
Feliciano S. Mejia
Examiner (ID: 13580, Phone: (571)270-5994 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2492 |
| Total Applications | 268 |
| Issued Applications | 216 |
| Pending Applications | 3 |
| Abandoned Applications | 51 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9465232
[patent_doc_number] => 20140129659
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-08
[patent_title] => 'SELF-DESCRIBED RENDERING OF DATA'
[patent_app_type] => utility
[patent_app_number] => 14/154708
[patent_app_country] => US
[patent_app_date] => 2014-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8786
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14154708
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/154708 | Self-described rendering of data | Jan 13, 2014 | Issued |
Array
(
[id] => 14250799
[patent_doc_number] => 10275602
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Method and apparatus for an end user identity protection suite
[patent_app_type] => utility
[patent_app_number] => 14/144426
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 17
[patent_no_of_words] => 8517
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14144426
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/144426 | Method and apparatus for an end user identity protection suite | Dec 29, 2013 | Issued |
Array
(
[id] => 9437436
[patent_doc_number] => 20140115343
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-24
[patent_title] => 'INFORMATION PROCESSOR, METHOD FOR VERIFYING AUTHENTICITY OF COMPUTER PROGRAM, AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/137294
[patent_app_country] => US
[patent_app_date] => 2013-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 6185
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14137294
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/137294 | INFORMATION PROCESSOR, METHOD FOR VERIFYING AUTHENTICITY OF COMPUTER PROGRAM, AND COMPUTER PROGRAM PRODUCT | Dec 19, 2013 | Abandoned |
Array
(
[id] => 10417197
[patent_doc_number] => 20150302207
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-22
[patent_title] => 'PROVIDING INTRUSION DETECTION, MONITORING AND PROTECTION IN A SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/366841
[patent_app_country] => US
[patent_app_date] => 2013-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9166
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14366841
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/366841 | Providing intrusion detection, monitoring and protection in a system | Dec 18, 2013 | Issued |
Array
(
[id] => 9409799
[patent_doc_number] => 20140101051
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-10
[patent_title] => 'SIMPLE VISUAL AUTHENTICATION OF DOCUMENTS EXCHANGED IN COMMERCE'
[patent_app_type] => utility
[patent_app_number] => 14/100296
[patent_app_country] => US
[patent_app_date] => 2013-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6579
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14100296
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/100296 | Simple visual authentication of documents exchanged in commerce | Dec 8, 2013 | Issued |
Array
(
[id] => 10048178
[patent_doc_number] => 09088590
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-21
[patent_title] => 'Techniques to copy an operating system'
[patent_app_type] => utility
[patent_app_number] => 14/097910
[patent_app_country] => US
[patent_app_date] => 2013-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4685
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14097910
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/097910 | Techniques to copy an operating system | Dec 4, 2013 | Issued |
Array
(
[id] => 10589638
[patent_doc_number] => 09311255
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-12
[patent_title] => 'Multi-layer content protecting microcontroller'
[patent_app_type] => utility
[patent_app_number] => 14/022083
[patent_app_country] => US
[patent_app_date] => 2013-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 9405
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14022083
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/022083 | Multi-layer content protecting microcontroller | Sep 8, 2013 | Issued |
Array
(
[id] => 10017142
[patent_doc_number] => 09060169
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-16
[patent_title] => 'Methods and apparatus for providing a scalable deblocking filtering assist function within an array processor'
[patent_app_type] => utility
[patent_app_number] => 14/011835
[patent_app_country] => US
[patent_app_date] => 2013-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 4537
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14011835
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/011835 | Methods and apparatus for providing a scalable deblocking filtering assist function within an array processor | Aug 27, 2013 | Issued |
Array
(
[id] => 10427017
[patent_doc_number] => 20150312028
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'HOMOMORPHIC ENCRYPTION AND DECRYPTION METHODS USING RING ISOMORPHISM, AND APPARATUSES USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 14/127478
[patent_app_country] => US
[patent_app_date] => 2013-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9381
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14127478
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/127478 | HOMOMORPHIC ENCRYPTION AND DECRYPTION METHODS USING RING ISOMORPHISM, AND APPARATUSES USING THE SAME | Aug 27, 2013 | Abandoned |
Array
(
[id] => 9520279
[patent_doc_number] => 20140156770
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'Method and system for exchanging messages among established contacts'
[patent_app_type] => utility
[patent_app_number] => 13/970603
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 10871
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970603
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/970603 | Method and system for exchanging messages among established contacts | Aug 19, 2013 | Abandoned |
Array
(
[id] => 9826296
[patent_doc_number] => 08935791
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-13
[patent_title] => 'Asynchronous filtering and processing of events for malware detection'
[patent_app_type] => utility
[patent_app_number] => 13/960934
[patent_app_country] => US
[patent_app_date] => 2013-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5319
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13960934
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/960934 | Asynchronous filtering and processing of events for malware detection | Aug 6, 2013 | Issued |
Array
(
[id] => 10803757
[patent_doc_number] => 20160149913
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'Access Control in an Information Centric Network'
[patent_app_type] => utility
[patent_app_number] => 14/899426
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 16786
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14899426
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/899426 | Access control in an information centric network | Jun 27, 2013 | Issued |
Array
(
[id] => 10854514
[patent_doc_number] => 08881227
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-04
[patent_title] => 'Secure web container for a secure online user environment'
[patent_app_type] => utility
[patent_app_number] => 13/844026
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 16
[patent_no_of_words] => 15365
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13844026
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/844026 | Secure web container for a secure online user environment | Mar 14, 2013 | Issued |
Array
(
[id] => 10419102
[patent_doc_number] => 20150304114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-22
[patent_title] => 'METHOD OF AUTHENTICATING A DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/372799
[patent_app_country] => US
[patent_app_date] => 2013-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3429
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14372799
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/372799 | Method of authenticating a device | Jan 20, 2013 | Issued |
Array
(
[id] => 10419302
[patent_doc_number] => 20150304313
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-22
[patent_title] => 'ONE-TIME PASSWORD OPERATING METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/233245
[patent_app_country] => US
[patent_app_date] => 2012-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12128
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14233245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/233245 | One-time password operating method | Oct 30, 2012 | Issued |
Array
(
[id] => 11412522
[patent_doc_number] => 09559844
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-31
[patent_title] => 'Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program'
[patent_app_type] => utility
[patent_app_number] => 14/357088
[patent_app_country] => US
[patent_app_date] => 2012-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 15745
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14357088
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/357088 | Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program | Oct 2, 2012 | Issued |
Array
(
[id] => 9398480
[patent_doc_number] => 20140095886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-03
[patent_title] => 'METHODS, SYSTEMS AND APPARATUS TO SELF AUTHORIZE PLATFORM CODE'
[patent_app_type] => utility
[patent_app_number] => 13/630690
[patent_app_country] => US
[patent_app_date] => 2012-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7789
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13630690
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/630690 | Methods, systems and apparatus to self authorize platform code | Sep 27, 2012 | Issued |
Array
(
[id] => 13753263
[patent_doc_number] => 10169579
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-01
[patent_title] => Malicious PDF detection
[patent_app_type] => utility
[patent_app_number] => 13/631518
[patent_app_country] => US
[patent_app_date] => 2012-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 3671
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13631518
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/631518 | Malicious PDF detection | Sep 27, 2012 | Issued |
Array
(
[id] => 10178096
[patent_doc_number] => 09208302
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-08
[patent_title] => 'Multi-factor authentication using biometric data'
[patent_app_type] => utility
[patent_app_number] => 13/631749
[patent_app_country] => US
[patent_app_date] => 2012-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6301
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13631749
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/631749 | Multi-factor authentication using biometric data | Sep 27, 2012 | Issued |
Array
(
[id] => 8894011
[patent_doc_number] => 20130167195
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-27
[patent_title] => 'HARDWARE IDENTIFICATION THROUGH COOKIES'
[patent_app_type] => utility
[patent_app_number] => 13/621809
[patent_app_country] => US
[patent_app_date] => 2012-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5709
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13621809
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/621809 | Hardware identification through cookies | Sep 16, 2012 | Issued |