
Leslie August Nicholson Iii
Examiner (ID: 9563, Phone: (571)272-5487 , Office: P/3651 )
| Most Active Art Unit | 3651 |
| Art Unit(s) | 3653, 3659, 3651 |
| Total Applications | 2037 |
| Issued Applications | 1756 |
| Pending Applications | 92 |
| Abandoned Applications | 222 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 6078975
[patent_doc_number] => 20110142234
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-16
[patent_title] => 'Multi-Factor Authentication Using a Mobile Phone'
[patent_app_type] => utility
[patent_app_number] => 12/896914
[patent_app_country] => US
[patent_app_date] => 2010-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9788
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0142/20110142234.pdf
[firstpage_image] =>[orig_patent_app_number] => 12896914
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/896914 | Multi-Factor Authentication Using a Mobile Phone | Oct 3, 2010 | Abandoned |
Array
(
[id] => 8059681
[patent_doc_number] => 20120079571
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-29
[patent_title] => 'AUTOMATED ENCRYPTION AND PASSWORD PROTECTION FOR DOWNLOADING DOCUMENTS'
[patent_app_type] => utility
[patent_app_number] => 12/893081
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4799
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0079/20120079571.pdf
[firstpage_image] =>[orig_patent_app_number] => 12893081
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893081 | Automated encryption and password protection for downloaded documents | Sep 28, 2010 | Issued |
Array
(
[id] => 9077791
[patent_doc_number] => 08555383
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-10-08
[patent_title] => 'Network data transmission auditing'
[patent_app_type] => utility
[patent_app_number] => 12/892665
[patent_app_country] => US
[patent_app_date] => 2010-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 15847
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12892665
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/892665 | Network data transmission auditing | Sep 27, 2010 | Issued |
Array
(
[id] => 6126290
[patent_doc_number] => 20110078769
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-31
[patent_title] => 'ELECTRONIC FILE BROWSING SYSTEM AND CONTROL METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 12/892704
[patent_app_country] => US
[patent_app_date] => 2010-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8570
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20110078769.pdf
[firstpage_image] =>[orig_patent_app_number] => 12892704
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/892704 | Electronic file browsing system and control method thereof | Sep 27, 2010 | Issued |
Array
(
[id] => 7736165
[patent_doc_number] => 20120017275
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-19
[patent_title] => 'Identifying polymorphic malware'
[patent_app_type] => utility
[patent_app_number] => 12/804123
[patent_app_country] => US
[patent_app_date] => 2010-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4522
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0017/20120017275.pdf
[firstpage_image] =>[orig_patent_app_number] => 12804123
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/804123 | Identifying polymorphic malware | Jul 12, 2010 | Issued |
Array
(
[id] => 6204071
[patent_doc_number] => 20110066857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-17
[patent_title] => 'Method for secure delivery of digital content'
[patent_app_type] => utility
[patent_app_number] => 12/803842
[patent_app_country] => US
[patent_app_date] => 2010-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4644
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0066/20110066857.pdf
[firstpage_image] =>[orig_patent_app_number] => 12803842
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/803842 | Method for secure delivery of digital content | Jul 5, 2010 | Abandoned |
Array
(
[id] => 6597510
[patent_doc_number] => 20100275266
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-28
[patent_title] => 'Automatically enhancing computing privacy by affecting the screen of a computing device'
[patent_app_type] => utility
[patent_app_number] => 12/803714
[patent_app_country] => US
[patent_app_date] => 2010-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 6099
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0275/20100275266.pdf
[firstpage_image] =>[orig_patent_app_number] => 12803714
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/803714 | Automatically enhancing computing privacy by affecting the screen of a computing device | Jul 2, 2010 | Abandoned |
Array
(
[id] => 7671534
[patent_doc_number] => 20110320803
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-29
[patent_title] => 'Light-weight security solution for host-based mobility & multihoming protocols'
[patent_app_type] => utility
[patent_app_number] => 12/803504
[patent_app_country] => US
[patent_app_date] => 2010-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4839
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12803504
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/803504 | Light-weight security solution for host-based mobility and multihoming protocols | Jun 28, 2010 | Issued |
Array
(
[id] => 7653135
[patent_doc_number] => 20110302404
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-08
[patent_title] => 'System for secure variable data rate transmission'
[patent_app_type] => utility
[patent_app_number] => 12/802306
[patent_app_country] => US
[patent_app_date] => 2010-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7704
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0302/20110302404.pdf
[firstpage_image] =>[orig_patent_app_number] => 12802306
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/802306 | System for secure variable data rate transmission | Jun 3, 2010 | Issued |
Array
(
[id] => 8157656
[patent_doc_number] => 20120099725
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-26
[patent_title] => 'METHOD OF GENERATING ID WITH GUARANTEED VALIDITY, AND VALIDITY LEGITIMACY GUARANTYING RFID TAG'
[patent_app_type] => utility
[patent_app_number] => 13/203967
[patent_app_country] => US
[patent_app_date] => 2010-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4467
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0099/20120099725.pdf
[firstpage_image] =>[orig_patent_app_number] => 13203967
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/203967 | METHOD OF GENERATING ID WITH GUARANTEED VALIDITY, AND VALIDITY LEGITIMACY GUARANTYING RFID TAG | May 9, 2010 | Abandoned |
Array
(
[id] => 7562869
[patent_doc_number] => 20110276703
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-10
[patent_title] => 'System and Method for Establishing a Peer-to-Peer Communication Session'
[patent_app_type] => utility
[patent_app_number] => 12/775256
[patent_app_country] => US
[patent_app_date] => 2010-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10574
[patent_no_of_claims] => 61
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0276/20110276703.pdf
[firstpage_image] =>[orig_patent_app_number] => 12775256
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/775256 | System and Method for Establishing a Peer-to-Peer Communication Session | May 5, 2010 | Abandoned |
Array
(
[id] => 8632857
[patent_doc_number] => 08364956
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-29
[patent_title] => 'Security management server and image data managing method thereof'
[patent_app_type] => utility
[patent_app_number] => 12/775029
[patent_app_country] => US
[patent_app_date] => 2010-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4751
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 267
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775029
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/775029 | Security management server and image data managing method thereof | May 5, 2010 | Issued |
Array
(
[id] => 8716362
[patent_doc_number] => 08402515
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-19
[patent_title] => 'Apparatus and method for establishing a peer-to-peer communication session with a client device'
[patent_app_type] => utility
[patent_app_number] => 12/775291
[patent_app_country] => US
[patent_app_date] => 2010-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10130
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775291
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/775291 | Apparatus and method for establishing a peer-to-peer communication session with a client device | May 5, 2010 | Issued |
Array
(
[id] => 9063195
[patent_doc_number] => 08549650
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-01
[patent_title] => 'System and method for three-dimensional visualization of vulnerability and asset data'
[patent_app_type] => utility
[patent_app_number] => 12/775120
[patent_app_country] => US
[patent_app_date] => 2010-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13614
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775120
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/775120 | System and method for three-dimensional visualization of vulnerability and asset data | May 5, 2010 | Issued |
Array
(
[id] => 9630292
[patent_doc_number] => 08799986
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-05
[patent_title] => 'System and method for controlling policy distribution with partial evaluation'
[patent_app_type] => utility
[patent_app_number] => 12/775039
[patent_app_country] => US
[patent_app_date] => 2010-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 3884
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775039
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/775039 | System and method for controlling policy distribution with partial evaluation | May 5, 2010 | Issued |
Array
(
[id] => 8716363
[patent_doc_number] => 08402516
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-19
[patent_title] => 'Apparatus and method for establishing a peer-to-peer communication session with a host device'
[patent_app_type] => utility
[patent_app_number] => 12/775305
[patent_app_country] => US
[patent_app_date] => 2010-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10082
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775305
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/775305 | Apparatus and method for establishing a peer-to-peer communication session with a host device | May 5, 2010 | Issued |
Array
(
[id] => 8810558
[patent_doc_number] => 08448225
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-21
[patent_title] => 'Login process apparatus, login process method, and program'
[patent_app_type] => utility
[patent_app_number] => 12/726451
[patent_app_country] => US
[patent_app_date] => 2010-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 9745
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 442
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12726451
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/726451 | Login process apparatus, login process method, and program | Mar 17, 2010 | Issued |
Array
(
[id] => 8716116
[patent_doc_number] => 08402267
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-03-19
[patent_title] => 'Security enhanced network device and method for secure operation of same'
[patent_app_type] => utility
[patent_app_number] => 12/726105
[patent_app_country] => US
[patent_app_date] => 2010-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5559
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 349
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12726105
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/726105 | Security enhanced network device and method for secure operation of same | Mar 16, 2010 | Issued |
Array
(
[id] => 6100799
[patent_doc_number] => 20110004936
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-06
[patent_title] => 'BOTNET EARLY DETECTION USING HYBRID HIDDEN MARKOV MODEL ALGORITHM'
[patent_app_type] => utility
[patent_app_number] => 12/726272
[patent_app_country] => US
[patent_app_date] => 2010-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2386
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0004/20110004936.pdf
[firstpage_image] =>[orig_patent_app_number] => 12726272
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/726272 | Botnet early detection using hybrid hidden markov model algorithm | Mar 16, 2010 | Issued |
Array
(
[id] => 8144027
[patent_doc_number] => 20120096562
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-19
[patent_title] => 'METHOD FOR PROTECTING THE SOURCE CODE OF A COMPUTER PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/202849
[patent_app_country] => US
[patent_app_date] => 2010-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1122
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0096/20120096562.pdf
[firstpage_image] =>[orig_patent_app_number] => 13202849
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/202849 | Method for protecting the source code of a computer program | Feb 22, 2010 | Issued |