
Linglan E. Edwards
Examiner (ID: 15301)
| Most Active Art Unit | 2491 |
| Art Unit(s) | 2408, 2449, 2491, 2419 |
| Total Applications | 521 |
| Issued Applications | 378 |
| Pending Applications | 4 |
| Abandoned Applications | 147 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12244268
[patent_doc_number] => 20180077131
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-15
[patent_title] => 'AUTOMATIC ON DEMAND RE-AUTHENTICATION OF SOFTWARE AGENTS'
[patent_app_type] => utility
[patent_app_number] => 15/265306
[patent_app_country] => US
[patent_app_date] => 2016-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7498
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15265306
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/265306 | Automatic on demand re-authentication of software agents | Sep 13, 2016 | Issued |
Array
(
[id] => 13998859
[patent_doc_number] => 20190068587
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => Carrier ePDG Gateway Access System and Method for Implementing Mobile Communications
[patent_app_type] => utility
[patent_app_number] => 16/083074
[patent_app_country] => US
[patent_app_date] => 2016-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3944
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16083074
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/083074 | Carrier ePDG Gateway Access System and Method for Implementing Mobile Communications | Sep 4, 2016 | Abandoned |
Array
(
[id] => 12148603
[patent_doc_number] => 09882875
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-30
[patent_title] => 'Regional firewall clustering in a networked computing environment'
[patent_app_type] => utility
[patent_app_number] => 15/255494
[patent_app_country] => US
[patent_app_date] => 2016-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6580
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15255494
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/255494 | Regional firewall clustering in a networked computing environment | Sep 1, 2016 | Issued |
Array
(
[id] => 11474343
[patent_doc_number] => 20170061126
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'Process Launch, Monitoring and Execution Control'
[patent_app_type] => utility
[patent_app_number] => 15/255806
[patent_app_country] => US
[patent_app_date] => 2016-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6973
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15255806
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/255806 | Process Launch, Monitoring and Execution Control | Sep 1, 2016 | Abandoned |
Array
(
[id] => 12222243
[patent_doc_number] => 20180060604
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'PERFORMING SECURE QUERIES FROM A HIGHER SECURITY DOMAIN OF INFORMATION IN A LOWER SECURITY DOMAIN'
[patent_app_type] => utility
[patent_app_number] => 15/254811
[patent_app_country] => US
[patent_app_date] => 2016-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7297
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15254811
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/254811 | Performing secure queries from a higher security domain of information in a lower security domain | Aug 31, 2016 | Issued |
Array
(
[id] => 11329309
[patent_doc_number] => 20160359922
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'Security policy editor'
[patent_app_type] => utility
[patent_app_number] => 15/242814
[patent_app_country] => US
[patent_app_date] => 2016-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7542
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15242814
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/242814 | Security policy editor | Aug 21, 2016 | Issued |
Array
(
[id] => 12161469
[patent_doc_number] => 20180032735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'SYSTEM AND METHOD FOR ENHANCING STATIC ANALYSIS OF SOFTWARE APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 15/224785
[patent_app_country] => US
[patent_app_date] => 2016-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5291
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15224785
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/224785 | Identifying components for static analysis of software applications | Jul 31, 2016 | Issued |
Array
(
[id] => 11367816
[patent_doc_number] => 20170005797
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'RESILIENT SECRET SHARING CLOUD BASED ARCHITECTURE FOR DATA VAULT'
[patent_app_type] => utility
[patent_app_number] => 15/216176
[patent_app_country] => US
[patent_app_date] => 2016-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9773
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15216176
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/216176 | RESILIENT SECRET SHARING CLOUD BASED ARCHITECTURE FOR DATA VAULT | Jul 20, 2016 | Abandoned |
Array
(
[id] => 11416923
[patent_doc_number] => 09563753
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-02-07
[patent_title] => 'Method for booting and dumping a confidential image on a trusted computer system'
[patent_app_type] => utility
[patent_app_number] => 15/205485
[patent_app_country] => US
[patent_app_date] => 2016-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4131
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 379
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15205485
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/205485 | Method for booting and dumping a confidential image on a trusted computer system | Jul 7, 2016 | Issued |
Array
(
[id] => 12121357
[patent_doc_number] => 20180004943
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'Systems and Methods of Asynchronous Analysis of Event Notifications for Computer Security Applications'
[patent_app_type] => utility
[patent_app_number] => 15/201035
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12637
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201035
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201035 | Systems and methods of asynchronous analysis of event notifications for computer security applications | Jun 30, 2016 | Issued |
Array
(
[id] => 13725777
[patent_doc_number] => 20170373844
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-28
[patent_title] => SECURE CIRCUIT FOR ENCRYPTION KEY GENERATION
[patent_app_type] => utility
[patent_app_number] => 15/173647
[patent_app_country] => US
[patent_app_date] => 2016-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10130
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15173647
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/173647 | Secure circuit for encryption key generation | Jun 3, 2016 | Issued |
Array
(
[id] => 14051761
[patent_doc_number] => 20190081988
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-14
[patent_title] => SECURITY MANAGEMENT APPARATUS, CENTRAL SECURITY MANAGEMENT APPARATUS, SECURITY MANAGEMENT METHOD, AND COMPUTER READABLE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/081325
[patent_app_country] => US
[patent_app_date] => 2016-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21173
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16081325
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/081325 | SECURITY MANAGEMENT APPARATUS, CENTRAL SECURITY MANAGEMENT APPARATUS, SECURITY MANAGEMENT METHOD, AND COMPUTER READABLE MEDIUM | May 31, 2016 | Abandoned |
Array
(
[id] => 16217424
[patent_doc_number] => 10733238
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => Script manager for distributed systems
[patent_app_type] => utility
[patent_app_number] => 15/148869
[patent_app_country] => US
[patent_app_date] => 2016-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8713
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15148869
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/148869 | Script manager for distributed systems | May 5, 2016 | Issued |
Array
(
[id] => 11245743
[patent_doc_number] => 09471786
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-18
[patent_title] => 'Method for booting and dumping a confidential image on a trusted computer system'
[patent_app_type] => utility
[patent_app_number] => 15/071312
[patent_app_country] => US
[patent_app_date] => 2016-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4073
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 331
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15071312
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/071312 | Method for booting and dumping a confidential image on a trusted computer system | Mar 15, 2016 | Issued |
Array
(
[id] => 10816548
[patent_doc_number] => 20160162710
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'INFORMATION HANDLING OF ACCESS SECURITY'
[patent_app_type] => utility
[patent_app_number] => 15/040559
[patent_app_country] => US
[patent_app_date] => 2016-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6412
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15040559
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/040559 | INFORMATION HANDLING OF ACCESS SECURITY | Feb 9, 2016 | Abandoned |
Array
(
[id] => 11912263
[patent_doc_number] => 09781095
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-03
[patent_title] => 'Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system'
[patent_app_type] => utility
[patent_app_number] => 14/974170
[patent_app_country] => US
[patent_app_date] => 2015-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6868
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14974170
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/974170 | Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system | Dec 17, 2015 | Issued |
Array
(
[id] => 10759366
[patent_doc_number] => 20160105519
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-14
[patent_title] => 'Identifying Highly Valued Recommendations Of Users In A Media Recommendation Network'
[patent_app_type] => utility
[patent_app_number] => 14/974921
[patent_app_country] => US
[patent_app_date] => 2015-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7499
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14974921
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/974921 | Identifying Highly Valued Recommendations Of Users In A Media Recommendation Network | Dec 17, 2015 | Abandoned |
Array
(
[id] => 10796256
[patent_doc_number] => 20160142413
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'EPHEMERAL APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/939627
[patent_app_country] => US
[patent_app_date] => 2015-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13140
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14939627
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/939627 | Ephemeral applications | Nov 11, 2015 | Issued |
Array
(
[id] => 13269701
[patent_doc_number] => 10146936
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-04
[patent_title] => Intrusion detection for storage resources provisioned to containers in multi-tenant environments
[patent_app_type] => utility
[patent_app_number] => 14/939562
[patent_app_country] => US
[patent_app_date] => 2015-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8048
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14939562
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/939562 | Intrusion detection for storage resources provisioned to containers in multi-tenant environments | Nov 11, 2015 | Issued |
Array
(
[id] => 10796266
[patent_doc_number] => 20160142422
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'SYSTEM FOR CROSS-HOST, MULTI-THREAD SESSION ALIGNMENT'
[patent_app_type] => utility
[patent_app_number] => 14/939467
[patent_app_country] => US
[patent_app_date] => 2015-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 33
[patent_no_of_words] => 34309
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14939467
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/939467 | System for cross-host, multi-thread session alignment | Nov 11, 2015 | Issued |