Search

J. R. Miller

Examiner (ID: 564, Phone: JR JOSEPH A )

Most Active Art Unit
1715
Art Unit(s)
1712, 4162, 1792, 1715
Total Applications
1386
Issued Applications
889
Pending Applications
85
Abandoned Applications
429

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9257801 [patent_doc_number] => 08621242 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-12-31 [patent_title] => 'Display of a verification image to confirm security' [patent_app_type] => utility [patent_app_number] => 12/923935 [patent_app_country] => US [patent_app_date] => 2010-10-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 12 [patent_no_of_words] => 6053 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 212 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12923935 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/923935
Display of a verification image to confirm security Oct 13, 2010 Issued
Array ( [id] => 8741434 [patent_doc_number] => 08413224 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-04-02 [patent_title] => 'Method for data transfer in a network' [patent_app_type] => utility [patent_app_number] => 12/888014 [patent_app_country] => US [patent_app_date] => 2010-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8497 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 178 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12888014 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/888014
Method for data transfer in a network Sep 21, 2010 Issued
Array ( [id] => 9156777 [patent_doc_number] => 08589691 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-11-19 [patent_title] => 'Self-signed certificates for computer application signatures' [patent_app_type] => utility [patent_app_number] => 12/858359 [patent_app_country] => US [patent_app_date] => 2010-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 10784 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 57 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12858359 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/858359
Self-signed certificates for computer application signatures Aug 16, 2010 Issued
Array ( [id] => 9326500 [patent_doc_number] => 08661537 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-25 [patent_title] => 'Verifying work performed by untrusted computing nodes' [patent_app_type] => utility [patent_app_number] => 13/054055 [patent_app_country] => US [patent_app_date] => 2010-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 5 [patent_no_of_words] => 10576 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 216 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13054055 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/054055
Verifying work performed by untrusted computing nodes Jul 20, 2010 Issued
Array ( [id] => 9234750 [patent_doc_number] => 08600062 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-12-03 [patent_title] => 'Off-line content delivery system with layered encryption' [patent_app_type] => utility [patent_app_number] => 12/840160 [patent_app_country] => US [patent_app_date] => 2010-07-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6881 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12840160 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/840160
Off-line content delivery system with layered encryption Jul 19, 2010 Issued
Array ( [id] => 8242863 [patent_doc_number] => 20120151603 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-14 [patent_title] => 'Method, Apparatus and Server for User Verification' [patent_app_type] => utility [patent_app_number] => 12/918567 [patent_app_country] => US [patent_app_date] => 2010-07-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4822 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12918567 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/918567
Method, apparatus and server for user verification Jul 19, 2010 Issued
Array ( [id] => 9103016 [patent_doc_number] => 08566910 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-22 [patent_title] => 'Method and apparatus to bind a key to a namespace' [patent_app_type] => utility [patent_app_number] => 12/782216 [patent_app_country] => US [patent_app_date] => 2010-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 6076 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12782216 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/782216
Method and apparatus to bind a key to a namespace May 17, 2010 Issued
Array ( [id] => 7569521 [patent_doc_number] => 20110289584 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-11-24 [patent_title] => 'SYSTEMS AND METHODS TO SECURE BACKUP IMAGES FROM VIRUSES' [patent_app_type] => utility [patent_app_number] => 12/782263 [patent_app_country] => US [patent_app_date] => 2010-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4515 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0289/20110289584.pdf [firstpage_image] =>[orig_patent_app_number] => 12782263 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/782263
Systems and methods to secure backup images from viruses May 17, 2010 Issued
Array ( [id] => 8645650 [patent_doc_number] => 08370649 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-02-05 [patent_title] => 'Stream control failover utilizing an attribute-dependent protection mechanism' [patent_app_type] => utility [patent_app_number] => 12/780598 [patent_app_country] => US [patent_app_date] => 2010-05-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 14 [patent_no_of_words] => 11207 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12780598 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/780598
Stream control failover utilizing an attribute-dependent protection mechanism May 13, 2010 Issued
Array ( [id] => 9187085 [patent_doc_number] => 08627074 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-01-07 [patent_title] => 'Secure block acknowledgement mechanism for use in communication networks' [patent_app_type] => utility [patent_app_number] => 12/776186 [patent_app_country] => US [patent_app_date] => 2010-05-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6204 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12776186 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/776186
Secure block acknowledgement mechanism for use in communication networks May 6, 2010 Issued
Array ( [id] => 8558141 [patent_doc_number] => 08332626 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-12-11 [patent_title] => 'Method and apparatus for authentication token-based service redirection' [patent_app_type] => utility [patent_app_number] => 12/761046 [patent_app_country] => US [patent_app_date] => 2010-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6777 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12761046 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/761046
Method and apparatus for authentication token-based service redirection Apr 14, 2010 Issued
Array ( [id] => 7512720 [patent_doc_number] => 20110258430 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-10-20 [patent_title] => 'METHOD AND APPARATUS FOR APPLYING EXECUTION CONTEXT CRITERIA FOR EXECUTION CONTEXT SHARING' [patent_app_type] => utility [patent_app_number] => 12/761005 [patent_app_country] => US [patent_app_date] => 2010-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 16014 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0258/20110258430.pdf [firstpage_image] =>[orig_patent_app_number] => 12761005 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/761005
METHOD AND APPARATUS FOR APPLYING EXECUTION CONTEXT CRITERIA FOR EXECUTION CONTEXT SHARING Apr 14, 2010 Abandoned
Array ( [id] => 8645938 [patent_doc_number] => 08370938 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-02-05 [patent_title] => 'Mitigating malware' [patent_app_type] => utility [patent_app_number] => 12/761331 [patent_app_country] => US [patent_app_date] => 2010-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 13 [patent_no_of_words] => 7802 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12761331 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/761331
Mitigating malware Apr 14, 2010 Issued
Array ( [id] => 9886327 [patent_doc_number] => 08973113 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-03-03 [patent_title] => 'Systems and methods for automatically resetting a password' [patent_app_type] => utility [patent_app_number] => 12/761114 [patent_app_country] => US [patent_app_date] => 2010-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6414 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12761114 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/761114
Systems and methods for automatically resetting a password Apr 14, 2010 Issued
Array ( [id] => 6539090 [patent_doc_number] => 20100287607 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-11-11 [patent_title] => 'Digital Content Distribution System and Method' [patent_app_type] => utility [patent_app_number] => 12/759837 [patent_app_country] => US [patent_app_date] => 2010-04-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7293 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0287/20100287607.pdf [firstpage_image] =>[orig_patent_app_number] => 12759837 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/759837
Digital Content Distribution System and Method Apr 13, 2010 Abandoned
Array ( [id] => 8775444 [patent_doc_number] => 08429420 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-04-23 [patent_title] => 'Time-based key management for encrypted information' [patent_app_type] => utility [patent_app_number] => 12/758487 [patent_app_country] => US [patent_app_date] => 2010-04-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 14 [patent_no_of_words] => 7515 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12758487 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/758487
Time-based key management for encrypted information Apr 11, 2010 Issued
Array ( [id] => 9500404 [patent_doc_number] => 08739246 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-27 [patent_title] => 'System and method for intermediating between subscriber devices and communication service providers' [patent_app_type] => utility [patent_app_number] => 12/758138 [patent_app_country] => US [patent_app_date] => 2010-04-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6507 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12758138 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/758138
System and method for intermediating between subscriber devices and communication service providers Apr 11, 2010 Issued
Array ( [id] => 8879060 [patent_doc_number] => 08474045 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-06-25 [patent_title] => 'Method of detecting program attacks' [patent_app_type] => utility [patent_app_number] => 12/758163 [patent_app_country] => US [patent_app_date] => 2010-04-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 10 [patent_no_of_words] => 3896 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12758163 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/758163
Method of detecting program attacks Apr 11, 2010 Issued
Array ( [id] => 6191174 [patent_doc_number] => 20110173458 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-07-14 [patent_title] => 'Secure portable data storage device' [patent_app_type] => utility [patent_app_number] => 12/798720 [patent_app_country] => US [patent_app_date] => 2010-04-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6930 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0173/20110173458.pdf [firstpage_image] =>[orig_patent_app_number] => 12798720 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/798720
Secure portable data storage device Apr 8, 2010 Abandoned
Array ( [id] => 9236253 [patent_doc_number] => 08601569 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-12-03 [patent_title] => 'Secure access to a private network through a public wireless network' [patent_app_type] => utility [patent_app_number] => 12/757199 [patent_app_country] => US [patent_app_date] => 2010-04-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6110 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 183 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12757199 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/757199
Secure access to a private network through a public wireless network Apr 8, 2010 Issued
Menu