
Victor Verbitsky
Examiner (ID: 18873, Phone: (571)272-0962 , Office: P/2852 )
| Most Active Art Unit | 2852 |
| Art Unit(s) | 2852 |
| Total Applications | 675 |
| Issued Applications | 601 |
| Pending Applications | 0 |
| Abandoned Applications | 80 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20447218
[patent_doc_number] => 20260003940
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2026-01-01
[patent_title] => ANTI-LEARNING FOR DIGITAL CONTENT PROTECTION AND RIGHTS MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 18/644072
[patent_app_country] => US
[patent_app_date] => 2024-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7220
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18644072
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/644072 | ANTI-LEARNING FOR DIGITAL CONTENT PROTECTION AND RIGHTS MANAGEMENT | Apr 22, 2024 | Pending |
Array
(
[id] => 20454788
[patent_doc_number] => 12517842
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-01-06
[patent_title] => Identifying a source of a function call and inheriting access permission
[patent_app_type] => utility
[patent_app_number] => 18/637758
[patent_app_country] => US
[patent_app_date] => 2024-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 1166
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18637758
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/637758 | Identifying a source of a function call and inheriting access permission | Apr 16, 2024 | Issued |
Array
(
[id] => 19950107
[patent_doc_number] => 12321469
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-06-03
[patent_title] => Method, apparatus, and computer-readable medium for confederated rights and hierarchical key management
[patent_app_type] => utility
[patent_app_number] => 18/615508
[patent_app_country] => US
[patent_app_date] => 2024-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 3238
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18615508
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/615508 | Method, apparatus, and computer-readable medium for confederated rights and hierarchical key management | Mar 24, 2024 | Issued |
Array
(
[id] => 19307467
[patent_doc_number] => 20240236048
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-07-11
[patent_title] => BYPASSING IKE FIREWALL FOR CLOUD-MANAGED IPSEC KEYS IN SDWAN FABRIC
[patent_app_type] => utility
[patent_app_number] => 18/612642
[patent_app_country] => US
[patent_app_date] => 2024-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6746
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18612642
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/612642 | BYPASSING IKE FIREWALL FOR CLOUD-MANAGED IPSEC KEYS IN SDWAN FABRIC | Mar 20, 2024 | Pending |
Array
(
[id] => 19603470
[patent_doc_number] => 20240394350
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-11-28
[patent_title] => SYSTEMS AND METHODS FOR GAIT-BASED USER AUTHENTICATION FOR LIGHTWEIGHT RESOURCE-CONSTRAINED WEARABLE DEVICES
[patent_app_type] => utility
[patent_app_number] => 18/609320
[patent_app_country] => US
[patent_app_date] => 2024-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8015
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18609320
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/609320 | Systems and methods for gait-based user authentication for lightweight resource-constrained wearable devices | Mar 18, 2024 | Issued |
Array
(
[id] => 19270490
[patent_doc_number] => 20240214196
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-06-27
[patent_title] => DEVICES AND METHODS FOR PRIVACY-PRESERVING ROUTING IN COMMUNICATION NETWORKS
[patent_app_type] => utility
[patent_app_number] => 18/598853
[patent_app_country] => US
[patent_app_date] => 2024-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7324
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18598853
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/598853 | Devices and methods for privacy-preserving routing in communication networks | Mar 6, 2024 | Issued |
Array
(
[id] => 19819430
[patent_doc_number] => 20250077637
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-03-06
[patent_title] => DEVICE AND METHOD FOR USER AUTHENTICATION IN VEHICLE BASED ON SPEECH RECOGNITION
[patent_app_type] => utility
[patent_app_number] => 18/587139
[patent_app_country] => US
[patent_app_date] => 2024-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6916
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18587139
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/587139 | DEVICE AND METHOD FOR USER AUTHENTICATION IN VEHICLE BASED ON SPEECH RECOGNITION | Feb 25, 2024 | Pending |
Array
(
[id] => 19365200
[patent_doc_number] => 20240267234
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-08
[patent_title] => APPARATUS AND METHOD FOR PERFORMING AUTHENTICATION FOR VEHICLE ON-DEMAND SERVICE
[patent_app_type] => utility
[patent_app_number] => 18/427973
[patent_app_country] => US
[patent_app_date] => 2024-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7119
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18427973
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/427973 | APPARATUS AND METHOD FOR PERFORMING AUTHENTICATION FOR VEHICLE ON-DEMAND SERVICE | Jan 30, 2024 | Pending |
Array
(
[id] => 19393794
[patent_doc_number] => 20240283664
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-22
[patent_title] => Authentication with Cloud-Based Secure Enclave
[patent_app_type] => utility
[patent_app_number] => 18/417228
[patent_app_country] => US
[patent_app_date] => 2024-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12580
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18417228
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/417228 | Authentication with Cloud-Based Secure Enclave | Jan 18, 2024 | Pending |
Array
(
[id] => 20483262
[patent_doc_number] => 12531739
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-01-20
[patent_title] => Techniques for phishing-resistant enrollment and on-device authentication
[patent_app_type] => utility
[patent_app_number] => 18/405950
[patent_app_country] => US
[patent_app_date] => 2024-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 19562
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18405950
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/405950 | Techniques for phishing-resistant enrollment and on-device authentication | Jan 4, 2024 | Issued |
Array
(
[id] => 19087242
[patent_doc_number] => 20240114043
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-04
[patent_title] => PROTECTING COMPUTER ASSETS FROM MALICIOUS ATTACKS
[patent_app_type] => utility
[patent_app_number] => 18/536802
[patent_app_country] => US
[patent_app_date] => 2023-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12096
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18536802
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/536802 | Protecting computer assets from malicious attacks | Dec 11, 2023 | Issued |
Array
(
[id] => 19072390
[patent_doc_number] => 20240106816
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-03-28
[patent_title] => SECURE ENDPOINT AUTHENTICATION CREDENTIAL CONTROL
[patent_app_type] => utility
[patent_app_number] => 18/516854
[patent_app_country] => US
[patent_app_date] => 2023-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9024
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18516854
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/516854 | SECURE ENDPOINT AUTHENTICATION CREDENTIAL CONTROL | Nov 20, 2023 | Pending |
Array
(
[id] => 19933777
[patent_doc_number] => 12306981
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-20
[patent_title] => System and method for data management and security for digital manufacturing
[patent_app_type] => utility
[patent_app_number] => 18/509727
[patent_app_country] => US
[patent_app_date] => 2023-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6989
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 323
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18509727
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/509727 | System and method for data management and security for digital manufacturing | Nov 14, 2023 | Issued |
Array
(
[id] => 19680464
[patent_doc_number] => 12192343
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-01-07
[patent_title] => Scalable content restriction
[patent_app_type] => utility
[patent_app_number] => 18/491918
[patent_app_country] => US
[patent_app_date] => 2023-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9855
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18491918
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/491918 | Scalable content restriction | Oct 22, 2023 | Issued |
Array
(
[id] => 19671978
[patent_doc_number] => 12184763
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-12-31
[patent_title] => Sharing access to data externally
[patent_app_type] => utility
[patent_app_number] => 18/380856
[patent_app_country] => US
[patent_app_date] => 2023-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10743
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18380856
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/380856 | Sharing access to data externally | Oct 16, 2023 | Issued |
Array
(
[id] => 20360789
[patent_doc_number] => 12476798
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-11-18
[patent_title] => Systems and methods for distributed cryptography as a service key loading
[patent_app_type] => utility
[patent_app_number] => 18/485777
[patent_app_country] => US
[patent_app_date] => 2023-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12007
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18485777
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/485777 | Systems and methods for distributed cryptography as a service key loading | Oct 11, 2023 | Issued |
Array
(
[id] => 20376107
[patent_doc_number] => 12483556
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-11-25
[patent_title] => Method for logging an authorized user in to a device, in particular to a device for a power generation plant, and power generation plant with device
[patent_app_type] => utility
[patent_app_number] => 18/483544
[patent_app_country] => US
[patent_app_date] => 2023-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 0
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18483544
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/483544 | Method for logging an authorized user in to a device, in particular to a device for a power generation plant, and power generation plant with device | Oct 9, 2023 | Issued |
Array
(
[id] => 19102000
[patent_doc_number] => 20240121228
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-11
[patent_title] => EFFICIENT KEY MANAGEMENT IN DISTRIBUTED APPLICATION
[patent_app_type] => utility
[patent_app_number] => 18/479601
[patent_app_country] => US
[patent_app_date] => 2023-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7359
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18479601
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/479601 | Efficient key management in distributed application | Oct 1, 2023 | Issued |
Array
(
[id] => 19936371
[patent_doc_number] => 12309586
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-20
[patent_title] => Method and device for remote management and verification of remote management authority
[patent_app_type] => utility
[patent_app_number] => 18/471952
[patent_app_country] => US
[patent_app_date] => 2023-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 18888
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18471952
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/471952 | Method and device for remote management and verification of remote management authority | Sep 20, 2023 | Issued |
Array
(
[id] => 18884119
[patent_doc_number] => 20240007488
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-04
[patent_title] => SUPERVISORY CONTROL AND DATA ACQUISITION
[patent_app_type] => utility
[patent_app_number] => 18/369523
[patent_app_country] => US
[patent_app_date] => 2023-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5773
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18369523
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/369523 | Supervisory control and data acquisition | Sep 17, 2023 | Issued |