
Arlen Olsen
Examiner (ID: 2185)
| Most Active Art Unit | 3501 |
| Art Unit(s) | 3501 |
| Total Applications | 400 |
| Issued Applications | 365 |
| Pending Applications | 0 |
| Abandoned Applications | 35 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8722933
[patent_doc_number] => 20130074150
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-21
[patent_title] => 'Presenting Visual Challenges for Verifying Human Interaction'
[patent_app_type] => utility
[patent_app_number] => 13/237273
[patent_app_country] => US
[patent_app_date] => 2011-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6191
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13237273
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/237273 | Presenting Visual Challenges for Verifying Human Interaction | Sep 19, 2011 | Abandoned |
Array
(
[id] => 8455043
[patent_doc_number] => 20120265989
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-18
[patent_title] => 'SECURE LOGIN METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/224438
[patent_app_country] => US
[patent_app_date] => 2011-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3226
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13224438
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/224438 | SECURE LOGIN METHOD | Sep 1, 2011 | Abandoned |
Array
(
[id] => 9326464
[patent_doc_number] => 08661501
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-25
[patent_title] => 'Integrated guidance and validation policy based zoning mechanism'
[patent_app_type] => utility
[patent_app_number] => 13/217710
[patent_app_country] => US
[patent_app_date] => 2011-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 7588
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 247
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13217710
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/217710 | Integrated guidance and validation policy based zoning mechanism | Aug 24, 2011 | Issued |
Array
(
[id] => 8762155
[patent_doc_number] => 08422685
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-16
[patent_title] => 'Method for elliptic curve scalar multiplication'
[patent_app_type] => utility
[patent_app_number] => 13/215078
[patent_app_country] => US
[patent_app_date] => 2011-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8301
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13215078
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/215078 | Method for elliptic curve scalar multiplication | Aug 21, 2011 | Issued |
Array
(
[id] => 8143923
[patent_doc_number] => 20120096511
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-19
[patent_title] => 'ENHANCED BROWSER SECURITY'
[patent_app_type] => utility
[patent_app_number] => 13/205821
[patent_app_country] => US
[patent_app_date] => 2011-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4063
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0096/20120096511.pdf
[firstpage_image] =>[orig_patent_app_number] => 13205821
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/205821 | ENHANCED BROWSER SECURITY | Aug 8, 2011 | Abandoned |
Array
(
[id] => 7504160
[patent_doc_number] => 20110265161
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-27
[patent_title] => 'MODIFYING A USER ACCOUNT DURING AN AUTHENTICATION PROCESS'
[patent_app_type] => utility
[patent_app_number] => 13/176687
[patent_app_country] => US
[patent_app_date] => 2011-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9268
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0265/20110265161.pdf
[firstpage_image] =>[orig_patent_app_number] => 13176687
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/176687 | Modifying a user account during an authentication process | Jul 4, 2011 | Issued |
Array
(
[id] => 8619597
[patent_doc_number] => 20130024909
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-24
[patent_title] => 'ACCESS CONTROL PROGRAM, SYSTEM, AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/638539
[patent_app_country] => US
[patent_app_date] => 2011-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13630
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13638539
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/638539 | Access control program, system, and method | Mar 10, 2011 | Issued |
Array
(
[id] => 9392391
[patent_doc_number] => 08689013
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-01
[patent_title] => 'Dual-interface key management'
[patent_app_type] => utility
[patent_app_number] => 12/908332
[patent_app_country] => US
[patent_app_date] => 2010-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 18156
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12908332
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/908332 | Dual-interface key management | Oct 19, 2010 | Issued |
Array
(
[id] => 8810564
[patent_doc_number] => 08448231
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-21
[patent_title] => 'Walled garden system for providing access to one or more websites that incorporate content from other websites and method thereof'
[patent_app_type] => utility
[patent_app_number] => 12/898254
[patent_app_country] => US
[patent_app_date] => 2010-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5018
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 314
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12898254
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/898254 | Walled garden system for providing access to one or more websites that incorporate content from other websites and method thereof | Oct 4, 2010 | Issued |
Array
(
[id] => 6204328
[patent_doc_number] => 20110067114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-17
[patent_title] => 'METHODS AND APPARATUS FOR A CONFIGURABLE PROTECTION ARCHITECTURE FOR ON-CHIP SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 12/874123
[patent_app_country] => US
[patent_app_date] => 2010-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 12686
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0067/20110067114.pdf
[firstpage_image] =>[orig_patent_app_number] => 12874123
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/874123 | Methods and apparatus for a configurable protection architecture for on-chip systems | Aug 31, 2010 | Issued |
Array
(
[id] => 6204328
[patent_doc_number] => 20110067114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-17
[patent_title] => 'METHODS AND APPARATUS FOR A CONFIGURABLE PROTECTION ARCHITECTURE FOR ON-CHIP SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 12/874123
[patent_app_country] => US
[patent_app_date] => 2010-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 12686
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0067/20110067114.pdf
[firstpage_image] =>[orig_patent_app_number] => 12874123
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/874123 | Methods and apparatus for a configurable protection architecture for on-chip systems | Aug 31, 2010 | Issued |
Array
(
[id] => 8158721
[patent_doc_number] => 08171534
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-01
[patent_title] => 'Two-way authentication using a combined code'
[patent_app_type] => utility
[patent_app_number] => 12/871802
[patent_app_country] => US
[patent_app_date] => 2010-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5220
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/171/08171534.pdf
[firstpage_image] =>[orig_patent_app_number] => 12871802
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/871802 | Two-way authentication using a combined code | Aug 29, 2010 | Issued |
Array
(
[id] => 7793279
[patent_doc_number] => 20120054835
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-01
[patent_title] => 'COMMUNICATION CONTROLLER AND NETWORK SYSTEM UTILIZING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 13/147326
[patent_app_country] => US
[patent_app_date] => 2010-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 21918
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0054/20120054835.pdf
[firstpage_image] =>[orig_patent_app_number] => 13147326
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/147326 | Communication controller and network system utilizing the same | Feb 2, 2010 | Issued |
Array
(
[id] => 9023783
[patent_doc_number] => 08533782
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-10
[patent_title] => 'Access control'
[patent_app_type] => utility
[patent_app_number] => 13/142677
[patent_app_country] => US
[patent_app_date] => 2009-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7868
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13142677
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/142677 | Access control | Dec 17, 2009 | Issued |
Array
(
[id] => 7562973
[patent_doc_number] => 20110276807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-10
[patent_title] => 'REMOTE UPDATE METHOD FOR FIRMWARE'
[patent_app_type] => utility
[patent_app_number] => 13/142572
[patent_app_country] => US
[patent_app_date] => 2009-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1910
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0276/20110276807.pdf
[firstpage_image] =>[orig_patent_app_number] => 13142572
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/142572 | REMOTE UPDATE METHOD FOR FIRMWARE | Dec 10, 2009 | Abandoned |
Array
(
[id] => 8546640
[patent_doc_number] => 08321943
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-11-27
[patent_title] => 'Programmatic communication in the event of host malware infection'
[patent_app_type] => utility
[patent_app_number] => 12/512906
[patent_app_country] => US
[patent_app_date] => 2009-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5074
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12512906
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/512906 | Programmatic communication in the event of host malware infection | Jul 29, 2009 | Issued |
Array
(
[id] => 6616570
[patent_doc_number] => 20100293374
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-11-18
[patent_title] => 'Secure Portable Memory Storage Device'
[patent_app_type] => utility
[patent_app_number] => 12/512987
[patent_app_country] => US
[patent_app_date] => 2009-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5511
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0293/20100293374.pdf
[firstpage_image] =>[orig_patent_app_number] => 12512987
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/512987 | Secure Portable Memory Storage Device | Jul 29, 2009 | Abandoned |
Array
(
[id] => 8946163
[patent_doc_number] => 08499350
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-30
[patent_title] => 'Detecting malware through package behavior'
[patent_app_type] => utility
[patent_app_number] => 12/511885
[patent_app_country] => US
[patent_app_date] => 2009-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4753
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12511885
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/511885 | Detecting malware through package behavior | Jul 28, 2009 | Issued |
Array
(
[id] => 6479245
[patent_doc_number] => 20100191974
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-29
[patent_title] => 'SOFTWARE APPLICATION VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 12/360943
[patent_app_country] => US
[patent_app_date] => 2009-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2995
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0191/20100191974.pdf
[firstpage_image] =>[orig_patent_app_number] => 12360943
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/360943 | Software application verification | Jan 27, 2009 | Issued |
Array
(
[id] => 6479329
[patent_doc_number] => 20100191983
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-29
[patent_title] => 'SYSTEM AND METHOD FOR SECURE LOGGING OF DOCUMENT PROCESSING DEVICE MESSAGES'
[patent_app_type] => utility
[patent_app_number] => 12/360483
[patent_app_country] => US
[patent_app_date] => 2009-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7687
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0191/20100191983.pdf
[firstpage_image] =>[orig_patent_app_number] => 12360483
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/360483 | SYSTEM AND METHOD FOR SECURE LOGGING OF DOCUMENT PROCESSING DEVICE MESSAGES | Jan 26, 2009 | Abandoned |