
Victor D. Lesniewski
Examiner (ID: 9257, Phone: (571)272-2812 , Office: P/2493 )
| Most Active Art Unit | 2493 |
| Art Unit(s) | 2152, 2493, 2155 |
| Total Applications | 588 |
| Issued Applications | 311 |
| Pending Applications | 59 |
| Abandoned Applications | 239 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19469551
[patent_doc_number] => 20240323221
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-26
[patent_title] => SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 18/733543
[patent_app_country] => US
[patent_app_date] => 2024-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11987
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18733543
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/733543 | SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS | Jun 3, 2024 | Pending |
Array
(
[id] => 19469551
[patent_doc_number] => 20240323221
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-26
[patent_title] => SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 18/733543
[patent_app_country] => US
[patent_app_date] => 2024-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11987
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18733543
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/733543 | SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS | Jun 3, 2024 | Pending |
Array
(
[id] => 20304358
[patent_doc_number] => 12450351
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-10-21
[patent_title] => Method of malware detection and system thereof
[patent_app_type] => utility
[patent_app_number] => 18/679330
[patent_app_country] => US
[patent_app_date] => 2024-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7030
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 380
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18679330
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/679330 | Method of malware detection and system thereof | May 29, 2024 | Issued |
Array
(
[id] => 20323483
[patent_doc_number] => 20250335571
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-10-30
[patent_title] => METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR VERIFYING PASSWORD
[patent_app_type] => utility
[patent_app_number] => 18/675497
[patent_app_country] => US
[patent_app_date] => 2024-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1161
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18675497
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/675497 | METHOD, DEVICE, AND COMPUTER PROGRAM PRODUCT FOR VERIFYING PASSWORD | May 27, 2024 | Pending |
Array
(
[id] => 20168635
[patent_doc_number] => 20250260682
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-08-14
[patent_title] => PINNING DEVICE IDENTIFIERS TO CRYPTOGRAPHIC KEY PAIRS
[patent_app_type] => utility
[patent_app_number] => 18/659597
[patent_app_country] => US
[patent_app_date] => 2024-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 0
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 70
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18659597
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/659597 | PINNING DEVICE IDENTIFIERS TO CRYPTOGRAPHIC KEY PAIRS | May 8, 2024 | Pending |
Array
(
[id] => 20190389
[patent_doc_number] => 12401523
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-26
[patent_title] => Hashing messages with cryptographic key components
[patent_app_type] => utility
[patent_app_number] => 18/634128
[patent_app_country] => US
[patent_app_date] => 2024-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2562
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18634128
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/634128 | Hashing messages with cryptographic key components | Apr 11, 2024 | Issued |
Array
(
[id] => 20190389
[patent_doc_number] => 12401523
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-26
[patent_title] => Hashing messages with cryptographic key components
[patent_app_type] => utility
[patent_app_number] => 18/634128
[patent_app_country] => US
[patent_app_date] => 2024-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2562
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18634128
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/634128 | Hashing messages with cryptographic key components | Apr 11, 2024 | Issued |
Array
(
[id] => 20228622
[patent_doc_number] => 12417275
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-16
[patent_title] => Preventing unauthorized access to personal data during authentication processes
[patent_app_type] => utility
[patent_app_number] => 18/605125
[patent_app_country] => US
[patent_app_date] => 2024-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 4842
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18605125
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/605125 | Preventing unauthorized access to personal data during authentication processes | Mar 13, 2024 | Issued |
Array
(
[id] => 20228622
[patent_doc_number] => 12417275
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-16
[patent_title] => Preventing unauthorized access to personal data during authentication processes
[patent_app_type] => utility
[patent_app_number] => 18/605125
[patent_app_country] => US
[patent_app_date] => 2024-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 4842
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18605125
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/605125 | Preventing unauthorized access to personal data during authentication processes | Mar 13, 2024 | Issued |
Array
(
[id] => 19383315
[patent_doc_number] => 20240273185
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-15
[patent_title] => INTROSPECTION DRIVEN BY INCIDENTS FOR CONTROLLING INFILTRATION
[patent_app_type] => utility
[patent_app_number] => 18/582583
[patent_app_country] => US
[patent_app_date] => 2024-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11177
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18582583
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/582583 | INTROSPECTION DRIVEN BY INCIDENTS FOR CONTROLLING INFILTRATION | Feb 19, 2024 | Pending |
Array
(
[id] => 19648020
[patent_doc_number] => 20240422540
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-19
[patent_title] => VERIFICATION SYSTEM FOR OMNICHANNEL END-USER VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 18/438680
[patent_app_country] => US
[patent_app_date] => 2024-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7574
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18438680
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/438680 | VERIFICATION SYSTEM FOR OMNICHANNEL END-USER VERIFICATION | Feb 11, 2024 | Pending |
Array
(
[id] => 19207097
[patent_doc_number] => 20240178996
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-30
[patent_title] => Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
[patent_app_type] => utility
[patent_app_number] => 18/433664
[patent_app_country] => US
[patent_app_date] => 2024-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 66660
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 306
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18433664
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/433664 | Set of servers for "machine-to-machine" communications using public key infrastructure | Feb 5, 2024 | Issued |
Array
(
[id] => 19547669
[patent_doc_number] => 20240364705
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-31
[patent_title] => SYSTEM AND METHOD FOR CONTINUOUS MONITORING AND REVOCATION OF DEVICE ACCESS AUTHORIZATION
[patent_app_type] => utility
[patent_app_number] => 18/422966
[patent_app_country] => US
[patent_app_date] => 2024-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3423
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18422966
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/422966 | SYSTEM AND METHOD FOR CONTINUOUS MONITORING AND REVOCATION OF DEVICE ACCESS AUTHORIZATION | Jan 24, 2024 | Pending |
Array
(
[id] => 18976381
[patent_doc_number] => 20240056473
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-02-15
[patent_title] => Determining the Exposure Level Of Vulnerabilities
[patent_app_type] => utility
[patent_app_number] => 18/495027
[patent_app_country] => US
[patent_app_date] => 2023-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6282
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 247
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18495027
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/495027 | Determining the exposure level of vulnerabilities | Oct 25, 2023 | Issued |
Array
(
[id] => 19880647
[patent_doc_number] => 20250112904
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-03
[patent_title] => AUTHENTICATION PROVIDER ELIGIBLITY
[patent_app_type] => utility
[patent_app_number] => 18/375233
[patent_app_country] => US
[patent_app_date] => 2023-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8301
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18375233
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/375233 | AUTHENTICATION PROVIDER ELIGIBLITY | Sep 28, 2023 | Pending |
Array
(
[id] => 19880647
[patent_doc_number] => 20250112904
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-03
[patent_title] => AUTHENTICATION PROVIDER ELIGIBLITY
[patent_app_type] => utility
[patent_app_number] => 18/375233
[patent_app_country] => US
[patent_app_date] => 2023-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8301
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18375233
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/375233 | AUTHENTICATION PROVIDER ELIGIBLITY | Sep 28, 2023 | Pending |
Array
(
[id] => 19864912
[patent_doc_number] => 20250103698
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-27
[patent_title] => IDENTIFYING AND AUTHENTICATING USERS IN A CONFERENCE ROOM
[patent_app_type] => utility
[patent_app_number] => 18/474530
[patent_app_country] => US
[patent_app_date] => 2023-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17240
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18474530
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/474530 | IDENTIFYING AND AUTHENTICATING USERS IN A CONFERENCE ROOM | Sep 25, 2023 | Pending |
Array
(
[id] => 19315241
[patent_doc_number] => 12041074
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-07-16
[patent_title] => Malware spread simulation and visualization for cloud security
[patent_app_type] => utility
[patent_app_number] => 18/345307
[patent_app_country] => US
[patent_app_date] => 2023-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 11942
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18345307
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/345307 | Malware spread simulation and visualization for cloud security | Jun 29, 2023 | Issued |
Array
(
[id] => 20176602
[patent_doc_number] => 12395362
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-19
[patent_title] => Reward point transfers using blockchain
[patent_app_type] => utility
[patent_app_number] => 18/342222
[patent_app_country] => US
[patent_app_date] => 2023-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11180
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18342222
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/342222 | Reward point transfers using blockchain | Jun 26, 2023 | Issued |
Array
(
[id] => 19647618
[patent_doc_number] => 20240422138
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-12-19
[patent_title] => ENTERPRISE PROTECTION VIA IDENTIFICATION AND MITIGATION OF BAD ACTORS AT THE EDGE
[patent_app_type] => utility
[patent_app_number] => 18/208281
[patent_app_country] => US
[patent_app_date] => 2023-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6672
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 396
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18208281
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/208281 | Enterprise protection via identification and mitigation of bad actors at the edge | Jun 10, 2023 | Issued |