Search

Erich A. Leeser

Examiner (ID: 3, Phone: (571)272-9932 , Office: P/1624 )

Most Active Art Unit
1624
Art Unit(s)
1622, 1624
Total Applications
1723
Issued Applications
1323
Pending Applications
89
Abandoned Applications
339

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10944153 [patent_doc_number] => 20140347173 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-11-27 [patent_title] => 'METHOD USED IN A SYSTEM FOR REMOTELY CONTROLLING AN APPLIANCE' [patent_app_type] => utility [patent_app_number] => 14/359742 [patent_app_country] => US [patent_app_date] => 2013-11-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 35 [patent_figures_cnt] => 35 [patent_no_of_words] => 31893 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14359742 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/359742
Method used in a system for remotely controlling an appliance Nov 10, 2013 Issued
Array ( [id] => 11741801 [patent_doc_number] => 09706407 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-07-11 [patent_title] => 'Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same' [patent_app_type] => utility [patent_app_number] => 14/443788 [patent_app_country] => US [patent_app_date] => 2013-11-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 16 [patent_no_of_words] => 10093 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14443788 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/443788
Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same Nov 5, 2013 Issued
Array ( [id] => 11752658 [patent_doc_number] => 09710674 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-07-18 [patent_title] => 'Method and system for executing applications in an untrusted environment' [patent_app_type] => utility [patent_app_number] => 14/440601 [patent_app_country] => US [patent_app_date] => 2013-11-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4687 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14440601 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/440601
Method and system for executing applications in an untrusted environment Nov 5, 2013 Issued
Array ( [id] => 9341465 [patent_doc_number] => 20140068249 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-06 [patent_title] => 'TRUST MANAGEMENT SYSTEMS AND METHODS' [patent_app_type] => utility [patent_app_number] => 14/071586 [patent_app_country] => US [patent_app_date] => 2013-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 10716 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14071586 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/071586
Trust management systems and methods Nov 3, 2013 Issued
Array ( [id] => 9549095 [patent_doc_number] => 20140173743 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-19 [patent_title] => 'SYSTEM AND METHOD FOR DYNAMIC ANALYSIS TRACKING OBJECT ASSOCIATIONS FOR APPLICATION DATAFLOW' [patent_app_type] => utility [patent_app_number] => 14/067247 [patent_app_country] => US [patent_app_date] => 2013-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 11224 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14067247 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/067247
System and method for dynamic analysis tracking object associations for application dataflow Oct 29, 2013 Issued
Array ( [id] => 10085496 [patent_doc_number] => 09122844 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-09-01 [patent_title] => 'Proxy device for managing digital rights' [patent_app_type] => utility [patent_app_number] => 14/066971 [patent_app_country] => US [patent_app_date] => 2013-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 9 [patent_no_of_words] => 9849 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 186 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14066971 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/066971
Proxy device for managing digital rights Oct 29, 2013 Issued
Array ( [id] => 11688250 [patent_doc_number] => 09686306 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-06-20 [patent_title] => 'Using supplemental encrypted signals to mitigate man-in-the-middle attacks on teleoperated systems' [patent_app_type] => utility [patent_app_number] => 14/438722 [patent_app_country] => US [patent_app_date] => 2013-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 12 [patent_no_of_words] => 17427 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 232 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14438722 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/438722
Using supplemental encrypted signals to mitigate man-in-the-middle attacks on teleoperated systems Oct 29, 2013 Issued
Array ( [id] => 10914684 [patent_doc_number] => 20140317703 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-23 [patent_title] => 'DESKTOP SHARING METHOD AND SYSTEM' [patent_app_type] => utility [patent_app_number] => 14/066915 [patent_app_country] => US [patent_app_date] => 2013-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2172 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14066915 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/066915
DESKTOP SHARING METHOD AND SYSTEM Oct 29, 2013 Abandoned
Array ( [id] => 10137829 [patent_doc_number] => 09171150 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-27 [patent_title] => 'System and method for dynamic analysis tracking objects for application dataflow' [patent_app_type] => utility [patent_app_number] => 14/067131 [patent_app_country] => US [patent_app_date] => 2013-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 9318 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14067131 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/067131
System and method for dynamic analysis tracking objects for application dataflow Oct 29, 2013 Issued
Array ( [id] => 11484432 [patent_doc_number] => 09591004 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-03-07 [patent_title] => 'Geographical intrusion response prioritization mapping through authentication and flight data correlation' [patent_app_type] => utility [patent_app_number] => 14/065333 [patent_app_country] => US [patent_app_date] => 2013-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 6649 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14065333 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/065333
Geographical intrusion response prioritization mapping through authentication and flight data correlation Oct 27, 2013 Issued
Array ( [id] => 9365672 [patent_doc_number] => 20140075545 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-13 [patent_title] => 'SECURELY EXECUTING AN APPLICATION ON A COMPUTER SYSTEM' [patent_app_type] => utility [patent_app_number] => 14/064896 [patent_app_country] => US [patent_app_date] => 2013-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 16605 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14064896 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/064896
SECURELY EXECUTING AN APPLICATION ON A COMPUTER SYSTEM Oct 27, 2013 Abandoned
Array ( [id] => 10139386 [patent_doc_number] => 09172715 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-27 [patent_title] => 'Stealth network attack monitoring' [patent_app_type] => utility [patent_app_number] => 14/060062 [patent_app_country] => US [patent_app_date] => 2013-10-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 5663 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14060062 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/060062
Stealth network attack monitoring Oct 21, 2013 Issued
Array ( [id] => 10456774 [patent_doc_number] => 20150341789 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-26 [patent_title] => 'PREVENTING CLIENTS FROM ACCESSING A ROGUE ACCESS POINT' [patent_app_type] => utility [patent_app_number] => 14/652768 [patent_app_country] => US [patent_app_date] => 2013-10-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3437 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14652768 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/652768
PREVENTING CLIENTS FROM ACCESSING A ROGUE ACCESS POINT Oct 17, 2013 Abandoned
Array ( [id] => 10221633 [patent_doc_number] => 20150106626 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-16 [patent_title] => 'SHARED ENCRYPTED STORAGE' [patent_app_type] => utility [patent_app_number] => 14/051776 [patent_app_country] => US [patent_app_date] => 2013-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8602 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14051776 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/051776
Shared encrypted storage Oct 10, 2013 Issued
Array ( [id] => 10571268 [patent_doc_number] => 09294458 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-22 [patent_title] => 'Managing identity provider (IdP) identifiers for web real-time communications (WebRTC) interactive flows, and related methods, systems, and computer-readable media' [patent_app_type] => utility [patent_app_number] => 14/050891 [patent_app_country] => US [patent_app_date] => 2013-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9281 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14050891 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/050891
Managing identity provider (IdP) identifiers for web real-time communications (WebRTC) interactive flows, and related methods, systems, and computer-readable media Oct 9, 2013 Issued
Array ( [id] => 10111646 [patent_doc_number] => 09147063 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-09-29 [patent_title] => 'Passcode generation utilizing selected permutation type applied to tokencode and personal identifier' [patent_app_type] => utility [patent_app_number] => 14/039691 [patent_app_country] => US [patent_app_date] => 2013-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 8 [patent_no_of_words] => 5674 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 92 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14039691 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/039691
Passcode generation utilizing selected permutation type applied to tokencode and personal identifier Sep 26, 2013 Issued
Array ( [id] => 10011339 [patent_doc_number] => 09054878 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-09 [patent_title] => 'System and method for security authentication of power system' [patent_app_type] => utility [patent_app_number] => 14/039593 [patent_app_country] => US [patent_app_date] => 2013-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2414 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14039593 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/039593
System and method for security authentication of power system Sep 26, 2013 Issued
Array ( [id] => 10465217 [patent_doc_number] => 20150350232 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'Method, Device and System for Recognizing Network Behavior of Program' [patent_app_type] => utility [patent_app_number] => 14/653335 [patent_app_country] => US [patent_app_date] => 2013-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 10506 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14653335 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/653335
Method, device and system for recognizing network behavior of program Sep 16, 2013 Issued
Array ( [id] => 11903817 [patent_doc_number] => 09773253 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-26 [patent_title] => 'External feature integration system and method' [patent_app_type] => utility [patent_app_number] => 14/027150 [patent_app_country] => US [patent_app_date] => 2013-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 4164 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 201 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027150 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/027150
External feature integration system and method Sep 12, 2013 Issued
Array ( [id] => 9992922 [patent_doc_number] => 09038144 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-05-19 [patent_title] => 'Mobility protocol selection by an authorization system' [patent_app_type] => utility [patent_app_number] => 14/020449 [patent_app_country] => US [patent_app_date] => 2013-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4597 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14020449 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/020449
Mobility protocol selection by an authorization system Sep 5, 2013 Issued
Menu