
Eunja Adolphe
Examiner (ID: 1067)
| Most Active Art Unit | 2816 |
| Art Unit(s) | 2504, 2816 |
| Total Applications | 291 |
| Issued Applications | 234 |
| Pending Applications | 14 |
| Abandoned Applications | 43 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12696799
[patent_doc_number] => 20180124099
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => SYSTEM AND METHOD FOR SCALED MANAGEMENT OF THREAT DATA
[patent_app_type] => utility
[patent_app_number] => 15/342770
[patent_app_country] => US
[patent_app_date] => 2016-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7214
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15342770
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/342770 | System and method for scaled management of threat data | Nov 2, 2016 | Issued |
Array
(
[id] => 16066365
[patent_doc_number] => 10692138
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-06-23
[patent_title] => Secure data exchange
[patent_app_type] => utility
[patent_app_number] => 15/337879
[patent_app_country] => US
[patent_app_date] => 2016-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7964
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15337879
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/337879 | Secure data exchange | Oct 27, 2016 | Issued |
Array
(
[id] => 12671143
[patent_doc_number] => 20180115547
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-26
[patent_title] => EDGE PROTECTION FOR INTERNAL IDENTITY PROVIDERS
[patent_app_type] => utility
[patent_app_number] => 15/332807
[patent_app_country] => US
[patent_app_date] => 2016-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4513
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 52
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15332807
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/332807 | Edge protection for internal identity providers | Oct 23, 2016 | Issued |
Array
(
[id] => 17501769
[patent_doc_number] => 11290490
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-29
[patent_title] => Cloud service security management
[patent_app_type] => utility
[patent_app_number] => 16/340793
[patent_app_country] => US
[patent_app_date] => 2016-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7887
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16340793
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/340793 | Cloud service security management | Oct 11, 2016 | Issued |
Array
(
[id] => 14673723
[patent_doc_number] => 10374791
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-06
[patent_title] => Method of protecting electronic circuit against eavesdropping by power analysis and electronic circuit using the same
[patent_app_type] => utility
[patent_app_number] => 15/285466
[patent_app_country] => US
[patent_app_date] => 2016-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3912
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15285466
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/285466 | Method of protecting electronic circuit against eavesdropping by power analysis and electronic circuit using the same | Oct 3, 2016 | Issued |
Array
(
[id] => 11477095
[patent_doc_number] => 20170063878
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'SECURITY AWARE EMAIL SERVER'
[patent_app_type] => utility
[patent_app_number] => 15/252656
[patent_app_country] => US
[patent_app_date] => 2016-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3266
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15252656
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/252656 | Security aware email server | Aug 30, 2016 | Issued |
Array
(
[id] => 11593780
[patent_doc_number] => 20170118192
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-27
[patent_title] => 'SYSTEMS AND METHODS FOR CONTROLLING A LOCAL APPLICATION THROUGH A WEB PAGE'
[patent_app_type] => utility
[patent_app_number] => 15/251982
[patent_app_country] => US
[patent_app_date] => 2016-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12548
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15251982
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/251982 | Systems and methods for controlling a local application through a web page | Aug 29, 2016 | Issued |
Array
(
[id] => 11882933
[patent_doc_number] => 09754108
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-05
[patent_title] => 'Method and apparatus of performing data executable integrity verification'
[patent_app_type] => utility
[patent_app_number] => 15/225566
[patent_app_country] => US
[patent_app_date] => 2016-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 3477
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15225566
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/225566 | Method and apparatus of performing data executable integrity verification | Jul 31, 2016 | Issued |
Array
(
[id] => 12296721
[patent_doc_number] => 09935932
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-03
[patent_title] => Wireless sensor field enumeration
[patent_app_type] => utility
[patent_app_number] => 15/212596
[patent_app_country] => US
[patent_app_date] => 2016-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 6838
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15212596
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/212596 | Wireless sensor field enumeration | Jul 17, 2016 | Issued |
Array
(
[id] => 15235291
[patent_doc_number] => 10505378
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-10
[patent_title] => Ensuring backward compatibility in battery authentication applications
[patent_app_type] => utility
[patent_app_number] => 15/199237
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6356
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15199237
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/199237 | Ensuring backward compatibility in battery authentication applications | Jun 29, 2016 | Issued |
Array
(
[id] => 15517577
[patent_doc_number] => 10565378
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-18
[patent_title] => Exploit of privilege detection framework
[patent_app_type] => utility
[patent_app_number] => 15/197661
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 11600
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 283
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197661
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197661 | Exploit of privilege detection framework | Jun 28, 2016 | Issued |
Array
(
[id] => 11095445
[patent_doc_number] => 20160292414
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'TECHNIQUES FOR DYNAMIC DOMAIN-BASED ISOLATION'
[patent_app_type] => utility
[patent_app_number] => 15/180082
[patent_app_country] => US
[patent_app_date] => 2016-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10286
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15180082
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/180082 | TECHNIQUES FOR DYNAMIC DOMAIN-BASED ISOLATION | Jun 12, 2016 | Abandoned |
Array
(
[id] => 13953529
[patent_doc_number] => 10212562
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-19
[patent_title] => Method and systems to support dynamic reconfiguration of document devices
[patent_app_type] => utility
[patent_app_number] => 15/172051
[patent_app_country] => US
[patent_app_date] => 2016-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3461
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 283
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15172051
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/172051 | Method and systems to support dynamic reconfiguration of document devices | Jun 1, 2016 | Issued |
Array
(
[id] => 11133199
[patent_doc_number] => 20160330175
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-10
[patent_title] => 'SECURE ELEMENT ACTIVITIES'
[patent_app_type] => utility
[patent_app_number] => 15/146771
[patent_app_country] => US
[patent_app_date] => 2016-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7909
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15146771
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/146771 | Secure element activities | May 3, 2016 | Issued |
Array
(
[id] => 11037291
[patent_doc_number] => 20160234247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'Diversity Analysis with Actionable Feedback Methodologies'
[patent_app_type] => utility
[patent_app_number] => 15/099297
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 16178
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099297
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/099297 | Diversity analysis with actionable feedback methodologies | Apr 13, 2016 | Issued |
Array
(
[id] => 11037291
[patent_doc_number] => 20160234247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'Diversity Analysis with Actionable Feedback Methodologies'
[patent_app_type] => utility
[patent_app_number] => 15/099297
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 16178
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099297
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/099297 | Diversity analysis with actionable feedback methodologies | Apr 13, 2016 | Issued |
Array
(
[id] => 11037291
[patent_doc_number] => 20160234247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'Diversity Analysis with Actionable Feedback Methodologies'
[patent_app_type] => utility
[patent_app_number] => 15/099297
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 16178
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099297
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/099297 | Diversity analysis with actionable feedback methodologies | Apr 13, 2016 | Issued |
Array
(
[id] => 11037291
[patent_doc_number] => 20160234247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'Diversity Analysis with Actionable Feedback Methodologies'
[patent_app_type] => utility
[patent_app_number] => 15/099297
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 16178
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099297
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/099297 | Diversity analysis with actionable feedback methodologies | Apr 13, 2016 | Issued |
Array
(
[id] => 11579769
[patent_doc_number] => 09635042
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Risk ranking referential links in electronic messages'
[patent_app_type] => utility
[patent_app_number] => 15/096824
[patent_app_country] => US
[patent_app_date] => 2016-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8467
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15096824
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/096824 | Risk ranking referential links in electronic messages | Apr 11, 2016 | Issued |
Array
(
[id] => 13530239
[patent_doc_number] => 20180316662
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2018-11-01
[patent_title] => Embedded trusted network security perimeter in computing systems based on ARM processors
[patent_app_type] => utility
[patent_app_number] => 15/063625
[patent_app_country] => US
[patent_app_date] => 2016-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2388
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15063625
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/063625 | Embedded trusted network security perimeter in computing systems based on ARM processors | Mar 7, 2016 | Issued |