
John D. Ulm
Examiner (ID: 5795)
| Most Active Art Unit | 1649 |
| Art Unit(s) | 1812, 1805, 1649, 1646 |
| Total Applications | 2240 |
| Issued Applications | 1195 |
| Pending Applications | 205 |
| Abandoned Applications | 843 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16730052
[patent_doc_number] => 20210097199
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-01
[patent_title] => MASKING SENSITIVE INFORMATION IN RECORDS OF FILTERED ACCESSES TO UNSTRUCTURED DATA
[patent_app_type] => utility
[patent_app_number] => 17/067501
[patent_app_country] => US
[patent_app_date] => 2020-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19168
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17067501
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/067501 | Masking sensitive information in records of filtered accesses to unstructured data | Oct 8, 2020 | Issued |
Array
(
[id] => 17717374
[patent_doc_number] => 11381378
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-05
[patent_title] => Chaotic communication method and system based on complex modified projective difference function synchronization
[patent_app_type] => utility
[patent_app_number] => 17/038143
[patent_app_country] => US
[patent_app_date] => 2020-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4755
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17038143
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/038143 | Chaotic communication method and system based on complex modified projective difference function synchronization | Sep 29, 2020 | Issued |
Array
(
[id] => 16818946
[patent_doc_number] => 11003779
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Continuous database security and compliance
[patent_app_type] => utility
[patent_app_number] => 17/037708
[patent_app_country] => US
[patent_app_date] => 2020-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9278
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 271
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17037708
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/037708 | Continuous database security and compliance | Sep 29, 2020 | Issued |
Array
(
[id] => 17758736
[patent_doc_number] => 11399040
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-07-26
[patent_title] => Subscription-based malware detection
[patent_app_type] => utility
[patent_app_number] => 17/035538
[patent_app_country] => US
[patent_app_date] => 2020-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 18372
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17035538
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/035538 | Subscription-based malware detection | Sep 27, 2020 | Issued |
Array
(
[id] => 17484699
[patent_doc_number] => 20220092203
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-24
[patent_title] => PLATFORM ROOT-OF-TRUST SYSTEM
[patent_app_type] => utility
[patent_app_number] => 17/027835
[patent_app_country] => US
[patent_app_date] => 2020-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10533
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17027835
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/027835 | Platform root-of-trust system | Sep 21, 2020 | Issued |
Array
(
[id] => 17654094
[patent_doc_number] => 11356853
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-06-07
[patent_title] => Detection of malicious mobile apps
[patent_app_type] => utility
[patent_app_number] => 17/028364
[patent_app_country] => US
[patent_app_date] => 2020-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 5999
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17028364
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/028364 | Detection of malicious mobile apps | Sep 21, 2020 | Issued |
Array
(
[id] => 17476132
[patent_doc_number] => 20220083636
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-17
[patent_title] => SMART TIMEOUT WITH CHANGE DETECTION
[patent_app_type] => utility
[patent_app_number] => 17/024498
[patent_app_country] => US
[patent_app_date] => 2020-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21640
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -28
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17024498
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/024498 | SMART TIMEOUT WITH CHANGE DETECTION | Sep 16, 2020 | Abandoned |
Array
(
[id] => 17919182
[patent_doc_number] => 20220321578
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-10-06
[patent_title] => UNIFIED ACCESS METHOD APPLYING DIGITAL HUMAN BEING CODECHAIN
[patent_app_type] => utility
[patent_app_number] => 17/763937
[patent_app_country] => US
[patent_app_date] => 2020-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 49093
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -39
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17763937
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/763937 | Unified access method applying digital human being CodeChain | Sep 10, 2020 | Issued |
Array
(
[id] => 16543659
[patent_doc_number] => 20200410074
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => IDENTITY AUTHENTICATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 17/015509
[patent_app_country] => US
[patent_app_date] => 2020-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 24641
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17015509
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/015509 | IDENTITY AUTHENTICATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM | Sep 8, 2020 | Abandoned |
Array
(
[id] => 16994127
[patent_doc_number] => 20210232547
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-29
[patent_title] => SYSTEMS AND METHODS OF PROVIDING IMMUTABLE RECORDS
[patent_app_type] => utility
[patent_app_number] => 17/011279
[patent_app_country] => US
[patent_app_date] => 2020-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21573
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17011279
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/011279 | Systems and methods of providing immutable records | Sep 2, 2020 | Issued |
Array
(
[id] => 16678588
[patent_doc_number] => 20210067354
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-04
[patent_title] => HUMAN- AND MACHINE-READABLE CRYPTOGRAPHIC KEYS FROM DICE
[patent_app_type] => utility
[patent_app_number] => 17/009665
[patent_app_country] => US
[patent_app_date] => 2020-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8476
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17009665
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/009665 | Human- and machine-readable cryptographic keys from dice | Aug 31, 2020 | Issued |
Array
(
[id] => 17861881
[patent_doc_number] => 11443039
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-13
[patent_title] => Controller computing system for preventing malicious control of a controlled machinery system
[patent_app_type] => utility
[patent_app_number] => 16/999390
[patent_app_country] => US
[patent_app_date] => 2020-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 7980
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16999390
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/999390 | Controller computing system for preventing malicious control of a controlled machinery system | Aug 20, 2020 | Issued |
Array
(
[id] => 16773002
[patent_doc_number] => 10984112
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-20
[patent_title] => Systems and methods for automated threat modeling of an existing computing environment
[patent_app_type] => utility
[patent_app_number] => 16/947798
[patent_app_country] => US
[patent_app_date] => 2020-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 27815
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16947798
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/947798 | Systems and methods for automated threat modeling of an existing computing environment | Aug 16, 2020 | Issued |
Array
(
[id] => 16659459
[patent_doc_number] => 20210056096
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-25
[patent_title] => ACCESS CONTROL WITH MULTIPLE SECURITY ECOSYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/984792
[patent_app_country] => US
[patent_app_date] => 2020-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7060
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16984792
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/984792 | Access control with multiple security ecosystems | Aug 3, 2020 | Issued |
Array
(
[id] => 16457034
[patent_doc_number] => 20200366460
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => HOMOMORPHIC DATA DECRYPTION METHOD AND APPARATUS FOR IMPLEMENTING PRIVACY PROTECTION
[patent_app_type] => utility
[patent_app_number] => 16/945434
[patent_app_country] => US
[patent_app_date] => 2020-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9510
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16945434
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/945434 | Homomorphic data decryption method and apparatus for implementing privacy protection | Jul 30, 2020 | Issued |
Array
(
[id] => 18803634
[patent_doc_number] => 11836794
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-05
[patent_title] => Crisis prediction based on persistence homology of data
[patent_app_type] => utility
[patent_app_number] => 16/937943
[patent_app_country] => US
[patent_app_date] => 2020-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 4767
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16937943
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/937943 | Crisis prediction based on persistence homology of data | Jul 23, 2020 | Issued |
Array
(
[id] => 16426070
[patent_doc_number] => 20200351268
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-05
[patent_title] => SYSTEM AND METHOD FOR PROXYING FEDERATED AUTHENTICATION PROTOCOLS
[patent_app_type] => utility
[patent_app_number] => 16/934223
[patent_app_country] => US
[patent_app_date] => 2020-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7011
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16934223
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/934223 | System and method for proxying federated authentication protocols | Jul 20, 2020 | Issued |
Array
(
[id] => 17809650
[patent_doc_number] => 20220261485
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-18
[patent_title] => DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 17/618206
[patent_app_country] => US
[patent_app_date] => 2020-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7367
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17618206
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/618206 | Data processing device, data processing method, and program | Jul 15, 2020 | Issued |
Array
(
[id] => 17411047
[patent_doc_number] => 11251953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-02-15
[patent_title] => Proving prime integers for encryption
[patent_app_type] => utility
[patent_app_number] => 16/947020
[patent_app_country] => US
[patent_app_date] => 2020-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11107
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16947020
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/947020 | Proving prime integers for encryption | Jul 14, 2020 | Issued |
Array
(
[id] => 18532085
[patent_doc_number] => 20230237157
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-07-27
[patent_title] => COMPUTE SYSTEMS INCLUDING A SECURITY PROCESSOR
[patent_app_type] => utility
[patent_app_number] => 18/004961
[patent_app_country] => US
[patent_app_date] => 2020-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4269
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18004961
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/004961 | Compute systems including a security processor | Jul 13, 2020 | Issued |