
Feliciano S. Mejia
Examiner (ID: 13580, Phone: (571)270-5994 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2492 |
| Total Applications | 268 |
| Issued Applications | 216 |
| Pending Applications | 3 |
| Abandoned Applications | 51 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8264160
[patent_doc_number] => 20120163590
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-28
[patent_title] => 'CRYPTOGRAPHY MODULE FOR USE WITH FRAGMENTED KEY AND METHODS FOR USE THEREWITH'
[patent_app_type] => utility
[patent_app_number] => 12/978484
[patent_app_country] => US
[patent_app_date] => 2010-12-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6510
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12978484
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/978484 | Cryptography module for use with fragmented key and methods for use therewith | Dec 23, 2010 | Issued |
Array
(
[id] => 10021624
[patent_doc_number] => 09064112
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-23
[patent_title] => 'Malware detection for SMS/MMS based attacks'
[patent_app_type] => utility
[patent_app_number] => 12/964015
[patent_app_country] => US
[patent_app_date] => 2010-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7485
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12964015
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/964015 | Malware detection for SMS/MMS based attacks | Dec 8, 2010 | Issued |
Array
(
[id] => 10867029
[patent_doc_number] => 08892754
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-18
[patent_title] => 'Executing untrusted content in a trusted network'
[patent_app_type] => utility
[patent_app_number] => 12/943132
[patent_app_country] => US
[patent_app_date] => 2010-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9719
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12943132
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/943132 | Executing untrusted content in a trusted network | Nov 9, 2010 | Issued |
Array
(
[id] => 9352544
[patent_doc_number] => 08671449
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-03-11
[patent_title] => 'Systems and methods for identifying potential malware'
[patent_app_type] => utility
[patent_app_number] => 12/943923
[patent_app_country] => US
[patent_app_date] => 2010-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10104
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12943923
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/943923 | Systems and methods for identifying potential malware | Nov 9, 2010 | Issued |
Array
(
[id] => 6057430
[patent_doc_number] => 20110113256
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-12
[patent_title] => 'Secure Method for Processing a Content Stored Within a Component, and Corresponding Component'
[patent_app_type] => utility
[patent_app_number] => 12/942557
[patent_app_country] => US
[patent_app_date] => 2010-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 4650
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0113/20110113256.pdf
[firstpage_image] =>[orig_patent_app_number] => 12942557
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/942557 | Secure method for processing a content stored within a component, and corresponding component | Nov 8, 2010 | Issued |
Array
(
[id] => 8189618
[patent_doc_number] => 20120117608
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-10
[patent_title] => 'CERTIFICATE POLICY MANAGEMENT TOOL'
[patent_app_type] => utility
[patent_app_number] => 12/942374
[patent_app_country] => US
[patent_app_date] => 2010-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4680
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0117/20120117608.pdf
[firstpage_image] =>[orig_patent_app_number] => 12942374
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/942374 | CERTIFICATE POLICY MANAGEMENT TOOL | Nov 8, 2010 | Abandoned |
Array
(
[id] => 9630356
[patent_doc_number] => 08800050
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-05
[patent_title] => 'Security system for computing resources pre-releases'
[patent_app_type] => utility
[patent_app_number] => 12/942987
[patent_app_country] => US
[patent_app_date] => 2010-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 19
[patent_no_of_words] => 13606
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12942987
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/942987 | Security system for computing resources pre-releases | Nov 8, 2010 | Issued |
Array
(
[id] => 6057893
[patent_doc_number] => 20110113491
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-12
[patent_title] => 'COLLABORATIVE SYSTEM FOR PROTECTING AGAINST THE PROPAGATION OF MALWARES IN A NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/941199
[patent_app_country] => US
[patent_app_date] => 2010-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 10090
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0113/20110113491.pdf
[firstpage_image] =>[orig_patent_app_number] => 12941199
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/941199 | COLLABORATIVE SYSTEM FOR PROTECTING AGAINST THE PROPAGATION OF MALWARES IN A NETWORK | Nov 7, 2010 | Abandoned |
Array
(
[id] => 8189663
[patent_doc_number] => 20120117633
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-10
[patent_title] => 'Enhanced Security For Pervasive Devices Using A Weighting System'
[patent_app_type] => utility
[patent_app_number] => 12/940024
[patent_app_country] => US
[patent_app_date] => 2010-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5868
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0117/20120117633.pdf
[firstpage_image] =>[orig_patent_app_number] => 12940024
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/940024 | Enhanced Security For Pervasive Devices Using A Weighting System | Nov 3, 2010 | Abandoned |
Array
(
[id] => 9841262
[patent_doc_number] => 20150033344
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2015-01-29
[patent_title] => 'INTERNET-BASED PROXY SECURITY SERVICES'
[patent_app_type] => utility
[patent_app_number] => 12/939908
[patent_app_country] => US
[patent_app_date] => 2010-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 29
[patent_no_of_words] => 31607
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12939908
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/939908 | Internet-based proxy security services | Nov 3, 2010 | Issued |
Array
(
[id] => 9841262
[patent_doc_number] => 20150033344
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2015-01-29
[patent_title] => 'INTERNET-BASED PROXY SECURITY SERVICES'
[patent_app_type] => utility
[patent_app_number] => 12/939908
[patent_app_country] => US
[patent_app_date] => 2010-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 29
[patent_no_of_words] => 31607
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12939908
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/939908 | Internet-based proxy security services | Nov 3, 2010 | Issued |
Array
(
[id] => 9998979
[patent_doc_number] => 09043596
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-26
[patent_title] => 'Method and apparatus for authenticating public key without authentication server'
[patent_app_type] => utility
[patent_app_number] => 12/830033
[patent_app_country] => US
[patent_app_date] => 2010-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 7454
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12830033
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/830033 | Method and apparatus for authenticating public key without authentication server | Jul 1, 2010 | Issued |
Array
(
[id] => 8613781
[patent_doc_number] => 20130019093
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-17
[patent_title] => 'CERTIFICATE AUTHORITY'
[patent_app_type] => utility
[patent_app_number] => 13/638300
[patent_app_country] => US
[patent_app_date] => 2010-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4318
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13638300
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/638300 | Certificate authority | Mar 31, 2010 | Issued |
Array
(
[id] => 9829569
[patent_doc_number] => 08938808
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-01-20
[patent_title] => 'Systems and methods for using virtualization to implement information rights management'
[patent_app_type] => utility
[patent_app_number] => 12/715213
[patent_app_country] => US
[patent_app_date] => 2010-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10557
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12715213
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/715213 | Systems and methods for using virtualization to implement information rights management | Feb 28, 2010 | Issued |
Array
(
[id] => 10196607
[patent_doc_number] => 09225525
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-29
[patent_title] => 'Identity management certificate operations'
[patent_app_type] => utility
[patent_app_number] => 12/714108
[patent_app_country] => US
[patent_app_date] => 2010-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10687
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 249
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12714108
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/714108 | Identity management certificate operations | Feb 25, 2010 | Issued |
Array
(
[id] => 10873236
[patent_doc_number] => 08898457
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-25
[patent_title] => 'Automatically generating a certificate operation request'
[patent_app_type] => utility
[patent_app_number] => 12/714227
[patent_app_country] => US
[patent_app_date] => 2010-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10680
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12714227
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/714227 | Automatically generating a certificate operation request | Feb 25, 2010 | Issued |
Array
(
[id] => 8512256
[patent_doc_number] => 20120311663
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-06
[patent_title] => 'IDENTITY MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 13/577053
[patent_app_country] => US
[patent_app_date] => 2010-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12247
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13577053
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/577053 | IDENTITY MANAGEMENT | Feb 4, 2010 | Abandoned |
Array
(
[id] => 6614403
[patent_doc_number] => 20100132043
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-27
[patent_title] => 'Method and Apparatus for an End User Identity Protection Suite'
[patent_app_type] => utility
[patent_app_number] => 12/619665
[patent_app_country] => US
[patent_app_date] => 2009-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 8676
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0132/20100132043.pdf
[firstpage_image] =>[orig_patent_app_number] => 12619665
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/619665 | Method and apparatus for an end user identity protection suite | Nov 15, 2009 | Issued |
Array
(
[id] => 8285696
[patent_doc_number] => 08219810
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-10
[patent_title] => 'Method and system for facilitating throttling of interpolation-based authentication'
[patent_app_type] => utility
[patent_app_number] => 12/618385
[patent_app_country] => US
[patent_app_date] => 2009-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 4703
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12618385
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/618385 | Method and system for facilitating throttling of interpolation-based authentication | Nov 12, 2009 | Issued |
Array
(
[id] => 6006608
[patent_doc_number] => 20110119738
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-19
[patent_title] => 'IDENTITY MANAGEMENT FOR TRANSACTIONAL CONTENT'
[patent_app_type] => utility
[patent_app_number] => 12/618207
[patent_app_country] => US
[patent_app_date] => 2009-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7525
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0119/20110119738.pdf
[firstpage_image] =>[orig_patent_app_number] => 12618207
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/618207 | Identity management for transactional content | Nov 12, 2009 | Issued |