
Andrew J. Steinle
Examiner (ID: 2250, Phone: (571)272-9923 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2497 |
| Total Applications | 795 |
| Issued Applications | 709 |
| Pending Applications | 58 |
| Abandoned Applications | 65 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11702829
[patent_doc_number] => 09692768
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-27
[patent_title] => 'Sharing confidential graph data using multi-level graph summarization with varying data utility and privacy protection'
[patent_app_type] => utility
[patent_app_number] => 14/789933
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 6325
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789933
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/789933 | Sharing confidential graph data using multi-level graph summarization with varying data utility and privacy protection | Jun 30, 2015 | Issued |
Array
(
[id] => 14490155
[patent_doc_number] => 10331868
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-25
[patent_title] => User authentication method and system using variable keypad and biometric identification
[patent_app_type] => utility
[patent_app_number] => 15/322333
[patent_app_country] => US
[patent_app_date] => 2015-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 5802
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15322333
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/322333 | User authentication method and system using variable keypad and biometric identification | Jun 25, 2015 | Issued |
Array
(
[id] => 12256240
[patent_doc_number] => 09928386
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-03-27
[patent_title] => 'Data protection system'
[patent_app_type] => utility
[patent_app_number] => 14/733831
[patent_app_country] => US
[patent_app_date] => 2015-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 13704
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14733831
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/733831 | Data protection system | Jun 7, 2015 | Issued |
Array
(
[id] => 11015220
[patent_doc_number] => 20160212172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'VISUALLY INTUITIVE INTERACTIVE NETWORK MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/733907
[patent_app_country] => US
[patent_app_date] => 2015-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13300
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14733907
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/733907 | Visually intuitive interactive network management | Jun 7, 2015 | Issued |
Array
(
[id] => 13069633
[patent_doc_number] => 10055596
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-08-21
[patent_title] => Data protection system
[patent_app_type] => utility
[patent_app_number] => 14/733823
[patent_app_country] => US
[patent_app_date] => 2015-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 13392
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14733823
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/733823 | Data protection system | Jun 7, 2015 | Issued |
Array
(
[id] => 11910450
[patent_doc_number] => 09779264
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-03
[patent_title] => 'Method, server and computer program for security management in database'
[patent_app_type] => utility
[patent_app_number] => 14/733819
[patent_app_country] => US
[patent_app_date] => 2015-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8300
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14733819
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/733819 | Method, server and computer program for security management in database | Jun 7, 2015 | Issued |
Array
(
[id] => 11329250
[patent_doc_number] => 20160359862
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'SYSTEM AND METHOD FOR USING PER-APPLICATION PROFILES IN A COMPUTING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/733859
[patent_app_country] => US
[patent_app_date] => 2015-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10743
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14733859
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/733859 | System and method for using per-application profiles in a computing device | Jun 7, 2015 | Issued |
Array
(
[id] => 11015218
[patent_doc_number] => 20160212171
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'VISUALLY INTUITIVE INTERACTIVE NETWORK CYBER DEFENSE'
[patent_app_type] => utility
[patent_app_number] => 14/733899
[patent_app_country] => US
[patent_app_date] => 2015-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16736
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14733899
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/733899 | Visually intuitive interactive network cyber defense | Jun 7, 2015 | Issued |
Array
(
[id] => 10637753
[patent_doc_number] => 09355259
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-31
[patent_title] => 'Method and apparatus for accessing sensitive information on-demand'
[patent_app_type] => utility
[patent_app_number] => 14/726166
[patent_app_country] => US
[patent_app_date] => 2015-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 6
[patent_no_of_words] => 3089
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 297
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726166
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/726166 | Method and apparatus for accessing sensitive information on-demand | May 28, 2015 | Issued |
Array
(
[id] => 11926657
[patent_doc_number] => 09794253
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-17
[patent_title] => 'Device security utilizing continually changing QR codes'
[patent_app_type] => utility
[patent_app_number] => 14/712034
[patent_app_country] => US
[patent_app_date] => 2015-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 9266
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14712034
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/712034 | Device security utilizing continually changing QR codes | May 13, 2015 | Issued |
Array
(
[id] => 15517549
[patent_doc_number] => 10565363
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Information processing device, information processing method, and information processing system for canceling device restriction based on similarity between feature-quantity vectors of associated devices
[patent_app_type] => utility
[patent_app_number] => 15/321849
[patent_app_country] => US
[patent_app_date] => 2015-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 22394
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15321849
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/321849 | Information processing device, information processing method, and information processing system for canceling device restriction based on similarity between feature-quantity vectors of associated devices | May 12, 2015 | Issued |
Array
(
[id] => 10351849
[patent_doc_number] => 20150236854
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-20
[patent_title] => 'METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO ENCODE AUXILIARY DATA INTO TEXT DATA AND METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO OBTAIN ENCODED DATA FROM TEXT DATA'
[patent_app_type] => utility
[patent_app_number] => 14/705595
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10238
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705595
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705595 | Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data | May 5, 2015 | Issued |
Array
(
[id] => 13122623
[patent_doc_number] => 10079675
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-18
[patent_title] => Generating cryptographic function parameters from a puzzle
[patent_app_type] => utility
[patent_app_number] => 14/691372
[patent_app_country] => US
[patent_app_date] => 2015-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 15584
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14691372
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/691372 | Generating cryptographic function parameters from a puzzle | Apr 19, 2015 | Issued |
Array
(
[id] => 14674279
[patent_doc_number] => 10375070
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-06
[patent_title] => Generating cryptographic function parameters from compact source code
[patent_app_type] => utility
[patent_app_number] => 14/691337
[patent_app_country] => US
[patent_app_date] => 2015-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 15536
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14691337
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/691337 | Generating cryptographic function parameters from compact source code | Apr 19, 2015 | Issued |
Array
(
[id] => 13227261
[patent_doc_number] => 10127406
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-13
[patent_title] => Digital rights management playback glitch avoidance
[patent_app_type] => utility
[patent_app_number] => 14/666202
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13100
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14666202
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/666202 | Digital rights management playback glitch avoidance | Mar 22, 2015 | Issued |
Array
(
[id] => 10464953
[patent_doc_number] => 20150349968
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'Protecting Hidden Content In Integrated Circuits'
[patent_app_type] => utility
[patent_app_number] => 14/666281
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13046
[patent_no_of_claims] => 85
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14666281
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/666281 | Protecting hidden content in integrated circuits | Mar 22, 2015 | Issued |
Array
(
[id] => 10384387
[patent_doc_number] => 20150269394
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'METHOD FOR ENROLLING DATA IN A BASE TO PROTECT SAID DATA'
[patent_app_type] => utility
[patent_app_number] => 14/665955
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5494
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14665955
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/665955 | Method for enrolling data in a base to protect said data | Mar 22, 2015 | Issued |
Array
(
[id] => 10464954
[patent_doc_number] => 20150349969
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'Protecting Hidden Content In Integrated Circuits'
[patent_app_type] => utility
[patent_app_number] => 14/666295
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8195
[patent_no_of_claims] => 44
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14666295
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/666295 | Protecting hidden content in integrated circuits | Mar 22, 2015 | Issued |
Array
(
[id] => 11088944
[patent_doc_number] => 20160285912
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-29
[patent_title] => 'NON RFC-COMPLIANT PROTOCOL CLASSIFICATION BASED ON REAL USE'
[patent_app_type] => utility
[patent_app_number] => 14/666180
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6977
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14666180
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/666180 | Non RFC-compliant protocol classification based on real use | Mar 22, 2015 | Issued |
Array
(
[id] => 11754472
[patent_doc_number] => 09712503
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-07-18
[patent_title] => 'Computing instance migration'
[patent_app_type] => utility
[patent_app_number] => 14/666225
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11660
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14666225
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/666225 | Computing instance migration | Mar 22, 2015 | Issued |