
Benjamin E. Lanier
Examiner (ID: 11317, Phone: (571)272-3805 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2437, 2132, 2432 |
| Total Applications | 1337 |
| Issued Applications | 871 |
| Pending Applications | 110 |
| Abandoned Applications | 371 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10994553
[patent_doc_number] => 20160191499
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'Shared Secret Vault for Applications with Single Sign On'
[patent_app_type] => utility
[patent_app_number] => 14/983961
[patent_app_country] => US
[patent_app_date] => 2015-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 22186
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14983961
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/983961 | Shared secret vault for applications with single sign on | Dec 29, 2015 | Issued |
Array
(
[id] => 14829723
[patent_doc_number] => 10411886
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-09-10
[patent_title] => Authenticating secure channel establishment messages based on shared-secret
[patent_app_type] => utility
[patent_app_number] => 14/983242
[patent_app_country] => US
[patent_app_date] => 2015-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 18
[patent_no_of_words] => 6634
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14983242
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/983242 | Authenticating secure channel establishment messages based on shared-secret | Dec 28, 2015 | Issued |
Array
(
[id] => 15825285
[patent_doc_number] => 10637851
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-28
[patent_title] => Introducing an identity into a secure element
[patent_app_type] => utility
[patent_app_number] => 15/536247
[patent_app_country] => US
[patent_app_date] => 2015-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 2685
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 415
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15536247
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/536247 | Introducing an identity into a secure element | Dec 14, 2015 | Issued |
Array
(
[id] => 11525602
[patent_doc_number] => 09609025
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-28
[patent_title] => 'Protection of sensitive data from unauthorized access'
[patent_app_type] => utility
[patent_app_number] => 14/950002
[patent_app_country] => US
[patent_app_date] => 2015-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9840
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 477
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14950002
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/950002 | Protection of sensitive data from unauthorized access | Nov 23, 2015 | Issued |
Array
(
[id] => 16501688
[patent_doc_number] => 10867077
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-15
[patent_title] => Method of accessing functions of an embedded device
[patent_app_type] => utility
[patent_app_number] => 15/526110
[patent_app_country] => US
[patent_app_date] => 2015-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3580
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15526110
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/526110 | Method of accessing functions of an embedded device | Nov 12, 2015 | Issued |
Array
(
[id] => 15517619
[patent_doc_number] => 10565400
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Implementation of an integrity-protected secure storage
[patent_app_type] => utility
[patent_app_number] => 14/924026
[patent_app_country] => US
[patent_app_date] => 2015-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 6612
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 247
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14924026
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/924026 | Implementation of an integrity-protected secure storage | Oct 26, 2015 | Issued |
Array
(
[id] => 11438356
[patent_doc_number] => 20170039377
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'SECURE COMPARISON OF INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/920728
[patent_app_country] => US
[patent_app_date] => 2015-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 26216
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14920728
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/920728 | Secure comparison of information | Oct 21, 2015 | Issued |
Array
(
[id] => 10668000
[patent_doc_number] => 20160014145
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'Website Security'
[patent_app_type] => utility
[patent_app_number] => 14/862281
[patent_app_country] => US
[patent_app_date] => 2015-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 5371
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14862281
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/862281 | Website security | Sep 22, 2015 | Issued |
Array
(
[id] => 11496317
[patent_doc_number] => 20170070502
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-09
[patent_title] => 'METHOD AND SYSTEM FOR DEVICE DEPENDENT ENCRYPTION AND/OR DECRYPTION OF MUSIC CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/849002
[patent_app_country] => US
[patent_app_date] => 2015-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10637
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14849002
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/849002 | Method and system for device dependent encryption and/or decryption of music content | Sep 8, 2015 | Issued |
Array
(
[id] => 11947214
[patent_doc_number] => 20170251365
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-31
[patent_title] => 'CYBER SECURITY'
[patent_app_type] => utility
[patent_app_number] => 15/509803
[patent_app_country] => US
[patent_app_date] => 2015-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6278
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15509803
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/509803 | CYBER SECURITY | Sep 7, 2015 | Abandoned |
Array
(
[id] => 10480388
[patent_doc_number] => 20150365405
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'Mobile Security Fob'
[patent_app_type] => utility
[patent_app_number] => 14/835810
[patent_app_country] => US
[patent_app_date] => 2015-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5054
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835810
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/835810 | Mobile security fob | Aug 25, 2015 | Issued |
Array
(
[id] => 11786897
[patent_doc_number] => 09396334
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-19
[patent_title] => 'System and method for detecting harmful files executable on a virtual stack machine'
[patent_app_type] => utility
[patent_app_number] => 14/833620
[patent_app_country] => US
[patent_app_date] => 2015-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6714
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14833620
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/833620 | System and method for detecting harmful files executable on a virtual stack machine | Aug 23, 2015 | Issued |
Array
(
[id] => 10674938
[patent_doc_number] => 20160021084
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-21
[patent_title] => 'SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM'
[patent_app_type] => utility
[patent_app_number] => 14/826107
[patent_app_country] => US
[patent_app_date] => 2015-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 16339
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14826107
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/826107 | Systems and methods of sharing information through a tag-based consortium | Aug 12, 2015 | Issued |
Array
(
[id] => 12496221
[patent_doc_number] => 09996692
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-12
[patent_title] => Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in real time
[patent_app_type] => utility
[patent_app_number] => 14/819974
[patent_app_country] => US
[patent_app_date] => 2015-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4582
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14819974
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/819974 | Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in real time | Aug 5, 2015 | Issued |
Array
(
[id] => 10578019
[patent_doc_number] => 09300678
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-29
[patent_title] => 'Systems and methods for authenticating photographic image data'
[patent_app_type] => utility
[patent_app_number] => 14/816712
[patent_app_country] => US
[patent_app_date] => 2015-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7056
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14816712
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/816712 | Systems and methods for authenticating photographic image data | Aug 2, 2015 | Issued |
Array
(
[id] => 15731541
[patent_doc_number] => 10614201
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => Method and device for identity authentication
[patent_app_type] => utility
[patent_app_number] => 15/327965
[patent_app_country] => US
[patent_app_date] => 2015-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 6612
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15327965
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/327965 | Method and device for identity authentication | Jul 16, 2015 | Issued |
Array
(
[id] => 10441581
[patent_doc_number] => 20150326593
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'DETECTING NETWORK TRAFFIC CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/800758
[patent_app_country] => US
[patent_app_date] => 2015-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11736
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14800758
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/800758 | Detecting network traffic content | Jul 15, 2015 | Issued |
Array
(
[id] => 11654444
[patent_doc_number] => 20170150349
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-25
[patent_title] => 'KEY SHARING METHOD AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/319537
[patent_app_country] => US
[patent_app_date] => 2015-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 16809
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15319537
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/319537 | Key sharing method and device | Jun 16, 2015 | Issued |
Array
(
[id] => 10393527
[patent_doc_number] => 20150278533
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'METHOD FOR REDIRECTING OF KERNEL DATA PATH FOR CONTROLLING RECORDING OF MEDIA'
[patent_app_type] => utility
[patent_app_number] => 14/735474
[patent_app_country] => US
[patent_app_date] => 2015-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 22668
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14735474
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/735474 | METHOD FOR REDIRECTING OF KERNEL DATA PATH FOR CONTROLLING RECORDING OF MEDIA | Jun 9, 2015 | Abandoned |
Array
(
[id] => 12317568
[patent_doc_number] => 09942247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-10
[patent_title] => Traffic shape obfuscation when using an encrypted network connection
[patent_app_type] => utility
[patent_app_number] => 14/724011
[patent_app_country] => US
[patent_app_date] => 2015-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11459
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14724011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/724011 | Traffic shape obfuscation when using an encrypted network connection | May 27, 2015 | Issued |