Search

Richard E. Gluck

Examiner (ID: 13857)

Most Active Art Unit
3403
Art Unit(s)
3403, 2899, 3505, 3402, SIR, 3504, 3746
Total Applications
862
Issued Applications
739
Pending Applications
25
Abandoned Applications
98

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20617008 [patent_doc_number] => 20260087107 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-03-26 [patent_title] => MARKING ATTRIBUTION DATA IN GENERATED CONTENT [patent_app_type] => utility [patent_app_number] => 19/406759 [patent_app_country] => US [patent_app_date] => 2025-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 39321 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19406759 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/406759
MARKING ATTRIBUTION DATA IN GENERATED CONTENT Dec 1, 2025 Pending
Array ( [id] => 20018271 [patent_doc_number] => 20250156493 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-05-15 [patent_title] => SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION MANAGEMENT ACROSS DISPARATE INFORMATION SYSTEMS [patent_app_type] => utility [patent_app_number] => 19/023257 [patent_app_country] => US [patent_app_date] => 2025-01-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11867 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19023257 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/023257
SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION MANAGEMENT ACROSS DISPARATE INFORMATION SYSTEMS Jan 14, 2025 Pending
Array ( [id] => 20195690 [patent_doc_number] => 20250272400 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-08-28 [patent_title] => SYSTEMS AND METHODS FOR DETECTING AND ENFORCING COMPUTER RUNTIME SECURITY [patent_app_type] => utility [patent_app_number] => 19/007587 [patent_app_country] => US [patent_app_date] => 2025-01-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3625 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19007587 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/007587
SYSTEMS AND METHODS FOR DETECTING AND ENFORCING COMPUTER RUNTIME SECURITY Jan 1, 2025 Pending
Array ( [id] => 20045906 [patent_doc_number] => 20250184128 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-05 [patent_title] => METHODS AND APPARATUS FOR KEY REGENERATION [patent_app_type] => utility [patent_app_number] => 19/005177 [patent_app_country] => US [patent_app_date] => 2024-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1209 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19005177 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/005177
METHODS AND APPARATUS FOR KEY REGENERATION Dec 29, 2024 Pending
Array ( [id] => 20055442 [patent_doc_number] => 20250193664 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-12 [patent_title] => ACCESS POINT OR ROUTER-BASED ROTATION AND EXCHANGE OF DATA ENCRYPTION/DECRYPTION KEYS [patent_app_type] => utility [patent_app_number] => 18/965272 [patent_app_country] => US [patent_app_date] => 2024-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10122 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 142 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18965272 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/965272
ACCESS POINT OR ROUTER-BASED ROTATION AND EXCHANGE OF DATA ENCRYPTION/DECRYPTION KEYS Dec 1, 2024 Pending
Array ( [id] => 19759110 [patent_doc_number] => 20250047675 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-02-06 [patent_title] => CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING [patent_app_type] => utility [patent_app_number] => 18/927424 [patent_app_country] => US [patent_app_date] => 2024-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14115 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18927424 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/927424
CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING Oct 24, 2024 Pending
Array ( [id] => 19994674 [patent_doc_number] => 20250132896 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-24 [patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING [patent_app_type] => utility [patent_app_number] => 18/913605 [patent_app_country] => US [patent_app_date] => 2024-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11359 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -24 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913605 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/913605
LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING Oct 10, 2024 Pending
Array ( [id] => 19994675 [patent_doc_number] => 20250132897 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-24 [patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING [patent_app_type] => utility [patent_app_number] => 18/913618 [patent_app_country] => US [patent_app_date] => 2024-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11335 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913618 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/913618
LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING Oct 10, 2024 Pending
Array ( [id] => 20589454 [patent_doc_number] => 20260075052 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-03-12 [patent_title] => SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS [patent_app_type] => utility [patent_app_number] => 18/883764 [patent_app_country] => US [patent_app_date] => 2024-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4641 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 352 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18883764 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/883764
SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS Sep 11, 2024 Pending
Array ( [id] => 20234600 [patent_doc_number] => 20250291919 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-09-18 [patent_title] => MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD [patent_app_type] => utility [patent_app_number] => 18/830111 [patent_app_country] => US [patent_app_date] => 2024-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 982 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -13 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18830111 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/830111
MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD Sep 9, 2024 Pending
Array ( [id] => 19645292 [patent_doc_number] => 20240419812 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-19 [patent_title] => EXPLOIT PREDICTION BASED ON MACHINE LEARNING [patent_app_type] => utility [patent_app_number] => 18/817448 [patent_app_country] => US [patent_app_date] => 2024-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6967 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18817448 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/817448
EXPLOIT PREDICTION BASED ON MACHINE LEARNING Aug 27, 2024 Pending
Array ( [id] => 19713593 [patent_doc_number] => 20250023735 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-16 [patent_title] => HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES [patent_app_type] => utility [patent_app_number] => 18/813160 [patent_app_country] => US [patent_app_date] => 2024-08-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12265 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18813160 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/813160
HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES Aug 22, 2024 Pending
Array ( [id] => 19924881 [patent_doc_number] => 12299162 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-05-13 [patent_title] => Systems and methods for end point integration and mapping [patent_app_type] => utility [patent_app_number] => 18/808778 [patent_app_country] => US [patent_app_date] => 2024-08-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 40732 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 235 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18808778 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/808778
Systems and methods for end point integration and mapping Aug 18, 2024 Issued
Array ( [id] => 19942280 [patent_doc_number] => 12314409 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-05-27 [patent_title] => Remote ownership and content control of media files on untrusted systems [patent_app_type] => utility [patent_app_number] => 18/806828 [patent_app_country] => US [patent_app_date] => 2024-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6997 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18806828 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/806828
Remote ownership and content control of media files on untrusted systems Aug 15, 2024 Issued
Array ( [id] => 20462923 [patent_doc_number] => 20260012353 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-08 [patent_title] => Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections [patent_app_type] => utility [patent_app_number] => 18/763974 [patent_app_country] => US [patent_app_date] => 2024-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13851 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 258 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763974 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/763974
Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections Jul 2, 2024 Pending
Array ( [id] => 19748238 [patent_doc_number] => 20250036803 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-30 [patent_title] => Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation [patent_app_type] => utility [patent_app_number] => 18/760772 [patent_app_country] => US [patent_app_date] => 2024-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7598 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 64 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18760772 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/760772
Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation Jun 30, 2024 Pending
Array ( [id] => 19532837 [patent_doc_number] => 20240356739 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-24 [patent_title] => RANGE CONSTRAINED DEVICE CONFIGURATION [patent_app_type] => utility [patent_app_number] => 18/759366 [patent_app_country] => US [patent_app_date] => 2024-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6671 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18759366 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/759366
RANGE CONSTRAINED DEVICE CONFIGURATION Jun 27, 2024 Pending
Array ( [id] => 20204945 [patent_doc_number] => 12407736 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-09-02 [patent_title] => Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity [patent_app_type] => utility [patent_app_number] => 18/753432 [patent_app_country] => US [patent_app_date] => 2024-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2282 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 219 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18753432 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/753432
Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity Jun 24, 2024 Issued
Array ( [id] => 19499428 [patent_doc_number] => 20240338446 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-10 [patent_title] => Attribute-based detection of malicious software and code packers [patent_app_type] => utility [patent_app_number] => 18/744788 [patent_app_country] => US [patent_app_date] => 2024-06-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4465 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 168 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18744788 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/744788
Attribute-based detection of malicious software and code packers Jun 16, 2024 Abandoned
Array ( [id] => 19485712 [patent_doc_number] => 20240333754 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-03 [patent_title] => SOFTWARE RELEASE TRACKING AND LOGGING [patent_app_type] => utility [patent_app_number] => 18/742570 [patent_app_country] => US [patent_app_date] => 2024-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19807 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742570 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/742570
Software release tracking and logging Jun 12, 2024 Issued
Menu