Search

Cordelia P. K. Zecher

Supervisory Patent Examiner (ID: 11129, Phone: (571)272-7771 , Office: P/2431 )

Most Active Art Unit
2100
Art Unit(s)
2431, DIR, 2432, 2132, 2100
Total Applications
571
Issued Applications
283
Pending Applications
123
Abandoned Applications
226

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6619719 [patent_doc_number] => 20100293610 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-11-18 [patent_title] => 'ENFORCING SECURE INTERNET CONNECTIONS FOR A MOBILE ENDPOINT COMPUTING DEVICE' [patent_app_type] => utility [patent_app_number] => 12/467553 [patent_app_country] => US [patent_app_date] => 2009-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6747 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0293/20100293610.pdf [firstpage_image] =>[orig_patent_app_number] => 12467553 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/467553
Enforcing secure internet connections for a mobile endpoint computing device May 17, 2009 Issued
Array ( [id] => 6311233 [patent_doc_number] => 20100070319 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-03-18 [patent_title] => 'ADAPTIVE CONFIGURATION MANAGEMENT SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/355584 [patent_app_country] => US [patent_app_date] => 2009-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7527 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0070/20100070319.pdf [firstpage_image] =>[orig_patent_app_number] => 12355584 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/355584
Adaptive configuration management system Jan 15, 2009 Issued
Array ( [id] => 5405632 [patent_doc_number] => 20090240947 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-09-24 [patent_title] => 'SYSTEM AND METHOD FOR SECURELY ACCESSING MOBILE DATA' [patent_app_type] => utility [patent_app_number] => 12/350135 [patent_app_country] => US [patent_app_date] => 2009-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9376 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0240/20090240947.pdf [firstpage_image] =>[orig_patent_app_number] => 12350135 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/350135
System and method for securely accessing mobile data Jan 6, 2009 Issued
Array ( [id] => 8471617 [patent_doc_number] => 08300807 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-10-30 [patent_title] => 'Computing isogenies between genus-2 curves for cryptography' [patent_app_type] => utility [patent_app_number] => 12/350222 [patent_app_country] => US [patent_app_date] => 2009-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 12389 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 274 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12350222 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/350222
Computing isogenies between genus-2 curves for cryptography Jan 6, 2009 Issued
Array ( [id] => 5438238 [patent_doc_number] => 20090172825 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-07-02 [patent_title] => 'METHOD AND APPARATUS FOR UPDATING REVOCATION LIST AND REPRODUCING ENCRYPTED CONTENT' [patent_app_type] => utility [patent_app_number] => 12/348033 [patent_app_country] => US [patent_app_date] => 2009-01-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5598 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0172/20090172825.pdf [firstpage_image] =>[orig_patent_app_number] => 12348033 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/348033
Method and apparatus for updating revocation list and reproducing encrypted content Jan 1, 2009 Issued
Array ( [id] => 5481867 [patent_doc_number] => 20090204824 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-08-13 [patent_title] => 'SYSTEM, METHOD AND MEMORY DEVICE PROVIDING DATA SCRAMBLING COMPATIBLE WITH ON-CHIP COPY OPERATION' [patent_app_type] => utility [patent_app_number] => 12/345921 [patent_app_country] => US [patent_app_date] => 2008-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 16257 [patent_no_of_claims] => 66 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0204/20090204824.pdf [firstpage_image] =>[orig_patent_app_number] => 12345921 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/345921
System, method and memory device providing data scrambling compatible with on-chip copy operation Dec 29, 2008 Issued
Array ( [id] => 8752396 [patent_doc_number] => 08418240 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-04-09 [patent_title] => 'Reordering a firewall rule base according to usage statistics' [patent_app_type] => utility [patent_app_number] => 12/344231 [patent_app_country] => US [patent_app_date] => 2008-12-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7006 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 238 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12344231 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/344231
Reordering a firewall rule base according to usage statistics Dec 24, 2008 Issued
Array ( [id] => 6452671 [patent_doc_number] => 20100169971 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-01 [patent_title] => 'METHODS FOR USER PROFILING FOR DETECTING INSIDER THREATS BASED ON INTERNET SEARCH PATTERNS AND FORENSICS OF SEARCH KEYWORDS' [patent_app_type] => utility [patent_app_number] => 12/344229 [patent_app_country] => US [patent_app_date] => 2008-12-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3517 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0169/20100169971.pdf [firstpage_image] =>[orig_patent_app_number] => 12344229 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/344229
Methods for user profiling for detecting insider threats based on internet search patterns and forensics of search keywords Dec 24, 2008 Issued
Array ( [id] => 8473013 [patent_doc_number] => 08302205 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-10-30 [patent_title] => 'Access control decision system, access control enforcing system, and security policy' [patent_app_type] => utility [patent_app_number] => 12/275796 [patent_app_country] => US [patent_app_date] => 2008-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 55 [patent_figures_cnt] => 63 [patent_no_of_words] => 30899 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 230 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12275796 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/275796
Access control decision system, access control enforcing system, and security policy Nov 20, 2008 Issued
Array ( [id] => 5574590 [patent_doc_number] => 20090141951 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-06-04 [patent_title] => 'PROCESSING APPARATUS WITH TOUCH PANEL' [patent_app_type] => utility [patent_app_number] => 12/262482 [patent_app_country] => US [patent_app_date] => 2008-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 14025 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0141/20090141951.pdf [firstpage_image] =>[orig_patent_app_number] => 12262482 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/262482
Processing apparatus with touch panel Oct 30, 2008 Issued
Array ( [id] => 7589661 [patent_doc_number] => 07664959 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-02-16 [patent_title] => 'Method, apparatus and article for off-line certification in mobile applications' [patent_app_type] => utility [patent_app_number] => 12/249591 [patent_app_country] => US [patent_app_date] => 2008-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 4378 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/664/07664959.pdf [firstpage_image] =>[orig_patent_app_number] => 12249591 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/249591
Method, apparatus and article for off-line certification in mobile applications Oct 9, 2008 Issued
Array ( [id] => 5454819 [patent_doc_number] => 20090070856 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-03-12 [patent_title] => 'Image forming apparatus and utilization limiting method' [patent_app_type] => utility [patent_app_number] => 12/230935 [patent_app_country] => US [patent_app_date] => 2008-09-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 9229 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0070/20090070856.pdf [firstpage_image] =>[orig_patent_app_number] => 12230935 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/230935
Image forming apparatus and utilization limiting method Sep 7, 2008 Abandoned
Array ( [id] => 5289587 [patent_doc_number] => 20090022317 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-22 [patent_title] => 'VEHICLE SECURITY SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/169086 [patent_app_country] => US [patent_app_date] => 2008-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4737 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20090022317.pdf [firstpage_image] =>[orig_patent_app_number] => 12169086 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/169086
VEHICLE SECURITY SYSTEM Jul 7, 2008 Abandoned
Array ( [id] => 5267060 [patent_doc_number] => 20090119745 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-05-07 [patent_title] => 'SYSTEM AND METHOD FOR PREVENTING PRIVATE INFORMATION FROM LEAKING OUT THROUGH ACCESS CONTEXT ANALYSIS IN PERSONAL MOBILE TERMINAL' [patent_app_type] => utility [patent_app_number] => 12/168989 [patent_app_country] => US [patent_app_date] => 2008-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3549 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0119/20090119745.pdf [firstpage_image] =>[orig_patent_app_number] => 12168989 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/168989
SYSTEM AND METHOD FOR PREVENTING PRIVATE INFORMATION FROM LEAKING OUT THROUGH ACCESS CONTEXT ANALYSIS IN PERSONAL MOBILE TERMINAL Jul 7, 2008 Abandoned
Array ( [id] => 8449422 [patent_doc_number] => 08291494 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-10-16 [patent_title] => 'System, method, and computer program product for detecting unwanted activity associated with an object, based on an attribute associated with the object' [patent_app_type] => utility [patent_app_number] => 12/169420 [patent_app_country] => US [patent_app_date] => 2008-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4374 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12169420 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/169420
System, method, and computer program product for detecting unwanted activity associated with an object, based on an attribute associated with the object Jul 7, 2008 Issued
Array ( [id] => 8009047 [patent_doc_number] => 08085934 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-12-27 [patent_title] => 'Reverse cryptographic key expansion' [patent_app_type] => utility [patent_app_number] => 12/169044 [patent_app_country] => US [patent_app_date] => 2008-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 4451 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 140 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/085/08085934.pdf [firstpage_image] =>[orig_patent_app_number] => 12169044 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/169044
Reverse cryptographic key expansion Jul 7, 2008 Issued
Array ( [id] => 8899731 [patent_doc_number] => 08479265 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-02 [patent_title] => 'Usage based authorization' [patent_app_type] => utility [patent_app_number] => 12/166535 [patent_app_country] => US [patent_app_date] => 2008-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7273 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12166535 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/166535
Usage based authorization Jul 1, 2008 Issued
Array ( [id] => 5298453 [patent_doc_number] => 20090013379 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-08 [patent_title] => 'METHODS AND APPARATUS FOR VERIFYING ELECTRONIC MAIL' [patent_app_type] => utility [patent_app_number] => 12/166971 [patent_app_country] => US [patent_app_date] => 2008-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 6123 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0013/20090013379.pdf [firstpage_image] =>[orig_patent_app_number] => 12166971 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/166971
Methods and apparatus for verifying electronic mail Jul 1, 2008 Issued
Array ( [id] => 5298449 [patent_doc_number] => 20090013375 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-08 [patent_title] => 'PERMISSIONS MANAGEMENT PLATFORM' [patent_app_type] => utility [patent_app_number] => 12/166731 [patent_app_country] => US [patent_app_date] => 2008-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 8323 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0013/20090013375.pdf [firstpage_image] =>[orig_patent_app_number] => 12166731 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/166731
PERMISSIONS MANAGEMENT PLATFORM Jul 1, 2008 Abandoned
Array ( [id] => 8471635 [patent_doc_number] => 08300825 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-10-30 [patent_title] => 'Data encryption and/or decryption by integrated circuit' [patent_app_type] => utility [patent_app_number] => 12/164663 [patent_app_country] => US [patent_app_date] => 2008-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5905 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 201 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12164663 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/164663
Data encryption and/or decryption by integrated circuit Jun 29, 2008 Issued
Menu