
Richard E. Gluck
Examiner (ID: 13857)
| Most Active Art Unit | 3403 |
| Art Unit(s) | 3403, 2899, 3505, 3402, SIR, 3504, 3746 |
| Total Applications | 862 |
| Issued Applications | 739 |
| Pending Applications | 25 |
| Abandoned Applications | 98 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20617008
[patent_doc_number] => 20260087107
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-03-26
[patent_title] => MARKING ATTRIBUTION DATA IN GENERATED CONTENT
[patent_app_type] => utility
[patent_app_number] => 19/406759
[patent_app_country] => US
[patent_app_date] => 2025-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 39321
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19406759
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/406759 | MARKING ATTRIBUTION DATA IN GENERATED CONTENT | Dec 1, 2025 | Pending |
Array
(
[id] => 20018271
[patent_doc_number] => 20250156493
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-15
[patent_title] => SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION MANAGEMENT ACROSS DISPARATE INFORMATION SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 19/023257
[patent_app_country] => US
[patent_app_date] => 2025-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11867
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19023257
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/023257 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION MANAGEMENT ACROSS DISPARATE INFORMATION SYSTEMS | Jan 14, 2025 | Pending |
Array
(
[id] => 20195690
[patent_doc_number] => 20250272400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-28
[patent_title] => SYSTEMS AND METHODS FOR DETECTING AND ENFORCING COMPUTER RUNTIME SECURITY
[patent_app_type] => utility
[patent_app_number] => 19/007587
[patent_app_country] => US
[patent_app_date] => 2025-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3625
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19007587
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/007587 | SYSTEMS AND METHODS FOR DETECTING AND ENFORCING COMPUTER RUNTIME SECURITY | Jan 1, 2025 | Pending |
Array
(
[id] => 20045906
[patent_doc_number] => 20250184128
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-05
[patent_title] => METHODS AND APPARATUS FOR KEY REGENERATION
[patent_app_type] => utility
[patent_app_number] => 19/005177
[patent_app_country] => US
[patent_app_date] => 2024-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1209
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19005177
[rel_patent_id] =>[rel_patent_doc_number] =>) 19/005177 | METHODS AND APPARATUS FOR KEY REGENERATION | Dec 29, 2024 | Pending |
Array
(
[id] => 20055442
[patent_doc_number] => 20250193664
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-12
[patent_title] => ACCESS POINT OR ROUTER-BASED ROTATION AND EXCHANGE OF DATA ENCRYPTION/DECRYPTION KEYS
[patent_app_type] => utility
[patent_app_number] => 18/965272
[patent_app_country] => US
[patent_app_date] => 2024-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10122
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18965272
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/965272 | ACCESS POINT OR ROUTER-BASED ROTATION AND EXCHANGE OF DATA ENCRYPTION/DECRYPTION KEYS | Dec 1, 2024 | Pending |
Array
(
[id] => 19759110
[patent_doc_number] => 20250047675
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-06
[patent_title] => CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING
[patent_app_type] => utility
[patent_app_number] => 18/927424
[patent_app_country] => US
[patent_app_date] => 2024-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14115
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18927424
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/927424 | CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING | Oct 24, 2024 | Pending |
Array
(
[id] => 19994674
[patent_doc_number] => 20250132896
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-24
[patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING
[patent_app_type] => utility
[patent_app_number] => 18/913605
[patent_app_country] => US
[patent_app_date] => 2024-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11359
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913605
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/913605 | LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING | Oct 10, 2024 | Pending |
Array
(
[id] => 19994675
[patent_doc_number] => 20250132897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-24
[patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING
[patent_app_type] => utility
[patent_app_number] => 18/913618
[patent_app_country] => US
[patent_app_date] => 2024-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11335
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913618
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/913618 | LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING | Oct 10, 2024 | Pending |
Array
(
[id] => 20589454
[patent_doc_number] => 20260075052
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-03-12
[patent_title] => SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS
[patent_app_type] => utility
[patent_app_number] => 18/883764
[patent_app_country] => US
[patent_app_date] => 2024-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4641
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 352
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18883764
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/883764 | SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS | Sep 11, 2024 | Pending |
Array
(
[id] => 20234600
[patent_doc_number] => 20250291919
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-18
[patent_title] => MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD
[patent_app_type] => utility
[patent_app_number] => 18/830111
[patent_app_country] => US
[patent_app_date] => 2024-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 982
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18830111
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/830111 | MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD | Sep 9, 2024 | Pending |
Array
(
[id] => 19645292
[patent_doc_number] => 20240419812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-19
[patent_title] => EXPLOIT PREDICTION BASED ON MACHINE LEARNING
[patent_app_type] => utility
[patent_app_number] => 18/817448
[patent_app_country] => US
[patent_app_date] => 2024-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6967
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18817448
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/817448 | EXPLOIT PREDICTION BASED ON MACHINE LEARNING | Aug 27, 2024 | Pending |
Array
(
[id] => 19713593
[patent_doc_number] => 20250023735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-16
[patent_title] => HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES
[patent_app_type] => utility
[patent_app_number] => 18/813160
[patent_app_country] => US
[patent_app_date] => 2024-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12265
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18813160
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/813160 | HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES | Aug 22, 2024 | Pending |
Array
(
[id] => 19924881
[patent_doc_number] => 12299162
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-05-13
[patent_title] => Systems and methods for end point integration and mapping
[patent_app_type] => utility
[patent_app_number] => 18/808778
[patent_app_country] => US
[patent_app_date] => 2024-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 40732
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18808778
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/808778 | Systems and methods for end point integration and mapping | Aug 18, 2024 | Issued |
Array
(
[id] => 19942280
[patent_doc_number] => 12314409
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-27
[patent_title] => Remote ownership and content control of media files on untrusted systems
[patent_app_type] => utility
[patent_app_number] => 18/806828
[patent_app_country] => US
[patent_app_date] => 2024-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6997
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18806828
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/806828 | Remote ownership and content control of media files on untrusted systems | Aug 15, 2024 | Issued |
Array
(
[id] => 20462923
[patent_doc_number] => 20260012353
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-08
[patent_title] => Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections
[patent_app_type] => utility
[patent_app_number] => 18/763974
[patent_app_country] => US
[patent_app_date] => 2024-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13851
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 258
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763974
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/763974 | Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections | Jul 2, 2024 | Pending |
Array
(
[id] => 19748238
[patent_doc_number] => 20250036803
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation
[patent_app_type] => utility
[patent_app_number] => 18/760772
[patent_app_country] => US
[patent_app_date] => 2024-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7598
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18760772
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/760772 | Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation | Jun 30, 2024 | Pending |
Array
(
[id] => 19532837
[patent_doc_number] => 20240356739
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-24
[patent_title] => RANGE CONSTRAINED DEVICE CONFIGURATION
[patent_app_type] => utility
[patent_app_number] => 18/759366
[patent_app_country] => US
[patent_app_date] => 2024-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6671
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18759366
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/759366 | RANGE CONSTRAINED DEVICE CONFIGURATION | Jun 27, 2024 | Pending |
Array
(
[id] => 20204945
[patent_doc_number] => 12407736
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-02
[patent_title] => Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity
[patent_app_type] => utility
[patent_app_number] => 18/753432
[patent_app_country] => US
[patent_app_date] => 2024-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2282
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18753432
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/753432 | Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity | Jun 24, 2024 | Issued |
Array
(
[id] => 19499428
[patent_doc_number] => 20240338446
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => Attribute-based detection of malicious software and code packers
[patent_app_type] => utility
[patent_app_number] => 18/744788
[patent_app_country] => US
[patent_app_date] => 2024-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4465
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18744788
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/744788 | Attribute-based detection of malicious software and code packers | Jun 16, 2024 | Abandoned |
Array
(
[id] => 19485712
[patent_doc_number] => 20240333754
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-03
[patent_title] => SOFTWARE RELEASE TRACKING AND LOGGING
[patent_app_type] => utility
[patent_app_number] => 18/742570
[patent_app_country] => US
[patent_app_date] => 2024-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19807
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742570
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/742570 | Software release tracking and logging | Jun 12, 2024 | Issued |