
David J. Parsley
Examiner (ID: 16789, Phone: (571)272-6890 , Office: P/3643 )
| Most Active Art Unit | 3643 |
| Art Unit(s) | 3643 |
| Total Applications | 2042 |
| Issued Applications | 925 |
| Pending Applications | 180 |
| Abandoned Applications | 967 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8757252
[patent_doc_number] => 20130091557
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-11
[patent_title] => 'SYSTEM AND METHOD FOR PROVIDING CLOUD-BASED CROSS-PLATFORM APPLICATION STORES FOR MOBILE COMPUTING DEVICES'
[patent_app_type] => utility
[patent_app_number] => 13/650011
[patent_app_country] => US
[patent_app_date] => 2012-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5751
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13650011
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/650011 | SYSTEM AND METHOD FOR PROVIDING CLOUD-BASED CROSS-PLATFORM APPLICATION STORES FOR MOBILE COMPUTING DEVICES | Oct 10, 2012 | Abandoned |
Array
(
[id] => 11345588
[patent_doc_number] => 09529996
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-27
[patent_title] => 'Controlling mobile device access to enterprise resources'
[patent_app_type] => utility
[patent_app_number] => 13/649073
[patent_app_country] => US
[patent_app_date] => 2012-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 43
[patent_no_of_words] => 60505
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13649073
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/649073 | Controlling mobile device access to enterprise resources | Oct 9, 2012 | Issued |
Array
(
[id] => 10113276
[patent_doc_number] => 09148700
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-29
[patent_title] => 'Remotely defining security data for authorization of local application activity'
[patent_app_type] => utility
[patent_app_number] => 13/616796
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9650
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13616796
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/616796 | Remotely defining security data for authorization of local application activity | Sep 13, 2012 | Issued |
Array
(
[id] => 9578853
[patent_doc_number] => 08769289
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-07-01
[patent_title] => 'Authentication of a user accessing a protected resource using multi-channel protocol'
[patent_app_type] => utility
[patent_app_number] => 13/617159
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 2904
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13617159
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/617159 | Authentication of a user accessing a protected resource using multi-channel protocol | Sep 13, 2012 | Issued |
Array
(
[id] => 10119581
[patent_doc_number] => 09154479
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-10-06
[patent_title] => 'Secure proxy'
[patent_app_type] => utility
[patent_app_number] => 13/619317
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12983
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13619317
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/619317 | Secure proxy | Sep 13, 2012 | Issued |
Array
(
[id] => 8568509
[patent_doc_number] => 20120331080
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-27
[patent_title] => 'PRIVATE ELECTRONIC INFORMATION EXCHANGE'
[patent_app_type] => utility
[patent_app_number] => 13/607417
[patent_app_country] => US
[patent_app_date] => 2012-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9402
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13607417
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/607417 | Private electronic information exchange | Sep 6, 2012 | Issued |
Array
(
[id] => 9826045
[patent_doc_number] => 08935541
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-13
[patent_title] => 'Method and apparatus for encrypting and processing data in flash translation layer'
[patent_app_type] => utility
[patent_app_number] => 13/569713
[patent_app_country] => US
[patent_app_date] => 2012-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 3792
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13569713
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/569713 | Method and apparatus for encrypting and processing data in flash translation layer | Aug 7, 2012 | Issued |
Array
(
[id] => 10860713
[patent_doc_number] => 08886930
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-11
[patent_title] => 'DNS flood protection platform for a network'
[patent_app_type] => utility
[patent_app_number] => 13/567938
[patent_app_country] => US
[patent_app_date] => 2012-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6395
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13567938
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/567938 | DNS flood protection platform for a network | Aug 5, 2012 | Issued |
Array
(
[id] => 10328269
[patent_doc_number] => 20150213272
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'CONJOINT VULNERABILITY IDENTIFIERS'
[patent_app_type] => utility
[patent_app_number] => 14/418894
[patent_app_country] => US
[patent_app_date] => 2012-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4413
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14418894
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/418894 | CONJOINT VULNERABILITY IDENTIFIERS | Jul 30, 2012 | Abandoned |
Array
(
[id] => 10295879
[patent_doc_number] => 20150180878
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'UNAUTHORIZED USER CLASSIFICATION'
[patent_app_type] => utility
[patent_app_number] => 14/418927
[patent_app_country] => US
[patent_app_date] => 2012-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6440
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14418927
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/418927 | UNAUTHORIZED USER CLASSIFICATION | Jul 30, 2012 | Abandoned |
Array
(
[id] => 8504870
[patent_doc_number] => 20120304278
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-29
[patent_title] => 'METHODS AND SYSTEMS FOR ACHIEVING HIGH ASSURANCE COMPUTING USING LOW ASSURANCE OPERATING SYSTEMS AND PROCESSES'
[patent_app_type] => utility
[patent_app_number] => 13/557751
[patent_app_country] => US
[patent_app_date] => 2012-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10880
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13557751
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/557751 | METHODS AND SYSTEMS FOR ACHIEVING HIGH ASSURANCE COMPUTING USING LOW ASSURANCE OPERATING SYSTEMS AND PROCESSES | Jul 24, 2012 | Abandoned |
Array
(
[id] => 8455281
[patent_doc_number] => 20120266227
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-18
[patent_title] => 'VERIFICATION AND AUTHENTICATION SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 13/537437
[patent_app_country] => US
[patent_app_date] => 2012-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 12764
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13537437
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/537437 | Verification and authentication systems and methods | Jun 28, 2012 | Issued |
Array
(
[id] => 9207598
[patent_doc_number] => 20140006775
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-02
[patent_title] => 'MESSAGE ORIGINATOR TOKEN VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 13/536368
[patent_app_country] => US
[patent_app_date] => 2012-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11578
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13536368
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/536368 | Message originator token verification | Jun 27, 2012 | Issued |
Array
(
[id] => 9352551
[patent_doc_number] => 08671456
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-11
[patent_title] => 'Accessing restricted resources in computer programming'
[patent_app_type] => utility
[patent_app_number] => 13/532813
[patent_app_country] => US
[patent_app_date] => 2012-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6254
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532813
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/532813 | Accessing restricted resources in computer programming | Jun 25, 2012 | Issued |
Array
(
[id] => 9968208
[patent_doc_number] => 09015844
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-04-21
[patent_title] => 'Techniques for web application vulnerability scanning'
[patent_app_type] => utility
[patent_app_number] => 13/532327
[patent_app_country] => US
[patent_app_date] => 2012-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5570
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532327
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/532327 | Techniques for web application vulnerability scanning | Jun 24, 2012 | Issued |
Array
(
[id] => 10074522
[patent_doc_number] => 09112895
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-18
[patent_title] => 'Anomaly detection system for enterprise network security'
[patent_app_type] => utility
[patent_app_number] => 13/532355
[patent_app_country] => US
[patent_app_date] => 2012-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7074
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 278
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532355
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/532355 | Anomaly detection system for enterprise network security | Jun 24, 2012 | Issued |
Array
(
[id] => 9992957
[patent_doc_number] => 09038178
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-05-19
[patent_title] => 'Detection of malware beaconing activities'
[patent_app_type] => utility
[patent_app_number] => 13/532385
[patent_app_country] => US
[patent_app_date] => 2012-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6934
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532385
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/532385 | Detection of malware beaconing activities | Jun 24, 2012 | Issued |
Array
(
[id] => 9265166
[patent_doc_number] => 20130347095
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'ISOLATION AND SECURITY HARDENING AMONG WORKLOADS IN A MULTI-TENANT NETWORKED ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 13/531761
[patent_app_country] => US
[patent_app_date] => 2012-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9140
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13531761
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/531761 | Isolation and security hardening among workloads in a multi-tenant networked environment | Jun 24, 2012 | Issued |
Array
(
[id] => 9500072
[patent_doc_number] => 08738911
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-27
[patent_title] => 'Secure socket layer keystore and truststore generation'
[patent_app_type] => utility
[patent_app_number] => 13/532210
[patent_app_country] => US
[patent_app_date] => 2012-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7869
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532210
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/532210 | Secure socket layer keystore and truststore generation | Jun 24, 2012 | Issued |
Array
(
[id] => 8455051
[patent_doc_number] => 20120265997
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-18
[patent_title] => 'PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS'
[patent_app_type] => utility
[patent_app_number] => 13/530438
[patent_app_country] => US
[patent_app_date] => 2012-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 18652
[patent_no_of_claims] => 47
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13530438
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/530438 | Privacy-preserving flexible anonymous-pseudonymous access | Jun 21, 2012 | Issued |