
Devin E. Almeida
Examiner (ID: 5914)
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2432, 2132, 2492 |
| Total Applications | 713 |
| Issued Applications | 466 |
| Pending Applications | 64 |
| Abandoned Applications | 193 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10401806
[patent_doc_number] => 20150286815
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'ACCESS CONTROL MANAGEMENT APPARATUS AND METHOD FOR OPEN SERVICE COMPONENTS'
[patent_app_type] => utility
[patent_app_number] => 14/620870
[patent_app_country] => US
[patent_app_date] => 2015-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2927
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620870
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620870 | ACCESS CONTROL MANAGEMENT APPARATUS AND METHOD FOR OPEN SERVICE COMPONENTS | Feb 11, 2015 | Abandoned |
Array
(
[id] => 10344659
[patent_doc_number] => 20150229664
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'ASSESSING SECURITY RISKS OF USERS IN A COMPUTING NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/620866
[patent_app_country] => US
[patent_app_date] => 2015-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 26041
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620866
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620866 | ASSESSING SECURITY RISKS OF USERS IN A COMPUTING NETWORK | Feb 11, 2015 | Abandoned |
Array
(
[id] => 11919440
[patent_doc_number] => 09787640
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-10
[patent_title] => 'Using hypergraphs to determine suspicious user activities'
[patent_app_type] => utility
[patent_app_number] => 14/620028
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5400
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620028
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620028 | Using hypergraphs to determine suspicious user activities | Feb 10, 2015 | Issued |
Array
(
[id] => 11924876
[patent_doc_number] => 09792460
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-17
[patent_title] => 'Method and apparatus for processing biometric information in electronic device'
[patent_app_type] => utility
[patent_app_number] => 14/619731
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10355
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14619731
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/619731 | Method and apparatus for processing biometric information in electronic device | Feb 10, 2015 | Issued |
Array
(
[id] => 11540410
[patent_doc_number] => 09614840
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-04
[patent_title] => 'Network authentication method and system based on eye tracking procedure'
[patent_app_type] => utility
[patent_app_number] => 14/620157
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 13
[patent_no_of_words] => 6528
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 262
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620157
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620157 | Network authentication method and system based on eye tracking procedure | Feb 10, 2015 | Issued |
Array
(
[id] => 12537480
[patent_doc_number] => 10009358
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-06-26
[patent_title] => Graph based framework for detecting malicious or compromised accounts
[patent_app_type] => utility
[patent_app_number] => 14/620048
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6565
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620048
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620048 | Graph based framework for detecting malicious or compromised accounts | Feb 10, 2015 | Issued |
Array
(
[id] => 11037392
[patent_doc_number] => 20160234348
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'METHODS AND SYSTEMS FOR DELIVERING CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/618596
[patent_app_country] => US
[patent_app_date] => 2015-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13524
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14618596
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/618596 | Methods and systems for delivering content | Feb 9, 2015 | Issued |
Array
(
[id] => 10473294
[patent_doc_number] => 20150358310
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-10
[patent_title] => 'Cloud Queue Access Control'
[patent_app_type] => utility
[patent_app_number] => 14/616319
[patent_app_country] => US
[patent_app_date] => 2015-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 27850
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14616319
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/616319 | Cloud queue access control | Feb 5, 2015 | Issued |
Array
(
[id] => 13284895
[patent_doc_number] => 10154045
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-11
[patent_title] => Method of communicating between secured computer systems as well as computer network infrastructure
[patent_app_type] => utility
[patent_app_number] => 15/118272
[patent_app_country] => US
[patent_app_date] => 2015-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 3
[patent_no_of_words] => 6920
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15118272
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/118272 | Method of communicating between secured computer systems as well as computer network infrastructure | Jan 26, 2015 | Issued |
Array
(
[id] => 11877510
[patent_doc_number] => 09749298
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-29
[patent_title] => 'Recovery from decryption errors in a sequence of communication packets'
[patent_app_type] => utility
[patent_app_number] => 14/596312
[patent_app_country] => US
[patent_app_date] => 2015-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4480
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14596312
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/596312 | Recovery from decryption errors in a sequence of communication packets | Jan 13, 2015 | Issued |
Array
(
[id] => 11393008
[patent_doc_number] => 09554270
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-24
[patent_title] => 'Enhanced security for direct link communications'
[patent_app_type] => utility
[patent_app_number] => 14/543344
[patent_app_country] => US
[patent_app_date] => 2014-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6777
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14543344
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/543344 | Enhanced security for direct link communications | Nov 16, 2014 | Issued |
Array
(
[id] => 11088877
[patent_doc_number] => 20160285845
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-29
[patent_title] => 'METHOD FOR SETTING UP, VIA AN INTERMEDIATE ENTITY, A SECURE SESSION BETWEEN A FIRST AND A SECOND ENTITY, AND CORRESPONDING ENTITIES AND COMPUTER PROGRAM PRODUCTS'
[patent_app_type] => utility
[patent_app_number] => 15/032898
[patent_app_country] => US
[patent_app_date] => 2014-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4505
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15032898
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/032898 | METHOD FOR SETTING UP, VIA AN INTERMEDIATE ENTITY, A SECURE SESSION BETWEEN A FIRST AND A SECOND ENTITY, AND CORRESPONDING ENTITIES AND COMPUTER PROGRAM PRODUCTS | Oct 30, 2014 | Pending |
Array
(
[id] => 11056528
[patent_doc_number] => 20160253490
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-01
[patent_title] => 'MOTION-BASED IDENTITY AUTHENTICATION OF AN INDIVIDUAL'
[patent_app_type] => utility
[patent_app_number] => 15/033264
[patent_app_country] => US
[patent_app_date] => 2014-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 18102
[patent_no_of_claims] => 52
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15033264
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/033264 | Motion-based identity authentication of an individual | Oct 29, 2014 | Issued |
Array
(
[id] => 10137828
[patent_doc_number] => 09171149
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-27
[patent_title] => 'Methods and systems for implementing a secure application execution environment using derived user accounts for internet content'
[patent_app_type] => utility
[patent_app_number] => 14/522882
[patent_app_country] => US
[patent_app_date] => 2014-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 18
[patent_no_of_words] => 16655
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14522882
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/522882 | Methods and systems for implementing a secure application execution environment using derived user accounts for internet content | Oct 23, 2014 | Issued |
Array
(
[id] => 11086744
[patent_doc_number] => 20160283710
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-29
[patent_title] => 'PATTERN INPUT APPARATUS AND METHOD, AND RECORDING MEDIUM USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 15/033026
[patent_app_country] => US
[patent_app_date] => 2014-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 32
[patent_no_of_words] => 9242
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15033026
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/033026 | Pattern input apparatus and method, and recording medium using the same | Oct 7, 2014 | Issued |
Array
(
[id] => 9801059
[patent_doc_number] => 20150013002
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'Providing Integrity Verification And Attestation In A Hidden Execution Environment'
[patent_app_type] => utility
[patent_app_number] => 14/496186
[patent_app_country] => US
[patent_app_date] => 2014-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7234
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14496186
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/496186 | Providing integrity verification and attestation in a hidden execution environment | Sep 24, 2014 | Issued |
Array
(
[id] => 11791255
[patent_doc_number] => 09400886
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-26
[patent_title] => 'System and method for using snapshots for rootkit detection'
[patent_app_type] => utility
[patent_app_number] => 14/494758
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 9680
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494758
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494758 | System and method for using snapshots for rootkit detection | Sep 23, 2014 | Issued |
Array
(
[id] => 10137835
[patent_doc_number] => 09171156
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-10-27
[patent_title] => 'Systems and methods for managing malware signatures'
[patent_app_type] => utility
[patent_app_number] => 14/492754
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8670
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492754
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492754 | Systems and methods for managing malware signatures | Sep 21, 2014 | Issued |
Array
(
[id] => 9912679
[patent_doc_number] => 20150067882
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-05
[patent_title] => 'METHODS AND SYSTEMS FOR ENCODING AND PROTECTING DATA USING DIGITAL SIGNATURE AND WATERMARKING TECHNIQUES'
[patent_app_type] => utility
[patent_app_number] => 14/486834
[patent_app_country] => US
[patent_app_date] => 2014-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 14896
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14486834
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/486834 | METHODS AND SYSTEMS FOR ENCODING AND PROTECTING DATA USING DIGITAL SIGNATURE AND WATERMARKING TECHNIQUES | Sep 14, 2014 | Abandoned |
Array
(
[id] => 10632386
[patent_doc_number] => 09350547
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-24
[patent_title] => 'Systems and methods for watermarking software and other media'
[patent_app_type] => utility
[patent_app_number] => 14/462513
[patent_app_country] => US
[patent_app_date] => 2014-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 36
[patent_no_of_words] => 32023
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14462513
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/462513 | Systems and methods for watermarking software and other media | Aug 17, 2014 | Issued |