Search

Feliciano S. Mejia

Examiner (ID: 13580, Phone: (571)270-5994 , Office: P/2492 )

Most Active Art Unit
2492
Art Unit(s)
2492
Total Applications
268
Issued Applications
216
Pending Applications
3
Abandoned Applications
51

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11327368 [patent_doc_number] => 20160357980 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-08 [patent_title] => 'SECURE STORAGE AND SHARING OF DATA BY HYBRID ENCRYPTION USING PREDEFINED SCHEMA' [patent_app_type] => utility [patent_app_number] => 14/731262 [patent_app_country] => US [patent_app_date] => 2015-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 10865 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14731262 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/731262
Secure storage and sharing of data by hybrid encryption using predefined schema Jun 3, 2015 Issued
Array ( [id] => 10480213 [patent_doc_number] => 20150365231 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-17 [patent_title] => 'METHOD FOR CONFIGURING A SECURE ELEMENT, KEY DERIVATION PROGRAM, COMPUTER PROGRAM PRODUCT AND CONFIGURABLE SECURE ELEMENT' [patent_app_type] => utility [patent_app_number] => 14/730178 [patent_app_country] => US [patent_app_date] => 2015-06-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2171 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14730178 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/730178
METHOD FOR CONFIGURING A SECURE ELEMENT, KEY DERIVATION PROGRAM, COMPUTER PROGRAM PRODUCT AND CONFIGURABLE SECURE ELEMENT Jun 2, 2015 Abandoned
Array ( [id] => 12169197 [patent_doc_number] => 09887973 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-02-06 [patent_title] => 'Private peer-to-peer data transfers' [patent_app_type] => utility [patent_app_number] => 14/730220 [patent_app_country] => US [patent_app_date] => 2015-06-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 6299 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 241 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14730220 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/730220
Private peer-to-peer data transfers Jun 2, 2015 Issued
Array ( [id] => 11359071 [patent_doc_number] => 09535725 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-01-03 [patent_title] => 'System and method for disabling and/or enabling a device' [patent_app_type] => utility [patent_app_number] => 14/727145 [patent_app_country] => US [patent_app_date] => 2015-06-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 5391 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 71 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14727145 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/727145
System and method for disabling and/or enabling a device May 31, 2015 Issued
Array ( [id] => 10464956 [patent_doc_number] => 20150349971 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'PROXIMITY-BASED CONFERENCE SESSION TRANSFER' [patent_app_type] => utility [patent_app_number] => 14/726271 [patent_app_country] => US [patent_app_date] => 2015-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8742 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726271 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/726271
PROXIMITY-BASED CONFERENCE SESSION TRANSFER May 28, 2015 Abandoned
Array ( [id] => 11688182 [patent_doc_number] => 09686236 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-06-20 [patent_title] => 'Mobile telephone firewall and compliance enforcement system and methods' [patent_app_type] => utility [patent_app_number] => 14/721215 [patent_app_country] => US [patent_app_date] => 2015-05-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 19 [patent_no_of_words] => 28438 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 63 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14721215 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/721215
Mobile telephone firewall and compliance enforcement system and methods May 25, 2015 Issued
Array ( [id] => 13212673 [patent_doc_number] => 10120706 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-11-06 [patent_title] => Techniques to migrate a virtual machine [patent_app_type] => utility [patent_app_number] => 14/717515 [patent_app_country] => US [patent_app_date] => 2015-05-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4637 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14717515 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/717515
Techniques to migrate a virtual machine May 19, 2015 Issued
Array ( [id] => 12187889 [patent_doc_number] => 20180046825 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-02-15 [patent_title] => 'METHOD AND APPARATUS FOR DISCOVERING SOCIAL TIES BASED ON CLOAKED TRAJECTORIES' [patent_app_type] => utility [patent_app_number] => 15/554520 [patent_app_country] => US [patent_app_date] => 2015-03-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8737 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15554520 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/554520
Method and apparatus for discovering social ties based on cloaked trajectories Mar 15, 2015 Issued
Array ( [id] => 10379717 [patent_doc_number] => 20150264724 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'METHOD AND SYSTEM OF ESTABLISHING WIRELESS COMMUNICATION CONNECTION' [patent_app_type] => utility [patent_app_number] => 14/656545 [patent_app_country] => US [patent_app_date] => 2015-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 13442 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14656545 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/656545
METHOD AND SYSTEM OF ESTABLISHING WIRELESS COMMUNICATION CONNECTION Mar 11, 2015 Abandoned
Array ( [id] => 10250078 [patent_doc_number] => 20150135074 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-05-14 [patent_title] => 'ADAPTIVE INTERVALS IN NAVIGATING CONTENT AND/OR MEDIA' [patent_app_type] => utility [patent_app_number] => 14/603005 [patent_app_country] => US [patent_app_date] => 2015-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 20289 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14603005 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/603005
Adaptive intervals in navigating content and/or media Jan 21, 2015 Issued
Array ( [id] => 11126273 [patent_doc_number] => 20160323248 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-03 [patent_title] => 'METHODS, APPARATUS, SYSTEMS AND MECHANISMS FOR SECURE ATTRIBUTE BASED FRIEND FIND AND PROXIMITY DISCOVERY' [patent_app_type] => utility [patent_app_number] => 15/108712 [patent_app_country] => US [patent_app_date] => 2014-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 27325 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108712 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/108712
METHODS, APPARATUS, SYSTEMS AND MECHANISMS FOR SECURE ATTRIBUTE BASED FRIEND FIND AND PROXIMITY DISCOVERY Dec 29, 2014 Abandoned
Array ( [id] => 11131379 [patent_doc_number] => 20160328354 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-10 [patent_title] => 'METHOD FOR EXCHANGING CONTROLS THROUGH A USB DISC AND RELATIVE DEVICES WHICH ALLOW THE IMPLEMENTATION THEREOF' [patent_app_type] => utility [patent_app_number] => 15/108640 [patent_app_country] => US [patent_app_date] => 2014-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6106 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108640 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/108640
METHOD FOR EXCHANGING CONTROLS THROUGH A USB DISC AND RELATIVE DEVICES WHICH ALLOW THE IMPLEMENTATION THEREOF Dec 15, 2014 Abandoned
Array ( [id] => 11117347 [patent_doc_number] => 20160314321 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-27 [patent_title] => 'MONITORING LEAKAGE OF CORPORATION INFORMATION FOR SMART PHONE' [patent_app_type] => utility [patent_app_number] => 15/103284 [patent_app_country] => US [patent_app_date] => 2014-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3565 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15103284 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/103284
Monitoring leakage of corporation information for smart phone Dec 4, 2014 Issued
Array ( [id] => 10519844 [patent_doc_number] => 09246904 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-01-26 [patent_title] => 'Secure web container for a secure online user environment' [patent_app_type] => utility [patent_app_number] => 14/531837 [patent_app_country] => US [patent_app_date] => 2014-11-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 16 [patent_no_of_words] => 15393 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14531837 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/531837
Secure web container for a secure online user environment Nov 2, 2014 Issued
Array ( [id] => 14369111 [patent_doc_number] => 10305878 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-28 [patent_title] => Virtual device authorization method and device [patent_app_type] => utility [patent_app_number] => 15/102137 [patent_app_country] => US [patent_app_date] => 2014-10-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 7056 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 441 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15102137 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/102137
Virtual device authorization method and device Oct 22, 2014 Issued
Array ( [id] => 10228602 [patent_doc_number] => 20150113595 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-23 [patent_title] => 'NETWORK ACCESS METHOD AND TERMINAL' [patent_app_type] => utility [patent_app_number] => 14/516102 [patent_app_country] => US [patent_app_date] => 2014-10-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9989 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14516102 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/516102
NETWORK ACCESS METHOD AND TERMINAL Oct 15, 2014 Abandoned
Array ( [id] => 11287397 [patent_doc_number] => 09503263 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-22 [patent_title] => 'Method and apparatus for storing encrypted data files across distributed storage media' [patent_app_type] => utility [patent_app_number] => 14/515833 [patent_app_country] => US [patent_app_date] => 2014-10-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 6168 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14515833 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/515833
Method and apparatus for storing encrypted data files across distributed storage media Oct 15, 2014 Issued
Array ( [id] => 12576504 [patent_doc_number] => 10021108 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-07-10 [patent_title] => Anomaly detection for access control events [patent_app_type] => utility [patent_app_number] => 14/515782 [patent_app_country] => US [patent_app_date] => 2014-10-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 11708 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14515782 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/515782
Anomaly detection for access control events Oct 15, 2014 Issued
Array ( [id] => 10258116 [patent_doc_number] => 20150143113 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-05-21 [patent_title] => 'METHOD AND SYSTEM FOR ENCRYPTING INFORMATION UTILIZING THREE-DIMENSIONAL SHAPES' [patent_app_type] => utility [patent_app_number] => 14/516515 [patent_app_country] => US [patent_app_date] => 2014-10-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5417 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14516515 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/516515
METHOD AND SYSTEM FOR ENCRYPTING INFORMATION UTILIZING THREE-DIMENSIONAL SHAPES Oct 15, 2014 Abandoned
Array ( [id] => 10221902 [patent_doc_number] => 20150106894 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-16 [patent_title] => 'RETURN MATERIAL AUTHORIZATION FULFULLMENT SYSTEM FOR SMART GRID DEVICES WITH CUSTOMER SPECIFIC CRYPTOGRAPHIC CREDENTIALS' [patent_app_type] => utility [patent_app_number] => 14/515920 [patent_app_country] => US [patent_app_date] => 2014-10-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4140 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14515920 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/515920
Return material authorization fulfillment system for smart grid devices with customer specific cryptographic credentials Oct 15, 2014 Issued
Menu