
Vadim Savenkov
Examiner (ID: 796, Phone: (571)270-5751 , Office: P/2431 )
| Most Active Art Unit | 2432 |
| Art Unit(s) | 2431, 2432 |
| Total Applications | 370 |
| Issued Applications | 198 |
| Pending Applications | 70 |
| Abandoned Applications | 120 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11933542
[patent_doc_number] => 09800552
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Method of connecting security gateway to mesh network'
[patent_app_type] => utility
[patent_app_number] => 15/278017
[patent_app_country] => US
[patent_app_date] => 2016-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2520
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15278017
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/278017 | Method of connecting security gateway to mesh network | Sep 26, 2016 | Issued |
Array
(
[id] => 11951624
[patent_doc_number] => 20170255775
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-07
[patent_title] => 'SOFTWARE VERIFICATION SYSTEMS WITH MULTIPLE VERIFICATION PATHS'
[patent_app_type] => utility
[patent_app_number] => 15/266363
[patent_app_country] => US
[patent_app_date] => 2016-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6922
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15266363
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/266363 | SOFTWARE VERIFICATION SYSTEMS WITH MULTIPLE VERIFICATION PATHS | Sep 14, 2016 | Abandoned |
Array
(
[id] => 11504695
[patent_doc_number] => 20170078880
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'CLOUD-BASED FRIEND ONBOARDING FOR WI-FI NETWORK COMMUNICATION AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/255734
[patent_app_country] => US
[patent_app_date] => 2016-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4704
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15255734
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/255734 | CLOUD-BASED FRIEND ONBOARDING FOR WI-FI NETWORK COMMUNICATION AUTHENTICATION | Sep 1, 2016 | Abandoned |
Array
(
[id] => 12224728
[patent_doc_number] => 20180063088
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'HYPERVISOR NETWORK PROFILES TO FACILITATE VPN TUNNEL'
[patent_app_type] => utility
[patent_app_number] => 15/254070
[patent_app_country] => US
[patent_app_date] => 2016-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10079
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15254070
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/254070 | HYPERVISOR NETWORK PROFILES TO FACILITATE VPN TUNNEL | Aug 31, 2016 | Abandoned |
Array
(
[id] => 12189703
[patent_doc_number] => 20180048639
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-15
[patent_title] => 'SYSTEMS AND METHODS TO SECURELY CONSTRUCT A NETWORK FABRIC'
[patent_app_type] => utility
[patent_app_number] => 15/234757
[patent_app_country] => US
[patent_app_date] => 2016-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12098
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15234757
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/234757 | Systems and methods to securely construct a network fabric | Aug 10, 2016 | Issued |
Array
(
[id] => 11438354
[patent_doc_number] => 20170039374
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'Randomization and Informed Search for Cyber Attack Protection'
[patent_app_type] => utility
[patent_app_number] => 15/228838
[patent_app_country] => US
[patent_app_date] => 2016-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8649
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15228838
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/228838 | Randomization and informed search for cyber attack protection | Aug 3, 2016 | Issued |
Array
(
[id] => 14922507
[patent_doc_number] => 10432589
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-01
[patent_title] => Secure end-to-end communications
[patent_app_type] => utility
[patent_app_number] => 15/223557
[patent_app_country] => US
[patent_app_date] => 2016-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5956
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15223557
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/223557 | Secure end-to-end communications | Jul 28, 2016 | Issued |
Array
(
[id] => 15141849
[patent_doc_number] => 10484427
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-19
[patent_title] => Methods and systems for providing configuration management for computing environments
[patent_app_type] => utility
[patent_app_number] => 15/207217
[patent_app_country] => US
[patent_app_date] => 2016-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 7350
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15207217
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/207217 | Methods and systems for providing configuration management for computing environments | Jul 10, 2016 | Issued |
Array
(
[id] => 14299467
[patent_doc_number] => 10289861
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-14
[patent_title] => Permission-based secure media content sharing
[patent_app_type] => utility
[patent_app_number] => 15/200117
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 8438
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15200117
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/200117 | Permission-based secure media content sharing | Jun 30, 2016 | Issued |
Array
(
[id] => 11447041
[patent_doc_number] => 20170048062
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'METHODS FOR FACILITATING SECURE COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 15/194100
[patent_app_country] => US
[patent_app_date] => 2016-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4800
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15194100
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/194100 | METHODS FOR FACILITATING SECURE COMMUNICATION | Jun 26, 2016 | Abandoned |
Array
(
[id] => 14461547
[patent_doc_number] => 10326753
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-18
[patent_title] => Authentication via revocable signatures
[patent_app_type] => utility
[patent_app_number] => 15/190731
[patent_app_country] => US
[patent_app_date] => 2016-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 6054
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15190731
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/190731 | Authentication via revocable signatures | Jun 22, 2016 | Issued |
Array
(
[id] => 12532842
[patent_doc_number] => 10007802
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-26
[patent_title] => Device, method, and graphical user interface for accessing an application in a locked device
[patent_app_type] => utility
[patent_app_number] => 15/187463
[patent_app_country] => US
[patent_app_date] => 2016-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 90
[patent_figures_cnt] => 90
[patent_no_of_words] => 36613
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15187463
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/187463 | Device, method, and graphical user interface for accessing an application in a locked device | Jun 19, 2016 | Issued |
Array
(
[id] => 12094775
[patent_doc_number] => 20170351868
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'CHOREOGRAPHED DISTRIBUTED EXECUTION OF PROGRAMS'
[patent_app_type] => utility
[patent_app_number] => 15/170767
[patent_app_country] => US
[patent_app_date] => 2016-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12173
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15170767
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/170767 | Choreographed distributed execution of programs | May 31, 2016 | Issued |
Array
(
[id] => 13161567
[patent_doc_number] => 10097522
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-09
[patent_title] => Encrypted query-based access to data
[patent_app_type] => utility
[patent_app_number] => 15/161563
[patent_app_country] => US
[patent_app_date] => 2016-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 13037
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15161563
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/161563 | Encrypted query-based access to data | May 22, 2016 | Issued |
Array
(
[id] => 14401135
[patent_doc_number] => 10313877
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => Method and system for facilitating participation of an intermediary network device in a security gateway communication between at least one base station and a core network portion in a cellular communication network
[patent_app_type] => utility
[patent_app_number] => 15/152848
[patent_app_country] => US
[patent_app_date] => 2016-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5179
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15152848
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/152848 | Method and system for facilitating participation of an intermediary network device in a security gateway communication between at least one base station and a core network portion in a cellular communication network | May 11, 2016 | Issued |
Array
(
[id] => 14461237
[patent_doc_number] => 10326598
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-18
[patent_title] => Method for generating a message signature from a signature token encrypted by means of a homomorphic encryption function
[patent_app_type] => utility
[patent_app_number] => 15/144636
[patent_app_country] => US
[patent_app_date] => 2016-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4837
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15144636
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/144636 | Method for generating a message signature from a signature token encrypted by means of a homomorphic encryption function | May 1, 2016 | Issued |
Array
(
[id] => 11042721
[patent_doc_number] => 20160239677
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-18
[patent_title] => 'DYNAMIC SECURITY POLICY GENERATION'
[patent_app_type] => utility
[patent_app_number] => 15/138028
[patent_app_country] => US
[patent_app_date] => 2016-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7585
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15138028
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/138028 | Dynamic security policy generation | Apr 24, 2016 | Issued |
Array
(
[id] => 13294887
[patent_doc_number] => 10158651
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-18
[patent_title] => Verifying secure transactions through distributed nodes
[patent_app_type] => utility
[patent_app_number] => 15/134022
[patent_app_country] => US
[patent_app_date] => 2016-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9551
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15134022
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/134022 | Verifying secure transactions through distributed nodes | Apr 19, 2016 | Issued |
Array
(
[id] => 11111857
[patent_doc_number] => 20160308829
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'INFORMATION SECURITY DEVICE AND INFORMATION SECURITY METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 15/098520
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9629
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15098520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/098520 | INFORMATION SECURITY DEVICE AND INFORMATION SECURITY METHOD THEREOF | Apr 13, 2016 | Abandoned |
Array
(
[id] => 11996743
[patent_doc_number] => 20170300898
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'Method and Apparatus for Information Management'
[patent_app_type] => utility
[patent_app_number] => 15/097513
[patent_app_country] => US
[patent_app_date] => 2016-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7279
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15097513
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/097513 | Method and apparatus for information management | Apr 12, 2016 | Issued |