
Eunja Adolphe
Examiner (ID: 1067)
| Most Active Art Unit | 2816 |
| Art Unit(s) | 2504, 2816 |
| Total Applications | 291 |
| Issued Applications | 234 |
| Pending Applications | 14 |
| Abandoned Applications | 43 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13783449
[patent_doc_number] => 20190005263
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-03
[patent_title] => METHOD AND SYSTEM FOR GRANTING A USER ACCESS TO A MEDICAL SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/639875
[patent_app_country] => US
[patent_app_date] => 2017-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13329
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15639875
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/639875 | Method and system for granting a user access to a medical system | Jun 29, 2017 | Issued |
Array
(
[id] => 14736543
[patent_doc_number] => 10387673
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Fully managed account level blob data encryption in a distributed storage environment
[patent_app_type] => utility
[patent_app_number] => 15/638434
[patent_app_country] => US
[patent_app_date] => 2017-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 19
[patent_no_of_words] => 23025
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15638434
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/638434 | Fully managed account level blob data encryption in a distributed storage environment | Jun 29, 2017 | Issued |
Array
(
[id] => 15387451
[patent_doc_number] => 10534915
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-14
[patent_title] => System for virtual patching security vulnerabilities in software containers
[patent_app_type] => utility
[patent_app_number] => 15/636694
[patent_app_country] => US
[patent_app_date] => 2017-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5523
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15636694
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/636694 | System for virtual patching security vulnerabilities in software containers | Jun 28, 2017 | Issued |
Array
(
[id] => 12398961
[patent_doc_number] => 09967247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-08
[patent_title] => Apparatus and method for managing security domains for a universal integrated circuit card
[patent_app_type] => utility
[patent_app_number] => 15/630181
[patent_app_country] => US
[patent_app_date] => 2017-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 11388
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630181
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/630181 | Apparatus and method for managing security domains for a universal integrated circuit card | Jun 21, 2017 | Issued |
Array
(
[id] => 14282881
[patent_doc_number] => 20190138725
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-09
[patent_title] => Systems And Methods For Remediating Memory Corruption In A Computer Application
[patent_app_type] => utility
[patent_app_number] => 16/307281
[patent_app_country] => US
[patent_app_date] => 2017-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12828
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -32
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16307281
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/307281 | Systems and methods for remediating memory corruption in a computer application | Jun 15, 2017 | Issued |
Array
(
[id] => 15705697
[patent_doc_number] => 10609044
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Enforcing access control in trigger-action programming using taint analysis
[patent_app_type] => utility
[patent_app_number] => 15/619593
[patent_app_country] => US
[patent_app_date] => 2017-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9577
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 258
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15619593
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/619593 | Enforcing access control in trigger-action programming using taint analysis | Jun 11, 2017 | Issued |
Array
(
[id] => 14287457
[patent_doc_number] => 20190141013
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-09
[patent_title] => METHOD AND SYSTEM FOR INFORMATIONAL CONTENT QUALITY VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/306603
[patent_app_country] => US
[patent_app_date] => 2017-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15466
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -36
[patent_words_short_claim] => 28
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16306603
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/306603 | METHOD AND SYSTEM FOR INFORMATIONAL CONTENT QUALITY VERIFICATION | Jun 3, 2017 | Abandoned |
Array
(
[id] => 14890351
[patent_doc_number] => 10425235
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-24
[patent_title] => Device and system with global tamper resistance
[patent_app_type] => utility
[patent_app_number] => 15/613088
[patent_app_country] => US
[patent_app_date] => 2017-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6918
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15613088
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/613088 | Device and system with global tamper resistance | Jun 1, 2017 | Issued |
Array
(
[id] => 13596609
[patent_doc_number] => 20180349853
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => HANDLING EMAIL FLOWS ARISING FROM TRANSACTIONS INITIATED WITH A SHARED PRIVILEGED IDENTITY AT A SERVICE PROVIDER
[patent_app_type] => utility
[patent_app_number] => 15/607741
[patent_app_country] => US
[patent_app_date] => 2017-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5668
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15607741
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/607741 | Handling email flows arising from transactions initiated with a shared privileged identity at a service provider | May 29, 2017 | Issued |
Array
(
[id] => 13560549
[patent_doc_number] => 20180331822
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-15
[patent_title] => SELECTIVE CONTENT SECURITY USING VISUAL HASHING
[patent_app_type] => utility
[patent_app_number] => 15/593755
[patent_app_country] => US
[patent_app_date] => 2017-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9419
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15593755
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/593755 | Selective content security using visual hashing | May 11, 2017 | Issued |
Array
(
[id] => 16046477
[patent_doc_number] => 10685112
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-16
[patent_title] => Machine learning model for malware dynamic analysis
[patent_app_type] => utility
[patent_app_number] => 15/588131
[patent_app_country] => US
[patent_app_date] => 2017-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7621
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15588131
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/588131 | Machine learning model for malware dynamic analysis | May 4, 2017 | Issued |
Array
(
[id] => 16046477
[patent_doc_number] => 10685112
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-16
[patent_title] => Machine learning model for malware dynamic analysis
[patent_app_type] => utility
[patent_app_number] => 15/588131
[patent_app_country] => US
[patent_app_date] => 2017-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7621
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15588131
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/588131 | Machine learning model for malware dynamic analysis | May 4, 2017 | Issued |
Array
(
[id] => 13516485
[patent_doc_number] => 20180309785
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-25
[patent_title] => ELECTRONIC SECURITY KEYS FOR DATA SECURITY BASED ON QUANTUM PARTICLE STATES THAT INDICATES TYPE OF ACCESS
[patent_app_type] => utility
[patent_app_number] => 15/496442
[patent_app_country] => US
[patent_app_date] => 2017-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8500
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15496442
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/496442 | Electronic security keys for data security based on quantum particle states that indicates type of access | Apr 24, 2017 | Issued |
Array
(
[id] => 14887491
[patent_doc_number] => 10423789
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-24
[patent_title] => Identification of suspicious system processes
[patent_app_type] => utility
[patent_app_number] => 15/477547
[patent_app_country] => US
[patent_app_date] => 2017-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3064
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15477547
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/477547 | Identification of suspicious system processes | Apr 2, 2017 | Issued |
Array
(
[id] => 11938876
[patent_doc_number] => 20170243026
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'METHOD AND APPARATUS FOR ENFORCING DATA PRIVACY'
[patent_app_type] => utility
[patent_app_number] => 15/450862
[patent_app_country] => US
[patent_app_date] => 2017-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13103
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15450862
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/450862 | Method and apparatus for enforcing data privacy | Mar 5, 2017 | Issued |
Array
(
[id] => 13407051
[patent_doc_number] => 20180255068
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-06
[patent_title] => PROTECTING CLIENTS FROM OPEN REDIRECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 15/447954
[patent_app_country] => US
[patent_app_date] => 2017-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10743
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15447954
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/447954 | Protecting clients from open redirect security vulnerabilities in web applications | Mar 1, 2017 | Issued |
Array
(
[id] => 15639409
[patent_doc_number] => 10592698
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-17
[patent_title] => Analog-based multiple-bit chip security
[patent_app_type] => utility
[patent_app_number] => 15/446211
[patent_app_country] => US
[patent_app_date] => 2017-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 7264
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15446211
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/446211 | Analog-based multiple-bit chip security | Feb 28, 2017 | Issued |
Array
(
[id] => 12796792
[patent_doc_number] => 20180157433
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-07
[patent_title] => INTER-APPLICATION SECURE DATA SHARING WORKFLOW
[patent_app_type] => utility
[patent_app_number] => 15/442239
[patent_app_country] => US
[patent_app_date] => 2017-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12190
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15442239
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/442239 | Inter-application secure data sharing workflow | Feb 23, 2017 | Issued |
Array
(
[id] => 11694019
[patent_doc_number] => 20170169735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-15
[patent_title] => 'Cryptographic Machines With N-state Lab-transformed Switching Devices'
[patent_app_type] => utility
[patent_app_number] => 15/442556
[patent_app_country] => US
[patent_app_date] => 2017-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 30619
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15442556
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/442556 | Cryptographic machines with N-state lab-transformed switching devices | Feb 23, 2017 | Issued |
Array
(
[id] => 13380441
[patent_doc_number] => 20180241762
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-23
[patent_title] => ANOMALY SELECTION USING DISTANCE METRIC-BASED DIVERSITY AND RELEVANCE
[patent_app_type] => utility
[patent_app_number] => 15/440116
[patent_app_country] => US
[patent_app_date] => 2017-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10035
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15440116
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/440116 | Anomaly selection using distance metric-based diversity and relevance | Feb 22, 2017 | Issued |