
Peter Rosenberg
Examiner (ID: 13086)
| Most Active Art Unit | 1101 |
| Art Unit(s) | 1101, 1311, 1304, 1805 |
| Total Applications | 1725 |
| Issued Applications | 1636 |
| Pending Applications | 2 |
| Abandoned Applications | 87 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11544268
[patent_doc_number] => 20170098094
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-06
[patent_title] => 'CONFIGURABLE CROSS-DOMAIN INFORMATION ASSURANCE'
[patent_app_type] => utility
[patent_app_number] => 14/876532
[patent_app_country] => US
[patent_app_date] => 2015-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10441
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14876532
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/876532 | Configurable cross-domain information assurance | Oct 5, 2015 | Issued |
Array
(
[id] => 11222636
[patent_doc_number] => 09450987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'User-based network onboarding'
[patent_app_type] => utility
[patent_app_number] => 14/868347
[patent_app_country] => US
[patent_app_date] => 2015-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12574
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14868347
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/868347 | User-based network onboarding | Sep 27, 2015 | Issued |
Array
(
[id] => 11222636
[patent_doc_number] => 09450987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'User-based network onboarding'
[patent_app_type] => utility
[patent_app_number] => 14/868347
[patent_app_country] => US
[patent_app_date] => 2015-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12574
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14868347
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/868347 | User-based network onboarding | Sep 27, 2015 | Issued |
Array
(
[id] => 11222636
[patent_doc_number] => 09450987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'User-based network onboarding'
[patent_app_type] => utility
[patent_app_number] => 14/868347
[patent_app_country] => US
[patent_app_date] => 2015-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12574
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14868347
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/868347 | User-based network onboarding | Sep 27, 2015 | Issued |
Array
(
[id] => 11222636
[patent_doc_number] => 09450987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'User-based network onboarding'
[patent_app_type] => utility
[patent_app_number] => 14/868347
[patent_app_country] => US
[patent_app_date] => 2015-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12574
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14868347
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/868347 | User-based network onboarding | Sep 27, 2015 | Issued |
Array
(
[id] => 13437309
[patent_doc_number] => 20180270197
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-20
[patent_title] => INTRUSION PREVENTION
[patent_app_type] => utility
[patent_app_number] => 15/757513
[patent_app_country] => US
[patent_app_date] => 2015-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8844
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15757513
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/757513 | Intrusion prevention | Sep 20, 2015 | Issued |
Array
(
[id] => 13394293
[patent_doc_number] => 20180248689
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-30
[patent_title] => PASSWORD GENERATION WITH KEY AND DERIVATION PARAMETER
[patent_app_type] => utility
[patent_app_number] => 15/757450
[patent_app_country] => US
[patent_app_date] => 2015-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6174
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15757450
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/757450 | Password generation with key and derivation parameter | Sep 3, 2015 | Issued |
Array
(
[id] => 11266829
[patent_doc_number] => 09491144
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'Methods and apparatus for denial of service resistant policing of packets'
[patent_app_type] => utility
[patent_app_number] => 14/842216
[patent_app_country] => US
[patent_app_date] => 2015-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 10813
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14842216
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/842216 | Methods and apparatus for denial of service resistant policing of packets | Aug 31, 2015 | Issued |
Array
(
[id] => 11947213
[patent_doc_number] => 20170251364
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-31
[patent_title] => 'Cross-layer Authentication Method based on Radio Frequency Fingerprint'
[patent_app_type] => utility
[patent_app_number] => 15/310780
[patent_app_country] => US
[patent_app_date] => 2015-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3226
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15310780
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/310780 | Cross-layer authentication method based on radio frequency fingerprint | Aug 23, 2015 | Issued |
Array
(
[id] => 12820861
[patent_doc_number] => 20180165459
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-14
[patent_title] => MODIFICATION OF DATA ELEMENTS USING A SEMANTIC RELATIONSHIP
[patent_app_type] => utility
[patent_app_number] => 15/573101
[patent_app_country] => US
[patent_app_date] => 2015-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12139
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 55
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15573101
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/573101 | Modification of data elements using a semantic relationship | Aug 13, 2015 | Issued |
Array
(
[id] => 11781083
[patent_doc_number] => 09390268
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-12
[patent_title] => 'Software program identification based on program behavior'
[patent_app_type] => utility
[patent_app_number] => 14/818271
[patent_app_country] => US
[patent_app_date] => 2015-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11824
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 268
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14818271
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/818271 | Software program identification based on program behavior | Aug 3, 2015 | Issued |
Array
(
[id] => 15859291
[patent_doc_number] => 10644951
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-05
[patent_title] => Adding metadata associated with a composite network policy
[patent_app_type] => utility
[patent_app_number] => 15/746002
[patent_app_country] => US
[patent_app_date] => 2015-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 7258
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15746002
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/746002 | Adding metadata associated with a composite network policy | Jul 21, 2015 | Issued |
Array
(
[id] => 14767235
[patent_doc_number] => 10395014
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-27
[patent_title] => Method and system for initiating a login of a user
[patent_app_type] => utility
[patent_app_number] => 15/325559
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 2857
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15325559
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/325559 | Method and system for initiating a login of a user | Jun 30, 2015 | Issued |
Array
(
[id] => 15313717
[patent_doc_number] => 10521565
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => Method and apparatus for transmitting, activating, purchasing and accessing protected content and services from connected devices
[patent_app_type] => utility
[patent_app_number] => 15/323319
[patent_app_country] => US
[patent_app_date] => 2015-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 45
[patent_figures_cnt] => 45
[patent_no_of_words] => 18505
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15323319
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/323319 | Method and apparatus for transmitting, activating, purchasing and accessing protected content and services from connected devices | Jun 29, 2015 | Issued |
Array
(
[id] => 11960449
[patent_doc_number] => 20170264601
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-14
[patent_title] => 'METHOD FOR AUTHENTICATING A USER, ASSOCIATE SYSTEM AND COMPUTER PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 15/319676
[patent_app_country] => US
[patent_app_date] => 2015-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5203
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15319676
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/319676 | METHOD FOR AUTHENTICATING A USER, ASSOCIATE SYSTEM AND COMPUTER PROGRAM | Jun 16, 2015 | Abandoned |
Array
(
[id] => 15399683
[patent_doc_number] => 10540499
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-21
[patent_title] => Method for monitoring the security of a virtual machine in a cloud computing architecture
[patent_app_type] => utility
[patent_app_number] => 15/317910
[patent_app_country] => US
[patent_app_date] => 2015-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 6474
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15317910
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/317910 | Method for monitoring the security of a virtual machine in a cloud computing architecture | Jun 9, 2015 | Issued |
Array
(
[id] => 14123859
[patent_doc_number] => 10248790
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-02
[patent_title] => Information processing system, controlling method, and controlling computer program
[patent_app_type] => utility
[patent_app_number] => 15/316667
[patent_app_country] => US
[patent_app_date] => 2015-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 9128
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15316667
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/316667 | Information processing system, controlling method, and controlling computer program | Jun 9, 2015 | Issued |
Array
(
[id] => 12236833
[patent_doc_number] => 20180069696
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-08
[patent_title] => 'ENCRYPTED DATA MANAGEMENT METHOD AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/561204
[patent_app_country] => US
[patent_app_date] => 2015-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6890
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15561204
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/561204 | ENCRYPTED DATA MANAGEMENT METHOD AND DEVICE | Jun 7, 2015 | Abandoned |
Array
(
[id] => 14203405
[patent_doc_number] => 10268820
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-23
[patent_title] => Malware determination device, malware determination system, malware determination method, and program
[patent_app_type] => utility
[patent_app_number] => 15/315903
[patent_app_country] => US
[patent_app_date] => 2015-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 8319
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15315903
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/315903 | Malware determination device, malware determination system, malware determination method, and program | Jun 7, 2015 | Issued |
Array
(
[id] => 11533832
[patent_doc_number] => 20170093812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'TOKENIZING NETWORK APPLIANCE AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/315993
[patent_app_country] => US
[patent_app_date] => 2015-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 7354
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15315993
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/315993 | Tokenizing network appliance and method | Jun 1, 2015 | Issued |