![](/images/general/no_picture/200_user.png)
Richard M Lorence
Examiner (ID: 14102, Phone: (571)272-7094 , Office: P/3655 )
Most Active Art Unit | 3502 |
Art Unit(s) | 3622, 3656, 3655, 3502, 3681, 0 |
Total Applications | 3116 |
Issued Applications | 2710 |
Pending Applications | 74 |
Abandoned Applications | 331 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 17979561
[patent_doc_number] => 11496446
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-11-08
[patent_title] => Protecting personally identifiable information submitted through a browser
[patent_app_type] => utility
[patent_app_number] => 16/880287
[patent_app_country] => US
[patent_app_date] => 2020-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7639
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16880287
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/880287 | Protecting personally identifiable information submitted through a browser | May 20, 2020 | Issued |
Array
(
[id] => 19245184
[patent_doc_number] => 12015644
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-06-18
[patent_title] => System and method for utilization of threat data for network security
[patent_app_type] => utility
[patent_app_number] => 16/845799
[patent_app_country] => US
[patent_app_date] => 2020-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 14962
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 286
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16845799
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/845799 | System and method for utilization of threat data for network security | Apr 9, 2020 | Issued |
Array
(
[id] => 17841537
[patent_doc_number] => 20220278843
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-01
[patent_title] => COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR KNOWLEDGE PROOF IN BLOCKCHAIN TRANSACTIONS
[patent_app_type] => utility
[patent_app_number] => 17/603332
[patent_app_country] => US
[patent_app_date] => 2020-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7825
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17603332
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/603332 | COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR KNOWLEDGE PROOF IN BLOCKCHAIN TRANSACTIONS | Apr 2, 2020 | Pending |
Array
(
[id] => 16363666
[patent_doc_number] => 20200320417
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-08
[patent_title] => MANAGING ACCESS TO DATA AND MANAGING OPERATIONS PERFORMED BY APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/839005
[patent_app_country] => US
[patent_app_date] => 2020-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18711
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16839005
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/839005 | Managing access to data and managing operations performed by applications | Apr 1, 2020 | Issued |
Array
(
[id] => 17877615
[patent_doc_number] => 11449631
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-20
[patent_title] => Electronic device for managing personal information and operating method thereof
[patent_app_type] => utility
[patent_app_number] => 16/824888
[patent_app_country] => US
[patent_app_date] => 2020-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12755
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16824888
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/824888 | Electronic device for managing personal information and operating method thereof | Mar 19, 2020 | Issued |
Array
(
[id] => 16122147
[patent_doc_number] => 20200213096
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-02
[patent_title] => DATA CONVERSION SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 16/813678
[patent_app_country] => US
[patent_app_date] => 2020-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 36727
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16813678
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/813678 | Data conversion systems and methods | Mar 8, 2020 | Issued |
Array
(
[id] => 16122201
[patent_doc_number] => 20200213123
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-02
[patent_title] => TRUSTED CLIENT SECURITY FACTOR-BASED AUTHORIZATIONS AT A SERVER
[patent_app_type] => utility
[patent_app_number] => 16/812904
[patent_app_country] => US
[patent_app_date] => 2020-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12703
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16812904
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/812904 | Trusted client security factor-based authorizations | Mar 8, 2020 | Issued |
Array
(
[id] => 17778883
[patent_doc_number] => 20220245233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-04
[patent_title] => CONTROL SYSTEM AND CONTROL METHOD
[patent_app_type] => utility
[patent_app_number] => 17/623169
[patent_app_country] => US
[patent_app_date] => 2020-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8199
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17623169
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/623169 | CONTROL SYSTEM AND CONTROL METHOD | Mar 4, 2020 | Pending |
Array
(
[id] => 16339997
[patent_doc_number] => 10790970
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-29
[patent_title] => Method, apparatus, and system for processing two-dimensional barcodes
[patent_app_type] => utility
[patent_app_number] => 16/802640
[patent_app_country] => US
[patent_app_date] => 2020-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 17308
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16802640
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/802640 | Method, apparatus, and system for processing two-dimensional barcodes | Feb 26, 2020 | Issued |
Array
(
[id] => 17863615
[patent_doc_number] => 11444781
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-13
[patent_title] => Distributed trust authentication
[patent_app_type] => utility
[patent_app_number] => 16/796528
[patent_app_country] => US
[patent_app_date] => 2020-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7875
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16796528
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/796528 | Distributed trust authentication | Feb 19, 2020 | Issued |
Array
(
[id] => 16271230
[patent_doc_number] => 20200272718
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-27
[patent_title] => AUTHENTICATION USING FACIAL IMAGE COMPARISON
[patent_app_type] => utility
[patent_app_number] => 16/795502
[patent_app_country] => US
[patent_app_date] => 2020-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11088
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16795502
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/795502 | Authentication using facial image comparison | Feb 18, 2020 | Issued |
Array
(
[id] => 16587175
[patent_doc_number] => 20210021577
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-21
[patent_title] => SYSTEMS AND METHODS FOR SENDING USER DATA FROM A TRUSTED PARTY TO A THIRD PARTY USING A DISTRIBUTED REGISTRY
[patent_app_type] => utility
[patent_app_number] => 16/791156
[patent_app_country] => US
[patent_app_date] => 2020-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9545
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16791156
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/791156 | Systems and methods for sending user data from a trusted party to a third party using a distributed registry | Feb 13, 2020 | Issued |
Array
(
[id] => 17470913
[patent_doc_number] => 11277401
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-03-15
[patent_title] => Data integrity checker
[patent_app_type] => utility
[patent_app_number] => 16/773699
[patent_app_country] => US
[patent_app_date] => 2020-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 23548
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 284
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16773699
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/773699 | Data integrity checker | Jan 26, 2020 | Issued |
Array
(
[id] => 17494500
[patent_doc_number] => 11283828
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-22
[patent_title] => Cyber-attack vulnerability and propagation model
[patent_app_type] => utility
[patent_app_number] => 16/745430
[patent_app_country] => US
[patent_app_date] => 2020-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5695
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16745430
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/745430 | Cyber-attack vulnerability and propagation model | Jan 16, 2020 | Issued |
Array
(
[id] => 16522367
[patent_doc_number] => 10873595
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-22
[patent_title] => Real-time vulnerability monitoring
[patent_app_type] => utility
[patent_app_number] => 16/740961
[patent_app_country] => US
[patent_app_date] => 2020-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 13722
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 903
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16740961
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/740961 | Real-time vulnerability monitoring | Jan 12, 2020 | Issued |
Array
(
[id] => 17639084
[patent_doc_number] => 11349824
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-31
[patent_title] => Block sequencing method and system based on tree-graph structure, and data processing terminal
[patent_app_type] => utility
[patent_app_number] => 16/738890
[patent_app_country] => US
[patent_app_date] => 2020-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 10
[patent_no_of_words] => 4360
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16738890
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/738890 | Block sequencing method and system based on tree-graph structure, and data processing terminal | Jan 8, 2020 | Issued |
Array
(
[id] => 15875651
[patent_doc_number] => 20200145229
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => SYSTEM AND METHOD FOR BLOCKCHAIN-BASED CROSS-ENTITY AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/737813
[patent_app_country] => US
[patent_app_date] => 2020-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 31219
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16737813
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/737813 | System and method for blockchain-based cross-entity authentication | Jan 7, 2020 | Issued |
Array
(
[id] => 15876005
[patent_doc_number] => 20200145406
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => SYSTEM AND METHOD FOR BLOCKCHAIN-BASED DATA MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/735499
[patent_app_country] => US
[patent_app_date] => 2020-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10668
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16735499
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/735499 | SYSTEM AND METHOD FOR BLOCKCHAIN-BASED DATA MANAGEMENT | Jan 5, 2020 | Abandoned |
Array
(
[id] => 15908659
[patent_doc_number] => 20200153851
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => Detecting a Root Cause for a Vulnerability Using Subjective Logic in Social Media
[patent_app_type] => utility
[patent_app_number] => 16/734322
[patent_app_country] => US
[patent_app_date] => 2020-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8423
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16734322
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/734322 | Detecting a root cause for a vulnerability using subjective logic in social media | Jan 3, 2020 | Issued |
Array
(
[id] => 15843059
[patent_doc_number] => 20200136812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => Sharing Encrypted Documents Within and Outside an Organization
[patent_app_type] => utility
[patent_app_number] => 16/730996
[patent_app_country] => US
[patent_app_date] => 2019-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 37211
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 372
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16730996
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/730996 | Sharing encrypted documents within and outside an organization | Dec 29, 2019 | Issued |