
Andre J. Allen
Examiner (ID: 4004, Phone: (571)272-2174 , Office: P/2856 )
| Most Active Art Unit | 2855 |
| Art Unit(s) | 2855, 2856 |
| Total Applications | 3252 |
| Issued Applications | 2892 |
| Pending Applications | 166 |
| Abandoned Applications | 229 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9006155
[patent_doc_number] => 20130227280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-29
[patent_title] => 'METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/780283
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9108
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780283
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780283 | Method of operating a computing device, computing device and computer program | Feb 27, 2013 | Issued |
Array
(
[id] => 9493455
[patent_doc_number] => 20140143861
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-22
[patent_title] => 'COMPUTER WITH SAFEGUARD FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 13/779755
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 705
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779755
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/779755 | COMPUTER WITH SAFEGUARD FUNCTION | Feb 27, 2013 | Abandoned |
Array
(
[id] => 9015207
[patent_doc_number] => 20130230171
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-05
[patent_title] => 'SYSTEMS, METHODS AND APPARATUSES FOR THE SECURE TRANSMISSION AND RESTRICTED USE OF MEDIA CONTENT'
[patent_app_type] => utility
[patent_app_number] => 13/780288
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12073
[patent_no_of_claims] => 44
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780288
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780288 | Systems, methods and apparatuses for the secure transmission and restricted use of media content | Feb 27, 2013 | Issued |
Array
(
[id] => 9006154
[patent_doc_number] => 20130227279
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-29
[patent_title] => 'METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/780191
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9893
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780191
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780191 | Method of operating a computing device, computing device and computer program | Feb 27, 2013 | Issued |
Array
(
[id] => 9006517
[patent_doc_number] => 20130227642
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-29
[patent_title] => 'APPARATUS AND METHOD FOR DETECTING ILLEGAL USER'
[patent_app_type] => utility
[patent_app_number] => 13/780282
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3245
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780282
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780282 | APPARATUS AND METHOD FOR DETECTING ILLEGAL USER | Feb 27, 2013 | Abandoned |
Array
(
[id] => 10519881
[patent_doc_number] => 09246941
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-26
[patent_title] => 'Systems and methods for predicting the impact of security-policy changes on users'
[patent_app_type] => utility
[patent_app_number] => 13/779550
[patent_app_country] => US
[patent_app_date] => 2013-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9855
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 310
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779550
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/779550 | Systems and methods for predicting the impact of security-policy changes on users | Feb 26, 2013 | Issued |
Array
(
[id] => 9017373
[patent_doc_number] => 20130232337
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-05
[patent_title] => 'USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT'
[patent_app_type] => utility
[patent_app_number] => 13/779657
[patent_app_country] => US
[patent_app_date] => 2013-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4855
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779657
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/779657 | USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT | Feb 26, 2013 | Abandoned |
Array
(
[id] => 9700804
[patent_doc_number] => 20140250489
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-04
[patent_title] => 'Techniques for Policy Aware Service Composition'
[patent_app_type] => utility
[patent_app_number] => 13/769469
[patent_app_country] => US
[patent_app_date] => 2013-02-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7961
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13769469
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/769469 | Techniques for Policy Aware Service Composition | Feb 17, 2013 | Abandoned |
Array
(
[id] => 9520928
[patent_doc_number] => 20140157420
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS'
[patent_app_type] => utility
[patent_app_number] => 13/755151
[patent_app_country] => US
[patent_app_date] => 2013-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5155
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13755151
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/755151 | Discovery of application vulnerabilities involving multiple execution flows | Jan 30, 2013 | Issued |
Array
(
[id] => 9320892
[patent_doc_number] => 20140053230
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-20
[patent_title] => 'MULTI-SECURITY-CPU SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/705991
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3074
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705991
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/705991 | Multi-security-CPU system | Dec 4, 2012 | Issued |
Array
(
[id] => 10152805
[patent_doc_number] => 09185114
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Methods and systems for secure storage segmentation based on security context in a virtual environment'
[patent_app_type] => utility
[patent_app_number] => 13/706256
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7740
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13706256
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/706256 | Methods and systems for secure storage segmentation based on security context in a virtual environment | Dec 4, 2012 | Issued |
Array
(
[id] => 9520926
[patent_doc_number] => 20140157418
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES'
[patent_app_type] => utility
[patent_app_number] => 13/705705
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2666
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705705
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/705705 | Detecting security vulnerabilities on computing devices | Dec 4, 2012 | Issued |
Array
(
[id] => 9520927
[patent_doc_number] => 20140157419
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS'
[patent_app_type] => utility
[patent_app_number] => 13/705799
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5124
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705799
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/705799 | DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS | Dec 4, 2012 | Abandoned |
Array
(
[id] => 10571262
[patent_doc_number] => 09294452
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-22
[patent_title] => 'Authentication translation'
[patent_app_type] => utility
[patent_app_number] => 13/706254
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5688
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13706254
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/706254 | Authentication translation | Dec 4, 2012 | Issued |
Array
(
[id] => 9556084
[patent_doc_number] => 08763159
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-06-24
[patent_title] => 'System and method for application license management in virtual environments'
[patent_app_type] => utility
[patent_app_number] => 13/705221
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6077
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705221
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/705221 | System and method for application license management in virtual environments | Dec 4, 2012 | Issued |
Array
(
[id] => 9520932
[patent_doc_number] => 20140157424
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'MOBILE DEVICE PRIVACY APPLICATION'
[patent_app_type] => utility
[patent_app_number] => 13/705782
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6210
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705782
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/705782 | Mobile device privacy application | Dec 4, 2012 | Issued |
Array
(
[id] => 11905569
[patent_doc_number] => 09775024
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-26
[patent_title] => 'Method for changing MNO in embedded SIM on basis of dynamic key generation and embedded SIM and recording medium therefor'
[patent_app_type] => utility
[patent_app_number] => 14/130261
[patent_app_country] => US
[patent_app_date] => 2012-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10994
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14130261
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/130261 | Method for changing MNO in embedded SIM on basis of dynamic key generation and embedded SIM and recording medium therefor | Jul 5, 2012 | Issued |
Array
(
[id] => 8732222
[patent_doc_number] => 20130077791
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-28
[patent_title] => 'REVOCATION LIST GENERATION DEVICE, REVOCATION LIST GENERATION METHOD, AND CONTENT MANAGEMENT SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/702137
[patent_app_country] => US
[patent_app_date] => 2012-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 38
[patent_no_of_words] => 27047
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13702137
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/702137 | Revocation list generation device, revocation list generation method, and content management system | Apr 16, 2012 | Issued |
Array
(
[id] => 11777050
[patent_doc_number] => 09386039
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-05
[patent_title] => 'Security policy enforcement system and security policy enforcement method'
[patent_app_type] => utility
[patent_app_number] => 13/822875
[patent_app_country] => US
[patent_app_date] => 2011-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 21
[patent_no_of_words] => 10319
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13822875
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/822875 | Security policy enforcement system and security policy enforcement method | Nov 23, 2011 | Issued |
Array
(
[id] => 8894026
[patent_doc_number] => 20130167210
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-27
[patent_title] => 'METHOD OF ASSIGNING A USER KEY IN A CONVERGENCE NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/819670
[patent_app_country] => US
[patent_app_date] => 2011-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9812
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13819670
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/819670 | Method of assigning a user key in a convergence network | Sep 27, 2011 | Issued |