Search

Alvin E. Oberley

Examiner (ID: 12243)

Most Active Art Unit
2604
Art Unit(s)
2126, 2899, 3104, 2606, 2755, 2604, 2151, 2609
Total Applications
548
Issued Applications
425
Pending Applications
3
Abandoned Applications
120

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12027728 [patent_doc_number] => 20170317827 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-11-02 [patent_title] => 'ELECTRONIC STAMP SYSTEM FOR SECURITY INTENSIFICATION, CONTROL METHOD THEREOF, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM HAVING COMPUTER PROGRAM RECORDED THEREON' [patent_app_type] => utility [patent_app_number] => 15/381011 [patent_app_country] => US [patent_app_date] => 2016-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 15864 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15381011 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/381011
Electronic stamp system for security intensification, control method thereof, and non-transitory computer readable storage medium having computer program recorded thereon Dec 14, 2016 Issued
Array ( [id] => 12163580 [patent_doc_number] => 20180034846 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-02-01 [patent_title] => 'METHOD AND SYSTEM FOR VALIDATING A VULNERABILITY SUBMITTED BY A TESTER IN A CROWDSOURCING ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 15/381045 [patent_app_country] => US [patent_app_date] => 2016-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6065 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15381045 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/381045
Method and system for validating a vulnerability submitted by a tester in a crowdsourcing environment Dec 14, 2016 Issued
Array ( [id] => 11695466 [patent_doc_number] => 20170171183 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-15 [patent_title] => 'AUTHENTICATION OF ACCESS REQUEST OF A DEVICE AND PROTECTING CONFIDENTIAL INFORMATION' [patent_app_type] => utility [patent_app_number] => 15/381000 [patent_app_country] => US [patent_app_date] => 2016-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8477 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15381000 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/381000
Authentication of access request of a device and protecting confidential information Dec 14, 2016 Issued
Array ( [id] => 13573389 [patent_doc_number] => 20180338243 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-11-22 [patent_title] => Communication Between an Electronic Portable Device and a Smart Watch [patent_app_type] => utility [patent_app_number] => 15/776831 [patent_app_country] => US [patent_app_date] => 2016-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3786 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -23 [patent_words_short_claim] => 86 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15776831 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/776831
Communication Between an Electronic Portable Device and a Smart Watch Nov 17, 2016 Abandoned
Array ( [id] => 13483691 [patent_doc_number] => 20180293388 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-10-11 [patent_title] => METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR PROVIDING RESILIENT COMPUTING SERVICES USING SYSTEMS DIVERSITY [patent_app_type] => utility [patent_app_number] => 15/766885 [patent_app_country] => US [patent_app_date] => 2016-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4761 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15766885 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/766885
Methods, systems and computer readable media for providing resilient computing services using systems diversity Oct 9, 2016 Issued
Array ( [id] => 11405925 [patent_doc_number] => 20170026463 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-26 [patent_title] => 'WIRELESS NETWORK CLOUD COMPUTING RESOURCE MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 15/286184 [patent_app_country] => US [patent_app_date] => 2016-10-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9750 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15286184 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/286184
Wireless network cloud computing resource management Oct 4, 2016 Issued
Array ( [id] => 12209214 [patent_doc_number] => 20180054440 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-02-22 [patent_title] => 'UTILIZING TRANSPORT LAYER SECURITY (TLS) FINGERPRINTS TO DETERMINE AGENTS AND OPERATING SYSTEMS' [patent_app_type] => utility [patent_app_number] => 15/267068 [patent_app_country] => US [patent_app_date] => 2016-09-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9518 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15267068 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/267068
Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems Sep 14, 2016 Issued
Array ( [id] => 13767333 [patent_doc_number] => 10176008 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-01-08 [patent_title] => Loading and running virtual working environments in a mobile device management system [patent_app_type] => utility [patent_app_number] => 15/264598 [patent_app_country] => US [patent_app_date] => 2016-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7884 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15264598 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/264598
Loading and running virtual working environments in a mobile device management system Sep 13, 2016 Issued
15/261867 AUTOMATED CYBERSECURITY THREAT DETECTION WITH AGGREGATION AND ANALYSIS Sep 8, 2016 Abandoned
Array ( [id] => 13273143 [patent_doc_number] => 10148664 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-12-04 [patent_title] => Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems [patent_app_type] => utility [patent_app_number] => 15/260095 [patent_app_country] => US [patent_app_date] => 2016-09-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9405 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15260095 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/260095
Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems Sep 7, 2016 Issued
Array ( [id] => 14254813 [patent_doc_number] => 10277620 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-04-30 [patent_title] => Determining an assessment of a security breach for an asset of a network infrastructure [patent_app_type] => utility [patent_app_number] => 15/259477 [patent_app_country] => US [patent_app_date] => 2016-09-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7055 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15259477 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/259477
Determining an assessment of a security breach for an asset of a network infrastructure Sep 7, 2016 Issued
Array ( [id] => 11940554 [patent_doc_number] => 20170244705 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-08-24 [patent_title] => 'METHOD OF USING CONVERGED CORE NETWORK SERVICE, UNIVERSAL CONTROL ENTITY, AND CONVERGED CORE NETWORK SYSTEM' [patent_app_type] => utility [patent_app_number] => 15/252651 [patent_app_country] => US [patent_app_date] => 2016-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 6776 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15252651 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/252651
METHOD OF USING CONVERGED CORE NETWORK SERVICE, UNIVERSAL CONTROL ENTITY, AND CONVERGED CORE NETWORK SYSTEM Aug 30, 2016 Abandoned
Array ( [id] => 12224788 [patent_doc_number] => 20180063147 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-01 [patent_title] => 'NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE' [patent_app_type] => utility [patent_app_number] => 15/246114 [patent_app_country] => US [patent_app_date] => 2016-08-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8846 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15246114 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/246114
NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE Aug 23, 2016 Abandoned
Array ( [id] => 11556960 [patent_doc_number] => 20170103206 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-04-13 [patent_title] => 'METHOD AND APPARATUS FOR CAPTURING OPERATION IN A CONTAINER-BASED VIRTUALIZATION SYSTEM' [patent_app_type] => utility [patent_app_number] => 15/237940 [patent_app_country] => US [patent_app_date] => 2016-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5833 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237940 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/237940
Method and apparatus for capturing operation in a container-based virtualization system Aug 15, 2016 Issued
Array ( [id] => 14400169 [patent_doc_number] => 10313384 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-06-04 [patent_title] => Mitigation of security risk vulnerabilities in an enterprise network [patent_app_type] => utility [patent_app_number] => 15/234980 [patent_app_country] => US [patent_app_date] => 2016-08-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 14 [patent_no_of_words] => 10326 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15234980 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/234980
Mitigation of security risk vulnerabilities in an enterprise network Aug 10, 2016 Issued
Array ( [id] => 14601737 [patent_doc_number] => 10354061 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-16 [patent_title] => Methods and systems for authenticating a headset for a transportation vehicle [patent_app_type] => utility [patent_app_number] => 15/218889 [patent_app_country] => US [patent_app_date] => 2016-07-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4901 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15218889 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/218889
Methods and systems for authenticating a headset for a transportation vehicle Jul 24, 2016 Issued
Array ( [id] => 11405847 [patent_doc_number] => 20170026385 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-26 [patent_title] => 'METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL' [patent_app_type] => utility [patent_app_number] => 15/217171 [patent_app_country] => US [patent_app_date] => 2016-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5495 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217171 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/217171
METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL Jul 21, 2016 Abandoned
Array ( [id] => 15377703 [patent_doc_number] => 10530587 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-01-07 [patent_title] => Web scale authentication [patent_app_type] => utility [patent_app_number] => 15/199097 [patent_app_country] => US [patent_app_date] => 2016-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 1961 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15199097 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/199097
Web scale authentication Jun 29, 2016 Issued
Array ( [id] => 17038931 [patent_doc_number] => 11096048 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-08-17 [patent_title] => Identity authentication method and communications terminal [patent_app_type] => utility [patent_app_number] => 16/313036 [patent_app_country] => US [patent_app_date] => 2016-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 11382 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 265 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16313036 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/313036
Identity authentication method and communications terminal Jun 29, 2016 Issued
Array ( [id] => 11352749 [patent_doc_number] => 20160371489 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-22 [patent_title] => 'EVENT ANOMALY ANALYSIS AND PREDICTION' [patent_app_type] => utility [patent_app_number] => 15/184607 [patent_app_country] => US [patent_app_date] => 2016-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 12045 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15184607 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/184607
Event anomaly analysis and prediction Jun 15, 2016 Issued
Menu