
Richard E. Gluck
Examiner (ID: 13857)
| Most Active Art Unit | 3403 |
| Art Unit(s) | 3403, 2899, 3505, 3402, SIR, 3504, 3746 |
| Total Applications | 862 |
| Issued Applications | 739 |
| Pending Applications | 25 |
| Abandoned Applications | 98 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16365377
[patent_doc_number] => 20200322128
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-08
[patent_title] => ZERO-KNOWLEDGE PROOF FOR BLOCKCHAIN ENDORSEMENT
[patent_app_type] => utility
[patent_app_number] => 16/375971
[patent_app_country] => US
[patent_app_date] => 2019-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14132
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16375971
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/375971 | Zero-knowledge proof for blockchain endorsement | Apr 4, 2019 | Issued |
Array
(
[id] => 15445093
[patent_doc_number] => 20200036730
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => Method and apparatus for trusted branded email
[patent_app_type] => utility
[patent_app_number] => 16/374656
[patent_app_country] => US
[patent_app_date] => 2019-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8243
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16374656
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/374656 | Method and apparatus for trusted branded email | Apr 2, 2019 | Issued |
Array
(
[id] => 16349464
[patent_doc_number] => 20200314115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => System and Method to Secure Renegotiation of Connections Between a Baseboard Management Controller and a Hosted Agent
[patent_app_type] => utility
[patent_app_number] => 16/370806
[patent_app_country] => US
[patent_app_date] => 2019-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5454
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16370806
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/370806 | System and method to secure renegotiation of connections between a baseboard management controller and a hosted agent | Mar 28, 2019 | Issued |
Array
(
[id] => 18001946
[patent_doc_number] => 11503068
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-11-15
[patent_title] => Session management
[patent_app_type] => utility
[patent_app_number] => 16/355285
[patent_app_country] => US
[patent_app_date] => 2019-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 14120
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16355285
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/355285 | Session management | Mar 14, 2019 | Issued |
Array
(
[id] => 15473503
[patent_doc_number] => 10552631
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-04
[patent_title] => Efficient implementation for differential privacy using cryptographic functions
[patent_app_type] => utility
[patent_app_number] => 16/297464
[patent_app_country] => US
[patent_app_date] => 2019-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 7127
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16297464
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/297464 | Efficient implementation for differential privacy using cryptographic functions | Mar 7, 2019 | Issued |
Array
(
[id] => 16579662
[patent_doc_number] => 20210014064
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-14
[patent_title] => METHOD AND APPARATUS FOR MANAGING USER AUTHENTICATION IN A BLOCKCHAIN NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/981093
[patent_app_country] => US
[patent_app_date] => 2019-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6800
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16981093
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/981093 | Method and apparatus for managing user authentication in a blockchain network | Mar 5, 2019 | Issued |
Array
(
[id] => 14448727
[patent_doc_number] => 20190182237
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-13
[patent_title] => Mobile Authentication And Registration For Digital Certificates
[patent_app_type] => utility
[patent_app_number] => 16/277354
[patent_app_country] => US
[patent_app_date] => 2019-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8255
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16277354
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/277354 | Mobile authentication and registration for digital certificates | Feb 14, 2019 | Issued |
Array
(
[id] => 16577632
[patent_doc_number] => 20210012033
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-14
[patent_title] => METHOD FOR THE COMPUTER-AIDED PARAMETERISATION OF A TECHNICAL SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/970732
[patent_app_country] => US
[patent_app_date] => 2019-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3568
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16970732
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/970732 | Method for the computer-aided parameterization of a technical system | Feb 13, 2019 | Issued |
Array
(
[id] => 17535644
[patent_doc_number] => 20220114253
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-04-14
[patent_title] => ACTION PLAN ESTIMATION APPARATUS, ACTION PLAN ESTIMATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 17/427250
[patent_app_country] => US
[patent_app_date] => 2019-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7795
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17427250
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/427250 | Action plan estimation apparatus, action plan estimation method, and computer-readable recording medium | Feb 3, 2019 | Issued |
Array
(
[id] => 17165505
[patent_doc_number] => 11151611
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-19
[patent_title] => Mobile device detection and tracking
[patent_app_type] => utility
[patent_app_number] => 16/249760
[patent_app_country] => US
[patent_app_date] => 2019-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 32
[patent_no_of_words] => 20216
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16249760
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/249760 | Mobile device detection and tracking | Jan 15, 2019 | Issued |
Array
(
[id] => 14353045
[patent_doc_number] => 20190158496
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-23
[patent_title] => System, Method, and Apparatus for Personal Identification
[patent_app_type] => utility
[patent_app_number] => 16/244888
[patent_app_country] => US
[patent_app_date] => 2019-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13934
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16244888
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/244888 | System, Method, and Apparatus for Personal Identification | Jan 9, 2019 | Abandoned |
Array
(
[id] => 14287081
[patent_doc_number] => 20190140825
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-09
[patent_title] => MANAGING PRIVATE KEY ACCESS IN MULTIPLE NODES
[patent_app_type] => utility
[patent_app_number] => 16/241888
[patent_app_country] => US
[patent_app_date] => 2019-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5015
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16241888
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/241888 | Managing private key access in multiple nodes | Jan 6, 2019 | Issued |
Array
(
[id] => 16637132
[patent_doc_number] => 10915642
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-09
[patent_title] => Private analytics using multi-party computation
[patent_app_type] => utility
[patent_app_number] => 16/202355
[patent_app_country] => US
[patent_app_date] => 2018-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8332
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16202355
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/202355 | Private analytics using multi-party computation | Nov 27, 2018 | Issued |
Array
(
[id] => 14107887
[patent_doc_number] => 20190095619
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => IDENTIFYING WHETHER AN APPLICATION IS MALICIOUS
[patent_app_type] => utility
[patent_app_number] => 16/199250
[patent_app_country] => US
[patent_app_date] => 2018-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7107
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16199250
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/199250 | Identifying whether an application is malicious | Nov 25, 2018 | Issued |
Array
(
[id] => 15908629
[patent_doc_number] => 20200153836
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => FICTITIOUS ACCOUNT GENERATION ON DETECTION OF ACCOUNT TAKEOVER CONDITIONS
[patent_app_type] => utility
[patent_app_number] => 16/190066
[patent_app_country] => US
[patent_app_date] => 2018-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9795
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 70
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16190066
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/190066 | Fictitious account generation on detection of account takeover conditions | Nov 12, 2018 | Issued |
Array
(
[id] => 14139527
[patent_doc_number] => 20190104153
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-04
[patent_title] => DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING
[patent_app_type] => utility
[patent_app_number] => 16/188594
[patent_app_country] => US
[patent_app_date] => 2018-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9452
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16188594
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/188594 | Detecting attacks using compromised credentials via internal network monitoring | Nov 12, 2018 | Issued |
Array
(
[id] => 16317195
[patent_doc_number] => 20200295933
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-17
[patent_title] => Method and system for managing application security keys for user and M2M devices in a wireless communication network environment
[patent_app_type] => utility
[patent_app_number] => 16/186943
[patent_app_country] => US
[patent_app_date] => 2018-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18039
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16186943
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/186943 | Method and system for managing application security keys for user and M2M devices in a wireless communication network environment | Nov 11, 2018 | Abandoned |
Array
(
[id] => 13998905
[patent_doc_number] => 20190068610
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => PROTECTING AGAINST SPAM AND OVER-REPRESENTATION IN SUBMISSION OF CONFIDENTIAL DATA
[patent_app_type] => utility
[patent_app_number] => 16/175611
[patent_app_country] => US
[patent_app_date] => 2018-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17057
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16175611
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/175611 | PROTECTING AGAINST SPAM AND OVER-REPRESENTATION IN SUBMISSION OF CONFIDENTIAL DATA | Oct 29, 2018 | Abandoned |
Array
(
[id] => 17108420
[patent_doc_number] => 11128652
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-09-21
[patent_title] => Dynamic vulnerability correlation
[patent_app_type] => utility
[patent_app_number] => 16/170962
[patent_app_country] => US
[patent_app_date] => 2018-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 16
[patent_no_of_words] => 10142
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16170962
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/170962 | Dynamic vulnerability correlation | Oct 24, 2018 | Issued |
Array
(
[id] => 17122774
[patent_doc_number] => 11133923
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-28
[patent_title] => Cryptographic operations using internet of things device pool
[patent_app_type] => utility
[patent_app_number] => 16/169478
[patent_app_country] => US
[patent_app_date] => 2018-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7405
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16169478
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/169478 | Cryptographic operations using internet of things device pool | Oct 23, 2018 | Issued |