| Application number | Title of the application | Filing Date | Status |
|---|
Array
(
[id] => 9795312
[patent_doc_number] => 20150007256
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-01
[patent_title] => 'MONETIZING DOWNLOADABLE FILES BASED ON RESOLVING CUSTODIANSHIP THEREOF TO REFERRING PUBLISHER AND PRESENTATION OF MONETIZED CONTENT IN A MODAL OVERLAY CONTEMPORANEOUSLY WITH DOWNLOAD'
[patent_app_type] => utility
[patent_app_number] => 14/318109
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 12855
[patent_no_of_claims] => 60
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14318109
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/318109 | Monetizing downloadable files based on resolving custodianship thereof to referring publisher and presentation of monetized content in a modal overlay contemporaneously with download | Jun 26, 2014 | Issued |
Array
(
[id] => 11226954
[patent_doc_number] => 09454676
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-27
[patent_title] => 'Technologies for preventing hook-skipping attacks using processor virtualization features'
[patent_app_type] => utility
[patent_app_number] => 14/318215
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12024
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14318215
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/318215 | Technologies for preventing hook-skipping attacks using processor virtualization features | Jun 26, 2014 | Issued |
Array
(
[id] => 10952742
[patent_doc_number] => 20140355763
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-04
[patent_title] => 'METHOD AND APPARATUS FOR GENERATION AND DISTRIBUTING A GROUP KEY IN WIRELESS DOCKING'
[patent_app_type] => utility
[patent_app_number] => 14/295932
[patent_app_country] => US
[patent_app_date] => 2014-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6720
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14295932
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/295932 | METHOD AND APPARATUS FOR GENERATION AND DISTRIBUTING A GROUP KEY IN WIRELESS DOCKING | Jun 3, 2014 | Abandoned |
Array
(
[id] => 10956771
[patent_doc_number] => 20140359793
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-04
[patent_title] => 'METHOD AND SYSTEM FOR ISOLATING SECURE COMMUNICATION EVENTS FROM A NON-SECURE APPLICATION'
[patent_app_type] => utility
[patent_app_number] => 14/291905
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6304
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291905
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291905 | Method and system for isolating secure communication events from a non-secure application | May 29, 2014 | Issued |
Array
(
[id] => 10644582
[patent_doc_number] => 09361454
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-07
[patent_title] => 'Methods for restricting resources used by an application based on a base profile and an application specific profile'
[patent_app_type] => utility
[patent_app_number] => 14/292712
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5936
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292712
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292712 | Methods for restricting resources used by an application based on a base profile and an application specific profile | May 29, 2014 | Issued |
Array
(
[id] => 10465189
[patent_doc_number] => 20150350204
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'CLOUD-BASED DEVICE AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/292214
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4429
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292214
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292214 | CLOUD-BASED DEVICE AUTHENTICATION | May 29, 2014 | Abandoned |
Array
(
[id] => 10530596
[patent_doc_number] => 09256731
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-09
[patent_title] => 'System, information processing apparatus, secure module, and verification method'
[patent_app_type] => utility
[patent_app_number] => 14/292053
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 11844
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292053
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292053 | System, information processing apparatus, secure module, and verification method | May 29, 2014 | Issued |
Array
(
[id] => 11285775
[patent_doc_number] => 09501630
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'Method for generating a human likeness score'
[patent_app_type] => utility
[patent_app_number] => 14/292266
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 31
[patent_no_of_words] => 10107
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 295
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292266
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292266 | Method for generating a human likeness score | May 29, 2014 | Issued |
Array
(
[id] => 10462735
[patent_doc_number] => 20150347750
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'METHOD AND APPARATUS FOR A SCORING SERVICE FOR SECURITY THREAT MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/292700
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9110
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292700
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292700 | Method and apparatus for a scoring service for security threat management | May 29, 2014 | Issued |
Array
(
[id] => 10021606
[patent_doc_number] => 09064094
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-06-23
[patent_title] => 'Protected resource access control utilizing intermediate values of a hash chain'
[patent_app_type] => utility
[patent_app_number] => 14/289831
[patent_app_country] => US
[patent_app_date] => 2014-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 6517
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14289831
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/289831 | Protected resource access control utilizing intermediate values of a hash chain | May 28, 2014 | Issued |
Array
(
[id] => 10918630
[patent_doc_number] => 20140321649
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-30
[patent_title] => 'METHOD AND APPARATUS FOR DISTRIBUTING A QUANTUM KEY'
[patent_app_type] => utility
[patent_app_number] => 14/263436
[patent_app_country] => US
[patent_app_date] => 2014-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4548
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14263436
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/263436 | METHOD AND APPARATUS FOR DISTRIBUTING A QUANTUM KEY | Apr 27, 2014 | Abandoned |
Array
(
[id] => 12537369
[patent_doc_number] => 10009321
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-26
[patent_title] => Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication
[patent_app_type] => utility
[patent_app_number] => 14/786526
[patent_app_country] => US
[patent_app_date] => 2014-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6808
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14786526
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/786526 | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication | Apr 22, 2014 | Issued |
Array
(
[id] => 10803746
[patent_doc_number] => 20160149903
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'METHOD FOR SUPPORTING SUBSCRIBER\'S SERVICE PROVIDER CHANGE RESTRICTION POLICY IN MOBILE COMMUNICATIONS AND APPARATUS THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 14/784906
[patent_app_country] => US
[patent_app_date] => 2014-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 16908
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14784906
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/784906 | Method for supporting subscriber's service provider change restriction policy in mobile communications and apparatus therefor | Apr 14, 2014 | Issued |
Array
(
[id] => 12089840
[patent_doc_number] => 09843582
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-12
[patent_title] => 'Identity verification systems and methods'
[patent_app_type] => utility
[patent_app_number] => 14/246991
[patent_app_country] => US
[patent_app_date] => 2014-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 6351
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14246991
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/246991 | Identity verification systems and methods | Apr 6, 2014 | Issued |
Array
(
[id] => 9998998
[patent_doc_number] => 09043615
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-26
[patent_title] => 'Method and apparatus for a trust processor'
[patent_app_type] => utility
[patent_app_number] => 14/196249
[patent_app_country] => US
[patent_app_date] => 2014-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 10522
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14196249
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/196249 | Method and apparatus for a trust processor | Mar 3, 2014 | Issued |
Array
(
[id] => 10873260
[patent_doc_number] => 08898481
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-25
[patent_title] => 'Auditable cryptographic protected cloud computing communications system'
[patent_app_type] => utility
[patent_app_number] => 14/197023
[patent_app_country] => US
[patent_app_date] => 2014-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 6258
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 1018
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14197023
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/197023 | Auditable cryptographic protected cloud computing communications system | Mar 3, 2014 | Issued |
Array
(
[id] => 10072723
[patent_doc_number] => 09111083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-18
[patent_title] => 'Applications login using a mechanism relating sub-tokens to the quality of a master token'
[patent_app_type] => utility
[patent_app_number] => 14/178716
[patent_app_country] => US
[patent_app_date] => 2014-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5464
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14178716
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/178716 | Applications login using a mechanism relating sub-tokens to the quality of a master token | Feb 11, 2014 | Issued |
Array
(
[id] => 11117338
[patent_doc_number] => 20160314312
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-27
[patent_title] => 'METHOD FOR CAUSING OPERATING SYSTEM TO HAVE IMMUNE FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 15/103525
[patent_app_country] => US
[patent_app_date] => 2014-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1240
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15103525
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/103525 | METHOD FOR CAUSING OPERATING SYSTEM TO HAVE IMMUNE FUNCTION | Jan 15, 2014 | Abandoned |
Array
(
[id] => 11801666
[patent_doc_number] => 09542548
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-10
[patent_title] => 'Computer application security'
[patent_app_type] => utility
[patent_app_number] => 14/157250
[patent_app_country] => US
[patent_app_date] => 2014-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 13
[patent_no_of_words] => 7132
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157250
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/157250 | Computer application security | Jan 15, 2014 | Issued |
Array
(
[id] => 9618256
[patent_doc_number] => 20140208114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-24
[patent_title] => 'SYSTEM AND METHOD FOR MASSIVE CONTROLLED AND SECURED UPDATE OF DEVICES FIRMWARE'
[patent_app_type] => utility
[patent_app_number] => 14/157059
[patent_app_country] => US
[patent_app_date] => 2014-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3437
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157059
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/157059 | System and method for massive controlled and secured update of devices firmware | Jan 15, 2014 | Issued |