
Oleg Korsak
Examiner (ID: 5103, Phone: (571)270-1938 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2492 |
| Total Applications | 1065 |
| Issued Applications | 870 |
| Pending Applications | 110 |
| Abandoned Applications | 136 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16123667
[patent_doc_number] => 20200213856
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-02
[patent_title] => METHOD AND A DEVICE FOR SECURITY MONITORING OF A WIFI NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/809584
[patent_app_country] => US
[patent_app_date] => 2020-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7476
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 58
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16809584
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/809584 | METHOD AND A DEVICE FOR SECURITY MONITORING OF A WIFI NETWORK | Mar 4, 2020 | Abandoned |
Array
(
[id] => 17530907
[patent_doc_number] => 11303623
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-12
[patent_title] => Authentication mechanism
[patent_app_type] => utility
[patent_app_number] => 16/807023
[patent_app_country] => US
[patent_app_date] => 2020-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 14
[patent_no_of_words] => 10323
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16807023
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/807023 | Authentication mechanism | Mar 1, 2020 | Issued |
Array
(
[id] => 17607959
[patent_doc_number] => 11336454
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-17
[patent_title] => Systems and methods for cryptographic authentication of contactless cards
[patent_app_type] => utility
[patent_app_number] => 16/802167
[patent_app_country] => US
[patent_app_date] => 2020-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 19977
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16802167
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/802167 | Systems and methods for cryptographic authentication of contactless cards | Feb 25, 2020 | Issued |
Array
(
[id] => 17529157
[patent_doc_number] => 11301848
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-12
[patent_title] => Systems and methods for secure transaction approval
[patent_app_type] => utility
[patent_app_number] => 16/794499
[patent_app_country] => US
[patent_app_date] => 2020-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 19774
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16794499
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/794499 | Systems and methods for secure transaction approval | Feb 18, 2020 | Issued |
Array
(
[id] => 16019239
[patent_doc_number] => 20200184463
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-11
[patent_title] => SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
[patent_app_type] => utility
[patent_app_number] => 16/794430
[patent_app_country] => US
[patent_app_date] => 2020-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23672
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16794430
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/794430 | Systems and methods for phone-based card activation | Feb 18, 2020 | Issued |
Array
(
[id] => 17517876
[patent_doc_number] => 11297046
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-05
[patent_title] => Systems and methods for cryptographic authentication of contactless cards
[patent_app_type] => utility
[patent_app_number] => 16/791551
[patent_app_country] => US
[patent_app_date] => 2020-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 21132
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16791551
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/791551 | Systems and methods for cryptographic authentication of contactless cards | Feb 13, 2020 | Issued |
Array
(
[id] => 16023433
[patent_doc_number] => 20200186560
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-11
[patent_title] => SYSTEM AND METHOD FOR TIME BASED ANOMALY DETECTION IN AN IN-VEHICLE COMMUNICATION NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/789445
[patent_app_country] => US
[patent_app_date] => 2020-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 37593
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 49
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16789445
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/789445 | System and method for time based anomaly detection in an in-vehicle communication | Feb 12, 2020 | Issued |
Array
(
[id] => 16181363
[patent_doc_number] => 20200228332
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-16
[patent_title] => SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
[patent_app_type] => utility
[patent_app_number] => 16/781571
[patent_app_country] => US
[patent_app_date] => 2020-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20905
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16781571
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/781571 | Systems and methods of key selection for cryptographic authentication of contactless cards | Feb 3, 2020 | Issued |
Array
(
[id] => 15971655
[patent_doc_number] => 20200169579
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-28
[patent_title] => DETECTION OF POTENTIAL SECURITY THREATS IN MACHINE DATA BASED ON PATTERN DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/777544
[patent_app_country] => US
[patent_app_date] => 2020-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13988
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16777544
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/777544 | Detection of potential security threats in machine data based on pattern detection | Jan 29, 2020 | Issued |
Array
(
[id] => 18218583
[patent_doc_number] => 11593525
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-02-28
[patent_title] => Portable policy execution using embedded machines
[patent_app_type] => utility
[patent_app_number] => 16/773923
[patent_app_country] => US
[patent_app_date] => 2020-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 17
[patent_no_of_words] => 20806
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16773923
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/773923 | Portable policy execution using embedded machines | Jan 26, 2020 | Issued |
Array
(
[id] => 16890082
[patent_doc_number] => 20210176280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-10
[patent_title] => GENERATION OF CODE EXECUTABLE TO IMPLEMENT A DATA REPLICATION POLICY BASED ON USER INPUT
[patent_app_type] => utility
[patent_app_number] => 16/747342
[patent_app_country] => US
[patent_app_date] => 2020-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9349
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16747342
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/747342 | GENERATION OF CODE EXECUTABLE TO IMPLEMENT A DATA REPLICATION POLICY BASED ON USER INPUT | Jan 19, 2020 | Abandoned |
Array
(
[id] => 16101127
[patent_doc_number] => 20200204550
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-25
[patent_title] => SYSTEMS AND METHODS FOR ENDPOINT MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/741858
[patent_app_country] => US
[patent_app_date] => 2020-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7914
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16741858
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/741858 | Systems and methods for endpoint management | Jan 13, 2020 | Issued |
Array
(
[id] => 19047649
[patent_doc_number] => 11936777
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-03-19
[patent_title] => Method, device of secret-key provisioning and computer-readable storage medium thereof
[patent_app_type] => utility
[patent_app_number] => 16/739369
[patent_app_country] => US
[patent_app_date] => 2020-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 7772
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 715
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16739369
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/739369 | Method, device of secret-key provisioning and computer-readable storage medium thereof | Jan 9, 2020 | Issued |
Array
(
[id] => 15876007
[patent_doc_number] => 20200145407
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => EMULATION OF FEDERATIVE AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/736988
[patent_app_country] => US
[patent_app_date] => 2020-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3967
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16736988
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/736988 | Emulation of federative authentication | Jan 7, 2020 | Issued |
Array
(
[id] => 15903637
[patent_doc_number] => 20200151338
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => PROTECTING COMPUTING DEVICES FROM UNAUTHORIZED ACCESS
[patent_app_type] => utility
[patent_app_number] => 16/732238
[patent_app_country] => US
[patent_app_date] => 2019-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9930
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16732238
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/732238 | Methods for creating a computer-implemented virtual machine manager | Dec 30, 2019 | Issued |
Array
(
[id] => 19261821
[patent_doc_number] => 12021898
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-06-25
[patent_title] => Processes and systems that translate policies in a distributed computing system using a distributed indexing engine
[patent_app_type] => utility
[patent_app_number] => 16/713025
[patent_app_country] => US
[patent_app_date] => 2019-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 10305
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16713025
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/713025 | Processes and systems that translate policies in a distributed computing system using a distributed indexing engine | Dec 12, 2019 | Issued |
Array
(
[id] => 16882124
[patent_doc_number] => 11032290
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-08
[patent_title] => Context-based analytics and intelligence
[patent_app_type] => utility
[patent_app_number] => 16/714625
[patent_app_country] => US
[patent_app_date] => 2019-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12454
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16714625
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/714625 | Context-based analytics and intelligence | Dec 12, 2019 | Issued |
Array
(
[id] => 15690075
[patent_doc_number] => 20200099701
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-26
[patent_title] => Method and System for Forensic Data Tracking
[patent_app_type] => utility
[patent_app_number] => 16/695949
[patent_app_country] => US
[patent_app_date] => 2019-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20371
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16695949
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/695949 | Method and system for forensic data tracking | Nov 25, 2019 | Issued |
Array
(
[id] => 18054893
[patent_doc_number] => 11528291
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-12-13
[patent_title] => Methods and apparatus for defending against exploitation of vulnerable software
[patent_app_type] => utility
[patent_app_number] => 16/694714
[patent_app_country] => US
[patent_app_date] => 2019-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 12450
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16694714
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/694714 | Methods and apparatus for defending against exploitation of vulnerable software | Nov 24, 2019 | Issued |
Array
(
[id] => 18671044
[patent_doc_number] => 11777966
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-03
[patent_title] => Systems and methods for causation analysis of network traffic anomalies and security threats
[patent_app_type] => utility
[patent_app_number] => 16/693884
[patent_app_country] => US
[patent_app_date] => 2019-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12066
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16693884
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/693884 | Systems and methods for causation analysis of network traffic anomalies and security threats | Nov 24, 2019 | Issued |