Allan D Herrmann
Examiner (ID: 5618)
Most Active Art Unit | 3502 |
Art Unit(s) | 3106, 3105, 3502, 3682, 2506, 3201, 3681, 2899, 3402, 3304, 3622, 3403, 2402 |
Total Applications | 2350 |
Issued Applications | 2243 |
Pending Applications | 40 |
Abandoned Applications | 67 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 17108371
[patent_doc_number] => 11128603
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-21
[patent_title] => Method and system for providing a transaction forwarding service in blockchain implementations
[patent_app_type] => utility
[patent_app_number] => 15/281236
[patent_app_country] => US
[patent_app_date] => 2016-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4765
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15281236
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/281236 | Method and system for providing a transaction forwarding service in blockchain implementations | Sep 29, 2016 | Issued |
Array
(
[id] => 13696719
[patent_doc_number] => 20170359314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => Secure Transfer of A Data Object Between User Devices
[patent_app_type] => utility
[patent_app_number] => 15/274388
[patent_app_country] => US
[patent_app_date] => 2016-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12739
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15274388
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/274388 | Secure transfer of a data object between user devices | Sep 22, 2016 | Issued |
Array
(
[id] => 16821006
[patent_doc_number] => 11005859
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-05-11
[patent_title] => Methods and apparatus for protecting against suspicious computer operations using multi-channel protocol
[patent_app_type] => utility
[patent_app_number] => 15/274075
[patent_app_country] => US
[patent_app_date] => 2016-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3681
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15274075
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/274075 | Methods and apparatus for protecting against suspicious computer operations using multi-channel protocol | Sep 22, 2016 | Issued |
Array
(
[id] => 12592866
[patent_doc_number] => 20180089451
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => TOKENIZED LINKS WITH GRANULAR PERMISSIONS
[patent_app_type] => utility
[patent_app_number] => 15/274367
[patent_app_country] => US
[patent_app_date] => 2016-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7189
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 74
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15274367
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/274367 | Tokenized links with granular permissions | Sep 22, 2016 | Issued |
Array
(
[id] => 11533904
[patent_doc_number] => 20170093884
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'PROVIDING SECURE DATA TRANSFER BETWEEN NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 15/274461
[patent_app_country] => US
[patent_app_date] => 2016-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9886
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15274461
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/274461 | Providing secure data transfer between networks | Sep 22, 2016 | Issued |
Array
(
[id] => 16385347
[patent_doc_number] => 10810185
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-20
[patent_title] => Temporary shared storage
[patent_app_type] => utility
[patent_app_number] => 15/273145
[patent_app_country] => US
[patent_app_date] => 2016-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 9668
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 426
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15273145
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/273145 | Temporary shared storage | Sep 21, 2016 | Issued |
Array
(
[id] => 16294629
[patent_doc_number] => 10771492
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-08
[patent_title] => Enterprise graph method of threat detection
[patent_app_type] => utility
[patent_app_number] => 15/273604
[patent_app_country] => US
[patent_app_date] => 2016-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4569
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 289
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15273604
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/273604 | Enterprise graph method of threat detection | Sep 21, 2016 | Issued |
Array
(
[id] => 12242370
[patent_doc_number] => 20180075233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-15
[patent_title] => 'SYSTEMS AND METHODS FOR AGENT-BASED DETECTION OF HACKING ATTEMPTS'
[patent_app_type] => utility
[patent_app_number] => 15/263708
[patent_app_country] => US
[patent_app_date] => 2016-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6059
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15263708
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/263708 | SYSTEMS AND METHODS FOR AGENT-BASED DETECTION OF HACKING ATTEMPTS | Sep 12, 2016 | Abandoned |
Array
(
[id] => 16602581
[patent_doc_number] => 20210029112
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-28
[patent_title] => TAPTIC AUTHENTICATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 15/251419
[patent_app_country] => US
[patent_app_date] => 2016-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6783
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15251419
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/251419 | TAPTIC AUTHENTICATION SYSTEM AND METHOD | Aug 29, 2016 | Abandoned |
Array
(
[id] => 11329310
[patent_doc_number] => 20160359921
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'SECURE LOCAL WEB APPLICATION DATA MANAGER'
[patent_app_type] => utility
[patent_app_number] => 15/241658
[patent_app_country] => US
[patent_app_date] => 2016-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8549
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15241658
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/241658 | SECURE LOCAL WEB APPLICATION DATA MANAGER | Aug 18, 2016 | Abandoned |
Array
(
[id] => 15675055
[patent_doc_number] => 10601775
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-24
[patent_title] => Blocking download of content
[patent_app_type] => utility
[patent_app_number] => 15/233865
[patent_app_country] => US
[patent_app_date] => 2016-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 3219
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 343
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15233865
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/233865 | Blocking download of content | Aug 9, 2016 | Issued |
Array
(
[id] => 13294817
[patent_doc_number] => 10158616
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-18
[patent_title] => Methods and systems for online access credential transition
[patent_app_type] => utility
[patent_app_number] => 15/214754
[patent_app_country] => US
[patent_app_date] => 2016-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 11289
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 268
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15214754
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/214754 | Methods and systems for online access credential transition | Jul 19, 2016 | Issued |
Array
(
[id] => 12094765
[patent_doc_number] => 20170351859
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'SYSTEM AND METHOD OF DETECTING MALICIOUS COMPUTER SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 15/215116
[patent_app_country] => US
[patent_app_date] => 2016-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9044
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15215116
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/215116 | System and method of detecting malicious computer systems | Jul 19, 2016 | Issued |
Array
(
[id] => 12155728
[patent_doc_number] => 20180026993
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-25
[patent_title] => 'DIFFERENTIAL MALWARE DETECTION USING NETWORK AND ENDPOINT SENSORS'
[patent_app_type] => utility
[patent_app_number] => 15/214905
[patent_app_country] => US
[patent_app_date] => 2016-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6518
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15214905
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/214905 | Differential malware detection using network and endpoint sensors | Jul 19, 2016 | Issued |
Array
(
[id] => 12020665
[patent_doc_number] => 09813388
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-07
[patent_title] => 'Method and system for secure document exchange'
[patent_app_type] => utility
[patent_app_number] => 15/212684
[patent_app_country] => US
[patent_app_date] => 2016-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 7294
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15212684
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/212684 | Method and system for secure document exchange | Jul 17, 2016 | Issued |
Array
(
[id] => 14771565
[patent_doc_number] => 10397195
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-27
[patent_title] => Method and system for shared key and message authentication over an insecure shared communication medium
[patent_app_type] => utility
[patent_app_number] => 15/211767
[patent_app_country] => US
[patent_app_date] => 2016-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 14216
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 588
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15211767
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/211767 | Method and system for shared key and message authentication over an insecure shared communication medium | Jul 14, 2016 | Issued |
Array
(
[id] => 11666790
[patent_doc_number] => 20170155509
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-01
[patent_title] => 'METHOD AND SYSTEM FOR SECURE DISTRIBUTION OF SELECTED CONTENT TO BE PROTECTED ON AN APPLIANCE-SPECIFIC BASIS WITH DEFINABLE PERMITTED ASSOCIATED USAGE RIGHTS FOR THE SELECTED CONTENT'
[patent_app_type] => utility
[patent_app_number] => 15/202532
[patent_app_country] => US
[patent_app_date] => 2016-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 32
[patent_no_of_words] => 38196
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15202532
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/202532 | Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content | Jul 4, 2016 | Issued |
Array
(
[id] => 11368076
[patent_doc_number] => 20170006058
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'THREAT INTELLIGENCE SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/202213
[patent_app_country] => US
[patent_app_date] => 2016-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5976
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15202213
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/202213 | Threat intelligence system and method | Jul 4, 2016 | Issued |
Array
(
[id] => 15643303
[patent_doc_number] => 10594673
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-17
[patent_title] => Secure interprocess communications between mobile device applications using server-generated keys
[patent_app_type] => utility
[patent_app_number] => 15/201245
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5003
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201245
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201245 | Secure interprocess communications between mobile device applications using server-generated keys | Jun 30, 2016 | Issued |
Array
(
[id] => 11368082
[patent_doc_number] => 20170006064
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'DATA ENCRYPTION SERVICE'
[patent_app_type] => utility
[patent_app_number] => 15/197478
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 28591
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197478
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197478 | Data encryption service | Jun 28, 2016 | Issued |