource requests on a mobile device
[patent_app_type] => utility
[patent_app_number] => 15/666068
[patent_app_country] => US
[patent_app_date] => 2017-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 9733
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15666068
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/666068 | Processing resource requests on a mobile device | Jul 31, 2017 | Issued |
Array
(
[id] => 13907165
[patent_doc_number] => 20190042787
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-07
[patent_title] => ELECTRONIC DEVICE INCLUDING DISPLAY AND METHOD OF APPLYING PRIVACY FILTER
[patent_app_type] => utility
[patent_app_number] => 15/666284
[patent_app_country] => US
[patent_app_date] => 2017-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6276
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15666284
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/666284 | ELECTRONIC DEVICE INCLUDING DISPLAY AND METHOD OF APPLYING PRIVACY FILTER | Jul 31, 2017 | Abandoned |
Array
(
[id] => 12053626
[patent_doc_number] => 20170329970
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'MEDIA PROTECTION POLICY ENFORCEMENT FOR MULTIPLE-OPERATING-SYSTEM ENVIRONMENTS'
[patent_app_type] => utility
[patent_app_number] => 15/665669
[patent_app_country] => US
[patent_app_date] => 2017-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12027
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15665669
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/665669 | Media protection policy enforcement for multiple-operating-system environments | Jul 31, 2017 | Issued |
Array
(
[id] => 13876591
[patent_doc_number] => 20190034636
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-31
[patent_title] => DELIVERING CONFIGURATION BASED SECURITY AND PROCESS WORKFLOWS
[patent_app_type] => utility
[patent_app_number] => 15/664723
[patent_app_country] => US
[patent_app_date] => 2017-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8548
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15664723
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/664723 | Delivering configuration based security and process workflows | Jul 30, 2017 | Issued |
Array
(
[id] => 12434658
[patent_doc_number] => 09978067
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-05-22
[patent_title] => System and methods for dynamic digital threat mitigation
[patent_app_type] => utility
[patent_app_number] => 15/653373
[patent_app_country] => US
[patent_app_date] => 2017-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8325
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15653373
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/653373 | System and methods for dynamic digital threat mitigation | Jul 17, 2017 | Issued |
Array
(
[id] => 12230591
[patent_doc_number] => 09917847
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'Double write data exchange in a dead drop network architecture'
[patent_app_type] => utility
[patent_app_number] => 15/614478
[patent_app_country] => US
[patent_app_date] => 2017-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12034
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15614478
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/614478 | Double write data exchange in a dead drop network architecture | Jun 4, 2017 | Issued |
Array
(
[id] => 13113541
[patent_doc_number] => 10075440
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-09-11
[patent_title] => Multi-party secure global attestation
[patent_app_type] => utility
[patent_app_number] => 15/597637
[patent_app_country] => US
[patent_app_date] => 2017-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 10675
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15597637
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/597637 | Multi-party secure global attestation | May 16, 2017 | Issued |
Array
(
[id] => 13421943
[patent_doc_number] => 20180262514
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-13
[patent_title] => METHODS AND SYSTEMS FOR USER OPT-IN TO DATA PRIVACY AGREEMENTS
[patent_app_type] => utility
[patent_app_number] => 15/587748
[patent_app_country] => US
[patent_app_date] => 2017-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8710
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15587748
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/587748 | Methods and systems for user opt-in to data privacy agreements | May 4, 2017 | Issued |
Array
(
[id] => 11870272
[patent_doc_number] => 20170237557
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'Extending Data Over Cable Service Interface Specification (DOCSIS) Provisioning of Ethernet Passive Optical Network (EPON) (DPoE) to EPON over Coax (EPoC) Multicast Key Management'
[patent_app_type] => utility
[patent_app_number] => 15/587054
[patent_app_country] => US
[patent_app_date] => 2017-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8408
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15587054
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/587054 | Extending data over cable service interface specification (DOCSIS) provisioning of ethernet passive optical network (EPON) (DPoE) to EPON over coax (EPoC) multicast key management | May 3, 2017 | Issued |
Array
(
[id] => 15600119
[patent_doc_number] => 20200076594
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => KEY UPDATE FOR MASKED KEYS
[patent_app_type] => utility
[patent_app_number] => 16/089696
[patent_app_country] => US
[patent_app_date] => 2017-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5002
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16089696
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/089696 | KEY UPDATE FOR MASKED KEYS | Mar 29, 2017 | Abandoned |
Array
(
[id] => 13712027
[patent_doc_number] => 20170366968
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-21
[patent_title] => REDUCING DETECTABILITY OF AN ENCRYPTION KEY
[patent_app_type] => utility
[patent_app_number] => 15/457606
[patent_app_country] => US
[patent_app_date] => 2017-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3667
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15457606
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/457606 | Reducing detectability of an encryption key | Mar 12, 2017 | Issued |