Search

Kevin M. Bechtel

Examiner (ID: 10046, Phone: (571)270-5436 , Office: P/2491 )

Most Active Art Unit
2491
Art Unit(s)
2491, 2449
Total Applications
618
Issued Applications
435
Pending Applications
68
Abandoned Applications
142

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11711928 [patent_doc_number] => 20170180427 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-22 [patent_title] => 'CLIPBOARD HARDENING' [patent_app_type] => utility [patent_app_number] => 15/448254 [patent_app_country] => US [patent_app_date] => 2017-03-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 18752 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15448254 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/448254
Clipboard hardening Mar 1, 2017 Issued
Array ( [id] => 12224750 [patent_doc_number] => 20180063111 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-01 [patent_title] => 'Entitlement Based Wi-Fi Authentication' [patent_app_type] => utility [patent_app_number] => 15/446098 [patent_app_country] => US [patent_app_date] => 2017-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7117 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15446098 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/446098
Entitlement based Wi-Fi authentication Feb 28, 2017 Issued
Array ( [id] => 11938854 [patent_doc_number] => 20170243004 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-08-24 [patent_title] => 'System and Method for Detecting and Monitoring Process Creation' [patent_app_type] => utility [patent_app_number] => 15/436295 [patent_app_country] => US [patent_app_date] => 2017-02-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8378 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15436295 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/436295
System and method for detecting and monitoring process creation Feb 16, 2017 Issued
Array ( [id] => 14524095 [patent_doc_number] => 10339311 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-02 [patent_title] => Anomalous commit detection [patent_app_type] => utility [patent_app_number] => 15/435961 [patent_app_country] => US [patent_app_date] => 2017-02-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 11064 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15435961 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/435961
Anomalous commit detection Feb 16, 2017 Issued
Array ( [id] => 15203451 [patent_doc_number] => 10499248 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-12-03 [patent_title] => Secure interaction method and device [patent_app_type] => utility [patent_app_number] => 15/435507 [patent_app_country] => US [patent_app_date] => 2017-02-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 12886 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 277 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15435507 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/435507
Secure interaction method and device Feb 16, 2017 Issued
Array ( [id] => 14528109 [patent_doc_number] => 10341328 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-02 [patent_title] => Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device-management protocol [patent_app_type] => utility [patent_app_number] => 15/431149 [patent_app_country] => US [patent_app_date] => 2017-02-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5878 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15431149 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/431149
Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device-management protocol Feb 12, 2017 Issued
Array ( [id] => 11825777 [patent_doc_number] => 20170214714 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-27 [patent_title] => 'COMPROMISE FREE CLOUD DATA ENCRYPTION AND SECURITY' [patent_app_type] => utility [patent_app_number] => 15/428812 [patent_app_country] => US [patent_app_date] => 2017-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7646 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15428812 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/428812
Compromise free cloud data encryption and security Feb 8, 2017 Issued
Array ( [id] => 13069609 [patent_doc_number] => 10055584 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-08-21 [patent_title] => Method and device for obtaining virus signatures [patent_app_type] => utility [patent_app_number] => 15/426769 [patent_app_country] => US [patent_app_date] => 2017-02-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 4236 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 212 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15426769 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/426769
Method and device for obtaining virus signatures Feb 6, 2017 Issued
Array ( [id] => 14265961 [patent_doc_number] => 10282545 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-07 [patent_title] => Detection of malware-usable clean file [patent_app_type] => utility [patent_app_number] => 15/421930 [patent_app_country] => US [patent_app_date] => 2017-02-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7836 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15421930 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/421930
Detection of malware-usable clean file Jan 31, 2017 Issued
Array ( [id] => 13336685 [patent_doc_number] => 20180219881 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-08-02 [patent_title] => Detecting Anomalous Hypertext Transfer Protocol (HTTP) Events from Semi-Structured Data [patent_app_type] => utility [patent_app_number] => 15/420560 [patent_app_country] => US [patent_app_date] => 2017-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9664 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -26 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15420560 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/420560
Detecting Anomalous Hypertext Transfer Protocol (HTTP) Events from Semi-Structured Data Jan 30, 2017 Abandoned
Array ( [id] => 11868664 [patent_doc_number] => 20170235949 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-08-17 [patent_title] => 'Security of Computer Resources' [patent_app_type] => utility [patent_app_number] => 15/412264 [patent_app_country] => US [patent_app_date] => 2017-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4180 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15412264 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/412264
Security of computer resources Jan 22, 2017 Issued
Array ( [id] => 13308423 [patent_doc_number] => 20180205748 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-19 [patent_title] => INTRUSION DETECTION BASED ON LOGIN ATTEMPTS [patent_app_type] => utility [patent_app_number] => 15/408483 [patent_app_country] => US [patent_app_date] => 2017-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11733 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15408483 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/408483
Intrusion detection based on login attempts Jan 17, 2017 Issued
Array ( [id] => 12629517 [patent_doc_number] => 20180101669 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-04-12 [patent_title] => DEVICE TO PERFORM SECURE BIOMETRIC AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 15/401890 [patent_app_country] => US [patent_app_date] => 2017-01-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6374 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -24 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15401890 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/401890
DEVICE TO PERFORM SECURE BIOMETRIC AUTHENTICATION Jan 8, 2017 Abandoned
Array ( [id] => 11711883 [patent_doc_number] => 20170180382 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-22 [patent_title] => 'Method and Apparatus for Using Software Defined Networking and Network Function Virtualization to Secure Residential Networks' [patent_app_type] => utility [patent_app_number] => 15/381712 [patent_app_country] => US [patent_app_date] => 2016-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7646 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15381712 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/381712
Method and apparatus for using software defined networking and network function virtualization to secure residential networks Dec 15, 2016 Issued
Array ( [id] => 12804124 [patent_doc_number] => 20180159878 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-06-07 [patent_title] => ATTACKING NODE DETECTION APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF [patent_app_type] => utility [patent_app_number] => 15/372235 [patent_app_country] => US [patent_app_date] => 2016-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5638 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15372235 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/372235
Attacking node detection apparatus, method, and non-transitory computer readable storage medium thereof Dec 6, 2016 Issued
Array ( [id] => 14970485 [patent_doc_number] => 20190312721 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-10 [patent_title] => PROTECTIONS FOR UNAUTHORIZED COPYING (ANTI-CLONING) METHOD AND SYSTEM [patent_app_type] => utility [patent_app_number] => 16/349907 [patent_app_country] => US [patent_app_date] => 2016-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4164 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16349907 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/349907
Protections for unauthorized copying (anti-cloning) method and system Nov 17, 2016 Issued
Array ( [id] => 11496325 [patent_doc_number] => 20170070509 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-09 [patent_title] => 'Secure Browsing Via A Transparent Network Proxy' [patent_app_type] => utility [patent_app_number] => 15/353174 [patent_app_country] => US [patent_app_date] => 2016-11-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10819 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15353174 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/353174
Secure browsing via a transparent network proxy Nov 15, 2016 Issued
Array ( [id] => 15390529 [patent_doc_number] => 10536477 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-01-14 [patent_title] => Protection against attacks from remote network devices [patent_app_type] => utility [patent_app_number] => 15/343539 [patent_app_country] => US [patent_app_date] => 2016-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4596 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 260 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15343539 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/343539
Protection against attacks from remote network devices Nov 3, 2016 Issued
Array ( [id] => 16036737 [patent_doc_number] => 10680805 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-06-09 [patent_title] => Data encryption control using multiple controlling authorities [patent_app_type] => utility [patent_app_number] => 16/335501 [patent_app_country] => US [patent_app_date] => 2016-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 14278 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16335501 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/335501
Data encryption control using multiple controlling authorities Nov 3, 2016 Issued
Array ( [id] => 11759484 [patent_doc_number] => 20170206353 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-20 [patent_title] => 'METHOD AND SYSTEM FOR PREVENTING MALICIOUS ALTERATION OF DATA IN COMPUTER SYSTEM' [patent_app_type] => utility [patent_app_number] => 15/286593 [patent_app_country] => US [patent_app_date] => 2016-10-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 12257 [patent_no_of_claims] => 84 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15286593 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/286593
METHOD AND SYSTEM FOR PREVENTING MALICIOUS ALTERATION OF DATA IN COMPUTER SYSTEM Oct 5, 2016 Abandoned
Menu