Search

Joseph B. Murphy

Examiner (ID: 14164, Phone: (571)272-6433 , Office: P/2435 )

Most Active Art Unit
2435
Art Unit(s)
2435
Total Applications
712
Issued Applications
629
Pending Applications
52
Abandoned Applications
53

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9036591 [patent_doc_number] => 20130239229 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-12 [patent_title] => 'METHOD, APPARATUS AND SYSTEM FOR MANAGING DOCUMENT RIGHTS' [patent_app_type] => utility [patent_app_number] => 13/873795 [patent_app_country] => US [patent_app_date] => 2013-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5165 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13873795 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/873795
Method, apparatus and system for managing document rights Apr 29, 2013 Issued
Array ( [id] => 11200431 [patent_doc_number] => 09430647 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-30 [patent_title] => 'Peer-aware self-regulation for virtualized environments' [patent_app_type] => utility [patent_app_number] => 13/840051 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8069 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 198 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13840051 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/840051
Peer-aware self-regulation for virtualized environments Mar 14, 2013 Issued
Array ( [id] => 10052725 [patent_doc_number] => 09092605 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-07-28 [patent_title] => 'Ongoing authentication and access control with network access device' [patent_app_type] => utility [patent_app_number] => 13/844427 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 25 [patent_no_of_words] => 11560 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 264 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13844427 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/844427
Ongoing authentication and access control with network access device Mar 14, 2013 Issued
Array ( [id] => 9398851 [patent_doc_number] => 20140096257 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-03 [patent_title] => 'SECURITY REMEDIATION' [patent_app_type] => utility [patent_app_number] => 13/842176 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 8380 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13842176 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/842176
Security remediation Mar 14, 2013 Issued
Array ( [id] => 10637744 [patent_doc_number] => 09355247 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-05-31 [patent_title] => 'File extraction from memory dump for malicious content analysis' [patent_app_type] => utility [patent_app_number] => 13/801545 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7684 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13801545 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/801545
File extraction from memory dump for malicious content analysis Mar 12, 2013 Issued
Array ( [id] => 12938779 [patent_doc_number] => 09832189 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-11-28 [patent_title] => Automatic association of authentication credentials with biometrics [patent_app_type] => utility [patent_app_number] => 13/802499 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 7264 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13802499 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/802499
Automatic association of authentication credentials with biometrics Mar 12, 2013 Issued
Array ( [id] => 11188584 [patent_doc_number] => 09420008 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-08-16 [patent_title] => 'Method for repurposing of communications cryptographic capabilities' [patent_app_type] => utility [patent_app_number] => 13/800353 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3609 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13800353 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/800353
Method for repurposing of communications cryptographic capabilities Mar 12, 2013 Issued
Array ( [id] => 10066017 [patent_doc_number] => 09104867 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-08-11 [patent_title] => 'Malicious content analysis using simulated user interaction without user involvement' [patent_app_type] => utility [patent_app_number] => 13/801532 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7868 [patent_no_of_claims] => 44 [patent_no_of_ind_claims] => 14 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13801532 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/801532
Malicious content analysis using simulated user interaction without user involvement Mar 12, 2013 Issued
Array ( [id] => 9745850 [patent_doc_number] => 20140281570 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-18 [patent_title] => 'METHOD OF PERFORMING AN AUTHENTICATION PROCESS BETWEEN DATA RECORDING DEVICE AND HOST DEVICE' [patent_app_type] => utility [patent_app_number] => 13/800474 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6209 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13800474 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/800474
METHOD OF PERFORMING AN AUTHENTICATION PROCESS BETWEEN DATA RECORDING DEVICE AND HOST DEVICE Mar 12, 2013
Array ( [id] => 9947899 [patent_doc_number] => 08997230 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-03-31 [patent_title] => 'Hierarchical data security measures for a mobile device' [patent_app_type] => utility [patent_app_number] => 13/800587 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 9132 [patent_no_of_claims] => 42 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 173 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13800587 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/800587
Hierarchical data security measures for a mobile device Mar 12, 2013 Issued
Array ( [id] => 10532167 [patent_doc_number] => 09258317 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-09 [patent_title] => 'Device and method for data matching and device and method for network intrusion detection' [patent_app_type] => utility [patent_app_number] => 13/797171 [patent_app_country] => US [patent_app_date] => 2013-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 6664 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13797171 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/797171
Device and method for data matching and device and method for network intrusion detection Mar 11, 2013 Issued
Array ( [id] => 9980795 [patent_doc_number] => 09027128 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-05-05 [patent_title] => 'Automatic identification of malicious budget codes and compromised websites that are employed in phishing attacks' [patent_app_type] => utility [patent_app_number] => 13/761574 [patent_app_country] => US [patent_app_date] => 2013-02-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 8 [patent_no_of_words] => 3818 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13761574 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/761574
Automatic identification of malicious budget codes and compromised websites that are employed in phishing attacks Feb 6, 2013 Issued
Array ( [id] => 9163846 [patent_doc_number] => 20130312123 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-11-21 [patent_title] => 'EMBEDDED MULTIMEDIACARD AND ELECTRONIC DEVICE USING THE SAME, AND ENERGINING BOARD FOR EMBEDDED MULTIMEDIACARD' [patent_app_type] => utility [patent_app_number] => 13/760328 [patent_app_country] => US [patent_app_date] => 2013-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 1651 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13760328 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/760328
Embedded flash memory card and electronic device using the same, and engineering board for embedded flash memory card Feb 5, 2013 Issued
Array ( [id] => 11239406 [patent_doc_number] => 09466051 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-10-11 [patent_title] => 'Funding access in a distributed electronic environment' [patent_app_type] => utility [patent_app_number] => 13/760769 [patent_app_country] => US [patent_app_date] => 2013-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 14515 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 307 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13760769 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/760769
Funding access in a distributed electronic environment Feb 5, 2013 Issued
Array ( [id] => 11186810 [patent_doc_number] => 09418213 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-08-16 [patent_title] => 'Delegated permissions in a distributed electronic environment' [patent_app_type] => utility [patent_app_number] => 13/760738 [patent_app_country] => US [patent_app_date] => 2013-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 14511 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 299 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13760738 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/760738
Delegated permissions in a distributed electronic environment Feb 5, 2013 Issued
Array ( [id] => 10562787 [patent_doc_number] => 09286465 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-03-15 [patent_title] => 'Method and apparatus for federated single sign on using authentication broker' [patent_app_type] => utility [patent_app_number] => 13/731547 [patent_app_country] => US [patent_app_date] => 2012-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 3200 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 394 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13731547 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/731547
Method and apparatus for federated single sign on using authentication broker Dec 30, 2012 Issued
Array ( [id] => 12971512 [patent_doc_number] => 09876762 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-23 [patent_title] => Cost-effective mobile connectivity protocols [patent_app_type] => utility [patent_app_number] => 13/731982 [patent_app_country] => US [patent_app_date] => 2012-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 34 [patent_figures_cnt] => 41 [patent_no_of_words] => 36740 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 280 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13731982 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/731982
Cost-effective mobile connectivity protocols Dec 30, 2012 Issued
Array ( [id] => 9320942 [patent_doc_number] => 20140053280 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-20 [patent_title] => 'Control Pool Based Enterprise Policy Enabler for Controlled Cloud Access' [patent_app_type] => utility [patent_app_number] => 13/732159 [patent_app_country] => US [patent_app_date] => 2012-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6434 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13732159 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/732159
Control pool based enterprise policy enabler for controlled cloud access Dec 30, 2012 Issued
Array ( [id] => 9572167 [patent_doc_number] => 20140189880 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-03 [patent_title] => 'SYSTEM AND METHOD FOR ADMINISTRATING ACCESS CONTROL RULES ON A SECURE ELEMENT' [patent_app_type] => utility [patent_app_number] => 13/731225 [patent_app_country] => US [patent_app_date] => 2012-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4023 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13731225 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/731225
SYSTEM AND METHOD FOR ADMINISTRATING ACCESS CONTROL RULES ON A SECURE ELEMENT Dec 30, 2012 Abandoned
Array ( [id] => 10144330 [patent_doc_number] => 09177139 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-03 [patent_title] => 'Control system cyber security' [patent_app_type] => utility [patent_app_number] => 13/731054 [patent_app_country] => US [patent_app_date] => 2012-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3483 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 197 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13731054 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/731054
Control system cyber security Dec 29, 2012 Issued
Menu