
Alvin E. Oberley
Examiner (ID: 12243)
| Most Active Art Unit | 2604 |
| Art Unit(s) | 2126, 2899, 3104, 2606, 2755, 2604, 2151, 2609 |
| Total Applications | 548 |
| Issued Applications | 425 |
| Pending Applications | 3 |
| Abandoned Applications | 120 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9903744
[patent_doc_number] => 20150058945
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'SYSTEM AND METHOD FOR ACCEPTING USER INPUT USING ASYNCHRONOUS AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/974043
[patent_app_country] => US
[patent_app_date] => 2013-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 5010
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13974043
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/974043 | System and method for accepting user input using asynchronous authentication | Aug 21, 2013 | Issued |
Array
(
[id] => 9320935
[patent_doc_number] => 20140053273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-20
[patent_title] => 'SYSTEM AND METHOD FOR LIMITING EXPLOITABLE OR POTENTIALLY EXPLOITABLE SUB-COMPONENTS IN SOFTWARE COMPONENTS'
[patent_app_type] => utility
[patent_app_number] => 13/969158
[patent_app_country] => US
[patent_app_date] => 2013-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 23693
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13969158
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/969158 | System and method for limiting exploitable of potentially exploitable sub-components in software components | Aug 15, 2013 | Issued |
Array
(
[id] => 12039755
[patent_doc_number] => 09817989
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-14
[patent_title] => 'Access control of external memory'
[patent_app_type] => utility
[patent_app_number] => 14/343968
[patent_app_country] => US
[patent_app_date] => 2013-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 8124
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14343968
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/343968 | Access control of external memory | Jul 7, 2013 | Issued |
Array
(
[id] => 9341955
[patent_doc_number] => 20140068739
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-06
[patent_title] => 'METHOD AND SYSTEM FOR VERIFYING AN ACCESS REQUEST'
[patent_app_type] => utility
[patent_app_number] => 13/936094
[patent_app_country] => US
[patent_app_date] => 2013-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 10542
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13936094
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/936094 | Method and system for verifying an access request | Jul 4, 2013 | Issued |
Array
(
[id] => 10977422
[patent_doc_number] => 20140380457
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-25
[patent_title] => 'ADJUSTING DDOS PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 13/923875
[patent_app_country] => US
[patent_app_date] => 2013-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4208
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13923875
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/923875 | ADJUSTING DDOS PROTECTION | Jun 20, 2013 | Abandoned |
Array
(
[id] => 10969632
[patent_doc_number] => 20140372665
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'NON-VOLATILE MEMORY OPERATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/917261
[patent_app_country] => US
[patent_app_date] => 2013-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6108
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13917261
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/917261 | Non-volatile memory operations | Jun 12, 2013 | Issued |
Array
(
[id] => 10963126
[patent_doc_number] => 20140366157
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-11
[patent_title] => 'MULTIPLE CONTAINERS ASSIGNED TO AN APPLICATION'
[patent_app_type] => utility
[patent_app_number] => 13/913059
[patent_app_country] => US
[patent_app_date] => 2013-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6199
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13913059
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/913059 | Multiple containers assigned to an application | Jun 6, 2013 | Issued |
Array
(
[id] => 10352062
[patent_doc_number] => 20150237067
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-20
[patent_title] => 'METHOD AND APPARATUS FOR DETECTING ATTACK ON SERVER'
[patent_app_type] => utility
[patent_app_number] => 14/381770
[patent_app_country] => US
[patent_app_date] => 2013-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6094
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14381770
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/381770 | Method and apparatus for detecting attack on server | Jun 4, 2013 | Issued |
Array
(
[id] => 9044506
[patent_doc_number] => 20130247144
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-19
[patent_title] => 'Controlling Access to Resources on a Network'
[patent_app_type] => utility
[patent_app_number] => 13/891612
[patent_app_country] => US
[patent_app_date] => 2013-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7275
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13891612
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/891612 | Controlling access to resources on a network | May 9, 2013 | Issued |
Array
(
[id] => 9878946
[patent_doc_number] => 08966242
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-02-24
[patent_title] => 'Systems and methods for empowering IP practitioners'
[patent_app_type] => utility
[patent_app_number] => 13/836764
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4679
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13836764
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/836764 | Systems and methods for empowering IP practitioners | Mar 14, 2013 | Issued |
Array
(
[id] => 10166421
[patent_doc_number] => 09197660
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Generic privilege escalation prevention'
[patent_app_type] => utility
[patent_app_number] => 13/977014
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7549
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13977014
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/977014 | Generic privilege escalation prevention | Mar 14, 2013 | Issued |
Array
(
[id] => 10126354
[patent_doc_number] => 09160730
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-13
[patent_title] => 'Continuous authentication confidence module'
[patent_app_type] => utility
[patent_app_number] => 13/994016
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 18029
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13994016
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/994016 | Continuous authentication confidence module | Mar 14, 2013 | Issued |
Array
(
[id] => 10569512
[patent_doc_number] => 09292683
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-22
[patent_title] => 'Computing device security'
[patent_app_type] => utility
[patent_app_number] => 13/977020
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4441
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13977020
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/977020 | Computing device security | Mar 14, 2013 | Issued |
Array
(
[id] => 11253813
[patent_doc_number] => 09479332
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-25
[patent_title] => 'Key revocation in system on chip devices'
[patent_app_type] => utility
[patent_app_number] => 13/997263
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6023
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13997263
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/997263 | Key revocation in system on chip devices | Mar 14, 2013 | Issued |
Array
(
[id] => 10151099
[patent_doc_number] => 09183391
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Managing device driver cross ring accesses'
[patent_app_type] => utility
[patent_app_number] => 13/997790
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 10181
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13997790
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/997790 | Managing device driver cross ring accesses | Mar 12, 2013 | Issued |
Array
(
[id] => 10151087
[patent_doc_number] => 09183379
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Preventing malicious instruction execution'
[patent_app_type] => utility
[patent_app_number] => 13/991291
[patent_app_country] => US
[patent_app_date] => 2013-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7436
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13991291
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/991291 | Preventing malicious instruction execution | Mar 11, 2013 | Issued |
Array
(
[id] => 9814844
[patent_doc_number] => 20150026790
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-22
[patent_title] => 'Method for Computer Access Control by Means of Mobile End Device'
[patent_app_type] => utility
[patent_app_number] => 14/381650
[patent_app_country] => US
[patent_app_date] => 2013-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2911
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14381650
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/381650 | Method for computer access control by means of mobile end device | Feb 25, 2013 | Issued |
Array
(
[id] => 8893728
[patent_doc_number] => 20130166912
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-27
[patent_title] => 'INFORMATION PROCESSING APPARATUS AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/770002
[patent_app_country] => US
[patent_app_date] => 2013-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5753
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13770002
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/770002 | Information processing apparatus and method | Feb 18, 2013 | Issued |
Array
(
[id] => 11782789
[patent_doc_number] => 09392017
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Methods, systems, and media for inhibiting attacks on embedded devices'
[patent_app_type] => utility
[patent_app_number] => 14/379166
[patent_app_country] => US
[patent_app_date] => 2013-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 11157
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14379166
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/379166 | Methods, systems, and media for inhibiting attacks on embedded devices | Feb 14, 2013 | Issued |
Array
(
[id] => 9774361
[patent_doc_number] => 20140298024
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-02
[patent_title] => 'Method for granting access to a network and device for implementing this method'
[patent_app_type] => utility
[patent_app_number] => 13/717840
[patent_app_country] => US
[patent_app_date] => 2012-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3104
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13717840
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/717840 | Method for granting access to a network and device for implementing this method | Dec 17, 2012 | Abandoned |