Search

Fatoumata Traore

Examiner (ID: 13774, Phone: (571)270-1685 , Office: P/2436 )

Most Active Art Unit
2436
Art Unit(s)
2436, 2136
Total Applications
757
Issued Applications
596
Pending Applications
32
Abandoned Applications
143

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9289720 [patent_doc_number] => 08646078 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-04 [patent_title] => 'MIME handling security enforcement' [patent_app_type] => utility [patent_app_number] => 12/685528 [patent_app_country] => US [patent_app_date] => 2010-01-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3978 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12685528 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/685528
MIME handling security enforcement Jan 10, 2010 Issued
Array ( [id] => 8805166 [patent_doc_number] => 08443450 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-05-14 [patent_title] => 'Operation of a dual instruction pipe virus co-processor' [patent_app_type] => utility [patent_app_number] => 12/641309 [patent_app_country] => US [patent_app_date] => 2009-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 14 [patent_no_of_words] => 11307 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 215 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12641309 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/641309
Operation of a dual instruction pipe virus co-processor Dec 16, 2009 Issued
Array ( [id] => 6312122 [patent_doc_number] => 20100111377 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-06 [patent_title] => 'Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System' [patent_app_type] => utility [patent_app_number] => 12/606533 [patent_app_country] => US [patent_app_date] => 2009-10-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 14070 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0111/20100111377.pdf [firstpage_image] =>[orig_patent_app_number] => 12606533 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/606533
Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System Oct 26, 2009 Abandoned
Array ( [id] => 9228876 [patent_doc_number] => 08634552 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-01-21 [patent_title] => 'System and method for using a streaming protocol' [patent_app_type] => utility [patent_app_number] => 12/576784 [patent_app_country] => US [patent_app_date] => 2009-10-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 10265 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12576784 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/576784
System and method for using a streaming protocol Oct 8, 2009 Issued
Array ( [id] => 5992124 [patent_doc_number] => 20110013777 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-20 [patent_title] => 'ENCRYPTION/DECRYPTION OF DIGITAL DATA USING RELATED, BUT INDEPENDENT KEYS' [patent_app_type] => utility [patent_app_number] => 12/575652 [patent_app_country] => US [patent_app_date] => 2009-10-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 52 [patent_figures_cnt] => 52 [patent_no_of_words] => 19993 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0013/20110013777.pdf [firstpage_image] =>[orig_patent_app_number] => 12575652 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/575652
Encryption/decryption of digital data using related, but independent keys Oct 7, 2009 Issued
Array ( [id] => 6331632 [patent_doc_number] => 20100115291 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-06 [patent_title] => 'Secure Virtual Machine Manager' [patent_app_type] => utility [patent_app_number] => 12/573029 [patent_app_country] => US [patent_app_date] => 2009-10-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5122 [patent_no_of_claims] => 69 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0115/20100115291.pdf [firstpage_image] =>[orig_patent_app_number] => 12573029 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/573029
Secure virtual machine manager Oct 1, 2009 Issued
Array ( [id] => 6452737 [patent_doc_number] => 20100169973 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-01 [patent_title] => 'System and Method For Detecting Unknown Malicious Code By Analyzing Kernel Based System Actions' [patent_app_type] => utility [patent_app_number] => 12/571825 [patent_app_country] => US [patent_app_date] => 2009-10-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2687 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0169/20100169973.pdf [firstpage_image] =>[orig_patent_app_number] => 12571825 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/571825
System and Method For Detecting Unknown Malicious Code By Analyzing Kernel Based System Actions Sep 30, 2009 Abandoned
Array ( [id] => 8787065 [patent_doc_number] => 08433920 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-04-30 [patent_title] => 'Method and system for authenticating reliable biometric data' [patent_app_type] => utility [patent_app_number] => 12/570072 [patent_app_country] => US [patent_app_date] => 2009-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3531 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 55 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12570072 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/570072
Method and system for authenticating reliable biometric data Sep 29, 2009 Issued
Array ( [id] => 8774292 [patent_doc_number] => 08428262 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-04-23 [patent_title] => 'Method to connect wireless communication device, wireless communication device, and computer usable medium therefor' [patent_app_type] => utility [patent_app_number] => 12/569214 [patent_app_country] => US [patent_app_date] => 2009-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 27 [patent_no_of_words] => 10374 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 286 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12569214 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/569214
Method to connect wireless communication device, wireless communication device, and computer usable medium therefor Sep 28, 2009 Issued
Array ( [id] => 6464245 [patent_doc_number] => 20100146296 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-06-10 [patent_title] => 'APPARATUS AND METHOD FOR HASH CRYPTOGRAPHY' [patent_app_type] => utility [patent_app_number] => 12/567006 [patent_app_country] => US [patent_app_date] => 2009-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 14088 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0146/20100146296.pdf [firstpage_image] =>[orig_patent_app_number] => 12567006 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/567006
Apparatus and method for hash cryptography Sep 24, 2009 Issued
Array ( [id] => 6645785 [patent_doc_number] => 20100313264 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-12-09 [patent_title] => 'BLOCKING MALICIOUS ACTIVITY USING BLACKLIST' [patent_app_type] => utility [patent_app_number] => 12/479860 [patent_app_country] => US [patent_app_date] => 2009-06-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8782 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0313/20100313264.pdf [firstpage_image] =>[orig_patent_app_number] => 12479860 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/479860
Blocking malicious activity using blacklist Jun 7, 2009 Issued
Array ( [id] => 6643765 [patent_doc_number] => 20100313016 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-12-09 [patent_title] => 'Transport Pipeline Decryption for Content-Scanning Agents' [patent_app_type] => utility [patent_app_number] => 12/478608 [patent_app_country] => US [patent_app_date] => 2009-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4815 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0313/20100313016.pdf [firstpage_image] =>[orig_patent_app_number] => 12478608 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/478608
Transport Pipeline Decryption for Content-Scanning Agents Jun 3, 2009 Abandoned
Array ( [id] => 9417113 [patent_doc_number] => 08701165 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-04-15 [patent_title] => 'Credentials phishing prevention protocol' [patent_app_type] => utility [patent_app_number] => 12/477684 [patent_app_country] => US [patent_app_date] => 2009-06-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10049 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12477684 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/477684
Credentials phishing prevention protocol Jun 2, 2009 Issued
Array ( [id] => 6413751 [patent_doc_number] => 20100306525 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-12-02 [patent_title] => 'EFFICIENT DISTRIBUTION OF COMPUTATION IN KEY AGREEMENT' [patent_app_type] => utility [patent_app_number] => 12/474265 [patent_app_country] => US [patent_app_date] => 2009-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7042 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0306/20100306525.pdf [firstpage_image] =>[orig_patent_app_number] => 12474265 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/474265
Efficient distribution of computation in key agreement May 27, 2009 Issued
Array ( [id] => 5369934 [patent_doc_number] => 20090307493 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-10 [patent_title] => 'SYSTEM AND METHOD FOR COMBINING USER AND PLATFORM AUTHENTICATION IN NEGOTIATED CHANNEL SECURITY PROTOCOLS' [patent_app_type] => utility [patent_app_number] => 12/468532 [patent_app_country] => US [patent_app_date] => 2009-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8912 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0307/20090307493.pdf [firstpage_image] =>[orig_patent_app_number] => 12468532 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/468532
System and method for combining user and platform authentication in negotiated channel security protocols May 18, 2009 Issued
Array ( [id] => 8552543 [patent_doc_number] => 08327444 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-12-04 [patent_title] => 'Suspicious autonomous system path detection' [patent_app_type] => utility [patent_app_number] => 12/422408 [patent_app_country] => US [patent_app_date] => 2009-04-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5500 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 123 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12422408 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/422408
Suspicious autonomous system path detection Apr 12, 2009 Issued
Array ( [id] => 5494911 [patent_doc_number] => 20090262939 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-10-22 [patent_title] => 'Authentication Apparatus, System and Method' [patent_app_type] => utility [patent_app_number] => 12/419648 [patent_app_country] => US [patent_app_date] => 2009-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3741 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0262/20090262939.pdf [firstpage_image] =>[orig_patent_app_number] => 12419648 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/419648
Authentication Apparatus, System and Method Apr 6, 2009 Abandoned
Array ( [id] => 6281920 [patent_doc_number] => 20100257578 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-10-07 [patent_title] => 'DATA ACCESS PROGRAMMING MODEL FOR OCCASIONALLY CONNECTED APPLICATIONS' [patent_app_type] => utility [patent_app_number] => 12/418658 [patent_app_country] => US [patent_app_date] => 2009-04-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8423 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0257/20100257578.pdf [firstpage_image] =>[orig_patent_app_number] => 12418658 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/418658
Data access programming model for occasionally connected applications Apr 5, 2009 Issued
Array ( [id] => 8355014 [patent_doc_number] => 08250358 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-08-21 [patent_title] => 'Data diode system' [patent_app_type] => utility [patent_app_number] => 12/416831 [patent_app_country] => US [patent_app_date] => 2009-04-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 3019 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 96 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12416831 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/416831
Data diode system Mar 31, 2009 Issued
Array ( [id] => 8898415 [patent_doc_number] => 08477943 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-02 [patent_title] => 'Automatic detection of wireless network type' [patent_app_type] => utility [patent_app_number] => 12/403851 [patent_app_country] => US [patent_app_date] => 2009-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5808 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12403851 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/403851
Automatic detection of wireless network type Mar 12, 2009 Issued
Menu