Search

Richard E. Gluck

Examiner (ID: 13857)

Most Active Art Unit
3403
Art Unit(s)
3403, 2899, 3505, 3402, SIR, 3504, 3746
Total Applications
862
Issued Applications
739
Pending Applications
25
Abandoned Applications
98

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16365377 [patent_doc_number] => 20200322128 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-10-08 [patent_title] => ZERO-KNOWLEDGE PROOF FOR BLOCKCHAIN ENDORSEMENT [patent_app_type] => utility [patent_app_number] => 16/375971 [patent_app_country] => US [patent_app_date] => 2019-04-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14132 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 83 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16375971 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/375971
Zero-knowledge proof for blockchain endorsement Apr 4, 2019 Issued
Array ( [id] => 15445093 [patent_doc_number] => 20200036730 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-30 [patent_title] => Method and apparatus for trusted branded email [patent_app_type] => utility [patent_app_number] => 16/374656 [patent_app_country] => US [patent_app_date] => 2019-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8243 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16374656 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/374656
Method and apparatus for trusted branded email Apr 2, 2019 Issued
Array ( [id] => 16349464 [patent_doc_number] => 20200314115 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-10-01 [patent_title] => System and Method to Secure Renegotiation of Connections Between a Baseboard Management Controller and a Hosted Agent [patent_app_type] => utility [patent_app_number] => 16/370806 [patent_app_country] => US [patent_app_date] => 2019-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5454 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16370806 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/370806
System and method to secure renegotiation of connections between a baseboard management controller and a hosted agent Mar 28, 2019 Issued
Array ( [id] => 18001946 [patent_doc_number] => 11503068 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-11-15 [patent_title] => Session management [patent_app_type] => utility [patent_app_number] => 16/355285 [patent_app_country] => US [patent_app_date] => 2019-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 14120 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16355285 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/355285
Session management Mar 14, 2019 Issued
Array ( [id] => 15473503 [patent_doc_number] => 10552631 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-02-04 [patent_title] => Efficient implementation for differential privacy using cryptographic functions [patent_app_type] => utility [patent_app_number] => 16/297464 [patent_app_country] => US [patent_app_date] => 2019-03-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 13 [patent_no_of_words] => 7127 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16297464 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/297464
Efficient implementation for differential privacy using cryptographic functions Mar 7, 2019 Issued
Array ( [id] => 16579662 [patent_doc_number] => 20210014064 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-01-14 [patent_title] => METHOD AND APPARATUS FOR MANAGING USER AUTHENTICATION IN A BLOCKCHAIN NETWORK [patent_app_type] => utility [patent_app_number] => 16/981093 [patent_app_country] => US [patent_app_date] => 2019-03-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6800 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 76 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16981093 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/981093
Method and apparatus for managing user authentication in a blockchain network Mar 5, 2019 Issued
Array ( [id] => 14448727 [patent_doc_number] => 20190182237 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-06-13 [patent_title] => Mobile Authentication And Registration For Digital Certificates [patent_app_type] => utility [patent_app_number] => 16/277354 [patent_app_country] => US [patent_app_date] => 2019-02-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8255 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 178 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16277354 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/277354
Mobile authentication and registration for digital certificates Feb 14, 2019 Issued
Array ( [id] => 16577632 [patent_doc_number] => 20210012033 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-01-14 [patent_title] => METHOD FOR THE COMPUTER-AIDED PARAMETERISATION OF A TECHNICAL SYSTEM [patent_app_type] => utility [patent_app_number] => 16/970732 [patent_app_country] => US [patent_app_date] => 2019-02-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3568 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16970732 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/970732
Method for the computer-aided parameterization of a technical system Feb 13, 2019 Issued
Array ( [id] => 17535644 [patent_doc_number] => 20220114253 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-04-14 [patent_title] => ACTION PLAN ESTIMATION APPARATUS, ACTION PLAN ESTIMATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM [patent_app_type] => utility [patent_app_number] => 17/427250 [patent_app_country] => US [patent_app_date] => 2019-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7795 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -9 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17427250 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/427250
Action plan estimation apparatus, action plan estimation method, and computer-readable recording medium Feb 3, 2019 Issued
Array ( [id] => 17165505 [patent_doc_number] => 11151611 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-10-19 [patent_title] => Mobile device detection and tracking [patent_app_type] => utility [patent_app_number] => 16/249760 [patent_app_country] => US [patent_app_date] => 2019-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 31 [patent_figures_cnt] => 32 [patent_no_of_words] => 20216 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16249760 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/249760
Mobile device detection and tracking Jan 15, 2019 Issued
Array ( [id] => 14353045 [patent_doc_number] => 20190158496 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-05-23 [patent_title] => System, Method, and Apparatus for Personal Identification [patent_app_type] => utility [patent_app_number] => 16/244888 [patent_app_country] => US [patent_app_date] => 2019-01-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13934 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 140 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16244888 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/244888
System, Method, and Apparatus for Personal Identification Jan 9, 2019 Abandoned
Array ( [id] => 14287081 [patent_doc_number] => 20190140825 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-05-09 [patent_title] => MANAGING PRIVATE KEY ACCESS IN MULTIPLE NODES [patent_app_type] => utility [patent_app_number] => 16/241888 [patent_app_country] => US [patent_app_date] => 2019-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5015 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16241888 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/241888
Managing private key access in multiple nodes Jan 6, 2019 Issued
Array ( [id] => 16637132 [patent_doc_number] => 10915642 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-02-09 [patent_title] => Private analytics using multi-party computation [patent_app_type] => utility [patent_app_number] => 16/202355 [patent_app_country] => US [patent_app_date] => 2018-11-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8332 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16202355 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/202355
Private analytics using multi-party computation Nov 27, 2018 Issued
Array ( [id] => 14107887 [patent_doc_number] => 20190095619 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-03-28 [patent_title] => IDENTIFYING WHETHER AN APPLICATION IS MALICIOUS [patent_app_type] => utility [patent_app_number] => 16/199250 [patent_app_country] => US [patent_app_date] => 2018-11-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7107 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16199250 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/199250
Identifying whether an application is malicious Nov 25, 2018 Issued
Array ( [id] => 15908629 [patent_doc_number] => 20200153836 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-05-14 [patent_title] => FICTITIOUS ACCOUNT GENERATION ON DETECTION OF ACCOUNT TAKEOVER CONDITIONS [patent_app_type] => utility [patent_app_number] => 16/190066 [patent_app_country] => US [patent_app_date] => 2018-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9795 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 70 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16190066 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/190066
Fictitious account generation on detection of account takeover conditions Nov 12, 2018 Issued
Array ( [id] => 14139527 [patent_doc_number] => 20190104153 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-04-04 [patent_title] => DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING [patent_app_type] => utility [patent_app_number] => 16/188594 [patent_app_country] => US [patent_app_date] => 2018-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9452 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 173 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16188594 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/188594
Detecting attacks using compromised credentials via internal network monitoring Nov 12, 2018 Issued
Array ( [id] => 16317195 [patent_doc_number] => 20200295933 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-17 [patent_title] => Method and system for managing application security keys for user and M2M devices in a wireless communication network environment [patent_app_type] => utility [patent_app_number] => 16/186943 [patent_app_country] => US [patent_app_date] => 2018-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18039 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16186943 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/186943
Method and system for managing application security keys for user and M2M devices in a wireless communication network environment Nov 11, 2018 Abandoned
Array ( [id] => 13998905 [patent_doc_number] => 20190068610 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => PROTECTING AGAINST SPAM AND OVER-REPRESENTATION IN SUBMISSION OF CONFIDENTIAL DATA [patent_app_type] => utility [patent_app_number] => 16/175611 [patent_app_country] => US [patent_app_date] => 2018-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 17057 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 232 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16175611 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/175611
PROTECTING AGAINST SPAM AND OVER-REPRESENTATION IN SUBMISSION OF CONFIDENTIAL DATA Oct 29, 2018 Abandoned
Array ( [id] => 17108420 [patent_doc_number] => 11128652 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-09-21 [patent_title] => Dynamic vulnerability correlation [patent_app_type] => utility [patent_app_number] => 16/170962 [patent_app_country] => US [patent_app_date] => 2018-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 16 [patent_no_of_words] => 10142 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16170962 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/170962
Dynamic vulnerability correlation Oct 24, 2018 Issued
Array ( [id] => 17122774 [patent_doc_number] => 11133923 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-09-28 [patent_title] => Cryptographic operations using internet of things device pool [patent_app_type] => utility [patent_app_number] => 16/169478 [patent_app_country] => US [patent_app_date] => 2018-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7405 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16169478 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/169478
Cryptographic operations using internet of things device pool Oct 23, 2018 Issued
Menu