
Alan B. Waits
Examiner (ID: 17129, Phone: (571)270-3664 , Office: P/3656 )
| Most Active Art Unit | 3656 |
| Art Unit(s) | 3656, 3682, 3617 |
| Total Applications | 1530 |
| Issued Applications | 1007 |
| Pending Applications | 112 |
| Abandoned Applications | 441 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11272895
[patent_doc_number] => 20160335442
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'ESTABLISHING AND USING A TRUST LEVEL IN MOBILE PHONES'
[patent_app_type] => utility
[patent_app_number] => 14/731849
[patent_app_country] => US
[patent_app_date] => 2015-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7794
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14731849
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/731849 | Establishing and using a trust level in mobile phones | Jun 4, 2015 | Issued |
Array
(
[id] => 14457627
[patent_doc_number] => 10324774
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-18
[patent_title] => Kernel program including relational database, and method and apparatus for executing said program
[patent_app_type] => utility
[patent_app_number] => 15/313997
[patent_app_country] => US
[patent_app_date] => 2015-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4867
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15313997
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/313997 | Kernel program including relational database, and method and apparatus for executing said program | Jun 4, 2015 | Issued |
Array
(
[id] => 12296820
[patent_doc_number] => 09935965
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-03
[patent_title] => Establishing and using a trust level in mobile phones
[patent_app_type] => utility
[patent_app_number] => 14/711905
[patent_app_country] => US
[patent_app_date] => 2015-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7560
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14711905
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/711905 | Establishing and using a trust level in mobile phones | May 13, 2015 | Issued |
Array
(
[id] => 10364669
[patent_doc_number] => 20150249674
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-03
[patent_title] => 'CONTENT-BASED ISOLATION FOR COMPUTING DEVICE SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/709550
[patent_app_country] => US
[patent_app_date] => 2015-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9309
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709550
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709550 | Content-based isolation for computing device security | May 11, 2015 | Issued |
Array
(
[id] => 10359528
[patent_doc_number] => 20150244532
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'METHOD AND TERMINAL FOR MESSAGE VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 14/707484
[patent_app_country] => US
[patent_app_date] => 2015-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9985
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14707484
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/707484 | Method and terminal for message verification | May 7, 2015 | Issued |
Array
(
[id] => 10310282
[patent_doc_number] => 20150195284
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-09
[patent_title] => 'DELEGATING AUTHORIZATION TO APPLICATIONS ON A CLIENT DEVICE IN A NETWORKED ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/662373
[patent_app_country] => US
[patent_app_date] => 2015-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6788
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14662373
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/662373 | Delegating authorization to applications on a client device in a networked environment | Mar 18, 2015 | Issued |
Array
(
[id] => 13113249
[patent_doc_number] => 10075293
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-11
[patent_title] => Information processing apparatus, information processing method, and recording medium
[patent_app_type] => utility
[patent_app_number] => 14/639361
[patent_app_country] => US
[patent_app_date] => 2015-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10899
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14639361
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/639361 | Information processing apparatus, information processing method, and recording medium | Mar 4, 2015 | Issued |
Array
(
[id] => 11933400
[patent_doc_number] => 09800409
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Cryptographic key generation using a stored input value and a stored count value'
[patent_app_type] => utility
[patent_app_number] => 14/636717
[patent_app_country] => US
[patent_app_date] => 2015-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4509
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14636717
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/636717 | Cryptographic key generation using a stored input value and a stored count value | Mar 2, 2015 | Issued |
Array
(
[id] => 11688253
[patent_doc_number] => 09686309
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Logging attack context data'
[patent_app_type] => utility
[patent_app_number] => 14/637067
[patent_app_country] => US
[patent_app_date] => 2015-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6422
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 305
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14637067
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/637067 | Logging attack context data | Mar 2, 2015 | Issued |
Array
(
[id] => 11050005
[patent_doc_number] => 20160246964
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'Method to Protect BIOS NVRAM from Malicious Code Injection by Encrypting NVRAM Variables and System Therefor'
[patent_app_type] => utility
[patent_app_number] => 14/630413
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3545
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630413
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/630413 | Method to protect BIOS NVRAM from malicious code injection by encrypting NVRAM variables and system therefor | Feb 23, 2015 | Issued |
Array
(
[id] => 10771340
[patent_doc_number] => 20160117495
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'ACCESS BLOCKING FOR DATA LOSS PREVENTION IN COLLABORATIVE ENVIRONMENTS'
[patent_app_type] => utility
[patent_app_number] => 14/630435
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 12326
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630435
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/630435 | Access blocking for data loss prevention in collaborative environments | Feb 23, 2015 | Issued |
Array
(
[id] => 11688216
[patent_doc_number] => 09686272
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Multi factor user authentication on multiple devices'
[patent_app_type] => utility
[patent_app_number] => 14/630363
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8677
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630363
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/630363 | Multi factor user authentication on multiple devices | Feb 23, 2015 | Issued |
Array
(
[id] => 10734229
[patent_doc_number] => 20160080379
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'EFFICIENT AND RELIABLE ATTESTATION'
[patent_app_type] => utility
[patent_app_number] => 14/630495
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9883
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630495
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/630495 | Efficient and reliable attestation | Feb 23, 2015 | Issued |
Array
(
[id] => 11051826
[patent_doc_number] => 20160248787
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'PROACTIVE EMERGING THREAT DETECTION'
[patent_app_type] => utility
[patent_app_number] => 14/629795
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5258
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14629795
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/629795 | Proactive emerging threat detection | Feb 23, 2015 | Issued |
Array
(
[id] => 11049671
[patent_doc_number] => 20160246630
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'GUEST CONTROLLED MALICIOUS PAYLOAD PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 14/630181
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7690
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630181
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/630181 | Guest controlled malicious payload protection | Feb 23, 2015 | Issued |
Array
(
[id] => 10360210
[patent_doc_number] => 20150245215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'WIRELESS DEVICE CUSTOMIZATION RESOURCES'
[patent_app_type] => utility
[patent_app_number] => 14/630532
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7791
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630532
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/630532 | Wireless device customization resources | Feb 23, 2015 | Issued |
Array
(
[id] => 11688024
[patent_doc_number] => 09686077
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Secure hardware for cross-device trusted applications'
[patent_app_type] => utility
[patent_app_number] => 14/629501
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 16447
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14629501
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/629501 | Secure hardware for cross-device trusted applications | Feb 23, 2015 | Issued |
Array
(
[id] => 10359727
[patent_doc_number] => 20150244732
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'Systems And Methods For Malware Detection And Mitigation'
[patent_app_type] => utility
[patent_app_number] => 14/629444
[patent_app_country] => US
[patent_app_date] => 2015-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7009
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14629444
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/629444 | Systems and methods for malware detection and mitigation | Feb 22, 2015 | Issued |
Array
(
[id] => 10314507
[patent_doc_number] => 20150199510
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-16
[patent_title] => 'FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/605085
[patent_app_country] => US
[patent_app_date] => 2015-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4518
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14605085
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/605085 | File system access for one or more sandboxed applications | Jan 25, 2015 | Issued |
Array
(
[id] => 13113605
[patent_doc_number] => 10075472
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-11
[patent_title] => Policy enforcement using host information profile
[patent_app_type] => utility
[patent_app_number] => 14/601018
[patent_app_country] => US
[patent_app_date] => 2015-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 13
[patent_no_of_words] => 8961
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 597
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14601018
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/601018 | Policy enforcement using host information profile | Jan 19, 2015 | Issued |