Search

Kavel Singh

Examiner (ID: 7860, Phone: (571)272-2362 , Office: P/3651 )

Most Active Art Unit
3651
Art Unit(s)
3651
Total Applications
1519
Issued Applications
1200
Pending Applications
97
Abandoned Applications
248

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12241995 [patent_doc_number] => 20180074858 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-15 [patent_title] => 'MULTI-LAYER DISTRIBUTION OF A COMPUTING TASK IN A DISPERSED STORAGE NETWORK' [patent_app_type] => utility [patent_app_number] => 15/822333 [patent_app_country] => US [patent_app_date] => 2017-11-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9911 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15822333 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/822333
MULTI-LAYER DISTRIBUTION OF A COMPUTING TASK IN A DISPERSED STORAGE NETWORK Nov 26, 2017 Abandoned
Array ( [id] => 16522369 [patent_doc_number] => 10873597 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-12-22 [patent_title] => Cyber attack early warning system [patent_app_type] => utility [patent_app_number] => 15/817006 [patent_app_country] => US [patent_app_date] => 2017-11-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6604 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 227 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15817006 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/817006
Cyber attack early warning system Nov 16, 2017 Issued
Array ( [id] => 12236979 [patent_doc_number] => 20180069841 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-08 [patent_title] => 'COMPUTER-IMPLEMENTED CRYPTOGRAPHIC METHOD FOR IMPROVING A COMPUTER NETWORK, AND TERMINAL, SYSTEM AND COMPUTER-READABLE MEDIUM FOR THE SAME' [patent_app_type] => utility [patent_app_number] => 15/694929 [patent_app_country] => US [patent_app_date] => 2017-09-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 14711 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15694929 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/694929
COMPUTER-IMPLEMENTED CRYPTOGRAPHIC METHOD FOR IMPROVING A COMPUTER NETWORK, AND TERMINAL, SYSTEM AND COMPUTER-READABLE MEDIUM FOR THE SAME Sep 3, 2017 Abandoned
Array ( [id] => 15258259 [patent_doc_number] => 20190377863 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-12-12 [patent_title] => PASSWORD INPUT METHOD, COMPUTER DEVICE AND STORAGE MEDIUM [patent_app_type] => utility [patent_app_number] => 16/463530 [patent_app_country] => US [patent_app_date] => 2017-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7754 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16463530 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/463530
PASSWORD INPUT METHOD, COMPUTER DEVICE AND STORAGE MEDIUM Aug 29, 2017 Abandoned
Array ( [id] => 13692521 [patent_doc_number] => 20170357215 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-12-14 [patent_title] => REVERSE BATTERY PROTECTION DEVICE AND OPERATING METHOD THEREOF [patent_app_type] => utility [patent_app_number] => 15/670804 [patent_app_country] => US [patent_app_date] => 2017-08-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 27289 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 237 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15670804 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/670804
Reverse battery protection device and operating method thereof Aug 6, 2017 Issued
Array ( [id] => 12161478 [patent_doc_number] => 20180032744 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-02-01 [patent_title] => 'METHODS OF DYNAMICALLY SECURING ELECTRONIC DEVICES AND OTHER COMMUNICATIONS THROUGH ENVIRONMENTAL AND SYSTEM MEASUREMENTS LEVERAGING TAILORED TRUSTWORTHY SPACES AND CONTINUOUS AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 15/664091 [patent_app_country] => US [patent_app_date] => 2017-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 19096 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15664091 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/664091
Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces and continuous authentication Jul 30, 2017 Issued
Array ( [id] => 12034622 [patent_doc_number] => 20170324721 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-11-09 [patent_title] => 'Methods, Systems, and Products for Authenticating Users' [patent_app_type] => utility [patent_app_number] => 15/656130 [patent_app_country] => US [patent_app_date] => 2017-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 9804 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15656130 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/656130
Methods, systems, and products for authenticating users Jul 20, 2017 Issued
Array ( [id] => 16033023 [patent_doc_number] => 10678935 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-06-09 [patent_title] => Identifying container file events for providing container security [patent_app_type] => utility [patent_app_number] => 15/647269 [patent_app_country] => US [patent_app_date] => 2017-07-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7036 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 202 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15647269 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/647269
Identifying container file events for providing container security Jul 11, 2017 Issued
Array ( [id] => 13801133 [patent_doc_number] => 20190014105 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-01-10 [patent_title] => Certification System [patent_app_type] => utility [patent_app_number] => 15/644787 [patent_app_country] => US [patent_app_date] => 2017-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6729 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -7 [patent_words_short_claim] => 51 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15644787 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/644787
Certification system Jul 8, 2017 Issued
Array ( [id] => 12719674 [patent_doc_number] => 20180131725 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-10 [patent_title] => METHOD AND APPARATUS FOR MOBILE TERMINAL MANAGEMENT SUPPORTING SECURITY POLICY [patent_app_type] => utility [patent_app_number] => 15/642450 [patent_app_country] => US [patent_app_date] => 2017-07-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6662 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 83 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15642450 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/642450
METHOD AND APPARATUS FOR MOBILE TERMINAL MANAGEMENT SUPPORTING SECURITY POLICY Jul 5, 2017 Abandoned
Array ( [id] => 12576576 [patent_doc_number] => 10021132 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-07-10 [patent_title] => Limiting the efficacy of a denial of service attack by increasing client resource demands [patent_app_type] => utility [patent_app_number] => 15/640744 [patent_app_country] => US [patent_app_date] => 2017-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8531 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 224 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15640744 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/640744
Limiting the efficacy of a denial of service attack by increasing client resource demands Jul 2, 2017 Issued
Array ( [id] => 16480732 [patent_doc_number] => 10855697 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-12-01 [patent_title] => Threat intelligence system [patent_app_type] => utility [patent_app_number] => 15/640031 [patent_app_country] => US [patent_app_date] => 2017-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8920 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 319 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15640031 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/640031
Threat intelligence system Jun 29, 2017 Issued
Array ( [id] => 16608232 [patent_doc_number] => 10909239 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-02-02 [patent_title] => Advanced file modification heuristics [patent_app_type] => utility [patent_app_number] => 15/637455 [patent_app_country] => US [patent_app_date] => 2017-06-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6232 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 145 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15637455 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/637455
Advanced file modification heuristics Jun 28, 2017 Issued
Array ( [id] => 15168191 [patent_doc_number] => 10489593 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-26 [patent_title] => Mitigation of malicious actions associated with graphical user interface elements [patent_app_type] => utility [patent_app_number] => 15/635047 [patent_app_country] => US [patent_app_date] => 2017-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4016 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 187 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15635047 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/635047
Mitigation of malicious actions associated with graphical user interface elements Jun 26, 2017 Issued
Array ( [id] => 16708730 [patent_doc_number] => 10958679 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-03-23 [patent_title] => Techniques for cloud security monitoring and threat intelligence [patent_app_type] => utility [patent_app_number] => 15/632174 [patent_app_country] => US [patent_app_date] => 2017-06-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10807 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 201 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15632174 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/632174
Techniques for cloud security monitoring and threat intelligence Jun 22, 2017 Issued
Array ( [id] => 13726221 [patent_doc_number] => 20170374066 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-12-28 [patent_title] => SERVER, IC CARD PROCESSING APPARATUS, AND IC CARD PROCESSING SYSTEM [patent_app_type] => utility [patent_app_number] => 15/630288 [patent_app_country] => US [patent_app_date] => 2017-06-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6881 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -5 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630288 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/630288
Server, IC card processing apparatus, and IC card processing system Jun 21, 2017 Issued
Array ( [id] => 17457039 [patent_doc_number] => 11271914 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-03-08 [patent_title] => External contact connections to authenticate and contextualize entity [patent_app_type] => utility [patent_app_number] => 15/625556 [patent_app_country] => US [patent_app_date] => 2017-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10586 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 401 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15625556 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/625556
External contact connections to authenticate and contextualize entity Jun 15, 2017 Issued
Array ( [id] => 16594945 [patent_doc_number] => 10904233 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-01-26 [patent_title] => Protection from data security threats [patent_app_type] => utility [patent_app_number] => 15/601914 [patent_app_country] => US [patent_app_date] => 2017-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 13331 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 281 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15601914 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/601914
Protection from data security threats May 21, 2017 Issued
Array ( [id] => 14605837 [patent_doc_number] => 10356120 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-07-16 [patent_title] => Method, apparatus and computer program product for assessing the risk of electronic communications using logon types [patent_app_type] => utility [patent_app_number] => 15/581055 [patent_app_country] => US [patent_app_date] => 2017-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3540 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 364 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15581055 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/581055
Method, apparatus and computer program product for assessing the risk of electronic communications using logon types Apr 27, 2017 Issued
Array ( [id] => 13526581 [patent_doc_number] => 20180314833 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-11-01 [patent_title] => RISK ANALYSIS TO IDENTIFY AND RETROSPECT CYBER SECURITY THREATS [patent_app_type] => utility [patent_app_number] => 15/581352 [patent_app_country] => US [patent_app_date] => 2017-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6239 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 99 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15581352 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/581352
RISK ANALYSIS TO IDENTIFY AND RETROSPECT CYBER SECURITY THREATS Apr 27, 2017 Abandoned
Menu