
Albert H. Cutler
Examiner (ID: 17290, Phone: (571)270-1460 , Office: P/2661 )
| Most Active Art Unit | 2661 |
| Art Unit(s) | 2637, 2661, 2696, 2622 |
| Total Applications | 1232 |
| Issued Applications | 947 |
| Pending Applications | 85 |
| Abandoned Applications | 242 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11188555
[patent_doc_number] => 09419980
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-16
[patent_title] => 'Location-based security system for portable electronic device'
[patent_app_type] => utility
[patent_app_number] => 14/530871
[patent_app_country] => US
[patent_app_date] => 2014-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3784
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14530871
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/530871 | Location-based security system for portable electronic device | Nov 2, 2014 | Issued |
Array
(
[id] => 13073911
[patent_doc_number] => 10057759
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-21
[patent_title] => Method for personalising a secure element
[patent_app_type] => utility
[patent_app_number] => 15/027502
[patent_app_country] => US
[patent_app_date] => 2014-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 3834
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15027502
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/027502 | Method for personalising a secure element | Oct 5, 2014 | Issued |
Array
(
[id] => 11361170
[patent_doc_number] => 09537841
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-03
[patent_title] => 'Key management for compromised enterprise endpoints'
[patent_app_type] => utility
[patent_app_number] => 14/485774
[patent_app_country] => US
[patent_app_date] => 2014-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 39498
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14485774
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/485774 | Key management for compromised enterprise endpoints | Sep 13, 2014 | Issued |
Array
(
[id] => 12373557
[patent_doc_number] => 09959405
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-01
[patent_title] => Sandboxing third party components
[patent_app_type] => utility
[patent_app_number] => 14/483543
[patent_app_country] => US
[patent_app_date] => 2014-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5935
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14483543
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/483543 | Sandboxing third party components | Sep 10, 2014 | Issued |
Array
(
[id] => 9863716
[patent_doc_number] => 20150043735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-12
[patent_title] => 'RE-ENCRYPTED DATA VERIFICATION PROGRAM, RE-ENCRYPTION APPARATUS AND RE-ENCRYPTION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/480073
[patent_app_country] => US
[patent_app_date] => 2014-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9796
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14480073
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/480073 | Re-encrypted data verification program, re-encryption apparatus and re-encryption system | Sep 7, 2014 | Issued |
Array
(
[id] => 10557896
[patent_doc_number] => 09282105
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-08
[patent_title] => 'Wide area network access management computer'
[patent_app_type] => utility
[patent_app_number] => 14/480265
[patent_app_country] => US
[patent_app_date] => 2014-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1684
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14480265
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/480265 | Wide area network access management computer | Sep 7, 2014 | Issued |
Array
(
[id] => 11848590
[patent_doc_number] => 09736157
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-15
[patent_title] => 'Method and trusted gateway for WiFi terminal accessing to packet data PS service domain'
[patent_app_type] => utility
[patent_app_number] => 14/478576
[patent_app_country] => US
[patent_app_date] => 2014-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 19763
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14478576
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/478576 | Method and trusted gateway for WiFi terminal accessing to packet data PS service domain | Sep 4, 2014 | Issued |
Array
(
[id] => 10048000
[patent_doc_number] => 09088410
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-21
[patent_title] => 'Accessing local applications when roaming using a NFC mobile device'
[patent_app_type] => utility
[patent_app_number] => 14/474340
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3703
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474340
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474340 | Accessing local applications when roaming using a NFC mobile device | Sep 1, 2014 | Issued |
Array
(
[id] => 12414867
[patent_doc_number] => 09971898
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-15
[patent_title] => Method and system for providing anonymized data from a database
[patent_app_type] => utility
[patent_app_number] => 14/474915
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 8437
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474915
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474915 | Method and system for providing anonymized data from a database | Sep 1, 2014 | Issued |
Array
(
[id] => 11741319
[patent_doc_number] => 09705923
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-11
[patent_title] => 'Method and apparatus for automating security provisioning of workloads'
[patent_app_type] => utility
[patent_app_number] => 14/474477
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5031
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474477
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474477 | Method and apparatus for automating security provisioning of workloads | Sep 1, 2014 | Issued |
Array
(
[id] => 10496573
[patent_doc_number] => 20150381596
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'REMOTE CREDENTIAL MANAGEMENT FOR HYBRID CLOUDS WITH ENTERPRISE NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 14/474452
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9335
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474452
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474452 | Remote credential management for hybrid clouds with enterprise networks | Sep 1, 2014 | Issued |
Array
(
[id] => 11765746
[patent_doc_number] => 09374222
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-21
[patent_title] => 'Secure communication of data between devices'
[patent_app_type] => utility
[patent_app_number] => 14/475014
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5459
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14475014
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/475014 | Secure communication of data between devices | Sep 1, 2014 | Issued |
Array
(
[id] => 10364664
[patent_doc_number] => 20150249669
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-03
[patent_title] => 'ACCESS CONTROL OF EDGES IN GRAPH INDEX APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/474421
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9969
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474421
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474421 | Access control of edges in graph index applications | Sep 1, 2014 | Issued |
Array
(
[id] => 10164778
[patent_doc_number] => 09196004
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Systems and methods for detection of session tampering and fraud prevention'
[patent_app_type] => utility
[patent_app_number] => 14/473818
[patent_app_country] => US
[patent_app_date] => 2014-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5512
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14473818
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/473818 | Systems and methods for detection of session tampering and fraud prevention | Aug 28, 2014 | Issued |
Array
(
[id] => 14709615
[patent_doc_number] => 10382580
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-13
[patent_title] => Scaling persistent connections for cloud computing
[patent_app_type] => utility
[patent_app_number] => 15/500237
[patent_app_country] => US
[patent_app_date] => 2014-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 4370
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15500237
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/500237 | Scaling persistent connections for cloud computing | Aug 28, 2014 | Issued |
Array
(
[id] => 9919615
[patent_doc_number] => 20150074820
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-12
[patent_title] => 'SECURITY ENHANCEMENT APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 14/199458
[patent_app_country] => US
[patent_app_date] => 2014-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 7896
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14199458
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/199458 | SECURITY ENHANCEMENT APPARATUS | Aug 25, 2014 | Abandoned |
Array
(
[id] => 9897410
[patent_doc_number] => 20150052608
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-19
[patent_title] => 'METHOD AND SYSTEM FOR DETECTION OF MALWARE THAT CONNECT TO NETWORK DESTINATIONS THROUGH CLOUD SCANNING AND WEB REPUTATION'
[patent_app_type] => utility
[patent_app_number] => 14/467668
[patent_app_country] => US
[patent_app_date] => 2014-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8525
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14467668
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/467668 | Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation | Aug 24, 2014 | Issued |
Array
(
[id] => 10948871
[patent_doc_number] => 20140351892
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-27
[patent_title] => 'DATA DRIVEN ROLE BASED SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/457045
[patent_app_country] => US
[patent_app_date] => 2014-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7962
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14457045
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/457045 | Data driven role based security | Aug 10, 2014 | Issued |
Array
(
[id] => 10653197
[patent_doc_number] => 09369472
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-14
[patent_title] => 'Authorization framework'
[patent_app_type] => utility
[patent_app_number] => 14/451158
[patent_app_country] => US
[patent_app_date] => 2014-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3626
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14451158
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/451158 | Authorization framework | Aug 3, 2014 | Issued |
Array
(
[id] => 9811554
[patent_doc_number] => 20150023499
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-22
[patent_title] => 'Cryptographic Key Generation'
[patent_app_type] => utility
[patent_app_number] => 14/449219
[patent_app_country] => US
[patent_app_date] => 2014-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6438
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14449219
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/449219 | Cryptographic key generation | Jul 31, 2014 | Issued |