Search

Andrew J. Steinle

Examiner (ID: 2250, Phone: (571)272-9923 , Office: P/2497 )

Most Active Art Unit
2497
Art Unit(s)
2497
Total Applications
795
Issued Applications
709
Pending Applications
58
Abandoned Applications
65

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11440116 [patent_doc_number] => 20170041137 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-09 [patent_title] => 'CRYPTOGRAPHIC KEY LOADER EMBEDDED IN REMOVABLE DATA CARTRIDGE' [patent_app_type] => utility [patent_app_number] => 14/817485 [patent_app_country] => US [patent_app_date] => 2015-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7612 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817485 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/817485
Cryptographic key loader embedded in removable data cartridge Aug 3, 2015 Issued
Array ( [id] => 12475755 [patent_doc_number] => 09990503 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-06-05 [patent_title] => Cryptographic key server embedded in data transfer system [patent_app_type] => utility [patent_app_number] => 14/817490 [patent_app_country] => US [patent_app_date] => 2015-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7196 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817490 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/817490
Cryptographic key server embedded in data transfer system Aug 3, 2015 Issued
Array ( [id] => 12537522 [patent_doc_number] => 10009374 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-06-26 [patent_title] => Detecting URL scheme hijacking [patent_app_type] => utility [patent_app_number] => 14/817936 [patent_app_country] => US [patent_app_date] => 2015-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6973 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 172 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817936 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/817936
Detecting URL scheme hijacking Aug 3, 2015 Issued
Array ( [id] => 11440119 [patent_doc_number] => 20170041140 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-09 [patent_title] => 'CONFIGURING CRYPTOGRAPHIC SYSTEMS' [patent_app_type] => utility [patent_app_number] => 14/817484 [patent_app_country] => US [patent_app_date] => 2015-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7220 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817484 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/817484
Configuring cryptographic systems Aug 3, 2015 Issued
Array ( [id] => 11440322 [patent_doc_number] => 20170041343 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-09 [patent_title] => 'NETWORK ACCESS WITH DYNAMIC AUTHORIZATION' [patent_app_type] => utility [patent_app_number] => 14/817401 [patent_app_country] => US [patent_app_date] => 2015-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5066 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817401 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/817401
Network access with dynamic authorization Aug 3, 2015 Issued
Array ( [id] => 13304975 [patent_doc_number] => 20180204024 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-19 [patent_title] => FIREWALL TO DETERMINE ACCESS TO A PORTION OF MEMORY [patent_app_type] => utility [patent_app_number] => 15/746494 [patent_app_country] => US [patent_app_date] => 2015-07-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6404 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -11 [patent_words_short_claim] => 60 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15746494 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/746494
Firewall to determine access to a portion of memory Jul 28, 2015 Issued
Array ( [id] => 11072451 [patent_doc_number] => 20160269415 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-09-15 [patent_title] => 'TRANSACTION AUTHORIZATION USING A VOCALIZED CHALLENGE' [patent_app_type] => utility [patent_app_number] => 14/800993 [patent_app_country] => US [patent_app_date] => 2015-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5950 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14800993 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/800993
TRANSACTION AUTHORIZATION USING A VOCALIZED CHALLENGE Jul 15, 2015 Abandoned
Array ( [id] => 11366312 [patent_doc_number] => 20170004294 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-05 [patent_title] => 'USING SPEECH TO UNLOCK AN ELECTRONIC DEVICE HAVING A PATTERN-BASED UNLOCKING MECHANISM' [patent_app_type] => utility [patent_app_number] => 14/800801 [patent_app_country] => US [patent_app_date] => 2015-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6028 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14800801 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/800801
USING SPEECH TO UNLOCK AN ELECTRONIC DEVICE HAVING A PATTERN-BASED UNLOCKING MECHANISM Jul 15, 2015 Abandoned
Array ( [id] => 12256213 [patent_doc_number] => 09928359 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-03-27 [patent_title] => 'System and methods for providing security to an endpoint device' [patent_app_type] => utility [patent_app_number] => 14/800579 [patent_app_country] => US [patent_app_date] => 2015-07-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 13987 [patent_no_of_claims] => 46 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 304 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14800579 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/800579
System and methods for providing security to an endpoint device Jul 14, 2015 Issued
Array ( [id] => 14524129 [patent_doc_number] => 10339328 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-07-02 [patent_title] => Securing stored computer files from modification [patent_app_type] => utility [patent_app_number] => 14/799524 [patent_app_country] => US [patent_app_date] => 2015-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 15 [patent_no_of_words] => 16344 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 202 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14799524 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/799524
Securing stored computer files from modification Jul 13, 2015 Issued
Array ( [id] => 11861175 [patent_doc_number] => 09740858 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-08-22 [patent_title] => 'System and method for identifying forged emails' [patent_app_type] => utility [patent_app_number] => 14/798852 [patent_app_country] => US [patent_app_date] => 2015-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 16 [patent_no_of_words] => 6083 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 205 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14798852 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/798852
System and method for identifying forged emails Jul 13, 2015 Issued
Array ( [id] => 11398838 [patent_doc_number] => 20170019377 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-19 [patent_title] => 'Secure Network Storage' [patent_app_type] => utility [patent_app_number] => 14/799569 [patent_app_country] => US [patent_app_date] => 2015-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5128 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14799569 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/799569
Secure Network Storage Jul 13, 2015 Abandoned
Array ( [id] => 11368043 [patent_doc_number] => 20170006024 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-05 [patent_title] => 'HEARING DEVICE WITH COMMUNICATION LOGGING AND RELATED METHOD' [patent_app_type] => utility [patent_app_number] => 14/799437 [patent_app_country] => US [patent_app_date] => 2015-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 16638 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14799437 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/799437
Hearing device with communication logging and related method Jul 13, 2015 Issued
Array ( [id] => 11398883 [patent_doc_number] => 20170019421 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-19 [patent_title] => 'PENETRATION TEST ATTACK TREE GENERATOR' [patent_app_type] => utility [patent_app_number] => 14/799176 [patent_app_country] => US [patent_app_date] => 2015-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7473 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14799176 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/799176
Penetration test attack tree generator Jul 13, 2015 Issued
Array ( [id] => 11747424 [patent_doc_number] => 20170201497 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-13 [patent_title] => 'METHOD AND DEVICE FOR ENCRYPTING AND DECRYPTING MULTIMEDIA CONTENT' [patent_app_type] => utility [patent_app_number] => 15/324089 [patent_app_country] => US [patent_app_date] => 2015-07-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 6488 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15324089 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/324089
Method and device for encrypting and decrypting multimedia content Jul 12, 2015 Issued
Array ( [id] => 10660566 [patent_doc_number] => 20160006710 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-01-07 [patent_title] => 'DEVICE FOR SECURE PEER-TO-PEER COMMUNICATION FOR VOICE AND DATA' [patent_app_type] => utility [patent_app_number] => 14/789726 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8832 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789726 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/789726
DEVICE FOR SECURE PEER-TO-PEER COMMUNICATION FOR VOICE AND DATA Jun 30, 2015 Abandoned
Array ( [id] => 12103149 [patent_doc_number] => 09860258 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-01-02 [patent_title] => 'Host-based, network enabled, integrated remote interrogation system' [patent_app_type] => utility [patent_app_number] => 14/788835 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4289 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788835 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/788835
Host-based, network enabled, integrated remote interrogation system Jun 30, 2015 Issued
Array ( [id] => 10660585 [patent_doc_number] => 20160006729 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-01-07 [patent_title] => 'METHODS AND APPARATUS FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL' [patent_app_type] => utility [patent_app_number] => 14/789905 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8758 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789905 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/789905
Methods and apparatus for establishing a secure communication channel Jun 30, 2015 Issued
Array ( [id] => 10726684 [patent_doc_number] => 20160072833 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-10 [patent_title] => 'APPARATUS AND METHOD FOR SEARCHING FOR SIMILAR MALICIOUS CODE BASED ON MALICIOUS CODE FEATURE INFORMATION' [patent_app_type] => utility [patent_app_number] => 14/788831 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5723 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788831 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/788831
Apparatus and method for searching for similar malicious code based on malicious code feature information Jun 30, 2015 Issued
Array ( [id] => 11368008 [patent_doc_number] => 20170005990 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-05 [patent_title] => 'Systems, Methods and Computer Readable Medium To Implement Secured Computational Infrastructure for Cloud and Data Center Environments' [patent_app_type] => utility [patent_app_number] => 14/789916 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 6578 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789916 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/789916
Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments Jun 30, 2015 Issued
Menu