
Benjamin A. Kaplan
Examiner (ID: 9890, Phone: (571)270-3170 , Office: P/2434 )
| Most Active Art Unit | 2434 |
| Art Unit(s) | 2434, 2439, 2139 |
| Total Applications | 734 |
| Issued Applications | 624 |
| Pending Applications | 46 |
| Abandoned Applications | 82 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12933697
[patent_doc_number] => 09830442
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-28
[patent_title] => Method for generating at least one derived identity
[patent_app_type] => utility
[patent_app_number] => 14/888015
[patent_app_country] => US
[patent_app_date] => 2014-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 2847
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14888015
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/888015 | Method for generating at least one derived identity | Apr 22, 2014 | Issued |
Array
(
[id] => 11359023
[patent_doc_number] => 09535676
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-03
[patent_title] => 'Remote feature activation'
[patent_app_type] => utility
[patent_app_number] => 14/245895
[patent_app_country] => US
[patent_app_date] => 2014-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11237
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14245895
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/245895 | Remote feature activation | Apr 3, 2014 | Issued |
Array
(
[id] => 10401816
[patent_doc_number] => 20150286825
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'METHODS FOR CENTRALIZED PRIVACY-PRESERVING COLLABORATIVE THREAT MITIGATION'
[patent_app_type] => utility
[patent_app_number] => 14/245778
[patent_app_country] => US
[patent_app_date] => 2014-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4331
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14245778
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/245778 | Methods for centralized privacy-preserving collaborative threat mitigation | Apr 3, 2014 | Issued |
Array
(
[id] => 12114480
[patent_doc_number] => 09870474
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-16
[patent_title] => 'Detection of secure variable alteration in a computing device equipped with unified extensible firmware interface (UEFI)-compliant firmware'
[patent_app_type] => utility
[patent_app_number] => 14/245628
[patent_app_country] => US
[patent_app_date] => 2014-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3961
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14245628
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/245628 | Detection of secure variable alteration in a computing device equipped with unified extensible firmware interface (UEFI)-compliant firmware | Apr 3, 2014 | Issued |
Array
(
[id] => 11467848
[patent_doc_number] => 09584498
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-02-28
[patent_title] => 'Feature activation using near field communication'
[patent_app_type] => utility
[patent_app_number] => 14/245900
[patent_app_country] => US
[patent_app_date] => 2014-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11267
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14245900
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/245900 | Feature activation using near field communication | Apr 3, 2014 | Issued |
Array
(
[id] => 11454402
[patent_doc_number] => 09578062
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-21
[patent_title] => 'Portable proxy for security management and privacy protection and method of use'
[patent_app_type] => utility
[patent_app_number] => 14/244784
[patent_app_country] => US
[patent_app_date] => 2014-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5554
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14244784
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/244784 | Portable proxy for security management and privacy protection and method of use | Apr 2, 2014 | Issued |
Array
(
[id] => 10403666
[patent_doc_number] => 20150288675
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'SYSTEM, METHOD FOR COMPUTER SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/243132
[patent_app_country] => US
[patent_app_date] => 2014-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5683
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14243132
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/243132 | SYSTEM, METHOD FOR COMPUTER SECURITY | Apr 1, 2014 | Abandoned |
Array
(
[id] => 11195311
[patent_doc_number] => 09426135
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-23
[patent_title] => 'Increased communication security'
[patent_app_type] => utility
[patent_app_number] => 14/231625
[patent_app_country] => US
[patent_app_date] => 2014-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 17864
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14231625
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/231625 | Increased communication security | Mar 30, 2014 | Issued |
Array
(
[id] => 10616932
[patent_doc_number] => 09336378
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-10
[patent_title] => 'Credential sharing'
[patent_app_type] => utility
[patent_app_number] => 14/231308
[patent_app_country] => US
[patent_app_date] => 2014-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5125
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14231308
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/231308 | Credential sharing | Mar 30, 2014 | Issued |
Array
(
[id] => 11195312
[patent_doc_number] => 09426136
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-23
[patent_title] => 'Increased communication security'
[patent_app_type] => utility
[patent_app_number] => 14/231656
[patent_app_country] => US
[patent_app_date] => 2014-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 17953
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14231656
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/231656 | Increased communication security | Mar 30, 2014 | Issued |
Array
(
[id] => 10396267
[patent_doc_number] => 20150281274
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'AUTO DETECTING LEGITIMATE IP ADDRESSES USING SPOOFGUARD AGENTS'
[patent_app_type] => utility
[patent_app_number] => 14/230473
[patent_app_country] => US
[patent_app_date] => 2014-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 12159
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14230473
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/230473 | Auto detecting legitimate IP addresses using spoofguard agents | Mar 30, 2014 | Issued |
Array
(
[id] => 10393543
[patent_doc_number] => 20150278550
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'PRIVACY LEAKAGE PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 14/230010
[patent_app_country] => US
[patent_app_date] => 2014-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4412
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14230010
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/230010 | Privacy leakage protection | Mar 30, 2014 | Issued |
Array
(
[id] => 9953212
[patent_doc_number] => 09002016
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-07
[patent_title] => 'Rekey scheme on high speed links'
[patent_app_type] => utility
[patent_app_number] => 14/229986
[patent_app_country] => US
[patent_app_date] => 2014-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5202
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14229986
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/229986 | Rekey scheme on high speed links | Mar 29, 2014 | Issued |
Array
(
[id] => 11220861
[patent_doc_number] => 09449200
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'Methods, systems and apparatus to secure devices via physical and/or virtual locking'
[patent_app_type] => utility
[patent_app_number] => 14/229422
[patent_app_country] => US
[patent_app_date] => 2014-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 10293
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14229422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/229422 | Methods, systems and apparatus to secure devices via physical and/or virtual locking | Mar 27, 2014 | Issued |
Array
(
[id] => 10396272
[patent_doc_number] => 20150281280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'NETWORK NODE SECURITY USING SHORT RANGE COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 14/229318
[patent_app_country] => US
[patent_app_date] => 2014-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6577
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14229318
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/229318 | Network node security using short range communication | Mar 27, 2014 | Issued |
Array
(
[id] => 10583024
[patent_doc_number] => 09305148
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-05
[patent_title] => 'Economically secure digital mass media systems'
[patent_app_type] => utility
[patent_app_number] => 14/193968
[patent_app_country] => US
[patent_app_date] => 2014-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 3939
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14193968
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/193968 | Economically secure digital mass media systems | Feb 27, 2014 | Issued |
Array
(
[id] => 9520867
[patent_doc_number] => 20140157358
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'Policy Driven Fine Grain URL Encoding Mechanism for SSL VPN Clientless Access'
[patent_app_type] => utility
[patent_app_number] => 14/172385
[patent_app_country] => US
[patent_app_date] => 2014-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 25601
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14172385
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/172385 | Policy driven fine grain URL encoding mechanism for SSL VPN clientless access | Feb 3, 2014 | Issued |
Array
(
[id] => 9673377
[patent_doc_number] => 20140237240
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-21
[patent_title] => 'METHOD AND SYSTEMS FOR THE AUTHENTICATION OF A USER'
[patent_app_type] => utility
[patent_app_number] => 14/165179
[patent_app_country] => US
[patent_app_date] => 2014-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6163
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14165179
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/165179 | Method and systems for the authentication of a user | Jan 26, 2014 | Issued |
Array
(
[id] => 10564357
[patent_doc_number] => 09288041
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-15
[patent_title] => 'Apparatus and method for performing compression operation in hash algorithm'
[patent_app_type] => utility
[patent_app_number] => 14/155756
[patent_app_country] => US
[patent_app_date] => 2014-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5384
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14155756
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/155756 | Apparatus and method for performing compression operation in hash algorithm | Jan 14, 2014 | Issued |
Array
(
[id] => 9618268
[patent_doc_number] => 20140208125
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-24
[patent_title] => 'ENCRYPTION AND DECRYPTION DEVICE FOR PORTABLE STORAGE DEVICE AND ENCRYPTION AND DECRYPTION METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/154194
[patent_app_country] => US
[patent_app_date] => 2014-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2583
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14154194
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/154194 | Encryption and decryption device for portable storage device and encryption and decryption method thereof | Jan 13, 2014 | Issued |