
John J. Vrablik
Examiner (ID: 8186)
| Most Active Art Unit | 3403 |
| Art Unit(s) | 3502, 3746, 2102, 3403, 3748, 3504 |
| Total Applications | 2337 |
| Issued Applications | 2043 |
| Pending Applications | 54 |
| Abandoned Applications | 240 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19758941
[patent_doc_number] => 20250047506
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-06
[patent_title] => EMBEDDING INTERMEDIATE CERTIFICATE IN DIGITAL CERTIFICATE
[patent_app_type] => utility
[patent_app_number] => 18/921936
[patent_app_country] => US
[patent_app_date] => 2024-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11657
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18921936
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/921936 | EMBEDDING INTERMEDIATE CERTIFICATE IN DIGITAL CERTIFICATE | Oct 20, 2024 | Pending |
Array
(
[id] => 19726069
[patent_doc_number] => 20250028820
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-23
[patent_title] => FOCUSED IMAGE GRABBING
[patent_app_type] => utility
[patent_app_number] => 18/910709
[patent_app_country] => US
[patent_app_date] => 2024-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8223
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18910709
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/910709 | FOCUSED IMAGE GRABBING | Oct 8, 2024 | Pending |
Array
(
[id] => 19713754
[patent_doc_number] => 20250023896
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-16
[patent_title] => ANOMALOUS AND SUSPICIOUS ROLE ASSIGNMENT DETERMINATIONS
[patent_app_type] => utility
[patent_app_number] => 18/899818
[patent_app_country] => US
[patent_app_date] => 2024-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6533
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18899818
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/899818 | ANOMALOUS AND SUSPICIOUS ROLE ASSIGNMENT DETERMINATIONS | Sep 26, 2024 | Pending |
Array
(
[id] => 19707352
[patent_doc_number] => 20250017494
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-16
[patent_title] => AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/896992
[patent_app_country] => US
[patent_app_date] => 2024-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10679
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18896992
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/896992 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUM | Sep 25, 2024 | Pending |
Array
(
[id] => 19697624
[patent_doc_number] => 20250016169
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-09
[patent_title] => SYSTEMS AND METHODS FOR DATA SECURITY
[patent_app_type] => utility
[patent_app_number] => 18/894063
[patent_app_country] => US
[patent_app_date] => 2024-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9491
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18894063
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/894063 | SYSTEMS AND METHODS FOR DATA SECURITY | Sep 23, 2024 | Pending |
Array
(
[id] => 19697651
[patent_doc_number] => 20250016196
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-09
[patent_title] => SYSTEMS AND METHODS THAT PERFORM FILTERING, LINKING, AND RENDERING
[patent_app_type] => utility
[patent_app_number] => 18/893136
[patent_app_country] => US
[patent_app_date] => 2024-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9646
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18893136
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/893136 | SYSTEMS AND METHODS THAT PERFORM FILTERING, LINKING, AND RENDERING | Sep 22, 2024 | Pending |
Array
(
[id] => 19849253
[patent_doc_number] => 20250094604
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-20
[patent_title] => IMAGE ENCRYPTION USING COLLATZ CONJECTURE
[patent_app_type] => utility
[patent_app_number] => 18/826778
[patent_app_country] => US
[patent_app_date] => 2024-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8049
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 31
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18826778
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/826778 | IMAGE ENCRYPTION USING COLLATZ CONJECTURE | Sep 5, 2024 | Pending |
Array
(
[id] => 19645302
[patent_doc_number] => 20240419822
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-19
[patent_title] => Dynamically Controlling Access to Linked Content in Electronic Communications
[patent_app_type] => utility
[patent_app_number] => 18/817490
[patent_app_country] => US
[patent_app_date] => 2024-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17287
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18817490
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/817490 | Dynamically Controlling Access to Linked Content in Electronic Communications | Aug 27, 2024 | Pending |
Array
(
[id] => 19635759
[patent_doc_number] => 20240414208
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-12
[patent_title] => HIGH PERFORMANCE ARCHITECTURE FOR CONVERGED SECURITY SYSTEMS AND APPLIANCES
[patent_app_type] => utility
[patent_app_number] => 18/812157
[patent_app_country] => US
[patent_app_date] => 2024-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6223
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 75
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18812157
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/812157 | HIGH PERFORMANCE ARCHITECTURE FOR CONVERGED SECURITY SYSTEMS AND APPLIANCES | Aug 21, 2024 | Pending |
Array
(
[id] => 19620539
[patent_doc_number] => 20240406219
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-05
[patent_title] => SYSTEM AND METHOD FOR SELF-CLUSTERING EDGE COMPUTING PROTECTION
[patent_app_type] => utility
[patent_app_number] => 18/802244
[patent_app_country] => US
[patent_app_date] => 2024-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9365
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18802244
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/802244 | SYSTEM AND METHOD FOR SELF-CLUSTERING EDGE COMPUTING PROTECTION | Aug 12, 2024 | Pending |
Array
(
[id] => 19606027
[patent_doc_number] => 20240396907
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => Monitoring Hosts for Anomalous Processes Using Machine Learning Models
[patent_app_type] => utility
[patent_app_number] => 18/795280
[patent_app_country] => US
[patent_app_date] => 2024-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22350
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18795280
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/795280 | Monitoring Hosts for Anomalous Processes Using Machine Learning Models | Aug 5, 2024 | Pending |
Array
(
[id] => 19759090
[patent_doc_number] => 20250047655
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-06
[patent_title] => NETWORK REPOSITORY FUNCTION FAILURE HANDLING
[patent_app_type] => utility
[patent_app_number] => 18/789581
[patent_app_country] => US
[patent_app_date] => 2024-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7098
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18789581
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/789581 | NETWORK REPOSITORY FUNCTION FAILURE HANDLING | Jul 29, 2024 | Pending |
Array
(
[id] => 19591037
[patent_doc_number] => 20240388594
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-21
[patent_title] => NETWORK ANOMALY DETECTION METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/786542
[patent_app_country] => US
[patent_app_date] => 2024-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12208
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18786542
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/786542 | NETWORK ANOMALY DETECTION METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM | Jul 27, 2024 | Pending |
Array
(
[id] => 19750387
[patent_doc_number] => 20250038952
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => METHODS, UNIT AND DEVICE FOR SUCCESSIVELY EXECUTING FIRST AND NEXT BLOCK CRYPTOGRAPHIC COMPUTATIONS
[patent_app_type] => utility
[patent_app_number] => 18/782220
[patent_app_country] => US
[patent_app_date] => 2024-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13647
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18782220
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/782220 | METHODS, UNIT AND DEVICE FOR SUCCESSIVELY EXECUTING FIRST AND NEXT BLOCK CRYPTOGRAPHIC COMPUTATIONS | Jul 23, 2024 | Pending |
Array
(
[id] => 19547646
[patent_doc_number] => 20240364682
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-31
[patent_title] => VEHICLE UTILIZATION SYSTEM, FIRST SERVER OF VEHICLE UTILIZATION SYSTEM, AND VEHICLE UTILIZATION METHOD
[patent_app_type] => utility
[patent_app_number] => 18/765947
[patent_app_country] => US
[patent_app_date] => 2024-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4971
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18765947
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/765947 | VEHICLE UTILIZATION SYSTEM, FIRST SERVER OF VEHICLE UTILIZATION SYSTEM, AND VEHICLE UTILIZATION METHOD | Jul 7, 2024 | Pending |
Array
(
[id] => 20185561
[patent_doc_number] => 12396660
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-26
[patent_title] => Authentication device, authentication method, and recording medium
[patent_app_type] => utility
[patent_app_number] => 18/757651
[patent_app_country] => US
[patent_app_date] => 2024-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 6227
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18757651
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/757651 | Authentication device, authentication method, and recording medium | Jun 27, 2024 | Issued |
Array
(
[id] => 20449312
[patent_doc_number] => 20260006038
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-01
[patent_title] => DATA PROTECTION BASED ON INTRUSION DETECTION
[patent_app_type] => utility
[patent_app_number] => 18/754958
[patent_app_country] => US
[patent_app_date] => 2024-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1167
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18754958
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/754958 | DATA PROTECTION BASED ON INTRUSION DETECTION | Jun 25, 2024 | Pending |
Array
(
[id] => 19501301
[patent_doc_number] => 20240340319
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => SECURE VSAN CLUSTER USING DEVICE AUTHENTICATION AND INTEGRITY MEASUREMENTS
[patent_app_type] => utility
[patent_app_number] => 18/745138
[patent_app_country] => US
[patent_app_date] => 2024-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5326
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18745138
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/745138 | Secure VSAN cluster using device authentication and integrity measurements | Jun 16, 2024 | Issued |
Array
(
[id] => 19576469
[patent_doc_number] => 20240380761
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-14
[patent_title] => MACHINE LEARNING BASED APPROACH TO DETECT STEALTHY COMMAND AND CONTROL NETWORK COMMUNICATIONS
[patent_app_type] => utility
[patent_app_number] => 18/659680
[patent_app_country] => US
[patent_app_date] => 2024-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11671
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18659680
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/659680 | MACHINE LEARNING BASED APPROACH TO DETECT STEALTHY COMMAND AND CONTROL NETWORK COMMUNICATIONS | May 8, 2024 | Pending |
Array
(
[id] => 20339579
[patent_doc_number] => 20250343699
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-11-06
[patent_title] => SYSTEM AND METHOD FOR A MONOTONIC COUNTER
[patent_app_type] => utility
[patent_app_number] => 18/655157
[patent_app_country] => US
[patent_app_date] => 2024-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 0
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18655157
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/655157 | SYSTEM AND METHOD FOR A MONOTONIC COUNTER | May 2, 2024 | Pending |