
Joseph B. Murphy
Examiner (ID: 14164, Phone: (571)272-6433 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435 |
| Total Applications | 712 |
| Issued Applications | 629 |
| Pending Applications | 52 |
| Abandoned Applications | 53 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9036591
[patent_doc_number] => 20130239229
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-12
[patent_title] => 'METHOD, APPARATUS AND SYSTEM FOR MANAGING DOCUMENT RIGHTS'
[patent_app_type] => utility
[patent_app_number] => 13/873795
[patent_app_country] => US
[patent_app_date] => 2013-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5165
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13873795
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/873795 | Method, apparatus and system for managing document rights | Apr 29, 2013 | Issued |
Array
(
[id] => 11200431
[patent_doc_number] => 09430647
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-30
[patent_title] => 'Peer-aware self-regulation for virtualized environments'
[patent_app_type] => utility
[patent_app_number] => 13/840051
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8069
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13840051
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/840051 | Peer-aware self-regulation for virtualized environments | Mar 14, 2013 | Issued |
Array
(
[id] => 10052725
[patent_doc_number] => 09092605
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-28
[patent_title] => 'Ongoing authentication and access control with network access device'
[patent_app_type] => utility
[patent_app_number] => 13/844427
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 25
[patent_no_of_words] => 11560
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13844427
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/844427 | Ongoing authentication and access control with network access device | Mar 14, 2013 | Issued |
Array
(
[id] => 9398851
[patent_doc_number] => 20140096257
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-03
[patent_title] => 'SECURITY REMEDIATION'
[patent_app_type] => utility
[patent_app_number] => 13/842176
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8380
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13842176
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/842176 | Security remediation | Mar 14, 2013 | Issued |
Array
(
[id] => 10637744
[patent_doc_number] => 09355247
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-31
[patent_title] => 'File extraction from memory dump for malicious content analysis'
[patent_app_type] => utility
[patent_app_number] => 13/801545
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7684
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13801545
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/801545 | File extraction from memory dump for malicious content analysis | Mar 12, 2013 | Issued |
Array
(
[id] => 12938779
[patent_doc_number] => 09832189
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-28
[patent_title] => Automatic association of authentication credentials with biometrics
[patent_app_type] => utility
[patent_app_number] => 13/802499
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7264
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13802499
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/802499 | Automatic association of authentication credentials with biometrics | Mar 12, 2013 | Issued |
Array
(
[id] => 11188584
[patent_doc_number] => 09420008
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-16
[patent_title] => 'Method for repurposing of communications cryptographic capabilities'
[patent_app_type] => utility
[patent_app_number] => 13/800353
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3609
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13800353
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/800353 | Method for repurposing of communications cryptographic capabilities | Mar 12, 2013 | Issued |
Array
(
[id] => 10066017
[patent_doc_number] => 09104867
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-11
[patent_title] => 'Malicious content analysis using simulated user interaction without user involvement'
[patent_app_type] => utility
[patent_app_number] => 13/801532
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7868
[patent_no_of_claims] => 44
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13801532
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/801532 | Malicious content analysis using simulated user interaction without user involvement | Mar 12, 2013 | Issued |
Array
(
[id] => 9745850
[patent_doc_number] => 20140281570
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'METHOD OF PERFORMING AN AUTHENTICATION PROCESS BETWEEN DATA RECORDING DEVICE AND HOST DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/800474
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6209
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13800474
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/800474 | METHOD OF PERFORMING AN AUTHENTICATION PROCESS BETWEEN DATA RECORDING DEVICE AND HOST DEVICE | Mar 12, 2013 | |
Array
(
[id] => 9947899
[patent_doc_number] => 08997230
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-31
[patent_title] => 'Hierarchical data security measures for a mobile device'
[patent_app_type] => utility
[patent_app_number] => 13/800587
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 9132
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13800587
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/800587 | Hierarchical data security measures for a mobile device | Mar 12, 2013 | Issued |
Array
(
[id] => 10532167
[patent_doc_number] => 09258317
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-09
[patent_title] => 'Device and method for data matching and device and method for network intrusion detection'
[patent_app_type] => utility
[patent_app_number] => 13/797171
[patent_app_country] => US
[patent_app_date] => 2013-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 6664
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13797171
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/797171 | Device and method for data matching and device and method for network intrusion detection | Mar 11, 2013 | Issued |
Array
(
[id] => 9980795
[patent_doc_number] => 09027128
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-05-05
[patent_title] => 'Automatic identification of malicious budget codes and compromised websites that are employed in phishing attacks'
[patent_app_type] => utility
[patent_app_number] => 13/761574
[patent_app_country] => US
[patent_app_date] => 2013-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 3818
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13761574
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/761574 | Automatic identification of malicious budget codes and compromised websites that are employed in phishing attacks | Feb 6, 2013 | Issued |
Array
(
[id] => 9163846
[patent_doc_number] => 20130312123
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'EMBEDDED MULTIMEDIACARD AND ELECTRONIC DEVICE USING THE SAME, AND ENERGINING BOARD FOR EMBEDDED MULTIMEDIACARD'
[patent_app_type] => utility
[patent_app_number] => 13/760328
[patent_app_country] => US
[patent_app_date] => 2013-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1651
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13760328
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/760328 | Embedded flash memory card and electronic device using the same, and engineering board for embedded flash memory card | Feb 5, 2013 | Issued |
Array
(
[id] => 11239406
[patent_doc_number] => 09466051
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-11
[patent_title] => 'Funding access in a distributed electronic environment'
[patent_app_type] => utility
[patent_app_number] => 13/760769
[patent_app_country] => US
[patent_app_date] => 2013-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 14515
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 307
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13760769
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/760769 | Funding access in a distributed electronic environment | Feb 5, 2013 | Issued |
Array
(
[id] => 11186810
[patent_doc_number] => 09418213
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-16
[patent_title] => 'Delegated permissions in a distributed electronic environment'
[patent_app_type] => utility
[patent_app_number] => 13/760738
[patent_app_country] => US
[patent_app_date] => 2013-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 14511
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13760738
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/760738 | Delegated permissions in a distributed electronic environment | Feb 5, 2013 | Issued |
Array
(
[id] => 10562787
[patent_doc_number] => 09286465
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-15
[patent_title] => 'Method and apparatus for federated single sign on using authentication broker'
[patent_app_type] => utility
[patent_app_number] => 13/731547
[patent_app_country] => US
[patent_app_date] => 2012-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3200
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 394
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13731547
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/731547 | Method and apparatus for federated single sign on using authentication broker | Dec 30, 2012 | Issued |
Array
(
[id] => 12971512
[patent_doc_number] => 09876762
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-23
[patent_title] => Cost-effective mobile connectivity protocols
[patent_app_type] => utility
[patent_app_number] => 13/731982
[patent_app_country] => US
[patent_app_date] => 2012-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 41
[patent_no_of_words] => 36740
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 280
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13731982
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/731982 | Cost-effective mobile connectivity protocols | Dec 30, 2012 | Issued |
Array
(
[id] => 9320942
[patent_doc_number] => 20140053280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-20
[patent_title] => 'Control Pool Based Enterprise Policy Enabler for Controlled Cloud Access'
[patent_app_type] => utility
[patent_app_number] => 13/732159
[patent_app_country] => US
[patent_app_date] => 2012-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6434
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13732159
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/732159 | Control pool based enterprise policy enabler for controlled cloud access | Dec 30, 2012 | Issued |
Array
(
[id] => 9572167
[patent_doc_number] => 20140189880
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'SYSTEM AND METHOD FOR ADMINISTRATING ACCESS CONTROL RULES ON A SECURE ELEMENT'
[patent_app_type] => utility
[patent_app_number] => 13/731225
[patent_app_country] => US
[patent_app_date] => 2012-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4023
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13731225
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/731225 | SYSTEM AND METHOD FOR ADMINISTRATING ACCESS CONTROL RULES ON A SECURE ELEMENT | Dec 30, 2012 | Abandoned |
Array
(
[id] => 10144330
[patent_doc_number] => 09177139
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Control system cyber security'
[patent_app_type] => utility
[patent_app_number] => 13/731054
[patent_app_country] => US
[patent_app_date] => 2012-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3483
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13731054
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/731054 | Control system cyber security | Dec 29, 2012 | Issued |