Dilip P Pandya
Examiner (ID: 16153)
Most Active Art Unit | 1813 |
Art Unit(s) | 1813 |
Total Applications | 1 |
Issued Applications | 1 |
Pending Applications | 0 |
Abandoned Applications | 0 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 16069761
[patent_doc_number] => 10693852
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-23
[patent_title] => System for a secure encryption proxy in a content centric network
[patent_app_type] => utility
[patent_app_number] => 16/051897
[patent_app_country] => US
[patent_app_date] => 2018-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 22
[patent_no_of_words] => 12137
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16051897
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/051897 | System for a secure encryption proxy in a content centric network | Jul 31, 2018 | Issued |
Array
(
[id] => 15825343
[patent_doc_number] => 10637880
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-04-28
[patent_title] => Classifying sets of malicious indicators for detecting command and control communications associated with malware
[patent_app_type] => utility
[patent_app_number] => 16/043013
[patent_app_country] => US
[patent_app_date] => 2018-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 11650
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16043013
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/043013 | Classifying sets of malicious indicators for detecting command and control communications associated with malware | Jul 22, 2018 | Issued |
Array
(
[id] => 15413059
[patent_doc_number] => 20200026852
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-23
[patent_title] => USER INTERFACE FOR RESPONDING TO WIRELESS ATTACKS
[patent_app_type] => utility
[patent_app_number] => 16/040727
[patent_app_country] => US
[patent_app_date] => 2018-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6908
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16040727
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/040727 | User interface for responding to wireless attacks | Jul 19, 2018 | Issued |
Array
(
[id] => 13600913
[patent_doc_number] => 20180352005
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => DATA SENSITIVITY BASED AUTHENTICATION AND AUTHORIZATION
[patent_app_type] => utility
[patent_app_number] => 16/040340
[patent_app_country] => US
[patent_app_date] => 2018-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9258
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16040340
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/040340 | Data sensitivity based authentication and authorization | Jul 18, 2018 | Issued |
Array
(
[id] => 13530345
[patent_doc_number] => 20180316715
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR AUTOMATICALLY MITIGATING VULNERABILITIES IN SOURCE CODE
[patent_app_type] => utility
[patent_app_number] => 16/027383
[patent_app_country] => US
[patent_app_date] => 2018-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7774
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16027383
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/027383 | Method, system, and computer program product for automatically mitigating vulnerabilities in source code | Jul 4, 2018 | Issued |
Array
(
[id] => 15334007
[patent_doc_number] => 20200007333
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-02
[patent_title] => FEDERATED BLOCKCHAIN IDENTITY MODEL AND SECURE PERSONALLY IDENTIFIABLE INFORMATION DATA TRANSMISSION MODEL FOR RCS
[patent_app_type] => utility
[patent_app_number] => 16/025090
[patent_app_country] => US
[patent_app_date] => 2018-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9554
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16025090
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/025090 | Federated blockchain identity model and secure personally identifiable information data transmission model for RCS | Jul 1, 2018 | Issued |
Array
(
[id] => 18668735
[patent_doc_number] => 11775638
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-03
[patent_title] => Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views
[patent_app_type] => utility
[patent_app_number] => 16/019761
[patent_app_country] => US
[patent_app_date] => 2018-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 9742
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019761
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/019761 | Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views | Jun 26, 2018 | Issued |
Array
(
[id] => 16433991
[patent_doc_number] => 10834096
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-10
[patent_title] => Methods and systems for controlling access to a protected resource
[patent_app_type] => utility
[patent_app_number] => 16/000086
[patent_app_country] => US
[patent_app_date] => 2018-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 7217
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16000086
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/000086 | Methods and systems for controlling access to a protected resource | Jun 4, 2018 | Issued |
Array
(
[id] => 13454117
[patent_doc_number] => 20180278601
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-27
[patent_title] => USING TEMPORARY CREDENTIALS IN GUEST MODE
[patent_app_type] => utility
[patent_app_number] => 15/994234
[patent_app_country] => US
[patent_app_date] => 2018-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6974
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15994234
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/994234 | Using temporary credentials in guest mode | May 30, 2018 | Issued |
Array
(
[id] => 15186885
[patent_doc_number] => 20190364034
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-28
[patent_title] => AUTHORIZATION OF ANOTHER DEVICE FOR PARTICIPATION IN MULTI-FACTOR AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 15/985913
[patent_app_country] => US
[patent_app_date] => 2018-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5967
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15985913
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/985913 | Authorization of another device for participation in multi-factor authentication | May 21, 2018 | Issued |
Array
(
[id] => 16146201
[patent_doc_number] => 10706172
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-07
[patent_title] => Controlled device, security management method, and security management system
[patent_app_type] => utility
[patent_app_number] => 15/983845
[patent_app_country] => US
[patent_app_date] => 2018-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5499
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15983845
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/983845 | Controlled device, security management method, and security management system | May 17, 2018 | Issued |
Array
(
[id] => 16202837
[patent_doc_number] => 10728030
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-28
[patent_title] => System and method for key management in computing clusters
[patent_app_type] => utility
[patent_app_number] => 15/983021
[patent_app_country] => US
[patent_app_date] => 2018-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5238
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15983021
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/983021 | System and method for key management in computing clusters | May 16, 2018 | Issued |
Array
(
[id] => 15156353
[patent_doc_number] => 20190356654
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => COMPUTER IMPLEMENTED MONITORING PROCESS FOR PERSONALIZED EVENT DETECTION AND NOTIFICATION TRANSMISSION
[patent_app_type] => utility
[patent_app_number] => 15/979935
[patent_app_country] => US
[patent_app_date] => 2018-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11103
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15979935
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/979935 | Computer implemented monitoring process for personalized event detection and notification transmission | May 14, 2018 | Issued |
Array
(
[id] => 16309841
[patent_doc_number] => 10778661
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-15
[patent_title] => Secure distribution of secret key using a monotonic counter
[patent_app_type] => utility
[patent_app_number] => 15/965731
[patent_app_country] => US
[patent_app_date] => 2018-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9715
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15965731
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/965731 | Secure distribution of secret key using a monotonic counter | Apr 26, 2018 | Issued |
Array
(
[id] => 14967237
[patent_doc_number] => 20190311097
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-10
[patent_title] => BIOMETRIC SECURITY DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/947956
[patent_app_country] => US
[patent_app_date] => 2018-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5020
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15947956
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/947956 | Biometric security device | Apr 8, 2018 | Issued |
Array
(
[id] => 14940609
[patent_doc_number] => 20190305943
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-03
[patent_title] => Digital asset transfer system for secure digital asset transactions
[patent_app_type] => utility
[patent_app_number] => 15/932644
[patent_app_country] => US
[patent_app_date] => 2018-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5979
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932644
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/932644 | Digital asset transfer system for secure digital asset transactions | Mar 29, 2018 | Issued |
Array
(
[id] => 16340143
[patent_doc_number] => 10791118
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-29
[patent_title] => Authenticating network services provided by a network
[patent_app_type] => utility
[patent_app_number] => 15/940573
[patent_app_country] => US
[patent_app_date] => 2018-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11206
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15940573
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/940573 | Authenticating network services provided by a network | Mar 28, 2018 | Issued |
Array
(
[id] => 13308361
[patent_doc_number] => 20180205717
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-19
[patent_title] => SPLIT AUTHENTICATION NETWORK SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 15/922019
[patent_app_country] => US
[patent_app_date] => 2018-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10680
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15922019
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/922019 | Split authentication network systems and methods | Mar 14, 2018 | Issued |
Array
(
[id] => 14658261
[patent_doc_number] => 20190236259
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => METHOD FOR 3D GRAPHICAL AUTHENTICATION ON ELECTRONIC DEVICES
[patent_app_type] => utility
[patent_app_number] => 15/921235
[patent_app_country] => US
[patent_app_date] => 2018-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10482
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15921235
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/921235 | METHOD FOR 3D GRAPHICAL AUTHENTICATION ON ELECTRONIC DEVICES | Mar 13, 2018 | Abandoned |
Array
(
[id] => 16503274
[patent_doc_number] => 10868682
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-15
[patent_title] => System and method for monitoring usage of an electronic document
[patent_app_type] => utility
[patent_app_number] => 15/918306
[patent_app_country] => US
[patent_app_date] => 2018-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 11120
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 56
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15918306
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/918306 | System and method for monitoring usage of an electronic document | Mar 11, 2018 | Issued |