
Andrew Mark Roersma
Examiner (ID: 16805)
| Most Active Art Unit | 3637 |
| Art Unit(s) | 3637 |
| Total Applications | 1056 |
| Issued Applications | 656 |
| Pending Applications | 64 |
| Abandoned Applications | 367 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14107847
[patent_doc_number] => 20190095599
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => CUSTOMIZING A USER BEHAVIOR ANALYTICS DEPLOYMENT
[patent_app_type] => utility
[patent_app_number] => 15/715079
[patent_app_country] => US
[patent_app_date] => 2017-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 43154
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15715079
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/715079 | Customizing a user behavior analytics deployment | Sep 24, 2017 | Issued |
Array
(
[id] => 16449394
[patent_doc_number] => 10841329
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-17
[patent_title] => Cognitive security for workflows
[patent_app_type] => utility
[patent_app_number] => 15/684383
[patent_app_country] => US
[patent_app_date] => 2017-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7893
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15684383
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/684383 | Cognitive security for workflows | Aug 22, 2017 | Issued |
Array
(
[id] => 17861888
[patent_doc_number] => 11443046
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-13
[patent_title] => Entry point finder
[patent_app_type] => utility
[patent_app_number] => 15/676044
[patent_app_country] => US
[patent_app_date] => 2017-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 23
[patent_no_of_words] => 21847
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 306
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15676044
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/676044 | Entry point finder | Aug 13, 2017 | Issued |
Array
(
[id] => 13722249
[patent_doc_number] => 20170372079
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-28
[patent_title] => SELECTIVE DATA ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 15/662328
[patent_app_country] => US
[patent_app_date] => 2017-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4749
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15662328
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/662328 | SELECTIVE DATA ENCRYPTION | Jul 27, 2017 | Abandoned |
Array
(
[id] => 17167174
[patent_doc_number] => 11153289
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-19
[patent_title] => Secure communication acceleration using a System-on-Chip (SoC) architecture
[patent_app_type] => utility
[patent_app_number] => 15/663616
[patent_app_country] => US
[patent_app_date] => 2017-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4273
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15663616
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/663616 | Secure communication acceleration using a System-on-Chip (SoC) architecture | Jul 27, 2017 | Issued |
Array
(
[id] => 17240865
[patent_doc_number] => 11184765
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-23
[patent_title] => Method for authenticating a user and corresponding user device, server and system
[patent_app_type] => utility
[patent_app_number] => 15/656861
[patent_app_country] => US
[patent_app_date] => 2017-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 8407
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 437
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15656861
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/656861 | Method for authenticating a user and corresponding user device, server and system | Jul 20, 2017 | Issued |
Array
(
[id] => 17101178
[patent_doc_number] => 20210288969
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-16
[patent_title] => METHOD FOR SUPPLYING A SECURE CONNECTION PROXY
[patent_app_type] => utility
[patent_app_number] => 16/318059
[patent_app_country] => US
[patent_app_date] => 2017-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2572
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16318059
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/318059 | Method for supplying a secure connection proxy | Jul 19, 2017 | Issued |
Array
(
[id] => 16820983
[patent_doc_number] => 11005836
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Seamless wireless device onboarding
[patent_app_type] => utility
[patent_app_number] => 15/623122
[patent_app_country] => US
[patent_app_date] => 2017-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13967
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15623122
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/623122 | Seamless wireless device onboarding | Jun 13, 2017 | Issued |
Array
(
[id] => 16416828
[patent_doc_number] => 10824724
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-03
[patent_title] => Detecting runtime tampering of UEFI images in an information handling system
[patent_app_type] => utility
[patent_app_number] => 15/612968
[patent_app_country] => US
[patent_app_date] => 2017-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 6839
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15612968
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/612968 | Detecting runtime tampering of UEFI images in an information handling system | Jun 1, 2017 | Issued |
Array
(
[id] => 16219561
[patent_doc_number] => 10735393
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => Data communication method, user equipment, and server
[patent_app_type] => utility
[patent_app_number] => 15/603717
[patent_app_country] => US
[patent_app_date] => 2017-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 8216
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15603717
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/603717 | Data communication method, user equipment, and server | May 23, 2017 | Issued |
Array
(
[id] => 15953425
[patent_doc_number] => 10664622
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-26
[patent_title] => Method for managing a real-time clock in a portable tamper-resistant device
[patent_app_type] => utility
[patent_app_number] => 16/068421
[patent_app_country] => US
[patent_app_date] => 2017-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3951
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16068421
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/068421 | Method for managing a real-time clock in a portable tamper-resistant device | Mar 20, 2017 | Issued |
Array
(
[id] => 13417993
[patent_doc_number] => 20180260539
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-13
[patent_title] => DEVICE SPECIFIC IDENTITY LINKED TO USER ACCOUNT
[patent_app_type] => utility
[patent_app_number] => 15/453359
[patent_app_country] => US
[patent_app_date] => 2017-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9790
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15453359
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/453359 | DEVICE SPECIFIC IDENTITY LINKED TO USER ACCOUNT | Mar 7, 2017 | Abandoned |
Array
(
[id] => 11958483
[patent_doc_number] => 20170262636
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-14
[patent_title] => 'INFORMATION PROCESSING APPARATUS, METHOD OF DISTINGUISHING MOUNTING OF ENCRYPTION UNIT IN INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 15/444574
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4487
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15444574
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/444574 | Information processing apparatus, method of distinguishing mounting of encryption unit in information processing apparatus, and storage medium | Feb 27, 2017 | Issued |
Array
(
[id] => 13380437
[patent_doc_number] => 20180241760
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-23
[patent_title] => NETWORK DATA OBFUSCATION
[patent_app_type] => utility
[patent_app_number] => 15/438176
[patent_app_country] => US
[patent_app_date] => 2017-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14457
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -46
[patent_words_short_claim] => 483
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15438176
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/438176 | Network data obfuscation | Feb 20, 2017 | Issued |
Array
(
[id] => 12209078
[patent_doc_number] => 20180054304
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-22
[patent_title] => 'COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/433318
[patent_app_country] => US
[patent_app_date] => 2017-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9953
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15433318
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/433318 | Communication device, communication method, and communication system | Feb 14, 2017 | Issued |
Array
(
[id] => 13361981
[patent_doc_number] => 20180232530
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-16
[patent_title] => Methods and Systems for a Frictionless Login to a Service
[patent_app_type] => utility
[patent_app_number] => 15/430267
[patent_app_country] => US
[patent_app_date] => 2017-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7477
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15430267
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/430267 | Methods and Systems for a Frictionless Login to a Service | Feb 9, 2017 | Abandoned |
Array
(
[id] => 15582899
[patent_doc_number] => 10581855
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-03
[patent_title] => Secured device manufacturing self-test
[patent_app_type] => utility
[patent_app_number] => 15/427228
[patent_app_country] => US
[patent_app_date] => 2017-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 13859
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15427228
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/427228 | Secured device manufacturing self-test | Feb 7, 2017 | Issued |
Array
(
[id] => 13322471
[patent_doc_number] => 20180212773
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-26
[patent_title] => CLOSE PROXIMITY INNER CIRCLE DISCOVERY
[patent_app_type] => utility
[patent_app_number] => 15/415714
[patent_app_country] => US
[patent_app_date] => 2017-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9573
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 55
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15415714
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/415714 | Close proximity inner circle discovery | Jan 24, 2017 | Issued |
Array
(
[id] => 12920914
[patent_doc_number] => 20180198814
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-12
[patent_title] => IDENTIFYING SECURITY RISKS IN CODE USING SECURITY METRIC COMPARISON
[patent_app_type] => utility
[patent_app_number] => 15/401118
[patent_app_country] => US
[patent_app_date] => 2017-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7604
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15401118
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/401118 | Identifying security risks in code using security metric comparison | Jan 8, 2017 | Issued |
Array
(
[id] => 12875872
[patent_doc_number] => 20180183799
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-28
[patent_title] => METHOD AND SYSTEM FOR DEFENDING AGAINST MALICIOUS WEBSITE
[patent_app_type] => utility
[patent_app_number] => 15/391866
[patent_app_country] => US
[patent_app_date] => 2016-12-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1766
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15391866
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/391866 | METHOD AND SYSTEM FOR DEFENDING AGAINST MALICIOUS WEBSITE | Dec 27, 2016 | Abandoned |