Search

Richard M Lorence

Examiner (ID: 14102, Phone: (571)272-7094 , Office: P/3655 )

Most Active Art Unit
3502
Art Unit(s)
3622, 3656, 3655, 3502, 3681, 0
Total Applications
3116
Issued Applications
2710
Pending Applications
74
Abandoned Applications
331

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 17979561 [patent_doc_number] => 11496446 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-11-08 [patent_title] => Protecting personally identifiable information submitted through a browser [patent_app_type] => utility [patent_app_number] => 16/880287 [patent_app_country] => US [patent_app_date] => 2020-05-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7639 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16880287 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/880287
Protecting personally identifiable information submitted through a browser May 20, 2020 Issued
Array ( [id] => 19245184 [patent_doc_number] => 12015644 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-06-18 [patent_title] => System and method for utilization of threat data for network security [patent_app_type] => utility [patent_app_number] => 16/845799 [patent_app_country] => US [patent_app_date] => 2020-04-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 14962 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 286 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16845799 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/845799
System and method for utilization of threat data for network security Apr 9, 2020 Issued
Array ( [id] => 17841537 [patent_doc_number] => 20220278843 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-09-01 [patent_title] => COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR KNOWLEDGE PROOF IN BLOCKCHAIN TRANSACTIONS [patent_app_type] => utility [patent_app_number] => 17/603332 [patent_app_country] => US [patent_app_date] => 2020-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7825 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17603332 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/603332
COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR KNOWLEDGE PROOF IN BLOCKCHAIN TRANSACTIONS Apr 2, 2020 Pending
Array ( [id] => 16363666 [patent_doc_number] => 20200320417 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-10-08 [patent_title] => MANAGING ACCESS TO DATA AND MANAGING OPERATIONS PERFORMED BY APPLICATIONS [patent_app_type] => utility [patent_app_number] => 16/839005 [patent_app_country] => US [patent_app_date] => 2020-04-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18711 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16839005 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/839005
Managing access to data and managing operations performed by applications Apr 1, 2020 Issued
Array ( [id] => 17877615 [patent_doc_number] => 11449631 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-09-20 [patent_title] => Electronic device for managing personal information and operating method thereof [patent_app_type] => utility [patent_app_number] => 16/824888 [patent_app_country] => US [patent_app_date] => 2020-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 12755 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 230 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16824888 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/824888
Electronic device for managing personal information and operating method thereof Mar 19, 2020 Issued
Array ( [id] => 16122147 [patent_doc_number] => 20200213096 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-07-02 [patent_title] => DATA CONVERSION SYSTEMS AND METHODS [patent_app_type] => utility [patent_app_number] => 16/813678 [patent_app_country] => US [patent_app_date] => 2020-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 36727 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16813678 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/813678
Data conversion systems and methods Mar 8, 2020 Issued
Array ( [id] => 16122201 [patent_doc_number] => 20200213123 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-07-02 [patent_title] => TRUSTED CLIENT SECURITY FACTOR-BASED AUTHORIZATIONS AT A SERVER [patent_app_type] => utility [patent_app_number] => 16/812904 [patent_app_country] => US [patent_app_date] => 2020-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12703 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 157 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16812904 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/812904
Trusted client security factor-based authorizations Mar 8, 2020 Issued
Array ( [id] => 17778883 [patent_doc_number] => 20220245233 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-08-04 [patent_title] => CONTROL SYSTEM AND CONTROL METHOD [patent_app_type] => utility [patent_app_number] => 17/623169 [patent_app_country] => US [patent_app_date] => 2020-03-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8199 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 96 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17623169 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/623169
CONTROL SYSTEM AND CONTROL METHOD Mar 4, 2020 Pending
Array ( [id] => 16339997 [patent_doc_number] => 10790970 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-09-29 [patent_title] => Method, apparatus, and system for processing two-dimensional barcodes [patent_app_type] => utility [patent_app_number] => 16/802640 [patent_app_country] => US [patent_app_date] => 2020-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 17308 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 145 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16802640 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/802640
Method, apparatus, and system for processing two-dimensional barcodes Feb 26, 2020 Issued
Array ( [id] => 17863615 [patent_doc_number] => 11444781 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-09-13 [patent_title] => Distributed trust authentication [patent_app_type] => utility [patent_app_number] => 16/796528 [patent_app_country] => US [patent_app_date] => 2020-02-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7875 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16796528 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/796528
Distributed trust authentication Feb 19, 2020 Issued
Array ( [id] => 16271230 [patent_doc_number] => 20200272718 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-08-27 [patent_title] => AUTHENTICATION USING FACIAL IMAGE COMPARISON [patent_app_type] => utility [patent_app_number] => 16/795502 [patent_app_country] => US [patent_app_date] => 2020-02-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11088 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16795502 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/795502
Authentication using facial image comparison Feb 18, 2020 Issued
Array ( [id] => 16587175 [patent_doc_number] => 20210021577 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-01-21 [patent_title] => SYSTEMS AND METHODS FOR SENDING USER DATA FROM A TRUSTED PARTY TO A THIRD PARTY USING A DISTRIBUTED REGISTRY [patent_app_type] => utility [patent_app_number] => 16/791156 [patent_app_country] => US [patent_app_date] => 2020-02-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9545 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16791156 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/791156
Systems and methods for sending user data from a trusted party to a third party using a distributed registry Feb 13, 2020 Issued
Array ( [id] => 17470913 [patent_doc_number] => 11277401 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-03-15 [patent_title] => Data integrity checker [patent_app_type] => utility [patent_app_number] => 16/773699 [patent_app_country] => US [patent_app_date] => 2020-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 23548 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 284 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16773699 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/773699
Data integrity checker Jan 26, 2020 Issued
Array ( [id] => 17494500 [patent_doc_number] => 11283828 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-03-22 [patent_title] => Cyber-attack vulnerability and propagation model [patent_app_type] => utility [patent_app_number] => 16/745430 [patent_app_country] => US [patent_app_date] => 2020-01-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5695 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 233 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16745430 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/745430
Cyber-attack vulnerability and propagation model Jan 16, 2020 Issued
Array ( [id] => 16522367 [patent_doc_number] => 10873595 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-12-22 [patent_title] => Real-time vulnerability monitoring [patent_app_type] => utility [patent_app_number] => 16/740961 [patent_app_country] => US [patent_app_date] => 2020-01-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 13 [patent_no_of_words] => 13722 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 903 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16740961 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/740961
Real-time vulnerability monitoring Jan 12, 2020 Issued
Array ( [id] => 17639084 [patent_doc_number] => 11349824 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-05-31 [patent_title] => Block sequencing method and system based on tree-graph structure, and data processing terminal [patent_app_type] => utility [patent_app_number] => 16/738890 [patent_app_country] => US [patent_app_date] => 2020-01-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 10 [patent_no_of_words] => 4360 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 186 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16738890 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/738890
Block sequencing method and system based on tree-graph structure, and data processing terminal Jan 8, 2020 Issued
Array ( [id] => 15875651 [patent_doc_number] => 20200145229 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-05-07 [patent_title] => SYSTEM AND METHOD FOR BLOCKCHAIN-BASED CROSS-ENTITY AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 16/737813 [patent_app_country] => US [patent_app_date] => 2020-01-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 31219 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16737813 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/737813
System and method for blockchain-based cross-entity authentication Jan 7, 2020 Issued
Array ( [id] => 15876005 [patent_doc_number] => 20200145406 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-05-07 [patent_title] => SYSTEM AND METHOD FOR BLOCKCHAIN-BASED DATA MANAGEMENT [patent_app_type] => utility [patent_app_number] => 16/735499 [patent_app_country] => US [patent_app_date] => 2020-01-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10668 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16735499 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/735499
SYSTEM AND METHOD FOR BLOCKCHAIN-BASED DATA MANAGEMENT Jan 5, 2020 Abandoned
Array ( [id] => 15908659 [patent_doc_number] => 20200153851 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-05-14 [patent_title] => Detecting a Root Cause for a Vulnerability Using Subjective Logic in Social Media [patent_app_type] => utility [patent_app_number] => 16/734322 [patent_app_country] => US [patent_app_date] => 2020-01-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8423 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16734322 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/734322
Detecting a root cause for a vulnerability using subjective logic in social media Jan 3, 2020 Issued
Array ( [id] => 15843059 [patent_doc_number] => 20200136812 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-04-30 [patent_title] => Sharing Encrypted Documents Within and Outside an Organization [patent_app_type] => utility [patent_app_number] => 16/730996 [patent_app_country] => US [patent_app_date] => 2019-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 37211 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -26 [patent_words_short_claim] => 372 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16730996 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/730996
Sharing encrypted documents within and outside an organization Dec 29, 2019 Issued
Menu