Search

Fikremariam A. Yalew

Examiner (ID: 13936)

Most Active Art Unit
2436
Art Unit(s)
2136, OPIM, 2436, OPA
Total Applications
480
Issued Applications
368
Pending Applications
27
Abandoned Applications
87

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 7792937 [patent_doc_number] => 20120054493 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-03-01 [patent_title] => 'SECURE WIRELESS LINK BETWEEN TWO DEVICES USING PROBES' [patent_app_type] => utility [patent_app_number] => 12/871843 [patent_app_country] => US [patent_app_date] => 2010-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 14190 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0054/20120054493.pdf [firstpage_image] =>[orig_patent_app_number] => 12871843 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/871843
Secure wireless link between two devices using probes Aug 29, 2010 Issued
Array ( [id] => 8728330 [patent_doc_number] => 08407471 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-03-26 [patent_title] => 'Selecting a network service for communicating with a server' [patent_app_type] => utility [patent_app_number] => 12/862092 [patent_app_country] => US [patent_app_date] => 2010-08-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4602 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 190 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12862092 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/862092
Selecting a network service for communicating with a server Aug 23, 2010 Issued
Array ( [id] => 9302374 [patent_doc_number] => 08650619 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-11 [patent_title] => 'Method and apparatus of automated discovery in a communication network' [patent_app_type] => utility [patent_app_number] => 12/859503 [patent_app_country] => US [patent_app_date] => 2010-08-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 10 [patent_no_of_words] => 8737 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 229 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12859503 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/859503
Method and apparatus of automated discovery in a communication network Aug 18, 2010 Issued
Array ( [id] => 7786012 [patent_doc_number] => 20120047568 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-02-23 [patent_title] => 'Digital Asset Management on the Internet' [patent_app_type] => utility [patent_app_number] => 12/858410 [patent_app_country] => US [patent_app_date] => 2010-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5450 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0047/20120047568.pdf [firstpage_image] =>[orig_patent_app_number] => 12858410 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/858410
Digital Asset Management on the Internet Aug 16, 2010 Abandoned
Array ( [id] => 7780810 [patent_doc_number] => 20120042366 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-02-16 [patent_title] => 'SECURE AND USABLE AUTHENTICATION FOR HEALTH CARE INFORMATION ACCESS' [patent_app_type] => utility [patent_app_number] => 12/855855 [patent_app_country] => US [patent_app_date] => 2010-08-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5970 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0042/20120042366.pdf [firstpage_image] =>[orig_patent_app_number] => 12855855 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/855855
Secure and usable authentication for health care information access Aug 12, 2010 Issued
Array ( [id] => 10190302 [patent_doc_number] => 09219734 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-22 [patent_title] => 'Method and system for automatically detecting media and implementing interaction control thereon' [patent_app_type] => utility [patent_app_number] => 12/854043 [patent_app_country] => US [patent_app_date] => 2010-08-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 30 [patent_figures_cnt] => 30 [patent_no_of_words] => 43662 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12854043 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/854043
Method and system for automatically detecting media and implementing interaction control thereon Aug 9, 2010 Issued
Array ( [id] => 8360881 [patent_doc_number] => 20120216039 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-23 [patent_title] => 'Method and Apparatus for Source Identification for Key Handling Following a Han-Dover Failure' [patent_app_type] => utility [patent_app_number] => 13/500243 [patent_app_country] => US [patent_app_date] => 2010-07-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7985 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13500243 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/500243
Method and apparatus for source identification for key handling following a handover failure Jul 27, 2010 Issued
Array ( [id] => 7746867 [patent_doc_number] => 20120023324 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-01-26 [patent_title] => 'INSIDER THREAT CORRELATION TOOL' [patent_app_type] => utility [patent_app_number] => 12/841323 [patent_app_country] => US [patent_app_date] => 2010-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8838 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0023/20120023324.pdf [firstpage_image] =>[orig_patent_app_number] => 12841323 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/841323
Insider threat correlation tool Jul 21, 2010 Issued
Array ( [id] => 7671872 [patent_doc_number] => 20110321141 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-29 [patent_title] => 'NETWORK DEVICES WITH LOG-ON INTERFACES' [patent_app_type] => utility [patent_app_number] => 12/839147 [patent_app_country] => US [patent_app_date] => 2010-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7428 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12839147 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/839147
NETWORK DEVICES WITH LOG-ON INTERFACES Jul 18, 2010 Abandoned
Array ( [id] => 8633143 [patent_doc_number] => 08365243 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-01-29 [patent_title] => 'Image leak prevention using geotagging' [patent_app_type] => utility [patent_app_number] => 12/835763 [patent_app_country] => US [patent_app_date] => 2010-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 7150 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12835763 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/835763
Image leak prevention using geotagging Jul 13, 2010 Issued
Array ( [id] => 6133693 [patent_doc_number] => 20110007893 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-13 [patent_title] => 'METHOD AND APPARATUS FOR FINGERPRINTING AND COPY PROTECTING OPTICAL RECORDING MEDIA' [patent_app_type] => utility [patent_app_number] => 12/831518 [patent_app_country] => US [patent_app_date] => 2010-07-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5584 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0007/20110007893.pdf [firstpage_image] =>[orig_patent_app_number] => 12831518 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/831518
METHOD AND APPARATUS FOR FINGERPRINTING AND COPY PROTECTING OPTICAL RECORDING MEDIA Jul 6, 2010 Abandoned
Array ( [id] => 7714194 [patent_doc_number] => 20120005480 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-01-05 [patent_title] => 'METHODS FOR FIRMWARE SIGNATURE' [patent_app_type] => utility [patent_app_number] => 12/829261 [patent_app_country] => US [patent_app_date] => 2010-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5394 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0005/20120005480.pdf [firstpage_image] =>[orig_patent_app_number] => 12829261 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/829261
Methods for firmware signature Jun 30, 2010 Issued
Array ( [id] => 6100781 [patent_doc_number] => 20110004928 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-06 [patent_title] => 'PASSWORD INPUT SYSTEM USING ALPHANUMERIC MATRICES AND PASSWORD INPUT METHOD USING THE SAME' [patent_app_type] => utility [patent_app_number] => 12/824761 [patent_app_country] => US [patent_app_date] => 2010-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 7861 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0004/20110004928.pdf [firstpage_image] =>[orig_patent_app_number] => 12824761 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/824761
Password input system using alphanumeric matrices and password input method using the same Jun 27, 2010 Issued
Array ( [id] => 7668566 [patent_doc_number] => 20110317835 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-29 [patent_title] => 'Method and Apparatus to Facilitate Wireline Transmission of an Encrypted Rolling Code' [patent_app_type] => utility [patent_app_number] => 12/822499 [patent_app_country] => US [patent_app_date] => 2010-06-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 9650 [patent_no_of_claims] => 39 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12822499 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/822499
Method and Apparatus to Facilitate Wireline Transmission of an Encrypted Rolling Code Jun 23, 2010 Abandoned
Array ( [id] => 6339220 [patent_doc_number] => 20100199337 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-05 [patent_title] => 'SYSTEM AND METHOD FOR ESTABLISHING AND AUTHORIZING A SECURITY CODE' [patent_app_type] => utility [patent_app_number] => 12/758489 [patent_app_country] => US [patent_app_date] => 2010-04-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 5929 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0199/20100199337.pdf [firstpage_image] =>[orig_patent_app_number] => 12758489 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/758489
SYSTEM AND METHOD FOR ESTABLISHING AND AUTHORIZING A SECURITY CODE Apr 11, 2010 Abandoned
Array ( [id] => 6337720 [patent_doc_number] => 20100199100 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-05 [patent_title] => 'Secure Access by a User to a Resource' [patent_app_type] => utility [patent_app_number] => 12/696310 [patent_app_country] => US [patent_app_date] => 2010-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10027 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0199/20100199100.pdf [firstpage_image] =>[orig_patent_app_number] => 12696310 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/696310
Secure Access by a User to a Resource Jan 28, 2010 Abandoned
Array ( [id] => 8632886 [patent_doc_number] => 08364985 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-01-29 [patent_title] => 'Buffer-caches for caching encrypted data via copy-on-encrypt' [patent_app_type] => utility [patent_app_number] => 12/636536 [patent_app_country] => US [patent_app_date] => 2009-12-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4602 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 100 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12636536 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/636536
Buffer-caches for caching encrypted data via copy-on-encrypt Dec 10, 2009 Issued
Array ( [id] => 6452620 [patent_doc_number] => 20100169970 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-01 [patent_title] => 'SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION' [patent_app_type] => utility [patent_app_number] => 12/633493 [patent_app_country] => US [patent_app_date] => 2009-12-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 12024 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0169/20100169970.pdf [firstpage_image] =>[orig_patent_app_number] => 12633493 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/633493
System and methods for detecting malicious email transmission Dec 7, 2009 Issued
Array ( [id] => 6452620 [patent_doc_number] => 20100169970 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-01 [patent_title] => 'SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION' [patent_app_type] => utility [patent_app_number] => 12/633493 [patent_app_country] => US [patent_app_date] => 2009-12-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 12024 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0169/20100169970.pdf [firstpage_image] =>[orig_patent_app_number] => 12633493 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/633493
System and methods for detecting malicious email transmission Dec 7, 2009 Issued
Array ( [id] => 9358889 [patent_doc_number] => 08677445 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-03-18 [patent_title] => 'Information processing apparatus and computer readable medium' [patent_app_type] => utility [patent_app_number] => 12/631648 [patent_app_country] => US [patent_app_date] => 2009-12-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 13 [patent_no_of_words] => 8851 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12631648 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/631648
Information processing apparatus and computer readable medium Dec 3, 2009 Issued
Menu