
Vadim Savenkov
Examiner (ID: 9929, Phone: (571)270-5751 , Office: P/2431 )
| Most Active Art Unit | 2432 |
| Art Unit(s) | 2432, 2431 |
| Total Applications | 367 |
| Issued Applications | 192 |
| Pending Applications | 84 |
| Abandoned Applications | 116 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19538357
[patent_doc_number] => 12130910
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-10-29
[patent_title] => Threshold signature based medical device management
[patent_app_type] => utility
[patent_app_number] => 16/869404
[patent_app_country] => US
[patent_app_date] => 2020-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9630
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 348
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16869404
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/869404 | Threshold signature based medical device management | May 6, 2020 | Issued |
Array
(
[id] => 17190062
[patent_doc_number] => 20210336947
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-10-28
[patent_title] => ROGUE CERTIFICATE DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/859970
[patent_app_country] => US
[patent_app_date] => 2020-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9053
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16859970
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/859970 | ROGUE CERTIFICATE DETECTION | Apr 26, 2020 | Abandoned |
Array
(
[id] => 18347459
[patent_doc_number] => 20230135569
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-05-04
[patent_title] => AUTHENTICATION SERVER, AUTHENTICATION SYSTEM, AND AUTHENTICATION SERVER CONTROL METHOD
[patent_app_type] => utility
[patent_app_number] => 17/918159
[patent_app_country] => US
[patent_app_date] => 2020-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17681
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17918159
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/918159 | AUTHENTICATION SERVER, AUTHENTICATION SYSTEM, AND AUTHENTICATION SERVER CONTROL METHOD | Apr 23, 2020 | Abandoned |
Array
(
[id] => 16378395
[patent_doc_number] => 20200327237
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-15
[patent_title] => SYSTEMS AND METHODS FOR AGGREGATING, RANKING, AND MINIMIZING THREATS TO COMPUTER SYSTEMS BASED ON EXTERNAL VULNERABILITY INTELLIGENCE
[patent_app_type] => utility
[patent_app_number] => 16/846001
[patent_app_country] => US
[patent_app_date] => 2020-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9781
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 50
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16846001
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/846001 | SYSTEMS AND METHODS FOR AGGREGATING, RANKING, AND MINIMIZING THREATS TO COMPUTER SYSTEMS BASED ON EXTERNAL VULNERABILITY INTELLIGENCE | Apr 9, 2020 | Abandoned |
Array
(
[id] => 17086554
[patent_doc_number] => 20210281561
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-09
[patent_title] => CERTIFICATION FOR CONNECTION OF VIRTUAL COMMUNICATION ENDPOINTS
[patent_app_type] => utility
[patent_app_number] => 16/813178
[patent_app_country] => US
[patent_app_date] => 2020-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8451
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16813178
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/813178 | CERTIFICATION FOR CONNECTION OF VIRTUAL COMMUNICATION ENDPOINTS | Mar 8, 2020 | Abandoned |
Array
(
[id] => 17071702
[patent_doc_number] => 20210273920
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-02
[patent_title] => SECURE CERTIFICATE OR KEY DISTRIBUTION FOR SYNCHRONOUS MOBILE DEVICE MANAGEMENT (MDM) CLIENTS
[patent_app_type] => utility
[patent_app_number] => 16/804824
[patent_app_country] => US
[patent_app_date] => 2020-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7500
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16804824
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/804824 | Secure certificate or key distribution for synchronous mobile device management (MDM) clients | Feb 27, 2020 | Issued |
Array
(
[id] => 16003363
[patent_doc_number] => 20200177552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => METHODS AND APPARATUS FOR MALWARE THREAT RESEARCH
[patent_app_type] => utility
[patent_app_number] => 16/786692
[patent_app_country] => US
[patent_app_date] => 2020-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15836
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 320
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16786692
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/786692 | METHODS AND APPARATUS FOR MALWARE THREAT RESEARCH | Feb 9, 2020 | Pending |
Array
(
[id] => 16003363
[patent_doc_number] => 20200177552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => METHODS AND APPARATUS FOR MALWARE THREAT RESEARCH
[patent_app_type] => utility
[patent_app_number] => 16/786692
[patent_app_country] => US
[patent_app_date] => 2020-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15836
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 320
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16786692
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/786692 | METHODS AND APPARATUS FOR MALWARE THREAT RESEARCH | Feb 9, 2020 | Pending |
Array
(
[id] => 16003363
[patent_doc_number] => 20200177552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => METHODS AND APPARATUS FOR MALWARE THREAT RESEARCH
[patent_app_type] => utility
[patent_app_number] => 16/786692
[patent_app_country] => US
[patent_app_date] => 2020-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15836
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 320
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16786692
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/786692 | METHODS AND APPARATUS FOR MALWARE THREAT RESEARCH | Feb 9, 2020 | Pending |
Array
(
[id] => 17289684
[patent_doc_number] => 11206256
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-21
[patent_title] => Table-connected tokenization
[patent_app_type] => utility
[patent_app_number] => 16/732048
[patent_app_country] => US
[patent_app_date] => 2019-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6646
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 393
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16732048
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/732048 | Table-connected tokenization | Dec 30, 2019 | Issued |
Array
(
[id] => 16874662
[patent_doc_number] => 20210168129
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-03
[patent_title] => SYSTEM AND METHOD FOR PERSISTENT AUTHENTICATION OF A USER FOR ISSUING VIRTUAL TOKENS
[patent_app_type] => utility
[patent_app_number] => 16/700946
[patent_app_country] => US
[patent_app_date] => 2019-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6643
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16700946
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/700946 | SYSTEM AND METHOD FOR PERSISTENT AUTHENTICATION OF A USER FOR ISSUING VIRTUAL TOKENS | Dec 1, 2019 | Abandoned |
Array
(
[id] => 16810775
[patent_doc_number] => 20210133330
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-06
[patent_title] => DETERMINING A SECURITY SCORE IN BINARY SOFTWARE CODE
[patent_app_type] => utility
[patent_app_number] => 16/672183
[patent_app_country] => US
[patent_app_date] => 2019-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9556
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16672183
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/672183 | DETERMINING A SECURITY SCORE IN BINARY SOFTWARE CODE | Oct 31, 2019 | Pending |
Array
(
[id] => 15459791
[patent_doc_number] => 20200042720
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-06
[patent_title] => PRE-LAUNCH PROCESS VULNERABILITY ASSESSMENT
[patent_app_type] => utility
[patent_app_number] => 16/653702
[patent_app_country] => US
[patent_app_date] => 2019-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9320
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16653702
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/653702 | PRE-LAUNCH PROCESS VULNERABILITY ASSESSMENT | Oct 14, 2019 | Pending |
Array
(
[id] => 15459791
[patent_doc_number] => 20200042720
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-06
[patent_title] => PRE-LAUNCH PROCESS VULNERABILITY ASSESSMENT
[patent_app_type] => utility
[patent_app_number] => 16/653702
[patent_app_country] => US
[patent_app_date] => 2019-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9320
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16653702
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/653702 | PRE-LAUNCH PROCESS VULNERABILITY ASSESSMENT | Oct 14, 2019 | Pending |
Array
(
[id] => 15371603
[patent_doc_number] => 20200021566
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-16
[patent_title] => DYNAMIC ENCRYPTION METHOD
[patent_app_type] => utility
[patent_app_number] => 16/583105
[patent_app_country] => US
[patent_app_date] => 2019-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9642
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16583105
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/583105 | DYNAMIC ENCRYPTION METHOD | Sep 24, 2019 | Pending |
Array
(
[id] => 15413007
[patent_doc_number] => 20200026826
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-23
[patent_title] => TIERED CODE OBFUSCATION IN A DEVELOPMENT ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 16/571628
[patent_app_country] => US
[patent_app_date] => 2019-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8711
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16571628
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/571628 | TIERED CODE OBFUSCATION IN A DEVELOPMENT ENVIRONMENT | Sep 15, 2019 | Abandoned |
Array
(
[id] => 17869464
[patent_doc_number] => 20220292201
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-15
[patent_title] => BACKDOOR INSPECTION APPARATUS, BACKDOOR INSPECTION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 17/636420
[patent_app_country] => US
[patent_app_date] => 2019-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7383
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17636420
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/636420 | BACKDOOR INSPECTION APPARATUS, BACKDOOR INSPECTION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | Aug 26, 2019 | Abandoned |
Array
(
[id] => 15182393
[patent_doc_number] => 20190361788
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-28
[patent_title] => INTERACTIVE ANALYSIS OF A SECURITY SPECIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/537575
[patent_app_country] => US
[patent_app_date] => 2019-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4512
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16537575
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/537575 | INTERACTIVE ANALYSIS OF A SECURITY SPECIFICATION | Aug 10, 2019 | Abandoned |
Array
(
[id] => 17283297
[patent_doc_number] => 11200327
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-12-14
[patent_title] => Protecting virtual machine data in cloud environments
[patent_app_type] => utility
[patent_app_number] => 16/520462
[patent_app_country] => US
[patent_app_date] => 2019-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7669
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16520462
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/520462 | Protecting virtual machine data in cloud environments | Jul 23, 2019 | Issued |
Array
(
[id] => 16577625
[patent_doc_number] => 20210012026
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-14
[patent_title] => TOKENIZATION SYSTEM FOR CUSTOMER DATA IN AUDIO OR VIDEO
[patent_app_type] => utility
[patent_app_number] => 16/504822
[patent_app_country] => US
[patent_app_date] => 2019-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7788
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16504822
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/504822 | TOKENIZATION SYSTEM FOR CUSTOMER DATA IN AUDIO OR VIDEO | Jul 7, 2019 | Pending |