
Benjamin E. Lanier
Examiner (ID: 16562, Phone: (571)272-3805 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2437, 2432, 2132 |
| Total Applications | 1332 |
| Issued Applications | 867 |
| Pending Applications | 118 |
| Abandoned Applications | 370 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9116527
[patent_doc_number] => 08572720
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-10-29
[patent_title] => 'System, method, and device for communicating and storing and delivering data'
[patent_app_type] => utility
[patent_app_number] => 13/898460
[patent_app_country] => US
[patent_app_date] => 2013-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 19
[patent_no_of_words] => 26064
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 328
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13898460
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/898460 | System, method, and device for communicating and storing and delivering data | May 19, 2013 | Issued |
Array
(
[id] => 11646247
[patent_doc_number] => 09667649
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-30
[patent_title] => 'Detecting man-in-the-middle and denial-of-service attacks'
[patent_app_type] => utility
[patent_app_number] => 13/865782
[patent_app_country] => US
[patent_app_date] => 2013-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9929
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 368
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13865782
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/865782 | Detecting man-in-the-middle and denial-of-service attacks | Apr 17, 2013 | Issued |
Array
(
[id] => 9774750
[patent_doc_number] => 20140298413
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-02
[patent_title] => 'Mapping the Network File System (NFS) protocol to secure web-based applications'
[patent_app_type] => utility
[patent_app_number] => 13/851235
[patent_app_country] => US
[patent_app_date] => 2013-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8431
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13851235
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/851235 | Mapping the network file system (NFS) protocol to secure web-based applications | Mar 26, 2013 | Issued |
Array
(
[id] => 11188550
[patent_doc_number] => 09419974
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-16
[patent_title] => 'Apparatus and method for performing user authentication by proxy in wireless communication system'
[patent_app_type] => utility
[patent_app_number] => 13/851669
[patent_app_country] => US
[patent_app_date] => 2013-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11754
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13851669
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/851669 | Apparatus and method for performing user authentication by proxy in wireless communication system | Mar 26, 2013 | Issued |
Array
(
[id] => 9891876
[patent_doc_number] => 08978152
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-10
[patent_title] => 'Decentralized token table generation'
[patent_app_type] => utility
[patent_app_number] => 13/851865
[patent_app_country] => US
[patent_app_date] => 2013-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6426
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 296
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13851865
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/851865 | Decentralized token table generation | Mar 26, 2013 | Issued |
Array
(
[id] => 9774345
[patent_doc_number] => 20140298008
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-02
[patent_title] => 'Control System Security Appliance'
[patent_app_type] => utility
[patent_app_number] => 13/851597
[patent_app_country] => US
[patent_app_date] => 2013-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4707
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13851597
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/851597 | Control System Security Appliance | Mar 26, 2013 | Abandoned |
Array
(
[id] => 9746891
[patent_doc_number] => 20140282610
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'ENTERPRISE APPLICATION MANAGEMENT WITH ENROLLMENT TOKENS'
[patent_app_type] => utility
[patent_app_number] => 13/831849
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 7689
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13831849
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/831849 | Enterprise application management with enrollment tokens | Mar 14, 2013 | Issued |
Array
(
[id] => 10080842
[patent_doc_number] => 09118705
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-25
[patent_title] => 'Detecting network traffic content'
[patent_app_type] => utility
[patent_app_number] => 13/795245
[patent_app_country] => US
[patent_app_date] => 2013-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11693
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 272
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13795245
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/795245 | Detecting network traffic content | Mar 11, 2013 | Issued |
Array
(
[id] => 8918369
[patent_doc_number] => 20130179994
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-11
[patent_title] => 'Dual Trust Architecture'
[patent_app_type] => utility
[patent_app_number] => 13/779901
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5994
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13779901
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/779901 | Dual trust architecture | Feb 27, 2013 | Issued |
Array
(
[id] => 16685061
[patent_doc_number] => 10944559
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-09
[patent_title] => Transmission of data including conversion of ternary data to binary data
[patent_app_type] => utility
[patent_app_number] => 13/777787
[patent_app_country] => US
[patent_app_date] => 2013-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 18
[patent_no_of_words] => 6978
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13777787
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/777787 | Transmission of data including conversion of ternary data to binary data | Feb 25, 2013 | Issued |
Array
(
[id] => 9673372
[patent_doc_number] => 20140237236
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-21
[patent_title] => 'Mobile Security Fob'
[patent_app_type] => utility
[patent_app_number] => 13/771193
[patent_app_country] => US
[patent_app_date] => 2013-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5055
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13771193
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/771193 | Mobile security fob | Feb 19, 2013 | Issued |
Array
(
[id] => 9044146
[patent_doc_number] => 20130246784
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-19
[patent_title] => 'WIRELESS ACCESS POINT SECURITY FOR MULTI-HOP NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 13/766519
[patent_app_country] => US
[patent_app_date] => 2013-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 9584
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13766519
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/766519 | Wireless access point security for multi-hop networks | Feb 12, 2013 | Issued |
Array
(
[id] => 10948927
[patent_doc_number] => 20140351949
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-27
[patent_title] => 'PRIVACY ISSUES IN M2M'
[patent_app_type] => utility
[patent_app_number] => 14/372885
[patent_app_country] => US
[patent_app_date] => 2013-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2818
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14372885
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/372885 | PRIVACY ISSUES IN M2M | Jan 23, 2013 | Abandoned |
Array
(
[id] => 9953196
[patent_doc_number] => 09002001
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-04-07
[patent_title] => 'Prime field elliptic curve cryptography processor'
[patent_app_type] => utility
[patent_app_number] => 13/747096
[patent_app_country] => US
[patent_app_date] => 2013-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 4999
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13747096
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/747096 | Prime field elliptic curve cryptography processor | Jan 21, 2013 | Issued |
Array
(
[id] => 8820165
[patent_doc_number] => 20130121210
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-16
[patent_title] => 'SECURITY SYSTEM AND METHOD FOR WIRELESS COMMUNICATION WITHIN A VEHICLE'
[patent_app_type] => utility
[patent_app_number] => 13/734343
[patent_app_country] => US
[patent_app_date] => 2013-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7069
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13734343
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/734343 | Security system and method for wireless communication within a vehicle | Jan 3, 2013 | Issued |
Array
(
[id] => 9168646
[patent_doc_number] => 08594331
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-11-26
[patent_title] => 'Dynamic password update for wireless encryption system'
[patent_app_type] => utility
[patent_app_number] => 13/690258
[patent_app_country] => US
[patent_app_date] => 2012-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 11871
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13690258
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/690258 | Dynamic password update for wireless encryption system | Nov 29, 2012 | Issued |
Array
(
[id] => 8868483
[patent_doc_number] => 20130152186
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-13
[patent_title] => 'FILTERING KERNEL-MODE NETWORK COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/690528
[patent_app_country] => US
[patent_app_date] => 2012-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8232
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13690528
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/690528 | Filtering kernel-mode network communications | Nov 29, 2012 | Issued |
Array
(
[id] => 10948564
[patent_doc_number] => 20140351585
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-27
[patent_title] => 'INFORMATION STORAGE DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 14/363135
[patent_app_country] => US
[patent_app_date] => 2012-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 16402
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14363135
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/363135 | Information storage device, information processing system, information processing method, and program | Nov 28, 2012 | Issued |
Array
(
[id] => 9679057
[patent_doc_number] => 08817980
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-26
[patent_title] => 'Semiconductor device and IC card'
[patent_app_type] => utility
[patent_app_number] => 13/686884
[patent_app_country] => US
[patent_app_date] => 2012-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13954
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13686884
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/686884 | Semiconductor device and IC card | Nov 26, 2012 | Issued |
Array
(
[id] => 8722651
[patent_doc_number] => 20130073868
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-21
[patent_title] => 'SELECTIVE ENCRYPTION WITHIN DOCUMENTS'
[patent_app_type] => utility
[patent_app_number] => 13/677454
[patent_app_country] => US
[patent_app_date] => 2012-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6040
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13677454
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/677454 | Selective encryption within documents | Nov 14, 2012 | Issued |