Search

Natalie Lennox

Examiner (ID: 3220)

Most Active Art Unit
2626
Art Unit(s)
2626
Total Applications
16
Issued Applications
5
Pending Applications
0
Abandoned Applications
11

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 17535644 [patent_doc_number] => 20220114253 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-04-14 [patent_title] => ACTION PLAN ESTIMATION APPARATUS, ACTION PLAN ESTIMATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM [patent_app_type] => utility [patent_app_number] => 17/427250 [patent_app_country] => US [patent_app_date] => 2019-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7795 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -9 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17427250 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/427250
Action plan estimation apparatus, action plan estimation method, and computer-readable recording medium Feb 3, 2019 Issued
Array ( [id] => 17165505 [patent_doc_number] => 11151611 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-10-19 [patent_title] => Mobile device detection and tracking [patent_app_type] => utility [patent_app_number] => 16/249760 [patent_app_country] => US [patent_app_date] => 2019-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 31 [patent_figures_cnt] => 32 [patent_no_of_words] => 20216 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16249760 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/249760
Mobile device detection and tracking Jan 15, 2019 Issued
Array ( [id] => 14353045 [patent_doc_number] => 20190158496 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-05-23 [patent_title] => System, Method, and Apparatus for Personal Identification [patent_app_type] => utility [patent_app_number] => 16/244888 [patent_app_country] => US [patent_app_date] => 2019-01-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13934 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 140 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16244888 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/244888
System, Method, and Apparatus for Personal Identification Jan 9, 2019 Abandoned
Array ( [id] => 14287081 [patent_doc_number] => 20190140825 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-05-09 [patent_title] => MANAGING PRIVATE KEY ACCESS IN MULTIPLE NODES [patent_app_type] => utility [patent_app_number] => 16/241888 [patent_app_country] => US [patent_app_date] => 2019-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5015 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16241888 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/241888
Managing private key access in multiple nodes Jan 6, 2019 Issued
Array ( [id] => 16637132 [patent_doc_number] => 10915642 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-02-09 [patent_title] => Private analytics using multi-party computation [patent_app_type] => utility [patent_app_number] => 16/202355 [patent_app_country] => US [patent_app_date] => 2018-11-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8332 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16202355 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/202355
Private analytics using multi-party computation Nov 27, 2018 Issued
Array ( [id] => 14107887 [patent_doc_number] => 20190095619 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-03-28 [patent_title] => IDENTIFYING WHETHER AN APPLICATION IS MALICIOUS [patent_app_type] => utility [patent_app_number] => 16/199250 [patent_app_country] => US [patent_app_date] => 2018-11-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7107 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16199250 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/199250
Identifying whether an application is malicious Nov 25, 2018 Issued
Array ( [id] => 14139527 [patent_doc_number] => 20190104153 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-04-04 [patent_title] => DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING [patent_app_type] => utility [patent_app_number] => 16/188594 [patent_app_country] => US [patent_app_date] => 2018-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9452 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 173 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16188594 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/188594
Detecting attacks using compromised credentials via internal network monitoring Nov 12, 2018 Issued
Array ( [id] => 15908629 [patent_doc_number] => 20200153836 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-05-14 [patent_title] => FICTITIOUS ACCOUNT GENERATION ON DETECTION OF ACCOUNT TAKEOVER CONDITIONS [patent_app_type] => utility [patent_app_number] => 16/190066 [patent_app_country] => US [patent_app_date] => 2018-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9795 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 70 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16190066 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/190066
Fictitious account generation on detection of account takeover conditions Nov 12, 2018 Issued
Array ( [id] => 16317195 [patent_doc_number] => 20200295933 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-17 [patent_title] => Method and system for managing application security keys for user and M2M devices in a wireless communication network environment [patent_app_type] => utility [patent_app_number] => 16/186943 [patent_app_country] => US [patent_app_date] => 2018-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18039 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16186943 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/186943
Method and system for managing application security keys for user and M2M devices in a wireless communication network environment Nov 11, 2018 Abandoned
Array ( [id] => 13998905 [patent_doc_number] => 20190068610 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => PROTECTING AGAINST SPAM AND OVER-REPRESENTATION IN SUBMISSION OF CONFIDENTIAL DATA [patent_app_type] => utility [patent_app_number] => 16/175611 [patent_app_country] => US [patent_app_date] => 2018-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 17057 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 232 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16175611 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/175611
PROTECTING AGAINST SPAM AND OVER-REPRESENTATION IN SUBMISSION OF CONFIDENTIAL DATA Oct 29, 2018 Abandoned
Array ( [id] => 17108420 [patent_doc_number] => 11128652 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-09-21 [patent_title] => Dynamic vulnerability correlation [patent_app_type] => utility [patent_app_number] => 16/170962 [patent_app_country] => US [patent_app_date] => 2018-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 16 [patent_no_of_words] => 10142 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16170962 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/170962
Dynamic vulnerability correlation Oct 24, 2018 Issued
Array ( [id] => 17122774 [patent_doc_number] => 11133923 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-09-28 [patent_title] => Cryptographic operations using internet of things device pool [patent_app_type] => utility [patent_app_number] => 16/169478 [patent_app_country] => US [patent_app_date] => 2018-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7405 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16169478 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/169478
Cryptographic operations using internet of things device pool Oct 23, 2018 Issued
Array ( [id] => 13938221 [patent_doc_number] => 20190052626 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-14 [patent_title] => GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL [patent_app_type] => utility [patent_app_number] => 16/162618 [patent_app_country] => US [patent_app_date] => 2018-10-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15928 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16162618 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/162618
GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL Oct 16, 2018 Abandoned
Array ( [id] => 13938219 [patent_doc_number] => 20190052625 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-14 [patent_title] => GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL [patent_app_type] => utility [patent_app_number] => 16/162596 [patent_app_country] => US [patent_app_date] => 2018-10-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15926 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 212 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16162596 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/162596
Generation and distribution of secure or cryptographic material Oct 16, 2018 Issued
Array ( [id] => 14380009 [patent_doc_number] => 20190163917 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-05-30 [patent_title] => EXPLOIT PREDICTION BASED ON MACHINE LEARNING [patent_app_type] => utility [patent_app_number] => 16/158873 [patent_app_country] => US [patent_app_date] => 2018-10-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6945 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16158873 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/158873
Exploit prediction based on machine learning Oct 11, 2018 Issued
Array ( [id] => 16987155 [patent_doc_number] => 11074328 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-07-27 [patent_title] => User authentication using passphrase emotional tone [patent_app_type] => utility [patent_app_number] => 16/135283 [patent_app_country] => US [patent_app_date] => 2018-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7832 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 245 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16135283 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/135283
User authentication using passphrase emotional tone Sep 18, 2018 Issued
Array ( [id] => 16003011 [patent_doc_number] => 20200177376 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-06-04 [patent_title] => OPTICAL ENCRYPTION TERMINAL, CRYPTOGRAPHY KEY DISTRIBUTION SYSTEM AND METHOD OF GENERATING CRYPTOGRAPHY KEYS IN A CRYPTOGRAPHY KEY DISTRIBUTION SYSTEM [patent_app_type] => utility [patent_app_number] => 16/132017 [patent_app_country] => US [patent_app_date] => 2018-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12615 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -13 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16132017 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/132017
Optical encryption terminal, cryptography key distribution system and method of generating cryptography keys in a cryptography key distribution system Sep 13, 2018 Issued
Array ( [id] => 16294644 [patent_doc_number] => 10771507 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-09-08 [patent_title] => Secure communication method of IMS system based on key file [patent_app_type] => utility [patent_app_number] => 16/132171 [patent_app_country] => US [patent_app_date] => 2018-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 2244 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16132171 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/132171
Secure communication method of IMS system based on key file Sep 13, 2018 Issued
Array ( [id] => 16739777 [patent_doc_number] => 10965453 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-03-30 [patent_title] => System and method for authenticated encryption based on device fingerprint [patent_app_type] => utility [patent_app_number] => 16/131426 [patent_app_country] => US [patent_app_date] => 2018-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 16 [patent_no_of_words] => 12533 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 235 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16131426 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/131426
System and method for authenticated encryption based on device fingerprint Sep 13, 2018 Issued
Array ( [id] => 15623333 [patent_doc_number] => 20200082071 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-03-12 [patent_title] => CREDENTIAL SAFETY MANAGEMENT FOR SOFTWARE CONTAINERS [patent_app_type] => utility [patent_app_number] => 16/128662 [patent_app_country] => US [patent_app_date] => 2018-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5063 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16128662 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/128662
Credential safety management for software containers Sep 11, 2018 Issued
Menu