
Andrew J. Steinle
Examiner (ID: 2250, Phone: (571)272-9923 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2497 |
| Total Applications | 795 |
| Issued Applications | 709 |
| Pending Applications | 58 |
| Abandoned Applications | 65 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10093914
[patent_doc_number] => 09130753
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-08
[patent_title] => 'Authentication using security device with electronic interface'
[patent_app_type] => utility
[patent_app_number] => 13/803567
[patent_app_country] => US
[patent_app_date] => 2013-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6607
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13803567
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/803567 | Authentication using security device with electronic interface | Mar 13, 2013 | Issued |
Array
(
[id] => 10119407
[patent_doc_number] => 09154304
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-10-06
[patent_title] => 'Using a token code to control access to data and applications in a mobile platform'
[patent_app_type] => utility
[patent_app_number] => 13/804663
[patent_app_country] => US
[patent_app_date] => 2013-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 9439
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13804663
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/804663 | Using a token code to control access to data and applications in a mobile platform | Mar 13, 2013 | Issued |
Array
(
[id] => 9747203
[patent_doc_number] => 20140282923
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'DEVICE SECURITY UTILIZING CONTINUALLY CHANGING QR CODES'
[patent_app_type] => utility
[patent_app_number] => 13/802854
[patent_app_country] => US
[patent_app_date] => 2013-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9136
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13802854
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/802854 | DEVICE SECURITY UTILIZING CONTINUALLY CHANGING QR CODES | Mar 13, 2013 | Abandoned |
Array
(
[id] => 10016936
[patent_doc_number] => 09059962
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-16
[patent_title] => 'Secure access to applications behind firewall'
[patent_app_type] => utility
[patent_app_number] => 13/802573
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 49
[patent_no_of_words] => 16238
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13802573
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/802573 | Secure access to applications behind firewall | Mar 12, 2013 | Issued |
Array
(
[id] => 9208045
[patent_doc_number] => 20140007223
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-02
[patent_title] => 'Biometric Capture for Unauthorized User Identification'
[patent_app_type] => utility
[patent_app_number] => 13/802558
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10355
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13802558
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/802558 | Biometric Capture for Unauthorized User Identification | Mar 12, 2013 | Abandoned |
Array
(
[id] => 9006517
[patent_doc_number] => 20130227642
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-29
[patent_title] => 'APPARATUS AND METHOD FOR DETECTING ILLEGAL USER'
[patent_app_type] => utility
[patent_app_number] => 13/780282
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3245
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780282
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780282 | APPARATUS AND METHOD FOR DETECTING ILLEGAL USER | Feb 27, 2013 | Abandoned |
Array
(
[id] => 9006154
[patent_doc_number] => 20130227279
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-29
[patent_title] => 'METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/780191
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9893
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780191
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780191 | Method of operating a computing device, computing device and computer program | Feb 27, 2013 | Issued |
Array
(
[id] => 9015207
[patent_doc_number] => 20130230171
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-05
[patent_title] => 'SYSTEMS, METHODS AND APPARATUSES FOR THE SECURE TRANSMISSION AND RESTRICTED USE OF MEDIA CONTENT'
[patent_app_type] => utility
[patent_app_number] => 13/780288
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12073
[patent_no_of_claims] => 44
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780288
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780288 | Systems, methods and apparatuses for the secure transmission and restricted use of media content | Feb 27, 2013 | Issued |
Array
(
[id] => 9006161
[patent_doc_number] => 20130227287
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-29
[patent_title] => 'METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/780245
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9310
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780245
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780245 | Method of operating a computing device, computing device and computer program | Feb 27, 2013 | Issued |
Array
(
[id] => 9006155
[patent_doc_number] => 20130227280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-29
[patent_title] => 'METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/780283
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9108
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780283
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780283 | Method of operating a computing device, computing device and computer program | Feb 27, 2013 | Issued |
Array
(
[id] => 9493455
[patent_doc_number] => 20140143861
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-22
[patent_title] => 'COMPUTER WITH SAFEGUARD FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 13/779755
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 705
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779755
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/779755 | COMPUTER WITH SAFEGUARD FUNCTION | Feb 27, 2013 | Abandoned |
Array
(
[id] => 10519881
[patent_doc_number] => 09246941
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-26
[patent_title] => 'Systems and methods for predicting the impact of security-policy changes on users'
[patent_app_type] => utility
[patent_app_number] => 13/779550
[patent_app_country] => US
[patent_app_date] => 2013-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9855
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 310
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779550
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/779550 | Systems and methods for predicting the impact of security-policy changes on users | Feb 26, 2013 | Issued |
Array
(
[id] => 9017373
[patent_doc_number] => 20130232337
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-05
[patent_title] => 'USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT'
[patent_app_type] => utility
[patent_app_number] => 13/779657
[patent_app_country] => US
[patent_app_date] => 2013-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4855
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779657
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/779657 | USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT | Feb 26, 2013 | Abandoned |
Array
(
[id] => 9700804
[patent_doc_number] => 20140250489
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-04
[patent_title] => 'Techniques for Policy Aware Service Composition'
[patent_app_type] => utility
[patent_app_number] => 13/769469
[patent_app_country] => US
[patent_app_date] => 2013-02-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7961
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13769469
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/769469 | Techniques for Policy Aware Service Composition | Feb 17, 2013 | Abandoned |
Array
(
[id] => 9520928
[patent_doc_number] => 20140157420
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS'
[patent_app_type] => utility
[patent_app_number] => 13/755151
[patent_app_country] => US
[patent_app_date] => 2013-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5155
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13755151
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/755151 | Discovery of application vulnerabilities involving multiple execution flows | Jan 30, 2013 | Issued |
Array
(
[id] => 9520932
[patent_doc_number] => 20140157424
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'MOBILE DEVICE PRIVACY APPLICATION'
[patent_app_type] => utility
[patent_app_number] => 13/705782
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6210
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705782
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/705782 | Mobile device privacy application | Dec 4, 2012 | Issued |
Array
(
[id] => 10571262
[patent_doc_number] => 09294452
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-22
[patent_title] => 'Authentication translation'
[patent_app_type] => utility
[patent_app_number] => 13/706254
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5688
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13706254
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/706254 | Authentication translation | Dec 4, 2012 | Issued |
Array
(
[id] => 9556084
[patent_doc_number] => 08763159
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-06-24
[patent_title] => 'System and method for application license management in virtual environments'
[patent_app_type] => utility
[patent_app_number] => 13/705221
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6077
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705221
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/705221 | System and method for application license management in virtual environments | Dec 4, 2012 | Issued |
Array
(
[id] => 9520927
[patent_doc_number] => 20140157419
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS'
[patent_app_type] => utility
[patent_app_number] => 13/705799
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5124
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705799
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/705799 | DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS | Dec 4, 2012 | Abandoned |
Array
(
[id] => 10152805
[patent_doc_number] => 09185114
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Methods and systems for secure storage segmentation based on security context in a virtual environment'
[patent_app_type] => utility
[patent_app_number] => 13/706256
[patent_app_country] => US
[patent_app_date] => 2012-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7740
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13706256
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/706256 | Methods and systems for secure storage segmentation based on security context in a virtual environment | Dec 4, 2012 | Issued |