
Feliciano S. Mejia
Examiner (ID: 13580, Phone: (571)270-5994 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2492 |
| Total Applications | 268 |
| Issued Applications | 216 |
| Pending Applications | 3 |
| Abandoned Applications | 51 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11327368
[patent_doc_number] => 20160357980
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'SECURE STORAGE AND SHARING OF DATA BY HYBRID ENCRYPTION USING PREDEFINED SCHEMA'
[patent_app_type] => utility
[patent_app_number] => 14/731262
[patent_app_country] => US
[patent_app_date] => 2015-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10865
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14731262
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/731262 | Secure storage and sharing of data by hybrid encryption using predefined schema | Jun 3, 2015 | Issued |
Array
(
[id] => 10480213
[patent_doc_number] => 20150365231
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'METHOD FOR CONFIGURING A SECURE ELEMENT, KEY DERIVATION PROGRAM, COMPUTER PROGRAM PRODUCT AND CONFIGURABLE SECURE ELEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/730178
[patent_app_country] => US
[patent_app_date] => 2015-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2171
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14730178
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/730178 | METHOD FOR CONFIGURING A SECURE ELEMENT, KEY DERIVATION PROGRAM, COMPUTER PROGRAM PRODUCT AND CONFIGURABLE SECURE ELEMENT | Jun 2, 2015 | Abandoned |
Array
(
[id] => 12169197
[patent_doc_number] => 09887973
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-06
[patent_title] => 'Private peer-to-peer data transfers'
[patent_app_type] => utility
[patent_app_number] => 14/730220
[patent_app_country] => US
[patent_app_date] => 2015-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6299
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14730220
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/730220 | Private peer-to-peer data transfers | Jun 2, 2015 | Issued |
Array
(
[id] => 11359071
[patent_doc_number] => 09535725
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-03
[patent_title] => 'System and method for disabling and/or enabling a device'
[patent_app_type] => utility
[patent_app_number] => 14/727145
[patent_app_country] => US
[patent_app_date] => 2015-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5391
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14727145
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/727145 | System and method for disabling and/or enabling a device | May 31, 2015 | Issued |
Array
(
[id] => 10464956
[patent_doc_number] => 20150349971
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'PROXIMITY-BASED CONFERENCE SESSION TRANSFER'
[patent_app_type] => utility
[patent_app_number] => 14/726271
[patent_app_country] => US
[patent_app_date] => 2015-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8742
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726271
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/726271 | PROXIMITY-BASED CONFERENCE SESSION TRANSFER | May 28, 2015 | Abandoned |
Array
(
[id] => 11688182
[patent_doc_number] => 09686236
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Mobile telephone firewall and compliance enforcement system and methods'
[patent_app_type] => utility
[patent_app_number] => 14/721215
[patent_app_country] => US
[patent_app_date] => 2015-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 19
[patent_no_of_words] => 28438
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14721215
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/721215 | Mobile telephone firewall and compliance enforcement system and methods | May 25, 2015 | Issued |
Array
(
[id] => 13212673
[patent_doc_number] => 10120706
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-06
[patent_title] => Techniques to migrate a virtual machine
[patent_app_type] => utility
[patent_app_number] => 14/717515
[patent_app_country] => US
[patent_app_date] => 2015-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4637
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14717515
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/717515 | Techniques to migrate a virtual machine | May 19, 2015 | Issued |
Array
(
[id] => 12187889
[patent_doc_number] => 20180046825
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-15
[patent_title] => 'METHOD AND APPARATUS FOR DISCOVERING SOCIAL TIES BASED ON CLOAKED TRAJECTORIES'
[patent_app_type] => utility
[patent_app_number] => 15/554520
[patent_app_country] => US
[patent_app_date] => 2015-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8737
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15554520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/554520 | Method and apparatus for discovering social ties based on cloaked trajectories | Mar 15, 2015 | Issued |
Array
(
[id] => 10379717
[patent_doc_number] => 20150264724
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'METHOD AND SYSTEM OF ESTABLISHING WIRELESS COMMUNICATION CONNECTION'
[patent_app_type] => utility
[patent_app_number] => 14/656545
[patent_app_country] => US
[patent_app_date] => 2015-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13442
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14656545
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/656545 | METHOD AND SYSTEM OF ESTABLISHING WIRELESS COMMUNICATION CONNECTION | Mar 11, 2015 | Abandoned |
Array
(
[id] => 10250078
[patent_doc_number] => 20150135074
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-14
[patent_title] => 'ADAPTIVE INTERVALS IN NAVIGATING CONTENT AND/OR MEDIA'
[patent_app_type] => utility
[patent_app_number] => 14/603005
[patent_app_country] => US
[patent_app_date] => 2015-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 20289
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14603005
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/603005 | Adaptive intervals in navigating content and/or media | Jan 21, 2015 | Issued |
Array
(
[id] => 11126273
[patent_doc_number] => 20160323248
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-03
[patent_title] => 'METHODS, APPARATUS, SYSTEMS AND MECHANISMS FOR SECURE ATTRIBUTE BASED FRIEND FIND AND PROXIMITY DISCOVERY'
[patent_app_type] => utility
[patent_app_number] => 15/108712
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 27325
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108712
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/108712 | METHODS, APPARATUS, SYSTEMS AND MECHANISMS FOR SECURE ATTRIBUTE BASED FRIEND FIND AND PROXIMITY DISCOVERY | Dec 29, 2014 | Abandoned |
Array
(
[id] => 11131379
[patent_doc_number] => 20160328354
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-10
[patent_title] => 'METHOD FOR EXCHANGING CONTROLS THROUGH A USB DISC AND RELATIVE DEVICES WHICH ALLOW THE IMPLEMENTATION THEREOF'
[patent_app_type] => utility
[patent_app_number] => 15/108640
[patent_app_country] => US
[patent_app_date] => 2014-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6106
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108640
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/108640 | METHOD FOR EXCHANGING CONTROLS THROUGH A USB DISC AND RELATIVE DEVICES WHICH ALLOW THE IMPLEMENTATION THEREOF | Dec 15, 2014 | Abandoned |
Array
(
[id] => 11117347
[patent_doc_number] => 20160314321
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-27
[patent_title] => 'MONITORING LEAKAGE OF CORPORATION INFORMATION FOR SMART PHONE'
[patent_app_type] => utility
[patent_app_number] => 15/103284
[patent_app_country] => US
[patent_app_date] => 2014-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3565
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15103284
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/103284 | Monitoring leakage of corporation information for smart phone | Dec 4, 2014 | Issued |
Array
(
[id] => 10519844
[patent_doc_number] => 09246904
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-26
[patent_title] => 'Secure web container for a secure online user environment'
[patent_app_type] => utility
[patent_app_number] => 14/531837
[patent_app_country] => US
[patent_app_date] => 2014-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 16
[patent_no_of_words] => 15393
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14531837
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/531837 | Secure web container for a secure online user environment | Nov 2, 2014 | Issued |
Array
(
[id] => 14369111
[patent_doc_number] => 10305878
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-28
[patent_title] => Virtual device authorization method and device
[patent_app_type] => utility
[patent_app_number] => 15/102137
[patent_app_country] => US
[patent_app_date] => 2014-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 7056
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 441
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15102137
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/102137 | Virtual device authorization method and device | Oct 22, 2014 | Issued |
Array
(
[id] => 10228602
[patent_doc_number] => 20150113595
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-23
[patent_title] => 'NETWORK ACCESS METHOD AND TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 14/516102
[patent_app_country] => US
[patent_app_date] => 2014-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9989
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14516102
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/516102 | NETWORK ACCESS METHOD AND TERMINAL | Oct 15, 2014 | Abandoned |
Array
(
[id] => 11287397
[patent_doc_number] => 09503263
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'Method and apparatus for storing encrypted data files across distributed storage media'
[patent_app_type] => utility
[patent_app_number] => 14/515833
[patent_app_country] => US
[patent_app_date] => 2014-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 6168
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14515833
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/515833 | Method and apparatus for storing encrypted data files across distributed storage media | Oct 15, 2014 | Issued |
Array
(
[id] => 12576504
[patent_doc_number] => 10021108
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-10
[patent_title] => Anomaly detection for access control events
[patent_app_type] => utility
[patent_app_number] => 14/515782
[patent_app_country] => US
[patent_app_date] => 2014-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11708
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14515782
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/515782 | Anomaly detection for access control events | Oct 15, 2014 | Issued |
Array
(
[id] => 10258116
[patent_doc_number] => 20150143113
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-21
[patent_title] => 'METHOD AND SYSTEM FOR ENCRYPTING INFORMATION UTILIZING THREE-DIMENSIONAL SHAPES'
[patent_app_type] => utility
[patent_app_number] => 14/516515
[patent_app_country] => US
[patent_app_date] => 2014-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5417
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14516515
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/516515 | METHOD AND SYSTEM FOR ENCRYPTING INFORMATION UTILIZING THREE-DIMENSIONAL SHAPES | Oct 15, 2014 | Abandoned |
Array
(
[id] => 10221902
[patent_doc_number] => 20150106894
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-16
[patent_title] => 'RETURN MATERIAL AUTHORIZATION FULFULLMENT SYSTEM FOR SMART GRID DEVICES WITH CUSTOMER SPECIFIC CRYPTOGRAPHIC CREDENTIALS'
[patent_app_type] => utility
[patent_app_number] => 14/515920
[patent_app_country] => US
[patent_app_date] => 2014-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4140
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14515920
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/515920 | Return material authorization fulfillment system for smart grid devices with customer specific cryptographic credentials | Oct 15, 2014 | Issued |