Search

Kari L. Schmidt

Examiner (ID: 10609, Phone: (571)270-1385 , Office: P/2439 )

Most Active Art Unit
2439
Art Unit(s)
2439, 2139
Total Applications
912
Issued Applications
626
Pending Applications
108
Abandoned Applications
209

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 14693467 [patent_doc_number] => 20190245849 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-08 [patent_title] => PRESSURE-BASED AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 16/392683 [patent_app_country] => US [patent_app_date] => 2019-04-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10437 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => 0 [patent_words_short_claim] => 1059 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16392683 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/392683
Pressure-based authentication Apr 23, 2019 Issued
Array ( [id] => 17662356 [patent_doc_number] => 20220182821 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-06-09 [patent_title] => CRYPTOGRAPHIC KEY GENERATION FOR MOBILE COMMUNICATIONS DEVICE [patent_app_type] => utility [patent_app_number] => 17/603833 [patent_app_country] => US [patent_app_date] => 2019-04-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5705 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17603833 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/603833
Cryptographic key generation for mobile communications device Apr 16, 2019 Issued
Array ( [id] => 14755229 [patent_doc_number] => 20190260788 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-22 [patent_title] => Transient Transaction Server [patent_app_type] => utility [patent_app_number] => 16/381802 [patent_app_country] => US [patent_app_date] => 2019-04-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9412 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -10 [patent_words_short_claim] => 82 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16381802 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/381802
Transient Transaction Server Apr 10, 2019 Abandoned
Array ( [id] => 16882130 [patent_doc_number] => 11032296 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-06-08 [patent_title] => Rogue endpoint detection [patent_app_type] => utility [patent_app_number] => 16/298862 [patent_app_country] => US [patent_app_date] => 2019-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 11772 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16298862 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/298862
Rogue endpoint detection Mar 10, 2019 Issued
Array ( [id] => 15600641 [patent_doc_number] => 20200076855 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-03-05 [patent_title] => Centralized Validation of Email Senders Via EHLO Name and IP Address Targeting [patent_app_type] => utility [patent_app_number] => 16/296121 [patent_app_country] => US [patent_app_date] => 2019-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9596 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16296121 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/296121
Centralized validation of email senders via EHLO name and IP address targeting Mar 6, 2019 Issued
Array ( [id] => 14942141 [patent_doc_number] => 20190306709 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-03 [patent_title] => ELECTRONIC DEVICE [patent_app_type] => utility [patent_app_number] => 16/289502 [patent_app_country] => US [patent_app_date] => 2019-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14053 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 86 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16289502 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/289502
Electronic device Feb 27, 2019 Issued
Array ( [id] => 14786847 [patent_doc_number] => 20190268321 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-29 [patent_title] => ELECTRONIC DEVICE [patent_app_type] => utility [patent_app_number] => 16/289480 [patent_app_country] => US [patent_app_date] => 2019-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13553 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 96 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16289480 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/289480
Electronic device Feb 27, 2019 Issued
Array ( [id] => 16764429 [patent_doc_number] => 20210110011 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-04-15 [patent_title] => AUTHENTICATION APPARATUS, INDIVIDUAL IDENTIFICATION APPARATUS AND INFORMATION PROCESSING APPARATUS [patent_app_type] => utility [patent_app_number] => 17/046436 [patent_app_country] => US [patent_app_date] => 2019-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14831 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17046436 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/046436
AUTHENTICATION APPARATUS, INDIVIDUAL IDENTIFICATION APPARATUS AND INFORMATION PROCESSING APPARATUS Feb 3, 2019 Abandoned
Array ( [id] => 14771707 [patent_doc_number] => 10397266 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-08-27 [patent_title] => Verifying that the influence of a user data point has been removed from a machine learning classifier [patent_app_type] => utility [patent_app_number] => 16/250199 [patent_app_country] => US [patent_app_date] => 2019-01-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6391 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 205 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16250199 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/250199
Verifying that the influence of a user data point has been removed from a machine learning classifier Jan 16, 2019 Issued
Array ( [id] => 16403745 [patent_doc_number] => 20200344603 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-10-29 [patent_title] => Method for Determining a Key for Securing Communication Between a User Apparatus and an Application Server [patent_app_type] => utility [patent_app_number] => 16/962329 [patent_app_country] => US [patent_app_date] => 2019-01-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7722 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -4 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16962329 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/962329
Method for determining a key for securing communication between a user apparatus and an application server Jan 10, 2019 Issued
Array ( [id] => 17487607 [patent_doc_number] => 20220095111 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-24 [patent_title] => FLEXIBLE AUTHORIZATION IN 5G SERVICE BASED CORE NETWORK [patent_app_type] => utility [patent_app_number] => 17/420817 [patent_app_country] => US [patent_app_date] => 2019-01-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13618 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -30 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17420817 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/420817
FLEXIBLE AUTHORIZATION IN 5G SERVICE BASED CORE NETWORK Jan 3, 2019 Pending
Array ( [id] => 17327476 [patent_doc_number] => 11218508 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-01-04 [patent_title] => Assurance of security rules in a network [patent_app_type] => utility [patent_app_number] => 16/217559 [patent_app_country] => US [patent_app_date] => 2018-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 47 [patent_figures_cnt] => 50 [patent_no_of_words] => 41578 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 332 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16217559 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/217559
Assurance of security rules in a network Dec 11, 2018 Issued
Array ( [id] => 18106398 [patent_doc_number] => 11546306 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-01-03 [patent_title] => Efficient common storage of partially encrypted content [patent_app_type] => utility [patent_app_number] => 16/211106 [patent_app_country] => US [patent_app_date] => 2018-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7839 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 299 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16211106 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/211106
Efficient common storage of partially encrypted content Dec 4, 2018 Issued
Array ( [id] => 15627641 [patent_doc_number] => 20200084225 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-03-12 [patent_title] => IN-STREAM MALWARE PROTECTION [patent_app_type] => utility [patent_app_number] => 16/206692 [patent_app_country] => US [patent_app_date] => 2018-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13745 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -25 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16206692 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/206692
IN-STREAM MALWARE PROTECTION Nov 29, 2018 Abandoned
Array ( [id] => 16882548 [patent_doc_number] => 11032716 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-06-08 [patent_title] => Secure communication for machine to machine connections [patent_app_type] => utility [patent_app_number] => 16/206110 [patent_app_country] => US [patent_app_date] => 2018-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 7854 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16206110 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/206110
Secure communication for machine to machine connections Nov 29, 2018 Issued
Array ( [id] => 14416937 [patent_doc_number] => 20190174312 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-06-06 [patent_title] => ELECTRONIC DEVICE, USER TERMINAL APPARATUS, AND CONTROL METHOD THEREOF [patent_app_type] => utility [patent_app_number] => 16/205920 [patent_app_country] => US [patent_app_date] => 2018-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11891 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 91 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16205920 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/205920
Electronic device, user terminal apparatus, and control method thereof Nov 29, 2018 Issued
Array ( [id] => 16747497 [patent_doc_number] => 10972508 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-04-06 [patent_title] => Generating a network security policy based on behavior detected after identification of malicious behavior [patent_app_type] => utility [patent_app_number] => 16/206001 [patent_app_country] => US [patent_app_date] => 2018-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 10574 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16206001 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/206001
Generating a network security policy based on behavior detected after identification of malicious behavior Nov 29, 2018 Issued
Array ( [id] => 14416951 [patent_doc_number] => 20190174319 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-06-06 [patent_title] => DETECTION AND IDENTIFICATION OF POTENTIALLY HARMFUL APPLICATIONS BASED ON DETECTION AND ANALYSIS OF MALWARE/SPYWARE INDICATORS [patent_app_type] => utility [patent_app_number] => 16/206020 [patent_app_country] => US [patent_app_date] => 2018-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 28364 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 65 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16206020 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/206020
DETECTION AND IDENTIFICATION OF POTENTIALLY HARMFUL APPLICATIONS BASED ON DETECTION AND ANALYSIS OF MALWARE/SPYWARE INDICATORS Nov 29, 2018 Abandoned
Array ( [id] => 17003570 [patent_doc_number] => 11082406 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-08-03 [patent_title] => System and method for providing end-to-end security of data and metadata [patent_app_type] => utility [patent_app_number] => 16/203923 [patent_app_country] => US [patent_app_date] => 2018-11-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9468 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 299 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16203923 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/203923
System and method for providing end-to-end security of data and metadata Nov 28, 2018 Issued
Array ( [id] => 17121336 [patent_doc_number] => 11132472 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-09-28 [patent_title] => Use of intermediary devices for control of portable computers and mobile devices [patent_app_type] => utility [patent_app_number] => 16/203787 [patent_app_country] => US [patent_app_date] => 2018-11-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9852 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 201 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16203787 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/203787
Use of intermediary devices for control of portable computers and mobile devices Nov 28, 2018 Issued
Menu