
Eunja Adolphe
Examiner (ID: 1067)
| Most Active Art Unit | 2816 |
| Art Unit(s) | 2504, 2816 |
| Total Applications | 291 |
| Issued Applications | 234 |
| Pending Applications | 14 |
| Abandoned Applications | 43 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9372815
[patent_doc_number] => 20140082688
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-20
[patent_title] => 'RULE-BASED DERIVED-GROUP SECURITY DATA MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 13/616843
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3850
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13616843
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/616843 | Rule-based derived-group security data management | Sep 13, 2012 | Issued |
Array
(
[id] => 10525206
[patent_doc_number] => 09251723
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-02
[patent_title] => 'Systems and methods of multidimensional encrypted data transfer'
[patent_app_type] => utility
[patent_app_number] => 13/619005
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 7957
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13619005
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/619005 | Systems and methods of multidimensional encrypted data transfer | Sep 13, 2012 | Issued |
Array
(
[id] => 10067406
[patent_doc_number] => 09106272
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-11
[patent_title] => 'Mobile communications device providing secure element data wiping features and related methods'
[patent_app_type] => utility
[patent_app_number] => 13/611836
[patent_app_country] => US
[patent_app_date] => 2012-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5857
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13611836
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/611836 | Mobile communications device providing secure element data wiping features and related methods | Sep 11, 2012 | Issued |
Array
(
[id] => 10166055
[patent_doc_number] => 09197293
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Mobile communications device providing secure element data management features and related methods'
[patent_app_type] => utility
[patent_app_number] => 13/611886
[patent_app_country] => US
[patent_app_date] => 2012-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5749
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13611886
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/611886 | Mobile communications device providing secure element data management features and related methods | Sep 11, 2012 | Issued |
Array
(
[id] => 9320646
[patent_doc_number] => 20140052984
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-20
[patent_title] => 'METHODS AND SYSTEMS FOR REGISTERING A PACKET-BASED ADDRESS FOR A MOBILE DEVICE USING A FULLY-QUALIFIED DOMAIN NAME (FQDN) FOR THE DEVICE IN A MOBILE COMMUNICATION NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/588923
[patent_app_country] => US
[patent_app_date] => 2012-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11050
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 18
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13588923
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/588923 | Methods and systems for registering a packet-based address for a mobile device using a fully-qualified domain name (FQDN) for the device in a mobile communication network | Aug 16, 2012 | Issued |
Array
(
[id] => 10072543
[patent_doc_number] => 09110902
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-18
[patent_title] => 'Application-driven playback of offline encrypted content with unaware DRM module'
[patent_app_type] => utility
[patent_app_number] => 13/586664
[patent_app_country] => US
[patent_app_date] => 2012-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11316
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 294
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13586664
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/586664 | Application-driven playback of offline encrypted content with unaware DRM module | Aug 14, 2012 | Issued |
Array
(
[id] => 9879347
[patent_doc_number] => 08966644
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-24
[patent_title] => 'Information storing device, information processing device, information processing system, information processing method, and program'
[patent_app_type] => utility
[patent_app_number] => 13/584078
[patent_app_country] => US
[patent_app_date] => 2012-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 17329
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 296
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13584078
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/584078 | Information storing device, information processing device, information processing system, information processing method, and program | Aug 12, 2012 | Issued |
Array
(
[id] => 9986769
[patent_doc_number] => 09032506
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-12
[patent_title] => 'Multiple application containerization in a single container'
[patent_app_type] => utility
[patent_app_number] => 13/570724
[patent_app_country] => US
[patent_app_date] => 2012-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4023
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13570724
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/570724 | Multiple application containerization in a single container | Aug 8, 2012 | Issued |
Array
(
[id] => 9296986
[patent_doc_number] => 20140040620
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-06
[patent_title] => 'Secure Function Evaluation Between Semi-Honest Parties'
[patent_app_type] => utility
[patent_app_number] => 13/562640
[patent_app_country] => US
[patent_app_date] => 2012-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3668
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13562640
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/562640 | Secure function evaluation between semi-honest parties | Jul 30, 2012 | Issued |
Array
(
[id] => 9781316
[patent_doc_number] => 08856538
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-07
[patent_title] => 'Secured flash programming of secondary processor'
[patent_app_type] => utility
[patent_app_number] => 13/560207
[patent_app_country] => US
[patent_app_date] => 2012-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 3580
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13560207
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/560207 | Secured flash programming of secondary processor | Jul 26, 2012 | Issued |
Array
(
[id] => 9193738
[patent_doc_number] => 20130333053
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-12
[patent_title] => 'METHOD FOR PROTECTING FIRMWARE BEING UPDATED'
[patent_app_type] => utility
[patent_app_number] => 13/558389
[patent_app_country] => US
[patent_app_date] => 2012-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2485
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13558389
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/558389 | METHOD FOR PROTECTING FIRMWARE BEING UPDATED | Jul 25, 2012 | Abandoned |
Array
(
[id] => 10847722
[patent_doc_number] => 08874923
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-28
[patent_title] => 'Policy-based signature authentication system and method'
[patent_app_type] => utility
[patent_app_number] => 13/556987
[patent_app_country] => US
[patent_app_date] => 2012-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6592
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13556987
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/556987 | Policy-based signature authentication system and method | Jul 23, 2012 | Issued |
Array
(
[id] => 9610396
[patent_doc_number] => 08787577
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-22
[patent_title] => 'Method and system for wireless transmission of content'
[patent_app_type] => utility
[patent_app_number] => 13/552541
[patent_app_country] => US
[patent_app_date] => 2012-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3061
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13552541
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/552541 | Method and system for wireless transmission of content | Jul 17, 2012 | Issued |
Array
(
[id] => 9458895
[patent_doc_number] => 08719922
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-06
[patent_title] => 'Sensory association passcode'
[patent_app_type] => utility
[patent_app_number] => 13/549333
[patent_app_country] => US
[patent_app_date] => 2012-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6246
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13549333
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/549333 | Sensory association passcode | Jul 12, 2012 | Issued |
Array
(
[id] => 12317598
[patent_doc_number] => 09942257
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-10
[patent_title] => Trustworthy indication of software integrity
[patent_app_type] => utility
[patent_app_number] => 13/546626
[patent_app_country] => US
[patent_app_date] => 2012-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 10411
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13546626
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/546626 | Trustworthy indication of software integrity | Jul 10, 2012 | Issued |
Array
(
[id] => 8611516
[patent_doc_number] => 20130016828
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-17
[patent_title] => 'PROTECTION OF A MODULAR EXPONENTIATION CALCULATION BY MULTIPLICATION BY A RANDOM QUANTITY'
[patent_app_type] => utility
[patent_app_number] => 13/543106
[patent_app_country] => US
[patent_app_date] => 2012-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5910
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13543106
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/543106 | Protection of a modular exponentiation calculation by multiplication by a random quantity | Jul 5, 2012 | Issued |
Array
(
[id] => 9714403
[patent_doc_number] => 08839004
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-09-16
[patent_title] => 'Secure cloud computing infrastructure'
[patent_app_type] => utility
[patent_app_number] => 13/447766
[patent_app_country] => US
[patent_app_date] => 2012-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4816
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13447766
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/447766 | Secure cloud computing infrastructure | Apr 15, 2012 | Issued |
Array
(
[id] => 9096432
[patent_doc_number] => 20130275743
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'Fault-Tolerant Privacy-Preserving Statistics'
[patent_app_type] => utility
[patent_app_number] => 13/445599
[patent_app_country] => US
[patent_app_date] => 2012-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6437
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13445599
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/445599 | Fault-tolerant privacy-preserving statistics | Apr 11, 2012 | Issued |
Array
(
[id] => 9083489
[patent_doc_number] => 20130269019
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-10
[patent_title] => 'Systems and Methods for Controlling a Local Application Through a Web Page'
[patent_app_type] => utility
[patent_app_number] => 13/443781
[patent_app_country] => US
[patent_app_date] => 2012-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12519
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13443781
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/443781 | Systems and methods for controlling a local application through a web page | Apr 9, 2012 | Issued |
Array
(
[id] => 9458911
[patent_doc_number] => 08719938
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-06
[patent_title] => 'Detecting network intrusion using a decoy cryptographic key'
[patent_app_type] => utility
[patent_app_number] => 13/442256
[patent_app_country] => US
[patent_app_date] => 2012-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7077
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13442256
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/442256 | Detecting network intrusion using a decoy cryptographic key | Apr 8, 2012 | Issued |