
Kavel Singh
Examiner (ID: 7860, Phone: (571)272-2362 , Office: P/3651 )
| Most Active Art Unit | 3651 |
| Art Unit(s) | 3651 |
| Total Applications | 1519 |
| Issued Applications | 1200 |
| Pending Applications | 97 |
| Abandoned Applications | 248 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12241995
[patent_doc_number] => 20180074858
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-15
[patent_title] => 'MULTI-LAYER DISTRIBUTION OF A COMPUTING TASK IN A DISPERSED STORAGE NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/822333
[patent_app_country] => US
[patent_app_date] => 2017-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9911
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15822333
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/822333 | MULTI-LAYER DISTRIBUTION OF A COMPUTING TASK IN A DISPERSED STORAGE NETWORK | Nov 26, 2017 | Abandoned |
Array
(
[id] => 16522369
[patent_doc_number] => 10873597
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-22
[patent_title] => Cyber attack early warning system
[patent_app_type] => utility
[patent_app_number] => 15/817006
[patent_app_country] => US
[patent_app_date] => 2017-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6604
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 227
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15817006
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/817006 | Cyber attack early warning system | Nov 16, 2017 | Issued |
Array
(
[id] => 12236979
[patent_doc_number] => 20180069841
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-08
[patent_title] => 'COMPUTER-IMPLEMENTED CRYPTOGRAPHIC METHOD FOR IMPROVING A COMPUTER NETWORK, AND TERMINAL, SYSTEM AND COMPUTER-READABLE MEDIUM FOR THE SAME'
[patent_app_type] => utility
[patent_app_number] => 15/694929
[patent_app_country] => US
[patent_app_date] => 2017-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 14711
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15694929
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/694929 | COMPUTER-IMPLEMENTED CRYPTOGRAPHIC METHOD FOR IMPROVING A COMPUTER NETWORK, AND TERMINAL, SYSTEM AND COMPUTER-READABLE MEDIUM FOR THE SAME | Sep 3, 2017 | Abandoned |
Array
(
[id] => 15258259
[patent_doc_number] => 20190377863
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => PASSWORD INPUT METHOD, COMPUTER DEVICE AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/463530
[patent_app_country] => US
[patent_app_date] => 2017-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7754
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16463530
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/463530 | PASSWORD INPUT METHOD, COMPUTER DEVICE AND STORAGE MEDIUM | Aug 29, 2017 | Abandoned |
Array
(
[id] => 13692521
[patent_doc_number] => 20170357215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => REVERSE BATTERY PROTECTION DEVICE AND OPERATING METHOD THEREOF
[patent_app_type] => utility
[patent_app_number] => 15/670804
[patent_app_country] => US
[patent_app_date] => 2017-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 27289
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15670804
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/670804 | Reverse battery protection device and operating method thereof | Aug 6, 2017 | Issued |
Array
(
[id] => 12161478
[patent_doc_number] => 20180032744
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'METHODS OF DYNAMICALLY SECURING ELECTRONIC DEVICES AND OTHER COMMUNICATIONS THROUGH ENVIRONMENTAL AND SYSTEM MEASUREMENTS LEVERAGING TAILORED TRUSTWORTHY SPACES AND CONTINUOUS AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/664091
[patent_app_country] => US
[patent_app_date] => 2017-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 19096
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15664091
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/664091 | Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces and continuous authentication | Jul 30, 2017 | Issued |
Array
(
[id] => 12034622
[patent_doc_number] => 20170324721
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-09
[patent_title] => 'Methods, Systems, and Products for Authenticating Users'
[patent_app_type] => utility
[patent_app_number] => 15/656130
[patent_app_country] => US
[patent_app_date] => 2017-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 9804
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15656130
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/656130 | Methods, systems, and products for authenticating users | Jul 20, 2017 | Issued |
Array
(
[id] => 16033023
[patent_doc_number] => 10678935
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-09
[patent_title] => Identifying container file events for providing container security
[patent_app_type] => utility
[patent_app_number] => 15/647269
[patent_app_country] => US
[patent_app_date] => 2017-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7036
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15647269
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/647269 | Identifying container file events for providing container security | Jul 11, 2017 | Issued |
Array
(
[id] => 13801133
[patent_doc_number] => 20190014105
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-10
[patent_title] => Certification System
[patent_app_type] => utility
[patent_app_number] => 15/644787
[patent_app_country] => US
[patent_app_date] => 2017-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6729
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15644787
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/644787 | Certification system | Jul 8, 2017 | Issued |
Array
(
[id] => 12719674
[patent_doc_number] => 20180131725
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-10
[patent_title] => METHOD AND APPARATUS FOR MOBILE TERMINAL MANAGEMENT SUPPORTING SECURITY POLICY
[patent_app_type] => utility
[patent_app_number] => 15/642450
[patent_app_country] => US
[patent_app_date] => 2017-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6662
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15642450
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/642450 | METHOD AND APPARATUS FOR MOBILE TERMINAL MANAGEMENT SUPPORTING SECURITY POLICY | Jul 5, 2017 | Abandoned |
Array
(
[id] => 12576576
[patent_doc_number] => 10021132
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-10
[patent_title] => Limiting the efficacy of a denial of service attack by increasing client resource demands
[patent_app_type] => utility
[patent_app_number] => 15/640744
[patent_app_country] => US
[patent_app_date] => 2017-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8531
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15640744
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/640744 | Limiting the efficacy of a denial of service attack by increasing client resource demands | Jul 2, 2017 | Issued |
Array
(
[id] => 16480732
[patent_doc_number] => 10855697
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-01
[patent_title] => Threat intelligence system
[patent_app_type] => utility
[patent_app_number] => 15/640031
[patent_app_country] => US
[patent_app_date] => 2017-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8920
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 319
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15640031
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/640031 | Threat intelligence system | Jun 29, 2017 | Issued |
Array
(
[id] => 16608232
[patent_doc_number] => 10909239
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-02
[patent_title] => Advanced file modification heuristics
[patent_app_type] => utility
[patent_app_number] => 15/637455
[patent_app_country] => US
[patent_app_date] => 2017-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6232
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15637455
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/637455 | Advanced file modification heuristics | Jun 28, 2017 | Issued |
Array
(
[id] => 15168191
[patent_doc_number] => 10489593
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-26
[patent_title] => Mitigation of malicious actions associated with graphical user interface elements
[patent_app_type] => utility
[patent_app_number] => 15/635047
[patent_app_country] => US
[patent_app_date] => 2017-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4016
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15635047
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/635047 | Mitigation of malicious actions associated with graphical user interface elements | Jun 26, 2017 | Issued |
Array
(
[id] => 16708730
[patent_doc_number] => 10958679
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-23
[patent_title] => Techniques for cloud security monitoring and threat intelligence
[patent_app_type] => utility
[patent_app_number] => 15/632174
[patent_app_country] => US
[patent_app_date] => 2017-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10807
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15632174
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/632174 | Techniques for cloud security monitoring and threat intelligence | Jun 22, 2017 | Issued |
Array
(
[id] => 13726221
[patent_doc_number] => 20170374066
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-28
[patent_title] => SERVER, IC CARD PROCESSING APPARATUS, AND IC CARD PROCESSING SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/630288
[patent_app_country] => US
[patent_app_date] => 2017-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6881
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630288
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/630288 | Server, IC card processing apparatus, and IC card processing system | Jun 21, 2017 | Issued |
Array
(
[id] => 17457039
[patent_doc_number] => 11271914
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-08
[patent_title] => External contact connections to authenticate and contextualize entity
[patent_app_type] => utility
[patent_app_number] => 15/625556
[patent_app_country] => US
[patent_app_date] => 2017-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10586
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 401
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15625556
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/625556 | External contact connections to authenticate and contextualize entity | Jun 15, 2017 | Issued |
Array
(
[id] => 16594945
[patent_doc_number] => 10904233
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-01-26
[patent_title] => Protection from data security threats
[patent_app_type] => utility
[patent_app_number] => 15/601914
[patent_app_country] => US
[patent_app_date] => 2017-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13331
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15601914
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/601914 | Protection from data security threats | May 21, 2017 | Issued |
Array
(
[id] => 14605837
[patent_doc_number] => 10356120
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-07-16
[patent_title] => Method, apparatus and computer program product for assessing the risk of electronic communications using logon types
[patent_app_type] => utility
[patent_app_number] => 15/581055
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3540
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 364
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15581055
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/581055 | Method, apparatus and computer program product for assessing the risk of electronic communications using logon types | Apr 27, 2017 | Issued |
Array
(
[id] => 13526581
[patent_doc_number] => 20180314833
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => RISK ANALYSIS TO IDENTIFY AND RETROSPECT CYBER SECURITY THREATS
[patent_app_type] => utility
[patent_app_number] => 15/581352
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6239
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15581352
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/581352 | RISK ANALYSIS TO IDENTIFY AND RETROSPECT CYBER SECURITY THREATS | Apr 27, 2017 | Abandoned |