
Alejandro Rivero
Examiner (ID: 4217, Phone: (571)270-3641 , Office: P/2647 )
| Most Active Art Unit | 2647 |
| Art Unit(s) | 2618, 2647, OPQA, 2684, 2648, 6216 |
| Total Applications | 312 |
| Issued Applications | 213 |
| Pending Applications | 3 |
| Abandoned Applications | 97 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10732098
[patent_doc_number] => 20160078247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'SECURITY EVALUATION SYSTEMS AND METHODS FOR SECURE DOCUMENT CONTROL'
[patent_app_type] => utility
[patent_app_number] => 14/855196
[patent_app_country] => US
[patent_app_date] => 2015-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 13522
[patent_no_of_claims] => 80
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14855196
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/855196 | SECURITY EVALUATION SYSTEMS AND METHODS FOR SECURE DOCUMENT CONTROL | Sep 14, 2015 | Abandoned |
Array
(
[id] => 10727110
[patent_doc_number] => 20160073260
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'SYSTEMS AND METHODS FOR HYBRID HARDWARE AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/847617
[patent_app_country] => US
[patent_app_date] => 2015-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 9508
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14847617
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/847617 | SYSTEMS AND METHODS FOR HYBRID HARDWARE AUTHENTICATION | Sep 7, 2015 | Abandoned |
Array
(
[id] => 13161233
[patent_doc_number] => 10097354
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-09
[patent_title] => Privacy control using unique identifiers associated with sensitive data elements of a group
[patent_app_type] => utility
[patent_app_number] => 14/832351
[patent_app_country] => US
[patent_app_date] => 2015-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 6153
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14832351
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/832351 | Privacy control using unique identifiers associated with sensitive data elements of a group | Aug 20, 2015 | Issued |
Array
(
[id] => 13083747
[patent_doc_number] => 10061941
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-28
[patent_title] => Systems and methods for multiport to multiport cryptography
[patent_app_type] => utility
[patent_app_number] => 14/830171
[patent_app_country] => US
[patent_app_date] => 2015-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 4806
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14830171
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/830171 | Systems and methods for multiport to multiport cryptography | Aug 18, 2015 | Issued |
Array
(
[id] => 12316932
[patent_doc_number] => 09942035
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-10
[patent_title] => Platform migration of secure enclaves
[patent_app_type] => utility
[patent_app_number] => 14/829340
[patent_app_country] => US
[patent_app_date] => 2015-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 14108
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14829340
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/829340 | Platform migration of secure enclaves | Aug 17, 2015 | Issued |
Array
(
[id] => 12011895
[patent_doc_number] => 09805215
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-31
[patent_title] => 'Mapping identifying information'
[patent_app_type] => utility
[patent_app_number] => 14/828276
[patent_app_country] => US
[patent_app_date] => 2015-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11679
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14828276
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/828276 | Mapping identifying information | Aug 16, 2015 | Issued |
Array
(
[id] => 10796284
[patent_doc_number] => 20160142441
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'CENTRALIZED OPERATION MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/827166
[patent_app_country] => US
[patent_app_date] => 2015-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 21346
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14827166
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/827166 | Centralized operation management | Aug 13, 2015 | Issued |
Array
(
[id] => 11509514
[patent_doc_number] => 09600675
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-21
[patent_title] => 'Secure file transfer systems and methods'
[patent_app_type] => utility
[patent_app_number] => 14/823302
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 45
[patent_figures_cnt] => 50
[patent_no_of_words] => 16291
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823302
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823302 | Secure file transfer systems and methods | Aug 10, 2015 | Issued |
Array
(
[id] => 11445497
[patent_doc_number] => 20170046518
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'SYSTEMS AND METHODS FOR DETECTING UNKNOWN VULNERABILITIES IN COMPUTING PROCESSES'
[patent_app_type] => utility
[patent_app_number] => 14/822930
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9923
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14822930
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/822930 | Systems and methods for detecting unknown vulnerabilities in computing processes | Aug 10, 2015 | Issued |
Array
(
[id] => 11741323
[patent_doc_number] => 09705926
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-11
[patent_title] => 'Security and retention tagging'
[patent_app_type] => utility
[patent_app_number] => 14/823173
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7337
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823173
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823173 | Security and retention tagging | Aug 10, 2015 | Issued |
Array
(
[id] => 12229230
[patent_doc_number] => 09916475
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'Programmable interface for extending security of application-based operating system'
[patent_app_type] => utility
[patent_app_number] => 14/823262
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 12338
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823262
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823262 | Programmable interface for extending security of application-based operating system | Aug 10, 2015 | Issued |
Array
(
[id] => 11899238
[patent_doc_number] => 09769187
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Analyzing network traffic based on a quantity of times a credential was used for transactions originating from multiple source devices'
[patent_app_type] => utility
[patent_app_number] => 14/823239
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 10689
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823239
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823239 | Analyzing network traffic based on a quantity of times a credential was used for transactions originating from multiple source devices | Aug 10, 2015 | Issued |
Array
(
[id] => 12317631
[patent_doc_number] => 09942268
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-10
[patent_title] => Systems and methods for thwarting unauthorized attempts to disable security managers within runtime environments
[patent_app_type] => utility
[patent_app_number] => 14/822927
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9778
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14822927
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/822927 | Systems and methods for thwarting unauthorized attempts to disable security managers within runtime environments | Aug 10, 2015 | Issued |
Array
(
[id] => 11447104
[patent_doc_number] => 20170048125
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'Continuous Monitoring of Data Servers Using a Shadowing Proxy'
[patent_app_type] => utility
[patent_app_number] => 14/823268
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10739
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823268
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823268 | Continuous monitoring of data servers using a shadowing proxy | Aug 10, 2015 | Issued |
Array
(
[id] => 10690641
[patent_doc_number] => 20160036786
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'SYSTEM AND METHOD FACILITATING ENHANCED INTER-OBJECT AND HUMAN-OBJECT INTERACTIVITY USING NETWORKED ELECTRONIC DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/816067
[patent_app_country] => US
[patent_app_date] => 2015-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 20631
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14816067
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/816067 | SYSTEM AND METHOD FACILITATING ENHANCED INTER-OBJECT AND HUMAN-OBJECT INTERACTIVITY USING NETWORKED ELECTRONIC DEVICES | Aug 2, 2015 | Abandoned |
Array
(
[id] => 11438366
[patent_doc_number] => 20170039387
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'METHOD AND SYSTEM FOR DIFFERENTIATED PRIVACY PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 14/816251
[patent_app_country] => US
[patent_app_date] => 2015-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7798
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14816251
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/816251 | METHOD AND SYSTEM FOR DIFFERENTIATED PRIVACY PROTECTION | Aug 2, 2015 | Abandoned |
Array
(
[id] => 11426044
[patent_doc_number] => 20170034190
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'PROVIDING SECURITY IN A COMMUNICATION NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/815458
[patent_app_country] => US
[patent_app_date] => 2015-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7775
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815458
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815458 | Providing security in a communication network | Jul 30, 2015 | Issued |
Array
(
[id] => 13007927
[patent_doc_number] => 10027644
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-17
[patent_title] => Analysis with embedded electronic spreadsheets
[patent_app_type] => utility
[patent_app_number] => 14/815137
[patent_app_country] => US
[patent_app_date] => 2015-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6766
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815137
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815137 | Analysis with embedded electronic spreadsheets | Jul 30, 2015 | Issued |
Array
(
[id] => 13230881
[patent_doc_number] => 10129232
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-11-13
[patent_title] => Secure interactive debug
[patent_app_type] => utility
[patent_app_number] => 14/815729
[patent_app_country] => US
[patent_app_date] => 2015-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 11225
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815729
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815729 | Secure interactive debug | Jul 30, 2015 | Issued |
Array
(
[id] => 10195095
[patent_doc_number] => 09224006
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-29
[patent_title] => 'System and method of secure data access'
[patent_app_type] => utility
[patent_app_number] => 14/811996
[patent_app_country] => US
[patent_app_date] => 2015-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5202
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14811996
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/811996 | System and method of secure data access | Jul 28, 2015 | Issued |