
J. R. Miller
Examiner (ID: 564, Phone: JR JOSEPH A )
| Most Active Art Unit | 1715 |
| Art Unit(s) | 1712, 4162, 1792, 1715 |
| Total Applications | 1386 |
| Issued Applications | 889 |
| Pending Applications | 85 |
| Abandoned Applications | 429 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10873245
[patent_doc_number] => 08898466
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-25
[patent_title] => 'Secure block acknowledgement mechanism for use in communication networks'
[patent_app_type] => utility
[patent_app_number] => 14/148219
[patent_app_country] => US
[patent_app_date] => 2014-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6201
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14148219
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/148219 | Secure block acknowledgement mechanism for use in communication networks | Jan 5, 2014 | Issued |
Array
(
[id] => 10970145
[patent_doc_number] => 20140373178
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'Method, Apparatus and Server for User Verification'
[patent_app_type] => utility
[patent_app_number] => 14/133197
[patent_app_country] => US
[patent_app_date] => 2013-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4822
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14133197
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/133197 | Method, apparatus and server for user verification | Dec 17, 2013 | Issued |
Array
(
[id] => 10854561
[patent_doc_number] => 08881275
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-04
[patent_title] => 'Verifying work performed by untrusted computing nodes'
[patent_app_type] => utility
[patent_app_number] => 14/084413
[patent_app_country] => US
[patent_app_date] => 2013-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 5
[patent_no_of_words] => 10622
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14084413
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/084413 | Verifying work performed by untrusted computing nodes | Nov 18, 2013 | Issued |
Array
(
[id] => 9847679
[patent_doc_number] => 08949613
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-02-03
[patent_title] => 'Self-signed certificates for computer application signatures'
[patent_app_type] => utility
[patent_app_number] => 14/054487
[patent_app_country] => US
[patent_app_date] => 2013-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 10805
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14054487
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/054487 | Self-signed certificates for computer application signatures | Oct 14, 2013 | Issued |
Array
(
[id] => 10543805
[patent_doc_number] => 09268937
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-02-23
[patent_title] => 'Mitigating malware'
[patent_app_type] => utility
[patent_app_number] => 14/051832
[patent_app_country] => US
[patent_app_date] => 2013-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 7797
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14051832
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/051832 | Mitigating malware | Oct 10, 2013 | Issued |
Array
(
[id] => 9961253
[patent_doc_number] => 09009477
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-14
[patent_title] => 'Archiving electronic content having digital signatures'
[patent_app_type] => utility
[patent_app_number] => 13/970954
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5984
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970954
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/970954 | Archiving electronic content having digital signatures | Aug 19, 2013 | Issued |
Array
(
[id] => 11644343
[patent_doc_number] => 09665722
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-30
[patent_title] => 'Privacy firewall'
[patent_app_type] => utility
[patent_app_number] => 13/964896
[patent_app_country] => US
[patent_app_date] => 2013-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 15405
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13964896
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/964896 | Privacy firewall | Aug 11, 2013 | Issued |
Array
(
[id] => 9572136
[patent_doc_number] => 20140189849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'Inferring Security Decisions From Trusted Users'
[patent_app_type] => utility
[patent_app_number] => 13/962243
[patent_app_country] => US
[patent_app_date] => 2013-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7236
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13962243
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/962243 | Inferring security decisions from trusted users | Aug 7, 2013 | Issued |
Array
(
[id] => 10048046
[patent_doc_number] => 09088458
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-21
[patent_title] => 'Method and apparatus for notifying remote user interface client about event of remote user interface server in home network'
[patent_app_type] => utility
[patent_app_number] => 13/942345
[patent_app_country] => US
[patent_app_date] => 2013-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 4533
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13942345
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/942345 | Method and apparatus for notifying remote user interface client about event of remote user interface server in home network | Jul 14, 2013 | Issued |
Array
(
[id] => 9714393
[patent_doc_number] => 08838994
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-16
[patent_title] => 'Method for protecting computer programs and data from hostile code'
[patent_app_type] => utility
[patent_app_number] => 13/937136
[patent_app_country] => US
[patent_app_date] => 2013-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 14140
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13937136
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/937136 | Method for protecting computer programs and data from hostile code | Jul 7, 2013 | Issued |
Array
(
[id] => 10977409
[patent_doc_number] => 20140380444
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-25
[patent_title] => 'OUT-OF-BAND CHALLENGE QUESTION AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/926009
[patent_app_country] => US
[patent_app_date] => 2013-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4034
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13926009
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/926009 | Out-of-band challenge question authentication | Jun 24, 2013 | Issued |
Array
(
[id] => 9265182
[patent_doc_number] => 20130347111
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'SYSTEM AND METHOD FOR DETECTION AND PREVENTION OF HOST INTRUSIONS AND MALICIOUS PAYLOADS'
[patent_app_type] => utility
[patent_app_number] => 13/925904
[patent_app_country] => US
[patent_app_date] => 2013-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7414
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13925904
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/925904 | SYSTEM AND METHOD FOR DETECTION AND PREVENTION OF HOST INTRUSIONS AND MALICIOUS PAYLOADS | Jun 24, 2013 | Abandoned |
| 13/997796 | APPARATUS AND METHOD FOR DETECTING VULNERABILITY | Jun 24, 2013 | Abandoned |
Array
(
[id] => 10596594
[patent_doc_number] => 09317685
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-04-19
[patent_title] => 'Method and system for access request alerts for protected information'
[patent_app_type] => utility
[patent_app_number] => 13/926194
[patent_app_country] => US
[patent_app_date] => 2013-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4830
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13926194
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/926194 | Method and system for access request alerts for protected information | Jun 24, 2013 | Issued |
Array
(
[id] => 10878289
[patent_doc_number] => 08903084
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-02
[patent_title] => 'Efficient key derivation for end-to-end network security with traffic visibility'
[patent_app_type] => utility
[patent_app_number] => 13/916027
[patent_app_country] => US
[patent_app_date] => 2013-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4089
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13916027
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/916027 | Efficient key derivation for end-to-end network security with traffic visibility | Jun 11, 2013 | Issued |
Array
(
[id] => 9871859
[patent_doc_number] => 08959651
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-17
[patent_title] => 'Protecting privacy data in MapReduce system'
[patent_app_type] => utility
[patent_app_number] => 13/868218
[patent_app_country] => US
[patent_app_date] => 2013-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8568
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13868218
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/868218 | Protecting privacy data in MapReduce system | Apr 22, 2013 | Issued |
Array
(
[id] => 9265131
[patent_doc_number] => 20130347060
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'SYSTEMS AND METHODS FOR COMBINED PHYSICAL AND CYBER DATA SECURITY'
[patent_app_type] => utility
[patent_app_number] => 13/868220
[patent_app_country] => US
[patent_app_date] => 2013-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4887
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13868220
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/868220 | Systems and methods for combined physical and cyber data security | Apr 22, 2013 | Issued |
Array
(
[id] => 10867531
[patent_doc_number] => 08893262
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-18
[patent_title] => 'Establishing an IPsec (internet protocol security) VPN (virtual private network) tunnel'
[patent_app_type] => utility
[patent_app_number] => 13/868310
[patent_app_country] => US
[patent_app_date] => 2013-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6251
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13868310
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/868310 | Establishing an IPsec (internet protocol security) VPN (virtual private network) tunnel | Apr 22, 2013 | Issued |
Array
(
[id] => 10914717
[patent_doc_number] => 20140317736
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-23
[patent_title] => 'METHOD AND SYSTEM FOR DETECTING FAKE ACCOUNTS IN ONLINE SOCIAL NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 13/868331
[patent_app_country] => US
[patent_app_date] => 2013-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9415
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13868331
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/868331 | Method and system for detecting fake accounts in online social networks | Apr 22, 2013 | Issued |
Array
(
[id] => 9826250
[patent_doc_number] => 08935746
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-13
[patent_title] => 'System with a trusted execution environment component executed on a secure element'
[patent_app_type] => utility
[patent_app_number] => 13/867481
[patent_app_country] => US
[patent_app_date] => 2013-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6420
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13867481
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/867481 | System with a trusted execution environment component executed on a secure element | Apr 21, 2013 | Issued |