
Kari L. Schmidt
Examiner (ID: 10609, Phone: (571)270-1385 , Office: P/2439 )
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2439, 2139 |
| Total Applications | 912 |
| Issued Applications | 626 |
| Pending Applications | 108 |
| Abandoned Applications | 209 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14693467
[patent_doc_number] => 20190245849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-08
[patent_title] => PRESSURE-BASED AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/392683
[patent_app_country] => US
[patent_app_date] => 2019-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10437
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 1059
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16392683
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/392683 | Pressure-based authentication | Apr 23, 2019 | Issued |
Array
(
[id] => 17662356
[patent_doc_number] => 20220182821
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-09
[patent_title] => CRYPTOGRAPHIC KEY GENERATION FOR MOBILE COMMUNICATIONS DEVICE
[patent_app_type] => utility
[patent_app_number] => 17/603833
[patent_app_country] => US
[patent_app_date] => 2019-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5705
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17603833
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/603833 | Cryptographic key generation for mobile communications device | Apr 16, 2019 | Issued |
Array
(
[id] => 14755229
[patent_doc_number] => 20190260788
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-22
[patent_title] => Transient Transaction Server
[patent_app_type] => utility
[patent_app_number] => 16/381802
[patent_app_country] => US
[patent_app_date] => 2019-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9412
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16381802
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/381802 | Transient Transaction Server | Apr 10, 2019 | Abandoned |
Array
(
[id] => 16882130
[patent_doc_number] => 11032296
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-06-08
[patent_title] => Rogue endpoint detection
[patent_app_type] => utility
[patent_app_number] => 16/298862
[patent_app_country] => US
[patent_app_date] => 2019-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11772
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16298862
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/298862 | Rogue endpoint detection | Mar 10, 2019 | Issued |
Array
(
[id] => 15600641
[patent_doc_number] => 20200076855
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => Centralized Validation of Email Senders Via EHLO Name and IP Address Targeting
[patent_app_type] => utility
[patent_app_number] => 16/296121
[patent_app_country] => US
[patent_app_date] => 2019-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9596
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16296121
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/296121 | Centralized validation of email senders via EHLO name and IP address targeting | Mar 6, 2019 | Issued |
Array
(
[id] => 14942141
[patent_doc_number] => 20190306709
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-03
[patent_title] => ELECTRONIC DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/289502
[patent_app_country] => US
[patent_app_date] => 2019-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14053
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16289502
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/289502 | Electronic device | Feb 27, 2019 | Issued |
Array
(
[id] => 14786847
[patent_doc_number] => 20190268321
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-29
[patent_title] => ELECTRONIC DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/289480
[patent_app_country] => US
[patent_app_date] => 2019-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13553
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16289480
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/289480 | Electronic device | Feb 27, 2019 | Issued |
Array
(
[id] => 16764429
[patent_doc_number] => 20210110011
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-15
[patent_title] => AUTHENTICATION APPARATUS, INDIVIDUAL IDENTIFICATION APPARATUS AND INFORMATION PROCESSING APPARATUS
[patent_app_type] => utility
[patent_app_number] => 17/046436
[patent_app_country] => US
[patent_app_date] => 2019-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14831
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17046436
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/046436 | AUTHENTICATION APPARATUS, INDIVIDUAL IDENTIFICATION APPARATUS AND INFORMATION PROCESSING APPARATUS | Feb 3, 2019 | Abandoned |
Array
(
[id] => 14771707
[patent_doc_number] => 10397266
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-08-27
[patent_title] => Verifying that the influence of a user data point has been removed from a machine learning classifier
[patent_app_type] => utility
[patent_app_number] => 16/250199
[patent_app_country] => US
[patent_app_date] => 2019-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6391
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16250199
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/250199 | Verifying that the influence of a user data point has been removed from a machine learning classifier | Jan 16, 2019 | Issued |
Array
(
[id] => 16403745
[patent_doc_number] => 20200344603
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-29
[patent_title] => Method for Determining a Key for Securing Communication Between a User Apparatus and an Application Server
[patent_app_type] => utility
[patent_app_number] => 16/962329
[patent_app_country] => US
[patent_app_date] => 2019-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7722
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16962329
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/962329 | Method for determining a key for securing communication between a user apparatus and an application server | Jan 10, 2019 | Issued |
Array
(
[id] => 17487607
[patent_doc_number] => 20220095111
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-24
[patent_title] => FLEXIBLE AUTHORIZATION IN 5G SERVICE BASED CORE NETWORK
[patent_app_type] => utility
[patent_app_number] => 17/420817
[patent_app_country] => US
[patent_app_date] => 2019-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13618
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -30
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17420817
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/420817 | FLEXIBLE AUTHORIZATION IN 5G SERVICE BASED CORE NETWORK | Jan 3, 2019 | Pending |
Array
(
[id] => 17327476
[patent_doc_number] => 11218508
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-04
[patent_title] => Assurance of security rules in a network
[patent_app_type] => utility
[patent_app_number] => 16/217559
[patent_app_country] => US
[patent_app_date] => 2018-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 47
[patent_figures_cnt] => 50
[patent_no_of_words] => 41578
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 332
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16217559
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/217559 | Assurance of security rules in a network | Dec 11, 2018 | Issued |
Array
(
[id] => 18106398
[patent_doc_number] => 11546306
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-03
[patent_title] => Efficient common storage of partially encrypted content
[patent_app_type] => utility
[patent_app_number] => 16/211106
[patent_app_country] => US
[patent_app_date] => 2018-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7839
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16211106
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/211106 | Efficient common storage of partially encrypted content | Dec 4, 2018 | Issued |
Array
(
[id] => 15627641
[patent_doc_number] => 20200084225
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => IN-STREAM MALWARE PROTECTION
[patent_app_type] => utility
[patent_app_number] => 16/206692
[patent_app_country] => US
[patent_app_date] => 2018-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13745
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -25
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16206692
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/206692 | IN-STREAM MALWARE PROTECTION | Nov 29, 2018 | Abandoned |
Array
(
[id] => 16882548
[patent_doc_number] => 11032716
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-08
[patent_title] => Secure communication for machine to machine connections
[patent_app_type] => utility
[patent_app_number] => 16/206110
[patent_app_country] => US
[patent_app_date] => 2018-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 7854
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16206110
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/206110 | Secure communication for machine to machine connections | Nov 29, 2018 | Issued |
Array
(
[id] => 14416937
[patent_doc_number] => 20190174312
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-06
[patent_title] => ELECTRONIC DEVICE, USER TERMINAL APPARATUS, AND CONTROL METHOD THEREOF
[patent_app_type] => utility
[patent_app_number] => 16/205920
[patent_app_country] => US
[patent_app_date] => 2018-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11891
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16205920
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/205920 | Electronic device, user terminal apparatus, and control method thereof | Nov 29, 2018 | Issued |
Array
(
[id] => 16747497
[patent_doc_number] => 10972508
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-04-06
[patent_title] => Generating a network security policy based on behavior detected after identification of malicious behavior
[patent_app_type] => utility
[patent_app_number] => 16/206001
[patent_app_country] => US
[patent_app_date] => 2018-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 10574
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16206001
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/206001 | Generating a network security policy based on behavior detected after identification of malicious behavior | Nov 29, 2018 | Issued |
Array
(
[id] => 14416951
[patent_doc_number] => 20190174319
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-06
[patent_title] => DETECTION AND IDENTIFICATION OF POTENTIALLY HARMFUL APPLICATIONS BASED ON DETECTION AND ANALYSIS OF MALWARE/SPYWARE INDICATORS
[patent_app_type] => utility
[patent_app_number] => 16/206020
[patent_app_country] => US
[patent_app_date] => 2018-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 28364
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16206020
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/206020 | DETECTION AND IDENTIFICATION OF POTENTIALLY HARMFUL APPLICATIONS BASED ON DETECTION AND ANALYSIS OF MALWARE/SPYWARE INDICATORS | Nov 29, 2018 | Abandoned |
Array
(
[id] => 17003570
[patent_doc_number] => 11082406
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-03
[patent_title] => System and method for providing end-to-end security of data and metadata
[patent_app_type] => utility
[patent_app_number] => 16/203923
[patent_app_country] => US
[patent_app_date] => 2018-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9468
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16203923
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/203923 | System and method for providing end-to-end security of data and metadata | Nov 28, 2018 | Issued |
Array
(
[id] => 17121336
[patent_doc_number] => 11132472
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-28
[patent_title] => Use of intermediary devices for control of portable computers and mobile devices
[patent_app_type] => utility
[patent_app_number] => 16/203787
[patent_app_country] => US
[patent_app_date] => 2018-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9852
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16203787
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/203787 | Use of intermediary devices for control of portable computers and mobile devices | Nov 28, 2018 | Issued |