Search

Alvin E. Oberley

Examiner (ID: 12243)

Most Active Art Unit
2604
Art Unit(s)
2126, 2899, 3104, 2606, 2755, 2604, 2151, 2609
Total Applications
548
Issued Applications
425
Pending Applications
3
Abandoned Applications
120

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9903744 [patent_doc_number] => 20150058945 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-26 [patent_title] => 'SYSTEM AND METHOD FOR ACCEPTING USER INPUT USING ASYNCHRONOUS AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 13/974043 [patent_app_country] => US [patent_app_date] => 2013-08-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 5010 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13974043 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/974043
System and method for accepting user input using asynchronous authentication Aug 21, 2013 Issued
Array ( [id] => 9320935 [patent_doc_number] => 20140053273 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-20 [patent_title] => 'SYSTEM AND METHOD FOR LIMITING EXPLOITABLE OR POTENTIALLY EXPLOITABLE SUB-COMPONENTS IN SOFTWARE COMPONENTS' [patent_app_type] => utility [patent_app_number] => 13/969158 [patent_app_country] => US [patent_app_date] => 2013-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 23693 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13969158 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/969158
System and method for limiting exploitable of potentially exploitable sub-components in software components Aug 15, 2013 Issued
Array ( [id] => 12039755 [patent_doc_number] => 09817989 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-11-14 [patent_title] => 'Access control of external memory' [patent_app_type] => utility [patent_app_number] => 14/343968 [patent_app_country] => US [patent_app_date] => 2013-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 8124 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14343968 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/343968
Access control of external memory Jul 7, 2013 Issued
Array ( [id] => 9341955 [patent_doc_number] => 20140068739 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-06 [patent_title] => 'METHOD AND SYSTEM FOR VERIFYING AN ACCESS REQUEST' [patent_app_type] => utility [patent_app_number] => 13/936094 [patent_app_country] => US [patent_app_date] => 2013-07-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 10542 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13936094 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/936094
Method and system for verifying an access request Jul 4, 2013 Issued
Array ( [id] => 10977422 [patent_doc_number] => 20140380457 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-25 [patent_title] => 'ADJUSTING DDOS PROTECTION' [patent_app_type] => utility [patent_app_number] => 13/923875 [patent_app_country] => US [patent_app_date] => 2013-06-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4208 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13923875 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/923875
ADJUSTING DDOS PROTECTION Jun 20, 2013 Abandoned
Array ( [id] => 10969632 [patent_doc_number] => 20140372665 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-18 [patent_title] => 'NON-VOLATILE MEMORY OPERATIONS' [patent_app_type] => utility [patent_app_number] => 13/917261 [patent_app_country] => US [patent_app_date] => 2013-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6108 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13917261 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/917261
Non-volatile memory operations Jun 12, 2013 Issued
Array ( [id] => 10963126 [patent_doc_number] => 20140366157 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-11 [patent_title] => 'MULTIPLE CONTAINERS ASSIGNED TO AN APPLICATION' [patent_app_type] => utility [patent_app_number] => 13/913059 [patent_app_country] => US [patent_app_date] => 2013-06-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6199 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13913059 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/913059
Multiple containers assigned to an application Jun 6, 2013 Issued
Array ( [id] => 10352062 [patent_doc_number] => 20150237067 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-20 [patent_title] => 'METHOD AND APPARATUS FOR DETECTING ATTACK ON SERVER' [patent_app_type] => utility [patent_app_number] => 14/381770 [patent_app_country] => US [patent_app_date] => 2013-06-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6094 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14381770 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/381770
Method and apparatus for detecting attack on server Jun 4, 2013 Issued
Array ( [id] => 9044506 [patent_doc_number] => 20130247144 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-19 [patent_title] => 'Controlling Access to Resources on a Network' [patent_app_type] => utility [patent_app_number] => 13/891612 [patent_app_country] => US [patent_app_date] => 2013-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7275 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13891612 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/891612
Controlling access to resources on a network May 9, 2013 Issued
Array ( [id] => 9878946 [patent_doc_number] => 08966242 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-02-24 [patent_title] => 'Systems and methods for empowering IP practitioners' [patent_app_type] => utility [patent_app_number] => 13/836764 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4679 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 250 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13836764 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/836764
Systems and methods for empowering IP practitioners Mar 14, 2013 Issued
Array ( [id] => 10166421 [patent_doc_number] => 09197660 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-24 [patent_title] => 'Generic privilege escalation prevention' [patent_app_type] => utility [patent_app_number] => 13/977014 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 7549 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13977014 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/977014
Generic privilege escalation prevention Mar 14, 2013 Issued
Array ( [id] => 10126354 [patent_doc_number] => 09160730 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-13 [patent_title] => 'Continuous authentication confidence module' [patent_app_type] => utility [patent_app_number] => 13/994016 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 18029 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 178 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13994016 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/994016
Continuous authentication confidence module Mar 14, 2013 Issued
Array ( [id] => 10569512 [patent_doc_number] => 09292683 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-22 [patent_title] => 'Computing device security' [patent_app_type] => utility [patent_app_number] => 13/977020 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4441 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 95 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13977020 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/977020
Computing device security Mar 14, 2013 Issued
Array ( [id] => 11253813 [patent_doc_number] => 09479332 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-25 [patent_title] => 'Key revocation in system on chip devices' [patent_app_type] => utility [patent_app_number] => 13/997263 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6023 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13997263 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/997263
Key revocation in system on chip devices Mar 14, 2013 Issued
Array ( [id] => 10151099 [patent_doc_number] => 09183391 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-10 [patent_title] => 'Managing device driver cross ring accesses' [patent_app_type] => utility [patent_app_number] => 13/997790 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 10181 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13997790 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/997790
Managing device driver cross ring accesses Mar 12, 2013 Issued
Array ( [id] => 10151087 [patent_doc_number] => 09183379 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-10 [patent_title] => 'Preventing malicious instruction execution' [patent_app_type] => utility [patent_app_number] => 13/991291 [patent_app_country] => US [patent_app_date] => 2013-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7436 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13991291 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/991291
Preventing malicious instruction execution Mar 11, 2013 Issued
Array ( [id] => 9814844 [patent_doc_number] => 20150026790 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-22 [patent_title] => 'Method for Computer Access Control by Means of Mobile End Device' [patent_app_type] => utility [patent_app_number] => 14/381650 [patent_app_country] => US [patent_app_date] => 2013-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2911 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14381650 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/381650
Method for computer access control by means of mobile end device Feb 25, 2013 Issued
Array ( [id] => 8893728 [patent_doc_number] => 20130166912 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-27 [patent_title] => 'INFORMATION PROCESSING APPARATUS AND METHOD' [patent_app_type] => utility [patent_app_number] => 13/770002 [patent_app_country] => US [patent_app_date] => 2013-02-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5753 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13770002 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/770002
Information processing apparatus and method Feb 18, 2013 Issued
Array ( [id] => 11782789 [patent_doc_number] => 09392017 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-07-12 [patent_title] => 'Methods, systems, and media for inhibiting attacks on embedded devices' [patent_app_type] => utility [patent_app_number] => 14/379166 [patent_app_country] => US [patent_app_date] => 2013-02-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 11157 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 223 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14379166 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/379166
Methods, systems, and media for inhibiting attacks on embedded devices Feb 14, 2013 Issued
Array ( [id] => 9774361 [patent_doc_number] => 20140298024 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-02 [patent_title] => 'Method for granting access to a network and device for implementing this method' [patent_app_type] => utility [patent_app_number] => 13/717840 [patent_app_country] => US [patent_app_date] => 2012-12-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3104 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13717840 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/717840
Method for granting access to a network and device for implementing this method Dec 17, 2012 Abandoned
Menu