Search

Leslie August Nicholson Iii

Examiner (ID: 9563, Phone: (571)272-5487 , Office: P/3651 )

Most Active Art Unit
3651
Art Unit(s)
3653, 3659, 3651
Total Applications
2037
Issued Applications
1756
Pending Applications
92
Abandoned Applications
222

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6078975 [patent_doc_number] => 20110142234 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-16 [patent_title] => 'Multi-Factor Authentication Using a Mobile Phone' [patent_app_type] => utility [patent_app_number] => 12/896914 [patent_app_country] => US [patent_app_date] => 2010-10-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9788 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0142/20110142234.pdf [firstpage_image] =>[orig_patent_app_number] => 12896914 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/896914
Multi-Factor Authentication Using a Mobile Phone Oct 3, 2010 Abandoned
Array ( [id] => 8059681 [patent_doc_number] => 20120079571 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-03-29 [patent_title] => 'AUTOMATED ENCRYPTION AND PASSWORD PROTECTION FOR DOWNLOADING DOCUMENTS' [patent_app_type] => utility [patent_app_number] => 12/893081 [patent_app_country] => US [patent_app_date] => 2010-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4799 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0079/20120079571.pdf [firstpage_image] =>[orig_patent_app_number] => 12893081 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/893081
Automated encryption and password protection for downloaded documents Sep 28, 2010 Issued
Array ( [id] => 9077791 [patent_doc_number] => 08555383 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-10-08 [patent_title] => 'Network data transmission auditing' [patent_app_type] => utility [patent_app_number] => 12/892665 [patent_app_country] => US [patent_app_date] => 2010-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 15 [patent_no_of_words] => 15847 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12892665 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/892665
Network data transmission auditing Sep 27, 2010 Issued
Array ( [id] => 6126290 [patent_doc_number] => 20110078769 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-31 [patent_title] => 'ELECTRONIC FILE BROWSING SYSTEM AND CONTROL METHOD THEREOF' [patent_app_type] => utility [patent_app_number] => 12/892704 [patent_app_country] => US [patent_app_date] => 2010-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8570 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0078/20110078769.pdf [firstpage_image] =>[orig_patent_app_number] => 12892704 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/892704
Electronic file browsing system and control method thereof Sep 27, 2010 Issued
Array ( [id] => 7736165 [patent_doc_number] => 20120017275 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-01-19 [patent_title] => 'Identifying polymorphic malware' [patent_app_type] => utility [patent_app_number] => 12/804123 [patent_app_country] => US [patent_app_date] => 2010-07-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4522 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0017/20120017275.pdf [firstpage_image] =>[orig_patent_app_number] => 12804123 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/804123
Identifying polymorphic malware Jul 12, 2010 Issued
Array ( [id] => 6204071 [patent_doc_number] => 20110066857 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-17 [patent_title] => 'Method for secure delivery of digital content' [patent_app_type] => utility [patent_app_number] => 12/803842 [patent_app_country] => US [patent_app_date] => 2010-07-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4644 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0066/20110066857.pdf [firstpage_image] =>[orig_patent_app_number] => 12803842 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/803842
Method for secure delivery of digital content Jul 5, 2010 Abandoned
Array ( [id] => 6597510 [patent_doc_number] => 20100275266 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-10-28 [patent_title] => 'Automatically enhancing computing privacy by affecting the screen of a computing device' [patent_app_type] => utility [patent_app_number] => 12/803714 [patent_app_country] => US [patent_app_date] => 2010-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 6099 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0275/20100275266.pdf [firstpage_image] =>[orig_patent_app_number] => 12803714 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/803714
Automatically enhancing computing privacy by affecting the screen of a computing device Jul 2, 2010 Abandoned
Array ( [id] => 7671534 [patent_doc_number] => 20110320803 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-29 [patent_title] => 'Light-weight security solution for host-based mobility & multihoming protocols' [patent_app_type] => utility [patent_app_number] => 12/803504 [patent_app_country] => US [patent_app_date] => 2010-06-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 4839 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12803504 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/803504
Light-weight security solution for host-based mobility and multihoming protocols Jun 28, 2010 Issued
Array ( [id] => 7653135 [patent_doc_number] => 20110302404 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-08 [patent_title] => 'System for secure variable data rate transmission' [patent_app_type] => utility [patent_app_number] => 12/802306 [patent_app_country] => US [patent_app_date] => 2010-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7704 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0302/20110302404.pdf [firstpage_image] =>[orig_patent_app_number] => 12802306 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/802306
System for secure variable data rate transmission Jun 3, 2010 Issued
Array ( [id] => 8157656 [patent_doc_number] => 20120099725 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-26 [patent_title] => 'METHOD OF GENERATING ID WITH GUARANTEED VALIDITY, AND VALIDITY LEGITIMACY GUARANTYING RFID TAG' [patent_app_type] => utility [patent_app_number] => 13/203967 [patent_app_country] => US [patent_app_date] => 2010-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4467 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0099/20120099725.pdf [firstpage_image] =>[orig_patent_app_number] => 13203967 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/203967
METHOD OF GENERATING ID WITH GUARANTEED VALIDITY, AND VALIDITY LEGITIMACY GUARANTYING RFID TAG May 9, 2010 Abandoned
Array ( [id] => 7562869 [patent_doc_number] => 20110276703 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-11-10 [patent_title] => 'System and Method for Establishing a Peer-to-Peer Communication Session' [patent_app_type] => utility [patent_app_number] => 12/775256 [patent_app_country] => US [patent_app_date] => 2010-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 10574 [patent_no_of_claims] => 61 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0276/20110276703.pdf [firstpage_image] =>[orig_patent_app_number] => 12775256 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/775256
System and Method for Establishing a Peer-to-Peer Communication Session May 5, 2010 Abandoned
Array ( [id] => 8632857 [patent_doc_number] => 08364956 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-01-29 [patent_title] => 'Security management server and image data managing method thereof' [patent_app_type] => utility [patent_app_number] => 12/775029 [patent_app_country] => US [patent_app_date] => 2010-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4751 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 267 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775029 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/775029
Security management server and image data managing method thereof May 5, 2010 Issued
Array ( [id] => 8716362 [patent_doc_number] => 08402515 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-03-19 [patent_title] => 'Apparatus and method for establishing a peer-to-peer communication session with a client device' [patent_app_type] => utility [patent_app_number] => 12/775291 [patent_app_country] => US [patent_app_date] => 2010-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10130 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 197 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775291 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/775291
Apparatus and method for establishing a peer-to-peer communication session with a client device May 5, 2010 Issued
Array ( [id] => 9063195 [patent_doc_number] => 08549650 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-01 [patent_title] => 'System and method for three-dimensional visualization of vulnerability and asset data' [patent_app_type] => utility [patent_app_number] => 12/775120 [patent_app_country] => US [patent_app_date] => 2010-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 13614 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 225 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775120 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/775120
System and method for three-dimensional visualization of vulnerability and asset data May 5, 2010 Issued
Array ( [id] => 9630292 [patent_doc_number] => 08799986 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-08-05 [patent_title] => 'System and method for controlling policy distribution with partial evaluation' [patent_app_type] => utility [patent_app_number] => 12/775039 [patent_app_country] => US [patent_app_date] => 2010-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 3884 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 216 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775039 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/775039
System and method for controlling policy distribution with partial evaluation May 5, 2010 Issued
Array ( [id] => 8716363 [patent_doc_number] => 08402516 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-03-19 [patent_title] => 'Apparatus and method for establishing a peer-to-peer communication session with a host device' [patent_app_type] => utility [patent_app_number] => 12/775305 [patent_app_country] => US [patent_app_date] => 2010-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10082 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775305 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/775305
Apparatus and method for establishing a peer-to-peer communication session with a host device May 5, 2010 Issued
Array ( [id] => 8810558 [patent_doc_number] => 08448225 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-05-21 [patent_title] => 'Login process apparatus, login process method, and program' [patent_app_type] => utility [patent_app_number] => 12/726451 [patent_app_country] => US [patent_app_date] => 2010-03-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 13 [patent_no_of_words] => 9745 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 442 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12726451 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/726451
Login process apparatus, login process method, and program Mar 17, 2010 Issued
Array ( [id] => 8716116 [patent_doc_number] => 08402267 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-03-19 [patent_title] => 'Security enhanced network device and method for secure operation of same' [patent_app_type] => utility [patent_app_number] => 12/726105 [patent_app_country] => US [patent_app_date] => 2010-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5559 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 349 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12726105 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/726105
Security enhanced network device and method for secure operation of same Mar 16, 2010 Issued
Array ( [id] => 6100799 [patent_doc_number] => 20110004936 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-06 [patent_title] => 'BOTNET EARLY DETECTION USING HYBRID HIDDEN MARKOV MODEL ALGORITHM' [patent_app_type] => utility [patent_app_number] => 12/726272 [patent_app_country] => US [patent_app_date] => 2010-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2386 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0004/20110004936.pdf [firstpage_image] =>[orig_patent_app_number] => 12726272 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/726272
Botnet early detection using hybrid hidden markov model algorithm Mar 16, 2010 Issued
Array ( [id] => 8144027 [patent_doc_number] => 20120096562 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-19 [patent_title] => 'METHOD FOR PROTECTING THE SOURCE CODE OF A COMPUTER PROGRAM' [patent_app_type] => utility [patent_app_number] => 13/202849 [patent_app_country] => US [patent_app_date] => 2010-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1122 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0096/20120096562.pdf [firstpage_image] =>[orig_patent_app_number] => 13202849 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/202849
Method for protecting the source code of a computer program Feb 22, 2010 Issued
Menu