
Benjamin E. Lanier
Examiner (ID: 16562, Phone: (571)272-3805 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2437, 2432, 2132 |
| Total Applications | 1332 |
| Issued Applications | 867 |
| Pending Applications | 118 |
| Abandoned Applications | 370 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15517619
[patent_doc_number] => 10565400
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Implementation of an integrity-protected secure storage
[patent_app_type] => utility
[patent_app_number] => 14/924026
[patent_app_country] => US
[patent_app_date] => 2015-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 6612
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 247
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14924026
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/924026 | Implementation of an integrity-protected secure storage | Oct 26, 2015 | Issued |
Array
(
[id] => 11438356
[patent_doc_number] => 20170039377
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'SECURE COMPARISON OF INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/920728
[patent_app_country] => US
[patent_app_date] => 2015-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 26216
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14920728
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/920728 | Secure comparison of information | Oct 21, 2015 | Issued |
Array
(
[id] => 10668000
[patent_doc_number] => 20160014145
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'Website Security'
[patent_app_type] => utility
[patent_app_number] => 14/862281
[patent_app_country] => US
[patent_app_date] => 2015-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 5371
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14862281
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/862281 | Website security | Sep 22, 2015 | Issued |
Array
(
[id] => 11496317
[patent_doc_number] => 20170070502
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-09
[patent_title] => 'METHOD AND SYSTEM FOR DEVICE DEPENDENT ENCRYPTION AND/OR DECRYPTION OF MUSIC CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/849002
[patent_app_country] => US
[patent_app_date] => 2015-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10637
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14849002
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/849002 | Method and system for device dependent encryption and/or decryption of music content | Sep 8, 2015 | Issued |
Array
(
[id] => 11947214
[patent_doc_number] => 20170251365
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-31
[patent_title] => 'CYBER SECURITY'
[patent_app_type] => utility
[patent_app_number] => 15/509803
[patent_app_country] => US
[patent_app_date] => 2015-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6278
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15509803
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/509803 | CYBER SECURITY | Sep 7, 2015 | Abandoned |
Array
(
[id] => 10480388
[patent_doc_number] => 20150365405
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'Mobile Security Fob'
[patent_app_type] => utility
[patent_app_number] => 14/835810
[patent_app_country] => US
[patent_app_date] => 2015-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5054
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835810
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/835810 | Mobile security fob | Aug 25, 2015 | Issued |
Array
(
[id] => 11786897
[patent_doc_number] => 09396334
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-19
[patent_title] => 'System and method for detecting harmful files executable on a virtual stack machine'
[patent_app_type] => utility
[patent_app_number] => 14/833620
[patent_app_country] => US
[patent_app_date] => 2015-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6714
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14833620
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/833620 | System and method for detecting harmful files executable on a virtual stack machine | Aug 23, 2015 | Issued |
Array
(
[id] => 10674938
[patent_doc_number] => 20160021084
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-21
[patent_title] => 'SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM'
[patent_app_type] => utility
[patent_app_number] => 14/826107
[patent_app_country] => US
[patent_app_date] => 2015-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 16339
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14826107
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/826107 | Systems and methods of sharing information through a tag-based consortium | Aug 12, 2015 | Issued |
Array
(
[id] => 12496221
[patent_doc_number] => 09996692
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-12
[patent_title] => Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in real time
[patent_app_type] => utility
[patent_app_number] => 14/819974
[patent_app_country] => US
[patent_app_date] => 2015-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4582
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14819974
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/819974 | Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in real time | Aug 5, 2015 | Issued |
Array
(
[id] => 10578019
[patent_doc_number] => 09300678
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-29
[patent_title] => 'Systems and methods for authenticating photographic image data'
[patent_app_type] => utility
[patent_app_number] => 14/816712
[patent_app_country] => US
[patent_app_date] => 2015-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7056
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14816712
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/816712 | Systems and methods for authenticating photographic image data | Aug 2, 2015 | Issued |
Array
(
[id] => 15731541
[patent_doc_number] => 10614201
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => Method and device for identity authentication
[patent_app_type] => utility
[patent_app_number] => 15/327965
[patent_app_country] => US
[patent_app_date] => 2015-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 6612
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15327965
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/327965 | Method and device for identity authentication | Jul 16, 2015 | Issued |
Array
(
[id] => 10441581
[patent_doc_number] => 20150326593
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'DETECTING NETWORK TRAFFIC CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/800758
[patent_app_country] => US
[patent_app_date] => 2015-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11736
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14800758
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/800758 | Detecting network traffic content | Jul 15, 2015 | Issued |
Array
(
[id] => 11654444
[patent_doc_number] => 20170150349
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-25
[patent_title] => 'KEY SHARING METHOD AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/319537
[patent_app_country] => US
[patent_app_date] => 2015-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 16809
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15319537
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/319537 | Key sharing method and device | Jun 16, 2015 | Issued |
Array
(
[id] => 10393527
[patent_doc_number] => 20150278533
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'METHOD FOR REDIRECTING OF KERNEL DATA PATH FOR CONTROLLING RECORDING OF MEDIA'
[patent_app_type] => utility
[patent_app_number] => 14/735474
[patent_app_country] => US
[patent_app_date] => 2015-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 22668
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14735474
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/735474 | METHOD FOR REDIRECTING OF KERNEL DATA PATH FOR CONTROLLING RECORDING OF MEDIA | Jun 9, 2015 | Abandoned |
Array
(
[id] => 12317568
[patent_doc_number] => 09942247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-10
[patent_title] => Traffic shape obfuscation when using an encrypted network connection
[patent_app_type] => utility
[patent_app_number] => 14/724011
[patent_app_country] => US
[patent_app_date] => 2015-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11459
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14724011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/724011 | Traffic shape obfuscation when using an encrypted network connection | May 27, 2015 | Issued |
Array
(
[id] => 10719217
[patent_doc_number] => 20160065364
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'ENHANCED REMOTE KEY MANAGEMENT FOR AN ENTERPRISE IN A CLOUD-BASED ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/670312
[patent_app_country] => US
[patent_app_date] => 2015-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11598
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14670312
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/670312 | ENHANCED REMOTE KEY MANAGEMENT FOR AN ENTERPRISE IN A CLOUD-BASED ENVIRONMENT | Mar 25, 2015 | Abandoned |
Array
(
[id] => 16172168
[patent_doc_number] => 10713742
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-07-14
[patent_title] => Shared verification of credential records
[patent_app_type] => utility
[patent_app_number] => 14/639806
[patent_app_country] => US
[patent_app_date] => 2015-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5935
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 271
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14639806
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/639806 | Shared verification of credential records | Mar 4, 2015 | Issued |
Array
(
[id] => 11523756
[patent_doc_number] => 09607161
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'Optimal re-encryption strategy for joins in encrypted databases'
[patent_app_type] => utility
[patent_app_number] => 14/631593
[patent_app_country] => US
[patent_app_date] => 2015-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7032
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14631593
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/631593 | Optimal re-encryption strategy for joins in encrypted databases | Feb 24, 2015 | Issued |
Array
(
[id] => 10285704
[patent_doc_number] => 20150170702
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'INFORMATION REPRODUCTION DEVICE AND METHOD OF PROVIDING CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/626965
[patent_app_country] => US
[patent_app_date] => 2015-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 20787
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14626965
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/626965 | INFORMATION REPRODUCTION DEVICE AND METHOD OF PROVIDING CONTENT | Feb 19, 2015 | |
Array
(
[id] => 13007915
[patent_doc_number] => 10027638
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-17
[patent_title] => System for user-friendly access control setup using a protected setup
[patent_app_type] => utility
[patent_app_number] => 14/623142
[patent_app_country] => US
[patent_app_date] => 2015-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5332
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14623142
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/623142 | System for user-friendly access control setup using a protected setup | Feb 15, 2015 | Issued |