
J. R. Miller
Examiner (ID: 564, Phone: JR JOSEPH A )
| Most Active Art Unit | 1715 |
| Art Unit(s) | 1712, 4162, 1792, 1715 |
| Total Applications | 1386 |
| Issued Applications | 889 |
| Pending Applications | 85 |
| Abandoned Applications | 429 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11765747
[patent_doc_number] => 09374223
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-21
[patent_title] => 'Methods and apparatus for including a confidential structural component in a third party remote product simulation'
[patent_app_type] => utility
[patent_app_number] => 14/291134
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 20
[patent_no_of_words] => 7398
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291134
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291134 | Methods and apparatus for including a confidential structural component in a third party remote product simulation | May 29, 2014 | Issued |
Array
(
[id] => 10094543
[patent_doc_number] => 09131382
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-08
[patent_title] => 'Trusted user interface for mobile web applications'
[patent_app_type] => utility
[patent_app_number] => 14/291319
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 7892
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291319
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291319 | Trusted user interface for mobile web applications | May 29, 2014 | Issued |
Array
(
[id] => 10956246
[patent_doc_number] => 20140359268
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-04
[patent_title] => 'Methods of Securely Changing the Root Key of a Chip, and Related Electronic Devices and Chips'
[patent_app_type] => utility
[patent_app_number] => 14/291430
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11098
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291430
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291430 | Methods of Securely Changing the Root Key of a Chip, and Related Electronic Devices and Chips | May 29, 2014 | Abandoned |
Array
(
[id] => 10513407
[patent_doc_number] => 09240990
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-19
[patent_title] => 'Acknowledgment authentication system and method'
[patent_app_type] => utility
[patent_app_number] => 14/291139
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6764
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291139
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291139 | Acknowledgment authentication system and method | May 29, 2014 | Issued |
Array
(
[id] => 10741796
[patent_doc_number] => 20160087946
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'FILE SECURITY METHOD AND APPARATUS FOR SAME'
[patent_app_type] => utility
[patent_app_number] => 14/785300
[patent_app_country] => US
[patent_app_date] => 2014-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9889
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14785300
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/785300 | File security method and apparatus for same | Apr 17, 2014 | Issued |
Array
(
[id] => 9673236
[patent_doc_number] => 20140237099
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-21
[patent_title] => 'SYSTEM AND METHOD FOR INTERMEDIATING BETWEEN SUBSCRIBER DEVICES AND COMMUNICATION SERVICE PROVIDERS'
[patent_app_type] => utility
[patent_app_number] => 14/253207
[patent_app_country] => US
[patent_app_date] => 2014-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6507
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14253207
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/253207 | System and method for intermediating between subscriber devices and communication service providers | Apr 14, 2014 | Issued |
Array
(
[id] => 10907798
[patent_doc_number] => 20140310811
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-16
[patent_title] => 'Detecting and Marking Client Devices'
[patent_app_type] => utility
[patent_app_number] => 14/249747
[patent_app_country] => US
[patent_app_date] => 2014-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 36492
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14249747
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/249747 | Detecting and marking client devices | Apr 9, 2014 | Issued |
Array
(
[id] => 10569524
[patent_doc_number] => 09292695
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-22
[patent_title] => 'System and method for cyber security analysis and human behavior prediction'
[patent_app_type] => utility
[patent_app_number] => 14/249496
[patent_app_country] => US
[patent_app_date] => 2014-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10590
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14249496
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/249496 | System and method for cyber security analysis and human behavior prediction | Apr 9, 2014 | Issued |
Array
(
[id] => 11484411
[patent_doc_number] => 09590983
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-07
[patent_title] => 'Self-authenticating chips'
[patent_app_type] => utility
[patent_app_number] => 14/249244
[patent_app_country] => US
[patent_app_date] => 2014-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 18
[patent_no_of_words] => 9686
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14249244
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/249244 | Self-authenticating chips | Apr 8, 2014 | Issued |
Array
(
[id] => 11228106
[patent_doc_number] => 09455834
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-27
[patent_title] => 'Securely providing secret data from a sender to a receiver'
[patent_app_type] => utility
[patent_app_number] => 14/249333
[patent_app_country] => US
[patent_app_date] => 2014-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 11
[patent_no_of_words] => 6144
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14249333
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/249333 | Securely providing secret data from a sender to a receiver | Apr 8, 2014 | Issued |
Array
(
[id] => 11013515
[patent_doc_number] => 20160210468
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'METHOD TO CUSTOMIZE AND AUTOMATE A CLASSIFICATION BLOCK FOR INFORMATION CONTAINED IN AN ELECTRONIC DOCUMENT'
[patent_app_type] => utility
[patent_app_number] => 14/246123
[patent_app_country] => US
[patent_app_date] => 2014-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 11039
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14246123
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/246123 | METHOD TO CUSTOMIZE AND AUTOMATE A CLASSIFICATION BLOCK FOR INFORMATION CONTAINED IN AN ELECTRONIC DOCUMENT | Apr 5, 2014 | Abandoned |
Array
(
[id] => 9645432
[patent_doc_number] => 20140223545
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-07
[patent_title] => 'METHOD FOR THE DYNAMIC CREATION OF AN EXECUTION ENVIRONMENT FOR AN APPLICATION TO SECURE THE APPLICATION, ASSOCIATED COMPUTER PROGRAM PRODUCT AND COMPUTING APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 14/245880
[patent_app_country] => US
[patent_app_date] => 2014-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5149
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14245880
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/245880 | Method for the dynamic creation of an execution environment for an application to secure the application, associated computer program product and computing apparatus | Apr 3, 2014 | Issued |
Array
(
[id] => 10914680
[patent_doc_number] => 20140317700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-23
[patent_title] => 'Method, Device and System for Verifying Based on Verification Diagram, and Storage Medium'
[patent_app_type] => utility
[patent_app_number] => 14/245622
[patent_app_country] => US
[patent_app_date] => 2014-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6574
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14245622
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/245622 | Method, device and system for verifying based on verification diagram, and storage medium | Apr 3, 2014 | Issued |
Array
(
[id] => 10131285
[patent_doc_number] => 09165122
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Content reproducing device, content reproducing method, and content reproducing system'
[patent_app_type] => utility
[patent_app_number] => 14/243846
[patent_app_country] => US
[patent_app_date] => 2014-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5578
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14243846
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/243846 | Content reproducing device, content reproducing method, and content reproducing system | Apr 1, 2014 | Issued |
Array
(
[id] => 11235218
[patent_doc_number] => 09462468
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-04
[patent_title] => 'Wireless local area network authentication method and mobile terminal'
[patent_app_type] => utility
[patent_app_number] => 14/231902
[patent_app_country] => US
[patent_app_date] => 2014-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7697
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 262
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14231902
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/231902 | Wireless local area network authentication method and mobile terminal | Mar 31, 2014 | Issued |
Array
(
[id] => 9759169
[patent_doc_number] => 20140289871
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-25
[patent_title] => 'METHOD, SYSTEM, AND DEVICE FOR VERIFYING AUTHORIZED ISSUANCE OF A RIGHTS EXPRESSION'
[patent_app_type] => utility
[patent_app_number] => 14/223948
[patent_app_country] => US
[patent_app_date] => 2014-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7599
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14223948
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/223948 | Method, system, and device for verifying authorized issuance of a rights expression | Mar 23, 2014 | Issued |
Array
(
[id] => 10867492
[patent_doc_number] => 08893223
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-18
[patent_title] => 'Scanning protected files for violations of a data loss prevention policy'
[patent_app_type] => utility
[patent_app_number] => 14/217169
[patent_app_country] => US
[patent_app_date] => 2014-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6248
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14217169
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/217169 | Scanning protected files for violations of a data loss prevention policy | Mar 16, 2014 | Issued |
Array
(
[id] => 12020682
[patent_doc_number] => 09813405
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-07
[patent_title] => 'System and method for protecting train event data'
[patent_app_type] => utility
[patent_app_number] => 14/767418
[patent_app_country] => US
[patent_app_date] => 2014-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5359
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14767418
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/767418 | System and method for protecting train event data | Feb 23, 2014 | Issued |
Array
(
[id] => 11579560
[patent_doc_number] => 09634834
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-04-25
[patent_title] => 'Distributed cryptographic management for computer systems'
[patent_app_type] => utility
[patent_app_number] => 14/158513
[patent_app_country] => US
[patent_app_date] => 2014-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 9008
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14158513
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/158513 | Distributed cryptographic management for computer systems | Jan 16, 2014 | Issued |
Array
(
[id] => 10571272
[patent_doc_number] => 09294462
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-22
[patent_title] => 'Redirect to inspection proxy using single-sign-on bootstrapping'
[patent_app_type] => utility
[patent_app_number] => 14/155865
[patent_app_country] => US
[patent_app_date] => 2014-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4689
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14155865
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/155865 | Redirect to inspection proxy using single-sign-on bootstrapping | Jan 14, 2014 | Issued |