Search

Dilip P Pandya

Examiner (ID: 16153)

Most Active Art Unit
1813
Art Unit(s)
1813
Total Applications
1
Issued Applications
1
Pending Applications
0
Abandoned Applications
0

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16069761 [patent_doc_number] => 10693852 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-06-23 [patent_title] => System for a secure encryption proxy in a content centric network [patent_app_type] => utility [patent_app_number] => 16/051897 [patent_app_country] => US [patent_app_date] => 2018-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 22 [patent_no_of_words] => 12137 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16051897 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/051897
System for a secure encryption proxy in a content centric network Jul 31, 2018 Issued
Array ( [id] => 15825343 [patent_doc_number] => 10637880 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-04-28 [patent_title] => Classifying sets of malicious indicators for detecting command and control communications associated with malware [patent_app_type] => utility [patent_app_number] => 16/043013 [patent_app_country] => US [patent_app_date] => 2018-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 12 [patent_no_of_words] => 11650 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 223 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16043013 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/043013
Classifying sets of malicious indicators for detecting command and control communications associated with malware Jul 22, 2018 Issued
Array ( [id] => 15413059 [patent_doc_number] => 20200026852 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-23 [patent_title] => USER INTERFACE FOR RESPONDING TO WIRELESS ATTACKS [patent_app_type] => utility [patent_app_number] => 16/040727 [patent_app_country] => US [patent_app_date] => 2018-07-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6908 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 98 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16040727 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/040727
User interface for responding to wireless attacks Jul 19, 2018 Issued
Array ( [id] => 13600913 [patent_doc_number] => 20180352005 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-06 [patent_title] => DATA SENSITIVITY BASED AUTHENTICATION AND AUTHORIZATION [patent_app_type] => utility [patent_app_number] => 16/040340 [patent_app_country] => US [patent_app_date] => 2018-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9258 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16040340 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/040340
Data sensitivity based authentication and authorization Jul 18, 2018 Issued
Array ( [id] => 13530345 [patent_doc_number] => 20180316715 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-11-01 [patent_title] => METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR AUTOMATICALLY MITIGATING VULNERABILITIES IN SOURCE CODE [patent_app_type] => utility [patent_app_number] => 16/027383 [patent_app_country] => US [patent_app_date] => 2018-07-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7774 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -13 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16027383 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/027383
Method, system, and computer program product for automatically mitigating vulnerabilities in source code Jul 4, 2018 Issued
Array ( [id] => 15334007 [patent_doc_number] => 20200007333 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-02 [patent_title] => FEDERATED BLOCKCHAIN IDENTITY MODEL AND SECURE PERSONALLY IDENTIFIABLE INFORMATION DATA TRANSMISSION MODEL FOR RCS [patent_app_type] => utility [patent_app_number] => 16/025090 [patent_app_country] => US [patent_app_date] => 2018-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9554 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 86 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16025090 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/025090
Federated blockchain identity model and secure personally identifiable information data transmission model for RCS Jul 1, 2018 Issued
Array ( [id] => 18668735 [patent_doc_number] => 11775638 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-10-03 [patent_title] => Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views [patent_app_type] => utility [patent_app_number] => 16/019761 [patent_app_country] => US [patent_app_date] => 2018-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 9 [patent_no_of_words] => 9742 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 85 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019761 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/019761
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views Jun 26, 2018 Issued
Array ( [id] => 16433991 [patent_doc_number] => 10834096 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-11-10 [patent_title] => Methods and systems for controlling access to a protected resource [patent_app_type] => utility [patent_app_number] => 16/000086 [patent_app_country] => US [patent_app_date] => 2018-06-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 7217 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 179 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16000086 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/000086
Methods and systems for controlling access to a protected resource Jun 4, 2018 Issued
Array ( [id] => 13454117 [patent_doc_number] => 20180278601 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-09-27 [patent_title] => USING TEMPORARY CREDENTIALS IN GUEST MODE [patent_app_type] => utility [patent_app_number] => 15/994234 [patent_app_country] => US [patent_app_date] => 2018-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6974 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 172 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15994234 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/994234
Using temporary credentials in guest mode May 30, 2018 Issued
Array ( [id] => 15186885 [patent_doc_number] => 20190364034 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-28 [patent_title] => AUTHORIZATION OF ANOTHER DEVICE FOR PARTICIPATION IN MULTI-FACTOR AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 15/985913 [patent_app_country] => US [patent_app_date] => 2018-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5967 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15985913 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/985913
Authorization of another device for participation in multi-factor authentication May 21, 2018 Issued
Array ( [id] => 16146201 [patent_doc_number] => 10706172 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-07-07 [patent_title] => Controlled device, security management method, and security management system [patent_app_type] => utility [patent_app_number] => 15/983845 [patent_app_country] => US [patent_app_date] => 2018-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5499 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15983845 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/983845
Controlled device, security management method, and security management system May 17, 2018 Issued
Array ( [id] => 16202837 [patent_doc_number] => 10728030 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-07-28 [patent_title] => System and method for key management in computing clusters [patent_app_type] => utility [patent_app_number] => 15/983021 [patent_app_country] => US [patent_app_date] => 2018-05-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5238 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15983021 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/983021
System and method for key management in computing clusters May 16, 2018 Issued
Array ( [id] => 15156353 [patent_doc_number] => 20190356654 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-21 [patent_title] => COMPUTER IMPLEMENTED MONITORING PROCESS FOR PERSONALIZED EVENT DETECTION AND NOTIFICATION TRANSMISSION [patent_app_type] => utility [patent_app_number] => 15/979935 [patent_app_country] => US [patent_app_date] => 2018-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11103 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15979935 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/979935
Computer implemented monitoring process for personalized event detection and notification transmission May 14, 2018 Issued
Array ( [id] => 16309841 [patent_doc_number] => 10778661 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-09-15 [patent_title] => Secure distribution of secret key using a monotonic counter [patent_app_type] => utility [patent_app_number] => 15/965731 [patent_app_country] => US [patent_app_date] => 2018-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9715 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15965731 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/965731
Secure distribution of secret key using a monotonic counter Apr 26, 2018 Issued
Array ( [id] => 14967237 [patent_doc_number] => 20190311097 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-10 [patent_title] => BIOMETRIC SECURITY DEVICE [patent_app_type] => utility [patent_app_number] => 15/947956 [patent_app_country] => US [patent_app_date] => 2018-04-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5020 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 256 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15947956 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/947956
Biometric security device Apr 8, 2018 Issued
Array ( [id] => 14940609 [patent_doc_number] => 20190305943 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-03 [patent_title] => Digital asset transfer system for secure digital asset transactions [patent_app_type] => utility [patent_app_number] => 15/932644 [patent_app_country] => US [patent_app_date] => 2018-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5979 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932644 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/932644
Digital asset transfer system for secure digital asset transactions Mar 29, 2018 Issued
Array ( [id] => 16340143 [patent_doc_number] => 10791118 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-09-29 [patent_title] => Authenticating network services provided by a network [patent_app_type] => utility [patent_app_number] => 15/940573 [patent_app_country] => US [patent_app_date] => 2018-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 11206 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15940573 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/940573
Authenticating network services provided by a network Mar 28, 2018 Issued
Array ( [id] => 13308361 [patent_doc_number] => 20180205717 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-19 [patent_title] => SPLIT AUTHENTICATION NETWORK SYSTEMS AND METHODS [patent_app_type] => utility [patent_app_number] => 15/922019 [patent_app_country] => US [patent_app_date] => 2018-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10680 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15922019 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/922019
Split authentication network systems and methods Mar 14, 2018 Issued
Array ( [id] => 14658261 [patent_doc_number] => 20190236259 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-01 [patent_title] => METHOD FOR 3D GRAPHICAL AUTHENTICATION ON ELECTRONIC DEVICES [patent_app_type] => utility [patent_app_number] => 15/921235 [patent_app_country] => US [patent_app_date] => 2018-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10482 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 198 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15921235 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/921235
METHOD FOR 3D GRAPHICAL AUTHENTICATION ON ELECTRONIC DEVICES Mar 13, 2018 Abandoned
Array ( [id] => 16503274 [patent_doc_number] => 10868682 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-12-15 [patent_title] => System and method for monitoring usage of an electronic document [patent_app_type] => utility [patent_app_number] => 15/918306 [patent_app_country] => US [patent_app_date] => 2018-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 11120 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 56 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15918306 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/918306
System and method for monitoring usage of an electronic document Mar 11, 2018 Issued
Menu