
Janet C. Baxter
Supervisory Patent Examiner (ID: 5817, Phone: (571)272-5013 , Office: P/3700 )
| Most Active Art Unit | 1506 |
| Art Unit(s) | 1752, 1506, 1113 |
| Total Applications | 708 |
| Issued Applications | 480 |
| Pending Applications | 19 |
| Abandoned Applications | 209 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10236544
[patent_doc_number] => 20150121537
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'Secure Erase in a Memory Device'
[patent_app_type] => utility
[patent_app_number] => 14/135245
[patent_app_country] => US
[patent_app_date] => 2013-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10874
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14135245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/135245 | Secure erase in a memory device | Dec 18, 2013 | Issued |
Array
(
[id] => 10519912
[patent_doc_number] => 09246972
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-26
[patent_title] => 'Content delivery methods and systems'
[patent_app_type] => utility
[patent_app_number] => 14/135322
[patent_app_country] => US
[patent_app_date] => 2013-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11853
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14135322
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/135322 | Content delivery methods and systems | Dec 18, 2013 | Issued |
Array
(
[id] => 10171326
[patent_doc_number] => 09202036
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-01
[patent_title] => 'Notebook computer authorized with touch track'
[patent_app_type] => utility
[patent_app_number] => 14/135469
[patent_app_country] => US
[patent_app_date] => 2013-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1440
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14135469
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/135469 | Notebook computer authorized with touch track | Dec 18, 2013 | Issued |
Array
(
[id] => 9560121
[patent_doc_number] => 20140177834
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-26
[patent_title] => 'METHOD TO ENFORCE WATERMARKING INSTRUCTIONS IN A RECEIVING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/134687
[patent_app_country] => US
[patent_app_date] => 2013-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3273
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14134687
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/134687 | Method to enforce watermarking instructions in a receiving device | Dec 18, 2013 | Issued |
Array
(
[id] => 10178108
[patent_doc_number] => 09208314
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-08
[patent_title] => 'Systems and methods for distinguishing code of a program obfuscated within a packed program'
[patent_app_type] => utility
[patent_app_number] => 14/135004
[patent_app_country] => US
[patent_app_date] => 2013-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10090
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14135004
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/135004 | Systems and methods for distinguishing code of a program obfuscated within a packed program | Dec 18, 2013 | Issued |
Array
(
[id] => 10295895
[patent_doc_number] => 20150180894
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'DETECTING ANOMALOUS ACTIVITY FROM ACCOUNTS OF AN ONLINE SERVICE'
[patent_app_type] => utility
[patent_app_number] => 14/134575
[patent_app_country] => US
[patent_app_date] => 2013-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11600
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14134575
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/134575 | Detecting anomalous activity from accounts of an online service | Dec 18, 2013 | Issued |
Array
(
[id] => 11614779
[patent_doc_number] => 09652635
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-16
[patent_title] => 'Secure processor and a program for a secure processor'
[patent_app_type] => utility
[patent_app_number] => 14/091475
[patent_app_country] => US
[patent_app_date] => 2013-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 75
[patent_figures_cnt] => 75
[patent_no_of_words] => 19400
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14091475
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/091475 | Secure processor and a program for a secure processor | Nov 26, 2013 | Issued |
Array
(
[id] => 9386198
[patent_doc_number] => 20140089681
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-27
[patent_title] => 'SECURE PROCESSOR AND A PROGRAM FOR A SECURE PROCESSOR'
[patent_app_type] => utility
[patent_app_number] => 14/091488
[patent_app_country] => US
[patent_app_date] => 2013-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 76
[patent_figures_cnt] => 76
[patent_no_of_words] => 19400
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14091488
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/091488 | Secure processor and a program for a secure processor | Nov 26, 2013 | Issued |
Array
(
[id] => 9386197
[patent_doc_number] => 20140089680
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-27
[patent_title] => 'SECURE PROCESSOR AND A PROGRAM FOR A SECURE PROCESSOR'
[patent_app_type] => utility
[patent_app_number] => 14/091483
[patent_app_country] => US
[patent_app_date] => 2013-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 76
[patent_figures_cnt] => 76
[patent_no_of_words] => 19400
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14091483
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/091483 | Secure processor and a program for a secure processor | Nov 26, 2013 | Issued |
Array
(
[id] => 10106047
[patent_doc_number] => 09141829
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-22
[patent_title] => 'Secure processor and a program for a secure processor'
[patent_app_type] => utility
[patent_app_number] => 14/091479
[patent_app_country] => US
[patent_app_date] => 2013-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 75
[patent_figures_cnt] => 75
[patent_no_of_words] => 19399
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14091479
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/091479 | Secure processor and a program for a secure processor | Nov 26, 2013 | Issued |
Array
(
[id] => 10584779
[patent_doc_number] => 09306915
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-05
[patent_title] => 'Systems and methods for secure file transfers'
[patent_app_type] => utility
[patent_app_number] => 14/072425
[patent_app_country] => US
[patent_app_date] => 2013-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3750
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14072425
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/072425 | Systems and methods for secure file transfers | Nov 4, 2013 | Issued |
Array
(
[id] => 10585273
[patent_doc_number] => 09307412
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-05
[patent_title] => 'Method and system for evaluating security for an interactive service operation by a mobile device'
[patent_app_type] => utility
[patent_app_number] => 14/072718
[patent_app_country] => US
[patent_app_date] => 2013-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 8139
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14072718
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/072718 | Method and system for evaluating security for an interactive service operation by a mobile device | Nov 4, 2013 | Issued |
Array
(
[id] => 9332898
[patent_doc_number] => 20140059680
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-27
[patent_title] => 'LOCAL SECURE SERVICE PARTITIONS FOR OPERATING SYSTEM SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/068996
[patent_app_country] => US
[patent_app_date] => 2013-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11483
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14068996
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/068996 | Local secure service partitions for operating system security | Oct 30, 2013 | Issued |
Array
(
[id] => 10225279
[patent_doc_number] => 20150110273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-23
[patent_title] => 'POLYMORPHIC ENCRYPTION KEY MATRICES'
[patent_app_type] => utility
[patent_app_number] => 14/057203
[patent_app_country] => US
[patent_app_date] => 2013-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5362
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14057203
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/057203 | Polymorphic encryption key matrices | Oct 17, 2013 | Issued |
Array
(
[id] => 11058539
[patent_doc_number] => 20160255501
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-01
[patent_title] => 'SELECTION AND USE OF A SECURITY AGENT FOR DEVICE-TO-DEVICE (D2D) WIRELESS COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 15/029202
[patent_app_country] => US
[patent_app_date] => 2013-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 16183
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15029202
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/029202 | Selection and use of a security agent for device-to-device (D2D) wireless communications | Oct 17, 2013 | Issued |
Array
(
[id] => 10092461
[patent_doc_number] => 09129287
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-08
[patent_title] => 'System and method for gathering data for detecting fraudulent transactions'
[patent_app_type] => utility
[patent_app_number] => 14/046585
[patent_app_country] => US
[patent_app_date] => 2013-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 6500
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14046585
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/046585 | System and method for gathering data for detecting fraudulent transactions | Oct 3, 2013 | Issued |
Array
(
[id] => 10185564
[patent_doc_number] => 09215252
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-15
[patent_title] => 'Methods and apparatus to identify privacy relevant correlations between data values'
[patent_app_type] => utility
[patent_app_number] => 14/128419
[patent_app_country] => US
[patent_app_date] => 2013-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8566
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14128419
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/128419 | Methods and apparatus to identify privacy relevant correlations between data values | Sep 26, 2013 | Issued |
Array
(
[id] => 12101323
[patent_doc_number] => 09858419
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-02
[patent_title] => 'System, method, and apparatus for modular, string-sensitive, access rights analysis with demand-driven precision'
[patent_app_type] => utility
[patent_app_number] => 14/033503
[patent_app_country] => US
[patent_app_date] => 2013-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 8773
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14033503
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/033503 | System, method, and apparatus for modular, string-sensitive, access rights analysis with demand-driven precision | Sep 21, 2013 | Issued |
Array
(
[id] => 10571086
[patent_doc_number] => 09294274
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-22
[patent_title] => 'Technologies for synchronizing and restoring reference templates'
[patent_app_type] => utility
[patent_app_number] => 14/128040
[patent_app_country] => US
[patent_app_date] => 2013-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 23176
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14128040
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/128040 | Technologies for synchronizing and restoring reference templates | Sep 18, 2013 | Issued |
Array
(
[id] => 10094152
[patent_doc_number] => 09130992
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-08
[patent_title] => 'Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway'
[patent_app_type] => utility
[patent_app_number] => 14/021869
[patent_app_country] => US
[patent_app_date] => 2013-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4548
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14021869
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/021869 | Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway | Sep 8, 2013 | Issued |