Search

Joseph B. Murphy

Examiner (ID: 14164, Phone: (571)272-6433 , Office: P/2435 )

Most Active Art Unit
2435
Art Unit(s)
2435
Total Applications
712
Issued Applications
629
Pending Applications
52
Abandoned Applications
53

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11797553 [patent_doc_number] => 09407433 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-08-02 [patent_title] => 'Mechanism for implementing key-based security for nodes within a networked virtualization environment for storage management' [patent_app_type] => utility [patent_app_number] => 14/014890 [patent_app_country] => US [patent_app_date] => 2013-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 9274 [patent_no_of_claims] => 44 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14014890 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/014890
Mechanism for implementing key-based security for nodes within a networked virtualization environment for storage management Aug 29, 2013 Issued
Array ( [id] => 10651444 [patent_doc_number] => 09367698 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-14 [patent_title] => 'Apparatus and method for performing different cryptographic algorithms in a communication system' [patent_app_type] => utility [patent_app_number] => 14/015422 [patent_app_country] => US [patent_app_date] => 2013-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 17 [patent_no_of_words] => 20323 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14015422 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/015422
Apparatus and method for performing different cryptographic algorithms in a communication system Aug 29, 2013 Issued
Array ( [id] => 9912658 [patent_doc_number] => 20150067861 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-05 [patent_title] => 'DETECTING MALWARE USING REVISION CONTROL LOGS' [patent_app_type] => utility [patent_app_number] => 14/014754 [patent_app_country] => US [patent_app_date] => 2013-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6733 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14014754 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/014754
Detecting malware using revision control logs Aug 29, 2013 Issued
Array ( [id] => 10531979 [patent_doc_number] => 09258128 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-02-09 [patent_title] => 'Systems and methods for creating customer-specific tools for generating certificate signing requests' [patent_app_type] => utility [patent_app_number] => 14/016017 [patent_app_country] => US [patent_app_date] => 2013-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 9801 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14016017 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/016017
Systems and methods for creating customer-specific tools for generating certificate signing requests Aug 29, 2013 Issued
Array ( [id] => 10612025 [patent_doc_number] => 09332081 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-05-03 [patent_title] => 'Anonymous cross-device linking using temporal identifiers' [patent_app_type] => utility [patent_app_number] => 14/015515 [patent_app_country] => US [patent_app_date] => 2013-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 12111 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 314 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14015515 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/015515
Anonymous cross-device linking using temporal identifiers Aug 29, 2013 Issued
Array ( [id] => 9912664 [patent_doc_number] => 20150067867 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-05 [patent_title] => 'Risk Identification' [patent_app_type] => utility [patent_app_number] => 14/014731 [patent_app_country] => US [patent_app_date] => 2013-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6272 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14014731 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/014731
Risk identification based on identified parts of speech of terms in a string of terms Aug 29, 2013 Issued
Array ( [id] => 9437756 [patent_doc_number] => 20140115663 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-24 [patent_title] => 'METHOD FOR DETECTING UNAUTHORIZED ACCESS AND NETWORK MONITORING APPARATUS' [patent_app_type] => utility [patent_app_number] => 14/015439 [patent_app_country] => US [patent_app_date] => 2013-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 13278 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14015439 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/015439
Method for detecting unauthorized access and network monitoring apparatus Aug 29, 2013 Issued
Array ( [id] => 10651444 [patent_doc_number] => 09367698 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-14 [patent_title] => 'Apparatus and method for performing different cryptographic algorithms in a communication system' [patent_app_type] => utility [patent_app_number] => 14/015422 [patent_app_country] => US [patent_app_date] => 2013-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 17 [patent_no_of_words] => 20323 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14015422 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/015422
Apparatus and method for performing different cryptographic algorithms in a communication system Aug 29, 2013 Issued
Array ( [id] => 10977367 [patent_doc_number] => 20140380402 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-25 [patent_title] => 'POLICY ENFORCEMENT DELAYS' [patent_app_type] => utility [patent_app_number] => 13/923004 [patent_app_country] => US [patent_app_date] => 2013-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 14052 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13923004 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/923004
Policy enforcement delays Jun 19, 2013 Issued
Array ( [id] => 10977020 [patent_doc_number] => 20140380055 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-25 [patent_title] => 'KEY PAIR UPDATES BASED ON DIGITAL SIGNATURE STATES' [patent_app_type] => utility [patent_app_number] => 13/923340 [patent_app_country] => US [patent_app_date] => 2013-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5003 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13923340 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/923340
Key pair updates based on digital signature states Jun 19, 2013 Issued
Array ( [id] => 9437784 [patent_doc_number] => 20140115691 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-24 [patent_title] => 'UNLOCKING SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 13/922844 [patent_app_country] => US [patent_app_date] => 2013-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 1921 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13922844 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/922844
UNLOCKING SYSTEM AND METHOD Jun 19, 2013 Abandoned
Array ( [id] => 10034652 [patent_doc_number] => 09075972 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-07-07 [patent_title] => 'Image forming apparatus' [patent_app_type] => utility [patent_app_number] => 13/922547 [patent_app_country] => US [patent_app_date] => 2013-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 12 [patent_no_of_words] => 12634 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 666 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13922547 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/922547
Image forming apparatus Jun 19, 2013 Issued
Array ( [id] => 9213941 [patent_doc_number] => 20140013118 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-01-09 [patent_title] => 'INFORMATION PROCESSING APPARATUS, TERMINAL DEVICE, INFORMATION PROCESSING SYSTEM, METHOD FOR INFORMATION PROCESSING, AND STORAGE MEDIUM' [patent_app_type] => utility [patent_app_number] => 13/922562 [patent_app_country] => US [patent_app_date] => 2013-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 13954 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13922562 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/922562
INFORMATION PROCESSING APPARATUS, TERMINAL DEVICE, INFORMATION PROCESSING SYSTEM, METHOD FOR INFORMATION PROCESSING, AND STORAGE MEDIUM Jun 19, 2013 Abandoned
Array ( [id] => 9572169 [patent_doc_number] => 20140189882 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-03 [patent_title] => 'SYSTEM AND METHOD FOR THE PROGRAMMATIC RUNTIME DE-OBFUSCATION OF OBFUSCATED SOFTWARE UTILIZING VIRTUAL MACHINE INTROSPECTION AND MANIPULATION OF VIRTUAL MACHINE GUEST MEMORY PERMISSIONS' [patent_app_type] => utility [patent_app_number] => 13/892800 [patent_app_country] => US [patent_app_date] => 2013-05-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3517 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13892800 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/892800
System and method for the programmatic runtime de-obfuscation of obfuscated software utilizing virtual machine introspection and manipulation of virtual machine guest memory permissions May 12, 2013 Issued
Array ( [id] => 10571263 [patent_doc_number] => 09294454 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-22 [patent_title] => 'Actively federated mobile authentication' [patent_app_type] => utility [patent_app_number] => 13/893029 [patent_app_country] => US [patent_app_date] => 2013-05-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 5282 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 212 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13893029 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/893029
Actively federated mobile authentication May 12, 2013 Issued
Array ( [id] => 11287594 [patent_doc_number] => 09503463 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-22 [patent_title] => 'Detection of threats to networks, based on geographic location' [patent_app_type] => utility [patent_app_number] => 13/892337 [patent_app_country] => US [patent_app_date] => 2013-05-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7612 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 233 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13892337 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/892337
Detection of threats to networks, based on geographic location May 12, 2013 Issued
Array ( [id] => 10934962 [patent_doc_number] => 20140337983 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-11-13 [patent_title] => 'Entry/Exit Architecture for Protected Device Modules' [patent_app_type] => utility [patent_app_number] => 13/891255 [patent_app_country] => US [patent_app_date] => 2013-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7612 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13891255 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/891255
Entry/exit architecture for protected device modules May 9, 2013 Issued
Array ( [id] => 10918619 [patent_doc_number] => 20140321637 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-30 [patent_title] => 'Secure Time and Crypto System' [patent_app_type] => utility [patent_app_number] => 13/874252 [patent_app_country] => US [patent_app_date] => 2013-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1230 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13874252 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/874252
Secure time and crypto system Apr 29, 2013 Issued
Array ( [id] => 11306917 [patent_doc_number] => 09514316 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-12-06 [patent_title] => 'Optical security enhancement device' [patent_app_type] => utility [patent_app_number] => 13/874385 [patent_app_country] => US [patent_app_date] => 2013-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 12337 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13874385 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/874385
Optical security enhancement device Apr 29, 2013 Issued
Array ( [id] => 11200409 [patent_doc_number] => 09430624 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-08-30 [patent_title] => 'Efficient logon' [patent_app_type] => utility [patent_app_number] => 13/874289 [patent_app_country] => US [patent_app_date] => 2013-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6701 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13874289 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/874289
Efficient logon Apr 29, 2013 Issued
Menu