
Peter Rosenberg
Examiner (ID: 13086)
| Most Active Art Unit | 1101 |
| Art Unit(s) | 1101, 1311, 1304, 1805 |
| Total Applications | 1725 |
| Issued Applications | 1636 |
| Pending Applications | 2 |
| Abandoned Applications | 87 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16637042
[patent_doc_number] => 10915552
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-09
[patent_title] => Delegating credentials with a blockchain member service
[patent_app_type] => utility
[patent_app_number] => 16/021333
[patent_app_country] => US
[patent_app_date] => 2018-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7777
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16021333
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/021333 | Delegating credentials with a blockchain member service | Jun 27, 2018 | Issued |
Array
(
[id] => 13907083
[patent_doc_number] => 20190042746
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-07
[patent_title] => METHODS, SYSTEMS AND APPARATUS TO DETECT POLYMORPHIC MALWARE
[patent_app_type] => utility
[patent_app_number] => 16/021411
[patent_app_country] => US
[patent_app_date] => 2018-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6218
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16021411
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/021411 | Methods, systems and apparatus to detect polymorphic malware | Jun 27, 2018 | Issued |
Array
(
[id] => 14560593
[patent_doc_number] => 10348774
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Method and system for managing security policies
[patent_app_type] => utility
[patent_app_number] => 16/017301
[patent_app_country] => US
[patent_app_date] => 2018-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14150
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 670
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16017301
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/017301 | Method and system for managing security policies | Jun 24, 2018 | Issued |
Array
(
[id] => 16248508
[patent_doc_number] => 10747871
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-18
[patent_title] => System and method for producing secure data management software
[patent_app_type] => utility
[patent_app_number] => 16/013949
[patent_app_country] => US
[patent_app_date] => 2018-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8188
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16013949
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/013949 | System and method for producing secure data management software | Jun 20, 2018 | Issued |
Array
(
[id] => 16232905
[patent_doc_number] => 10740457
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-11
[patent_title] => System for preventing malicious operator placement in streaming applications
[patent_app_type] => utility
[patent_app_number] => 16/013796
[patent_app_country] => US
[patent_app_date] => 2018-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 5026
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16013796
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/013796 | System for preventing malicious operator placement in streaming applications | Jun 19, 2018 | Issued |
Array
(
[id] => 16494698
[patent_doc_number] => 10860741
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-08
[patent_title] => Telecommunication privacy protection using a high-level programming interface
[patent_app_type] => utility
[patent_app_number] => 16/013655
[patent_app_country] => US
[patent_app_date] => 2018-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 14128
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16013655
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/013655 | Telecommunication privacy protection using a high-level programming interface | Jun 19, 2018 | Issued |
Array
(
[id] => 16250504
[patent_doc_number] => 10749890
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-08-18
[patent_title] => Systems and methods for improving the ranking and prioritization of attack-related events
[patent_app_type] => utility
[patent_app_number] => 16/012651
[patent_app_country] => US
[patent_app_date] => 2018-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6535
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16012651
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/012651 | Systems and methods for improving the ranking and prioritization of attack-related events | Jun 18, 2018 | Issued |
Array
(
[id] => 16522376
[patent_doc_number] => 10873604
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-22
[patent_title] => Methods and systems for reconfiguring network devices
[patent_app_type] => utility
[patent_app_number] => 16/012670
[patent_app_country] => US
[patent_app_date] => 2018-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8366
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16012670
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/012670 | Methods and systems for reconfiguring network devices | Jun 18, 2018 | Issued |
Array
(
[id] => 16826645
[patent_doc_number] => 20210141938
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-13
[patent_title] => SHARING RIGHTS TO CONTROL ASPECTS OF AN ELECTRONIC MESSAGE
[patent_app_type] => utility
[patent_app_number] => 17/041985
[patent_app_country] => US
[patent_app_date] => 2018-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11649
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17041985
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/041985 | Sharing rights to control aspects of an electronic message | Jun 11, 2018 | Issued |
Array
(
[id] => 13665631
[patent_doc_number] => 10162980
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-25
[patent_title] => Merged permission modes
[patent_app_type] => utility
[patent_app_number] => 16/004208
[patent_app_country] => US
[patent_app_date] => 2018-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 15885
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16004208
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/004208 | Merged permission modes | Jun 7, 2018 | Issued |
Array
(
[id] => 15220559
[patent_doc_number] => 20190372966
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => ALTERNATE USER COMMUNICATION ROUTING FOR A ONE-TIME CREDENTIAL
[patent_app_type] => utility
[patent_app_number] => 15/995831
[patent_app_country] => US
[patent_app_date] => 2018-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13034
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15995831
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/995831 | Alternate user communication routing for a one-time credential | May 31, 2018 | Issued |
Array
(
[id] => 15220665
[patent_doc_number] => 20190373019
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => ALTERNATE DISPLAY GENERATION BASED ON USER IDENTIFICATION
[patent_app_type] => utility
[patent_app_number] => 15/995837
[patent_app_country] => US
[patent_app_date] => 2018-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12774
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15995837
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/995837 | Alternate display generation based on user identification | May 31, 2018 | Issued |
Array
(
[id] => 16325238
[patent_doc_number] => 10785220
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-22
[patent_title] => Alternate user communication routing
[patent_app_type] => utility
[patent_app_number] => 15/995830
[patent_app_country] => US
[patent_app_date] => 2018-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 10438
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15995830
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/995830 | Alternate user communication routing | May 31, 2018 | Issued |
Array
(
[id] => 14967341
[patent_doc_number] => 20190311149
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-10
[patent_title] => DETECTING ATTACKS ON DATABASES BASED ON TRANSACTION CHARACTERISTICS DETERMINED FROM ANALYZING DATABASE LOGS
[patent_app_type] => utility
[patent_app_number] => 15/995123
[patent_app_country] => US
[patent_app_date] => 2018-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8705
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15995123
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/995123 | Detecting attacks on databases based on transaction characteristics determined from analyzing database logs | May 30, 2018 | Issued |
Array
(
[id] => 16880178
[patent_doc_number] => 11030328
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-08
[patent_title] => Cryptographic object management across multiple remote sites
[patent_app_type] => utility
[patent_app_number] => 15/992993
[patent_app_country] => US
[patent_app_date] => 2018-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6827
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15992993
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/992993 | Cryptographic object management across multiple remote sites | May 29, 2018 | Issued |
Array
(
[id] => 16387595
[patent_doc_number] => 10812450
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-20
[patent_title] => Protecting the integrity and privacy of data shared over a remote connection from risks in the remote environment
[patent_app_type] => utility
[patent_app_number] => 15/992984
[patent_app_country] => US
[patent_app_date] => 2018-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9503
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15992984
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/992984 | Protecting the integrity and privacy of data shared over a remote connection from risks in the remote environment | May 29, 2018 | Issued |
Array
(
[id] => 18448091
[patent_doc_number] => 11683681
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-06-20
[patent_title] => Uplink small data transmission in inactive state
[patent_app_type] => utility
[patent_app_number] => 16/607299
[patent_app_country] => US
[patent_app_date] => 2018-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 20
[patent_no_of_words] => 12746
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16607299
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/607299 | Uplink small data transmission in inactive state | May 22, 2018 | Issued |
Array
(
[id] => 16227684
[patent_doc_number] => 20200252801
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-06
[patent_title] => METHOD FOR DELEGATING ACCESS RIGHTS
[patent_app_type] => utility
[patent_app_number] => 16/626055
[patent_app_country] => US
[patent_app_date] => 2018-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7678
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16626055
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/626055 | Method for delegating access rights | May 13, 2018 | Issued |
Array
(
[id] => 14432051
[patent_doc_number] => 10320847
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-11
[patent_title] => User-based network onboarding
[patent_app_type] => utility
[patent_app_number] => 15/977310
[patent_app_country] => US
[patent_app_date] => 2018-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11080
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15977310
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/977310 | User-based network onboarding | May 10, 2018 | Issued |
Array
(
[id] => 13404031
[patent_doc_number] => 20180253558
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-06
[patent_title] => METHOD AND SYSTEM FOR IDENTIFICATION OF SECURITY VULNERABILITIES
[patent_app_type] => utility
[patent_app_number] => 15/971169
[patent_app_country] => US
[patent_app_date] => 2018-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6979
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -36
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15971169
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/971169 | Method and system for identification of security vulnerabilities | May 3, 2018 | Issued |