Search

Andrew J. Steinle

Examiner (ID: 2250, Phone: (571)272-9923 , Office: P/2497 )

Most Active Art Unit
2497
Art Unit(s)
2497
Total Applications
795
Issued Applications
709
Pending Applications
58
Abandoned Applications
65

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10093914 [patent_doc_number] => 09130753 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-09-08 [patent_title] => 'Authentication using security device with electronic interface' [patent_app_type] => utility [patent_app_number] => 13/803567 [patent_app_country] => US [patent_app_date] => 2013-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6607 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 218 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13803567 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/803567
Authentication using security device with electronic interface Mar 13, 2013 Issued
Array ( [id] => 10119407 [patent_doc_number] => 09154304 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-10-06 [patent_title] => 'Using a token code to control access to data and applications in a mobile platform' [patent_app_type] => utility [patent_app_number] => 13/804663 [patent_app_country] => US [patent_app_date] => 2013-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 11 [patent_no_of_words] => 9439 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 202 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13804663 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/804663
Using a token code to control access to data and applications in a mobile platform Mar 13, 2013 Issued
Array ( [id] => 9747203 [patent_doc_number] => 20140282923 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-18 [patent_title] => 'DEVICE SECURITY UTILIZING CONTINUALLY CHANGING QR CODES' [patent_app_type] => utility [patent_app_number] => 13/802854 [patent_app_country] => US [patent_app_date] => 2013-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9136 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13802854 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/802854
DEVICE SECURITY UTILIZING CONTINUALLY CHANGING QR CODES Mar 13, 2013 Abandoned
Array ( [id] => 10016936 [patent_doc_number] => 09059962 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-16 [patent_title] => 'Secure access to applications behind firewall' [patent_app_type] => utility [patent_app_number] => 13/802573 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 33 [patent_figures_cnt] => 49 [patent_no_of_words] => 16238 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 248 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13802573 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/802573
Secure access to applications behind firewall Mar 12, 2013 Issued
Array ( [id] => 9208045 [patent_doc_number] => 20140007223 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-01-02 [patent_title] => 'Biometric Capture for Unauthorized User Identification' [patent_app_type] => utility [patent_app_number] => 13/802558 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10355 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13802558 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/802558
Biometric Capture for Unauthorized User Identification Mar 12, 2013 Abandoned
Array ( [id] => 9006517 [patent_doc_number] => 20130227642 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-29 [patent_title] => 'APPARATUS AND METHOD FOR DETECTING ILLEGAL USER' [patent_app_type] => utility [patent_app_number] => 13/780282 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3245 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780282 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/780282
APPARATUS AND METHOD FOR DETECTING ILLEGAL USER Feb 27, 2013 Abandoned
Array ( [id] => 9006154 [patent_doc_number] => 20130227279 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-29 [patent_title] => 'METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM' [patent_app_type] => utility [patent_app_number] => 13/780191 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9893 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780191 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/780191
Method of operating a computing device, computing device and computer program Feb 27, 2013 Issued
Array ( [id] => 9015207 [patent_doc_number] => 20130230171 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-05 [patent_title] => 'SYSTEMS, METHODS AND APPARATUSES FOR THE SECURE TRANSMISSION AND RESTRICTED USE OF MEDIA CONTENT' [patent_app_type] => utility [patent_app_number] => 13/780288 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 12073 [patent_no_of_claims] => 44 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780288 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/780288
Systems, methods and apparatuses for the secure transmission and restricted use of media content Feb 27, 2013 Issued
Array ( [id] => 9006161 [patent_doc_number] => 20130227287 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-29 [patent_title] => 'METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM' [patent_app_type] => utility [patent_app_number] => 13/780245 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9310 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780245 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/780245
Method of operating a computing device, computing device and computer program Feb 27, 2013 Issued
Array ( [id] => 9006155 [patent_doc_number] => 20130227280 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-29 [patent_title] => 'METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM' [patent_app_type] => utility [patent_app_number] => 13/780283 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9108 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780283 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/780283
Method of operating a computing device, computing device and computer program Feb 27, 2013 Issued
Array ( [id] => 9493455 [patent_doc_number] => 20140143861 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-22 [patent_title] => 'COMPUTER WITH SAFEGUARD FUNCTION' [patent_app_type] => utility [patent_app_number] => 13/779755 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 705 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779755 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/779755
COMPUTER WITH SAFEGUARD FUNCTION Feb 27, 2013 Abandoned
Array ( [id] => 10519881 [patent_doc_number] => 09246941 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-01-26 [patent_title] => 'Systems and methods for predicting the impact of security-policy changes on users' [patent_app_type] => utility [patent_app_number] => 13/779550 [patent_app_country] => US [patent_app_date] => 2013-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9855 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 310 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779550 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/779550
Systems and methods for predicting the impact of security-policy changes on users Feb 26, 2013 Issued
Array ( [id] => 9017373 [patent_doc_number] => 20130232337 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-05 [patent_title] => 'USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT' [patent_app_type] => utility [patent_app_number] => 13/779657 [patent_app_country] => US [patent_app_date] => 2013-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4855 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779657 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/779657
USER TERMINAL AND METHOD FOR PLAYING DIGITAL RIGHTS MANAGEMENT CONTENT Feb 26, 2013 Abandoned
Array ( [id] => 9700804 [patent_doc_number] => 20140250489 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-04 [patent_title] => 'Techniques for Policy Aware Service Composition' [patent_app_type] => utility [patent_app_number] => 13/769469 [patent_app_country] => US [patent_app_date] => 2013-02-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7961 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13769469 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/769469
Techniques for Policy Aware Service Composition Feb 17, 2013 Abandoned
Array ( [id] => 9520928 [patent_doc_number] => 20140157420 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-05 [patent_title] => 'DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS' [patent_app_type] => utility [patent_app_number] => 13/755151 [patent_app_country] => US [patent_app_date] => 2013-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5155 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13755151 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/755151
Discovery of application vulnerabilities involving multiple execution flows Jan 30, 2013 Issued
Array ( [id] => 9520932 [patent_doc_number] => 20140157424 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-05 [patent_title] => 'MOBILE DEVICE PRIVACY APPLICATION' [patent_app_type] => utility [patent_app_number] => 13/705782 [patent_app_country] => US [patent_app_date] => 2012-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6210 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705782 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/705782
Mobile device privacy application Dec 4, 2012 Issued
Array ( [id] => 10571262 [patent_doc_number] => 09294452 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-03-22 [patent_title] => 'Authentication translation' [patent_app_type] => utility [patent_app_number] => 13/706254 [patent_app_country] => US [patent_app_date] => 2012-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5688 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13706254 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/706254
Authentication translation Dec 4, 2012 Issued
Array ( [id] => 9556084 [patent_doc_number] => 08763159 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-06-24 [patent_title] => 'System and method for application license management in virtual environments' [patent_app_type] => utility [patent_app_number] => 13/705221 [patent_app_country] => US [patent_app_date] => 2012-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6077 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 212 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705221 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/705221
System and method for application license management in virtual environments Dec 4, 2012 Issued
Array ( [id] => 9520927 [patent_doc_number] => 20140157419 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-05 [patent_title] => 'DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS' [patent_app_type] => utility [patent_app_number] => 13/705799 [patent_app_country] => US [patent_app_date] => 2012-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5124 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13705799 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/705799
DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS Dec 4, 2012 Abandoned
Array ( [id] => 10152805 [patent_doc_number] => 09185114 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-10 [patent_title] => 'Methods and systems for secure storage segmentation based on security context in a virtual environment' [patent_app_type] => utility [patent_app_number] => 13/706256 [patent_app_country] => US [patent_app_date] => 2012-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7740 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13706256 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/706256
Methods and systems for secure storage segmentation based on security context in a virtual environment Dec 4, 2012 Issued
Menu