
Robert K. Carpenter
Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )
| Most Active Art Unit | 2896 |
| Art Unit(s) | 2812, 2895, 2896, 2826 |
| Total Applications | 863 |
| Issued Applications | 717 |
| Pending Applications | 4 |
| Abandoned Applications | 146 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18017159
[patent_doc_number] => 11509477
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-11-22
[patent_title] => User data validation for digital identifications
[patent_app_type] => utility
[patent_app_number] => 16/594267
[patent_app_country] => US
[patent_app_date] => 2019-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 27419
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16594267
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/594267 | User data validation for digital identifications | Oct 6, 2019 | Issued |
Array
(
[id] => 15747365
[patent_doc_number] => 20200112572
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-09
[patent_title] => BLOCKCHAIN ARCHITECTURE FOR COMPUTER SECURITY APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/592303
[patent_app_country] => US
[patent_app_date] => 2019-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8337
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16592303
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/592303 | Blockchain architecture for computer security applications | Oct 2, 2019 | Issued |
Array
(
[id] => 16732325
[patent_doc_number] => 20210099474
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-01
[patent_title] => METHODS AND APPARATUS TO PERFORM MALWARE DETECTION USING A GENERATIVE ADVERSARIAL NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/588540
[patent_app_country] => US
[patent_app_date] => 2019-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11007
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16588540
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/588540 | Methods and apparatus to perform malware detection using a generative adversarial network | Sep 29, 2019 | Issued |
Array
(
[id] => 17773438
[patent_doc_number] => 11405400
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-02
[patent_title] => Hardening based on access capability exercise sufficiency
[patent_app_type] => utility
[patent_app_number] => 16/563884
[patent_app_country] => US
[patent_app_date] => 2019-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 17858
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16563884
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/563884 | Hardening based on access capability exercise sufficiency | Sep 7, 2019 | Issued |
Array
(
[id] => 15276527
[patent_doc_number] => 20190386998
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-19
[patent_title] => DATA TRANSFER IN A DATA PROTECTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/557333
[patent_app_country] => US
[patent_app_date] => 2019-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4245
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16557333
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/557333 | Data transfer in a data protection system | Aug 29, 2019 | Issued |
Array
(
[id] => 17530942
[patent_doc_number] => 11303660
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-12
[patent_title] => Computer-protection system and method for preventing a networked computer from executing malicious code
[patent_app_type] => utility
[patent_app_number] => 16/552860
[patent_app_country] => US
[patent_app_date] => 2019-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 7152
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16552860
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/552860 | Computer-protection system and method for preventing a networked computer from executing malicious code | Aug 26, 2019 | Issued |
Array
(
[id] => 15567037
[patent_doc_number] => 20200067930
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-27
[patent_title] => SYSTEMS AND METHODS FOR ENHANCED NETWORK DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/551406
[patent_app_country] => US
[patent_app_date] => 2019-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7137
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16551406
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/551406 | Systems and methods for enhanced network detection | Aug 25, 2019 | Issued |
Array
(
[id] => 15659567
[patent_doc_number] => 20200092314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-19
[patent_title] => BEHAVIORAL BASELINING FROM A DATA SOURCE PERSPECTIVE FOR DETECTION OF COMPROMISED USERS
[patent_app_type] => utility
[patent_app_number] => 16/548735
[patent_app_country] => US
[patent_app_date] => 2019-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16869
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 53
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16548735
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/548735 | Behavioral baselining from a data source perspective for detection of compromised users | Aug 21, 2019 | Issued |
| 16/545322 | Entity Registration In A Dispersed Storage Network | Aug 19, 2019 | Abandoned |
Array
(
[id] => 16018405
[patent_doc_number] => 20200184046
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-11
[patent_title] => FILE PROTECTION METHOD AND FILE PROCESSING SYSTEM THEREOF
[patent_app_type] => utility
[patent_app_number] => 16/543642
[patent_app_country] => US
[patent_app_date] => 2019-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3627
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 54
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16543642
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/543642 | File protection method and file processing system thereof | Aug 18, 2019 | Issued |
Array
(
[id] => 17530926
[patent_doc_number] => 11303643
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-04-12
[patent_title] => Systems and methods for protecting users
[patent_app_type] => utility
[patent_app_number] => 16/538790
[patent_app_country] => US
[patent_app_date] => 2019-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 43
[patent_figures_cnt] => 43
[patent_no_of_words] => 13981
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16538790
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/538790 | Systems and methods for protecting users | Aug 11, 2019 | Issued |
Array
(
[id] => 17151562
[patent_doc_number] => 11144640
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-12
[patent_title] => Security for devices connected to a network
[patent_app_type] => utility
[patent_app_number] => 16/536409
[patent_app_country] => US
[patent_app_date] => 2019-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9320
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16536409
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/536409 | Security for devices connected to a network | Aug 8, 2019 | Issued |
Array
(
[id] => 17432520
[patent_doc_number] => 20220060230
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-24
[patent_title] => ELECTRONIC DEVICE FOR DETECTING EXTERNAL OBJECT USING ANTENNA ARRAY AND OPERATION METHOD THEREOF
[patent_app_type] => utility
[patent_app_number] => 17/275899
[patent_app_country] => US
[patent_app_date] => 2019-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16490
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 50
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17275899
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/275899 | Electronic device for detecting external object using antenna array and operation method thereof | Aug 5, 2019 | Issued |
Array
(
[id] => 17396684
[patent_doc_number] => 11245712
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-02-08
[patent_title] => Method and apparatus for generating virtual malicious traffic template for terminal group including device infected with malicious code
[patent_app_type] => utility
[patent_app_number] => 16/517500
[patent_app_country] => US
[patent_app_date] => 2019-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 22
[patent_no_of_words] => 7508
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517500
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/517500 | Method and apparatus for generating virtual malicious traffic template for terminal group including device infected with malicious code | Jul 18, 2019 | Issued |
Array
(
[id] => 17608174
[patent_doc_number] => 11336671
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-17
[patent_title] => Method and apparatus for detecting anomaly in a plurality of devices by collectively analyzing information on devices
[patent_app_type] => utility
[patent_app_number] => 16/517474
[patent_app_country] => US
[patent_app_date] => 2019-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7594
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517474
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/517474 | Method and apparatus for detecting anomaly in a plurality of devices by collectively analyzing information on devices | Jul 18, 2019 | Issued |
Array
(
[id] => 15032413
[patent_doc_number] => 20190327211
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-24
[patent_title] => People Directory with Social Privacy and Contact Association Features
[patent_app_type] => utility
[patent_app_number] => 16/503155
[patent_app_country] => US
[patent_app_date] => 2019-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8565
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16503155
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/503155 | People Directory with Social Privacy and Contact Association Features | Jul 2, 2019 | Abandoned |
Array
(
[id] => 17271320
[patent_doc_number] => 11196759
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-07
[patent_title] => SIEM system and methods for exfiltrating event data
[patent_app_type] => utility
[patent_app_number] => 16/453462
[patent_app_country] => US
[patent_app_date] => 2019-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 15875
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16453462
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/453462 | SIEM system and methods for exfiltrating event data | Jun 25, 2019 | Issued |
Array
(
[id] => 17909586
[patent_doc_number] => 11463462
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-04
[patent_title] => Bot behavior detection
[patent_app_type] => utility
[patent_app_number] => 16/442819
[patent_app_country] => US
[patent_app_date] => 2019-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10318
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16442819
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/442819 | Bot behavior detection | Jun 16, 2019 | Issued |
Array
(
[id] => 16980166
[patent_doc_number] => 20210224403
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-22
[patent_title] => SECURE REMOTE IMAGE ANALYSIS BASED ON RANDOMIZED DATA TRANSFORMATION
[patent_app_type] => utility
[patent_app_number] => 15/734282
[patent_app_country] => US
[patent_app_date] => 2019-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5562
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15734282
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/734282 | Secure remote image analysis based on randomized data transformation | Jun 10, 2019 | Issued |
Array
(
[id] => 16836191
[patent_doc_number] => 11012456
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-18
[patent_title] => Threat mitigation system and method
[patent_app_type] => utility
[patent_app_number] => 16/432689
[patent_app_country] => US
[patent_app_date] => 2019-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 21808
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16432689
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/432689 | Threat mitigation system and method | Jun 4, 2019 | Issued |