
Jesus D. Sotelo
Examiner (ID: 2092)
| Most Active Art Unit | 3105 |
| Art Unit(s) | 3105, 3102, 3612, 2899, 0, 3617 |
| Total Applications | 3000 |
| Issued Applications | 2686 |
| Pending Applications | 74 |
| Abandoned Applications | 240 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12592845
[patent_doc_number] => 20180089444
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => OUTLIER DETECTION BASED ON DISTRIBUTION FITNESS
[patent_app_type] => utility
[patent_app_number] => 15/279342
[patent_app_country] => US
[patent_app_date] => 2016-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19357
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15279342
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/279342 | Outlier detection based on distribution fitness | Sep 27, 2016 | Issued |
Array
(
[id] => 12592839
[patent_doc_number] => 20180089442
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => EXTERNAL DATASET-BASED OUTLIER DETECTION FOR CONFIDENTIAL DATA IN A COMPUTER SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/279326
[patent_app_country] => US
[patent_app_date] => 2016-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19355
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15279326
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/279326 | External dataset-based outlier detection for confidential data in a computer system | Sep 27, 2016 | Issued |
Array
(
[id] => 15063585
[patent_doc_number] => 10462117
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-29
[patent_title] => Method and system for authenticating a surrounding web application by a web application that is to be embedded
[patent_app_type] => utility
[patent_app_number] => 15/278966
[patent_app_country] => US
[patent_app_date] => 2016-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3913
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15278966
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/278966 | Method and system for authenticating a surrounding web application by a web application that is to be embedded | Sep 27, 2016 | Issued |
Array
(
[id] => 13086881
[patent_doc_number] => 10063518
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-28
[patent_title] => Reducing data connections for transmitting secured data
[patent_app_type] => utility
[patent_app_number] => 15/276845
[patent_app_country] => US
[patent_app_date] => 2016-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9174
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 445
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15276845
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/276845 | Reducing data connections for transmitting secured data | Sep 26, 2016 | Issued |
Array
(
[id] => 13468031
[patent_doc_number] => 20180285558
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => DEVICE AND METHOD FOR PASSWORD GENERATION IN A USER DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/766824
[patent_app_country] => US
[patent_app_date] => 2016-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2211
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15766824
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/766824 | DEVICE AND METHOD FOR PASSWORD GENERATION IN A USER DEVICE | Sep 8, 2016 | Abandoned |
Array
(
[id] => 11294817
[patent_doc_number] => 20160344750
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-24
[patent_title] => 'Apparatus and Method for Characterizing the Risk of a User Contracting Malicious Software'
[patent_app_type] => utility
[patent_app_number] => 15/227520
[patent_app_country] => US
[patent_app_date] => 2016-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2770
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15227520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/227520 | Apparatus and method for characterizing the risk of a user contracting malicious software | Aug 2, 2016 | Issued |
Array
(
[id] => 13322849
[patent_doc_number] => 20180212962
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-26
[patent_title] => ENABLING COORDINATED IDENTITY MANAGEMENT BETWEEN AN OPERATOR-MANAGED MOBILE-EDGE PLATFORM AND AN EXTERNAL NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/747558
[patent_app_country] => US
[patent_app_date] => 2016-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8479
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15747558
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/747558 | ENABLING COORDINATED IDENTITY MANAGEMENT BETWEEN AN OPERATOR-MANAGED MOBILE-EDGE PLATFORM AND AN EXTERNAL NETWORK | Jul 31, 2016 | Abandoned |
Array
(
[id] => 11274825
[patent_doc_number] => 20160337372
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'NETWORK SYSTEM, CONTROLLER AND PACKET AUTHENTICATING METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/220988
[patent_app_country] => US
[patent_app_date] => 2016-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12228
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15220988
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/220988 | NETWORK SYSTEM, CONTROLLER AND PACKET AUTHENTICATING METHOD | Jul 26, 2016 | Abandoned |
Array
(
[id] => 15477465
[patent_doc_number] => 10554629
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-04
[patent_title] => Push based encryption
[patent_app_type] => utility
[patent_app_number] => 15/197783
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6944
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197783
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197783 | Push based encryption | Jun 29, 2016 | Issued |
Array
(
[id] => 11368084
[patent_doc_number] => 20170006066
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'ELECTRONIC SECURITY CONTAINER'
[patent_app_type] => utility
[patent_app_number] => 15/197933
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7508
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197933
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197933 | ELECTRONIC SECURITY CONTAINER | Jun 29, 2016 | Abandoned |
Array
(
[id] => 13577835
[patent_doc_number] => 20180340466
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-29
[patent_title] => METHOD AND APPARATUS FOR SECURING COMMUNICATIONS USING MULTIPLE ENCRYPTION KEYS
[patent_app_type] => utility
[patent_app_number] => 15/580829
[patent_app_country] => US
[patent_app_date] => 2016-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16524
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15580829
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/580829 | Method and apparatus for securing communications using multiple encryption keys | Jun 7, 2016 | Issued |
Array
(
[id] => 17653522
[patent_doc_number] => 11356272
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-07
[patent_title] => Methods and devices for handling hash-tree based data signatures
[patent_app_type] => utility
[patent_app_number] => 16/098489
[patent_app_country] => US
[patent_app_date] => 2016-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 13
[patent_no_of_words] => 9473
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16098489
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/098489 | Methods and devices for handling hash-tree based data signatures | May 18, 2016 | Issued |
Array
(
[id] => 13501783
[patent_doc_number] => 20180302434
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-18
[patent_title] => PROCESSING METHOD, DEVICE AND SYSTEM FOR TCP CONNECTION
[patent_app_type] => utility
[patent_app_number] => 15/766567
[patent_app_country] => US
[patent_app_date] => 2016-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8525
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15766567
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/766567 | PROCESSING METHOD, DEVICE AND SYSTEM FOR TCP CONNECTION | Mar 17, 2016 | Abandoned |
Array
(
[id] => 10818515
[patent_doc_number] => 20160164678
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'Secure PKI Communications for \"Machine-To-Machine\" Modules, Including Key Derivation by Modules and Authenticating Public Keys'
[patent_app_type] => utility
[patent_app_number] => 15/043293
[patent_app_country] => US
[patent_app_date] => 2016-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 55086
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15043293
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/043293 | Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys | Feb 11, 2016 | Issued |
Array
(
[id] => 14025977
[patent_doc_number] => 20190074982
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-07
[patent_title] => APPARATUS AND METHOD FOR MANAGING DIGITAL CERTIFICATES
[patent_app_type] => utility
[patent_app_number] => 15/767112
[patent_app_country] => US
[patent_app_date] => 2016-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21948
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15767112
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/767112 | Apparatus and method for managing digital certificates | Jan 14, 2016 | Issued |
Array
(
[id] => 12475785
[patent_doc_number] => 09990513
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-05
[patent_title] => System and method of applying adaptive privacy controls to lossy file types
[patent_app_type] => utility
[patent_app_number] => 14/986072
[patent_app_country] => US
[patent_app_date] => 2015-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11477
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 344
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14986072
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/986072 | System and method of applying adaptive privacy controls to lossy file types | Dec 30, 2015 | Issued |
Array
(
[id] => 12460173
[patent_doc_number] => 09985933
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-29
[patent_title] => System and method of sending and receiving secret message content over a network
[patent_app_type] => utility
[patent_app_number] => 14/985874
[patent_app_country] => US
[patent_app_date] => 2015-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12622
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14985874
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/985874 | System and method of sending and receiving secret message content over a network | Dec 30, 2015 | Issued |
Array
(
[id] => 10803739
[patent_doc_number] => 20160149896
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS'
[patent_app_type] => utility
[patent_app_number] => 14/982981
[patent_app_country] => US
[patent_app_date] => 2015-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12055
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14982981
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/982981 | File format and platform for storage and verification of credentials | Dec 28, 2015 | Issued |
Array
(
[id] => 18248300
[patent_doc_number] => 11604889
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-03-14
[patent_title] => Efficient and secure sharing of large data repositories
[patent_app_type] => utility
[patent_app_number] => 15/777721
[patent_app_country] => US
[patent_app_date] => 2015-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 10
[patent_no_of_words] => 7933
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15777721
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/777721 | Efficient and secure sharing of large data repositories | Dec 21, 2015 | Issued |
Array
(
[id] => 11958504
[patent_doc_number] => 20170262656
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-14
[patent_title] => 'METHOD AND DEVICE FOR PROVIDING VERIFYING APPLICATION INTEGRITY'
[patent_app_type] => utility
[patent_app_number] => 15/531437
[patent_app_country] => US
[patent_app_date] => 2015-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3179
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15531437
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/531437 | METHOD AND DEVICE FOR PROVIDING VERIFYING APPLICATION INTEGRITY | Nov 25, 2015 | Abandoned |