
Fatoumata Traore
Examiner (ID: 13774, Phone: (571)270-1685 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2136 |
| Total Applications | 757 |
| Issued Applications | 596 |
| Pending Applications | 32 |
| Abandoned Applications | 143 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9289720
[patent_doc_number] => 08646078
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-04
[patent_title] => 'MIME handling security enforcement'
[patent_app_type] => utility
[patent_app_number] => 12/685528
[patent_app_country] => US
[patent_app_date] => 2010-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3978
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12685528
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/685528 | MIME handling security enforcement | Jan 10, 2010 | Issued |
Array
(
[id] => 8805166
[patent_doc_number] => 08443450
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-05-14
[patent_title] => 'Operation of a dual instruction pipe virus co-processor'
[patent_app_type] => utility
[patent_app_number] => 12/641309
[patent_app_country] => US
[patent_app_date] => 2009-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 11307
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12641309
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/641309 | Operation of a dual instruction pipe virus co-processor | Dec 16, 2009 | Issued |
Array
(
[id] => 6312122
[patent_doc_number] => 20100111377
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-06
[patent_title] => 'Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System'
[patent_app_type] => utility
[patent_app_number] => 12/606533
[patent_app_country] => US
[patent_app_date] => 2009-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 14070
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0111/20100111377.pdf
[firstpage_image] =>[orig_patent_app_number] => 12606533
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/606533 | Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System | Oct 26, 2009 | Abandoned |
Array
(
[id] => 9228876
[patent_doc_number] => 08634552
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-01-21
[patent_title] => 'System and method for using a streaming protocol'
[patent_app_type] => utility
[patent_app_number] => 12/576784
[patent_app_country] => US
[patent_app_date] => 2009-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10265
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12576784
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/576784 | System and method for using a streaming protocol | Oct 8, 2009 | Issued |
Array
(
[id] => 5992124
[patent_doc_number] => 20110013777
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-20
[patent_title] => 'ENCRYPTION/DECRYPTION OF DIGITAL DATA USING RELATED, BUT INDEPENDENT KEYS'
[patent_app_type] => utility
[patent_app_number] => 12/575652
[patent_app_country] => US
[patent_app_date] => 2009-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 52
[patent_figures_cnt] => 52
[patent_no_of_words] => 19993
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0013/20110013777.pdf
[firstpage_image] =>[orig_patent_app_number] => 12575652
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/575652 | Encryption/decryption of digital data using related, but independent keys | Oct 7, 2009 | Issued |
Array
(
[id] => 6331632
[patent_doc_number] => 20100115291
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-06
[patent_title] => 'Secure Virtual Machine Manager'
[patent_app_type] => utility
[patent_app_number] => 12/573029
[patent_app_country] => US
[patent_app_date] => 2009-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5122
[patent_no_of_claims] => 69
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0115/20100115291.pdf
[firstpage_image] =>[orig_patent_app_number] => 12573029
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/573029 | Secure virtual machine manager | Oct 1, 2009 | Issued |
Array
(
[id] => 6452737
[patent_doc_number] => 20100169973
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'System and Method For Detecting Unknown Malicious Code By Analyzing Kernel Based System Actions'
[patent_app_type] => utility
[patent_app_number] => 12/571825
[patent_app_country] => US
[patent_app_date] => 2009-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2687
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0169/20100169973.pdf
[firstpage_image] =>[orig_patent_app_number] => 12571825
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/571825 | System and Method For Detecting Unknown Malicious Code By Analyzing Kernel Based System Actions | Sep 30, 2009 | Abandoned |
Array
(
[id] => 8787065
[patent_doc_number] => 08433920
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-30
[patent_title] => 'Method and system for authenticating reliable biometric data'
[patent_app_type] => utility
[patent_app_number] => 12/570072
[patent_app_country] => US
[patent_app_date] => 2009-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3531
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 55
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12570072
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/570072 | Method and system for authenticating reliable biometric data | Sep 29, 2009 | Issued |
Array
(
[id] => 8774292
[patent_doc_number] => 08428262
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-23
[patent_title] => 'Method to connect wireless communication device, wireless communication device, and computer usable medium therefor'
[patent_app_type] => utility
[patent_app_number] => 12/569214
[patent_app_country] => US
[patent_app_date] => 2009-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 27
[patent_no_of_words] => 10374
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 286
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12569214
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/569214 | Method to connect wireless communication device, wireless communication device, and computer usable medium therefor | Sep 28, 2009 | Issued |
Array
(
[id] => 6464245
[patent_doc_number] => 20100146296
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-10
[patent_title] => 'APPARATUS AND METHOD FOR HASH CRYPTOGRAPHY'
[patent_app_type] => utility
[patent_app_number] => 12/567006
[patent_app_country] => US
[patent_app_date] => 2009-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 14088
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0146/20100146296.pdf
[firstpage_image] =>[orig_patent_app_number] => 12567006
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/567006 | Apparatus and method for hash cryptography | Sep 24, 2009 | Issued |
Array
(
[id] => 6645785
[patent_doc_number] => 20100313264
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-09
[patent_title] => 'BLOCKING MALICIOUS ACTIVITY USING BLACKLIST'
[patent_app_type] => utility
[patent_app_number] => 12/479860
[patent_app_country] => US
[patent_app_date] => 2009-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8782
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0313/20100313264.pdf
[firstpage_image] =>[orig_patent_app_number] => 12479860
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/479860 | Blocking malicious activity using blacklist | Jun 7, 2009 | Issued |
Array
(
[id] => 6643765
[patent_doc_number] => 20100313016
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-09
[patent_title] => 'Transport Pipeline Decryption for Content-Scanning Agents'
[patent_app_type] => utility
[patent_app_number] => 12/478608
[patent_app_country] => US
[patent_app_date] => 2009-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4815
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0313/20100313016.pdf
[firstpage_image] =>[orig_patent_app_number] => 12478608
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/478608 | Transport Pipeline Decryption for Content-Scanning Agents | Jun 3, 2009 | Abandoned |
Array
(
[id] => 9417113
[patent_doc_number] => 08701165
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-15
[patent_title] => 'Credentials phishing prevention protocol'
[patent_app_type] => utility
[patent_app_number] => 12/477684
[patent_app_country] => US
[patent_app_date] => 2009-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10049
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12477684
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/477684 | Credentials phishing prevention protocol | Jun 2, 2009 | Issued |
Array
(
[id] => 6413751
[patent_doc_number] => 20100306525
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-02
[patent_title] => 'EFFICIENT DISTRIBUTION OF COMPUTATION IN KEY AGREEMENT'
[patent_app_type] => utility
[patent_app_number] => 12/474265
[patent_app_country] => US
[patent_app_date] => 2009-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7042
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0306/20100306525.pdf
[firstpage_image] =>[orig_patent_app_number] => 12474265
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/474265 | Efficient distribution of computation in key agreement | May 27, 2009 | Issued |
Array
(
[id] => 5369934
[patent_doc_number] => 20090307493
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-10
[patent_title] => 'SYSTEM AND METHOD FOR COMBINING USER AND PLATFORM AUTHENTICATION IN NEGOTIATED CHANNEL SECURITY PROTOCOLS'
[patent_app_type] => utility
[patent_app_number] => 12/468532
[patent_app_country] => US
[patent_app_date] => 2009-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8912
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0307/20090307493.pdf
[firstpage_image] =>[orig_patent_app_number] => 12468532
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/468532 | System and method for combining user and platform authentication in negotiated channel security protocols | May 18, 2009 | Issued |
Array
(
[id] => 8552543
[patent_doc_number] => 08327444
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-12-04
[patent_title] => 'Suspicious autonomous system path detection'
[patent_app_type] => utility
[patent_app_number] => 12/422408
[patent_app_country] => US
[patent_app_date] => 2009-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5500
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12422408
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/422408 | Suspicious autonomous system path detection | Apr 12, 2009 | Issued |
Array
(
[id] => 5494911
[patent_doc_number] => 20090262939
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-22
[patent_title] => 'Authentication Apparatus, System and Method'
[patent_app_type] => utility
[patent_app_number] => 12/419648
[patent_app_country] => US
[patent_app_date] => 2009-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3741
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0262/20090262939.pdf
[firstpage_image] =>[orig_patent_app_number] => 12419648
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/419648 | Authentication Apparatus, System and Method | Apr 6, 2009 | Abandoned |
Array
(
[id] => 6281920
[patent_doc_number] => 20100257578
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-07
[patent_title] => 'DATA ACCESS PROGRAMMING MODEL FOR OCCASIONALLY CONNECTED APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 12/418658
[patent_app_country] => US
[patent_app_date] => 2009-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8423
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0257/20100257578.pdf
[firstpage_image] =>[orig_patent_app_number] => 12418658
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/418658 | Data access programming model for occasionally connected applications | Apr 5, 2009 | Issued |
Array
(
[id] => 8355014
[patent_doc_number] => 08250358
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-08-21
[patent_title] => 'Data diode system'
[patent_app_type] => utility
[patent_app_number] => 12/416831
[patent_app_country] => US
[patent_app_date] => 2009-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3019
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12416831
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/416831 | Data diode system | Mar 31, 2009 | Issued |
Array
(
[id] => 8898415
[patent_doc_number] => 08477943
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-02
[patent_title] => 'Automatic detection of wireless network type'
[patent_app_type] => utility
[patent_app_number] => 12/403851
[patent_app_country] => US
[patent_app_date] => 2009-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5808
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12403851
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/403851 | Automatic detection of wireless network type | Mar 12, 2009 | Issued |