
Joseph B. Murphy
Examiner (ID: 14164, Phone: (571)272-6433 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435 |
| Total Applications | 712 |
| Issued Applications | 629 |
| Pending Applications | 52 |
| Abandoned Applications | 53 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11946852
[patent_doc_number] => 20170251003
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-31
[patent_title] => 'AUTOMATICALLY DETERMINING WHETHER MALWARE SAMPLES ARE SIMILAR'
[patent_app_type] => utility
[patent_app_number] => 15/056980
[patent_app_country] => US
[patent_app_date] => 2016-02-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 35
[patent_no_of_words] => 36822
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15056980
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/056980 | Automatically determining whether malware samples are similar | Feb 28, 2016 | Issued |
Array
(
[id] => 11318303
[patent_doc_number] => 09517035
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-13
[patent_title] => 'Distributed healthcare communication system'
[patent_app_type] => utility
[patent_app_number] => 15/053303
[patent_app_country] => US
[patent_app_date] => 2016-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 11458
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15053303
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/053303 | Distributed healthcare communication system | Feb 24, 2016 | Issued |
Array
(
[id] => 12048331
[patent_doc_number] => 09825948
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-21
[patent_title] => 'Actively federated mobile authentication'
[patent_app_type] => utility
[patent_app_number] => 15/047207
[patent_app_country] => US
[patent_app_date] => 2016-02-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5302
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15047207
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/047207 | Actively federated mobile authentication | Feb 17, 2016 | Issued |
Array
(
[id] => 14605737
[patent_doc_number] => 10356070
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Method for transferring profile and electronic device supporting the same
[patent_app_type] => utility
[patent_app_number] => 15/046124
[patent_app_country] => US
[patent_app_date] => 2016-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 13336
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15046124
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/046124 | Method for transferring profile and electronic device supporting the same | Feb 16, 2016 | Issued |
Array
(
[id] => 13175963
[patent_doc_number] => 10104111
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-16
[patent_title] => Network security for internet of things
[patent_app_type] => utility
[patent_app_number] => 15/045463
[patent_app_country] => US
[patent_app_date] => 2016-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5128
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15045463
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/045463 | Network security for internet of things | Feb 16, 2016 | Issued |
Array
(
[id] => 13820819
[patent_doc_number] => 10187198
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-22
[patent_title] => Protection of a rijndael algorithm
[patent_app_type] => utility
[patent_app_number] => 15/046114
[patent_app_country] => US
[patent_app_date] => 2016-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 8459
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15046114
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/046114 | Protection of a rijndael algorithm | Feb 16, 2016 | Issued |
Array
(
[id] => 13190181
[patent_doc_number] => 10110634
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-23
[patent_title] => Monitoring user authenticity in distributed system
[patent_app_type] => utility
[patent_app_number] => 15/015871
[patent_app_country] => US
[patent_app_date] => 2016-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15568
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15015871
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/015871 | Monitoring user authenticity in distributed system | Feb 3, 2016 | Issued |
Array
(
[id] => 11854034
[patent_doc_number] => 20170228526
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-10
[patent_title] => 'STIMULI-BASED AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/015770
[patent_app_country] => US
[patent_app_date] => 2016-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9691
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15015770
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/015770 | Stimuli-based authentication | Feb 3, 2016 | Issued |
Array
(
[id] => 14601725
[patent_doc_number] => 10354055
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Portable electronic device and system
[patent_app_type] => utility
[patent_app_number] => 15/015570
[patent_app_country] => US
[patent_app_date] => 2016-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 21
[patent_no_of_words] => 14452
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15015570
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/015570 | Portable electronic device and system | Feb 3, 2016 | Issued |
Array
(
[id] => 14207279
[patent_doc_number] => 10270774
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-23
[patent_title] => Electronic credential and analytics integration
[patent_app_type] => utility
[patent_app_number] => 15/006267
[patent_app_country] => US
[patent_app_date] => 2016-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11366
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 372
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15006267
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/006267 | Electronic credential and analytics integration | Jan 25, 2016 | Issued |
Array
(
[id] => 12852715
[patent_doc_number] => 20180176079
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-21
[patent_title] => Internet of Things Configuration Method and System for Secure Low-Power-Consumption Proxy Device
[patent_app_type] => utility
[patent_app_number] => 15/577549
[patent_app_country] => US
[patent_app_date] => 2015-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10410
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15577549
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/577549 | Internet of things configuration method and system for secure low-power-consumption proxy device | Dec 28, 2015 | Issued |
Array
(
[id] => 10759304
[patent_doc_number] => 20160105457
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-14
[patent_title] => 'Risk Identification'
[patent_app_type] => utility
[patent_app_number] => 14/974191
[patent_app_country] => US
[patent_app_date] => 2015-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6300
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14974191
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/974191 | Risk identification | Dec 17, 2015 | Issued |
Array
(
[id] => 11665462
[patent_doc_number] => 20170154182
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-01
[patent_title] => 'SYSTEM, METHOD AND APPARATUS FOR USABLE CODE-LEVEL STATISTICAL ANALYSIS WITH APPLICATIONS IN MALWARE DETECTION'
[patent_app_type] => utility
[patent_app_number] => 14/954338
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6420
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14954338
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/954338 | System, method and apparatus for usable code-level statistical analysis with applications in malware detection | Nov 29, 2015 | Issued |
Array
(
[id] => 11666933
[patent_doc_number] => 20170155652
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-01
[patent_title] => 'TECHNIQUES FOR DETECTING UNAUTHORIZED ACCESS TO CLOUD APPLICATIONS BASED ON VELOCITY EVENTS'
[patent_app_type] => utility
[patent_app_number] => 14/954136
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6250
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14954136
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/954136 | Techniques for detecting unauthorized access to cloud applications based on velocity events | Nov 29, 2015 | Issued |
Array
(
[id] => 12956728
[patent_doc_number] => 09838419
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-12-05
[patent_title] => Detection and remediation of watering hole attacks directed against an enterprise
[patent_app_type] => utility
[patent_app_number] => 14/954043
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7396
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14954043
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/954043 | Detection and remediation of watering hole attacks directed against an enterprise | Nov 29, 2015 | Issued |
Array
(
[id] => 11294620
[patent_doc_number] => 20160344552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-24
[patent_title] => 'CONFIGURABLE CRYPTOGRAPHIC CONTROLLER AREA NETWORK (CAN) DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/954638
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 8861
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14954638
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/954638 | Configurable cryptographic controller area network (CAN) device | Nov 29, 2015 | Issued |
Array
(
[id] => 11666736
[patent_doc_number] => 20170155455
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-01
[patent_title] => 'FIBER OPTIC ENCRYPTION'
[patent_app_type] => utility
[patent_app_number] => 14/954029
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5931
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14954029
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/954029 | Fiber optic encryption | Nov 29, 2015 | Issued |
Array
(
[id] => 10810444
[patent_doc_number] => 20160156603
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-02
[patent_title] => 'Low Power Secure User Identity Authentication Ring'
[patent_app_type] => utility
[patent_app_number] => 14/954617
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 6008
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14954617
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/954617 | Low Power Secure User Identity Authentication Ring | Nov 29, 2015 | Abandoned |
Array
(
[id] => 13029593
[patent_doc_number] => 10037418
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-31
[patent_title] => Pre-boot authentication credential sharing system
[patent_app_type] => utility
[patent_app_number] => 14/952333
[patent_app_country] => US
[patent_app_date] => 2015-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5746
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14952333
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/952333 | Pre-boot authentication credential sharing system | Nov 24, 2015 | Issued |
Array
(
[id] => 12399042
[patent_doc_number] => 09967274
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-08
[patent_title] => Systems and methods for identifying compromised devices within industrial control systems
[patent_app_type] => utility
[patent_app_number] => 14/952344
[patent_app_country] => US
[patent_app_date] => 2015-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10438
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14952344
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/952344 | Systems and methods for identifying compromised devices within industrial control systems | Nov 24, 2015 | Issued |