
Kevin A. Kriess
Examiner (ID: 2597)
| Most Active Art Unit | 2316 |
| Art Unit(s) | 2755, 2307, 2787, 2316 |
| Total Applications | 665 |
| Issued Applications | 518 |
| Pending Applications | 18 |
| Abandoned Applications | 129 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11786897
[patent_doc_number] => 09396334
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-19
[patent_title] => 'System and method for detecting harmful files executable on a virtual stack machine'
[patent_app_type] => utility
[patent_app_number] => 14/833620
[patent_app_country] => US
[patent_app_date] => 2015-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6714
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14833620
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/833620 | System and method for detecting harmful files executable on a virtual stack machine | Aug 23, 2015 | Issued |
Array
(
[id] => 10674938
[patent_doc_number] => 20160021084
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-21
[patent_title] => 'SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM'
[patent_app_type] => utility
[patent_app_number] => 14/826107
[patent_app_country] => US
[patent_app_date] => 2015-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 16339
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14826107
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/826107 | Systems and methods of sharing information through a tag-based consortium | Aug 12, 2015 | Issued |
Array
(
[id] => 12496221
[patent_doc_number] => 09996692
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-12
[patent_title] => Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in real time
[patent_app_type] => utility
[patent_app_number] => 14/819974
[patent_app_country] => US
[patent_app_date] => 2015-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4582
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14819974
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/819974 | Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in real time | Aug 5, 2015 | Issued |
Array
(
[id] => 10578019
[patent_doc_number] => 09300678
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-29
[patent_title] => 'Systems and methods for authenticating photographic image data'
[patent_app_type] => utility
[patent_app_number] => 14/816712
[patent_app_country] => US
[patent_app_date] => 2015-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7056
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14816712
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/816712 | Systems and methods for authenticating photographic image data | Aug 2, 2015 | Issued |
Array
(
[id] => 15731541
[patent_doc_number] => 10614201
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => Method and device for identity authentication
[patent_app_type] => utility
[patent_app_number] => 15/327965
[patent_app_country] => US
[patent_app_date] => 2015-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 6612
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15327965
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/327965 | Method and device for identity authentication | Jul 16, 2015 | Issued |
Array
(
[id] => 10441581
[patent_doc_number] => 20150326593
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'DETECTING NETWORK TRAFFIC CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/800758
[patent_app_country] => US
[patent_app_date] => 2015-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11736
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14800758
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/800758 | Detecting network traffic content | Jul 15, 2015 | Issued |
Array
(
[id] => 11654444
[patent_doc_number] => 20170150349
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-25
[patent_title] => 'KEY SHARING METHOD AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/319537
[patent_app_country] => US
[patent_app_date] => 2015-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 16809
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15319537
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/319537 | Key sharing method and device | Jun 16, 2015 | Issued |
Array
(
[id] => 10393527
[patent_doc_number] => 20150278533
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'METHOD FOR REDIRECTING OF KERNEL DATA PATH FOR CONTROLLING RECORDING OF MEDIA'
[patent_app_type] => utility
[patent_app_number] => 14/735474
[patent_app_country] => US
[patent_app_date] => 2015-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 22668
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14735474
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/735474 | METHOD FOR REDIRECTING OF KERNEL DATA PATH FOR CONTROLLING RECORDING OF MEDIA | Jun 9, 2015 | Abandoned |
Array
(
[id] => 12317568
[patent_doc_number] => 09942247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-10
[patent_title] => Traffic shape obfuscation when using an encrypted network connection
[patent_app_type] => utility
[patent_app_number] => 14/724011
[patent_app_country] => US
[patent_app_date] => 2015-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11459
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14724011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/724011 | Traffic shape obfuscation when using an encrypted network connection | May 27, 2015 | Issued |
Array
(
[id] => 10719217
[patent_doc_number] => 20160065364
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'ENHANCED REMOTE KEY MANAGEMENT FOR AN ENTERPRISE IN A CLOUD-BASED ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/670312
[patent_app_country] => US
[patent_app_date] => 2015-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11598
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14670312
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/670312 | ENHANCED REMOTE KEY MANAGEMENT FOR AN ENTERPRISE IN A CLOUD-BASED ENVIRONMENT | Mar 25, 2015 | Abandoned |
Array
(
[id] => 16172168
[patent_doc_number] => 10713742
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-07-14
[patent_title] => Shared verification of credential records
[patent_app_type] => utility
[patent_app_number] => 14/639806
[patent_app_country] => US
[patent_app_date] => 2015-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5935
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 271
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14639806
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/639806 | Shared verification of credential records | Mar 4, 2015 | Issued |
Array
(
[id] => 11523756
[patent_doc_number] => 09607161
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'Optimal re-encryption strategy for joins in encrypted databases'
[patent_app_type] => utility
[patent_app_number] => 14/631593
[patent_app_country] => US
[patent_app_date] => 2015-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7032
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14631593
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/631593 | Optimal re-encryption strategy for joins in encrypted databases | Feb 24, 2015 | Issued |
Array
(
[id] => 10285704
[patent_doc_number] => 20150170702
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'INFORMATION REPRODUCTION DEVICE AND METHOD OF PROVIDING CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/626965
[patent_app_country] => US
[patent_app_date] => 2015-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 20787
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14626965
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/626965 | INFORMATION REPRODUCTION DEVICE AND METHOD OF PROVIDING CONTENT | Feb 19, 2015 | |
Array
(
[id] => 13007915
[patent_doc_number] => 10027638
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-17
[patent_title] => System for user-friendly access control setup using a protected setup
[patent_app_type] => utility
[patent_app_number] => 14/623142
[patent_app_country] => US
[patent_app_date] => 2015-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5332
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14623142
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/623142 | System for user-friendly access control setup using a protected setup | Feb 15, 2015 | Issued |
Array
(
[id] => 11042712
[patent_doc_number] => 20160239668
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-18
[patent_title] => 'DOCUMENT REDACTION WITH DATA RETENTION'
[patent_app_type] => utility
[patent_app_number] => 14/622651
[patent_app_country] => US
[patent_app_date] => 2015-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7229
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14622651
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/622651 | Document redaction with data retention | Feb 12, 2015 | Issued |
Array
(
[id] => 12419688
[patent_doc_number] => 09973516
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-15
[patent_title] => Traffic shape obfuscation when using an encrypted network connection
[patent_app_type] => utility
[patent_app_number] => 14/621949
[patent_app_country] => US
[patent_app_date] => 2015-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11459
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 282
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14621949
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/621949 | Traffic shape obfuscation when using an encrypted network connection | Feb 12, 2015 | Issued |
Array
(
[id] => 11903674
[patent_doc_number] => 09773108
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-26
[patent_title] => 'Systems and methods for performing operations on restricted mobile computing platforms'
[patent_app_type] => utility
[patent_app_number] => 14/620225
[patent_app_country] => US
[patent_app_date] => 2015-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10401
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620225
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620225 | Systems and methods for performing operations on restricted mobile computing platforms | Feb 11, 2015 | Issued |
Array
(
[id] => 10352036
[patent_doc_number] => 20150237041
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-20
[patent_title] => 'ATTRIBUTE-BASED ACCESS CONTROL'
[patent_app_type] => utility
[patent_app_number] => 14/618824
[patent_app_country] => US
[patent_app_date] => 2015-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9921
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14618824
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/618824 | Attribute-based access control | Feb 9, 2015 | Issued |
Array
(
[id] => 10376955
[patent_doc_number] => 20150261963
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'SYSTEM AND METHOD FOR DETECTING SENSITIVITY CONTENT IN TIME-SERIES DATA'
[patent_app_type] => utility
[patent_app_number] => 14/618280
[patent_app_country] => US
[patent_app_date] => 2015-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5929
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14618280
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/618280 | System and method for detecting sensitivity content in time-series data | Feb 9, 2015 | Issued |
Array
(
[id] => 12167825
[patent_doc_number] => 09886594
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-02-06
[patent_title] => 'Online electronic health record'
[patent_app_type] => utility
[patent_app_number] => 14/614927
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 15229
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14614927
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/614927 | Online electronic health record | Feb 4, 2015 | Issued |