
Erich A. Leeser
Examiner (ID: 3, Phone: (571)272-9932 , Office: P/1624 )
| Most Active Art Unit | 1624 |
| Art Unit(s) | 1622, 1624 |
| Total Applications | 1723 |
| Issued Applications | 1323 |
| Pending Applications | 89 |
| Abandoned Applications | 339 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10944153
[patent_doc_number] => 20140347173
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-27
[patent_title] => 'METHOD USED IN A SYSTEM FOR REMOTELY CONTROLLING AN APPLIANCE'
[patent_app_type] => utility
[patent_app_number] => 14/359742
[patent_app_country] => US
[patent_app_date] => 2013-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 35
[patent_no_of_words] => 31893
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14359742
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/359742 | Method used in a system for remotely controlling an appliance | Nov 10, 2013 | Issued |
Array
(
[id] => 11741801
[patent_doc_number] => 09706407
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-11
[patent_title] => 'Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same'
[patent_app_type] => utility
[patent_app_number] => 14/443788
[patent_app_country] => US
[patent_app_date] => 2013-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 16
[patent_no_of_words] => 10093
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14443788
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/443788 | Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same | Nov 5, 2013 | Issued |
Array
(
[id] => 11752658
[patent_doc_number] => 09710674
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-18
[patent_title] => 'Method and system for executing applications in an untrusted environment'
[patent_app_type] => utility
[patent_app_number] => 14/440601
[patent_app_country] => US
[patent_app_date] => 2013-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4687
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14440601
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/440601 | Method and system for executing applications in an untrusted environment | Nov 5, 2013 | Issued |
Array
(
[id] => 9341465
[patent_doc_number] => 20140068249
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-06
[patent_title] => 'TRUST MANAGEMENT SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 14/071586
[patent_app_country] => US
[patent_app_date] => 2013-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 10716
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14071586
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/071586 | Trust management systems and methods | Nov 3, 2013 | Issued |
Array
(
[id] => 9549095
[patent_doc_number] => 20140173743
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'SYSTEM AND METHOD FOR DYNAMIC ANALYSIS TRACKING OBJECT ASSOCIATIONS FOR APPLICATION DATAFLOW'
[patent_app_type] => utility
[patent_app_number] => 14/067247
[patent_app_country] => US
[patent_app_date] => 2013-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11224
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14067247
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/067247 | System and method for dynamic analysis tracking object associations for application dataflow | Oct 29, 2013 | Issued |
Array
(
[id] => 10085496
[patent_doc_number] => 09122844
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-01
[patent_title] => 'Proxy device for managing digital rights'
[patent_app_type] => utility
[patent_app_number] => 14/066971
[patent_app_country] => US
[patent_app_date] => 2013-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 9849
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14066971
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/066971 | Proxy device for managing digital rights | Oct 29, 2013 | Issued |
Array
(
[id] => 11688250
[patent_doc_number] => 09686306
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Using supplemental encrypted signals to mitigate man-in-the-middle attacks on teleoperated systems'
[patent_app_type] => utility
[patent_app_number] => 14/438722
[patent_app_country] => US
[patent_app_date] => 2013-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 17427
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14438722
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/438722 | Using supplemental encrypted signals to mitigate man-in-the-middle attacks on teleoperated systems | Oct 29, 2013 | Issued |
Array
(
[id] => 10914684
[patent_doc_number] => 20140317703
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-23
[patent_title] => 'DESKTOP SHARING METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/066915
[patent_app_country] => US
[patent_app_date] => 2013-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2172
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14066915
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/066915 | DESKTOP SHARING METHOD AND SYSTEM | Oct 29, 2013 | Abandoned |
Array
(
[id] => 10137829
[patent_doc_number] => 09171150
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-27
[patent_title] => 'System and method for dynamic analysis tracking objects for application dataflow'
[patent_app_type] => utility
[patent_app_number] => 14/067131
[patent_app_country] => US
[patent_app_date] => 2013-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9318
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14067131
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/067131 | System and method for dynamic analysis tracking objects for application dataflow | Oct 29, 2013 | Issued |
Array
(
[id] => 11484432
[patent_doc_number] => 09591004
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-07
[patent_title] => 'Geographical intrusion response prioritization mapping through authentication and flight data correlation'
[patent_app_type] => utility
[patent_app_number] => 14/065333
[patent_app_country] => US
[patent_app_date] => 2013-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 6649
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14065333
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/065333 | Geographical intrusion response prioritization mapping through authentication and flight data correlation | Oct 27, 2013 | Issued |
Array
(
[id] => 9365672
[patent_doc_number] => 20140075545
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-13
[patent_title] => 'SECURELY EXECUTING AN APPLICATION ON A COMPUTER SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/064896
[patent_app_country] => US
[patent_app_date] => 2013-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16605
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14064896
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/064896 | SECURELY EXECUTING AN APPLICATION ON A COMPUTER SYSTEM | Oct 27, 2013 | Abandoned |
Array
(
[id] => 10139386
[patent_doc_number] => 09172715
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-27
[patent_title] => 'Stealth network attack monitoring'
[patent_app_type] => utility
[patent_app_number] => 14/060062
[patent_app_country] => US
[patent_app_date] => 2013-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5663
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14060062
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/060062 | Stealth network attack monitoring | Oct 21, 2013 | Issued |
Array
(
[id] => 10456774
[patent_doc_number] => 20150341789
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-26
[patent_title] => 'PREVENTING CLIENTS FROM ACCESSING A ROGUE ACCESS POINT'
[patent_app_type] => utility
[patent_app_number] => 14/652768
[patent_app_country] => US
[patent_app_date] => 2013-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3437
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14652768
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/652768 | PREVENTING CLIENTS FROM ACCESSING A ROGUE ACCESS POINT | Oct 17, 2013 | Abandoned |
Array
(
[id] => 10221633
[patent_doc_number] => 20150106626
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-16
[patent_title] => 'SHARED ENCRYPTED STORAGE'
[patent_app_type] => utility
[patent_app_number] => 14/051776
[patent_app_country] => US
[patent_app_date] => 2013-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8602
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14051776
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/051776 | Shared encrypted storage | Oct 10, 2013 | Issued |
Array
(
[id] => 10571268
[patent_doc_number] => 09294458
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-22
[patent_title] => 'Managing identity provider (IdP) identifiers for web real-time communications (WebRTC) interactive flows, and related methods, systems, and computer-readable media'
[patent_app_type] => utility
[patent_app_number] => 14/050891
[patent_app_country] => US
[patent_app_date] => 2013-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9281
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14050891
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/050891 | Managing identity provider (IdP) identifiers for web real-time communications (WebRTC) interactive flows, and related methods, systems, and computer-readable media | Oct 9, 2013 | Issued |
Array
(
[id] => 10111646
[patent_doc_number] => 09147063
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-29
[patent_title] => 'Passcode generation utilizing selected permutation type applied to tokencode and personal identifier'
[patent_app_type] => utility
[patent_app_number] => 14/039691
[patent_app_country] => US
[patent_app_date] => 2013-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 8
[patent_no_of_words] => 5674
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14039691
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/039691 | Passcode generation utilizing selected permutation type applied to tokencode and personal identifier | Sep 26, 2013 | Issued |
Array
(
[id] => 10011339
[patent_doc_number] => 09054878
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-09
[patent_title] => 'System and method for security authentication of power system'
[patent_app_type] => utility
[patent_app_number] => 14/039593
[patent_app_country] => US
[patent_app_date] => 2013-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2414
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14039593
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/039593 | System and method for security authentication of power system | Sep 26, 2013 | Issued |
Array
(
[id] => 10465217
[patent_doc_number] => 20150350232
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'Method, Device and System for Recognizing Network Behavior of Program'
[patent_app_type] => utility
[patent_app_number] => 14/653335
[patent_app_country] => US
[patent_app_date] => 2013-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 10506
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14653335
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/653335 | Method, device and system for recognizing network behavior of program | Sep 16, 2013 | Issued |
Array
(
[id] => 11903817
[patent_doc_number] => 09773253
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-26
[patent_title] => 'External feature integration system and method'
[patent_app_type] => utility
[patent_app_number] => 14/027150
[patent_app_country] => US
[patent_app_date] => 2013-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4164
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027150
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/027150 | External feature integration system and method | Sep 12, 2013 | Issued |
Array
(
[id] => 9992922
[patent_doc_number] => 09038144
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-19
[patent_title] => 'Mobility protocol selection by an authorization system'
[patent_app_type] => utility
[patent_app_number] => 14/020449
[patent_app_country] => US
[patent_app_date] => 2013-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4597
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14020449
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/020449 | Mobility protocol selection by an authorization system | Sep 5, 2013 | Issued |