
Andre J. Allen
Examiner (ID: 4004, Phone: (571)272-2174 , Office: P/2856 )
| Most Active Art Unit | 2855 |
| Art Unit(s) | 2855, 2856 |
| Total Applications | 3252 |
| Issued Applications | 2892 |
| Pending Applications | 166 |
| Abandoned Applications | 229 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11275303
[patent_doc_number] => 20160337850
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'SECURITY METHOD AND SYSTEM FOR SUPPORTING PROSE GROUP COMMUNICATION OR PUBLIC SAFETY IN MOBILE COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 15/111471
[patent_app_country] => US
[patent_app_date] => 2015-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8682
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15111471
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/111471 | Security method and system for supporting prose group communication or public safety in mobile communication | Jan 12, 2015 | Issued |
Array
(
[id] => 11133643
[patent_doc_number] => 20160330619
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-10
[patent_title] => 'SECURITY SUPPORT METHOD AND SYSTEM FOR DISCOVERING SERVICE AND GROUP COMMUNICATION IN MOBILE COMMUNICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/111469
[patent_app_country] => US
[patent_app_date] => 2015-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6269
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15111469
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/111469 | Security support method and system for discovering service and group communication in mobile communication system | Jan 12, 2015 | Issued |
Array
(
[id] => 10296163
[patent_doc_number] => 20150181162
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'SYSTEM AND METHOD FOR GROUP VIDEO MESSAGING SERVICE'
[patent_app_type] => utility
[patent_app_number] => 14/592975
[patent_app_country] => US
[patent_app_date] => 2015-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 51
[patent_figures_cnt] => 51
[patent_no_of_words] => 17661
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14592975
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/592975 | System and method for group video messaging service | Jan 8, 2015 | Issued |
Array
(
[id] => 11841087
[patent_doc_number] => 20170222807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-03
[patent_title] => 'HYPERSPHERE-BASED MULTIVARIABLE PUBLIC KEY ENCRYPTION/DECRYPTION SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/111365
[patent_app_country] => US
[patent_app_date] => 2015-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5565
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15111365
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/111365 | Hypersphere-based multivariable public key encryption/decryption system and method | Jan 6, 2015 | Issued |
Array
(
[id] => 10243258
[patent_doc_number] => 20150128253
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-07
[patent_title] => 'Multi-Security-CPU System'
[patent_app_type] => utility
[patent_app_number] => 14/589727
[patent_app_country] => US
[patent_app_date] => 2015-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3095
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14589727
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/589727 | Multi-security-CPU system | Jan 4, 2015 | Issued |
Array
(
[id] => 12762475
[patent_doc_number] => 20180145993
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-24
[patent_title] => URL MATCHING APPARATUS, URL MATCHING METHOD, AND URL MATCHING PROGRAM
[patent_app_type] => utility
[patent_app_number] => 15/103080
[patent_app_country] => US
[patent_app_date] => 2014-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5692
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15103080
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/103080 | URL matching apparatus, URL matching method, and URL matching program | Dec 7, 2014 | Issued |
Array
(
[id] => 12055587
[patent_doc_number] => 20170331931
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'APPLICATION LAYER HEADER OR PAYLOAD ENRICHMENT WITHOUT PROXY OR CONNECTION TERMINATION'
[patent_app_type] => utility
[patent_app_number] => 15/527514
[patent_app_country] => US
[patent_app_date] => 2014-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4053
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15527514
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/527514 | APPLICATION LAYER HEADER OR PAYLOAD ENRICHMENT WITHOUT PROXY OR CONNECTION TERMINATION | Nov 16, 2014 | Abandoned |
Array
(
[id] => 11188530
[patent_doc_number] => 09419954
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-16
[patent_title] => 'Storing and transmitting sensitive data'
[patent_app_type] => utility
[patent_app_number] => 14/506593
[patent_app_country] => US
[patent_app_date] => 2014-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 13014
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14506593
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/506593 | Storing and transmitting sensitive data | Oct 2, 2014 | Issued |
Array
(
[id] => 11639001
[patent_doc_number] => 09660994
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-23
[patent_title] => 'SCADA intrusion detection systems'
[patent_app_type] => utility
[patent_app_number] => 14/501672
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9864
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14501672
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/501672 | SCADA intrusion detection systems | Sep 29, 2014 | Issued |
Array
(
[id] => 10719458
[patent_doc_number] => 20160065604
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'ANOMALOUS EVENT DETECTION BASED ON METRICS PERTAINING TO A PRODUCTION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/501664
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 12169
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14501664
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/501664 | Anomalous event detection based on metrics pertaining to a production system | Sep 29, 2014 | Issued |
Array
(
[id] => 11917239
[patent_doc_number] => 09785425
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-10
[patent_title] => 'Managed clone applications'
[patent_app_type] => utility
[patent_app_number] => 14/501888
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8870
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14501888
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/501888 | Managed clone applications | Sep 29, 2014 | Issued |
Array
(
[id] => 10748396
[patent_doc_number] => 20160094547
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-31
[patent_title] => 'IMAGE CAPTURE CHALLENGE ACCESS'
[patent_app_type] => utility
[patent_app_number] => 14/501713
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10520
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14501713
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/501713 | Image capture challenge access | Sep 29, 2014 | Issued |
Array
(
[id] => 11817133
[patent_doc_number] => 09721087
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-08-01
[patent_title] => 'User authentication'
[patent_app_type] => utility
[patent_app_number] => 14/501502
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4070
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14501502
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/501502 | User authentication | Sep 29, 2014 | Issued |
Array
(
[id] => 11188567
[patent_doc_number] => 09419991
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-16
[patent_title] => 'De-obfuscating scripted language for network intrusion detection using a regular expression signature'
[patent_app_type] => utility
[patent_app_number] => 14/501798
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7335
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14501798
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/501798 | De-obfuscating scripted language for network intrusion detection using a regular expression signature | Sep 29, 2014 | Issued |
Array
(
[id] => 10338065
[patent_doc_number] => 20150223070
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-06
[patent_title] => 'CUSTOMER IDENTIFICATION FOR SEAMLESS WIRELESS-NETWORK ACCESS'
[patent_app_type] => utility
[patent_app_number] => 14/502221
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7987
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14502221
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/502221 | Customer identification for seamless wireless-network access | Sep 29, 2014 | Issued |
Array
(
[id] => 10379070
[patent_doc_number] => 20150264077
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'Computer Implemented Techniques for Detecting, Investigating and Remediating Security Violations to IT Infrastructure'
[patent_app_type] => utility
[patent_app_number] => 14/501976
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14735
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14501976
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/501976 | Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure | Sep 29, 2014 | Issued |
Array
(
[id] => 10215801
[patent_doc_number] => 20150100793
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-09
[patent_title] => 'Method of Improving FPGA Security Using Authorization Codes'
[patent_app_type] => utility
[patent_app_number] => 14/485833
[patent_app_country] => US
[patent_app_date] => 2014-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9375
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14485833
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/485833 | Method of improving FPGA security using authorization codes | Sep 14, 2014 | Issued |
Array
(
[id] => 10734250
[patent_doc_number] => 20160080399
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'THREAT DETECTION USING A TIME-BASED CACHE OF REPUTATION INFORMATION ON AN ENTERPRISE ENDPOINT'
[patent_app_type] => utility
[patent_app_number] => 14/485790
[patent_app_country] => US
[patent_app_date] => 2014-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 39526
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14485790
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/485790 | Threat detection using a time-based cache of reputation information on an enterprise endpoint | Sep 13, 2014 | Issued |
Array
(
[id] => 10734254
[patent_doc_number] => 20160080404
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'DETECTION OF MALICIOUS NETWORK CONNECTIONS'
[patent_app_type] => utility
[patent_app_number] => 14/485731
[patent_app_country] => US
[patent_app_date] => 2014-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 29
[patent_no_of_words] => 9691
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14485731
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/485731 | Detection of malicious network connections | Sep 13, 2014 | Issued |
Array
(
[id] => 10512223
[patent_doc_number] => 09239802
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-19
[patent_title] => 'System and method for protecting a plug server using encryption techniques without internet connectivity'
[patent_app_type] => utility
[patent_app_number] => 14/484359
[patent_app_country] => US
[patent_app_date] => 2014-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2529
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 296
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14484359
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/484359 | System and method for protecting a plug server using encryption techniques without internet connectivity | Sep 11, 2014 | Issued |