
David Bochna
Examiner (ID: 16580, Phone: (571)272-7078 , Office: P/3679 )
| Most Active Art Unit | 3679 |
| Art Unit(s) | 3679, 3629, 3626 |
| Total Applications | 2979 |
| Issued Applications | 2309 |
| Pending Applications | 164 |
| Abandoned Applications | 540 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10827336
[patent_doc_number] => 20160173506
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-16
[patent_title] => 'PROTECTING MOBILE DEVICES FROM MALWARE'
[patent_app_type] => utility
[patent_app_number] => 14/722245
[patent_app_country] => US
[patent_app_date] => 2015-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7812
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14722245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/722245 | Protecting mobile devices from malware | May 26, 2015 | Issued |
Array
(
[id] => 10344996
[patent_doc_number] => 20150230001
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'Digital Cinema Distribution Method And Apparatus'
[patent_app_type] => utility
[patent_app_number] => 14/698236
[patent_app_country] => US
[patent_app_date] => 2015-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 4969
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14698236
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/698236 | Digital Cinema Distribution Method And Apparatus | Apr 27, 2015 | Abandoned |
Array
(
[id] => 10328267
[patent_doc_number] => 20150213271
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'SYSTEM AND METHOD FOR LIMITING EXPLOITABLE OR POTENTIALLY EXPLOITABLE SUB-COMPONENTS IN SOFTWARE COMPONENTS'
[patent_app_type] => utility
[patent_app_number] => 14/679831
[patent_app_country] => US
[patent_app_date] => 2015-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 23730
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14679831
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/679831 | System and method for limiting exploitable or potentially exploitable sub-components in software components | Apr 5, 2015 | Issued |
Array
(
[id] => 12224765
[patent_doc_number] => 20180063126
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'METHODS AND USER DEVICE AND AUTHENTICATOR DEVICE FOR AUTHENTICATION OF THE USER DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/559854
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7562
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15559854
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/559854 | Methods and user device and authenticator device for authentication of the user device | Mar 22, 2015 | Issued |
Array
(
[id] => 10113000
[patent_doc_number] => 09148424
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-29
[patent_title] => 'Systems and methods for IP-based intrusion detection'
[patent_app_type] => utility
[patent_app_number] => 14/657739
[patent_app_country] => US
[patent_app_date] => 2015-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11482
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14657739
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/657739 | Systems and methods for IP-based intrusion detection | Mar 12, 2015 | Issued |
Array
(
[id] => 14331445
[patent_doc_number] => 10296743
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-21
[patent_title] => Method and device for constructing APK virus signature database and APK virus detection system
[patent_app_type] => utility
[patent_app_number] => 15/124951
[patent_app_country] => US
[patent_app_date] => 2015-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 9283
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15124951
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/124951 | Method and device for constructing APK virus signature database and APK virus detection system | Mar 2, 2015 | Issued |
Array
(
[id] => 11460839
[patent_doc_number] => 20170054745
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'METHOD AND DEVICE FOR PROCESSING NETWORK THREAT'
[patent_app_type] => utility
[patent_app_number] => 15/119598
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8730
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15119598
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/119598 | METHOD AND DEVICE FOR PROCESSING NETWORK THREAT | Dec 29, 2014 | Abandoned |
Array
(
[id] => 10221961
[patent_doc_number] => 20150106954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-16
[patent_title] => 'CONTENT TRANSMISSION DEVICE AND CONTENT RECEPTION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/575902
[patent_app_country] => US
[patent_app_date] => 2014-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 9898
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14575902
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/575902 | CONTENT TRANSMISSION DEVICE AND CONTENT RECEPTION DEVICE | Dec 17, 2014 | Abandoned |
Array
(
[id] => 10827330
[patent_doc_number] => 20160173500
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-16
[patent_title] => 'MULTI-TENANT SECURITY IN THE CLOUD'
[patent_app_type] => utility
[patent_app_number] => 14/572443
[patent_app_country] => US
[patent_app_date] => 2014-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5166
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14572443
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/572443 | Multi-tenant security in the cloud | Dec 15, 2014 | Issued |
Array
(
[id] => 12046604
[patent_doc_number] => 09824207
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-11-21
[patent_title] => 'Authentication information update based on fraud detection'
[patent_app_type] => utility
[patent_app_number] => 14/571254
[patent_app_country] => US
[patent_app_date] => 2014-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 24556
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14571254
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/571254 | Authentication information update based on fraud detection | Dec 14, 2014 | Issued |
Array
(
[id] => 12956623
[patent_doc_number] => 09838384
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-12-05
[patent_title] => Password-based fraud detection
[patent_app_type] => utility
[patent_app_number] => 14/571247
[patent_app_country] => US
[patent_app_date] => 2014-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 24418
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14571247
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/571247 | Password-based fraud detection | Dec 14, 2014 | Issued |
Array
(
[id] => 10376941
[patent_doc_number] => 20150261948
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'TWO-FACTOR AUTHENTICATION METHODS AND SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/569196
[patent_app_country] => US
[patent_app_date] => 2014-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6182
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14569196
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/569196 | TWO-FACTOR AUTHENTICATION METHODS AND SYSTEMS | Dec 11, 2014 | Abandoned |
Array
(
[id] => 10825049
[patent_doc_number] => 20160171215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-16
[patent_title] => 'PROTECTING MOBILE DEVICES FROM MALWARE'
[patent_app_type] => utility
[patent_app_number] => 14/568160
[patent_app_country] => US
[patent_app_date] => 2014-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7839
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14568160
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/568160 | Protecting mobile devices from malware | Dec 11, 2014 | Issued |
Array
(
[id] => 16494696
[patent_doc_number] => 10860739
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-08
[patent_title] => Encryption of media based on content
[patent_app_type] => utility
[patent_app_number] => 14/568621
[patent_app_country] => US
[patent_app_date] => 2014-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4139
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14568621
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/568621 | Encryption of media based on content | Dec 11, 2014 | Issued |
Array
(
[id] => 11711854
[patent_doc_number] => 20170180354
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'USE OF CERTIFICATES USING A POSITIVE LIST'
[patent_app_type] => utility
[patent_app_number] => 15/116035
[patent_app_country] => US
[patent_app_date] => 2014-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6057
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15116035
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/116035 | Use of certificates using a positive list | Dec 7, 2014 | Issued |
Array
(
[id] => 11511294
[patent_doc_number] => 09602468
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-21
[patent_title] => 'Techniques to authenticate a client to a proxy through a domain name server intermediary'
[patent_app_type] => utility
[patent_app_number] => 14/548024
[patent_app_country] => US
[patent_app_date] => 2014-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13888
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14548024
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/548024 | Techniques to authenticate a client to a proxy through a domain name server intermediary | Nov 18, 2014 | Issued |
Array
(
[id] => 10342728
[patent_doc_number] => 20150227733
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'AUTOMATIC LOGIN SYSTEM AND AUTOMATIC LOGIN METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/543938
[patent_app_country] => US
[patent_app_date] => 2014-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2158
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14543938
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/543938 | AUTOMATIC LOGIN SYSTEM AND AUTOMATIC LOGIN METHOD | Nov 17, 2014 | Abandoned |
Array
(
[id] => 11247399
[patent_doc_number] => 09473454
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-18
[patent_title] => 'Security gateway communication'
[patent_app_type] => utility
[patent_app_number] => 14/532876
[patent_app_country] => US
[patent_app_date] => 2014-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 15
[patent_no_of_words] => 16127
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14532876
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/532876 | Security gateway communication | Nov 3, 2014 | Issued |
Array
(
[id] => 15855363
[patent_doc_number] => 10642968
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-05
[patent_title] => Controlling a device
[patent_app_type] => utility
[patent_app_number] => 15/512277
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7344
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15512277
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/512277 | Controlling a device | Sep 23, 2014 | Issued |
Array
(
[id] => 10379052
[patent_doc_number] => 20150264059
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'MALWARE DETECTOR'
[patent_app_type] => utility
[patent_app_number] => 14/482793
[patent_app_country] => US
[patent_app_date] => 2014-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7295
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14482793
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/482793 | Malware detector | Sep 9, 2014 | Issued |