
Peter Rosenberg
Examiner (ID: 13086)
| Most Active Art Unit | 1101 |
| Art Unit(s) | 1101, 1311, 1304, 1805 |
| Total Applications | 1725 |
| Issued Applications | 1636 |
| Pending Applications | 2 |
| Abandoned Applications | 87 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12169251
[patent_doc_number] => 09888027
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-06
[patent_title] => 'Security risk mapping of potential targets'
[patent_app_type] => utility
[patent_app_number] => 15/396702
[patent_app_country] => US
[patent_app_date] => 2017-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6608
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15396702
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/396702 | Security risk mapping of potential targets | Jan 1, 2017 | Issued |
Array
(
[id] => 14678451
[patent_doc_number] => 20190238340
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => METHOD, APPARATUS, NODE, SIGNATURE DEVICE AND SYSTEM FOR GENERATING BLOCK OF BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 16/315571
[patent_app_country] => US
[patent_app_date] => 2016-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9193
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16315571
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/315571 | Method, apparatus, node, signature device and system for generating block of blockchain | Dec 22, 2016 | Issued |
Array
(
[id] => 12373998
[patent_doc_number] => 09959554
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-01
[patent_title] => Provision of content through publicly accessible computer devices
[patent_app_type] => utility
[patent_app_number] => 15/376640
[patent_app_country] => US
[patent_app_date] => 2016-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7338
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 37
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15376640
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/376640 | Provision of content through publicly accessible computer devices | Dec 11, 2016 | Issued |
Array
(
[id] => 11861151
[patent_doc_number] => 09740835
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-22
[patent_title] => 'Systems and methods for creating and sharing protected content'
[patent_app_type] => utility
[patent_app_number] => 15/375237
[patent_app_country] => US
[patent_app_date] => 2016-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 6851
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15375237
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/375237 | Systems and methods for creating and sharing protected content | Dec 11, 2016 | Issued |
Array
(
[id] => 16373845
[patent_doc_number] => 10805626
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-13
[patent_title] => Broadcast system with a watermark payload
[patent_app_type] => utility
[patent_app_number] => 15/781533
[patent_app_country] => US
[patent_app_date] => 2016-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 33
[patent_no_of_words] => 13825
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 247
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15781533
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/781533 | Broadcast system with a watermark payload | Dec 7, 2016 | Issued |
Array
(
[id] => 14269831
[patent_doc_number] => 10284493
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Accessing a cloud-based service using a communication device linked to another communication device via a peer-to-peer ad hoc communication link
[patent_app_type] => utility
[patent_app_number] => 15/364071
[patent_app_country] => US
[patent_app_date] => 2016-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4928
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15364071
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/364071 | Accessing a cloud-based service using a communication device linked to another communication device via a peer-to-peer ad hoc communication link | Nov 28, 2016 | Issued |
Array
(
[id] => 11494632
[patent_doc_number] => 20170068817
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-09
[patent_title] => 'COMMUNICATION WITH A VIRTUAL TRUSTED RUNTIME BIOS'
[patent_app_type] => utility
[patent_app_number] => 15/357805
[patent_app_country] => US
[patent_app_date] => 2016-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4830
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15357805
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/357805 | Communication with a virtual trusted runtime BIOS | Nov 20, 2016 | Issued |
Array
(
[id] => 11461248
[patent_doc_number] => 20170055154
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'AUTHENTICATION OF USER COMPUTERS'
[patent_app_type] => utility
[patent_app_number] => 15/345929
[patent_app_country] => US
[patent_app_date] => 2016-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11410
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15345929
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/345929 | Authentication of user computers | Nov 7, 2016 | Issued |
Array
(
[id] => 11447206
[patent_doc_number] => 20170048227
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'Pre-Delivery Authentication'
[patent_app_type] => utility
[patent_app_number] => 15/338328
[patent_app_country] => US
[patent_app_date] => 2016-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12515
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15338328
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/338328 | Pre-delivery authentication | Oct 28, 2016 | Issued |
Array
(
[id] => 11651609
[patent_doc_number] => 20170147510
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-25
[patent_title] => 'SYSTEM AND METHOD FOR DETERRING MALICIOUS NETWORK ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 15/336478
[patent_app_country] => US
[patent_app_date] => 2016-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8160
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15336478
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/336478 | System and method for deterring malicious network attacks | Oct 26, 2016 | Issued |
Array
(
[id] => 13545231
[patent_doc_number] => 20180324163
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-08
[patent_title] => METHOD FOR VERIFYING IDENTITY DURING VIRTUALIZATION
[patent_app_type] => utility
[patent_app_number] => 15/773396
[patent_app_country] => US
[patent_app_date] => 2016-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5692
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15773396
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/773396 | Method for verifying identity during virtualization | Oct 19, 2016 | Issued |
Array
(
[id] => 13512609
[patent_doc_number] => 20180307847
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-25
[patent_title] => SELECTIVE ENCODING METHOD AND ELECTRONIC DEVICE USING SAME
[patent_app_type] => utility
[patent_app_number] => 15/769666
[patent_app_country] => US
[patent_app_date] => 2016-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14795
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15769666
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/769666 | Selective encoding method and electronic device using same | Oct 17, 2016 | Issued |
Array
(
[id] => 11426034
[patent_doc_number] => 20170034180
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'ALLOWING FIRST MODULE OF COMPUTER CODE TO MAKE USE OF SERVICE PROVIDED BY SECOND MODULE WHILE ENSURING SECURITY OF SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/290791
[patent_app_country] => US
[patent_app_date] => 2016-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9772
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15290791
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/290791 | Allowing first module of computer code to make use of service provided by second module while ensuring security of system | Oct 10, 2016 | Issued |
Array
(
[id] => 13530309
[patent_doc_number] => 20180316697
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => METHOD OF AIDING THE DETECTION OF INFECTION OF A TERMINAL BY MALWARE
[patent_app_type] => utility
[patent_app_number] => 15/769579
[patent_app_country] => US
[patent_app_date] => 2016-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8508
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15769579
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/769579 | Method of aiding the detection of infection of a terminal by malware | Oct 9, 2016 | Issued |
Array
(
[id] => 12629547
[patent_doc_number] => 20180101679
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-12
[patent_title] => DETECTION OF KEY LOGGING ACTIVITY
[patent_app_type] => utility
[patent_app_number] => 15/287894
[patent_app_country] => US
[patent_app_date] => 2016-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3149
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15287894
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/287894 | Detection of key logging activity | Oct 6, 2016 | Issued |
Array
(
[id] => 11545482
[patent_doc_number] => 20170099307
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-06
[patent_title] => 'SYSTEMS AND METHODS FOR INSTRUCTIONS-BASED DETECTION OF SOPHISTICATED OBFUSCATION AND PACKING'
[patent_app_type] => utility
[patent_app_number] => 15/287705
[patent_app_country] => US
[patent_app_date] => 2016-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4837
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15287705
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/287705 | Systems and methods for instructions-based detection of sophisticated obfuscation and packing | Oct 5, 2016 | Issued |
Array
(
[id] => 11405844
[patent_doc_number] => 20170026382
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'DEVICE MANAGEMENT SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/286434
[patent_app_country] => US
[patent_app_date] => 2016-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11311
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15286434
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/286434 | Device management system | Oct 4, 2016 | Issued |
Array
(
[id] => 14556277
[patent_doc_number] => 10346600
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Interface of an automation system
[patent_app_type] => utility
[patent_app_number] => 15/268607
[patent_app_country] => US
[patent_app_date] => 2016-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6132
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15268607
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/268607 | Interface of an automation system | Sep 17, 2016 | Issued |
Array
(
[id] => 13978275
[patent_doc_number] => 10218512
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-26
[patent_title] => Robot mitigation
[patent_app_type] => utility
[patent_app_number] => 15/260802
[patent_app_country] => US
[patent_app_date] => 2016-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10293
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15260802
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/260802 | Robot mitigation | Sep 8, 2016 | Issued |
Array
(
[id] => 13407121
[patent_doc_number] => 20180255103
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-06
[patent_title] => METADATA SUPPORTING CYBER CONTENT SHARING AND GOVERNANCE AND APPLICATION METHOD THEREOF
[patent_app_type] => utility
[patent_app_number] => 15/560987
[patent_app_country] => US
[patent_app_date] => 2016-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6298
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 268
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15560987
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/560987 | Metadata supporting cyber content sharing and governance and application method thereof | Sep 8, 2016 | Issued |