
Holly H. Baynham
Examiner (ID: 2492, Phone: (571)272-2597 , Office: P/2915 )
| Most Active Art Unit | 2915 |
| Art Unit(s) | 2901, 2911, 2899, 2915, 2914 |
| Total Applications | 7400 |
| Issued Applications | 7344 |
| Pending Applications | 1 |
| Abandoned Applications | 53 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11965750
[patent_doc_number] => 20170269904
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-21
[patent_title] => 'RANDOM NUMBER GENERATOR'
[patent_app_type] => utility
[patent_app_number] => 15/263972
[patent_app_country] => US
[patent_app_date] => 2016-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 9961
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15263972
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/263972 | Random number generator | Sep 12, 2016 | Issued |
Array
(
[id] => 17758612
[patent_doc_number] => 11398915
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-26
[patent_title] => Apparatus and method for two-way authentication
[patent_app_type] => utility
[patent_app_number] => 15/248723
[patent_app_country] => US
[patent_app_date] => 2016-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 44
[patent_no_of_words] => 13568
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15248723
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/248723 | Apparatus and method for two-way authentication | Aug 25, 2016 | Issued |
Array
(
[id] => 14527683
[patent_doc_number] => 10341115
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Data security system that uses a repeatable magnetic signature as a weak entropy source
[patent_app_type] => utility
[patent_app_number] => 15/248738
[patent_app_country] => US
[patent_app_date] => 2016-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 13
[patent_no_of_words] => 4985
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15248738
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/248738 | Data security system that uses a repeatable magnetic signature as a weak entropy source | Aug 25, 2016 | Issued |
Array
(
[id] => 11973487
[patent_doc_number] => 20170277641
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-28
[patent_title] => 'INTEGRATED CIRCUIT, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/246924
[patent_app_country] => US
[patent_app_date] => 2016-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5363
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15246924
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/246924 | INTEGRATED CIRCUIT, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD | Aug 24, 2016 | Abandoned |
Array
(
[id] => 12207793
[patent_doc_number] => 20180053019
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-22
[patent_title] => 'TECHNIQUES OF IMPROVING KVM SECURITY UNDER KVM SHARING'
[patent_app_type] => utility
[patent_app_number] => 15/239054
[patent_app_country] => US
[patent_app_date] => 2016-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6101
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15239054
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/239054 | Techniques of improving KVM security under KVM sharing | Aug 16, 2016 | Issued |
Array
(
[id] => 11607003
[patent_doc_number] => 20170124306
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-04
[patent_title] => 'METHOD AND APPARATUS FOR PREVENTING APPLICATION FROM BEING DECIPHERED'
[patent_app_type] => utility
[patent_app_number] => 15/239109
[patent_app_country] => US
[patent_app_date] => 2016-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6465
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15239109
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/239109 | Method and apparatus for preventing application from being deciphered | Aug 16, 2016 | Issued |
Array
(
[id] => 11445504
[patent_doc_number] => 20170046524
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'ELECTRONIC DEVICE FOR CONTROLLING FILE SYSTEM AND OPERATING METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 15/236351
[patent_app_country] => US
[patent_app_date] => 2016-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16064
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15236351
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/236351 | ELECTRONIC DEVICE FOR CONTROLLING FILE SYSTEM AND OPERATING METHOD THEREOF | Aug 11, 2016 | Abandoned |
Array
(
[id] => 15317859
[patent_doc_number] => 10523654
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-31
[patent_title] => System and method to integrate secure and privacy-preserving biometrics with identification, authentication, and online credential systems
[patent_app_type] => utility
[patent_app_number] => 15/216285
[patent_app_country] => US
[patent_app_date] => 2016-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5645
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 325
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15216285
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/216285 | System and method to integrate secure and privacy-preserving biometrics with identification, authentication, and online credential systems | Jul 20, 2016 | Issued |
Array
(
[id] => 15701661
[patent_doc_number] => 10607011
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-31
[patent_title] => Method to detect zero-day malware applications using dynamic behaviors
[patent_app_type] => utility
[patent_app_number] => 15/215793
[patent_app_country] => US
[patent_app_date] => 2016-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 5375
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 308
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15215793
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/215793 | Method to detect zero-day malware applications using dynamic behaviors | Jul 20, 2016 | Issued |
Array
(
[id] => 11497322
[patent_doc_number] => 20170071507
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'INDIVIDUAL AUTHENTICATION METHOD, ELECTROCARDIOGRAPHIC AUTHENTICATION INFORMATION GENERATION METHOD, INDIVIDUAL AUTHENTICATION DEVICE, ELECTROCARDIOGRAPHIC AUTHENTICATION INFORMATION GENERATING DEVICE, RECORDING MEDIUM, AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/215784
[patent_app_country] => US
[patent_app_date] => 2016-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 14658
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15215784
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/215784 | Individual authentication method, electrocardiographic authentication information generation method, individual authentication device, electrocardiographic authentication information generating device, recording medium, and method | Jul 20, 2016 | Issued |
Array
(
[id] => 17138592
[patent_doc_number] => 11140168
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-05
[patent_title] => Content access validation system and method
[patent_app_type] => utility
[patent_app_number] => 15/213817
[patent_app_country] => US
[patent_app_date] => 2016-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 6989
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15213817
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/213817 | Content access validation system and method | Jul 18, 2016 | Issued |
Array
(
[id] => 11403864
[patent_doc_number] => 20170024401
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'CONTROL METHOD OF RECOVERABLE FILE PROTECTION DEVICE AND PROTECTION METHOD OF RECOVERABLE FILE'
[patent_app_type] => utility
[patent_app_number] => 15/213640
[patent_app_country] => US
[patent_app_date] => 2016-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7027
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15213640
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/213640 | Control method of recoverable file protection device and protection method of recoverable file | Jul 18, 2016 | Issued |
Array
(
[id] => 14128345
[patent_doc_number] => 10251056
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-02
[patent_title] => Electronic device with gesture actuation of companion devices, and corresponding systems and methods
[patent_app_type] => utility
[patent_app_number] => 15/209530
[patent_app_country] => US
[patent_app_date] => 2016-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16241
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15209530
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/209530 | Electronic device with gesture actuation of companion devices, and corresponding systems and methods | Jul 12, 2016 | Issued |
Array
(
[id] => 11405804
[patent_doc_number] => 20170026343
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'Anonymous Account Security Exchange'
[patent_app_type] => utility
[patent_app_number] => 15/194722
[patent_app_country] => US
[patent_app_date] => 2016-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9058
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15194722
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/194722 | Anonymous account security exchange | Jun 27, 2016 | Issued |
Array
(
[id] => 13707449
[patent_doc_number] => 20170364679
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-21
[patent_title] => INSTRUMENTED VERSIONS OF EXECUTABLE FILES
[patent_app_type] => utility
[patent_app_number] => 15/185499
[patent_app_country] => US
[patent_app_date] => 2016-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8565
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 75
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15185499
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/185499 | INSTRUMENTED VERSIONS OF EXECUTABLE FILES | Jun 16, 2016 | Abandoned |
Array
(
[id] => 11368074
[patent_doc_number] => 20170006055
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'NETWORK ATTACK SIMULATION SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 15/180336
[patent_app_country] => US
[patent_app_date] => 2016-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 22138
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15180336
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/180336 | Network attack simulation systems and methods | Jun 12, 2016 | Issued |
Array
(
[id] => 11097845
[patent_doc_number] => 20160294815
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'METHOD FOR READING ATTRIBUTES FROM AN ID TOKEN'
[patent_app_type] => utility
[patent_app_number] => 15/177389
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8105
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15177389
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/177389 | Method for reading attributes from an ID token | Jun 8, 2016 | Issued |
Array
(
[id] => 14302541
[patent_doc_number] => 10291411
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-05-14
[patent_title] => Authentication method and system
[patent_app_type] => utility
[patent_app_number] => 15/173238
[patent_app_country] => US
[patent_app_date] => 2016-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 19
[patent_no_of_words] => 26879
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15173238
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/173238 | Authentication method and system | Jun 2, 2016 | Issued |
Array
(
[id] => 12556770
[patent_doc_number] => 10015157
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-03
[patent_title] => Multi-domain applications with authorization and authentication in cloud environment
[patent_app_type] => utility
[patent_app_number] => 15/169841
[patent_app_country] => US
[patent_app_date] => 2016-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7296
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 296
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15169841
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/169841 | Multi-domain applications with authorization and authentication in cloud environment | May 31, 2016 | Issued |
Array
(
[id] => 12987130
[patent_doc_number] => 20170344745
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => SYSTEM FOR UTILIZING ONE OR MORE DATA SOURCES TO GENERATE A CUSTOMIZED SET OF OPERATIONS
[patent_app_type] => utility
[patent_app_number] => 15/164448
[patent_app_country] => US
[patent_app_date] => 2016-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22198
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15164448
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/164448 | System for utilizing one or more data sources to generate a customized set of operations | May 24, 2016 | Issued |