Search

Eunja Adolphe

Examiner (ID: 1067)

Most Active Art Unit
2816
Art Unit(s)
2504, 2816
Total Applications
291
Issued Applications
234
Pending Applications
14
Abandoned Applications
43

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9372815 [patent_doc_number] => 20140082688 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-20 [patent_title] => 'RULE-BASED DERIVED-GROUP SECURITY DATA MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 13/616843 [patent_app_country] => US [patent_app_date] => 2012-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3850 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13616843 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/616843
Rule-based derived-group security data management Sep 13, 2012 Issued
Array ( [id] => 10525206 [patent_doc_number] => 09251723 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-02 [patent_title] => 'Systems and methods of multidimensional encrypted data transfer' [patent_app_type] => utility [patent_app_number] => 13/619005 [patent_app_country] => US [patent_app_date] => 2012-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 13 [patent_no_of_words] => 7957 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 80 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13619005 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/619005
Systems and methods of multidimensional encrypted data transfer Sep 13, 2012 Issued
Array ( [id] => 10067406 [patent_doc_number] => 09106272 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-11 [patent_title] => 'Mobile communications device providing secure element data wiping features and related methods' [patent_app_type] => utility [patent_app_number] => 13/611836 [patent_app_country] => US [patent_app_date] => 2012-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 5857 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13611836 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/611836
Mobile communications device providing secure element data wiping features and related methods Sep 11, 2012 Issued
Array ( [id] => 10166055 [patent_doc_number] => 09197293 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-24 [patent_title] => 'Mobile communications device providing secure element data management features and related methods' [patent_app_type] => utility [patent_app_number] => 13/611886 [patent_app_country] => US [patent_app_date] => 2012-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 5749 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13611886 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/611886
Mobile communications device providing secure element data management features and related methods Sep 11, 2012 Issued
Array ( [id] => 9320646 [patent_doc_number] => 20140052984 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-20 [patent_title] => 'METHODS AND SYSTEMS FOR REGISTERING A PACKET-BASED ADDRESS FOR A MOBILE DEVICE USING A FULLY-QUALIFIED DOMAIN NAME (FQDN) FOR THE DEVICE IN A MOBILE COMMUNICATION NETWORK' [patent_app_type] => utility [patent_app_number] => 13/588923 [patent_app_country] => US [patent_app_date] => 2012-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11050 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 18 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13588923 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/588923
Methods and systems for registering a packet-based address for a mobile device using a fully-qualified domain name (FQDN) for the device in a mobile communication network Aug 16, 2012 Issued
Array ( [id] => 10072543 [patent_doc_number] => 09110902 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-08-18 [patent_title] => 'Application-driven playback of offline encrypted content with unaware DRM module' [patent_app_type] => utility [patent_app_number] => 13/586664 [patent_app_country] => US [patent_app_date] => 2012-08-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 11316 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 294 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13586664 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/586664
Application-driven playback of offline encrypted content with unaware DRM module Aug 14, 2012 Issued
Array ( [id] => 9879347 [patent_doc_number] => 08966644 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-24 [patent_title] => 'Information storing device, information processing device, information processing system, information processing method, and program' [patent_app_type] => utility [patent_app_number] => 13/584078 [patent_app_country] => US [patent_app_date] => 2012-08-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 17329 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 296 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13584078 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/584078
Information storing device, information processing device, information processing system, information processing method, and program Aug 12, 2012 Issued
Array ( [id] => 9986769 [patent_doc_number] => 09032506 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-05-12 [patent_title] => 'Multiple application containerization in a single container' [patent_app_type] => utility [patent_app_number] => 13/570724 [patent_app_country] => US [patent_app_date] => 2012-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 4023 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13570724 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/570724
Multiple application containerization in a single container Aug 8, 2012 Issued
Array ( [id] => 9296986 [patent_doc_number] => 20140040620 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-06 [patent_title] => 'Secure Function Evaluation Between Semi-Honest Parties' [patent_app_type] => utility [patent_app_number] => 13/562640 [patent_app_country] => US [patent_app_date] => 2012-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3668 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13562640 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/562640
Secure function evaluation between semi-honest parties Jul 30, 2012 Issued
Array ( [id] => 9781316 [patent_doc_number] => 08856538 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-10-07 [patent_title] => 'Secured flash programming of secondary processor' [patent_app_type] => utility [patent_app_number] => 13/560207 [patent_app_country] => US [patent_app_date] => 2012-07-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 3580 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13560207 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/560207
Secured flash programming of secondary processor Jul 26, 2012 Issued
Array ( [id] => 9193738 [patent_doc_number] => 20130333053 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-12-12 [patent_title] => 'METHOD FOR PROTECTING FIRMWARE BEING UPDATED' [patent_app_type] => utility [patent_app_number] => 13/558389 [patent_app_country] => US [patent_app_date] => 2012-07-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2485 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13558389 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/558389
METHOD FOR PROTECTING FIRMWARE BEING UPDATED Jul 25, 2012 Abandoned
Array ( [id] => 10847722 [patent_doc_number] => 08874923 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-10-28 [patent_title] => 'Policy-based signature authentication system and method' [patent_app_type] => utility [patent_app_number] => 13/556987 [patent_app_country] => US [patent_app_date] => 2012-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6592 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13556987 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/556987
Policy-based signature authentication system and method Jul 23, 2012 Issued
Array ( [id] => 9610396 [patent_doc_number] => 08787577 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-07-22 [patent_title] => 'Method and system for wireless transmission of content' [patent_app_type] => utility [patent_app_number] => 13/552541 [patent_app_country] => US [patent_app_date] => 2012-07-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3061 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13552541 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/552541
Method and system for wireless transmission of content Jul 17, 2012 Issued
Array ( [id] => 9458895 [patent_doc_number] => 08719922 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-06 [patent_title] => 'Sensory association passcode' [patent_app_type] => utility [patent_app_number] => 13/549333 [patent_app_country] => US [patent_app_date] => 2012-07-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6246 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 248 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13549333 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/549333
Sensory association passcode Jul 12, 2012 Issued
Array ( [id] => 12317598 [patent_doc_number] => 09942257 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-04-10 [patent_title] => Trustworthy indication of software integrity [patent_app_type] => utility [patent_app_number] => 13/546626 [patent_app_country] => US [patent_app_date] => 2012-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 10411 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13546626 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/546626
Trustworthy indication of software integrity Jul 10, 2012 Issued
Array ( [id] => 8611516 [patent_doc_number] => 20130016828 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-01-17 [patent_title] => 'PROTECTION OF A MODULAR EXPONENTIATION CALCULATION BY MULTIPLICATION BY A RANDOM QUANTITY' [patent_app_type] => utility [patent_app_number] => 13/543106 [patent_app_country] => US [patent_app_date] => 2012-07-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5910 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13543106 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/543106
Protection of a modular exponentiation calculation by multiplication by a random quantity Jul 5, 2012 Issued
Array ( [id] => 9714403 [patent_doc_number] => 08839004 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-09-16 [patent_title] => 'Secure cloud computing infrastructure' [patent_app_type] => utility [patent_app_number] => 13/447766 [patent_app_country] => US [patent_app_date] => 2012-04-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 4816 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 145 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13447766 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/447766
Secure cloud computing infrastructure Apr 15, 2012 Issued
Array ( [id] => 9096432 [patent_doc_number] => 20130275743 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-17 [patent_title] => 'Fault-Tolerant Privacy-Preserving Statistics' [patent_app_type] => utility [patent_app_number] => 13/445599 [patent_app_country] => US [patent_app_date] => 2012-04-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6437 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13445599 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/445599
Fault-tolerant privacy-preserving statistics Apr 11, 2012 Issued
Array ( [id] => 9083489 [patent_doc_number] => 20130269019 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-10 [patent_title] => 'Systems and Methods for Controlling a Local Application Through a Web Page' [patent_app_type] => utility [patent_app_number] => 13/443781 [patent_app_country] => US [patent_app_date] => 2012-04-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 12519 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13443781 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/443781
Systems and methods for controlling a local application through a web page Apr 9, 2012 Issued
Array ( [id] => 9458911 [patent_doc_number] => 08719938 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-06 [patent_title] => 'Detecting network intrusion using a decoy cryptographic key' [patent_app_type] => utility [patent_app_number] => 13/442256 [patent_app_country] => US [patent_app_date] => 2012-04-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7077 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 242 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13442256 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/442256
Detecting network intrusion using a decoy cryptographic key Apr 8, 2012 Issued
Menu