
Alejandro Rivero
Examiner (ID: 4217, Phone: (571)270-3641 , Office: P/2647 )
| Most Active Art Unit | 2647 |
| Art Unit(s) | 2618, 2647, OPQA, 2684, 2648, 6216 |
| Total Applications | 312 |
| Issued Applications | 213 |
| Pending Applications | 3 |
| Abandoned Applications | 97 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13684523
[patent_doc_number] => 20160380998
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => TOKENIZATION USING MULTIPLE REVERSIBLE TRANSFORMATIONS
[patent_app_type] => utility
[patent_app_number] => 15/257364
[patent_app_country] => US
[patent_app_date] => 2016-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11545
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15257364
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/257364 | Tokenization using multiple reversible transformations | Sep 5, 2016 | Issued |
Array
(
[id] => 12225351
[patent_doc_number] => 20180063711
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'SYSTEMS AND METHODS TO AUTHENTICATE USING VEHICLE'
[patent_app_type] => utility
[patent_app_number] => 15/252434
[patent_app_country] => US
[patent_app_date] => 2016-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6639
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15252434
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/252434 | Systems and methods to authenticate using vehicle | Aug 30, 2016 | Issued |
Array
(
[id] => 12224813
[patent_doc_number] => 20180063174
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'ILLEGITIMATE TYPOSQUATTING DETECTION WITH INTERNET PROTOCOL INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 15/247036
[patent_app_country] => US
[patent_app_date] => 2016-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6008
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15247036
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/247036 | Illegitimate typosquatting detection with internet protocol information | Aug 24, 2016 | Issued |
Array
(
[id] => 13216701
[patent_doc_number] => 10122731
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-06
[patent_title] => Controlling interactions and generating alerts based on iterative fuzzy searches of a database and comparisons of multiple variables
[patent_app_type] => utility
[patent_app_number] => 15/246311
[patent_app_country] => US
[patent_app_date] => 2016-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8073
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 254
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15246311
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/246311 | Controlling interactions and generating alerts based on iterative fuzzy searches of a database and comparisons of multiple variables | Aug 23, 2016 | Issued |
Array
(
[id] => 12222223
[patent_doc_number] => 20180060583
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'Application Behavior Information'
[patent_app_type] => utility
[patent_app_number] => 15/244538
[patent_app_country] => US
[patent_app_date] => 2016-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6722
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15244538
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/244538 | Application behavior information | Aug 22, 2016 | Issued |
Array
(
[id] => 15059561
[patent_doc_number] => 10460087
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-29
[patent_title] => Method and apparatus to secure and protect data-centers and generalized utility-based cloud computing environments from uninvited guests in the form of both hardware and software
[patent_app_type] => utility
[patent_app_number] => 16/321001
[patent_app_country] => US
[patent_app_date] => 2016-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6152
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16321001
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/321001 | Method and apparatus to secure and protect data-centers and generalized utility-based cloud computing environments from uninvited guests in the form of both hardware and software | Aug 17, 2016 | Issued |
Array
(
[id] => 15317843
[patent_doc_number] => 10523646
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => Methods and systems for distributing encrypted cryptographic data
[patent_app_type] => utility
[patent_app_number] => 15/238752
[patent_app_country] => US
[patent_app_date] => 2016-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 19340
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 316
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15238752
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/238752 | Methods and systems for distributing encrypted cryptographic data | Aug 16, 2016 | Issued |
Array
(
[id] => 11460883
[patent_doc_number] => 20170054789
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'SYSTEM AND METHOD FOR SENDING ELECTRONIC FILES IN RESPONSE TO INBOUND FILE REQUESTS'
[patent_app_type] => utility
[patent_app_number] => 15/237577
[patent_app_country] => US
[patent_app_date] => 2016-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5619
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237577
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/237577 | SYSTEM AND METHOD FOR SENDING ELECTRONIC FILES IN RESPONSE TO INBOUND FILE REQUESTS | Aug 14, 2016 | Abandoned |
Array
(
[id] => 11447677
[patent_doc_number] => 20170048698
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'SYSTEMS AND METHODS FOR DETECTION AND CONTROL OF INFORMATION LEAKS IN NETWORK TRAFFIC'
[patent_app_type] => utility
[patent_app_number] => 15/235483
[patent_app_country] => US
[patent_app_date] => 2016-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12024
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15235483
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/235483 | SYSTEMS AND METHODS FOR DETECTION AND CONTROL OF INFORMATION LEAKS IN NETWORK TRAFFIC | Aug 11, 2016 | Abandoned |
Array
(
[id] => 11445502
[patent_doc_number] => 20170046523
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'METHOD FOR MASKING CONTENT DISPLAYED ON ELECTRONIC DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/235678
[patent_app_country] => US
[patent_app_date] => 2016-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 7730
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15235678
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/235678 | Method for masking content displayed on electronic device | Aug 11, 2016 | Issued |
Array
(
[id] => 12182959
[patent_doc_number] => 20180041896
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-08
[patent_title] => 'AUTHENTICATION FOR WIRELESS LOCAL AREA NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 15/230568
[patent_app_country] => US
[patent_app_date] => 2016-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6283
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15230568
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/230568 | Authentication for wireless local area networks | Aug 7, 2016 | Issued |
Array
(
[id] => 11294614
[patent_doc_number] => 20160344546
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-24
[patent_title] => 'DISTRIBUTED STORAGE NETWORK AND METHOD FOR STORING AND RETRIEVING ENCRYPTION KEYS'
[patent_app_type] => utility
[patent_app_number] => 15/230145
[patent_app_country] => US
[patent_app_date] => 2016-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 17575
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15230145
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/230145 | Distributed storage network and method for storing and retrieving encryption keys | Aug 4, 2016 | Issued |
Array
(
[id] => 13292189
[patent_doc_number] => 10157291
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-18
[patent_title] => Collection flow for confidential data
[patent_app_type] => utility
[patent_app_number] => 15/222774
[patent_app_country] => US
[patent_app_date] => 2016-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 16662
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15222774
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/222774 | Collection flow for confidential data | Jul 27, 2016 | Issued |
Array
(
[id] => 14741591
[patent_doc_number] => 10390221
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Private vehicle-to-vehicle communication
[patent_app_type] => utility
[patent_app_number] => 15/218945
[patent_app_country] => US
[patent_app_date] => 2016-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5045
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15218945
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/218945 | Private vehicle-to-vehicle communication | Jul 24, 2016 | Issued |
Array
(
[id] => 14299483
[patent_doc_number] => 10289869
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-14
[patent_title] => Personal information anonymization method, recording medium, and information processing apparatus
[patent_app_type] => utility
[patent_app_number] => 15/214819
[patent_app_country] => US
[patent_app_date] => 2016-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8554
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15214819
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/214819 | Personal information anonymization method, recording medium, and information processing apparatus | Jul 19, 2016 | Issued |
Array
(
[id] => 11398876
[patent_doc_number] => 20170019414
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'DOUBLE WRITE DATA EXCHANGE IN A DEAD DROP NETWORK ARCHITECTURE'
[patent_app_type] => utility
[patent_app_number] => 15/208509
[patent_app_country] => US
[patent_app_date] => 2016-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12015
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15208509
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/208509 | Double write data exchange in a dead drop network architecture | Jul 11, 2016 | Issued |
Array
(
[id] => 13822007
[patent_doc_number] => 10187796
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-22
[patent_title] => Authentication and association method and system
[patent_app_type] => utility
[patent_app_number] => 15/205333
[patent_app_country] => US
[patent_app_date] => 2016-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 22
[patent_no_of_words] => 15354
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15205333
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/205333 | Authentication and association method and system | Jul 7, 2016 | Issued |
Array
(
[id] => 14179921
[patent_doc_number] => 10263988
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-16
[patent_title] => Protected container key management processors, methods, systems, and instructions
[patent_app_type] => utility
[patent_app_number] => 15/201447
[patent_app_country] => US
[patent_app_date] => 2016-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 17
[patent_no_of_words] => 21140
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201447
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201447 | Protected container key management processors, methods, systems, and instructions | Jul 1, 2016 | Issued |
Array
(
[id] => 13757063
[patent_doc_number] => 10171495
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-01
[patent_title] => Detection of modified requests
[patent_app_type] => utility
[patent_app_number] => 15/178385
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8960
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178385
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178385 | Detection of modified requests | Jun 8, 2016 | Issued |
Array
(
[id] => 15675137
[patent_doc_number] => 10601816
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-24
[patent_title] => Account recovery
[patent_app_type] => utility
[patent_app_number] => 15/178479
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11272
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178479
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178479 | Account recovery | Jun 8, 2016 | Issued |