![](/images/general/no_picture/200_user.png)
Allan D Herrmann
Examiner (ID: 5618)
Most Active Art Unit | 3502 |
Art Unit(s) | 3106, 3105, 3502, 3682, 2506, 3201, 3681, 2899, 3402, 3304, 3622, 3403, 2402 |
Total Applications | 2350 |
Issued Applications | 2243 |
Pending Applications | 40 |
Abandoned Applications | 67 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11366331
[patent_doc_number] => 20170004312
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'MONITORING AND ALERT SERVICES AND DATA ENCRYPTION MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/197463
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 28436
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197463
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197463 | Monitoring and alert services and data encryption management | Jun 28, 2016 | Issued |
Array
(
[id] => 16418773
[patent_doc_number] => 10826685
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-11-03
[patent_title] => Combined blockchain integrity
[patent_app_type] => utility
[patent_app_number] => 15/195803
[patent_app_country] => US
[patent_app_date] => 2016-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10688
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15195803
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/195803 | Combined blockchain integrity | Jun 27, 2016 | Issued |
Array
(
[id] => 14740627
[patent_doc_number] => 10389730
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Visitor access management
[patent_app_type] => utility
[patent_app_number] => 15/145270
[patent_app_country] => US
[patent_app_date] => 2016-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 9
[patent_no_of_words] => 4987
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 316
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15145270
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/145270 | Visitor access management | May 2, 2016 | Issued |
Array
(
[id] => 17333125
[patent_doc_number] => 11223598
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-11
[patent_title] => Internet security
[patent_app_type] => utility
[patent_app_number] => 15/145460
[patent_app_country] => US
[patent_app_date] => 2016-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 10677
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15145460
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/145460 | Internet security | May 2, 2016 | Issued |
Array
(
[id] => 13753281
[patent_doc_number] => 10169588
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-01
[patent_title] => Controlled starting of an electronic circuit
[patent_app_type] => utility
[patent_app_number] => 15/139820
[patent_app_country] => US
[patent_app_date] => 2016-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 2923
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15139820
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/139820 | Controlled starting of an electronic circuit | Apr 26, 2016 | Issued |
Array
(
[id] => 13292171
[patent_doc_number] => 10157281
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-18
[patent_title] => Secure starting of an electronic circuit
[patent_app_type] => utility
[patent_app_number] => 15/139205
[patent_app_country] => US
[patent_app_date] => 2016-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 2958
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15139205
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/139205 | Secure starting of an electronic circuit | Apr 25, 2016 | Issued |
Array
(
[id] => 13753329
[patent_doc_number] => 10169612
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-01
[patent_title] => Method for executing a safety-critical function of a computing unit in a cyber-physical system
[patent_app_type] => utility
[patent_app_number] => 15/139161
[patent_app_country] => US
[patent_app_date] => 2016-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 3823
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15139161
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/139161 | Method for executing a safety-critical function of a computing unit in a cyber-physical system | Apr 25, 2016 | Issued |
Array
(
[id] => 12799441
[patent_doc_number] => 20180158316
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-07
[patent_title] => REMOTE CONTROL APPARATUS CAPABLE OF REMOTELY CONTROLLING MULTIPLE DEVICES
[patent_app_type] => utility
[patent_app_number] => 15/568630
[patent_app_country] => US
[patent_app_date] => 2016-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18612
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15568630
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/568630 | Remote control apparatus capable of remotely controlling multiple devices | Apr 21, 2016 | Issued |
Array
(
[id] => 11438785
[patent_doc_number] => 20170039806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'CONDITIONAL BIOMETRIC ACCESS IN A GAMING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/062346
[patent_app_country] => US
[patent_app_date] => 2016-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 14930
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15062346
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/062346 | CONDITIONAL BIOMETRIC ACCESS IN A GAMING ENVIRONMENT | Mar 6, 2016 | Abandoned |
Array
(
[id] => 12182600
[patent_doc_number] => 20180041535
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-08
[patent_title] => 'SECURITY MEASURE INVALIDATION PREVENTION DEVICE, SECURITY MEASURE INVALIDATION PREVENTION METHOD, AND SECURITY MEASURE INVALIDATION PREVENTION PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 15/554380
[patent_app_country] => US
[patent_app_date] => 2016-02-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9806
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15554380
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/554380 | Security measure invalidation prevention device, security measure invalidation prevention method, and security measure invalidation prevention program | Feb 28, 2016 | Issued |
Array
(
[id] => 11855879
[patent_doc_number] => 20170230372
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-10
[patent_title] => 'INFORMATION SECURITY APPARATUS AND METHODS FOR CREDENTIAL DUMP AUTHENTICITY VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 15/019259
[patent_app_country] => US
[patent_app_date] => 2016-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5933
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15019259
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/019259 | Information security apparatus and methods for credential dump authenticity verification | Feb 8, 2016 | Issued |
Array
(
[id] => 13190051
[patent_doc_number] => 10110568
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-23
[patent_title] => Keyless access to laptop
[patent_app_type] => utility
[patent_app_number] => 15/014599
[patent_app_country] => US
[patent_app_date] => 2016-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6049
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15014599
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/014599 | Keyless access to laptop | Feb 2, 2016 | Issued |
Array
(
[id] => 12533166
[patent_doc_number] => 10007910
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-26
[patent_title] => System and method for variable length encryption
[patent_app_type] => utility
[patent_app_number] => 15/012739
[patent_app_country] => US
[patent_app_date] => 2016-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 44
[patent_no_of_words] => 50940
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15012739
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/012739 | System and method for variable length encryption | Jan 31, 2016 | Issued |
Array
(
[id] => 13642091
[patent_doc_number] => 09848014
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-19
[patent_title] => Delegated authentication in an internet of things (IoT) network
[patent_app_type] => utility
[patent_app_number] => 15/009337
[patent_app_country] => US
[patent_app_date] => 2016-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7886
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15009337
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/009337 | Delegated authentication in an internet of things (IoT) network | Jan 27, 2016 | Issued |
Array
(
[id] => 11572708
[patent_doc_number] => 20170111352
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-20
[patent_title] => 'SECURING CONNECTIONS TO UNSECURE INTERNET RESOURCES'
[patent_app_type] => utility
[patent_app_number] => 14/988995
[patent_app_country] => US
[patent_app_date] => 2016-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4869
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14988995
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/988995 | Securing connections to unsecure internet resources | Jan 5, 2016 | Issued |
Array
(
[id] => 11021924
[patent_doc_number] => 20160218879
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-28
[patent_title] => 'METHOD AND APPARATUS FOR THE LIMITATION OF THE MINING OF BLOCKS ON A BLOCK CHAIN'
[patent_app_type] => utility
[patent_app_number] => 14/987842
[patent_app_country] => US
[patent_app_date] => 2016-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9956
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14987842
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/987842 | Method and apparatus for the limitation of the mining of blocks on a block chain | Jan 4, 2016 | Issued |
Array
(
[id] => 13161619
[patent_doc_number] => 10097548
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-09
[patent_title] => Automobile network to communicate with multiple smart devices
[patent_app_type] => utility
[patent_app_number] => 14/988333
[patent_app_country] => US
[patent_app_date] => 2016-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6266
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14988333
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/988333 | Automobile network to communicate with multiple smart devices | Jan 4, 2016 | Issued |
Array
(
[id] => 13072959
[patent_doc_number] => 10057279
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-08-21
[patent_title] => System and method for protecting computer against remote malware downloads
[patent_app_type] => utility
[patent_app_number] => 14/988430
[patent_app_country] => US
[patent_app_date] => 2016-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 7347
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14988430
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/988430 | System and method for protecting computer against remote malware downloads | Jan 4, 2016 | Issued |
Array
(
[id] => 13172487
[patent_doc_number] => 10102360
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-16
[patent_title] => User authentication based on time variant fingerprint sequences
[patent_app_type] => utility
[patent_app_number] => 14/988167
[patent_app_country] => US
[patent_app_date] => 2016-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 9
[patent_no_of_words] => 6784
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14988167
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/988167 | User authentication based on time variant fingerprint sequences | Jan 4, 2016 | Issued |
Array
(
[id] => 15252163
[patent_doc_number] => 10511617
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-17
[patent_title] => Method and system for detecting malicious code
[patent_app_type] => utility
[patent_app_number] => 14/985927
[patent_app_country] => US
[patent_app_date] => 2015-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 6723
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 767
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14985927
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/985927 | Method and system for detecting malicious code | Dec 30, 2015 | Issued |