Search

Edward Zee

Examiner (ID: 16747, Phone: (571)270-1686 , Office: P/2435 )

Most Active Art Unit
2435
Art Unit(s)
2435, 2135
Total Applications
1088
Issued Applications
943
Pending Applications
59
Abandoned Applications
113

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9912606 [patent_doc_number] => 20150067809 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-05 [patent_title] => 'USER IDENTITY AUTHENTICATION AND SINGLE SIGN ON FOR MULTITENANT ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 14/470450 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 24 [patent_no_of_words] => 6575 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470450 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/470450
USER IDENTITY AUTHENTICATION AND SINGLE SIGN ON FOR MULTITENANT ENVIRONMENT Aug 26, 2014 Abandoned
Array ( [id] => 9912638 [patent_doc_number] => 20150067841 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-05 [patent_title] => 'METHOD FOR HIDING SOURCE OF WIRELESS SENSOR NETWORK AND NODE' [patent_app_type] => utility [patent_app_number] => 14/469680 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5340 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14469680 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/469680
Method for hiding source of wireless sensor network and node Aug 26, 2014 Issued
Array ( [id] => 10646376 [patent_doc_number] => 09363263 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-07 [patent_title] => 'Just in time polymorphic authentication' [patent_app_type] => utility [patent_app_number] => 14/469676 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 16 [patent_no_of_words] => 10091 [patent_no_of_claims] => 45 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 316 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14469676 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/469676
Just in time polymorphic authentication Aug 26, 2014 Issued
Array ( [id] => 11188526 [patent_doc_number] => 09419949 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-16 [patent_title] => 'Increased communication security' [patent_app_type] => utility [patent_app_number] => 14/470917 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 36 [patent_figures_cnt] => 39 [patent_no_of_words] => 58328 [patent_no_of_claims] => 42 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470917 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/470917
Increased communication security Aug 26, 2014 Issued
Array ( [id] => 10719455 [patent_doc_number] => 20160065603 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-03 [patent_title] => 'COLLABORATIVE INFRASTRUCTURE SUPPORTING CYBER-SECURITY ANALYTICS IN INDUSTRIAL NETWORKS' [patent_app_type] => utility [patent_app_number] => 14/470793 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8563 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470793 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/470793
Collaborative infrastructure supporting cyber-security analytics in industrial networks Aug 26, 2014 Issued
Array ( [id] => 11188556 [patent_doc_number] => 09419979 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-16 [patent_title] => 'Increased communication security' [patent_app_type] => utility [patent_app_number] => 14/470896 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 36 [patent_figures_cnt] => 39 [patent_no_of_words] => 58108 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470896 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/470896
Increased communication security Aug 26, 2014 Issued
Array ( [id] => 9919219 [patent_doc_number] => 20150074424 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-12 [patent_title] => 'AVIONICS GATEWAY INTERFACE, SYSTEMS AND METHODS' [patent_app_type] => utility [patent_app_number] => 14/458680 [patent_app_country] => US [patent_app_date] => 2014-08-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 8825 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14458680 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/458680
Avionics gateway interface, systems and methods Aug 12, 2014 Issued
Array ( [id] => 11392476 [patent_doc_number] => 09553732 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-24 [patent_title] => 'Certificate evaluation for certificate authority reputation advising' [patent_app_type] => utility [patent_app_number] => 14/449716 [patent_app_country] => US [patent_app_date] => 2014-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 11543 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 176 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14449716 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/449716
Certificate evaluation for certificate authority reputation advising Jul 31, 2014 Issued
Array ( [id] => 12967363 [patent_doc_number] => 09875350 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-23 [patent_title] => Multi-vocal password verifying method and device [patent_app_type] => utility [patent_app_number] => 14/406894 [patent_app_country] => US [patent_app_date] => 2014-07-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 8 [patent_no_of_words] => 17124 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 289 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14406894 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/406894
Multi-vocal password verifying method and device Jul 3, 2014 Issued
Array ( [id] => 10080790 [patent_doc_number] => 09118653 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-25 [patent_title] => 'System and method of secure sharing of resources which require consent of multiple resource owners using group URI\'s' [patent_app_type] => utility [patent_app_number] => 14/321926 [patent_app_country] => US [patent_app_date] => 2014-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4492 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 242 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14321926 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/321926
System and method of secure sharing of resources which require consent of multiple resource owners using group URI's Jul 1, 2014 Issued
Array ( [id] => 11181695 [patent_doc_number] => 09413704 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-09 [patent_title] => 'Presenting messages associated with locations' [patent_app_type] => utility [patent_app_number] => 14/306099 [patent_app_country] => US [patent_app_date] => 2014-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 8094 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 249 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14306099 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/306099
Presenting messages associated with locations Jun 15, 2014 Issued
Array ( [id] => 10480371 [patent_doc_number] => 20150365388 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-17 [patent_title] => 'SYSTEMS AND METHODS FOR MULTI-STAGE IDENTITY AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 14/305405 [patent_app_country] => US [patent_app_date] => 2014-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 11933 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14305405 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/305405
Systems and methods for multi-stage identity authentication Jun 15, 2014 Issued
Array ( [id] => 10480215 [patent_doc_number] => 20150365233 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-17 [patent_title] => 'HYBRID MOBILE DEVICE AND RADIO SYSTEM' [patent_app_type] => utility [patent_app_number] => 14/305725 [patent_app_country] => US [patent_app_date] => 2014-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 4725 [patent_no_of_claims] => 76 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14305725 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/305725
Hybrid mobile device and radio system Jun 15, 2014 Issued
Array ( [id] => 10478582 [patent_doc_number] => 20150363599 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-17 [patent_title] => 'MECHANISMS FOR CONTROLLING TAG PERSONALIZATION' [patent_app_type] => utility [patent_app_number] => 14/306078 [patent_app_country] => US [patent_app_date] => 2014-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8380 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14306078 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/306078
Mechanisms for controlling tag personalization Jun 15, 2014 Issued
Array ( [id] => 10427023 [patent_doc_number] => 20150312034 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-29 [patent_title] => 'METHOD FOR IMAGE ENCRYPTION AND DECRYPTION INCORPORATING PHYSIOLOGICAL FEATURES AND IMAGE CAPTURE DEVICE THEREOF' [patent_app_type] => utility [patent_app_number] => 14/303736 [patent_app_country] => US [patent_app_date] => 2014-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3245 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14303736 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/303736
Method for image encryption and decryption incorporating physiological features and image capture device thereof Jun 12, 2014 Issued
Array ( [id] => 10480419 [patent_doc_number] => 20150365436 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-17 [patent_title] => 'Techniques for Improved Run Time Trustworthiness' [patent_app_type] => utility [patent_app_number] => 14/302681 [patent_app_country] => US [patent_app_date] => 2014-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6352 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14302681 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/302681
Techniques for improved run time trustworthiness Jun 11, 2014 Issued
Array ( [id] => 11796090 [patent_doc_number] => 09405920 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-08-02 [patent_title] => 'Data integrity verification' [patent_app_type] => utility [patent_app_number] => 14/284266 [patent_app_country] => US [patent_app_date] => 2014-05-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 17057 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14284266 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/284266
Data integrity verification May 20, 2014 Issued
Array ( [id] => 11540396 [patent_doc_number] => 09614826 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-04-04 [patent_title] => 'Sensitive data protection' [patent_app_type] => utility [patent_app_number] => 14/282856 [patent_app_country] => US [patent_app_date] => 2014-05-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8302 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14282856 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/282856
Sensitive data protection May 19, 2014 Issued
Array ( [id] => 10221895 [patent_doc_number] => 20150106888 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-16 [patent_title] => 'TRUST/VALUE/RISK-BASED ACCESS CONTROL POLICY' [patent_app_type] => utility [patent_app_number] => 14/281955 [patent_app_country] => US [patent_app_date] => 2014-05-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 11508 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14281955 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/281955
Trust/value/risk-based access control policy May 19, 2014 Issued
Array ( [id] => 9723031 [patent_doc_number] => 20140258732 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-11 [patent_title] => 'SOURCE IDENTIFICATION FOR UNAUTHORIZED COPIES OF CONTENT' [patent_app_type] => utility [patent_app_number] => 14/282386 [patent_app_country] => US [patent_app_date] => 2014-05-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 35 [patent_figures_cnt] => 35 [patent_no_of_words] => 27384 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14282386 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/282386
Source identification for unauthorized copies of content May 19, 2014 Issued
Menu