
Fatoumata Traore
Examiner (ID: 13774, Phone: (571)270-1685 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2136 |
| Total Applications | 757 |
| Issued Applications | 596 |
| Pending Applications | 32 |
| Abandoned Applications | 143 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9276249
[patent_doc_number] => 08640200
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-01-28
[patent_title] => 'Authored injections of context that are resolved at authentication time'
[patent_app_type] => utility
[patent_app_number] => 13/429180
[patent_app_country] => US
[patent_app_date] => 2012-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5322
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13429180
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/429180 | Authored injections of context that are resolved at authentication time | Mar 22, 2012 | Issued |
Array
(
[id] => 8879044
[patent_doc_number] => 08474029
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-25
[patent_title] => 'Method and system of user authentication using a portable authenticator'
[patent_app_type] => utility
[patent_app_number] => 13/423966
[patent_app_country] => US
[patent_app_date] => 2012-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 10856
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13423966
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/423966 | Method and system of user authentication using a portable authenticator | Mar 18, 2012 | Issued |
Array
(
[id] => 8879044
[patent_doc_number] => 08474029
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-25
[patent_title] => 'Method and system of user authentication using a portable authenticator'
[patent_app_type] => utility
[patent_app_number] => 13/423966
[patent_app_country] => US
[patent_app_date] => 2012-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 10856
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13423966
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/423966 | Method and system of user authentication using a portable authenticator | Mar 18, 2012 | Issued |
Array
(
[id] => 9714759
[patent_doc_number] => 08839363
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-16
[patent_title] => 'Trusted hardware for attesting to authenticity in a cloud environment'
[patent_app_type] => utility
[patent_app_number] => 13/422751
[patent_app_country] => US
[patent_app_date] => 2012-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13147
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13422751
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/422751 | Trusted hardware for attesting to authenticity in a cloud environment | Mar 15, 2012 | Issued |
Array
(
[id] => 8280316
[patent_doc_number] => 20120174190
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-05
[patent_title] => 'System and Methods for Network Authentication'
[patent_app_type] => utility
[patent_app_number] => 13/416242
[patent_app_country] => US
[patent_app_date] => 2012-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 3649
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13416242
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/416242 | System and methods for network authentication | Mar 8, 2012 | Issued |
Array
(
[id] => 8709894
[patent_doc_number] => 20130067184
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-14
[patent_title] => 'ACCESSING PRIVATE DATA ABOUT THE STATE OF A DATA PROCESSING MACHINE FROM STORAGE THAT IS PUBLICLY ACCESSIBLE'
[patent_app_type] => utility
[patent_app_number] => 13/413176
[patent_app_country] => US
[patent_app_date] => 2012-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8464
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13413176
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/413176 | Accessing private data about the state of a data processing machine from storage that is publicly accessible | Mar 5, 2012 | Issued |
Array
(
[id] => 9282940
[patent_doc_number] => 20140032908
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-30
[patent_title] => 'METHOD FOR MANAGING REMOTE UPGRADING KEYS IN AN INFORMATION SECURITY APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 14/111966
[patent_app_country] => US
[patent_app_date] => 2012-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6216
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14111966
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/111966 | Method for managing remote upgrading keys in an information security apparatus | Feb 22, 2012 | Issued |
Array
(
[id] => 9200781
[patent_doc_number] => 20130340097
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-19
[patent_title] => 'SYSTEMS AND METHODS FOR INTEGRATING PERSONAL SOCIAL NETWORKS WITHIN AN ORGANIZATION'
[patent_app_type] => utility
[patent_app_number] => 13/992403
[patent_app_country] => US
[patent_app_date] => 2011-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8598
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13992403
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/992403 | SYSTEMS AND METHODS FOR INTEGRATING PERSONAL SOCIAL NETWORKS WITHIN AN ORGANIZATION | Dec 8, 2011 | Abandoned |
Array
(
[id] => 8479464
[patent_doc_number] => 20120278871
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-01
[patent_title] => 'USER IDENTIFICATION METHOD APPLICABLE TO NETWORK TRANSACTION AND SYSTEM THEREOF'
[patent_app_type] => utility
[patent_app_number] => 13/308636
[patent_app_country] => US
[patent_app_date] => 2011-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4257
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13308636
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/308636 | User identification method applicable to network transaction and system thereof | Nov 30, 2011 | Issued |
Array
(
[id] => 11917578
[patent_doc_number] => 09785766
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-10
[patent_title] => 'Automated password management'
[patent_app_type] => utility
[patent_app_number] => 13/993110
[patent_app_country] => US
[patent_app_date] => 2011-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3165
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13993110
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/993110 | Automated password management | Sep 29, 2011 | Issued |
Array
(
[id] => 8176660
[patent_doc_number] => 20120110340
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-03
[patent_title] => 'SYSTEM, PORTABLE DEVICE AND METHOD FOR DIGITAL AUTHENTICATING, CRYPTING AND SIGNING BY GENERATING SHORT-LIVED CRYPTOKEYS'
[patent_app_type] => utility
[patent_app_number] => 13/172783
[patent_app_country] => US
[patent_app_date] => 2011-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6096
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0110/20120110340.pdf
[firstpage_image] =>[orig_patent_app_number] => 13172783
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/172783 | SYSTEM, PORTABLE DEVICE AND METHOD FOR DIGITAL AUTHENTICATING, CRYPTING AND SIGNING BY GENERATING SHORT-LIVED CRYPTOKEYS | Jun 28, 2011 | Abandoned |
Array
(
[id] => 5940517
[patent_doc_number] => 20110214179
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-01
[patent_title] => 'SECURE METHOD AND SYSTEM FOR COMPUTER PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 13/106519
[patent_app_country] => US
[patent_app_date] => 2011-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8941
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0214/20110214179.pdf
[firstpage_image] =>[orig_patent_app_number] => 13106519
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/106519 | Secure method and system for computer protection | May 11, 2011 | Issued |
Array
(
[id] => 9297002
[patent_doc_number] => 20140040636
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-06
[patent_title] => 'EMBEDDED CONTROLLER TO VERIFY CRTM'
[patent_app_type] => utility
[patent_app_number] => 14/112569
[patent_app_country] => US
[patent_app_date] => 2011-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2571
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14112569
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/112569 | EMBEDDED CONTROLLER TO VERIFY CRTM | Apr 28, 2011 | Abandoned |
Array
(
[id] => 9296985
[patent_doc_number] => 20140040619
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-06
[patent_title] => 'Access control'
[patent_app_type] => utility
[patent_app_number] => 14/112549
[patent_app_country] => US
[patent_app_date] => 2011-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7323
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14112549
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/112549 | Access control | Apr 17, 2011 | Issued |
Array
(
[id] => 7512979
[patent_doc_number] => 20110258689
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-20
[patent_title] => 'Device pairing via device to device contact'
[patent_app_type] => utility
[patent_app_number] => 12/932624
[patent_app_country] => US
[patent_app_date] => 2011-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 45423
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0258/20110258689.pdf
[firstpage_image] =>[orig_patent_app_number] => 12932624
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/932624 | Device pairing via device to device contact | Feb 27, 2011 | Issued |
Array
(
[id] => 8148281
[patent_doc_number] => 08165294
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-04-24
[patent_title] => 'Rollback attack prevention system and method'
[patent_app_type] => utility
[patent_app_number] => 13/019148
[patent_app_country] => US
[patent_app_date] => 2011-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5658
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/165/08165294.pdf
[firstpage_image] =>[orig_patent_app_number] => 13019148
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/019148 | Rollback attack prevention system and method | Jan 31, 2011 | Issued |
Array
(
[id] => 8366625
[patent_doc_number] => 08255703
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-08-28
[patent_title] => 'Atomic hash instruction'
[patent_app_type] => utility
[patent_app_number] => 13/010292
[patent_app_country] => US
[patent_app_date] => 2011-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 13
[patent_no_of_words] => 11872
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13010292
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/010292 | Atomic hash instruction | Jan 19, 2011 | Issued |
Array
(
[id] => 6078970
[patent_doc_number] => 20110142229
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-16
[patent_title] => 'APPARATUS AND METHOD FOR PERFORMING TRANSPARENT HASH FUNCTIONS'
[patent_app_type] => utility
[patent_app_number] => 12/977809
[patent_app_country] => US
[patent_app_date] => 2010-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12152
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0142/20110142229.pdf
[firstpage_image] =>[orig_patent_app_number] => 12977809
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/977809 | Apparatus and method for performing transparent hash functions | Dec 22, 2010 | Issued |
Array
(
[id] => 6078969
[patent_doc_number] => 20110142228
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-16
[patent_title] => 'APPARATUS AND METHOD FOR EMPLOYING CONFIGURABLE HASH ALGORITHMS'
[patent_app_type] => utility
[patent_app_number] => 12/977803
[patent_app_country] => US
[patent_app_date] => 2010-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12077
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0142/20110142228.pdf
[firstpage_image] =>[orig_patent_app_number] => 12977803
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/977803 | Apparatus and method for employing configurable hash algorithms | Dec 22, 2010 | Issued |
Array
(
[id] => 9124150
[patent_doc_number] => 20130291072
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-31
[patent_title] => 'SYSTEM, METHOD, NETWORK ENTITY AND DEVICE FOR CONNECTING A DEVICE TO A COMMUNICATIONS NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/997476
[patent_app_country] => US
[patent_app_date] => 2010-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9730
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13997476
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/997476 | System, method, network entity and device for connecting a device to a communications network | Dec 22, 2010 | Issued |