
Joseph B. Murphy
Examiner (ID: 14164, Phone: (571)272-6433 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435 |
| Total Applications | 712 |
| Issued Applications | 629 |
| Pending Applications | 52 |
| Abandoned Applications | 53 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11629958
[patent_doc_number] => 20170140147
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-18
[patent_title] => 'MOBILE DEVICE AND MONITORING METHOD ADAPTABLE TO MOBILE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/952872
[patent_app_country] => US
[patent_app_date] => 2015-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 1868
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14952872
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/952872 | Mobile device and monitoring method adaptable to mobile device | Nov 24, 2015 | Issued |
Array
(
[id] => 11029948
[patent_doc_number] => 20160226905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'Risk Scoring For Threat Assessment'
[patent_app_type] => utility
[patent_app_number] => 14/928773
[patent_app_country] => US
[patent_app_date] => 2015-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5324
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14928773
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/928773 | Risk scoring for threat assessment | Oct 29, 2015 | Issued |
Array
(
[id] => 11477103
[patent_doc_number] => 20170063886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'MODULAR MODEL WORKFLOW IN A DISTRIBUTED COMPUTATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/929035
[patent_app_country] => US
[patent_app_date] => 2015-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 116
[patent_figures_cnt] => 116
[patent_no_of_words] => 76312
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929035
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/929035 | Modular model workflow in a distributed computation system | Oct 29, 2015 | Issued |
Array
(
[id] => 12956701
[patent_doc_number] => 09838410
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-05
[patent_title] => Identity resolution in data intake stage of machine data processing platform
[patent_app_type] => utility
[patent_app_number] => 14/928985
[patent_app_country] => US
[patent_app_date] => 2015-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 115
[patent_figures_cnt] => 126
[patent_no_of_words] => 74344
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14928985
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/928985 | Identity resolution in data intake stage of machine data processing platform | Oct 29, 2015 | Issued |
Array
(
[id] => 11607002
[patent_doc_number] => 20170124305
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-04
[patent_title] => 'Deterministic Identifiers for Source Code Elements'
[patent_app_type] => utility
[patent_app_number] => 14/929112
[patent_app_country] => US
[patent_app_date] => 2015-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6546
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929112
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/929112 | Deterministic identifiers for source code elements | Oct 29, 2015 | Issued |
Array
(
[id] => 12257705
[patent_doc_number] => 09929863
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-27
[patent_title] => 'System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth'
[patent_app_type] => utility
[patent_app_number] => 14/928914
[patent_app_country] => US
[patent_app_date] => 2015-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 7566
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14928914
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/928914 | System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth | Oct 29, 2015 | Issued |
Array
(
[id] => 11803828
[patent_doc_number] => 09544769
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-10
[patent_title] => 'Method for providing application service'
[patent_app_type] => utility
[patent_app_number] => 14/886587
[patent_app_country] => US
[patent_app_date] => 2015-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 9367
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 1239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14886587
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/886587 | Method for providing application service | Oct 18, 2015 | Issued |
Array
(
[id] => 11803828
[patent_doc_number] => 09544769
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-10
[patent_title] => 'Method for providing application service'
[patent_app_type] => utility
[patent_app_number] => 14/886587
[patent_app_country] => US
[patent_app_date] => 2015-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 9367
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 1239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14886587
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/886587 | Method for providing application service | Oct 18, 2015 | Issued |
Array
(
[id] => 14857401
[patent_doc_number] => 10417430
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-17
[patent_title] => Security remediation
[patent_app_type] => utility
[patent_app_number] => 14/859650
[patent_app_country] => US
[patent_app_date] => 2015-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 22
[patent_no_of_words] => 8298
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14859650
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/859650 | Security remediation | Sep 20, 2015 | Issued |
Array
(
[id] => 12460353
[patent_doc_number] => 09985993
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-29
[patent_title] => Query system and method to determine authentication capabilities
[patent_app_type] => utility
[patent_app_number] => 14/859328
[patent_app_country] => US
[patent_app_date] => 2015-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 10348
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14859328
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/859328 | Query system and method to determine authentication capabilities | Sep 19, 2015 | Issued |
Array
(
[id] => 12820159
[patent_doc_number] => 20180165225
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-14
[patent_title] => EFFICIENTLY STORING INTIALIZATION VECTORS
[patent_app_type] => utility
[patent_app_number] => 15/577698
[patent_app_country] => US
[patent_app_date] => 2015-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4924
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15577698
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/577698 | Efficiently storing intialization vectors | Sep 16, 2015 | Issued |
Array
(
[id] => 10734186
[patent_doc_number] => 20160080336
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'Key Usage Detection'
[patent_app_type] => utility
[patent_app_number] => 14/852342
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9892
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14852342
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/852342 | Key Usage Detection | Sep 10, 2015 | Abandoned |
Array
(
[id] => 11504100
[patent_doc_number] => 20170078285
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'Embedded Authentication in a Service Provider Network'
[patent_app_type] => utility
[patent_app_number] => 14/851228
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12926
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14851228
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/851228 | Embedded authentication in a service provider network | Sep 10, 2015 | Issued |
Array
(
[id] => 12292149
[patent_doc_number] => 09934395
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-03
[patent_title] => Enabling secure big data analytics in the cloud
[patent_app_type] => utility
[patent_app_number] => 14/852170
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6635
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14852170
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/852170 | Enabling secure big data analytics in the cloud | Sep 10, 2015 | Issued |
Array
(
[id] => 11477038
[patent_doc_number] => 20170063821
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'SECURE PROTOCOL FOR CHIP AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/851429
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7351
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14851429
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/851429 | Secure protocol for chip authentication | Sep 10, 2015 | Issued |
Array
(
[id] => 11910415
[patent_doc_number] => 09779230
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-03
[patent_title] => 'System and method for off-host abstraction of multifactor authentication'
[patent_app_type] => utility
[patent_app_number] => 14/852198
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5468
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14852198
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/852198 | System and method for off-host abstraction of multifactor authentication | Sep 10, 2015 | Issued |
Array
(
[id] => 11501931
[patent_doc_number] => 20170076116
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'Model-Based Runtime Detection of Insecure Behavior for System on Chip with Security Requirements'
[patent_app_type] => utility
[patent_app_number] => 14/851861
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9109
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14851861
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/851861 | Model-based runtime detection of insecure behavior for system on chip with security requirements | Sep 10, 2015 | Issued |
Array
(
[id] => 14009317
[patent_doc_number] => 10223117
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-05
[patent_title] => Execution flow protection in microcontrollers
[patent_app_type] => utility
[patent_app_number] => 14/852405
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 6314
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14852405
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/852405 | Execution flow protection in microcontrollers | Sep 10, 2015 | Issued |
Array
(
[id] => 11274843
[patent_doc_number] => 20160337390
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'Methods and Systems for Behavior-Specific Actuation for Real-Time Whitelisting'
[patent_app_type] => utility
[patent_app_number] => 14/849849
[patent_app_country] => US
[patent_app_date] => 2015-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 21562
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14849849
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/849849 | Methods and systems for behavior-specific actuation for real-time whitelisting | Sep 9, 2015 | Issued |
Array
(
[id] => 12394065
[patent_doc_number] => 09965604
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-08
[patent_title] => De-duplication of per-user registration data
[patent_app_type] => utility
[patent_app_number] => 14/850897
[patent_app_country] => US
[patent_app_date] => 2015-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 3
[patent_no_of_words] => 8713
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14850897
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/850897 | De-duplication of per-user registration data | Sep 9, 2015 | Issued |