
Kaity V. Chandler
Examiner (ID: 9118)
| Most Active Art Unit | 1725 |
| Art Unit(s) | 1795, 1725, 1797, 1764, 1723 |
| Total Applications | 1197 |
| Issued Applications | 747 |
| Pending Applications | 134 |
| Abandoned Applications | 331 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16587225
[patent_doc_number] => 20210021627
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-21
[patent_title] => SYSTEMS METHODS AND COMPUTER STORAGE MEDIA FOR DETECTION OF POTENTIAL CYBER SECURITY VULNERABILITIES IN COMPUTER NETWORKS BY PREMEDIATED EXTERIOR INTRUSION THROUGH LOG-BASED PRE-MAPPED ENTRANCE POINTS
[patent_app_type] => utility
[patent_app_number] => 16/511907
[patent_app_country] => US
[patent_app_date] => 2019-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5092
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 271
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16511907
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/511907 | Systems methods and computer storage media for detection of potential cyber security vulnerabilities in computer networks by premediated exterior intrusion through log-based pre-mapped entrance points | Jul 14, 2019 | Issued |
Array
(
[id] => 16579859
[patent_doc_number] => 20210014261
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-14
[patent_title] => ONLINE STATIC SECURITY ASSESSMENT UNDER THE QSS MODEL
[patent_app_type] => utility
[patent_app_number] => 16/508683
[patent_app_country] => US
[patent_app_date] => 2019-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5275
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16508683
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/508683 | Online static security assessment under the QSS model | Jul 10, 2019 | Issued |
Array
(
[id] => 15549661
[patent_doc_number] => 10574628
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-25
[patent_title] => Computer security system and method based on user-intended final destination
[patent_app_type] => utility
[patent_app_number] => 16/508252
[patent_app_country] => US
[patent_app_date] => 2019-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8787
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16508252
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/508252 | Computer security system and method based on user-intended final destination | Jul 9, 2019 | Issued |
Array
(
[id] => 16546313
[patent_doc_number] => 20200412728
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => AUTOMATIC DEVICE SELECTION FOR PRIVATE NETWORK SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/455480
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5982
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16455480
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/455480 | Automatic device selection for private network security | Jun 26, 2019 | Issued |
Array
(
[id] => 14998239
[patent_doc_number] => 20190318077
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-17
[patent_title] => VISUAL DATA PROCESSING OF RESPONSE IMAGES FOR AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/455738
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15211
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16455738
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/455738 | Visual data processing of response images for authentication | Jun 26, 2019 | Issued |
Array
(
[id] => 17271315
[patent_doc_number] => 11196754
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-12-07
[patent_title] => Systems and methods for protecting against malicious content
[patent_app_type] => utility
[patent_app_number] => 16/452298
[patent_app_country] => US
[patent_app_date] => 2019-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9227
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16452298
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/452298 | Systems and methods for protecting against malicious content | Jun 24, 2019 | Issued |
Array
(
[id] => 16488932
[patent_doc_number] => 20200382546
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-03
[patent_title] => DYNAMIC PREVIEW OF SECURITY VULNERABILITY LEVELS IN A MANAGED NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/450601
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14970
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 286
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450601
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450601 | Dynamic preview of security vulnerability levels in a managed network | Jun 23, 2019 | Issued |
Array
(
[id] => 14970745
[patent_doc_number] => 20190312851
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-10
[patent_title] => PROVISIONING NETWORK KEYS TO DEVICES TO ALLOW THEM TO PROVIDE THEIR IDENTITY
[patent_app_type] => utility
[patent_app_number] => 16/450801
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12063
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450801
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450801 | Provisioning network keys to devices to allow them to provide their identity | Jun 23, 2019 | Issued |
Array
(
[id] => 17271322
[patent_doc_number] => 11196761
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-07
[patent_title] => Security risk evaluation for user accounts
[patent_app_type] => utility
[patent_app_number] => 16/438756
[patent_app_country] => US
[patent_app_date] => 2019-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5720
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16438756
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/438756 | Security risk evaluation for user accounts | Jun 11, 2019 | Issued |
Array
(
[id] => 14877523
[patent_doc_number] => 20190289003
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-19
[patent_title] => Access Control for Internet of Things Devices
[patent_app_type] => utility
[patent_app_number] => 16/428947
[patent_app_country] => US
[patent_app_date] => 2019-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6074
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16428947
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/428947 | Access Control for Internet of Things Devices | May 30, 2019 | Abandoned |
Array
(
[id] => 17294344
[patent_doc_number] => 20210390183
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-16
[patent_title] => ANALYSIS FUNCTION IMPARTING DEVICE, ANALYSIS FUNCTION IMPARTING METHOD, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 17/283546
[patent_app_country] => US
[patent_app_date] => 2019-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9978
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17283546
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/283546 | Analysis function imparting device, analysis function imparting method, and recording medium | May 20, 2019 | Issued |
Array
(
[id] => 14814023
[patent_doc_number] => 20190273621
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => SCOPE-BASED CERTIFICATE DEPLOYMENT
[patent_app_type] => utility
[patent_app_number] => 16/418337
[patent_app_country] => US
[patent_app_date] => 2019-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5214
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16418337
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/418337 | Scope-based certificate deployment | May 20, 2019 | Issued |
Array
(
[id] => 17396688
[patent_doc_number] => 11245716
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-02-08
[patent_title] => Composing and applying security monitoring rules to a target environment
[patent_app_type] => utility
[patent_app_number] => 16/407764
[patent_app_country] => US
[patent_app_date] => 2019-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9557
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16407764
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/407764 | Composing and applying security monitoring rules to a target environment | May 8, 2019 | Issued |
Array
(
[id] => 15171773
[patent_doc_number] => 10491404
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-26
[patent_title] => Systems and methods for cryptographic key generation and authentication
[patent_app_type] => utility
[patent_app_number] => 16/406842
[patent_app_country] => US
[patent_app_date] => 2019-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 13018
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16406842
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/406842 | Systems and methods for cryptographic key generation and authentication | May 7, 2019 | Issued |
Array
(
[id] => 16802368
[patent_doc_number] => 10997314
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-05-04
[patent_title] => System and method for perpetual rekeying of various data columns with respective encryption keys and on alternating bases
[patent_app_type] => utility
[patent_app_number] => 16/386912
[patent_app_country] => US
[patent_app_date] => 2019-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 15049
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16386912
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/386912 | System and method for perpetual rekeying of various data columns with respective encryption keys and on alternating bases | Apr 16, 2019 | Issued |
Array
(
[id] => 16767601
[patent_doc_number] => 10979395
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-13
[patent_title] => Automatic virtual private network (VPN) establishment
[patent_app_type] => utility
[patent_app_number] => 16/385178
[patent_app_country] => US
[patent_app_date] => 2019-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10011
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 278
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16385178
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/385178 | Automatic virtual private network (VPN) establishment | Apr 15, 2019 | Issued |
Array
(
[id] => 17255009
[patent_doc_number] => 11190521
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-30
[patent_title] => TLS policy enforcement at a tunnel gateway
[patent_app_type] => utility
[patent_app_number] => 16/384968
[patent_app_country] => US
[patent_app_date] => 2019-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 10032
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16384968
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/384968 | TLS policy enforcement at a tunnel gateway | Apr 15, 2019 | Issued |
Array
(
[id] => 15843521
[patent_doc_number] => 20200137043
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => METHOD AND SYSTEM FOR AN INTERNET OF THINGS PLATFORM
[patent_app_type] => utility
[patent_app_number] => 16/384989
[patent_app_country] => US
[patent_app_date] => 2019-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13256
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16384989
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/384989 | Method and system for an internet of things platform | Apr 15, 2019 | Issued |
Array
(
[id] => 17381985
[patent_doc_number] => 11240022
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-02-01
[patent_title] => Passive encryption rotation keys
[patent_app_type] => utility
[patent_app_number] => 16/382106
[patent_app_country] => US
[patent_app_date] => 2019-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 7909
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16382106
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/382106 | Passive encryption rotation keys | Apr 10, 2019 | Issued |
Array
(
[id] => 16774959
[patent_doc_number] => 10986089
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-20
[patent_title] => Virtual mobile device system and method thereof
[patent_app_type] => utility
[patent_app_number] => 16/382121
[patent_app_country] => US
[patent_app_date] => 2019-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5743
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16382121
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/382121 | Virtual mobile device system and method thereof | Apr 10, 2019 | Issued |