
Joseph B. Murphy
Examiner (ID: 14164, Phone: (571)272-6433 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435 |
| Total Applications | 712 |
| Issued Applications | 629 |
| Pending Applications | 52 |
| Abandoned Applications | 53 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11797553
[patent_doc_number] => 09407433
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-02
[patent_title] => 'Mechanism for implementing key-based security for nodes within a networked virtualization environment for storage management'
[patent_app_type] => utility
[patent_app_number] => 14/014890
[patent_app_country] => US
[patent_app_date] => 2013-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 9274
[patent_no_of_claims] => 44
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14014890
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/014890 | Mechanism for implementing key-based security for nodes within a networked virtualization environment for storage management | Aug 29, 2013 | Issued |
Array
(
[id] => 10651444
[patent_doc_number] => 09367698
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-14
[patent_title] => 'Apparatus and method for performing different cryptographic algorithms in a communication system'
[patent_app_type] => utility
[patent_app_number] => 14/015422
[patent_app_country] => US
[patent_app_date] => 2013-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 17
[patent_no_of_words] => 20323
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14015422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/015422 | Apparatus and method for performing different cryptographic algorithms in a communication system | Aug 29, 2013 | Issued |
Array
(
[id] => 9912658
[patent_doc_number] => 20150067861
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-05
[patent_title] => 'DETECTING MALWARE USING REVISION CONTROL LOGS'
[patent_app_type] => utility
[patent_app_number] => 14/014754
[patent_app_country] => US
[patent_app_date] => 2013-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6733
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14014754
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/014754 | Detecting malware using revision control logs | Aug 29, 2013 | Issued |
Array
(
[id] => 10531979
[patent_doc_number] => 09258128
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-02-09
[patent_title] => 'Systems and methods for creating customer-specific tools for generating certificate signing requests'
[patent_app_type] => utility
[patent_app_number] => 14/016017
[patent_app_country] => US
[patent_app_date] => 2013-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 9801
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14016017
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/016017 | Systems and methods for creating customer-specific tools for generating certificate signing requests | Aug 29, 2013 | Issued |
Array
(
[id] => 10612025
[patent_doc_number] => 09332081
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-03
[patent_title] => 'Anonymous cross-device linking using temporal identifiers'
[patent_app_type] => utility
[patent_app_number] => 14/015515
[patent_app_country] => US
[patent_app_date] => 2013-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12111
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 314
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14015515
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/015515 | Anonymous cross-device linking using temporal identifiers | Aug 29, 2013 | Issued |
Array
(
[id] => 9912664
[patent_doc_number] => 20150067867
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-05
[patent_title] => 'Risk Identification'
[patent_app_type] => utility
[patent_app_number] => 14/014731
[patent_app_country] => US
[patent_app_date] => 2013-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6272
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14014731
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/014731 | Risk identification based on identified parts of speech of terms in a string of terms | Aug 29, 2013 | Issued |
Array
(
[id] => 9437756
[patent_doc_number] => 20140115663
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-24
[patent_title] => 'METHOD FOR DETECTING UNAUTHORIZED ACCESS AND NETWORK MONITORING APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 14/015439
[patent_app_country] => US
[patent_app_date] => 2013-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 13278
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14015439
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/015439 | Method for detecting unauthorized access and network monitoring apparatus | Aug 29, 2013 | Issued |
Array
(
[id] => 10651444
[patent_doc_number] => 09367698
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-14
[patent_title] => 'Apparatus and method for performing different cryptographic algorithms in a communication system'
[patent_app_type] => utility
[patent_app_number] => 14/015422
[patent_app_country] => US
[patent_app_date] => 2013-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 17
[patent_no_of_words] => 20323
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14015422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/015422 | Apparatus and method for performing different cryptographic algorithms in a communication system | Aug 29, 2013 | Issued |
Array
(
[id] => 10977367
[patent_doc_number] => 20140380402
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-25
[patent_title] => 'POLICY ENFORCEMENT DELAYS'
[patent_app_type] => utility
[patent_app_number] => 13/923004
[patent_app_country] => US
[patent_app_date] => 2013-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14052
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13923004
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/923004 | Policy enforcement delays | Jun 19, 2013 | Issued |
Array
(
[id] => 10977020
[patent_doc_number] => 20140380055
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-25
[patent_title] => 'KEY PAIR UPDATES BASED ON DIGITAL SIGNATURE STATES'
[patent_app_type] => utility
[patent_app_number] => 13/923340
[patent_app_country] => US
[patent_app_date] => 2013-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5003
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13923340
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/923340 | Key pair updates based on digital signature states | Jun 19, 2013 | Issued |
Array
(
[id] => 9437784
[patent_doc_number] => 20140115691
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-24
[patent_title] => 'UNLOCKING SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/922844
[patent_app_country] => US
[patent_app_date] => 2013-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 1921
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13922844
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/922844 | UNLOCKING SYSTEM AND METHOD | Jun 19, 2013 | Abandoned |
Array
(
[id] => 10034652
[patent_doc_number] => 09075972
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-07
[patent_title] => 'Image forming apparatus'
[patent_app_type] => utility
[patent_app_number] => 13/922547
[patent_app_country] => US
[patent_app_date] => 2013-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 12634
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 666
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13922547
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/922547 | Image forming apparatus | Jun 19, 2013 | Issued |
Array
(
[id] => 9213941
[patent_doc_number] => 20140013118
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-09
[patent_title] => 'INFORMATION PROCESSING APPARATUS, TERMINAL DEVICE, INFORMATION PROCESSING SYSTEM, METHOD FOR INFORMATION PROCESSING, AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 13/922562
[patent_app_country] => US
[patent_app_date] => 2013-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 13954
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13922562
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/922562 | INFORMATION PROCESSING APPARATUS, TERMINAL DEVICE, INFORMATION PROCESSING SYSTEM, METHOD FOR INFORMATION PROCESSING, AND STORAGE MEDIUM | Jun 19, 2013 | Abandoned |
Array
(
[id] => 9572169
[patent_doc_number] => 20140189882
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'SYSTEM AND METHOD FOR THE PROGRAMMATIC RUNTIME DE-OBFUSCATION OF OBFUSCATED SOFTWARE UTILIZING VIRTUAL MACHINE INTROSPECTION AND MANIPULATION OF VIRTUAL MACHINE GUEST MEMORY PERMISSIONS'
[patent_app_type] => utility
[patent_app_number] => 13/892800
[patent_app_country] => US
[patent_app_date] => 2013-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3517
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13892800
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/892800 | System and method for the programmatic runtime de-obfuscation of obfuscated software utilizing virtual machine introspection and manipulation of virtual machine guest memory permissions | May 12, 2013 | Issued |
Array
(
[id] => 10571263
[patent_doc_number] => 09294454
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-22
[patent_title] => 'Actively federated mobile authentication'
[patent_app_type] => utility
[patent_app_number] => 13/893029
[patent_app_country] => US
[patent_app_date] => 2013-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5282
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13893029
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/893029 | Actively federated mobile authentication | May 12, 2013 | Issued |
Array
(
[id] => 11287594
[patent_doc_number] => 09503463
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'Detection of threats to networks, based on geographic location'
[patent_app_type] => utility
[patent_app_number] => 13/892337
[patent_app_country] => US
[patent_app_date] => 2013-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7612
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13892337
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/892337 | Detection of threats to networks, based on geographic location | May 12, 2013 | Issued |
Array
(
[id] => 10934962
[patent_doc_number] => 20140337983
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-13
[patent_title] => 'Entry/Exit Architecture for Protected Device Modules'
[patent_app_type] => utility
[patent_app_number] => 13/891255
[patent_app_country] => US
[patent_app_date] => 2013-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7612
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13891255
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/891255 | Entry/exit architecture for protected device modules | May 9, 2013 | Issued |
Array
(
[id] => 10918619
[patent_doc_number] => 20140321637
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-30
[patent_title] => 'Secure Time and Crypto System'
[patent_app_type] => utility
[patent_app_number] => 13/874252
[patent_app_country] => US
[patent_app_date] => 2013-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1230
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13874252
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/874252 | Secure time and crypto system | Apr 29, 2013 | Issued |
Array
(
[id] => 11306917
[patent_doc_number] => 09514316
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-06
[patent_title] => 'Optical security enhancement device'
[patent_app_type] => utility
[patent_app_number] => 13/874385
[patent_app_country] => US
[patent_app_date] => 2013-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12337
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13874385
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/874385 | Optical security enhancement device | Apr 29, 2013 | Issued |
Array
(
[id] => 11200409
[patent_doc_number] => 09430624
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-30
[patent_title] => 'Efficient logon'
[patent_app_type] => utility
[patent_app_number] => 13/874289
[patent_app_country] => US
[patent_app_date] => 2013-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6701
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13874289
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/874289 | Efficient logon | Apr 29, 2013 | Issued |