
Courtney D. Thomas
Examiner (ID: 2444, Phone: (571)272-2496 , Office: P/2884 )
| Most Active Art Unit | 2884 |
| Art Unit(s) | 2882, 2884 |
| Total Applications | 2016 |
| Issued Applications | 1791 |
| Pending Applications | 85 |
| Abandoned Applications | 171 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10697907
[patent_doc_number] => 20160044054
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-11
[patent_title] => 'NETWORK APPLIANCE FOR DYNAMIC PROTECTION FROM RISKY NETWORK ACTIVITIES'
[patent_app_type] => utility
[patent_app_number] => 14/632514
[patent_app_country] => US
[patent_app_date] => 2015-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 30272
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14632514
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/632514 | Network appliance for dynamic protection from risky network activities | Feb 25, 2015 | Issued |
Array
(
[id] => 12337806
[patent_doc_number] => 09948608
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-17
[patent_title] => Systems and methods for using an HTTP-aware client agent
[patent_app_type] => utility
[patent_app_number] => 14/594963
[patent_app_country] => US
[patent_app_date] => 2015-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 24202
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14594963
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/594963 | Systems and methods for using an HTTP-aware client agent | Jan 11, 2015 | Issued |
Array
(
[id] => 12203454
[patent_doc_number] => 09906537
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-27
[patent_title] => 'System, method, and computer program product for conditionally performing an action based on an attribute'
[patent_app_type] => utility
[patent_app_number] => 14/595037
[patent_app_country] => US
[patent_app_date] => 2015-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5606
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14595037
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/595037 | System, method, and computer program product for conditionally performing an action based on an attribute | Jan 11, 2015 | Issued |
Array
(
[id] => 10796270
[patent_doc_number] => 20160142427
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'SECURITY ENHANCEMENTS FOR A SOFTWARE-DEFINED NETWORK WITH NETWORK FUNCTIONS VIRTUALIZATION'
[patent_app_type] => utility
[patent_app_number] => 14/547942
[patent_app_country] => US
[patent_app_date] => 2014-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12746
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14547942
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/547942 | Security enhancements for a software-defined network with network functions virtualization | Nov 18, 2014 | Issued |
Array
(
[id] => 9897163
[patent_doc_number] => 20150052362
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-19
[patent_title] => 'COMPUTERIZED SYSTEM AND METHOD FOR DEPLOYMENT OF MANAGEMENT TUNNELS'
[patent_app_type] => utility
[patent_app_number] => 14/499128
[patent_app_country] => US
[patent_app_date] => 2014-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6021
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499128
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/499128 | Computerized system and method for deployment of management tunnels | Sep 26, 2014 | Issued |
Array
(
[id] => 10632560
[patent_doc_number] => 09350722
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-24
[patent_title] => 'Authentication of an end user'
[patent_app_type] => utility
[patent_app_number] => 14/492150
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2691
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492150
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492150 | Authentication of an end user | Sep 21, 2014 | Issued |
Array
(
[id] => 10287310
[patent_doc_number] => 20150172308
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'SITE INDEPENDENT METHODS FOR DERIVING CONTEXTUALLY TAILORED SECURITY VULNERABILITY CORRECTIONS FOR HARDENING SOLUTION STACKS'
[patent_app_type] => utility
[patent_app_number] => 14/485645
[patent_app_country] => US
[patent_app_date] => 2014-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9309
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14485645
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/485645 | Site independent methods for deriving contextually tailored security vulnerability corrections for hardening solution stacks | Sep 11, 2014 | Issued |
Array
(
[id] => 10287309
[patent_doc_number] => 20150172307
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'SITE INDEPENDENT SYSTEM FOR DERIVING CONTEXTUALLY TAILORED SECURITY VULNERABILITY CORRECTIONS FOR HARDENING SOLUTION STACKS'
[patent_app_type] => utility
[patent_app_number] => 14/485643
[patent_app_country] => US
[patent_app_date] => 2014-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9312
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14485643
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/485643 | Site independent system for deriving contextually tailored security vulnerability corrections for hardening solution stacks | Sep 11, 2014 | Issued |
Array
(
[id] => 11525393
[patent_doc_number] => 09608814
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'System and method for centralized key distribution'
[patent_app_type] => utility
[patent_app_number] => 14/482829
[patent_app_country] => US
[patent_app_date] => 2014-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7459
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14482829
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/482829 | System and method for centralized key distribution | Sep 9, 2014 | Issued |
Array
(
[id] => 11739376
[patent_doc_number] => 09703959
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-11
[patent_title] => 'Dynamic verification of a computer software application execution path'
[patent_app_type] => utility
[patent_app_number] => 14/453851
[patent_app_country] => US
[patent_app_date] => 2014-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2898
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14453851
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/453851 | Dynamic verification of a computer software application execution path | Aug 6, 2014 | Issued |
Array
(
[id] => 11861153
[patent_doc_number] => 09740837
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-22
[patent_title] => 'Apparatus and method for preventing cloning of code'
[patent_app_type] => utility
[patent_app_number] => 14/453116
[patent_app_country] => US
[patent_app_date] => 2014-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2184
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14453116
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/453116 | Apparatus and method for preventing cloning of code | Aug 5, 2014 | Issued |
Array
(
[id] => 11552821
[patent_doc_number] => 09621689
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-11
[patent_title] => 'System and method for authenticating a network time protocol (NTP)'
[patent_app_type] => utility
[patent_app_number] => 14/453388
[patent_app_country] => US
[patent_app_date] => 2014-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4477
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14453388
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/453388 | System and method for authenticating a network time protocol (NTP) | Aug 5, 2014 | Issued |
Array
(
[id] => 10928034
[patent_doc_number] => 20140331055
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-06
[patent_title] => 'SYSTEM AND METHOD FOR INTERAPPLICATION COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/337048
[patent_app_country] => US
[patent_app_date] => 2014-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3803
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14337048
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/337048 | System and method for interapplication communications | Jul 20, 2014 | Issued |
Array
(
[id] => 10494275
[patent_doc_number] => 20150379297
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'SECURELY STORING CONTENT WITHIN PUBLIC CLOUDS'
[patent_app_type] => utility
[patent_app_number] => 14/319969
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7078
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14319969
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/319969 | Securely storing content within public clouds | Jun 29, 2014 | Issued |
Array
(
[id] => 12203471
[patent_doc_number] => 09906553
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-02-27
[patent_title] => 'Personalized privacy warnings'
[patent_app_type] => utility
[patent_app_number] => 14/320482
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7396
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14320482
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/320482 | Personalized privacy warnings | Jun 29, 2014 | Issued |
Array
(
[id] => 11266674
[patent_doc_number] => 09490987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'Accurately classifying a computer program interacting with a computer system using questioning and fingerprinting'
[patent_app_type] => utility
[patent_app_number] => 14/320520
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8695
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14320520
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/320520 | Accurately classifying a computer program interacting with a computer system using questioning and fingerprinting | Jun 29, 2014 | Issued |
Array
(
[id] => 10494264
[patent_doc_number] => 20150379286
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'CRYPTOGRAPHIC KEY'
[patent_app_type] => utility
[patent_app_number] => 14/320359
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7652
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14320359
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/320359 | Cryptographic key | Jun 29, 2014 | Issued |
Array
(
[id] => 9795393
[patent_doc_number] => 20150007337
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-01
[patent_title] => 'Solid State Drive Physical Uncloneable Function Erase Verification Device and Method'
[patent_app_type] => utility
[patent_app_number] => 14/320112
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2189
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14320112
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/320112 | Solid State Drive Physical Uncloneable Function Erase Verification Device and Method | Jun 29, 2014 | Abandoned |
Array
(
[id] => 11863064
[patent_doc_number] => 09742768
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-22
[patent_title] => 'Methods and apparatus for premises content distribution'
[patent_app_type] => utility
[patent_app_number] => 14/281759
[patent_app_country] => US
[patent_app_date] => 2014-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 17
[patent_no_of_words] => 19481
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14281759
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/281759 | Methods and apparatus for premises content distribution | May 18, 2014 | Issued |
Array
(
[id] => 10401521
[patent_doc_number] => 20150286530
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'RECOVERY OF AN INFECTED AND QUARANTILED FILE IN A PRIMARY STORAGE CONTROLLER FROM A SECONDARY STORAGE CONTROLLER'
[patent_app_type] => utility
[patent_app_number] => 14/248266
[patent_app_country] => US
[patent_app_date] => 2014-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6870
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14248266
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/248266 | Recovery of an infected and quarantined file in a primary storage controller from a secondary storage controller | Apr 7, 2014 | Issued |