
Richard E. Gluck
Examiner (ID: 13857)
| Most Active Art Unit | 3403 |
| Art Unit(s) | 3403, 2899, 3505, 3402, SIR, 3504, 3746 |
| Total Applications | 862 |
| Issued Applications | 739 |
| Pending Applications | 25 |
| Abandoned Applications | 98 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13938219
[patent_doc_number] => 20190052625
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-14
[patent_title] => GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL
[patent_app_type] => utility
[patent_app_number] => 16/162596
[patent_app_country] => US
[patent_app_date] => 2018-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15926
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16162596
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/162596 | Generation and distribution of secure or cryptographic material | Oct 16, 2018 | Issued |
Array
(
[id] => 13938221
[patent_doc_number] => 20190052626
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-14
[patent_title] => GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL
[patent_app_type] => utility
[patent_app_number] => 16/162618
[patent_app_country] => US
[patent_app_date] => 2018-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15928
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16162618
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/162618 | GENERATION AND DISTRIBUTION OF SECURE OR CRYPTOGRAPHIC MATERIAL | Oct 16, 2018 | Abandoned |
Array
(
[id] => 14380009
[patent_doc_number] => 20190163917
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-30
[patent_title] => EXPLOIT PREDICTION BASED ON MACHINE LEARNING
[patent_app_type] => utility
[patent_app_number] => 16/158873
[patent_app_country] => US
[patent_app_date] => 2018-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6945
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16158873
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/158873 | Exploit prediction based on machine learning | Oct 11, 2018 | Issued |
Array
(
[id] => 16987155
[patent_doc_number] => 11074328
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-27
[patent_title] => User authentication using passphrase emotional tone
[patent_app_type] => utility
[patent_app_number] => 16/135283
[patent_app_country] => US
[patent_app_date] => 2018-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7832
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16135283
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/135283 | User authentication using passphrase emotional tone | Sep 18, 2018 | Issued |
Array
(
[id] => 16003011
[patent_doc_number] => 20200177376
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => OPTICAL ENCRYPTION TERMINAL, CRYPTOGRAPHY KEY DISTRIBUTION SYSTEM AND METHOD OF GENERATING CRYPTOGRAPHY KEYS IN A CRYPTOGRAPHY KEY DISTRIBUTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/132017
[patent_app_country] => US
[patent_app_date] => 2018-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12615
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16132017
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/132017 | Optical encryption terminal, cryptography key distribution system and method of generating cryptography keys in a cryptography key distribution system | Sep 13, 2018 | Issued |
Array
(
[id] => 16739777
[patent_doc_number] => 10965453
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-30
[patent_title] => System and method for authenticated encryption based on device fingerprint
[patent_app_type] => utility
[patent_app_number] => 16/131426
[patent_app_country] => US
[patent_app_date] => 2018-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 16
[patent_no_of_words] => 12533
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16131426
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/131426 | System and method for authenticated encryption based on device fingerprint | Sep 13, 2018 | Issued |
Array
(
[id] => 16294644
[patent_doc_number] => 10771507
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-08
[patent_title] => Secure communication method of IMS system based on key file
[patent_app_type] => utility
[patent_app_number] => 16/132171
[patent_app_country] => US
[patent_app_date] => 2018-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 2244
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16132171
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/132171 | Secure communication method of IMS system based on key file | Sep 13, 2018 | Issued |
Array
(
[id] => 15623333
[patent_doc_number] => 20200082071
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => CREDENTIAL SAFETY MANAGEMENT FOR SOFTWARE CONTAINERS
[patent_app_type] => utility
[patent_app_number] => 16/128662
[patent_app_country] => US
[patent_app_date] => 2018-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5063
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16128662
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/128662 | Credential safety management for software containers | Sep 11, 2018 | Issued |
Array
(
[id] => 14025949
[patent_doc_number] => 20190074968
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-07
[patent_title] => METHOD, APPARATUS AND SYSTEM FOR DATA ENCRYPTION AND DECRYPTION
[patent_app_type] => utility
[patent_app_number] => 16/123999
[patent_app_country] => US
[patent_app_date] => 2018-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17003
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16123999
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/123999 | METHOD, APPARATUS AND SYSTEM FOR DATA ENCRYPTION AND DECRYPTION | Sep 5, 2018 | Abandoned |
Array
(
[id] => 14223445
[patent_doc_number] => 20190124108
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-25
[patent_title] => Multiple Presentation Fidelity-Level Based Quantitative Cyber Risk Decision Support System
[patent_app_type] => utility
[patent_app_number] => 16/122785
[patent_app_country] => US
[patent_app_date] => 2018-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10684
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 337
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16122785
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/122785 | Multiple presentation fidelity-level based quantitative cyber risk decision support system | Sep 4, 2018 | Issued |
Array
(
[id] => 15595165
[patent_doc_number] => 20200074117
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => UNFALSIFIABLE AUDIT LOGS FOR A BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 16/122093
[patent_app_country] => US
[patent_app_date] => 2018-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8343
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16122093
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/122093 | Unfalsifiable audit logs for a blockchain | Sep 4, 2018 | Issued |
Array
(
[id] => 17333131
[patent_doc_number] => 11223604
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-11
[patent_title] => Detecting aggressive or attacking behaviors in IMS SIP signaling
[patent_app_type] => utility
[patent_app_number] => 16/121249
[patent_app_country] => US
[patent_app_date] => 2018-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14782
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16121249
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/121249 | Detecting aggressive or attacking behaviors in IMS SIP signaling | Sep 3, 2018 | Issued |
Array
(
[id] => 16895098
[patent_doc_number] => 11036652
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-15
[patent_title] => Secured access control in a storage system
[patent_app_type] => utility
[patent_app_number] => 16/120631
[patent_app_country] => US
[patent_app_date] => 2018-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 11744
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16120631
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/120631 | Secured access control in a storage system | Sep 3, 2018 | Issued |
Array
(
[id] => 19017788
[patent_doc_number] => 11924744
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-03-05
[patent_title] => Access control barring method and device
[patent_app_type] => utility
[patent_app_number] => 17/270420
[patent_app_country] => US
[patent_app_date] => 2018-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 16
[patent_no_of_words] => 5626
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17270420
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/270420 | Access control barring method and device | Aug 28, 2018 | Issued |
Array
(
[id] => 15595093
[patent_doc_number] => 20200074081
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => MALWARE CLUSTERING BASED ON ANALYSIS OF EXECUTION-BEHAVIOR REPORTS
[patent_app_type] => utility
[patent_app_number] => 16/114877
[patent_app_country] => US
[patent_app_date] => 2018-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13707
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16114877
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/114877 | Malware clustering based on analysis of execution-behavior reports | Aug 27, 2018 | Issued |
Array
(
[id] => 15595093
[patent_doc_number] => 20200074081
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => MALWARE CLUSTERING BASED ON ANALYSIS OF EXECUTION-BEHAVIOR REPORTS
[patent_app_type] => utility
[patent_app_number] => 16/114877
[patent_app_country] => US
[patent_app_date] => 2018-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13707
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16114877
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/114877 | Malware clustering based on analysis of execution-behavior reports | Aug 27, 2018 | Issued |
Array
(
[id] => 15595093
[patent_doc_number] => 20200074081
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => MALWARE CLUSTERING BASED ON ANALYSIS OF EXECUTION-BEHAVIOR REPORTS
[patent_app_type] => utility
[patent_app_number] => 16/114877
[patent_app_country] => US
[patent_app_date] => 2018-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13707
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16114877
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/114877 | Malware clustering based on analysis of execution-behavior reports | Aug 27, 2018 | Issued |
Array
(
[id] => 15595093
[patent_doc_number] => 20200074081
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => MALWARE CLUSTERING BASED ON ANALYSIS OF EXECUTION-BEHAVIOR REPORTS
[patent_app_type] => utility
[patent_app_number] => 16/114877
[patent_app_country] => US
[patent_app_date] => 2018-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13707
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16114877
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/114877 | Malware clustering based on analysis of execution-behavior reports | Aug 27, 2018 | Issued |
Array
(
[id] => 17309281
[patent_doc_number] => 11210396
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-28
[patent_title] => Light-weight behavioral malware detection for windows platforms
[patent_app_type] => utility
[patent_app_number] => 16/112825
[patent_app_country] => US
[patent_app_date] => 2018-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 13
[patent_no_of_words] => 5054
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16112825
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/112825 | Light-weight behavioral malware detection for windows platforms | Aug 26, 2018 | Issued |
Array
(
[id] => 16195066
[patent_doc_number] => 20200235915
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-23
[patent_title] => COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR HIGHLY SECURE, HIGH SPEED ENCRYPTION AND TRANSMISSION OF DATA
[patent_app_type] => utility
[patent_app_number] => 16/639101
[patent_app_country] => US
[patent_app_date] => 2018-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5878
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16639101
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/639101 | Computer-implemented system and method for highly secure, high speed encryption and transmission of data | Aug 14, 2018 | Issued |