Anabel Ton
Examiner (ID: 8080, Phone: (571)272-2382 , Office: P/2875 )
Most Active Art Unit | 2875 |
Art Unit(s) | 2875 |
Total Applications | 2154 |
Issued Applications | 1750 |
Pending Applications | 76 |
Abandoned Applications | 327 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 15714183
[patent_doc_number] => 20200103858
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-02
[patent_title] => SYSTEMS AND METHODS FOR ENCRYPTING DATA BETWEEN MODULES OF A CONTROL SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/146116
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22980
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16146116
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/146116 | Systems and methods for encrypting data between modules of a control system | Sep 27, 2018 | Issued |
Array
(
[id] => 14285025
[patent_doc_number] => 20190139797
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-09
[patent_title] => METHODS AND DEVICES FOR PROCESS EDITING, ACQUISITION, PROCESS DATA PROTECTION FOR SOLAR CELL PRODUCTION APPARATUS
[patent_app_type] => utility
[patent_app_number] => 16/146923
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6982
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16146923
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/146923 | METHODS AND DEVICES FOR PROCESS EDITING, ACQUISITION, PROCESS DATA PROTECTION FOR SOLAR CELL PRODUCTION APPARATUS | Sep 27, 2018 | Abandoned |
Array
(
[id] => 14281373
[patent_doc_number] => 20190137971
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-09
[patent_title] => Method And Apparatus For Editing, Obtaining, and Protecting Process Of Solar Cell Production Device
[patent_app_type] => utility
[patent_app_number] => 16/138979
[patent_app_country] => US
[patent_app_date] => 2018-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4904
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16138979
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/138979 | Method And Apparatus For Editing, Obtaining, and Protecting Process Of Solar Cell Production Device | Sep 21, 2018 | Abandoned |
Array
(
[id] => 15659467
[patent_doc_number] => 20200092264
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-19
[patent_title] => END-POINT ASSISTED GATEWAY DECRYPTION WITHOUT MAN-IN-THE-MIDDLE
[patent_app_type] => utility
[patent_app_number] => 16/133368
[patent_app_country] => US
[patent_app_date] => 2018-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3847
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16133368
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/133368 | END-POINT ASSISTED GATEWAY DECRYPTION WITHOUT MAN-IN-THE-MIDDLE | Sep 16, 2018 | Abandoned |
Array
(
[id] => 16974602
[patent_doc_number] => 11070590
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-20
[patent_title] => System and method for secure multitenant operations of a distributed computing cluster
[patent_app_type] => utility
[patent_app_number] => 16/131377
[patent_app_country] => US
[patent_app_date] => 2018-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 5358
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16131377
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/131377 | System and method for secure multitenant operations of a distributed computing cluster | Sep 13, 2018 | Issued |
Array
(
[id] => 16371402
[patent_doc_number] => 10803164
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-13
[patent_title] => Validating sign-out implementation for identity federation
[patent_app_type] => utility
[patent_app_number] => 16/130060
[patent_app_country] => US
[patent_app_date] => 2018-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7844
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16130060
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/130060 | Validating sign-out implementation for identity federation | Sep 12, 2018 | Issued |
Array
(
[id] => 16463072
[patent_doc_number] => 10846421
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-24
[patent_title] => Method for protecting unauthorized data access from a memory
[patent_app_type] => utility
[patent_app_number] => 16/125680
[patent_app_country] => US
[patent_app_date] => 2018-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4809
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16125680
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/125680 | Method for protecting unauthorized data access from a memory | Sep 7, 2018 | Issued |
Array
(
[id] => 16257733
[patent_doc_number] => 20200267108
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-20
[patent_title] => METHOD FOR USER/STAFF MEMBER TO ACQUIRE MAIL BOX ACCOUNT IN SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/634551
[patent_app_country] => US
[patent_app_date] => 2018-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6341
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16634551
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/634551 | Method for acquiring mail box account in system | Jul 26, 2018 | Issued |
Array
(
[id] => 13787779
[patent_doc_number] => 20190007428
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-03
[patent_title] => Detecting Compromised Credentials in a Credential Stuffing Attack
[patent_app_type] => utility
[patent_app_number] => 16/024691
[patent_app_country] => US
[patent_app_date] => 2018-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10600
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16024691
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/024691 | Detecting compromised credentials in a credential stuffing attack | Jun 28, 2018 | Issued |
Array
(
[id] => 13516405
[patent_doc_number] => 20180309745
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-25
[patent_title] => METHOD, DEVICE, AND SYSTEM OF ACCESSING ONLINE ACCOUNTS
[patent_app_type] => utility
[patent_app_number] => 16/019142
[patent_app_country] => US
[patent_app_date] => 2018-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20515
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019142
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/019142 | Method, device, and system of accessing online accounts | Jun 25, 2018 | Issued |
Array
(
[id] => 15272325
[patent_doc_number] => 20190384897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-19
[patent_title] => SYSTEM AND METHOD FOR PROTECTING ONLINE RESOURCES AGAINST GUIDED USERNAME GUESSING ATTACKS
[patent_app_type] => utility
[patent_app_number] => 16/011049
[patent_app_country] => US
[patent_app_date] => 2018-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3622
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16011049
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/011049 | System and method for protecting online resources against guided username guessing attacks | Jun 17, 2018 | Issued |
Array
(
[id] => 14918543
[patent_doc_number] => 10430592
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-01
[patent_title] => Integrity checking for computing devices
[patent_app_type] => utility
[patent_app_number] => 15/988769
[patent_app_country] => US
[patent_app_date] => 2018-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12849
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15988769
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/988769 | Integrity checking for computing devices | May 23, 2018 | Issued |
Array
(
[id] => 15156431
[patent_doc_number] => 20190356693
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => SELECTIVELY PROVIDING MUTUAL TRANSPORT LAYER SECURITY USING ALTERNATIVE SERVER NAMES
[patent_app_type] => utility
[patent_app_number] => 15/984423
[patent_app_country] => US
[patent_app_date] => 2018-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8704
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 53
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15984423
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/984423 | Selectively providing mutual transport layer security using alternative server names | May 20, 2018 | Issued |
Array
(
[id] => 17166968
[patent_doc_number] => 11153083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-19
[patent_title] => Rogue unit detection information
[patent_app_type] => utility
[patent_app_number] => 15/984225
[patent_app_country] => US
[patent_app_date] => 2018-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12045
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15984225
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/984225 | Rogue unit detection information | May 17, 2018 | Issued |
Array
(
[id] => 13572709
[patent_doc_number] => 20180337903
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => WIRELESS LAN ACCESS POINT AND ENCRYPTION KEY SHARING METHOD
[patent_app_type] => utility
[patent_app_number] => 15/979944
[patent_app_country] => US
[patent_app_date] => 2018-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5395
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15979944
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/979944 | WIRELESS LAN ACCESS POINT AND ENCRYPTION KEY SHARING METHOD | May 14, 2018 | Abandoned |
Array
(
[id] => 14203385
[patent_doc_number] => 10268810
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-23
[patent_title] => Methods, apparatus and systems for securely authenticating a person depending on context
[patent_app_type] => utility
[patent_app_number] => 15/968267
[patent_app_country] => US
[patent_app_date] => 2018-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9433
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15968267
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/968267 | Methods, apparatus and systems for securely authenticating a person depending on context | Apr 30, 2018 | Issued |
Array
(
[id] => 16610375
[patent_doc_number] => 10911406
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-02
[patent_title] => Accessing cloud resources using private network addresses
[patent_app_type] => utility
[patent_app_number] => 15/967518
[patent_app_country] => US
[patent_app_date] => 2018-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 18
[patent_no_of_words] => 8918
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15967518
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/967518 | Accessing cloud resources using private network addresses | Apr 29, 2018 | Issued |
Array
(
[id] => 17311179
[patent_doc_number] => 11212310
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-28
[patent_title] => System for reducing application programming interface (API) risk and latency
[patent_app_type] => utility
[patent_app_number] => 15/967477
[patent_app_country] => US
[patent_app_date] => 2018-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6973
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15967477
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/967477 | System for reducing application programming interface (API) risk and latency | Apr 29, 2018 | Issued |
Array
(
[id] => 16637146
[patent_doc_number] => 10915656
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-09
[patent_title] => Rollback protection for login security policy
[patent_app_type] => utility
[patent_app_number] => 15/962847
[patent_app_country] => US
[patent_app_date] => 2018-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5681
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15962847
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/962847 | Rollback protection for login security policy | Apr 24, 2018 | Issued |
Array
(
[id] => 16739768
[patent_doc_number] => 10965444
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-30
[patent_title] => Mitigating timing attacks via dynamically triggered time dilation
[patent_app_type] => utility
[patent_app_number] => 15/961830
[patent_app_country] => US
[patent_app_date] => 2018-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6227
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 49
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15961830
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/961830 | Mitigating timing attacks via dynamically triggered time dilation | Apr 23, 2018 | Issued |