
Benjamin A. Kaplan
Examiner (ID: 9890, Phone: (571)270-3170 , Office: P/2434 )
| Most Active Art Unit | 2434 |
| Art Unit(s) | 2434, 2439, 2139 |
| Total Applications | 734 |
| Issued Applications | 624 |
| Pending Applications | 46 |
| Abandoned Applications | 82 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10157851
[patent_doc_number] => 09189633
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-17
[patent_title] => 'Download management method and device based on android browser'
[patent_app_type] => utility
[patent_app_number] => 13/977031
[patent_app_country] => US
[patent_app_date] => 2013-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5137
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13977031
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/977031 | Download management method and device based on android browser | Jan 20, 2013 | Issued |
Array
(
[id] => 9568091
[patent_doc_number] => 20140185804
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'LEVEL-TWO DECRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX'
[patent_app_type] => utility
[patent_app_number] => 13/731751
[patent_app_country] => US
[patent_app_date] => 2012-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 56
[patent_figures_cnt] => 56
[patent_no_of_words] => 17314
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13731751
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/731751 | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box | Dec 30, 2012 | Issued |
Array
(
[id] => 14560035
[patent_doc_number] => 10348494
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box
[patent_app_type] => utility
[patent_app_number] => 13/724941
[patent_app_country] => US
[patent_app_date] => 2012-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 65
[patent_figures_cnt] => 65
[patent_no_of_words] => 15034
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13724941
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/724941 | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box | Dec 20, 2012 | Issued |
Array
(
[id] => 10164597
[patent_doc_number] => 09195822
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Familiar dynamic human challenge response test content'
[patent_app_type] => utility
[patent_app_number] => 13/721647
[patent_app_country] => US
[patent_app_date] => 2012-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 17
[patent_no_of_words] => 19549
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13721647
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/721647 | Familiar dynamic human challenge response test content | Dec 19, 2012 | Issued |
Array
(
[id] => 9224973
[patent_doc_number] => 20140019748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-16
[patent_title] => 'LEVEL-TWO DECRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX'
[patent_app_type] => utility
[patent_app_number] => 13/720360
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 66
[patent_figures_cnt] => 66
[patent_no_of_words] => 16881
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720360
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720360 | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box | Dec 18, 2012 | Issued |
Array
(
[id] => 9549057
[patent_doc_number] => 20140173705
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'DISTRIBUTED AUTHENTICATION USING PERSISTENT STATELESS CREDENTIALS'
[patent_app_type] => utility
[patent_app_number] => 13/720422
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6593
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720422
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720422 | Distributed authentication using persistent stateless credentials | Dec 18, 2012 | Issued |
Array
(
[id] => 11926692
[patent_doc_number] => 09794288
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-17
[patent_title] => 'Managing policy'
[patent_app_type] => utility
[patent_app_number] => 13/720449
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3708
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720449
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720449 | Managing policy | Dec 18, 2012 | Issued |
Array
(
[id] => 10111637
[patent_doc_number] => 09147054
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-29
[patent_title] => 'Dialogue-driven user security levels'
[patent_app_type] => utility
[patent_app_number] => 13/720713
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10360
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 56
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720713
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720713 | Dialogue-driven user security levels | Dec 18, 2012 | Issued |
Array
(
[id] => 9871839
[patent_doc_number] => 08959631
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-17
[patent_title] => 'Traffic segmentation in prevention of DDoS attacks'
[patent_app_type] => utility
[patent_app_number] => 13/720110
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5454
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720110
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720110 | Traffic segmentation in prevention of DDoS attacks | Dec 18, 2012 | Issued |
Array
(
[id] => 10131307
[patent_doc_number] => 09165144
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-10-20
[patent_title] => 'Detecting a person who does not satisfy a threshold age within a predetermined area'
[patent_app_type] => utility
[patent_app_number] => 13/720929
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11695
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720929
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720929 | Detecting a person who does not satisfy a threshold age within a predetermined area | Dec 18, 2012 | Issued |
Array
(
[id] => 10011895
[patent_doc_number] => 09055435
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-09
[patent_title] => 'Method and apparatus for security mechanism for proximity-based access requests'
[patent_app_type] => utility
[patent_app_number] => 13/720202
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 15005
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720202
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720202 | Method and apparatus for security mechanism for proximity-based access requests | Dec 18, 2012 | Issued |
Array
(
[id] => 9083480
[patent_doc_number] => 20130269010
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-10
[patent_title] => 'PATTERN ENTROPY PASSWORD STRENGTH ESTIMATOR'
[patent_app_type] => utility
[patent_app_number] => 13/720738
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7691
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720738
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720738 | Pattern entropy password strength estimator | Dec 18, 2012 | Issued |
Array
(
[id] => 9886347
[patent_doc_number] => 08973133
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-03
[patent_title] => 'Systems and methods for detecting abnormal behavior of networked devices'
[patent_app_type] => utility
[patent_app_number] => 13/720843
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8153
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720843
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720843 | Systems and methods for detecting abnormal behavior of networked devices | Dec 18, 2012 | Issued |
Array
(
[id] => 10100688
[patent_doc_number] => 09137013
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-15
[patent_title] => 'Method and system for a hardware-efficient universal hash function'
[patent_app_type] => utility
[patent_app_number] => 13/720711
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5553
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720711
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720711 | Method and system for a hardware-efficient universal hash function | Dec 18, 2012 | Issued |
Array
(
[id] => 9986808
[patent_doc_number] => 09032545
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-05-12
[patent_title] => 'Securing visual information on images for document capture'
[patent_app_type] => utility
[patent_app_number] => 13/720654
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3424
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720654
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720654 | Securing visual information on images for document capture | Dec 18, 2012 | Issued |
Array
(
[id] => 9549078
[patent_doc_number] => 20140173726
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'METHODS AND SYSTEMS FOR PREVENTING UNAUTHORIZED ACQUISITION OF USER INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 13/720869
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4761
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720869
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720869 | Methods and systems for preventing unauthorized acquisition of user information | Dec 18, 2012 | Issued |
Array
(
[id] => 8906774
[patent_doc_number] => 20130174277
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-04
[patent_title] => 'METHOD AND APPARATUS FOR CONTROLLING ACCESS TO RESOURCES'
[patent_app_type] => utility
[patent_app_number] => 13/720439
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15578
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13720439
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/720439 | Method and apparatus for controlling access to resources | Dec 18, 2012 | Issued |
Array
(
[id] => 9992928
[patent_doc_number] => 09038149
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-19
[patent_title] => 'Cloud based password management'
[patent_app_type] => utility
[patent_app_number] => 13/718931
[patent_app_country] => US
[patent_app_date] => 2012-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 15
[patent_no_of_words] => 4945
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13718931
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/718931 | Cloud based password management | Dec 17, 2012 | Issued |
Array
(
[id] => 9549106
[patent_doc_number] => 20140173754
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'Identity Attribute Exchange and Validation Broker'
[patent_app_type] => utility
[patent_app_number] => 13/718602
[patent_app_country] => US
[patent_app_date] => 2012-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6474
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13718602
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/718602 | Identity attribute exchange and validation broker | Dec 17, 2012 | Issued |
Array
(
[id] => 9821261
[patent_doc_number] => 08931064
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-06
[patent_title] => 'Identity attribute exchange and validation ecosystem'
[patent_app_type] => utility
[patent_app_number] => 13/718522
[patent_app_country] => US
[patent_app_date] => 2012-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6462
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13718522
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/718522 | Identity attribute exchange and validation ecosystem | Dec 17, 2012 | Issued |