Search

Erich A. Leeser

Examiner (ID: 3, Phone: (571)272-9932 , Office: P/1624 )

Most Active Art Unit
1624
Art Unit(s)
1622, 1624
Total Applications
1723
Issued Applications
1323
Pending Applications
89
Abandoned Applications
339

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8247134 [patent_doc_number] => 08205078 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-06-19 [patent_title] => 'Handling files containing confidential or sensitive information' [patent_app_type] => utility [patent_app_number] => 12/389495 [patent_app_country] => US [patent_app_date] => 2009-02-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 3707 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/205/08205078.pdf [firstpage_image] =>[orig_patent_app_number] => 12389495 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/389495
Handling files containing confidential or sensitive information Feb 19, 2009 Issued
Array ( [id] => 5280823 [patent_doc_number] => 20090132955 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-05-21 [patent_title] => 'DATA VALIDATION USING SIGNATURES AND SAMPLING' [patent_app_type] => utility [patent_app_number] => 12/358695 [patent_app_country] => US [patent_app_date] => 2009-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8456 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0132/20090132955.pdf [firstpage_image] =>[orig_patent_app_number] => 12358695 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/358695
Data validation using signatures and sampling Jan 22, 2009 Issued
Array ( [id] => 5411724 [patent_doc_number] => 20090125623 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-05-14 [patent_title] => 'DATA VALIDATION USING SIGNATURES AND SAMPLING' [patent_app_type] => utility [patent_app_number] => 12/358686 [patent_app_country] => US [patent_app_date] => 2009-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8460 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0125/20090125623.pdf [firstpage_image] =>[orig_patent_app_number] => 12358686 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/358686
Data validation using signatures and sampling Jan 22, 2009 Issued
Array ( [id] => 5424521 [patent_doc_number] => 20090150977 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-06-11 [patent_title] => 'SECURE REMOTE MANAGEMENT APPLIANCE' [patent_app_type] => utility [patent_app_number] => 12/352161 [patent_app_country] => US [patent_app_date] => 2009-01-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 42 [patent_figures_cnt] => 42 [patent_no_of_words] => 14976 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0150/20090150977.pdf [firstpage_image] =>[orig_patent_app_number] => 12352161 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/352161
Secure remote management appliance Jan 11, 2009 Issued
Array ( [id] => 5538281 [patent_doc_number] => 20090220086 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-09-03 [patent_title] => 'METHOD AND SYSTEM FOR SECURED WIRELESS DATA TRANSMISSION TO AND FROM A REMOTE DEVICE' [patent_app_type] => utility [patent_app_number] => 12/347650 [patent_app_country] => US [patent_app_date] => 2008-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 7145 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0220/20090220086.pdf [firstpage_image] =>[orig_patent_app_number] => 12347650 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/347650
Method and system for secured wireless data transmission to and from a remote device Dec 30, 2008 Issued
Array ( [id] => 8923938 [patent_doc_number] => 08489887 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-07-16 [patent_title] => 'Biometric authentication for video communication sessions' [patent_app_type] => utility [patent_app_number] => 12/347838 [patent_app_country] => US [patent_app_date] => 2008-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4889 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12347838 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/347838
Biometric authentication for video communication sessions Dec 30, 2008 Issued
Array ( [id] => 8285712 [patent_doc_number] => 08219825 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-07-10 [patent_title] => 'Debugging port security interface' [patent_app_type] => utility [patent_app_number] => 12/325853 [patent_app_country] => US [patent_app_date] => 2008-12-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 26 [patent_figures_cnt] => 33 [patent_no_of_words] => 6217 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 140 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12325853 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/325853
Debugging port security interface Nov 30, 2008 Issued
Array ( [id] => 8011315 [patent_doc_number] => 08087076 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-12-27 [patent_title] => 'Method and apparatus for preventing loading and execution of rogue operating systems in a logical partitioned data processing system' [patent_app_type] => utility [patent_app_number] => 12/257520 [patent_app_country] => US [patent_app_date] => 2008-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 5136 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/087/08087076.pdf [firstpage_image] =>[orig_patent_app_number] => 12257520 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/257520
Method and apparatus for preventing loading and execution of rogue operating systems in a logical partitioned data processing system Oct 23, 2008 Issued
Array ( [id] => 5356417 [patent_doc_number] => 20090187761 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-07-23 [patent_title] => 'Methods and systems for proofing identities using a certificate authority' [patent_app_type] => utility [patent_app_number] => 12/219268 [patent_app_country] => US [patent_app_date] => 2008-07-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 65 [patent_figures_cnt] => 65 [patent_no_of_words] => 12101 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0187/20090187761.pdf [firstpage_image] =>[orig_patent_app_number] => 12219268 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/219268
Methods and systems for proofing identities using a certificate authority Jul 17, 2008 Issued
Array ( [id] => 5523146 [patent_doc_number] => 20090031127 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-29 [patent_title] => 'Methods and systems for proofing identities using a certificate authority' [patent_app_type] => utility [patent_app_number] => 12/219269 [patent_app_country] => US [patent_app_date] => 2008-07-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 65 [patent_figures_cnt] => 65 [patent_no_of_words] => 12102 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0031/20090031127.pdf [firstpage_image] =>[orig_patent_app_number] => 12219269 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/219269
Methods and systems for proofing identities using a certificate authority Jul 17, 2008 Issued
Array ( [id] => 5520345 [patent_doc_number] => 20090028326 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-29 [patent_title] => 'Methods and apparatus performing hash operations in a cryptography accelerator' [patent_app_type] => utility [patent_app_number] => 12/216243 [patent_app_country] => US [patent_app_date] => 2008-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6465 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0028/20090028326.pdf [firstpage_image] =>[orig_patent_app_number] => 12216243 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/216243
Methods and apparatus performing hash operations in a cryptography accelerator Jun 30, 2008 Issued
Array ( [id] => 5523145 [patent_doc_number] => 20090031126 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-29 [patent_title] => 'Trust Management Systems and Methods' [patent_app_type] => utility [patent_app_number] => 12/147264 [patent_app_country] => US [patent_app_date] => 2008-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 10660 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0031/20090031126.pdf [firstpage_image] =>[orig_patent_app_number] => 12147264 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/147264
Trust management systems and methods Jun 25, 2008 Issued
Array ( [id] => 4700240 [patent_doc_number] => 20080222424 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-09-11 [patent_title] => 'Method And Apparatus For Path Concealment In Networks And Graphs' [patent_app_type] => utility [patent_app_number] => 12/128701 [patent_app_country] => US [patent_app_date] => 2008-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 3774 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0222/20080222424.pdf [firstpage_image] =>[orig_patent_app_number] => 12128701 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/128701
Method and apparatus for path concealment in networks and graphs May 28, 2008 Issued
Array ( [id] => 5306076 [patent_doc_number] => 20090300704 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-03 [patent_title] => 'Presentity Rules for Location Authorization in a Communication System' [patent_app_type] => utility [patent_app_number] => 12/127443 [patent_app_country] => US [patent_app_date] => 2008-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5522 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0300/20090300704.pdf [firstpage_image] =>[orig_patent_app_number] => 12127443 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/127443
Presentity Rules for Location Authorization in a Communication System May 26, 2008 Abandoned
Array ( [id] => 9101544 [patent_doc_number] => 08565434 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-22 [patent_title] => 'Methods and systems for maintaining security keys for wireless communication' [patent_app_type] => utility [patent_app_number] => 12/127377 [patent_app_country] => US [patent_app_date] => 2008-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 12 [patent_no_of_words] => 6383 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12127377 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/127377
Methods and systems for maintaining security keys for wireless communication May 26, 2008 Issued
Array ( [id] => 8297611 [patent_doc_number] => 08225412 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-07-17 [patent_title] => 'Document verification method, document verification apparatus and storage medium' [patent_app_type] => utility [patent_app_number] => 12/127320 [patent_app_country] => US [patent_app_date] => 2008-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 8066 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 257 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12127320 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/127320
Document verification method, document verification apparatus and storage medium May 26, 2008 Issued
Array ( [id] => 8763537 [patent_doc_number] => 08424076 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-04-16 [patent_title] => 'Utilizing virtual private networks to provide object level security on a multi-node computer system' [patent_app_type] => utility [patent_app_number] => 12/127077 [patent_app_country] => US [patent_app_date] => 2008-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 11 [patent_no_of_words] => 4579 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12127077 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/127077
Utilizing virtual private networks to provide object level security on a multi-node computer system May 26, 2008 Issued
Array ( [id] => 5306240 [patent_doc_number] => 20090300753 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-03 [patent_title] => 'METHOD FOR PREVENTING DATA IN A COMPUTER SYSTEM FROM BEING ACCESSED BY UNAUTHORIZED USER' [patent_app_type] => utility [patent_app_number] => 12/127061 [patent_app_country] => US [patent_app_date] => 2008-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3018 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0300/20090300753.pdf [firstpage_image] =>[orig_patent_app_number] => 12127061 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/127061
Method for preventing data in a computer system from being accessed by unauthorized user May 26, 2008 Issued
Array ( [id] => 8401647 [patent_doc_number] => 08272044 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-09-18 [patent_title] => 'Method and system to mitigate low rate denial of service (DoS) attacks' [patent_app_type] => utility [patent_app_number] => 12/127246 [patent_app_country] => US [patent_app_date] => 2008-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 17 [patent_no_of_words] => 6878 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 159 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12127246 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/127246
Method and system to mitigate low rate denial of service (DoS) attacks May 26, 2008 Issued
Array ( [id] => 8693451 [patent_doc_number] => 08392991 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-03-05 [patent_title] => 'Proactive test-based differentiation method and system to mitigate low rate DoS attacks' [patent_app_type] => utility [patent_app_number] => 12/127235 [patent_app_country] => US [patent_app_date] => 2008-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 17 [patent_no_of_words] => 6811 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12127235 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/127235
Proactive test-based differentiation method and system to mitigate low rate DoS attacks May 26, 2008 Issued
Menu