
Peter Rosenberg
Examiner (ID: 13086)
| Most Active Art Unit | 1101 |
| Art Unit(s) | 1101, 1311, 1304, 1805 |
| Total Applications | 1725 |
| Issued Applications | 1636 |
| Pending Applications | 2 |
| Abandoned Applications | 87 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12244285
[patent_doc_number] => 20180077148
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-15
[patent_title] => 'DISTRIBUTING SECURITY CODES THROUGH A RESTRICTED COMMUNICATIONS CHANNEL'
[patent_app_type] => utility
[patent_app_number] => 15/804214
[patent_app_country] => US
[patent_app_date] => 2017-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7799
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15804214
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/804214 | Distributing security codes through a restricted communications channel | Nov 5, 2017 | Issued |
Array
(
[id] => 16346648
[patent_doc_number] => 20200311299
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => SECURE IDENTITY AND PROFILING SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/759831
[patent_app_country] => US
[patent_app_date] => 2017-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13088
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16759831
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/759831 | Secure identity and profiling system | Nov 2, 2017 | Issued |
Array
(
[id] => 12187859
[patent_doc_number] => 20180046795
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-15
[patent_title] => 'PROTECTING DATA IN MEMORY OF A CONSUMABLE PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 15/790850
[patent_app_country] => US
[patent_app_date] => 2017-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4317
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15790850
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/790850 | Protecting data in memory of a consumable product | Oct 22, 2017 | Issued |
Array
(
[id] => 15671281
[patent_doc_number] => 10599873
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-24
[patent_title] => Method for rate-limiting interactions based on dynamically calculated values by supplying problems of varying difficulty to be solved
[patent_app_type] => utility
[patent_app_number] => 15/707847
[patent_app_country] => US
[patent_app_date] => 2017-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13441
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15707847
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/707847 | Method for rate-limiting interactions based on dynamically calculated values by supplying problems of varying difficulty to be solved | Sep 17, 2017 | Issued |
Array
(
[id] => 12121374
[patent_doc_number] => 20180004960
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'Systems and Methods for Security and Risk Assessment and Testing of Applications'
[patent_app_type] => utility
[patent_app_number] => 15/706408
[patent_app_country] => US
[patent_app_date] => 2017-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10938
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15706408
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/706408 | Systems and methods for security and risk assessment and testing of applications | Sep 14, 2017 | Issued |
Array
(
[id] => 13752155
[patent_doc_number] => 10169024
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-01
[patent_title] => Systems and methods for short range wireless data transfer
[patent_app_type] => utility
[patent_app_number] => 15/705446
[patent_app_country] => US
[patent_app_date] => 2017-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 6887
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15705446
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/705446 | Systems and methods for short range wireless data transfer | Sep 14, 2017 | Issued |
Array
(
[id] => 13072875
[patent_doc_number] => 10057236
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-21
[patent_title] => Method for operating a network and a network
[patent_app_type] => utility
[patent_app_number] => 15/698703
[patent_app_country] => US
[patent_app_date] => 2017-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 3
[patent_no_of_words] => 3762
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15698703
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/698703 | Method for operating a network and a network | Sep 7, 2017 | Issued |
Array
(
[id] => 12556851
[patent_doc_number] => 10015184
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-03
[patent_title] => Emulating regulating device to detect utility grid intrusions
[patent_app_type] => utility
[patent_app_number] => 15/696602
[patent_app_country] => US
[patent_app_date] => 2017-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 27503
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15696602
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/696602 | Emulating regulating device to detect utility grid intrusions | Sep 5, 2017 | Issued |
Array
(
[id] => 14302503
[patent_doc_number] => 10291392
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-14
[patent_title] => Method and system for encrypting data
[patent_app_type] => utility
[patent_app_number] => 15/687575
[patent_app_country] => US
[patent_app_date] => 2017-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3493
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15687575
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/687575 | Method and system for encrypting data | Aug 27, 2017 | Issued |
Array
(
[id] => 16049827
[patent_doc_number] => 10686806
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-16
[patent_title] => Multi-class decision system for categorizing industrial asset attack and fault types
[patent_app_type] => utility
[patent_app_number] => 15/681827
[patent_app_country] => US
[patent_app_date] => 2017-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 8558
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15681827
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/681827 | Multi-class decision system for categorizing industrial asset attack and fault types | Aug 20, 2017 | Issued |
Array
(
[id] => 15317435
[patent_doc_number] => 10523442
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => Secure inter-service communications in a cloud computing system
[patent_app_type] => utility
[patent_app_number] => 15/681535
[patent_app_country] => US
[patent_app_date] => 2017-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7343
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15681535
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/681535 | Secure inter-service communications in a cloud computing system | Aug 20, 2017 | Issued |
Array
(
[id] => 15317437
[patent_doc_number] => 10523443
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-31
[patent_title] => Devices, methods, and systems for cryptographic authentication and provenance of physical assets
[patent_app_type] => utility
[patent_app_number] => 15/681779
[patent_app_country] => US
[patent_app_date] => 2017-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 10
[patent_no_of_words] => 9092
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15681779
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/681779 | Devices, methods, and systems for cryptographic authentication and provenance of physical assets | Aug 20, 2017 | Issued |
Array
(
[id] => 15075799
[patent_doc_number] => 10467390
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-05
[patent_title] => Cyclically dependent checks for software tamper-proofing
[patent_app_type] => utility
[patent_app_number] => 15/680852
[patent_app_country] => US
[patent_app_date] => 2017-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 6748
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15680852
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/680852 | Cyclically dependent checks for software tamper-proofing | Aug 17, 2017 | Issued |
Array
(
[id] => 16463040
[patent_doc_number] => 10846389
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-24
[patent_title] => Incorporating risk-based decision in standard authentication and authorization systems
[patent_app_type] => utility
[patent_app_number] => 15/654096
[patent_app_country] => US
[patent_app_date] => 2017-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6814
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15654096
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/654096 | Incorporating risk-based decision in standard authentication and authorization systems | Jul 18, 2017 | Issued |
Array
(
[id] => 15399663
[patent_doc_number] => 10540489
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-21
[patent_title] => Authentication using multiple images of user from different angles
[patent_app_type] => utility
[patent_app_number] => 15/653783
[patent_app_country] => US
[patent_app_date] => 2017-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 11
[patent_no_of_words] => 4905
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15653783
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/653783 | Authentication using multiple images of user from different angles | Jul 18, 2017 | Issued |
Array
(
[id] => 12155729
[patent_doc_number] => 20180026994
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-25
[patent_title] => 'NETWORK ATTACK DEFENSE SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/653157
[patent_app_country] => US
[patent_app_date] => 2017-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7917
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15653157
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/653157 | Network attack defense system and method | Jul 17, 2017 | Issued |
Array
(
[id] => 12140382
[patent_doc_number] => 20180018465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-18
[patent_title] => 'SYSTEM AND METHOD FOR IDENTIFYING NETWORK SECURITY THREATS AND ASSESSING NETWORK SECURITY'
[patent_app_type] => utility
[patent_app_number] => 15/653293
[patent_app_country] => US
[patent_app_date] => 2017-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 14009
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15653293
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/653293 | System and method for identifying network security threats and assessing network security | Jul 17, 2017 | Issued |
Array
(
[id] => 14957443
[patent_doc_number] => 10440009
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-08
[patent_title] => Cross-device user identification and content access control using cookie stitchers
[patent_app_type] => utility
[patent_app_number] => 15/652889
[patent_app_country] => US
[patent_app_date] => 2017-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10728
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15652889
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/652889 | Cross-device user identification and content access control using cookie stitchers | Jul 17, 2017 | Issued |
Array
(
[id] => 12026088
[patent_doc_number] => 20170316187
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-02
[patent_title] => 'Systems and Methods for Creating and Sharing Protected Content'
[patent_app_type] => utility
[patent_app_number] => 15/649896
[patent_app_country] => US
[patent_app_date] => 2017-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6812
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15649896
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/649896 | Systems and Methods for Creating and Sharing Protected Content | Jul 13, 2017 | Abandoned |
Array
(
[id] => 12537552
[patent_doc_number] => 10009385
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-26
[patent_title] => Method and system for managing security policies
[patent_app_type] => utility
[patent_app_number] => 15/629170
[patent_app_country] => US
[patent_app_date] => 2017-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14105
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 667
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15629170
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/629170 | Method and system for managing security policies | Jun 20, 2017 | Issued |