
Alejandro Rivero
Examiner (ID: 4217, Phone: (571)270-3641 , Office: P/2647 )
| Most Active Art Unit | 2647 |
| Art Unit(s) | 2618, 2647, OPQA, 2684, 2648, 6216 |
| Total Applications | 312 |
| Issued Applications | 213 |
| Pending Applications | 3 |
| Abandoned Applications | 97 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 6167726
[patent_doc_number] => 20110162045
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-30
[patent_title] => 'ACCESS CONTROL SYSTEM, ACCESS CONTROL METHOD, AND COMMUNICATION TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 13/062256
[patent_app_country] => US
[patent_app_date] => 2009-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 10131
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0162/20110162045.pdf
[firstpage_image] =>[orig_patent_app_number] => 13062256
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/062256 | Access control system, access control method, and communication terminal | Sep 29, 2009 | Issued |
Array
(
[id] => 6117664
[patent_doc_number] => 20110191857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-08-04
[patent_title] => 'METHOD FOR MASKING DATA'
[patent_app_type] => utility
[patent_app_number] => 13/061547
[patent_app_country] => US
[patent_app_date] => 2009-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6500
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0191/20110191857.pdf
[firstpage_image] =>[orig_patent_app_number] => 13061547
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/061547 | Method for masking data | Sep 17, 2009 | Issued |
Array
(
[id] => 6513640
[patent_doc_number] => 20100011445
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-01-14
[patent_title] => 'TRANSMITTER, SIGNAL TRANSFER METHOD, DATA DISTRIBUTION SYSTEM AND METHOD OF SAME, DATA RECEIVER, DATA PROVIDER AND METHOD OF SAME, AND DATA TRANSFERER'
[patent_app_type] => utility
[patent_app_number] => 12/560146
[patent_app_country] => US
[patent_app_date] => 2009-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 12063
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0011/20100011445.pdf
[firstpage_image] =>[orig_patent_app_number] => 12560146
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/560146 | Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transferer | Sep 14, 2009 | Issued |
Array
(
[id] => 5976505
[patent_doc_number] => 20110154040
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-23
[patent_title] => 'MESSAGE STORAGE AND RETRIEVAL'
[patent_app_type] => utility
[patent_app_number] => 13/062219
[patent_app_country] => US
[patent_app_date] => 2009-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6393
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20110154040.pdf
[firstpage_image] =>[orig_patent_app_number] => 13062219
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/062219 | Message storage and retrieval | Sep 2, 2009 | Issued |
Array
(
[id] => 8971995
[patent_doc_number] => 08510825
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-13
[patent_title] => 'Secure computing environment to address theft and unauthorized access'
[patent_app_type] => utility
[patent_app_number] => 12/538033
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 15468
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12538033
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/538033 | Secure computing environment to address theft and unauthorized access | Aug 6, 2009 | Issued |
Array
(
[id] => 6452611
[patent_doc_number] => 20100169969
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'FUNCTIONAL PATCHING/HOOKING DETECTION AND PREVENTION'
[patent_app_type] => utility
[patent_app_number] => 12/537893
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2667
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0169/20100169969.pdf
[firstpage_image] =>[orig_patent_app_number] => 12537893
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/537893 | Functional patching/hooking detection and prevention | Aug 6, 2009 | Issued |
Array
(
[id] => 8540700
[patent_doc_number] => 08316428
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-20
[patent_title] => 'Method and apparatus for security-risk based admission control'
[patent_app_type] => utility
[patent_app_number] => 12/537760
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 5
[patent_no_of_words] => 6718
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12537760
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/537760 | Method and apparatus for security-risk based admission control | Aug 6, 2009 | Issued |
Array
(
[id] => 8899723
[patent_doc_number] => 08479257
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-02
[patent_title] => 'Method and apparatus for assessing policy compliance of as-built data networks'
[patent_app_type] => utility
[patent_app_number] => 12/537790
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6097
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 33
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12537790
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/537790 | Method and apparatus for assessing policy compliance of as-built data networks | Aug 6, 2009 | Issued |
Array
(
[id] => 8912639
[patent_doc_number] => 08484716
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-09
[patent_title] => 'Hosting a server application on multiple network tiers'
[patent_app_type] => utility
[patent_app_number] => 12/537921
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 9288
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12537921
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/537921 | Hosting a server application on multiple network tiers | Aug 6, 2009 | Issued |
Array
(
[id] => 8438439
[patent_doc_number] => 08286225
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-09
[patent_title] => 'Method and apparatus for detecting cyber threats'
[patent_app_type] => utility
[patent_app_number] => 12/537796
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9615
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12537796
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/537796 | Method and apparatus for detecting cyber threats | Aug 6, 2009 | Issued |
Array
(
[id] => 5956790
[patent_doc_number] => 20110035581
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-02-10
[patent_title] => 'SYSTEM FOR MANAGEMENT AND PROCESSING OF ELECTRONIC VENDOR MAIL'
[patent_app_type] => utility
[patent_app_number] => 12/537990
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 17236
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0035/20110035581.pdf
[firstpage_image] =>[orig_patent_app_number] => 12537990
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/537990 | System for management and processing of electronic vendor mail | Aug 6, 2009 | Issued |
Array
(
[id] => 8558467
[patent_doc_number] => 08332953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-12-11
[patent_title] => 'Receiving policy data from a server to address theft and unauthorized access of a client'
[patent_app_type] => utility
[patent_app_number] => 12/538040
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 15493
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12538040
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/538040 | Receiving policy data from a server to address theft and unauthorized access of a client | Aug 6, 2009 | Issued |
Array
(
[id] => 4616736
[patent_doc_number] => 07992189
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-08-02
[patent_title] => 'System and method for hierarchical role-based entitlements'
[patent_app_type] => utility
[patent_app_number] => 12/536183
[patent_app_country] => US
[patent_app_date] => 2009-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6218
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/992/07992189.pdf
[firstpage_image] =>[orig_patent_app_number] => 12536183
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/536183 | System and method for hierarchical role-based entitlements | Aug 4, 2009 | Issued |
Array
(
[id] => 9781679
[patent_doc_number] => 08856903
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-07
[patent_title] => 'Content delivery system'
[patent_app_type] => utility
[patent_app_number] => 13/062253
[patent_app_country] => US
[patent_app_date] => 2009-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 18044
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 384
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13062253
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/062253 | Content delivery system | Jul 21, 2009 | Issued |
Array
(
[id] => 8177208
[patent_doc_number] => 20120110677
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-03
[patent_title] => 'SYSTEM FOR PROTECTING PERSONAL DATA'
[patent_app_type] => utility
[patent_app_number] => 13/378447
[patent_app_country] => US
[patent_app_date] => 2009-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 8273
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0110/20120110677.pdf
[firstpage_image] =>[orig_patent_app_number] => 13378447
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/378447 | System for protecting personal data | Jun 29, 2009 | Issued |
Array
(
[id] => 6452985
[patent_doc_number] => 20100169984
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'METHOD AND APPARATUS FOR CONTENT MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 12/493972
[patent_app_country] => US
[patent_app_date] => 2009-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2976
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0169/20100169984.pdf
[firstpage_image] =>[orig_patent_app_number] => 12493972
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/493972 | Method and apparatus for content management | Jun 28, 2009 | Issued |
Array
(
[id] => 5463754
[patent_doc_number] => 20090323954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'INTERNET PROTOCOL TELEPHONY SECURITY ARCHITECTURE'
[patent_app_type] => utility
[patent_app_number] => 12/490124
[patent_app_country] => US
[patent_app_date] => 2009-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 14701
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0323/20090323954.pdf
[firstpage_image] =>[orig_patent_app_number] => 12490124
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/490124 | Internet protocol telephony security architecture | Jun 22, 2009 | Issued |
Array
(
[id] => 8998432
[patent_doc_number] => 08522338
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-27
[patent_title] => 'Two-way authentication'
[patent_app_type] => utility
[patent_app_number] => 13/379500
[patent_app_country] => US
[patent_app_date] => 2009-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 2848
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 25
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13379500
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/379500 | Two-way authentication | Jun 21, 2009 | Issued |
Array
(
[id] => 6040888
[patent_doc_number] => 20110093937
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-04-21
[patent_title] => 'AUTHENTICATED DATABASE CONNECTIVITY FOR UNATTENDED APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 12/992325
[patent_app_country] => US
[patent_app_date] => 2009-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6509
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0093/20110093937.pdf
[firstpage_image] =>[orig_patent_app_number] => 12992325
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/992325 | Authenticated database connectivity for unattended applications | May 31, 2009 | Issued |
Array
(
[id] => 8195192
[patent_doc_number] => 08185946
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-22
[patent_title] => 'Wireless firewall with tear down messaging'
[patent_app_type] => utility
[patent_app_number] => 12/471214
[patent_app_country] => US
[patent_app_date] => 2009-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5142
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 22
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/185/08185946.pdf
[firstpage_image] =>[orig_patent_app_number] => 12471214
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/471214 | Wireless firewall with tear down messaging | May 21, 2009 | Issued |