
Andrew J. Steinle
Examiner (ID: 2250, Phone: (571)272-9923 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2497 |
| Total Applications | 795 |
| Issued Applications | 709 |
| Pending Applications | 58 |
| Abandoned Applications | 65 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11440116
[patent_doc_number] => 20170041137
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'CRYPTOGRAPHIC KEY LOADER EMBEDDED IN REMOVABLE DATA CARTRIDGE'
[patent_app_type] => utility
[patent_app_number] => 14/817485
[patent_app_country] => US
[patent_app_date] => 2015-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7612
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817485
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/817485 | Cryptographic key loader embedded in removable data cartridge | Aug 3, 2015 | Issued |
Array
(
[id] => 12475755
[patent_doc_number] => 09990503
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-05
[patent_title] => Cryptographic key server embedded in data transfer system
[patent_app_type] => utility
[patent_app_number] => 14/817490
[patent_app_country] => US
[patent_app_date] => 2015-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7196
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817490
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/817490 | Cryptographic key server embedded in data transfer system | Aug 3, 2015 | Issued |
Array
(
[id] => 12537522
[patent_doc_number] => 10009374
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-06-26
[patent_title] => Detecting URL scheme hijacking
[patent_app_type] => utility
[patent_app_number] => 14/817936
[patent_app_country] => US
[patent_app_date] => 2015-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6973
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817936
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/817936 | Detecting URL scheme hijacking | Aug 3, 2015 | Issued |
Array
(
[id] => 11440119
[patent_doc_number] => 20170041140
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'CONFIGURING CRYPTOGRAPHIC SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/817484
[patent_app_country] => US
[patent_app_date] => 2015-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7220
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817484
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/817484 | Configuring cryptographic systems | Aug 3, 2015 | Issued |
Array
(
[id] => 11440322
[patent_doc_number] => 20170041343
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'NETWORK ACCESS WITH DYNAMIC AUTHORIZATION'
[patent_app_type] => utility
[patent_app_number] => 14/817401
[patent_app_country] => US
[patent_app_date] => 2015-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5066
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817401
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/817401 | Network access with dynamic authorization | Aug 3, 2015 | Issued |
Array
(
[id] => 13304975
[patent_doc_number] => 20180204024
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-19
[patent_title] => FIREWALL TO DETERMINE ACCESS TO A PORTION OF MEMORY
[patent_app_type] => utility
[patent_app_number] => 15/746494
[patent_app_country] => US
[patent_app_date] => 2015-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6404
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15746494
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/746494 | Firewall to determine access to a portion of memory | Jul 28, 2015 | Issued |
Array
(
[id] => 11072451
[patent_doc_number] => 20160269415
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'TRANSACTION AUTHORIZATION USING A VOCALIZED CHALLENGE'
[patent_app_type] => utility
[patent_app_number] => 14/800993
[patent_app_country] => US
[patent_app_date] => 2015-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5950
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14800993
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/800993 | TRANSACTION AUTHORIZATION USING A VOCALIZED CHALLENGE | Jul 15, 2015 | Abandoned |
Array
(
[id] => 11366312
[patent_doc_number] => 20170004294
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'USING SPEECH TO UNLOCK AN ELECTRONIC DEVICE HAVING A PATTERN-BASED UNLOCKING MECHANISM'
[patent_app_type] => utility
[patent_app_number] => 14/800801
[patent_app_country] => US
[patent_app_date] => 2015-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6028
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14800801
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/800801 | USING SPEECH TO UNLOCK AN ELECTRONIC DEVICE HAVING A PATTERN-BASED UNLOCKING MECHANISM | Jul 15, 2015 | Abandoned |
Array
(
[id] => 12256213
[patent_doc_number] => 09928359
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-03-27
[patent_title] => 'System and methods for providing security to an endpoint device'
[patent_app_type] => utility
[patent_app_number] => 14/800579
[patent_app_country] => US
[patent_app_date] => 2015-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 13987
[patent_no_of_claims] => 46
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 304
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14800579
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/800579 | System and methods for providing security to an endpoint device | Jul 14, 2015 | Issued |
Array
(
[id] => 14524129
[patent_doc_number] => 10339328
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-07-02
[patent_title] => Securing stored computer files from modification
[patent_app_type] => utility
[patent_app_number] => 14/799524
[patent_app_country] => US
[patent_app_date] => 2015-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 15
[patent_no_of_words] => 16344
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14799524
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/799524 | Securing stored computer files from modification | Jul 13, 2015 | Issued |
Array
(
[id] => 11861175
[patent_doc_number] => 09740858
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-08-22
[patent_title] => 'System and method for identifying forged emails'
[patent_app_type] => utility
[patent_app_number] => 14/798852
[patent_app_country] => US
[patent_app_date] => 2015-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 6083
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14798852
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/798852 | System and method for identifying forged emails | Jul 13, 2015 | Issued |
Array
(
[id] => 11398838
[patent_doc_number] => 20170019377
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'Secure Network Storage'
[patent_app_type] => utility
[patent_app_number] => 14/799569
[patent_app_country] => US
[patent_app_date] => 2015-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5128
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14799569
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/799569 | Secure Network Storage | Jul 13, 2015 | Abandoned |
Array
(
[id] => 11368043
[patent_doc_number] => 20170006024
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'HEARING DEVICE WITH COMMUNICATION LOGGING AND RELATED METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/799437
[patent_app_country] => US
[patent_app_date] => 2015-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 16638
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14799437
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/799437 | Hearing device with communication logging and related method | Jul 13, 2015 | Issued |
Array
(
[id] => 11398883
[patent_doc_number] => 20170019421
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'PENETRATION TEST ATTACK TREE GENERATOR'
[patent_app_type] => utility
[patent_app_number] => 14/799176
[patent_app_country] => US
[patent_app_date] => 2015-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7473
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14799176
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/799176 | Penetration test attack tree generator | Jul 13, 2015 | Issued |
Array
(
[id] => 11747424
[patent_doc_number] => 20170201497
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-13
[patent_title] => 'METHOD AND DEVICE FOR ENCRYPTING AND DECRYPTING MULTIMEDIA CONTENT'
[patent_app_type] => utility
[patent_app_number] => 15/324089
[patent_app_country] => US
[patent_app_date] => 2015-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6488
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15324089
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/324089 | Method and device for encrypting and decrypting multimedia content | Jul 12, 2015 | Issued |
Array
(
[id] => 10660566
[patent_doc_number] => 20160006710
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-07
[patent_title] => 'DEVICE FOR SECURE PEER-TO-PEER COMMUNICATION FOR VOICE AND DATA'
[patent_app_type] => utility
[patent_app_number] => 14/789726
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8832
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789726
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/789726 | DEVICE FOR SECURE PEER-TO-PEER COMMUNICATION FOR VOICE AND DATA | Jun 30, 2015 | Abandoned |
Array
(
[id] => 12103149
[patent_doc_number] => 09860258
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-02
[patent_title] => 'Host-based, network enabled, integrated remote interrogation system'
[patent_app_type] => utility
[patent_app_number] => 14/788835
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4289
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788835
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/788835 | Host-based, network enabled, integrated remote interrogation system | Jun 30, 2015 | Issued |
Array
(
[id] => 10660585
[patent_doc_number] => 20160006729
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-07
[patent_title] => 'METHODS AND APPARATUS FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL'
[patent_app_type] => utility
[patent_app_number] => 14/789905
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8758
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789905
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/789905 | Methods and apparatus for establishing a secure communication channel | Jun 30, 2015 | Issued |
Array
(
[id] => 10726684
[patent_doc_number] => 20160072833
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'APPARATUS AND METHOD FOR SEARCHING FOR SIMILAR MALICIOUS CODE BASED ON MALICIOUS CODE FEATURE INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/788831
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5723
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788831
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/788831 | Apparatus and method for searching for similar malicious code based on malicious code feature information | Jun 30, 2015 | Issued |
Array
(
[id] => 11368008
[patent_doc_number] => 20170005990
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'Systems, Methods and Computer Readable Medium To Implement Secured Computational Infrastructure for Cloud and Data Center Environments'
[patent_app_type] => utility
[patent_app_number] => 14/789916
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 6578
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789916
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/789916 | Systems, methods and computer readable medium to implement secured computational infrastructure for cloud and data center environments | Jun 30, 2015 | Issued |