
Eunja Adolphe
Examiner (ID: 1067)
| Most Active Art Unit | 2816 |
| Art Unit(s) | 2504, 2816 |
| Total Applications | 291 |
| Issued Applications | 234 |
| Pending Applications | 14 |
| Abandoned Applications | 43 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8443688
[patent_doc_number] => 20120260305
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-11
[patent_title] => 'Access Protection Accessory for an Automation Network'
[patent_app_type] => utility
[patent_app_number] => 13/440766
[patent_app_country] => US
[patent_app_date] => 2012-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5653
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13440766
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/440766 | Access protection accessory for an automation network | Apr 4, 2012 | Issued |
Array
(
[id] => 9083227
[patent_doc_number] => 20130268757
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-10
[patent_title] => 'SECURELY PERFORMING PROGRAMMATIC CLOUD-BASED DATA ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 13/439019
[patent_app_country] => US
[patent_app_date] => 2012-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8937
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13439019
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/439019 | Securely performing programmatic cloud-based data analysis | Apr 3, 2012 | Issued |
Array
(
[id] => 10094535
[patent_doc_number] => 09131374
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-08
[patent_title] => 'Knowledge-based authentication for restricting access to mobile devices'
[patent_app_type] => utility
[patent_app_number] => 13/434991
[patent_app_country] => US
[patent_app_date] => 2012-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3751
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13434991
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/434991 | Knowledge-based authentication for restricting access to mobile devices | Mar 29, 2012 | Issued |
Array
(
[id] => 10196852
[patent_doc_number] => 09225770
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-29
[patent_title] => 'Cloud computing secure data storage'
[patent_app_type] => utility
[patent_app_number] => 13/817694
[patent_app_country] => US
[patent_app_date] => 2012-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9894
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 312
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13817694
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/817694 | Cloud computing secure data storage | Mar 8, 2012 | Issued |
Array
(
[id] => 8201820
[patent_doc_number] => 20120124387
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-17
[patent_title] => 'Animal Data Management'
[patent_app_type] => utility
[patent_app_number] => 13/294476
[patent_app_country] => US
[patent_app_date] => 2011-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8957
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0124/20120124387.pdf
[firstpage_image] =>[orig_patent_app_number] => 13294476
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/294476 | Animal Data Management | Nov 10, 2011 | Abandoned |
Array
(
[id] => 9680898
[patent_doc_number] => 08819827
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-08-26
[patent_title] => 'Method and apparatus of performing data executable integrity verification'
[patent_app_type] => utility
[patent_app_number] => 13/293934
[patent_app_country] => US
[patent_app_date] => 2011-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 3360
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13293934
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/293934 | Method and apparatus of performing data executable integrity verification | Nov 9, 2011 | Issued |
Array
(
[id] => 8223156
[patent_doc_number] => 20120137356
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-31
[patent_title] => 'INTELLIGENT ELECTRIC DEVICE AND NETWORK SYSTEM INCLUDING THE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/291525
[patent_app_country] => US
[patent_app_date] => 2011-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4648
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13291525
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/291525 | Intelligent electric device and network system including the device | Nov 7, 2011 | Issued |
Array
(
[id] => 8794591
[patent_doc_number] => 20130111560
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-02
[patent_title] => 'TECHNIQUES FOR DYNAMIC DOMAIN-BASED ISOLATION'
[patent_app_type] => utility
[patent_app_number] => 13/287172
[patent_app_country] => US
[patent_app_date] => 2011-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10239
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13287172
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/287172 | Techniques for dynamic domain-based isolation | Nov 1, 2011 | Issued |
Array
(
[id] => 11393014
[patent_doc_number] => 09554276
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-24
[patent_title] => 'System and method for on the fly protocol conversion in obtaining policy enforcement information'
[patent_app_type] => utility
[patent_app_number] => 13/284806
[patent_app_country] => US
[patent_app_date] => 2011-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4871
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13284806
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/284806 | System and method for on the fly protocol conversion in obtaining policy enforcement information | Oct 27, 2011 | Issued |
Array
(
[id] => 9848003
[patent_doc_number] => 08949938
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-03
[patent_title] => 'Mechanisms to use network session identifiers for software-as-a-service authentication'
[patent_app_type] => utility
[patent_app_number] => 13/282875
[patent_app_country] => US
[patent_app_date] => 2011-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9892
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13282875
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/282875 | Mechanisms to use network session identifiers for software-as-a-service authentication | Oct 26, 2011 | Issued |
Array
(
[id] => 9500069
[patent_doc_number] => 08738909
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-27
[patent_title] => 'Forwarding E-mail from a wireless device'
[patent_app_type] => utility
[patent_app_number] => 13/281834
[patent_app_country] => US
[patent_app_date] => 2011-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4641
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13281834
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/281834 | Forwarding E-mail from a wireless device | Oct 25, 2011 | Issued |
Array
(
[id] => 9405006
[patent_doc_number] => 08695071
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-08
[patent_title] => 'Authentication method'
[patent_app_type] => utility
[patent_app_number] => 13/279296
[patent_app_country] => US
[patent_app_date] => 2011-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 20
[patent_no_of_words] => 13312
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13279296
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/279296 | Authentication method | Oct 22, 2011 | Issued |
Array
(
[id] => 9610389
[patent_doc_number] => 08787571
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-22
[patent_title] => 'Wired communications systems with improved capacity and security'
[patent_app_type] => utility
[patent_app_number] => 13/277126
[patent_app_country] => US
[patent_app_date] => 2011-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 3951
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13277126
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/277126 | Wired communications systems with improved capacity and security | Oct 18, 2011 | Issued |
Array
(
[id] => 9458903
[patent_doc_number] => 08719930
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-06
[patent_title] => 'Real-time network attack detection and mitigation infrastructure'
[patent_app_type] => utility
[patent_app_number] => 13/271928
[patent_app_country] => US
[patent_app_date] => 2011-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 13464
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13271928
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/271928 | Real-time network attack detection and mitigation infrastructure | Oct 11, 2011 | Issued |
Array
(
[id] => 9877694
[patent_doc_number] => 08964979
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-24
[patent_title] => 'Identification and handling of data streams using coded preambles'
[patent_app_type] => utility
[patent_app_number] => 13/269450
[patent_app_country] => US
[patent_app_date] => 2011-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7263
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13269450
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/269450 | Identification and handling of data streams using coded preambles | Oct 6, 2011 | Issued |
Array
(
[id] => 8757257
[patent_doc_number] => 20130091562
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-11
[patent_title] => 'COMPUTER'
[patent_app_type] => utility
[patent_app_number] => 13/264904
[patent_app_country] => US
[patent_app_date] => 2011-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 15547
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13264904
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/264904 | COMPUTER | Oct 4, 2011 | Abandoned |
Array
(
[id] => 8303352
[patent_doc_number] => 20120185911
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-19
[patent_title] => 'MLWEB: A MULTILEVEL WEB APPLICATION FRAMEWORK'
[patent_app_type] => utility
[patent_app_number] => 13/251158
[patent_app_country] => US
[patent_app_date] => 2011-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 13514
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13251158
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/251158 | MLWEB: A MULTILEVEL WEB APPLICATION FRAMEWORK | Sep 29, 2011 | Abandoned |
Array
(
[id] => 14091633
[patent_doc_number] => 10241720
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Method and system for providing content to a recipient device
[patent_app_type] => utility
[patent_app_number] => 13/821935
[patent_app_country] => US
[patent_app_date] => 2011-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4042
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 39
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13821935
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/821935 | Method and system for providing content to a recipient device | Sep 7, 2011 | Issued |
Array
(
[id] => 8613998
[patent_doc_number] => 20130019310
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-17
[patent_title] => 'DETECTION OF ROGUE SOFTWARE APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/182652
[patent_app_country] => US
[patent_app_date] => 2011-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3201
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13182652
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/182652 | Detection of rogue software applications | Jul 13, 2011 | Issued |
Array
(
[id] => 8097893
[patent_doc_number] => 20120084545
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-05
[patent_title] => 'METHODS AND SYSTEMS FOR IMPLEMENTING A SECURE BOOT DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 13/105173
[patent_app_country] => US
[patent_app_date] => 2011-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 22952
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0084/20120084545.pdf
[firstpage_image] =>[orig_patent_app_number] => 13105173
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/105173 | METHODS AND SYSTEMS FOR IMPLEMENTING A SECURE BOOT DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS | May 10, 2011 | Abandoned |