
Kevin M. Bechtel
Examiner (ID: 10046, Phone: (571)270-5436 , Office: P/2491 )
| Most Active Art Unit | 2491 |
| Art Unit(s) | 2491, 2449 |
| Total Applications | 618 |
| Issued Applications | 435 |
| Pending Applications | 68 |
| Abandoned Applications | 142 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11711928
[patent_doc_number] => 20170180427
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'CLIPBOARD HARDENING'
[patent_app_type] => utility
[patent_app_number] => 15/448254
[patent_app_country] => US
[patent_app_date] => 2017-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 18752
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15448254
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/448254 | Clipboard hardening | Mar 1, 2017 | Issued |
Array
(
[id] => 12224750
[patent_doc_number] => 20180063111
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'Entitlement Based Wi-Fi Authentication'
[patent_app_type] => utility
[patent_app_number] => 15/446098
[patent_app_country] => US
[patent_app_date] => 2017-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7117
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15446098
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/446098 | Entitlement based Wi-Fi authentication | Feb 28, 2017 | Issued |
Array
(
[id] => 11938854
[patent_doc_number] => 20170243004
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'System and Method for Detecting and Monitoring Process Creation'
[patent_app_type] => utility
[patent_app_number] => 15/436295
[patent_app_country] => US
[patent_app_date] => 2017-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8378
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15436295
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/436295 | System and method for detecting and monitoring process creation | Feb 16, 2017 | Issued |
Array
(
[id] => 14524095
[patent_doc_number] => 10339311
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Anomalous commit detection
[patent_app_type] => utility
[patent_app_number] => 15/435961
[patent_app_country] => US
[patent_app_date] => 2017-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11064
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15435961
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/435961 | Anomalous commit detection | Feb 16, 2017 | Issued |
Array
(
[id] => 15203451
[patent_doc_number] => 10499248
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-03
[patent_title] => Secure interaction method and device
[patent_app_type] => utility
[patent_app_number] => 15/435507
[patent_app_country] => US
[patent_app_date] => 2017-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 12886
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15435507
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/435507 | Secure interaction method and device | Feb 16, 2017 | Issued |
Array
(
[id] => 14528109
[patent_doc_number] => 10341328
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device-management protocol
[patent_app_type] => utility
[patent_app_number] => 15/431149
[patent_app_country] => US
[patent_app_date] => 2017-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5878
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15431149
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/431149 | Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device-management protocol | Feb 12, 2017 | Issued |
Array
(
[id] => 11825777
[patent_doc_number] => 20170214714
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-27
[patent_title] => 'COMPROMISE FREE CLOUD DATA ENCRYPTION AND SECURITY'
[patent_app_type] => utility
[patent_app_number] => 15/428812
[patent_app_country] => US
[patent_app_date] => 2017-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7646
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15428812
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/428812 | Compromise free cloud data encryption and security | Feb 8, 2017 | Issued |
Array
(
[id] => 13069609
[patent_doc_number] => 10055584
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-21
[patent_title] => Method and device for obtaining virus signatures
[patent_app_type] => utility
[patent_app_number] => 15/426769
[patent_app_country] => US
[patent_app_date] => 2017-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4236
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15426769
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/426769 | Method and device for obtaining virus signatures | Feb 6, 2017 | Issued |
Array
(
[id] => 14265961
[patent_doc_number] => 10282545
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Detection of malware-usable clean file
[patent_app_type] => utility
[patent_app_number] => 15/421930
[patent_app_country] => US
[patent_app_date] => 2017-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7836
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15421930
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/421930 | Detection of malware-usable clean file | Jan 31, 2017 | Issued |
Array
(
[id] => 13336685
[patent_doc_number] => 20180219881
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-02
[patent_title] => Detecting Anomalous Hypertext Transfer Protocol (HTTP) Events from Semi-Structured Data
[patent_app_type] => utility
[patent_app_number] => 15/420560
[patent_app_country] => US
[patent_app_date] => 2017-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9664
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15420560
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/420560 | Detecting Anomalous Hypertext Transfer Protocol (HTTP) Events from Semi-Structured Data | Jan 30, 2017 | Abandoned |
Array
(
[id] => 11868664
[patent_doc_number] => 20170235949
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'Security of Computer Resources'
[patent_app_type] => utility
[patent_app_number] => 15/412264
[patent_app_country] => US
[patent_app_date] => 2017-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4180
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15412264
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/412264 | Security of computer resources | Jan 22, 2017 | Issued |
Array
(
[id] => 13308423
[patent_doc_number] => 20180205748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-19
[patent_title] => INTRUSION DETECTION BASED ON LOGIN ATTEMPTS
[patent_app_type] => utility
[patent_app_number] => 15/408483
[patent_app_country] => US
[patent_app_date] => 2017-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11733
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15408483
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/408483 | Intrusion detection based on login attempts | Jan 17, 2017 | Issued |
Array
(
[id] => 12629517
[patent_doc_number] => 20180101669
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-12
[patent_title] => DEVICE TO PERFORM SECURE BIOMETRIC AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 15/401890
[patent_app_country] => US
[patent_app_date] => 2017-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6374
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15401890
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/401890 | DEVICE TO PERFORM SECURE BIOMETRIC AUTHENTICATION | Jan 8, 2017 | Abandoned |
Array
(
[id] => 11711883
[patent_doc_number] => 20170180382
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'Method and Apparatus for Using Software Defined Networking and Network Function Virtualization to Secure Residential Networks'
[patent_app_type] => utility
[patent_app_number] => 15/381712
[patent_app_country] => US
[patent_app_date] => 2016-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7646
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15381712
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/381712 | Method and apparatus for using software defined networking and network function virtualization to secure residential networks | Dec 15, 2016 | Issued |
Array
(
[id] => 12804124
[patent_doc_number] => 20180159878
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-07
[patent_title] => ATTACKING NODE DETECTION APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF
[patent_app_type] => utility
[patent_app_number] => 15/372235
[patent_app_country] => US
[patent_app_date] => 2016-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5638
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15372235
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/372235 | Attacking node detection apparatus, method, and non-transitory computer readable storage medium thereof | Dec 6, 2016 | Issued |
Array
(
[id] => 14970485
[patent_doc_number] => 20190312721
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-10
[patent_title] => PROTECTIONS FOR UNAUTHORIZED COPYING (ANTI-CLONING) METHOD AND SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/349907
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4164
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16349907
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/349907 | Protections for unauthorized copying (anti-cloning) method and system | Nov 17, 2016 | Issued |
Array
(
[id] => 11496325
[patent_doc_number] => 20170070509
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-09
[patent_title] => 'Secure Browsing Via A Transparent Network Proxy'
[patent_app_type] => utility
[patent_app_number] => 15/353174
[patent_app_country] => US
[patent_app_date] => 2016-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10819
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15353174
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/353174 | Secure browsing via a transparent network proxy | Nov 15, 2016 | Issued |
Array
(
[id] => 15390529
[patent_doc_number] => 10536477
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-01-14
[patent_title] => Protection against attacks from remote network devices
[patent_app_type] => utility
[patent_app_number] => 15/343539
[patent_app_country] => US
[patent_app_date] => 2016-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4596
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15343539
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/343539 | Protection against attacks from remote network devices | Nov 3, 2016 | Issued |
Array
(
[id] => 16036737
[patent_doc_number] => 10680805
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-09
[patent_title] => Data encryption control using multiple controlling authorities
[patent_app_type] => utility
[patent_app_number] => 16/335501
[patent_app_country] => US
[patent_app_date] => 2016-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14278
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16335501
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/335501 | Data encryption control using multiple controlling authorities | Nov 3, 2016 | Issued |
Array
(
[id] => 11759484
[patent_doc_number] => 20170206353
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-20
[patent_title] => 'METHOD AND SYSTEM FOR PREVENTING MALICIOUS ALTERATION OF DATA IN COMPUTER SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/286593
[patent_app_country] => US
[patent_app_date] => 2016-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 12257
[patent_no_of_claims] => 84
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15286593
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/286593 | METHOD AND SYSTEM FOR PREVENTING MALICIOUS ALTERATION OF DATA IN COMPUTER SYSTEM | Oct 5, 2016 | Abandoned |