![](/images/general/no_picture/200_user.png)
Richard M Lorence
Examiner (ID: 14102, Phone: (571)272-7094 , Office: P/3655 )
Most Active Art Unit | 3502 |
Art Unit(s) | 3622, 3656, 3655, 3502, 3681, 0 |
Total Applications | 3116 |
Issued Applications | 2710 |
Pending Applications | 74 |
Abandoned Applications | 331 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 16134585
[patent_doc_number] => 10701075
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-30
[patent_title] => Method and system for securely connecting to field devices in an industrial plant using Li-Fi and augmented reality
[patent_app_type] => utility
[patent_app_number] => 15/676030
[patent_app_country] => US
[patent_app_date] => 2017-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 8168
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15676030
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/676030 | Method and system for securely connecting to field devices in an industrial plant using Li-Fi and augmented reality | Aug 13, 2017 | Issued |
Array
(
[id] => 13938173
[patent_doc_number] => 20190052602
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-14
[patent_title] => GENERATING RULES TO DETECT SECURITY VULNERABILITIES BASED ON VULNERABILITY PRIMITIVES WITH ENTRY POINT FINDER
[patent_app_type] => utility
[patent_app_number] => 15/675969
[patent_app_country] => US
[patent_app_date] => 2017-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21875
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15675969
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/675969 | GENERATING RULES TO DETECT SECURITY VULNERABILITIES BASED ON VULNERABILITY PRIMITIVES WITH ENTRY POINT FINDER | Aug 13, 2017 | Abandoned |
Array
(
[id] => 16844993
[patent_doc_number] => 11017082
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-05-25
[patent_title] => Method for session workflow information flow analysis
[patent_app_type] => utility
[patent_app_number] => 15/673101
[patent_app_country] => US
[patent_app_date] => 2017-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5809
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15673101
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/673101 | Method for session workflow information flow analysis | Aug 8, 2017 | Issued |
Array
(
[id] => 13934061
[patent_doc_number] => 20190050546
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-14
[patent_title] => Authentication Using Facial Image Comparison
[patent_app_type] => utility
[patent_app_number] => 15/673324
[patent_app_country] => US
[patent_app_date] => 2017-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11073
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15673324
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/673324 | Authentication using facial image comparison | Aug 8, 2017 | Issued |
Array
(
[id] => 15317401
[patent_doc_number] => 10523423
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => Sharing encrypted documents within and outside an organization
[patent_app_type] => utility
[patent_app_number] => 15/673338
[patent_app_country] => US
[patent_app_date] => 2017-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 45
[patent_no_of_words] => 37184
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 387
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15673338
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/673338 | Sharing encrypted documents within and outside an organization | Aug 8, 2017 | Issued |
Array
(
[id] => 13007935
[patent_doc_number] => 10027648
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-17
[patent_title] => Geolocation dependent variable authentication
[patent_app_type] => utility
[patent_app_number] => 15/662316
[patent_app_country] => US
[patent_app_date] => 2017-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7147
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 454
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15662316
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/662316 | Geolocation dependent variable authentication | Jul 27, 2017 | Issued |
Array
(
[id] => 12182410
[patent_doc_number] => 20180041345
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-08
[patent_title] => 'SYSTEMS AND METHODS FOR MANAGING NETWORKED COMMITMENTS OF SECURE ENTITIES'
[patent_app_type] => utility
[patent_app_number] => 15/662855
[patent_app_country] => US
[patent_app_date] => 2017-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 31204
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15662855
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/662855 | Systems and methods for managing networked commitments of secure entities | Jul 27, 2017 | Issued |
Array
(
[id] => 12128431
[patent_doc_number] => 20180012017
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-11
[patent_title] => 'METHODS FOR RESTRICTING RESOURCES USED BY AN APPLICATION BASED ON A BASE PROFILE AND AN APPLICATION SPECIFIC PROFILE'
[patent_app_type] => utility
[patent_app_number] => 15/663432
[patent_app_country] => US
[patent_app_date] => 2017-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5993
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15663432
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/663432 | Methods for restricting resources used by an application based on a base profile and an application specific profile | Jul 27, 2017 | Issued |
Array
(
[id] => 13284955
[patent_doc_number] => 10154075
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-11
[patent_title] => Systems and methods for automatically generating top level index files
[patent_app_type] => utility
[patent_app_number] => 15/658057
[patent_app_country] => US
[patent_app_date] => 2017-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10216
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15658057
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/658057 | Systems and methods for automatically generating top level index files | Jul 23, 2017 | Issued |
Array
(
[id] => 14203435
[patent_doc_number] => 10268835
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-23
[patent_title] => Hosted application gateway architecture with multi-level security policy and rule promulgations
[patent_app_type] => utility
[patent_app_number] => 15/653017
[patent_app_country] => US
[patent_app_date] => 2017-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 14906
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 268
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15653017
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/653017 | Hosted application gateway architecture with multi-level security policy and rule promulgations | Jul 17, 2017 | Issued |
Array
(
[id] => 13911477
[patent_doc_number] => 20190044943
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-07
[patent_title] => TWO-CHANNEL AUTHENTICATION PROXY SYSTEM CAPABLE OF DETECTING APPLICATION TAMPERING AND METHOD THEREFOR
[patent_app_type] => utility
[patent_app_number] => 16/076699
[patent_app_country] => US
[patent_app_date] => 2017-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10387
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 307
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16076699
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/076699 | Two-channel authentication proxy system capable of detecting application tampering and method therefor | Jun 18, 2017 | Issued |
Array
(
[id] => 12096210
[patent_doc_number] => 20170353302
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'DATA CONVERSION SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 15/614328
[patent_app_country] => US
[patent_app_date] => 2017-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 56
[patent_figures_cnt] => 56
[patent_no_of_words] => 37325
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15614328
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/614328 | Data conversion systems and methods | Jun 4, 2017 | Issued |
Array
(
[id] => 14416107
[patent_doc_number] => 20190173897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-06
[patent_title] => MALICIOUS COMMUNICATION LOG DETECTION DEVICE, MALICIOUS COMMUNICATION LOG DETECTION METHOD, AND MALICIOUS COMMUNICATION LOG DETECTION PROGRAM
[patent_app_type] => utility
[patent_app_number] => 16/307290
[patent_app_country] => US
[patent_app_date] => 2017-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8401
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16307290
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/307290 | Malicious communication log detection device, malicious communication log detection method, and malicious communication log detection program | May 31, 2017 | Issued |
Array
(
[id] => 13113593
[patent_doc_number] => 10075466
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-09-11
[patent_title] => Real-time vulnerability monitoring
[patent_app_type] => utility
[patent_app_number] => 15/608984
[patent_app_country] => US
[patent_app_date] => 2017-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 13690
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 493
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15608984
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/608984 | Real-time vulnerability monitoring | May 29, 2017 | Issued |
Array
(
[id] => 15429373
[patent_doc_number] => 10547631
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-01-28
[patent_title] => Real-time vulnerability monitoring
[patent_app_type] => utility
[patent_app_number] => 15/608983
[patent_app_country] => US
[patent_app_date] => 2017-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 13489
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 452
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15608983
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/608983 | Real-time vulnerability monitoring | May 29, 2017 | Issued |
Array
(
[id] => 14906653
[patent_doc_number] => 20190297092
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-26
[patent_title] => ACCESS CLASSIFICATION DEVICE, ACCESS CLASSIFICATION METHOD, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/307358
[patent_app_country] => US
[patent_app_date] => 2017-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11182
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16307358
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/307358 | Access classification device, access classification method, and recording medium | May 14, 2017 | Issued |
Array
(
[id] => 12500964
[patent_doc_number] => 09998286
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-06-12
[patent_title] => Hardware blockchain consensus operating procedure enforcement
[patent_app_type] => utility
[patent_app_number] => 15/595537
[patent_app_country] => US
[patent_app_date] => 2017-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8284
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15595537
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/595537 | Hardware blockchain consensus operating procedure enforcement | May 14, 2017 | Issued |
Array
(
[id] => 11870544
[patent_doc_number] => 20170237829
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'Monetizing Downloadable Files Based On Resolving Custodianship Thereof To Referring Publisher And Presentation Of Monetized Content In A Modal Overlay Contemporaneously With Download'
[patent_app_type] => utility
[patent_app_number] => 15/582351
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 17936
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15582351
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/582351 | Monetizing downloadable files based on resolving custodianship thereof to referring publisher and presentation of monetized content in a modal overlay contemporaneously with download | Apr 27, 2017 | Issued |
Array
(
[id] => 17310979
[patent_doc_number] => 11212109
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-28
[patent_title] => Data provision system, data security device, data provision method, and computer program
[patent_app_type] => utility
[patent_app_number] => 16/307394
[patent_app_country] => US
[patent_app_date] => 2017-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 6948
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 436
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16307394
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/307394 | Data provision system, data security device, data provision method, and computer program | Apr 10, 2017 | Issued |
Array
(
[id] => 11982556
[patent_doc_number] => 20170286711
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-05
[patent_title] => 'SYSTEMS AND METHODS FOR PROVIDING INFORMATION RIGHTS MANAGEMENT OFFLINE FILE FACILITY'
[patent_app_type] => utility
[patent_app_number] => 15/473958
[patent_app_country] => US
[patent_app_date] => 2017-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9824
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15473958
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/473958 | Information rights management offline file access facility | Mar 29, 2017 | Issued |