
Peter Rosenberg
Examiner (ID: 13086)
| Most Active Art Unit | 1101 |
| Art Unit(s) | 1101, 1311, 1304, 1805 |
| Total Applications | 1725 |
| Issued Applications | 1636 |
| Pending Applications | 2 |
| Abandoned Applications | 87 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15534117
[patent_doc_number] => 20200059365
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-20
[patent_title] => COMMUNICATION NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/610058
[patent_app_country] => US
[patent_app_date] => 2018-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4442
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 62
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16610058
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/610058 | COMMUNICATION NETWORK | Apr 30, 2018 | Abandoned |
Array
(
[id] => 16165317
[patent_doc_number] => 20200220891
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-09
[patent_title] => DEVICE FOR MANAGING UTILIZED SERVICE
[patent_app_type] => utility
[patent_app_number] => 16/608491
[patent_app_country] => US
[patent_app_date] => 2018-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5353
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -1
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16608491
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/608491 | Device for managing utilized service | Apr 23, 2018 | Issued |
Array
(
[id] => 14918927
[patent_doc_number] => 10430786
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-01
[patent_title] => Enhanced certificate authority
[patent_app_type] => utility
[patent_app_number] => 15/953806
[patent_app_country] => US
[patent_app_date] => 2018-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 37
[patent_no_of_words] => 17191
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15953806
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/953806 | Enhanced certificate authority | Apr 15, 2018 | Issued |
Array
(
[id] => 15720843
[patent_doc_number] => 20200107189
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-02
[patent_title] => WIRELESS TELECOMMUNICATIONS APPARATUS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 16/498476
[patent_app_country] => US
[patent_app_date] => 2018-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14681
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16498476
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/498476 | Wireless telecommunications apparatus and methods | Mar 26, 2018 | Issued |
Array
(
[id] => 13526597
[patent_doc_number] => 20180314841
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED ACCESS TO RESOURCES OF AN INFORMATION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/928359
[patent_app_country] => US
[patent_app_date] => 2018-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18521
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15928359
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/928359 | Systems and methods for prevention of unauthorized access to resources of an information system | Mar 21, 2018 | Issued |
Array
(
[id] => 16593198
[patent_doc_number] => 10902469
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-01-26
[patent_title] => Provision of content through publicly accessible computer devices
[patent_app_type] => utility
[patent_app_number] => 15/928677
[patent_app_country] => US
[patent_app_date] => 2018-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7335
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15928677
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/928677 | Provision of content through publicly accessible computer devices | Mar 21, 2018 | Issued |
Array
(
[id] => 15445015
[patent_doc_number] => 20200036691
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => SECURE DATA EXCHANGE
[patent_app_type] => utility
[patent_app_number] => 16/493276
[patent_app_country] => US
[patent_app_date] => 2018-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13560
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16493276
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/493276 | Secure data exchange | Mar 15, 2018 | Issued |
Array
(
[id] => 17909361
[patent_doc_number] => 11463235
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-04
[patent_title] => Encryption device, encryption method, program, decryption device, and decryption method
[patent_app_type] => utility
[patent_app_number] => 16/970742
[patent_app_country] => US
[patent_app_date] => 2018-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9526
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16970742
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/970742 | Encryption device, encryption method, program, decryption device, and decryption method | Feb 20, 2018 | Issued |
Array
(
[id] => 13376731
[patent_doc_number] => 20180239907
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-23
[patent_title] => CHECKING METHOD, CHECKING SYSTEM AND CHECKING DEVICE FOR PROCESSOR SECURITY
[patent_app_type] => utility
[patent_app_number] => 15/894042
[patent_app_country] => US
[patent_app_date] => 2018-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8381
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15894042
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/894042 | Checking method, checking system and checking device for processor security | Feb 11, 2018 | Issued |
Array
(
[id] => 14150115
[patent_doc_number] => 10255439
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-09
[patent_title] => Threat modeling systems and related methods including compensating controls
[patent_app_type] => utility
[patent_app_number] => 15/888021
[patent_app_country] => US
[patent_app_date] => 2018-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 13257
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 284
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15888021
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/888021 | Threat modeling systems and related methods including compensating controls | Feb 2, 2018 | Issued |
Array
(
[id] => 14628469
[patent_doc_number] => 20190227602
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-07-25
[patent_title] => CLASP WITH INTEGRATED BIOMETRIC SENSOR TO AUTHENTICATE A USER OF A DUAL-HOUSING DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/878975
[patent_app_country] => US
[patent_app_date] => 2018-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12031
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15878975
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/878975 | Clasp with integrated biometric sensor to authenticate a user of a dual-housing device | Jan 23, 2018 | Issued |
Array
(
[id] => 16281263
[patent_doc_number] => 10764313
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-09-01
[patent_title] => Method and system for protection against network-based cyber threats
[patent_app_type] => utility
[patent_app_number] => 15/878792
[patent_app_country] => US
[patent_app_date] => 2018-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 24237
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15878792
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/878792 | Method and system for protection against network-based cyber threats | Jan 23, 2018 | Issued |
Array
(
[id] => 13526609
[patent_doc_number] => 20180314847
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => Encrypted Search Cloud Service with Cryptographic Sharing
[patent_app_type] => utility
[patent_app_number] => 15/878871
[patent_app_country] => US
[patent_app_date] => 2018-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 45526
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -25
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15878871
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/878871 | Encrypted search cloud service with cryptographic sharing | Jan 23, 2018 | Issued |
Array
(
[id] => 16187928
[patent_doc_number] => 10721275
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-21
[patent_title] => Automated enforcement of security policies in cloud and hybrid infrastructure environments
[patent_app_type] => utility
[patent_app_number] => 15/878386
[patent_app_country] => US
[patent_app_date] => 2018-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 22928
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15878386
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/878386 | Automated enforcement of security policies in cloud and hybrid infrastructure environments | Jan 22, 2018 | Issued |
Array
(
[id] => 15731261
[patent_doc_number] => 10614059
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-04-07
[patent_title] => Shadow tagging to evaluate content review policy changes
[patent_app_type] => utility
[patent_app_number] => 15/862709
[patent_app_country] => US
[patent_app_date] => 2018-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7769
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15862709
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/862709 | Shadow tagging to evaluate content review policy changes | Jan 4, 2018 | Issued |
Array
(
[id] => 15301797
[patent_doc_number] => 20190394034
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-26
[patent_title] => Method and Programmable Hardware Security Module
[patent_app_type] => utility
[patent_app_number] => 16/484015
[patent_app_country] => US
[patent_app_date] => 2017-12-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4821
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16484015
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/484015 | Method and programmable hardware security module | Dec 27, 2017 | Issued |
Array
(
[id] => 13100999
[patent_doc_number] => 10069852
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-04
[patent_title] => Detection of computerized bots and automated cyber-attack modules
[patent_app_type] => utility
[patent_app_number] => 15/840035
[patent_app_country] => US
[patent_app_date] => 2017-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 26612
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15840035
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/840035 | Detection of computerized bots and automated cyber-attack modules | Dec 12, 2017 | Issued |
Array
(
[id] => 15374033
[patent_doc_number] => 10528737
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-07
[patent_title] => Randomized heap allocation
[patent_app_type] => utility
[patent_app_number] => 15/834588
[patent_app_country] => US
[patent_app_date] => 2017-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 5
[patent_no_of_words] => 4624
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15834588
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/834588 | Randomized heap allocation | Dec 6, 2017 | Issued |
Array
(
[id] => 15490171
[patent_doc_number] => 10560456
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-11
[patent_title] => Method, apparatus, and system for collecting access control list
[patent_app_type] => utility
[patent_app_number] => 15/829966
[patent_app_country] => US
[patent_app_date] => 2017-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 17
[patent_no_of_words] => 23652
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15829966
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/829966 | Method, apparatus, and system for collecting access control list | Dec 2, 2017 | Issued |
Array
(
[id] => 13097533
[patent_doc_number] => 10068109
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-04
[patent_title] => Secure subsystem
[patent_app_type] => utility
[patent_app_number] => 15/829718
[patent_app_country] => US
[patent_app_date] => 2017-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7632
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15829718
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/829718 | Secure subsystem | Nov 30, 2017 | Issued |