![](/images/general/no_picture/200_user.png)
Natalie Lennox
Examiner (ID: 3220)
Most Active Art Unit | 2626 |
Art Unit(s) | 2626 |
Total Applications | 16 |
Issued Applications | 5 |
Pending Applications | 0 |
Abandoned Applications | 11 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 17535644
[patent_doc_number] => 20220114253
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-04-14
[patent_title] => ACTION PLAN ESTIMATION APPARATUS, ACTION PLAN ESTIMATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 17/427250
[patent_app_country] => US
[patent_app_date] => 2019-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7795
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17427250
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/427250 | Action plan estimation apparatus, action plan estimation method, and computer-readable recording medium | Feb 3, 2019 | Issued |
Array
(
[id] => 17165505
[patent_doc_number] => 11151611
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-19
[patent_title] => Mobile device detection and tracking
[patent_app_type] => utility
[patent_app_number] => 16/249760
[patent_app_country] => US
[patent_app_date] => 2019-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 32
[patent_no_of_words] => 20216
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16249760
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/249760 | Mobile device detection and tracking | Jan 15, 2019 | Issued |
Array
(
[id] => 14353045
[patent_doc_number] => 20190158496
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-23
[patent_title] => System, Method, and Apparatus for Personal Identification
[patent_app_type] => utility
[patent_app_number] => 16/244888
[patent_app_country] => US
[patent_app_date] => 2019-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13934
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16244888
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/244888 | System, Method, and Apparatus for Personal Identification | Jan 9, 2019 | Abandoned |
Array
(
[id] => 14287081
[patent_doc_number] => 20190140825
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-09
[patent_title] => MANAGING PRIVATE KEY ACCESS IN MULTIPLE NODES
[patent_app_type] => utility
[patent_app_number] => 16/241888
[patent_app_country] => US
[patent_app_date] => 2019-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5015
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16241888
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/241888 | Managing private key access in multiple nodes | Jan 6, 2019 | Issued |
Array
(
[id] => 16637132
[patent_doc_number] => 10915642
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-09
[patent_title] => Private analytics using multi-party computation
[patent_app_type] => utility
[patent_app_number] => 16/202355
[patent_app_country] => US
[patent_app_date] => 2018-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8332
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16202355
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/202355 | Private analytics using multi-party computation | Nov 27, 2018 | Issued |
Array
(
[id] => 14107887
[patent_doc_number] => 20190095619
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => IDENTIFYING WHETHER AN APPLICATION IS MALICIOUS
[patent_app_type] => utility
[patent_app_number] => 16/199250
[patent_app_country] => US
[patent_app_date] => 2018-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7107
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16199250
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/199250 | Identifying whether an application is malicious | Nov 25, 2018 | Issued |
Array
(
[id] => 14139527
[patent_doc_number] => 20190104153
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-04
[patent_title] => DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING
[patent_app_type] => utility
[patent_app_number] => 16/188594
[patent_app_country] => US
[patent_app_date] => 2018-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9452
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16188594
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/188594 | Detecting attacks using compromised credentials via internal network monitoring | Nov 12, 2018 | Issued |
Array
(
[id] => 15908629
[patent_doc_number] => 20200153836
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => FICTITIOUS ACCOUNT GENERATION ON DETECTION OF ACCOUNT TAKEOVER CONDITIONS
[patent_app_type] => utility
[patent_app_number] => 16/190066
[patent_app_country] => US
[patent_app_date] => 2018-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9795
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 70
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16190066
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/190066 | Fictitious account generation on detection of account takeover conditions | Nov 12, 2018 | Issued |
Array
(
[id] => 16317195
[patent_doc_number] => 20200295933
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-17
[patent_title] => Method and system for managing application security keys for user and M2M devices in a wireless communication network environment
[patent_app_type] => utility
[patent_app_number] => 16/186943
[patent_app_country] => US
[patent_app_date] => 2018-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18039
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16186943
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/186943 | Method and system for managing application security keys for user and M2M devices in a wireless communication network environment | Nov 11, 2018 | Abandoned |
Array
(
[id] => 13998905
[patent_doc_number] => 20190068610
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => PROTECTING AGAINST SPAM AND OVER-REPRESENTATION IN SUBMISSION OF CONFIDENTIAL DATA
[patent_app_type] => utility
[patent_app_number] => 16/175611
[patent_app_country] => US
[patent_app_date] => 2018-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17057
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16175611
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/175611 | PROTECTING AGAINST SPAM AND OVER-REPRESENTATION IN SUBMISSION OF CONFIDENTIAL DATA | Oct 29, 2018 | Abandoned |
Array
(
[id] => 17108420
[patent_doc_number] => 11128652
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-09-21
[patent_title] => Dynamic vulnerability correlation
[patent_app_type] => utility
[patent_app_number] => 16/170962
[patent_app_country] => US
[patent_app_date] => 2018-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 16
[patent_no_of_words] => 10142
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16170962
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/170962 | Dynamic vulnerability correlation | Oct 24, 2018 | Issued |
Array
(
[id] => 17122774
[patent_doc_number] => 11133923
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-28
[patent_title] => Cryptographic operations using internet of things device pool
[patent_app_type] => utility
[patent_app_number] => 16/169478
[patent_app_country] => US
[patent_app_date] => 2018-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7405
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16169478
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/169478 | Cryptographic operations using internet of things device pool | Oct 23, 2018 | Issued |
Array
(
[id] => 13938221
[patent_doc_number] => 20190052626
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-14
[patent_title] => GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL
[patent_app_type] => utility
[patent_app_number] => 16/162618
[patent_app_country] => US
[patent_app_date] => 2018-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15928
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16162618
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/162618 | GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL | Oct 16, 2018 | Abandoned |
Array
(
[id] => 13938219
[patent_doc_number] => 20190052625
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-14
[patent_title] => GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL
[patent_app_type] => utility
[patent_app_number] => 16/162596
[patent_app_country] => US
[patent_app_date] => 2018-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15926
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16162596
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/162596 | Generation and distribution of secure or cryptographic material | Oct 16, 2018 | Issued |
Array
(
[id] => 14380009
[patent_doc_number] => 20190163917
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-30
[patent_title] => EXPLOIT PREDICTION BASED ON MACHINE LEARNING
[patent_app_type] => utility
[patent_app_number] => 16/158873
[patent_app_country] => US
[patent_app_date] => 2018-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6945
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16158873
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/158873 | Exploit prediction based on machine learning | Oct 11, 2018 | Issued |
Array
(
[id] => 16987155
[patent_doc_number] => 11074328
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-27
[patent_title] => User authentication using passphrase emotional tone
[patent_app_type] => utility
[patent_app_number] => 16/135283
[patent_app_country] => US
[patent_app_date] => 2018-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7832
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16135283
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/135283 | User authentication using passphrase emotional tone | Sep 18, 2018 | Issued |
Array
(
[id] => 16003011
[patent_doc_number] => 20200177376
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => OPTICAL ENCRYPTION TERMINAL, CRYPTOGRAPHY KEY DISTRIBUTION SYSTEM AND METHOD OF GENERATING CRYPTOGRAPHY KEYS IN A CRYPTOGRAPHY KEY DISTRIBUTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/132017
[patent_app_country] => US
[patent_app_date] => 2018-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12615
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16132017
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/132017 | Optical encryption terminal, cryptography key distribution system and method of generating cryptography keys in a cryptography key distribution system | Sep 13, 2018 | Issued |
Array
(
[id] => 16294644
[patent_doc_number] => 10771507
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-08
[patent_title] => Secure communication method of IMS system based on key file
[patent_app_type] => utility
[patent_app_number] => 16/132171
[patent_app_country] => US
[patent_app_date] => 2018-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 2244
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16132171
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/132171 | Secure communication method of IMS system based on key file | Sep 13, 2018 | Issued |
Array
(
[id] => 16739777
[patent_doc_number] => 10965453
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-30
[patent_title] => System and method for authenticated encryption based on device fingerprint
[patent_app_type] => utility
[patent_app_number] => 16/131426
[patent_app_country] => US
[patent_app_date] => 2018-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 16
[patent_no_of_words] => 12533
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16131426
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/131426 | System and method for authenticated encryption based on device fingerprint | Sep 13, 2018 | Issued |
Array
(
[id] => 15623333
[patent_doc_number] => 20200082071
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => CREDENTIAL SAFETY MANAGEMENT FOR SOFTWARE CONTAINERS
[patent_app_type] => utility
[patent_app_number] => 16/128662
[patent_app_country] => US
[patent_app_date] => 2018-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5063
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16128662
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/128662 | Credential safety management for software containers | Sep 11, 2018 | Issued |