Search

Feliciano S. Mejia

Examiner (ID: 13580, Phone: (571)270-5994 , Office: P/2492 )

Most Active Art Unit
2492
Art Unit(s)
2492
Total Applications
268
Issued Applications
216
Pending Applications
3
Abandoned Applications
51

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9465232 [patent_doc_number] => 20140129659 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-08 [patent_title] => 'SELF-DESCRIBED RENDERING OF DATA' [patent_app_type] => utility [patent_app_number] => 14/154708 [patent_app_country] => US [patent_app_date] => 2014-01-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 8786 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14154708 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/154708
Self-described rendering of data Jan 13, 2014 Issued
Array ( [id] => 14250799 [patent_doc_number] => 10275602 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-04-30 [patent_title] => Method and apparatus for an end user identity protection suite [patent_app_type] => utility [patent_app_number] => 14/144426 [patent_app_country] => US [patent_app_date] => 2013-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 17 [patent_no_of_words] => 8517 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14144426 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/144426
Method and apparatus for an end user identity protection suite Dec 29, 2013 Issued
Array ( [id] => 9437436 [patent_doc_number] => 20140115343 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-24 [patent_title] => 'INFORMATION PROCESSOR, METHOD FOR VERIFYING AUTHENTICITY OF COMPUTER PROGRAM, AND COMPUTER PROGRAM PRODUCT' [patent_app_type] => utility [patent_app_number] => 14/137294 [patent_app_country] => US [patent_app_date] => 2013-12-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 6185 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14137294 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/137294
INFORMATION PROCESSOR, METHOD FOR VERIFYING AUTHENTICITY OF COMPUTER PROGRAM, AND COMPUTER PROGRAM PRODUCT Dec 19, 2013 Abandoned
Array ( [id] => 10417197 [patent_doc_number] => 20150302207 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-22 [patent_title] => 'PROVIDING INTRUSION DETECTION, MONITORING AND PROTECTION IN A SYSTEM' [patent_app_type] => utility [patent_app_number] => 14/366841 [patent_app_country] => US [patent_app_date] => 2013-12-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 9166 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14366841 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/366841
Providing intrusion detection, monitoring and protection in a system Dec 18, 2013 Issued
Array ( [id] => 9409799 [patent_doc_number] => 20140101051 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-10 [patent_title] => 'SIMPLE VISUAL AUTHENTICATION OF DOCUMENTS EXCHANGED IN COMMERCE' [patent_app_type] => utility [patent_app_number] => 14/100296 [patent_app_country] => US [patent_app_date] => 2013-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6579 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14100296 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/100296
Simple visual authentication of documents exchanged in commerce Dec 8, 2013 Issued
Array ( [id] => 10048178 [patent_doc_number] => 09088590 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-07-21 [patent_title] => 'Techniques to copy an operating system' [patent_app_type] => utility [patent_app_number] => 14/097910 [patent_app_country] => US [patent_app_date] => 2013-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4685 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14097910 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/097910
Techniques to copy an operating system Dec 4, 2013 Issued
Array ( [id] => 10589638 [patent_doc_number] => 09311255 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-04-12 [patent_title] => 'Multi-layer content protecting microcontroller' [patent_app_type] => utility [patent_app_number] => 14/022083 [patent_app_country] => US [patent_app_date] => 2013-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 9405 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14022083 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/022083
Multi-layer content protecting microcontroller Sep 8, 2013 Issued
Array ( [id] => 10017142 [patent_doc_number] => 09060169 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-16 [patent_title] => 'Methods and apparatus for providing a scalable deblocking filtering assist function within an array processor' [patent_app_type] => utility [patent_app_number] => 14/011835 [patent_app_country] => US [patent_app_date] => 2013-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 11 [patent_no_of_words] => 4537 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14011835 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/011835
Methods and apparatus for providing a scalable deblocking filtering assist function within an array processor Aug 27, 2013 Issued
Array ( [id] => 10427017 [patent_doc_number] => 20150312028 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-29 [patent_title] => 'HOMOMORPHIC ENCRYPTION AND DECRYPTION METHODS USING RING ISOMORPHISM, AND APPARATUSES USING THE SAME' [patent_app_type] => utility [patent_app_number] => 14/127478 [patent_app_country] => US [patent_app_date] => 2013-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 9381 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14127478 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/127478
HOMOMORPHIC ENCRYPTION AND DECRYPTION METHODS USING RING ISOMORPHISM, AND APPARATUSES USING THE SAME Aug 27, 2013 Abandoned
Array ( [id] => 9520279 [patent_doc_number] => 20140156770 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-05 [patent_title] => 'Method and system for exchanging messages among established contacts' [patent_app_type] => utility [patent_app_number] => 13/970603 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 10871 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970603 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/970603
Method and system for exchanging messages among established contacts Aug 19, 2013 Abandoned
Array ( [id] => 9826296 [patent_doc_number] => 08935791 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-01-13 [patent_title] => 'Asynchronous filtering and processing of events for malware detection' [patent_app_type] => utility [patent_app_number] => 13/960934 [patent_app_country] => US [patent_app_date] => 2013-08-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5319 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 172 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13960934 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/960934
Asynchronous filtering and processing of events for malware detection Aug 6, 2013 Issued
Array ( [id] => 10803757 [patent_doc_number] => 20160149913 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-26 [patent_title] => 'Access Control in an Information Centric Network' [patent_app_type] => utility [patent_app_number] => 14/899426 [patent_app_country] => US [patent_app_date] => 2013-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 16786 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14899426 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/899426
Access control in an information centric network Jun 27, 2013 Issued
Array ( [id] => 10854514 [patent_doc_number] => 08881227 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-04 [patent_title] => 'Secure web container for a secure online user environment' [patent_app_type] => utility [patent_app_number] => 13/844026 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 16 [patent_no_of_words] => 15365 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 123 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13844026 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/844026
Secure web container for a secure online user environment Mar 14, 2013 Issued
Array ( [id] => 10419102 [patent_doc_number] => 20150304114 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-22 [patent_title] => 'METHOD OF AUTHENTICATING A DEVICE' [patent_app_type] => utility [patent_app_number] => 14/372799 [patent_app_country] => US [patent_app_date] => 2013-01-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3429 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14372799 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/372799
Method of authenticating a device Jan 20, 2013 Issued
Array ( [id] => 10419302 [patent_doc_number] => 20150304313 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-22 [patent_title] => 'ONE-TIME PASSWORD OPERATING METHOD' [patent_app_type] => utility [patent_app_number] => 14/233245 [patent_app_country] => US [patent_app_date] => 2012-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 12128 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14233245 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/233245
One-time password operating method Oct 30, 2012 Issued
Array ( [id] => 11412522 [patent_doc_number] => 09559844 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-31 [patent_title] => 'Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program' [patent_app_type] => utility [patent_app_number] => 14/357088 [patent_app_country] => US [patent_app_date] => 2012-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 15745 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 220 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14357088 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/357088
Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program Oct 2, 2012 Issued
Array ( [id] => 9398480 [patent_doc_number] => 20140095886 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-03 [patent_title] => 'METHODS, SYSTEMS AND APPARATUS TO SELF AUTHORIZE PLATFORM CODE' [patent_app_type] => utility [patent_app_number] => 13/630690 [patent_app_country] => US [patent_app_date] => 2012-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7789 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13630690 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/630690
Methods, systems and apparatus to self authorize platform code Sep 27, 2012 Issued
Array ( [id] => 13753263 [patent_doc_number] => 10169579 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-01-01 [patent_title] => Malicious PDF detection [patent_app_type] => utility [patent_app_number] => 13/631518 [patent_app_country] => US [patent_app_date] => 2012-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 3671 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 245 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13631518 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/631518
Malicious PDF detection Sep 27, 2012 Issued
Array ( [id] => 10178096 [patent_doc_number] => 09208302 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-08 [patent_title] => 'Multi-factor authentication using biometric data' [patent_app_type] => utility [patent_app_number] => 13/631749 [patent_app_country] => US [patent_app_date] => 2012-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6301 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 97 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13631749 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/631749
Multi-factor authentication using biometric data Sep 27, 2012 Issued
Array ( [id] => 8894011 [patent_doc_number] => 20130167195 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-27 [patent_title] => 'HARDWARE IDENTIFICATION THROUGH COOKIES' [patent_app_type] => utility [patent_app_number] => 13/621809 [patent_app_country] => US [patent_app_date] => 2012-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5709 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13621809 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/621809
Hardware identification through cookies Sep 16, 2012 Issued
Menu