
Victor D. Lesniewski
Examiner (ID: 9257, Phone: (571)272-2812 , Office: P/2493 )
| Most Active Art Unit | 2493 |
| Art Unit(s) | 2152, 2493, 2155 |
| Total Applications | 588 |
| Issued Applications | 311 |
| Pending Applications | 59 |
| Abandoned Applications | 239 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11682313
[patent_doc_number] => 09680863
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-13
[patent_title] => 'Automated responses to security threats'
[patent_app_type] => utility
[patent_app_number] => 14/674679
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7112
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674679
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674679 | Automated responses to security threats | Mar 30, 2015 | Issued |
Array
(
[id] => 11806692
[patent_doc_number] => 09547763
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-17
[patent_title] => 'Authentication using facial recognition'
[patent_app_type] => utility
[patent_app_number] => 14/674347
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 7076
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674347
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674347 | Authentication using facial recognition | Mar 30, 2015 | Issued |
Array
(
[id] => 10818744
[patent_doc_number] => 20160164908
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'CONTAINMENT OF SECURITY THREATS WITHIN A COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/675176
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6194
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675176
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675176 | Containment of security threats within a computing environment | Mar 30, 2015 | Issued |
Array
(
[id] => 15429331
[patent_doc_number] => 10547610
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-01-28
[patent_title] => Age adapted biometric authentication
[patent_app_type] => utility
[patent_app_number] => 14/674420
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8895
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 294
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674420
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674420 | Age adapted biometric authentication | Mar 30, 2015 | Issued |
Array
(
[id] => 12296727
[patent_doc_number] => 09935934
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-03
[patent_title] => Token management
[patent_app_type] => utility
[patent_app_number] => 14/674943
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 7561
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 485
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674943
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674943 | Token management | Mar 30, 2015 | Issued |
Array
(
[id] => 11095443
[patent_doc_number] => 20160292412
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'AUTO-CREATION OF APPLICATION PASSWORDS'
[patent_app_type] => utility
[patent_app_number] => 14/675419
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8414
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675419
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675419 | Auto-creation of application passwords | Mar 30, 2015 | Issued |
Array
(
[id] => 11208987
[patent_doc_number] => 09438622
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-06
[patent_title] => 'Systems and methods for analyzing malicious PDF network content'
[patent_app_type] => utility
[patent_app_number] => 14/673292
[patent_app_country] => US
[patent_app_date] => 2015-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12620
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14673292
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/673292 | Systems and methods for analyzing malicious PDF network content | Mar 29, 2015 | Issued |
Array
(
[id] => 11080472
[patent_doc_number] => 20160277436
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-22
[patent_title] => 'System and Method for Information Security Threat Disruption via a Border Gateway'
[patent_app_type] => utility
[patent_app_number] => 14/893668
[patent_app_country] => US
[patent_app_date] => 2015-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8709
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14893668
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/893668 | System and method for information security threat disruption via a border gateway | Mar 17, 2015 | Issued |
Array
(
[id] => 16610397
[patent_doc_number] => 10911428
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-02-02
[patent_title] => Use of metadata for computing resource access
[patent_app_type] => utility
[patent_app_number] => 14/634513
[patent_app_country] => US
[patent_app_date] => 2015-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 28
[patent_no_of_words] => 21135
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 361
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14634513
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/634513 | Use of metadata for computing resource access | Feb 26, 2015 | Issued |
Array
(
[id] => 10295887
[patent_doc_number] => 20150180886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'Systems and Methods for Scheduling Analysis of Network Content for Malware'
[patent_app_type] => utility
[patent_app_number] => 14/620101
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9817
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620101
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620101 | Systems and Methods for Scheduling Analysis of Network Content for Malware | Feb 10, 2015 | Abandoned |
Array
(
[id] => 10644563
[patent_doc_number] => 09361435
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-06-07
[patent_title] => 'Multi-tier digital supply chain management'
[patent_app_type] => utility
[patent_app_number] => 14/597150
[patent_app_country] => US
[patent_app_date] => 2015-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8042
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 310
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14597150
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/597150 | Multi-tier digital supply chain management | Jan 13, 2015 | Issued |
Array
(
[id] => 10589884
[patent_doc_number] => 09311504
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-12
[patent_title] => 'Anti-identity-theft method and hardware database device'
[patent_app_type] => utility
[patent_app_number] => 14/551851
[patent_app_country] => US
[patent_app_date] => 2014-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 13059
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 328
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14551851
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/551851 | Anti-identity-theft method and hardware database device | Nov 23, 2014 | Issued |
Array
(
[id] => 10322779
[patent_doc_number] => 20150207783
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-23
[patent_title] => 'ENCRYPTION SYSTEM USING WEB BROWSERS AND UNTRUSTED WEB SERVERS'
[patent_app_type] => utility
[patent_app_number] => 14/552026
[patent_app_country] => US
[patent_app_date] => 2014-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6571
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14552026
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/552026 | Encryption system using web browsers and untrusted web servers | Nov 23, 2014 | Issued |
| 14/462354 | SYSTEMS AND METHODS FOR DETECTING SENSITIVE USER DATA ON THE INTERNET | Aug 17, 2014 | Abandoned |
Array
(
[id] => 9897408
[patent_doc_number] => 20150052607
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-19
[patent_title] => 'METHOD AND SYSTEM FOR PROTECTING WEB APPLICATIONS AGAINST WEB ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/461021
[patent_app_country] => US
[patent_app_date] => 2014-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3470
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14461021
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/461021 | METHOD AND SYSTEM FOR PROTECTING WEB APPLICATIONS AGAINST WEB ATTACKS | Aug 14, 2014 | Abandoned |
Array
(
[id] => 10696034
[patent_doc_number] => 20160042179
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-11
[patent_title] => 'METHOD OF MALWARE DETECTION AND SYSTEM THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/456127
[patent_app_country] => US
[patent_app_date] => 2014-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 12372
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14456127
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/456127 | Method of malware detection and system thereof | Aug 10, 2014 | Issued |
Array
(
[id] => 10690691
[patent_doc_number] => 20160036837
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'DETECTING ATTACKS ON DATA CENTERS'
[patent_app_type] => utility
[patent_app_number] => 14/450954
[patent_app_country] => US
[patent_app_date] => 2014-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12381
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14450954
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/450954 | DETECTING ATTACKS ON DATA CENTERS | Aug 3, 2014 | Abandoned |
Array
(
[id] => 10690696
[patent_doc_number] => 20160036843
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'CONNECTED HOME SYSTEM WITH CYBER SECURITY MONITORING'
[patent_app_type] => utility
[patent_app_number] => 14/449474
[patent_app_country] => US
[patent_app_date] => 2014-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1361
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14449474
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/449474 | CONNECTED HOME SYSTEM WITH CYBER SECURITY MONITORING | Jul 31, 2014 | Abandoned |
Array
(
[id] => 10320751
[patent_doc_number] => 20150205755
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-23
[patent_title] => 'Extensible Media Format System and Methods of Use'
[patent_app_type] => utility
[patent_app_number] => 14/450091
[patent_app_country] => US
[patent_app_date] => 2014-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7026
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14450091
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/450091 | Extensible Media Format System and Methods of Use | Jul 31, 2014 | Abandoned |
Array
(
[id] => 10690665
[patent_doc_number] => 20160036812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'Database Queries Integrity and External Security Mechanisms in Database Forensic Examinations'
[patent_app_type] => utility
[patent_app_number] => 14/448286
[patent_app_country] => US
[patent_app_date] => 2014-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5246
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14448286
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/448286 | Database Queries Integrity and External Security Mechanisms in Database Forensic Examinations | Jul 30, 2014 | Abandoned |