Search

Leon Flores

Examiner (ID: 7589, Phone: (571)270-1201 , Office: P/2633 )

Most Active Art Unit
2633
Art Unit(s)
2671, 2637, 2632, 2611, 2661, 2676, 2633
Total Applications
1689
Issued Applications
1498
Pending Applications
71
Abandoned Applications
148

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 7073972 [patent_doc_number] => 20050147239 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-07-07 [patent_title] => 'METHOD FOR IMPLEMENTING ADVANCED ENCRYPTION STANDARDS USING A VERY LONG INSTRUCTION WORD ARCHITECTURE PROCESSOR' [patent_app_type] => utility [patent_app_number] => 10/708988 [patent_app_country] => US [patent_app_date] => 2004-04-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2612 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0147/20050147239.pdf [firstpage_image] =>[orig_patent_app_number] => 10708988 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/708988
METHOD FOR IMPLEMENTING ADVANCED ENCRYPTION STANDARDS USING A VERY LONG INSTRUCTION WORD ARCHITECTURE PROCESSOR Apr 5, 2004 Abandoned
Array ( [id] => 7166516 [patent_doc_number] => 20050201535 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-15 [patent_title] => 'Classification of wanted e-mail via web of relationship utilization of Public Key Infrastructure (PKI)' [patent_app_type] => utility [patent_app_number] => 10/708968 [patent_app_country] => US [patent_app_date] => 2004-04-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 771 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0201/20050201535.pdf [firstpage_image] =>[orig_patent_app_number] => 10708968 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/708968
Classification of wanted e-mail via web of relationship utilization of Public Key Infrastructure (PKI) Apr 3, 2004 Abandoned
Array ( [id] => 7166525 [patent_doc_number] => 20050201536 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-15 [patent_title] => 'Control of desired marketing electronic mail through use of anonymous recipients and public key infrastructure (PKI)' [patent_app_type] => utility [patent_app_number] => 10/708969 [patent_app_country] => US [patent_app_date] => 2004-04-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 803 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0201/20050201536.pdf [firstpage_image] =>[orig_patent_app_number] => 10708969 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/708969
Control of desired marketing electronic mail through use of anonymous recipients and public key infrastructure (PKI) Apr 3, 2004 Abandoned
Array ( [id] => 7112798 [patent_doc_number] => 20050210254 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-22 [patent_title] => 'Enhancement to volume license keys' [patent_app_type] => utility [patent_app_number] => 10/805371 [patent_app_country] => US [patent_app_date] => 2004-03-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7183 [patent_no_of_claims] => 56 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0210/20050210254.pdf [firstpage_image] =>[orig_patent_app_number] => 10805371 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/805371
Enhancement to volume license keys Mar 18, 2004 Issued
Array ( [id] => 309881 [patent_doc_number] => 07533414 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2009-05-12 [patent_title] => 'Detecting system abuse' [patent_app_type] => utility [patent_app_number] => 10/803473 [patent_app_country] => US [patent_app_date] => 2004-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4889 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 310 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/533/07533414.pdf [firstpage_image] =>[orig_patent_app_number] => 10803473 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/803473
Detecting system abuse Mar 16, 2004 Issued
Array ( [id] => 7112799 [patent_doc_number] => 20050210255 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-22 [patent_title] => 'Systems and methods for encoding randomly distributed features in an object' [patent_app_type] => utility [patent_app_number] => 10/802981 [patent_app_country] => US [patent_app_date] => 2004-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 11313 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0210/20050210255.pdf [firstpage_image] =>[orig_patent_app_number] => 10802981 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/802981
Systems and methods for encoding randomly distributed features in an object Mar 16, 2004 Issued
Array ( [id] => 7595599 [patent_doc_number] => 07620983 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2009-11-17 [patent_title] => 'Behavior profiling' [patent_app_type] => utility [patent_app_number] => 10/802672 [patent_app_country] => US [patent_app_date] => 2004-03-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2652 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 299 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/620/07620983.pdf [firstpage_image] =>[orig_patent_app_number] => 10802672 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/802672
Behavior profiling Mar 15, 2004 Issued
Array ( [id] => 7177980 [patent_doc_number] => 20050204155 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-15 [patent_title] => 'Tamper resistant secure architecture' [patent_app_type] => utility [patent_app_number] => 10/795385 [patent_app_country] => US [patent_app_date] => 2004-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3426 [patent_no_of_claims] => 39 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0204/20050204155.pdf [firstpage_image] =>[orig_patent_app_number] => 10795385 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/795385
Tamper resistant secure architecture Mar 8, 2004 Abandoned
Array ( [id] => 7510939 [patent_doc_number] => 08037539 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-10-11 [patent_title] => 'System and method for providing access to verified personal background data' [patent_app_type] => utility [patent_app_number] => 10/786355 [patent_app_country] => US [patent_app_date] => 2004-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 6555 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/037/08037539.pdf [firstpage_image] =>[orig_patent_app_number] => 10786355 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/786355
System and method for providing access to verified personal background data Feb 24, 2004 Issued
Array ( [id] => 47779 [patent_doc_number] => 07783891 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-08-24 [patent_title] => 'System and method facilitating secure credential management' [patent_app_type] => utility [patent_app_number] => 10/787871 [patent_app_country] => US [patent_app_date] => 2004-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5696 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 201 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/783/07783891.pdf [firstpage_image] =>[orig_patent_app_number] => 10787871 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/787871
System and method facilitating secure credential management Feb 24, 2004 Issued
Array ( [id] => 7424749 [patent_doc_number] => 20040229598 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-11-18 [patent_title] => 'Method for managing transfer of a content' [patent_app_type] => new [patent_app_number] => 10/784470 [patent_app_country] => US [patent_app_date] => 2004-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 6800 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0229/20040229598.pdf [firstpage_image] =>[orig_patent_app_number] => 10784470 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/784470
Method for managing transfer of a content Feb 22, 2004 Abandoned
Array ( [id] => 7091856 [patent_doc_number] => 20050010775 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-01-13 [patent_title] => 'Mail receiving/transmitting system and method with document identification function' [patent_app_type] => utility [patent_app_number] => 10/778773 [patent_app_country] => US [patent_app_date] => 2004-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3555 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0010/20050010775.pdf [firstpage_image] =>[orig_patent_app_number] => 10778773 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/778773
Mail receiving/transmitting system and method with document identification function Feb 11, 2004 Abandoned
Array ( [id] => 7399827 [patent_doc_number] => 20040174995 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-09-09 [patent_title] => 'Cryptosystems' [patent_app_type] => new [patent_app_number] => 10/772667 [patent_app_country] => US [patent_app_date] => 2004-02-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5363 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 32 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0174/20040174995.pdf [firstpage_image] =>[orig_patent_app_number] => 10772667 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/772667
Cryptosystems Feb 4, 2004 Abandoned
Array ( [id] => 7595774 [patent_doc_number] => 07620808 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-11-17 [patent_title] => 'Security of a communication system' [patent_app_type] => utility [patent_app_number] => 10/768075 [patent_app_country] => US [patent_app_date] => 2004-02-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 6087 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/620/07620808.pdf [firstpage_image] =>[orig_patent_app_number] => 10768075 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/768075
Security of a communication system Feb 1, 2004 Issued
Array ( [id] => 4488458 [patent_doc_number] => 07908488 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-03-15 [patent_title] => 'Recording medium with copy protection information formed in intermittent or alternate wobbled pits and apparatus and methods for forming, recording, and reproducing the recording medium' [patent_app_type] => utility [patent_app_number] => 10/762516 [patent_app_country] => US [patent_app_date] => 2004-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 17 [patent_no_of_words] => 5051 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 159 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/908/07908488.pdf [firstpage_image] =>[orig_patent_app_number] => 10762516 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/762516
Recording medium with copy protection information formed in intermittent or alternate wobbled pits and apparatus and methods for forming, recording, and reproducing the recording medium Jan 22, 2004 Issued
Array ( [id] => 249001 [patent_doc_number] => 07587763 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-09-08 [patent_title] => 'Systems and methods for detecting a security breach in a computer system' [patent_app_type] => utility [patent_app_number] => 10/733469 [patent_app_country] => US [patent_app_date] => 2003-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4237 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 194 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/587/07587763.pdf [firstpage_image] =>[orig_patent_app_number] => 10733469 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/733469
Systems and methods for detecting a security breach in a computer system Dec 11, 2003 Issued
Array ( [id] => 272456 [patent_doc_number] => 07565696 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2009-07-21 [patent_title] => 'Synchronizing network security devices within a network security system' [patent_app_type] => utility [patent_app_number] => 10/733073 [patent_app_country] => US [patent_app_date] => 2003-12-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3512 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/565/07565696.pdf [firstpage_image] =>[orig_patent_app_number] => 10733073 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/733073
Synchronizing network security devices within a network security system Dec 9, 2003 Issued
Array ( [id] => 7417441 [patent_doc_number] => 20040107342 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-06-03 [patent_title] => 'Secure network file access control system' [patent_app_type] => new [patent_app_number] => 10/712474 [patent_app_country] => US [patent_app_date] => 2003-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 12691 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 112 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0107/20040107342.pdf [firstpage_image] =>[orig_patent_app_number] => 10712474 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/712474
Secure network file access control system Nov 11, 2003 Abandoned
Array ( [id] => 6907105 [patent_doc_number] => 20050102500 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-05-12 [patent_title] => 'System and method for integrating applications in different enterprises separated by firewalls' [patent_app_type] => utility [patent_app_number] => 10/712665 [patent_app_country] => US [patent_app_date] => 2003-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2130 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0102/20050102500.pdf [firstpage_image] =>[orig_patent_app_number] => 10712665 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/712665
System and method for integrating applications in different enterprises separated by firewalls Nov 11, 2003 Abandoned
Array ( [id] => 7672089 [patent_doc_number] => 20040181690 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-09-16 [patent_title] => 'Managing multiple network security devices from a manager device' [patent_app_type] => new [patent_app_number] => 10/712313 [patent_app_country] => US [patent_app_date] => 2003-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 30 [patent_figures_cnt] => 30 [patent_no_of_words] => 13410 [patent_no_of_claims] => 105 [patent_no_of_ind_claims] => 19 [patent_words_short_claim] => 53 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0181/20040181690.pdf [firstpage_image] =>[orig_patent_app_number] => 10712313 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/712313
Managing multiple network security devices from a manager device Nov 11, 2003 Abandoned
Menu