
J. R. Miller
Examiner (ID: 564, Phone: JR JOSEPH A )
| Most Active Art Unit | 1715 |
| Art Unit(s) | 1712, 4162, 1792, 1715 |
| Total Applications | 1386 |
| Issued Applications | 889 |
| Pending Applications | 85 |
| Abandoned Applications | 429 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9257801
[patent_doc_number] => 08621242
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-31
[patent_title] => 'Display of a verification image to confirm security'
[patent_app_type] => utility
[patent_app_number] => 12/923935
[patent_app_country] => US
[patent_app_date] => 2010-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 6053
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12923935
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/923935 | Display of a verification image to confirm security | Oct 13, 2010 | Issued |
Array
(
[id] => 8741434
[patent_doc_number] => 08413224
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-02
[patent_title] => 'Method for data transfer in a network'
[patent_app_type] => utility
[patent_app_number] => 12/888014
[patent_app_country] => US
[patent_app_date] => 2010-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8497
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12888014
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/888014 | Method for data transfer in a network | Sep 21, 2010 | Issued |
Array
(
[id] => 9156777
[patent_doc_number] => 08589691
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-11-19
[patent_title] => 'Self-signed certificates for computer application signatures'
[patent_app_type] => utility
[patent_app_number] => 12/858359
[patent_app_country] => US
[patent_app_date] => 2010-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 10784
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12858359
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/858359 | Self-signed certificates for computer application signatures | Aug 16, 2010 | Issued |
Array
(
[id] => 9326500
[patent_doc_number] => 08661537
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-25
[patent_title] => 'Verifying work performed by untrusted computing nodes'
[patent_app_type] => utility
[patent_app_number] => 13/054055
[patent_app_country] => US
[patent_app_date] => 2010-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 5
[patent_no_of_words] => 10576
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13054055
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/054055 | Verifying work performed by untrusted computing nodes | Jul 20, 2010 | Issued |
Array
(
[id] => 9234750
[patent_doc_number] => 08600062
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-03
[patent_title] => 'Off-line content delivery system with layered encryption'
[patent_app_type] => utility
[patent_app_number] => 12/840160
[patent_app_country] => US
[patent_app_date] => 2010-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6881
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12840160
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/840160 | Off-line content delivery system with layered encryption | Jul 19, 2010 | Issued |
Array
(
[id] => 8242863
[patent_doc_number] => 20120151603
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-14
[patent_title] => 'Method, Apparatus and Server for User Verification'
[patent_app_type] => utility
[patent_app_number] => 12/918567
[patent_app_country] => US
[patent_app_date] => 2010-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4822
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12918567
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/918567 | Method, apparatus and server for user verification | Jul 19, 2010 | Issued |
Array
(
[id] => 9103016
[patent_doc_number] => 08566910
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-22
[patent_title] => 'Method and apparatus to bind a key to a namespace'
[patent_app_type] => utility
[patent_app_number] => 12/782216
[patent_app_country] => US
[patent_app_date] => 2010-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6076
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12782216
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/782216 | Method and apparatus to bind a key to a namespace | May 17, 2010 | Issued |
Array
(
[id] => 7569521
[patent_doc_number] => 20110289584
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-24
[patent_title] => 'SYSTEMS AND METHODS TO SECURE BACKUP IMAGES FROM VIRUSES'
[patent_app_type] => utility
[patent_app_number] => 12/782263
[patent_app_country] => US
[patent_app_date] => 2010-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4515
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0289/20110289584.pdf
[firstpage_image] =>[orig_patent_app_number] => 12782263
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/782263 | Systems and methods to secure backup images from viruses | May 17, 2010 | Issued |
Array
(
[id] => 8645650
[patent_doc_number] => 08370649
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-05
[patent_title] => 'Stream control failover utilizing an attribute-dependent protection mechanism'
[patent_app_type] => utility
[patent_app_number] => 12/780598
[patent_app_country] => US
[patent_app_date] => 2010-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 11207
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12780598
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/780598 | Stream control failover utilizing an attribute-dependent protection mechanism | May 13, 2010 | Issued |
Array
(
[id] => 9187085
[patent_doc_number] => 08627074
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-01-07
[patent_title] => 'Secure block acknowledgement mechanism for use in communication networks'
[patent_app_type] => utility
[patent_app_number] => 12/776186
[patent_app_country] => US
[patent_app_date] => 2010-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6204
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12776186
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/776186 | Secure block acknowledgement mechanism for use in communication networks | May 6, 2010 | Issued |
Array
(
[id] => 8558141
[patent_doc_number] => 08332626
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-12-11
[patent_title] => 'Method and apparatus for authentication token-based service redirection'
[patent_app_type] => utility
[patent_app_number] => 12/761046
[patent_app_country] => US
[patent_app_date] => 2010-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6777
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12761046
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/761046 | Method and apparatus for authentication token-based service redirection | Apr 14, 2010 | Issued |
Array
(
[id] => 7512720
[patent_doc_number] => 20110258430
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-20
[patent_title] => 'METHOD AND APPARATUS FOR APPLYING EXECUTION CONTEXT CRITERIA FOR EXECUTION CONTEXT SHARING'
[patent_app_type] => utility
[patent_app_number] => 12/761005
[patent_app_country] => US
[patent_app_date] => 2010-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16014
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0258/20110258430.pdf
[firstpage_image] =>[orig_patent_app_number] => 12761005
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/761005 | METHOD AND APPARATUS FOR APPLYING EXECUTION CONTEXT CRITERIA FOR EXECUTION CONTEXT SHARING | Apr 14, 2010 | Abandoned |
Array
(
[id] => 8645938
[patent_doc_number] => 08370938
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-02-05
[patent_title] => 'Mitigating malware'
[patent_app_type] => utility
[patent_app_number] => 12/761331
[patent_app_country] => US
[patent_app_date] => 2010-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 7802
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12761331
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/761331 | Mitigating malware | Apr 14, 2010 | Issued |
Array
(
[id] => 9886327
[patent_doc_number] => 08973113
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-03
[patent_title] => 'Systems and methods for automatically resetting a password'
[patent_app_type] => utility
[patent_app_number] => 12/761114
[patent_app_country] => US
[patent_app_date] => 2010-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6414
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12761114
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/761114 | Systems and methods for automatically resetting a password | Apr 14, 2010 | Issued |
Array
(
[id] => 6539090
[patent_doc_number] => 20100287607
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-11-11
[patent_title] => 'Digital Content Distribution System and Method'
[patent_app_type] => utility
[patent_app_number] => 12/759837
[patent_app_country] => US
[patent_app_date] => 2010-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7293
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0287/20100287607.pdf
[firstpage_image] =>[orig_patent_app_number] => 12759837
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/759837 | Digital Content Distribution System and Method | Apr 13, 2010 | Abandoned |
Array
(
[id] => 8775444
[patent_doc_number] => 08429420
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-04-23
[patent_title] => 'Time-based key management for encrypted information'
[patent_app_type] => utility
[patent_app_number] => 12/758487
[patent_app_country] => US
[patent_app_date] => 2010-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 7515
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12758487
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/758487 | Time-based key management for encrypted information | Apr 11, 2010 | Issued |
Array
(
[id] => 9500404
[patent_doc_number] => 08739246
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-27
[patent_title] => 'System and method for intermediating between subscriber devices and communication service providers'
[patent_app_type] => utility
[patent_app_number] => 12/758138
[patent_app_country] => US
[patent_app_date] => 2010-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6507
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12758138
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/758138 | System and method for intermediating between subscriber devices and communication service providers | Apr 11, 2010 | Issued |
Array
(
[id] => 8879060
[patent_doc_number] => 08474045
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-25
[patent_title] => 'Method of detecting program attacks'
[patent_app_type] => utility
[patent_app_number] => 12/758163
[patent_app_country] => US
[patent_app_date] => 2010-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 3896
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12758163
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/758163 | Method of detecting program attacks | Apr 11, 2010 | Issued |
Array
(
[id] => 6191174
[patent_doc_number] => 20110173458
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-07-14
[patent_title] => 'Secure portable data storage device'
[patent_app_type] => utility
[patent_app_number] => 12/798720
[patent_app_country] => US
[patent_app_date] => 2010-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6930
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0173/20110173458.pdf
[firstpage_image] =>[orig_patent_app_number] => 12798720
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/798720 | Secure portable data storage device | Apr 8, 2010 | Abandoned |
Array
(
[id] => 9236253
[patent_doc_number] => 08601569
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-03
[patent_title] => 'Secure access to a private network through a public wireless network'
[patent_app_type] => utility
[patent_app_number] => 12/757199
[patent_app_country] => US
[patent_app_date] => 2010-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6110
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12757199
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/757199 | Secure access to a private network through a public wireless network | Apr 8, 2010 | Issued |