
Dorethea Lawrence
Examiner (ID: 3480)
| Most Active Art Unit | 3916 |
| Art Unit(s) | 3916 |
| Total Applications | 679 |
| Issued Applications | 0 |
| Pending Applications | 679 |
| Abandoned Applications | 0 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8159717
[patent_doc_number] => 20120100839
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-26
[patent_title] => 'SENDER IDENTIFICATION SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/340536
[patent_app_country] => US
[patent_app_date] => 2011-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4869
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0100/20120100839.pdf
[firstpage_image] =>[orig_patent_app_number] => 13340536
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/340536 | Sender identification system and method | Dec 28, 2011 | Issued |
Array
(
[id] => 8466889
[patent_doc_number] => 20120272057
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-25
[patent_title] => 'Method and Apparatus for Secured Embedded Device Communication'
[patent_app_type] => utility
[patent_app_number] => 13/334643
[patent_app_country] => US
[patent_app_date] => 2011-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2864
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13334643
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/334643 | Method and apparatus for secured embedded device communication | Dec 21, 2011 | Issued |
Array
(
[id] => 8129943
[patent_doc_number] => 20120089522
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-12
[patent_title] => 'Service Management System and Method'
[patent_app_type] => utility
[patent_app_number] => 13/325657
[patent_app_country] => US
[patent_app_date] => 2011-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5145
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0089/20120089522.pdf
[firstpage_image] =>[orig_patent_app_number] => 13325657
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/325657 | Service Management System and Method | Dec 13, 2011 | Abandoned |
Array
(
[id] => 9186891
[patent_doc_number] => 08626873
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-01-07
[patent_title] => 'Systems and methods for managing a provider\'s online status in a distributed network'
[patent_app_type] => utility
[patent_app_number] => 13/288799
[patent_app_country] => US
[patent_app_date] => 2011-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 9971
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13288799
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/288799 | Systems and methods for managing a provider's online status in a distributed network | Nov 2, 2011 | Issued |
Array
(
[id] => 9578874
[patent_doc_number] => 08769310
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-01
[patent_title] => 'Encrypting data objects to back-up'
[patent_app_type] => utility
[patent_app_number] => 13/279017
[patent_app_country] => US
[patent_app_date] => 2011-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 9712
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13279017
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/279017 | Encrypting data objects to back-up | Oct 20, 2011 | Issued |
Array
(
[id] => 8161352
[patent_doc_number] => 20120101623
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-26
[patent_title] => 'Encryption Method of Digital Data, Decryption Method of Encrypted Digital Data, Manufacturing System of Storage Apparatus and Manufacturing Method Thereof'
[patent_app_type] => utility
[patent_app_number] => 13/277832
[patent_app_country] => US
[patent_app_date] => 2011-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4530
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0101/20120101623.pdf
[firstpage_image] =>[orig_patent_app_number] => 13277832
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/277832 | Encryption Method of Digital Data, Decryption Method of Encrypted Digital Data, Manufacturing System of Storage Apparatus and Manufacturing Method Thereof | Oct 19, 2011 | Abandoned |
Array
(
[id] => 9415653
[patent_doc_number] => 08699703
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-15
[patent_title] => 'System and method for pseudo-random polymorphic tree construction'
[patent_app_type] => utility
[patent_app_number] => 13/276612
[patent_app_country] => US
[patent_app_date] => 2011-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7175
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13276612
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/276612 | System and method for pseudo-random polymorphic tree construction | Oct 18, 2011 | Issued |
Array
(
[id] => 7770377
[patent_doc_number] => 20120036351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-09
[patent_title] => 'CONFIGURABLE MEMORY ENCRYPTION WITH CONSTANT PIPELINE DELAY IN A MULTI-CORE PROCESSOR'
[patent_app_type] => utility
[patent_app_number] => 13/274726
[patent_app_country] => US
[patent_app_date] => 2011-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6123
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0036/20120036351.pdf
[firstpage_image] =>[orig_patent_app_number] => 13274726
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/274726 | Configurable memory encryption with constant pipeline delay in a multi-core processor | Oct 16, 2011 | Issued |
Array
(
[id] => 8143463
[patent_doc_number] => 20120096264
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-19
[patent_title] => 'JAVA STORE TELEVISION'
[patent_app_type] => utility
[patent_app_number] => 13/273861
[patent_app_country] => US
[patent_app_date] => 2011-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10192
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0096/20120096264.pdf
[firstpage_image] =>[orig_patent_app_number] => 13273861
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/273861 | Java store television | Oct 13, 2011 | Issued |
Array
(
[id] => 8769614
[patent_doc_number] => 20130097651
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-18
[patent_title] => 'CAPTURING DATA PARAMETERS IN TEMPLATES IN A NETWORKED COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 13/271439
[patent_app_country] => US
[patent_app_date] => 2011-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6179
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13271439
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/271439 | Capturing data parameters in templates in a networked computing environment | Oct 11, 2011 | Issued |
Array
(
[id] => 8130951
[patent_doc_number] => 20120090021
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-12
[patent_title] => 'Platform Specific Application Building'
[patent_app_type] => utility
[patent_app_number] => 13/272129
[patent_app_country] => US
[patent_app_date] => 2011-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8328
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0090/20120090021.pdf
[firstpage_image] =>[orig_patent_app_number] => 13272129
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/272129 | Platform Specific Application Building | Oct 11, 2011 | Abandoned |
Array
(
[id] => 8757256
[patent_doc_number] => 20130091561
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-11
[patent_title] => 'EXECUTING COMMANDS PROVIDED DURING USER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/271152
[patent_app_country] => US
[patent_app_date] => 2011-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6934
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13271152
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/271152 | EXECUTING COMMANDS PROVIDED DURING USER AUTHENTICATION | Oct 10, 2011 | Abandoned |
Array
(
[id] => 8757234
[patent_doc_number] => 20130091539
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-11
[patent_title] => 'SYSTEM AND METHOD FOR INSIDER THREAT DETECTION'
[patent_app_type] => utility
[patent_app_number] => 13/270874
[patent_app_country] => US
[patent_app_date] => 2011-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7433
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13270874
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/270874 | System and method for insider threat detection | Oct 10, 2011 | Issued |
Array
(
[id] => 11931873
[patent_doc_number] => 09798873
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Processor operable to ensure code integrity'
[patent_app_type] => utility
[patent_app_number] => 13/136670
[patent_app_country] => US
[patent_app_date] => 2011-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 41
[patent_no_of_words] => 18258
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 328
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13136670
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/136670 | Processor operable to ensure code integrity | Aug 3, 2011 | Issued |
Array
(
[id] => 8501519
[patent_doc_number] => 20120300927
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-29
[patent_title] => 'METHOD OF REGISTERING SMART PHONE WHEN ACCESSING SECURITY AUTHENTICATION DEVICE AND METHOD OF GRANTING ACCESS PERMISSION TO REGISTERED SMART PHONE'
[patent_app_type] => utility
[patent_app_number] => 13/197121
[patent_app_country] => US
[patent_app_date] => 2011-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3248
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13197121
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/197121 | Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone | Aug 2, 2011 | Issued |
Array
(
[id] => 7765402
[patent_doc_number] => 20120033806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-09
[patent_title] => 'METHOD OF ENCRYPTING A DATA STREAM'
[patent_app_type] => utility
[patent_app_number] => 13/196568
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6976
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0033/20120033806.pdf
[firstpage_image] =>[orig_patent_app_number] => 13196568
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/196568 | METHOD OF ENCRYPTING A DATA STREAM | Aug 1, 2011 | Abandoned |
Array
(
[id] => 8325819
[patent_doc_number] => 20120198227
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-02
[patent_title] => 'CIPHER KEY GENERATION IN COMMUNICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/192957
[patent_app_country] => US
[patent_app_date] => 2011-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6439
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13192957
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/192957 | CIPHER KEY GENERATION IN COMMUNICATION SYSTEM | Jul 27, 2011 | Abandoned |
Array
(
[id] => 8639566
[patent_doc_number] => 20130031369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-31
[patent_title] => 'MANAGING ACCESS TO A SECURE CONTENT-PART OF A PPCD USING A KEY RESET POINT'
[patent_app_type] => utility
[patent_app_number] => 13/192205
[patent_app_country] => US
[patent_app_date] => 2011-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10958
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13192205
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/192205 | Managing access to a secure content-part of a PPCD using a key reset point | Jul 26, 2011 | Issued |
Array
(
[id] => 7760296
[patent_doc_number] => 20120030729
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-02
[patent_title] => 'COLLABORATIVE STRUCTURED ANALYSIS SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/192425
[patent_app_country] => US
[patent_app_date] => 2011-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 29800
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0030/20120030729.pdf
[firstpage_image] =>[orig_patent_app_number] => 13192425
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/192425 | Collaborative structured analysis system and method | Jul 26, 2011 | Issued |
Array
(
[id] => 8639555
[patent_doc_number] => 20130031358
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-31
[patent_title] => 'WIRELESS NETWORK SECURITY'
[patent_app_type] => utility
[patent_app_number] => 13/191094
[patent_app_country] => US
[patent_app_date] => 2011-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11383
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13191094
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/191094 | Wireless network security | Jul 25, 2011 | Issued |