Search

Victor D. Lesniewski

Examiner (ID: 9257, Phone: (571)272-2812 , Office: P/2493 )

Most Active Art Unit
2493
Art Unit(s)
2152, 2493, 2155
Total Applications
588
Issued Applications
311
Pending Applications
59
Abandoned Applications
239

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11682313 [patent_doc_number] => 09680863 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-06-13 [patent_title] => 'Automated responses to security threats' [patent_app_type] => utility [patent_app_number] => 14/674679 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7112 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 57 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674679 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674679
Automated responses to security threats Mar 30, 2015 Issued
Array ( [id] => 11806692 [patent_doc_number] => 09547763 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-01-17 [patent_title] => 'Authentication using facial recognition' [patent_app_type] => utility [patent_app_number] => 14/674347 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 7076 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 184 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674347 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674347
Authentication using facial recognition Mar 30, 2015 Issued
Array ( [id] => 10818744 [patent_doc_number] => 20160164908 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-09 [patent_title] => 'CONTAINMENT OF SECURITY THREATS WITHIN A COMPUTING ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 14/675176 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6194 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675176 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/675176
Containment of security threats within a computing environment Mar 30, 2015 Issued
Array ( [id] => 15429331 [patent_doc_number] => 10547610 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-01-28 [patent_title] => Age adapted biometric authentication [patent_app_type] => utility [patent_app_number] => 14/674420 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8895 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 294 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674420 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674420
Age adapted biometric authentication Mar 30, 2015 Issued
Array ( [id] => 12296727 [patent_doc_number] => 09935934 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-04-03 [patent_title] => Token management [patent_app_type] => utility [patent_app_number] => 14/674943 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 30 [patent_figures_cnt] => 30 [patent_no_of_words] => 7561 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 485 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674943 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674943
Token management Mar 30, 2015 Issued
Array ( [id] => 11095443 [patent_doc_number] => 20160292412 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-06 [patent_title] => 'AUTO-CREATION OF APPLICATION PASSWORDS' [patent_app_type] => utility [patent_app_number] => 14/675419 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8414 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675419 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/675419
Auto-creation of application passwords Mar 30, 2015 Issued
Array ( [id] => 11208987 [patent_doc_number] => 09438622 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-09-06 [patent_title] => 'Systems and methods for analyzing malicious PDF network content' [patent_app_type] => utility [patent_app_number] => 14/673292 [patent_app_country] => US [patent_app_date] => 2015-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 12620 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14673292 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/673292
Systems and methods for analyzing malicious PDF network content Mar 29, 2015 Issued
Array ( [id] => 11080472 [patent_doc_number] => 20160277436 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-09-22 [patent_title] => 'System and Method for Information Security Threat Disruption via a Border Gateway' [patent_app_type] => utility [patent_app_number] => 14/893668 [patent_app_country] => US [patent_app_date] => 2015-03-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8709 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14893668 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/893668
System and method for information security threat disruption via a border gateway Mar 17, 2015 Issued
Array ( [id] => 16610397 [patent_doc_number] => 10911428 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-02-02 [patent_title] => Use of metadata for computing resource access [patent_app_type] => utility [patent_app_number] => 14/634513 [patent_app_country] => US [patent_app_date] => 2015-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 28 [patent_no_of_words] => 21135 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 361 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14634513 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/634513
Use of metadata for computing resource access Feb 26, 2015 Issued
Array ( [id] => 10295887 [patent_doc_number] => 20150180886 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-06-25 [patent_title] => 'Systems and Methods for Scheduling Analysis of Network Content for Malware' [patent_app_type] => utility [patent_app_number] => 14/620101 [patent_app_country] => US [patent_app_date] => 2015-02-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9817 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620101 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/620101
Systems and Methods for Scheduling Analysis of Network Content for Malware Feb 10, 2015 Abandoned
Array ( [id] => 10644563 [patent_doc_number] => 09361435 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-06-07 [patent_title] => 'Multi-tier digital supply chain management' [patent_app_type] => utility [patent_app_number] => 14/597150 [patent_app_country] => US [patent_app_date] => 2015-01-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8042 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 310 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14597150 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/597150
Multi-tier digital supply chain management Jan 13, 2015 Issued
Array ( [id] => 10589884 [patent_doc_number] => 09311504 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-04-12 [patent_title] => 'Anti-identity-theft method and hardware database device' [patent_app_type] => utility [patent_app_number] => 14/551851 [patent_app_country] => US [patent_app_date] => 2014-11-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 13059 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 328 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14551851 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/551851
Anti-identity-theft method and hardware database device Nov 23, 2014 Issued
Array ( [id] => 10322779 [patent_doc_number] => 20150207783 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-07-23 [patent_title] => 'ENCRYPTION SYSTEM USING WEB BROWSERS AND UNTRUSTED WEB SERVERS' [patent_app_type] => utility [patent_app_number] => 14/552026 [patent_app_country] => US [patent_app_date] => 2014-11-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6571 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14552026 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/552026
Encryption system using web browsers and untrusted web servers Nov 23, 2014 Issued
14/462354 SYSTEMS AND METHODS FOR DETECTING SENSITIVE USER DATA ON THE INTERNET Aug 17, 2014 Abandoned
Array ( [id] => 9897408 [patent_doc_number] => 20150052607 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-19 [patent_title] => 'METHOD AND SYSTEM FOR PROTECTING WEB APPLICATIONS AGAINST WEB ATTACKS' [patent_app_type] => utility [patent_app_number] => 14/461021 [patent_app_country] => US [patent_app_date] => 2014-08-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3470 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14461021 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/461021
METHOD AND SYSTEM FOR PROTECTING WEB APPLICATIONS AGAINST WEB ATTACKS Aug 14, 2014 Abandoned
Array ( [id] => 10696034 [patent_doc_number] => 20160042179 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-11 [patent_title] => 'METHOD OF MALWARE DETECTION AND SYSTEM THEREOF' [patent_app_type] => utility [patent_app_number] => 14/456127 [patent_app_country] => US [patent_app_date] => 2014-08-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 12372 [patent_no_of_claims] => 41 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14456127 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/456127
Method of malware detection and system thereof Aug 10, 2014 Issued
Array ( [id] => 10690691 [patent_doc_number] => 20160036837 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-04 [patent_title] => 'DETECTING ATTACKS ON DATA CENTERS' [patent_app_type] => utility [patent_app_number] => 14/450954 [patent_app_country] => US [patent_app_date] => 2014-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 12381 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14450954 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/450954
DETECTING ATTACKS ON DATA CENTERS Aug 3, 2014 Abandoned
Array ( [id] => 10690696 [patent_doc_number] => 20160036843 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-04 [patent_title] => 'CONNECTED HOME SYSTEM WITH CYBER SECURITY MONITORING' [patent_app_type] => utility [patent_app_number] => 14/449474 [patent_app_country] => US [patent_app_date] => 2014-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1361 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14449474 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/449474
CONNECTED HOME SYSTEM WITH CYBER SECURITY MONITORING Jul 31, 2014 Abandoned
Array ( [id] => 10320751 [patent_doc_number] => 20150205755 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-07-23 [patent_title] => 'Extensible Media Format System and Methods of Use' [patent_app_type] => utility [patent_app_number] => 14/450091 [patent_app_country] => US [patent_app_date] => 2014-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7026 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14450091 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/450091
Extensible Media Format System and Methods of Use Jul 31, 2014 Abandoned
Array ( [id] => 10690665 [patent_doc_number] => 20160036812 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-04 [patent_title] => 'Database Queries Integrity and External Security Mechanisms in Database Forensic Examinations' [patent_app_type] => utility [patent_app_number] => 14/448286 [patent_app_country] => US [patent_app_date] => 2014-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5246 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14448286 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/448286
Database Queries Integrity and External Security Mechanisms in Database Forensic Examinations Jul 30, 2014 Abandoned
Menu