![](/images/general/no_picture/200_user.png)
Stefan Staicovici
Examiner (ID: 8353)
Most Active Art Unit | 1732 |
Art Unit(s) | 1732 |
Total Applications | 530 |
Issued Applications | 343 |
Pending Applications | 47 |
Abandoned Applications | 140 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 12853225
[patent_doc_number] => 20180176249
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-21
[patent_title] => SYSTEM AND METHOD FOR DETECTING FALSE DATA INJECTION IN ELECTRICAL SUBSTATIONS
[patent_app_type] => utility
[patent_app_number] => 15/386339
[patent_app_country] => US
[patent_app_date] => 2016-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5142
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15386339
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/386339 | System and method for detecting false data injection in electrical substations | Dec 20, 2016 | Issued |
Array
(
[id] => 17196789
[patent_doc_number] => 11165565
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-02
[patent_title] => Secure distribution private keys for use by untrusted code
[patent_app_type] => utility
[patent_app_number] => 15/375066
[patent_app_country] => US
[patent_app_date] => 2016-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7244
[patent_no_of_claims] => 51
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15375066
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/375066 | Secure distribution private keys for use by untrusted code | Dec 8, 2016 | Issued |
Array
(
[id] => 14269955
[patent_doc_number] => 10284557
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-05-07
[patent_title] => Secure data proxy for cloud computing environments
[patent_app_type] => utility
[patent_app_number] => 15/354486
[patent_app_country] => US
[patent_app_date] => 2016-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7112
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15354486
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/354486 | Secure data proxy for cloud computing environments | Nov 16, 2016 | Issued |
Array
(
[id] => 15172099
[patent_doc_number] => 10491569
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-26
[patent_title] => Secure transfer of independent security domains across shared media
[patent_app_type] => utility
[patent_app_number] => 15/348272
[patent_app_country] => US
[patent_app_date] => 2016-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 8044
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15348272
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/348272 | Secure transfer of independent security domains across shared media | Nov 9, 2016 | Issued |
Array
(
[id] => 15582993
[patent_doc_number] => 10581903
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-03
[patent_title] => Systems and methods for preventing denial of service attacks utilizing a proxy server
[patent_app_type] => utility
[patent_app_number] => 15/345067
[patent_app_country] => US
[patent_app_date] => 2016-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6611
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 267
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15345067
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/345067 | Systems and methods for preventing denial of service attacks utilizing a proxy server | Nov 6, 2016 | Issued |
Array
(
[id] => 15317905
[patent_doc_number] => 10523678
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => System and method for architecture initiated network access control
[patent_app_type] => utility
[patent_app_number] => 15/333247
[patent_app_country] => US
[patent_app_date] => 2016-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15118
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15333247
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/333247 | System and method for architecture initiated network access control | Oct 24, 2016 | Issued |
Array
(
[id] => 14673725
[patent_doc_number] => 10374792
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-08-06
[patent_title] => Layout-independent cryptographic stamp of a distributed dataset
[patent_app_type] => utility
[patent_app_number] => 15/280620
[patent_app_country] => US
[patent_app_date] => 2016-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6194
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15280620
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/280620 | Layout-independent cryptographic stamp of a distributed dataset | Sep 28, 2016 | Issued |
Array
(
[id] => 15735523
[patent_doc_number] => 10616206
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => Digital certificate for verifying application purpose of data usage
[patent_app_type] => utility
[patent_app_number] => 15/276815
[patent_app_country] => US
[patent_app_date] => 2016-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5273
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15276815
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/276815 | Digital certificate for verifying application purpose of data usage | Sep 26, 2016 | Issued |
Array
(
[id] => 12599055
[patent_doc_number] => 20180091515
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => DISTRIBUTION OF CODE TO AN AUTHORIZED TARGET INFRASTRUCTURE
[patent_app_type] => utility
[patent_app_number] => 15/277170
[patent_app_country] => US
[patent_app_date] => 2016-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5399
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 55
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15277170
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/277170 | DISTRIBUTION OF CODE TO AN AUTHORIZED TARGET INFRASTRUCTURE | Sep 26, 2016 | Abandoned |
Array
(
[id] => 15141851
[patent_doc_number] => 10484428
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-19
[patent_title] => Methods and systems for securing VPN cloud servers
[patent_app_type] => utility
[patent_app_number] => 15/275988
[patent_app_country] => US
[patent_app_date] => 2016-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6629
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15275988
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/275988 | Methods and systems for securing VPN cloud servers | Sep 25, 2016 | Issued |
Array
(
[id] => 14528081
[patent_doc_number] => 10341314
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Method of security and verifiability of an electronic vote
[patent_app_type] => utility
[patent_app_number] => 15/248330
[patent_app_country] => US
[patent_app_date] => 2016-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 3
[patent_no_of_words] => 4070
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15248330
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/248330 | Method of security and verifiability of an electronic vote | Aug 25, 2016 | Issued |
Array
(
[id] => 17033856
[patent_doc_number] => 11095682
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-08-17
[patent_title] => Mitigating phishing attempts
[patent_app_type] => utility
[patent_app_number] => 15/249172
[patent_app_country] => US
[patent_app_date] => 2016-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5781
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15249172
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/249172 | Mitigating phishing attempts | Aug 25, 2016 | Issued |
Array
(
[id] => 16173738
[patent_doc_number] => 10715324
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-14
[patent_title] => Device and method for securing commands exchanged between a terminal and an integrated circuit
[patent_app_type] => utility
[patent_app_number] => 15/248115
[patent_app_country] => US
[patent_app_date] => 2016-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 12
[patent_no_of_words] => 7662
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15248115
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/248115 | Device and method for securing commands exchanged between a terminal and an integrated circuit | Aug 25, 2016 | Issued |
Array
(
[id] => 15674673
[patent_doc_number] => 10601582
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-24
[patent_title] => Method of linear transformation (variants)
[patent_app_type] => utility
[patent_app_number] => 15/513823
[patent_app_country] => US
[patent_app_date] => 2016-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 14
[patent_no_of_words] => 7627
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 720
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15513823
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/513823 | Method of linear transformation (variants) | Jul 25, 2016 | Issued |
Array
(
[id] => 16463092
[patent_doc_number] => 10846441
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-24
[patent_title] => Computer system
[patent_app_type] => utility
[patent_app_number] => 16/082259
[patent_app_country] => US
[patent_app_date] => 2016-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 24
[patent_no_of_words] => 10595
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16082259
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/082259 | Computer system | Jul 6, 2016 | Issued |
Array
(
[id] => 11405835
[patent_doc_number] => 20170026373
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'COMMUNICATION RELAY DEVICE, COMMUNICATION NETWORK, AND COMMUNICATION RELAY METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/194793
[patent_app_country] => US
[patent_app_date] => 2016-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10537
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15194793
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/194793 | Communication relay device, communication network, and communication relay method | Jun 27, 2016 | Issued |
Array
(
[id] => 11496330
[patent_doc_number] => 20170070515
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-09
[patent_title] => 'IDENTIFICATION METHOD AND INFORMATION PROCESSING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/193264
[patent_app_country] => US
[patent_app_date] => 2016-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 39
[patent_figures_cnt] => 39
[patent_no_of_words] => 15067
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15193264
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/193264 | Identification method and information processing device | Jun 26, 2016 | Issued |
Array
(
[id] => 17106348
[patent_doc_number] => 11126565
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-21
[patent_title] => Encrypted memory access using page table attributes
[patent_app_type] => utility
[patent_app_number] => 15/193146
[patent_app_country] => US
[patent_app_date] => 2016-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5930
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15193146
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/193146 | Encrypted memory access using page table attributes | Jun 26, 2016 | Issued |
Array
(
[id] => 13501747
[patent_doc_number] => 20180302416
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-18
[patent_title] => CONTINUOUS AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 15/569355
[patent_app_country] => US
[patent_app_date] => 2016-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16865
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 61
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15569355
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/569355 | Continuous authentication | May 1, 2016 | Issued |
Array
(
[id] => 12629553
[patent_doc_number] => 20180101681
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-12
[patent_title] => Recurrent Neural Networks for Malware Analysis
[patent_app_type] => utility
[patent_app_number] => 15/566687
[patent_app_country] => US
[patent_app_date] => 2016-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2856
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15566687
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/566687 | Recurrent neural networks for malware analysis | Apr 14, 2016 | Issued |