
Erich A. Leeser
Examiner (ID: 3, Phone: (571)272-9932 , Office: P/1624 )
| Most Active Art Unit | 1624 |
| Art Unit(s) | 1622, 1624 |
| Total Applications | 1723 |
| Issued Applications | 1323 |
| Pending Applications | 89 |
| Abandoned Applications | 339 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
| 14/014206 | SECURE MANAGEMENT ACCESS CONTROL FOR COMPUTERS, EMBEDDED AND CARD EMBODIMENT | Aug 28, 2013 | Abandoned |
Array
(
[id] => 9264819
[patent_doc_number] => 20130346748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'SYSTEMS AND METHODS FOR SECURE MULTI-TENANT DATA STORAGE'
[patent_app_type] => utility
[patent_app_number] => 13/973637
[patent_app_country] => US
[patent_app_date] => 2013-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 61
[patent_figures_cnt] => 61
[patent_no_of_words] => 55459
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13973637
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/973637 | Systems and methods for secure multi-tenant data storage | Aug 21, 2013 | Issued |
Array
(
[id] => 10454479
[patent_doc_number] => 20150339493
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-26
[patent_title] => 'PRIVACY PROTECTION AGAINST CURIOUS RECOMMENDERS'
[patent_app_type] => utility
[patent_app_number] => 14/652713
[patent_app_country] => US
[patent_app_date] => 2013-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8340
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14652713
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/652713 | PRIVACY PROTECTION AGAINST CURIOUS RECOMMENDERS | Aug 6, 2013 | Abandoned |
Array
(
[id] => 9860211
[patent_doc_number] => 20150040228
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'SELECTION OF A COUNTERMEASURE'
[patent_app_type] => utility
[patent_app_number] => 13/955552
[patent_app_country] => US
[patent_app_date] => 2013-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6738
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13955552
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/955552 | Selection of a countermeasure | Jul 30, 2013 | Issued |
Array
(
[id] => 9308559
[patent_doc_number] => 20140047233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-13
[patent_title] => 'SYSTEM AND METHODS FOR AUTOMATED TRANSACTION KEY GENERATION AND AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/955588
[patent_app_country] => US
[patent_app_date] => 2013-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7589
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13955588
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/955588 | SYSTEM AND METHODS FOR AUTOMATED TRANSACTION KEY GENERATION AND AUTHENTICATION | Jul 30, 2013 | Abandoned |
Array
(
[id] => 9821268
[patent_doc_number] => 08931071
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-06
[patent_title] => 'Biometric authentication for video communication sessions'
[patent_app_type] => utility
[patent_app_number] => 13/941972
[patent_app_country] => US
[patent_app_date] => 2013-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4923
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13941972
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/941972 | Biometric authentication for video communication sessions | Jul 14, 2013 | Issued |
Array
(
[id] => 9829550
[patent_doc_number] => 08938788
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-20
[patent_title] => 'Associating computing devices with common credentials'
[patent_app_type] => utility
[patent_app_number] => 13/937744
[patent_app_country] => US
[patent_app_date] => 2013-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4963
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13937744
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/937744 | Associating computing devices with common credentials | Jul 8, 2013 | Issued |
Array
(
[id] => 9707718
[patent_doc_number] => 08832814
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-09
[patent_title] => 'System and method for providing access to a software application'
[patent_app_type] => utility
[patent_app_number] => 13/934190
[patent_app_country] => US
[patent_app_date] => 2013-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7667
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13934190
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/934190 | System and method for providing access to a software application | Jul 1, 2013 | Issued |
Array
(
[id] => 10080626
[patent_doc_number] => 09118487
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-25
[patent_title] => 'Asymmetric encryption scheme with expiring revocable certificates having a predefined validity period'
[patent_app_type] => utility
[patent_app_number] => 13/931167
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 3320
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13931167
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/931167 | Asymmetric encryption scheme with expiring revocable certificates having a predefined validity period | Jun 27, 2013 | Issued |
Array
(
[id] => 9926614
[patent_doc_number] => 08984602
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-17
[patent_title] => 'Protected resource access control utilizing credentials based on message authentication codes and hash chain values'
[patent_app_type] => utility
[patent_app_number] => 13/931083
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 10453
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13931083
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/931083 | Protected resource access control utilizing credentials based on message authentication codes and hash chain values | Jun 27, 2013 | Issued |
Array
(
[id] => 10126350
[patent_doc_number] => 09160726
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-10-13
[patent_title] => 'Authentication system with selective authentication method based on risk reasoning'
[patent_app_type] => utility
[patent_app_number] => 13/931151
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4587
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13931151
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/931151 | Authentication system with selective authentication method based on risk reasoning | Jun 27, 2013 | Issued |
Array
(
[id] => 10488017
[patent_doc_number] => 20150373038
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-24
[patent_title] => 'CYBER SECURITY MONITORING SYSTEM AND METHOD FOR DATA CENTER COMPONENTS'
[patent_app_type] => utility
[patent_app_number] => 14/409959
[patent_app_country] => US
[patent_app_date] => 2013-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3482
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14409959
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/409959 | Cyber security monitoring system and method for data center components | Jun 20, 2013 | Issued |
Array
(
[id] => 10488119
[patent_doc_number] => 20150373140
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-24
[patent_title] => 'CLIENT SIDE INITIATED CACHING CONTROL'
[patent_app_type] => utility
[patent_app_number] => 14/410571
[patent_app_country] => US
[patent_app_date] => 2013-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2770
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14410571
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/410571 | CLIENT SIDE INITIATED CACHING CONTROL | Jun 19, 2013 | Abandoned |
Array
(
[id] => 10439545
[patent_doc_number] => 20150324557
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'ELECTRONIC DEVICE, UNLOCKING METHOD, AND NON-TRANSITORY STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 14/443428
[patent_app_country] => US
[patent_app_date] => 2013-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12024
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14443428
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/443428 | Electronic device, unlocking method, and non-transitory storage medium | Jun 13, 2013 | Issued |
Array
(
[id] => 9137231
[patent_doc_number] => 20130297946
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-07
[patent_title] => 'SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES'
[patent_app_type] => utility
[patent_app_number] => 13/912454
[patent_app_country] => US
[patent_app_date] => 2013-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12726
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13912454
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/912454 | Selective authorization of the loading of dependent code modules by running processes | Jun 6, 2013 | Issued |
Array
(
[id] => 9452042
[patent_doc_number] => 20140123212
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-01
[patent_title] => 'System And Method For Securing Virtualized Networks'
[patent_app_type] => utility
[patent_app_number] => 13/911925
[patent_app_country] => US
[patent_app_date] => 2013-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10560
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13911925
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/911925 | System and method for securing virtualized networks | Jun 5, 2013 | Issued |
Array
(
[id] => 9036559
[patent_doc_number] => 20130239197
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-12
[patent_title] => 'IC CHIP, INFORMATION PROCESSING APPARATUS, SYSTEM, METHOD, AND PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/889048
[patent_app_country] => US
[patent_app_date] => 2013-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9986
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13889048
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/889048 | IC chip, information processing apparatus, system, method, and program | May 6, 2013 | Issued |
Array
(
[id] => 10907382
[patent_doc_number] => 20140310396
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-16
[patent_title] => 'IDENTIFICATION AND CLASSIFICATION OF WEB TRAFFIC INSIDE ENCRYPTED NETWORK TUNNELS'
[patent_app_type] => utility
[patent_app_number] => 13/862601
[patent_app_country] => US
[patent_app_date] => 2013-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4959
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13862601
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/862601 | Identification and classification of web traffic inside encrypted network tunnels | Apr 14, 2013 | Issued |
Array
(
[id] => 9452041
[patent_doc_number] => 20140123211
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-01
[patent_title] => 'System And Method For Securing Virtualized Networks'
[patent_app_type] => utility
[patent_app_number] => 13/842695
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10538
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13842695
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/842695 | System and method for securing virtualized networks | Mar 14, 2013 | Issued |
Array
(
[id] => 16219576
[patent_doc_number] => 10735408
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => Application connection for devices in a network
[patent_app_type] => utility
[patent_app_number] => 13/803673
[patent_app_country] => US
[patent_app_date] => 2013-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 4537
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13803673
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/803673 | Application connection for devices in a network | Mar 13, 2013 | Issued |