
Robert Canfield
Examiner (ID: 13519, Phone: (571)272-6840 , Office: P/3635 )
| Most Active Art Unit | 3636 |
| Art Unit(s) | 3504, 3600, 3636, 3635, 3621 |
| Total Applications | 3211 |
| Issued Applications | 2504 |
| Pending Applications | 225 |
| Abandoned Applications | 510 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16693134
[patent_doc_number] => 20210075613
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-11
[patent_title] => SYSTEM AND METHOD FOR IMPLEMENTING A TWO-SIDED TOKEN FOR OPEN AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/563851
[patent_app_country] => US
[patent_app_date] => 2019-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6623
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16563851
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/563851 | System and method for implementing a two-sided token for open authentication | Sep 6, 2019 | Issued |
Array
(
[id] => 16980143
[patent_doc_number] => 20210224380
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-22
[patent_title] => VERIFYING STACK POINTER
[patent_app_type] => utility
[patent_app_number] => 17/269205
[patent_app_country] => US
[patent_app_date] => 2019-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18034
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17269205
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/269205 | Verifying stack pointer | Sep 2, 2019 | Issued |
Array
(
[id] => 16130939
[patent_doc_number] => 10699234
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-06-30
[patent_title] => Computer systems and methods to protect user credential against phishing
[patent_app_type] => utility
[patent_app_number] => 16/556923
[patent_app_country] => US
[patent_app_date] => 2019-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 16497
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16556923
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/556923 | Computer systems and methods to protect user credential against phishing | Aug 29, 2019 | Issued |
Array
(
[id] => 18687355
[patent_doc_number] => 11783094
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-10
[patent_title] => System and method for providing protected data storage in data memory
[patent_app_type] => utility
[patent_app_number] => 17/270967
[patent_app_country] => US
[patent_app_date] => 2019-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 12100
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 419
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17270967
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/270967 | System and method for providing protected data storage in data memory | Aug 29, 2019 | Issued |
Array
(
[id] => 19092784
[patent_doc_number] => 11954236
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-04-09
[patent_title] => Authenticity verification
[patent_app_type] => utility
[patent_app_number] => 17/415189
[patent_app_country] => US
[patent_app_date] => 2019-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3370
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17415189
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/415189 | Authenticity verification | Aug 19, 2019 | Issued |
Array
(
[id] => 15220631
[patent_doc_number] => 20190373002
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => METHOD AND SYSTEM FOR DETECTING CREDENTIAL STEALING ATTACKS
[patent_app_type] => utility
[patent_app_number] => 16/528356
[patent_app_country] => US
[patent_app_date] => 2019-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13598
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16528356
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/528356 | Method and system for detecting credential stealing attacks | Jul 30, 2019 | Issued |
Array
(
[id] => 17542875
[patent_doc_number] => 11307998
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-19
[patent_title] => Storage efficiency of encrypted host system data
[patent_app_type] => utility
[patent_app_number] => 16/514831
[patent_app_country] => US
[patent_app_date] => 2019-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 20
[patent_no_of_words] => 37453
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16514831
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/514831 | Storage efficiency of encrypted host system data | Jul 16, 2019 | Issued |
Array
(
[id] => 17535667
[patent_doc_number] => 20220114276
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-04-14
[patent_title] => CONTROLLING A DATA NETWORK WITH RESPECT TO A USE OF A DISTRIBUTED DATABASE
[patent_app_type] => utility
[patent_app_number] => 17/261978
[patent_app_country] => US
[patent_app_date] => 2019-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9228
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17261978
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/261978 | CONTROLLING A DATA NETWORK WITH RESPECT TO A USE OF A DISTRIBUTED DATABASE | Jul 8, 2019 | Abandoned |
Array
(
[id] => 17669122
[patent_doc_number] => 11362835
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-14
[patent_title] => Efficient post-quantum anonymous attestation with signature-based join protocol and unlimited signatures
[patent_app_type] => utility
[patent_app_number] => 16/455978
[patent_app_country] => US
[patent_app_date] => 2019-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 20
[patent_no_of_words] => 12599
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16455978
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/455978 | Efficient post-quantum anonymous attestation with signature-based join protocol and unlimited signatures | Jun 27, 2019 | Issued |
Array
(
[id] => 16543698
[patent_doc_number] => 20200410113
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => SYSTEM AND METHOD FOR PROTECTING LOCATION DATA
[patent_app_type] => utility
[patent_app_number] => 16/455554
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10576
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16455554
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/455554 | System and method for protecting location data | Jun 26, 2019 | Issued |
Array
(
[id] => 17049021
[patent_doc_number] => 11102223
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-24
[patent_title] => Multi-host threat tracking
[patent_app_type] => utility
[patent_app_number] => 16/454680
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 9060
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16454680
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/454680 | Multi-host threat tracking | Jun 26, 2019 | Issued |
Array
(
[id] => 17047054
[patent_doc_number] => 11100236
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-24
[patent_title] => Distributed data security
[patent_app_type] => utility
[patent_app_number] => 16/452794
[patent_app_country] => US
[patent_app_date] => 2019-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4803
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16452794
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/452794 | Distributed data security | Jun 25, 2019 | Issued |
Array
(
[id] => 14970831
[patent_doc_number] => 20190312894
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-10
[patent_title] => MACHINE LEARNING-BASED TRAFFIC CLASSIFICATION USING COMPRESSED NETWORK TELEMETRY DATA
[patent_app_type] => utility
[patent_app_number] => 16/450164
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6633
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450164
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450164 | Machine learning-based traffic classification using compressed network telemetry data | Jun 23, 2019 | Issued |
Array
(
[id] => 19182690
[patent_doc_number] => 11989279
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-21
[patent_title] => Method and system for service image deployment in a cloud computing system based on distributed ledger technology
[patent_app_type] => utility
[patent_app_number] => 17/596898
[patent_app_country] => US
[patent_app_date] => 2019-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10470
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17596898
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/596898 | Method and system for service image deployment in a cloud computing system based on distributed ledger technology | Jun 19, 2019 | Issued |
Array
(
[id] => 18839137
[patent_doc_number] => 11847210
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-19
[patent_title] => Detecting device and detecting method
[patent_app_type] => utility
[patent_app_number] => 16/973039
[patent_app_country] => US
[patent_app_date] => 2019-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3522
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16973039
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/973039 | Detecting device and detecting method | Jun 19, 2019 | Issued |
Array
(
[id] => 15876045
[patent_doc_number] => 20200145426
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => SECURE FILE TRANSACTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/442662
[patent_app_country] => US
[patent_app_date] => 2019-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7121
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16442662
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/442662 | SECURE FILE TRANSACTION SYSTEM | Jun 16, 2019 | Abandoned |
Array
(
[id] => 17048786
[patent_doc_number] => 11101987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-24
[patent_title] => Adaptive encryption for entity resolution
[patent_app_type] => utility
[patent_app_number] => 16/435947
[patent_app_country] => US
[patent_app_date] => 2019-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4835
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16435947
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/435947 | Adaptive encryption for entity resolution | Jun 9, 2019 | Issued |
Array
(
[id] => 16486565
[patent_doc_number] => 20200380172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-03
[patent_title] => DATA INTEGRITY
[patent_app_type] => utility
[patent_app_number] => 16/426592
[patent_app_country] => US
[patent_app_date] => 2019-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9650
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16426592
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/426592 | Data integrity | May 29, 2019 | Issued |
Array
(
[id] => 14811523
[patent_doc_number] => 20190272371
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => SYSTEM AND METHOD OF ANALYSIS OF FILES FOR MALICIOUSNESS AND DETERMINING AN ACTION
[patent_app_type] => utility
[patent_app_number] => 16/415328
[patent_app_country] => US
[patent_app_date] => 2019-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6793
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16415328
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/415328 | System and method of analysis of files for maliciousness and determining an action | May 16, 2019 | Issued |
Array
(
[id] => 14782843
[patent_doc_number] => 20190266319
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-29
[patent_title] => MANAGING PASSWORDS USING STEGANOGRAPHY
[patent_app_type] => utility
[patent_app_number] => 16/409803
[patent_app_country] => US
[patent_app_date] => 2019-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5964
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16409803
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/409803 | Managing passwords using steganography | May 10, 2019 | Issued |