Search

Stefan Staicovici

Examiner (ID: 8353)

Most Active Art Unit
1732
Art Unit(s)
1732
Total Applications
530
Issued Applications
343
Pending Applications
47
Abandoned Applications
140

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12853225 [patent_doc_number] => 20180176249 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-06-21 [patent_title] => SYSTEM AND METHOD FOR DETECTING FALSE DATA INJECTION IN ELECTRICAL SUBSTATIONS [patent_app_type] => utility [patent_app_number] => 15/386339 [patent_app_country] => US [patent_app_date] => 2016-12-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5142 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 197 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15386339 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/386339
System and method for detecting false data injection in electrical substations Dec 20, 2016 Issued
Array ( [id] => 17196789 [patent_doc_number] => 11165565 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-11-02 [patent_title] => Secure distribution private keys for use by untrusted code [patent_app_type] => utility [patent_app_number] => 15/375066 [patent_app_country] => US [patent_app_date] => 2016-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7244 [patent_no_of_claims] => 51 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 209 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15375066 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/375066
Secure distribution private keys for use by untrusted code Dec 8, 2016 Issued
Array ( [id] => 14269955 [patent_doc_number] => 10284557 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-05-07 [patent_title] => Secure data proxy for cloud computing environments [patent_app_type] => utility [patent_app_number] => 15/354486 [patent_app_country] => US [patent_app_date] => 2016-11-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7112 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15354486 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/354486
Secure data proxy for cloud computing environments Nov 16, 2016 Issued
Array ( [id] => 15172099 [patent_doc_number] => 10491569 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-11-26 [patent_title] => Secure transfer of independent security domains across shared media [patent_app_type] => utility [patent_app_number] => 15/348272 [patent_app_country] => US [patent_app_date] => 2016-11-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 8044 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 224 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15348272 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/348272
Secure transfer of independent security domains across shared media Nov 9, 2016 Issued
Array ( [id] => 15582993 [patent_doc_number] => 10581903 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-03 [patent_title] => Systems and methods for preventing denial of service attacks utilizing a proxy server [patent_app_type] => utility [patent_app_number] => 15/345067 [patent_app_country] => US [patent_app_date] => 2016-11-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6611 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 267 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15345067 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/345067
Systems and methods for preventing denial of service attacks utilizing a proxy server Nov 6, 2016 Issued
Array ( [id] => 15317905 [patent_doc_number] => 10523678 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-12-31 [patent_title] => System and method for architecture initiated network access control [patent_app_type] => utility [patent_app_number] => 15/333247 [patent_app_country] => US [patent_app_date] => 2016-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 15118 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 168 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15333247 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/333247
System and method for architecture initiated network access control Oct 24, 2016 Issued
Array ( [id] => 14673725 [patent_doc_number] => 10374792 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-08-06 [patent_title] => Layout-independent cryptographic stamp of a distributed dataset [patent_app_type] => utility [patent_app_number] => 15/280620 [patent_app_country] => US [patent_app_date] => 2016-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6194 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 85 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15280620 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/280620
Layout-independent cryptographic stamp of a distributed dataset Sep 28, 2016 Issued
Array ( [id] => 15735523 [patent_doc_number] => 10616206 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-04-07 [patent_title] => Digital certificate for verifying application purpose of data usage [patent_app_type] => utility [patent_app_number] => 15/276815 [patent_app_country] => US [patent_app_date] => 2016-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5273 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 240 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15276815 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/276815
Digital certificate for verifying application purpose of data usage Sep 26, 2016 Issued
Array ( [id] => 12599055 [patent_doc_number] => 20180091515 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-29 [patent_title] => DISTRIBUTION OF CODE TO AN AUTHORIZED TARGET INFRASTRUCTURE [patent_app_type] => utility [patent_app_number] => 15/277170 [patent_app_country] => US [patent_app_date] => 2016-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5399 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 55 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15277170 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/277170
DISTRIBUTION OF CODE TO AN AUTHORIZED TARGET INFRASTRUCTURE Sep 26, 2016 Abandoned
Array ( [id] => 15141851 [patent_doc_number] => 10484428 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-19 [patent_title] => Methods and systems for securing VPN cloud servers [patent_app_type] => utility [patent_app_number] => 15/275988 [patent_app_country] => US [patent_app_date] => 2016-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6629 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 171 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15275988 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/275988
Methods and systems for securing VPN cloud servers Sep 25, 2016 Issued
Array ( [id] => 14528081 [patent_doc_number] => 10341314 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-02 [patent_title] => Method of security and verifiability of an electronic vote [patent_app_type] => utility [patent_app_number] => 15/248330 [patent_app_country] => US [patent_app_date] => 2016-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 3 [patent_no_of_words] => 4070 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 204 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15248330 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/248330
Method of security and verifiability of an electronic vote Aug 25, 2016 Issued
Array ( [id] => 17033856 [patent_doc_number] => 11095682 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-08-17 [patent_title] => Mitigating phishing attempts [patent_app_type] => utility [patent_app_number] => 15/249172 [patent_app_country] => US [patent_app_date] => 2016-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 5781 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 215 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15249172 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/249172
Mitigating phishing attempts Aug 25, 2016 Issued
Array ( [id] => 16173738 [patent_doc_number] => 10715324 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-07-14 [patent_title] => Device and method for securing commands exchanged between a terminal and an integrated circuit [patent_app_type] => utility [patent_app_number] => 15/248115 [patent_app_country] => US [patent_app_date] => 2016-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 12 [patent_no_of_words] => 7662 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 171 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15248115 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/248115
Device and method for securing commands exchanged between a terminal and an integrated circuit Aug 25, 2016 Issued
Array ( [id] => 15674673 [patent_doc_number] => 10601582 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-24 [patent_title] => Method of linear transformation (variants) [patent_app_type] => utility [patent_app_number] => 15/513823 [patent_app_country] => US [patent_app_date] => 2016-07-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 14 [patent_no_of_words] => 7627 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 720 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15513823 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/513823
Method of linear transformation (variants) Jul 25, 2016 Issued
Array ( [id] => 16463092 [patent_doc_number] => 10846441 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-11-24 [patent_title] => Computer system [patent_app_type] => utility [patent_app_number] => 16/082259 [patent_app_country] => US [patent_app_date] => 2016-07-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 24 [patent_no_of_words] => 10595 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 274 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16082259 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/082259
Computer system Jul 6, 2016 Issued
Array ( [id] => 11405835 [patent_doc_number] => 20170026373 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-26 [patent_title] => 'COMMUNICATION RELAY DEVICE, COMMUNICATION NETWORK, AND COMMUNICATION RELAY METHOD' [patent_app_type] => utility [patent_app_number] => 15/194793 [patent_app_country] => US [patent_app_date] => 2016-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10537 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15194793 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/194793
Communication relay device, communication network, and communication relay method Jun 27, 2016 Issued
Array ( [id] => 11496330 [patent_doc_number] => 20170070515 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-09 [patent_title] => 'IDENTIFICATION METHOD AND INFORMATION PROCESSING DEVICE' [patent_app_type] => utility [patent_app_number] => 15/193264 [patent_app_country] => US [patent_app_date] => 2016-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 39 [patent_figures_cnt] => 39 [patent_no_of_words] => 15067 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15193264 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/193264
Identification method and information processing device Jun 26, 2016 Issued
Array ( [id] => 17106348 [patent_doc_number] => 11126565 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-09-21 [patent_title] => Encrypted memory access using page table attributes [patent_app_type] => utility [patent_app_number] => 15/193146 [patent_app_country] => US [patent_app_date] => 2016-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5930 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 246 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15193146 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/193146
Encrypted memory access using page table attributes Jun 26, 2016 Issued
Array ( [id] => 13501747 [patent_doc_number] => 20180302416 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-10-18 [patent_title] => CONTINUOUS AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 15/569355 [patent_app_country] => US [patent_app_date] => 2016-05-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 16865 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 61 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15569355 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/569355
Continuous authentication May 1, 2016 Issued
Array ( [id] => 12629553 [patent_doc_number] => 20180101681 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-04-12 [patent_title] => Recurrent Neural Networks for Malware Analysis [patent_app_type] => utility [patent_app_number] => 15/566687 [patent_app_country] => US [patent_app_date] => 2016-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2856 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 97 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15566687 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/566687
Recurrent neural networks for malware analysis Apr 14, 2016 Issued
Menu