
Beemnet W. Dada
Examiner (ID: 150, Phone: (571)272-3847 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435, 2135 |
| Total Applications | 1474 |
| Issued Applications | 1157 |
| Pending Applications | 112 |
| Abandoned Applications | 216 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13631925
[patent_doc_number] => 20180367517
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-20
[patent_title] => MULTI-FACTOR EXECUTION GATEWAY
[patent_app_type] => utility
[patent_app_number] => 15/625102
[patent_app_country] => US
[patent_app_date] => 2017-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8884
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15625102
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/625102 | Multi-factor execution gateway | Jun 15, 2017 | Issued |
Array
(
[id] => 13756947
[patent_doc_number] => 10171436
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-01
[patent_title] => Distributed learning and aging for management of Internet protocol (IP) addresses
[patent_app_type] => utility
[patent_app_number] => 15/620408
[patent_app_country] => US
[patent_app_date] => 2017-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 10381
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15620408
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/620408 | Distributed learning and aging for management of Internet protocol (IP) addresses | Jun 11, 2017 | Issued |
Array
(
[id] => 12781828
[patent_doc_number] => 20180152445
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-31
[patent_title] => METHOD AND APPARATUS FOR AUTHENTICATING USER
[patent_app_type] => utility
[patent_app_number] => 15/618760
[patent_app_country] => US
[patent_app_date] => 2017-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12021
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15618760
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/618760 | Method and apparatus for authenticating user | Jun 8, 2017 | Issued |
Array
(
[id] => 12695878
[patent_doc_number] => 20180123792
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => RSA DECRYPTION PROCESSOR AND METHOD FOR CONTROLLING RSA DECRYPTION PROCESSOR
[patent_app_type] => utility
[patent_app_number] => 15/619151
[patent_app_country] => US
[patent_app_date] => 2017-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5610
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15619151
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/619151 | RSA decryption processor and method for controlling RSA decryption processor | Jun 8, 2017 | Issued |
Array
(
[id] => 14495255
[patent_doc_number] => 10334437
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-25
[patent_title] => Secure pairing of devices and secure keep-alive
[patent_app_type] => utility
[patent_app_number] => 15/618688
[patent_app_country] => US
[patent_app_date] => 2017-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 18569
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15618688
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/618688 | Secure pairing of devices and secure keep-alive | Jun 8, 2017 | Issued |
Array
(
[id] => 12096351
[patent_doc_number] => 20170353444
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'TENANT-AWARE DISTRIBUTED APPLICATION AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/614325
[patent_app_country] => US
[patent_app_date] => 2017-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14939
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15614325
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/614325 | Tenant-aware distributed application authentication | Jun 4, 2017 | Issued |
Array
(
[id] => 13693717
[patent_doc_number] => 20170357813
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => Avoidance of Malicious Content in Nested Files
[patent_app_type] => utility
[patent_app_number] => 15/613878
[patent_app_country] => US
[patent_app_date] => 2017-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10902
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -34
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15613878
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/613878 | Avoidance of malicious content in nested files | Jun 4, 2017 | Issued |
Array
(
[id] => 13600829
[patent_doc_number] => 20180351963
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => AUTOMATED GRANTING OF ACCESS TO NETWORKS AND SERVICES FOR PRE-PAID DEVICES
[patent_app_type] => utility
[patent_app_number] => 15/613243
[patent_app_country] => US
[patent_app_date] => 2017-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7790
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15613243
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/613243 | Automated granting of access to networks and services for pre-paid devices | Jun 3, 2017 | Issued |
Array
(
[id] => 15403523
[patent_doc_number] => 10542433
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-21
[patent_title] => Connection establishment method, device, and system
[patent_app_type] => utility
[patent_app_number] => 15/588496
[patent_app_country] => US
[patent_app_date] => 2017-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 10
[patent_no_of_words] => 12317
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15588496
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/588496 | Connection establishment method, device, and system | May 4, 2017 | Issued |
Array
(
[id] => 11991045
[patent_doc_number] => 20170295200
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-12
[patent_title] => 'Distributed Denial Of Service Attack Protection'
[patent_app_type] => utility
[patent_app_number] => 15/484789
[patent_app_country] => US
[patent_app_date] => 2017-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8437
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15484789
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/484789 | Distributed Denial Of Service Attack Protection | Apr 10, 2017 | Abandoned |
Array
(
[id] => 14830161
[patent_doc_number] => 10412107
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-10
[patent_title] => Detecting domain name system (DNS) tunneling based on DNS logs and network data
[patent_app_type] => utility
[patent_app_number] => 15/466300
[patent_app_country] => US
[patent_app_date] => 2017-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 6321
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15466300
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/466300 | Detecting domain name system (DNS) tunneling based on DNS logs and network data | Mar 21, 2017 | Issued |
Array
(
[id] => 14461605
[patent_doc_number] => 10326782
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-18
[patent_title] => Network monitoring device and computer program product
[patent_app_type] => utility
[patent_app_number] => 15/465816
[patent_app_country] => US
[patent_app_date] => 2017-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 7728
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15465816
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/465816 | Network monitoring device and computer program product | Mar 21, 2017 | Issued |
Array
(
[id] => 11926703
[patent_doc_number] => 09794299
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-17
[patent_title] => 'Passive based security escalation to shut off of application based on rules event triggering'
[patent_app_type] => utility
[patent_app_number] => 15/460951
[patent_app_country] => US
[patent_app_date] => 2017-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8894
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15460951
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/460951 | Passive based security escalation to shut off of application based on rules event triggering | Mar 15, 2017 | Issued |
Array
(
[id] => 14983199
[patent_doc_number] => 10445517
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-15
[patent_title] => Protecting data in insecure cloud storage
[patent_app_type] => utility
[patent_app_number] => 15/460574
[patent_app_country] => US
[patent_app_date] => 2017-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10171
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15460574
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/460574 | Protecting data in insecure cloud storage | Mar 15, 2017 | Issued |
Array
(
[id] => 15252157
[patent_doc_number] => 10511614
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-17
[patent_title] => Subscription based malware detection under management system control
[patent_app_type] => utility
[patent_app_number] => 15/451247
[patent_app_country] => US
[patent_app_date] => 2017-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 19448
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15451247
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/451247 | Subscription based malware detection under management system control | Mar 5, 2017 | Issued |
Array
(
[id] => 13771523
[patent_doc_number] => 10178116
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-08
[patent_title] => Automated computer behavioral analysis system and methods
[patent_app_type] => utility
[patent_app_number] => 15/445883
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 19
[patent_no_of_words] => 9855
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445883
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/445883 | Automated computer behavioral analysis system and methods | Feb 27, 2017 | Issued |
Array
(
[id] => 13391079
[patent_doc_number] => 20180247082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-30
[patent_title] => Secure Public Cloud with Protected Guest-Verified Host Control
[patent_app_type] => utility
[patent_app_number] => 15/444771
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 54383
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -34
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15444771
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/444771 | Secure public cloud with protected guest-verified host control | Feb 27, 2017 | Issued |
Array
(
[id] => 13391079
[patent_doc_number] => 20180247082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-30
[patent_title] => Secure Public Cloud with Protected Guest-Verified Host Control
[patent_app_type] => utility
[patent_app_number] => 15/444771
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 54383
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -34
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15444771
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/444771 | Secure public cloud with protected guest-verified host control | Feb 27, 2017 | Issued |
Array
(
[id] => 11695445
[patent_doc_number] => 20170171162
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-15
[patent_title] => 'PROXY AUTHENTICATION FOR A MULTIPLE CORE NETWORK DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/445485
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3307
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445485
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/445485 | PROXY AUTHENTICATION FOR A MULTIPLE CORE NETWORK DEVICE | Feb 27, 2017 | Abandoned |
Array
(
[id] => 13394713
[patent_doc_number] => 20180248899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-30
[patent_title] => BEHAVIORAL BASELINING OF NETWORK SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 15/443857
[patent_app_country] => US
[patent_app_date] => 2017-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14753
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15443857
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/443857 | Behavioral baselining of network systems | Feb 26, 2017 | Issued |