Search

Mark Hellner

Examiner (ID: 6753, Phone: (571)272-6981 , Office: P/3645 )

Most Active Art Unit
3645
Art Unit(s)
3642, 3662, 3645, 3663, 2202
Total Applications
4179
Issued Applications
3707
Pending Applications
224
Abandoned Applications
288

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11338811 [patent_doc_number] => 20160364566 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-15 [patent_title] => 'TECHNOLOGIES FOR MULTI-FACTOR SECURITY ANALYSIS AND RUNTIME CONTROL' [patent_app_type] => utility [patent_app_number] => 15/166952 [patent_app_country] => US [patent_app_date] => 2016-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 13702 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15166952 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/166952
Technologies for multi-factor security analysis and runtime control May 26, 2016 Issued
Array ( [id] => 11044641 [patent_doc_number] => 20160241598 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-18 [patent_title] => 'Method to Modify Android Application Life Cycle to Control Its Execution in a Containerized Workspace Environment' [patent_app_type] => utility [patent_app_number] => 15/140404 [patent_app_country] => US [patent_app_date] => 2016-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7560 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15140404 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/140404
Method to modify android application life cycle to control its execution in a containerized workspace environment Apr 26, 2016 Issued
Array ( [id] => 11117487 [patent_doc_number] => 20160314461 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-27 [patent_title] => 'SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES' [patent_app_type] => utility [patent_app_number] => 15/139034 [patent_app_country] => US [patent_app_date] => 2016-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 20809 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15139034 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/139034
Creating fingerprints of encryption devices for compromise mitigation Apr 25, 2016 Issued
Array ( [id] => 16996848 [patent_doc_number] => 20210235269 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-07-29 [patent_title] => NETWORK AUTHORIZATION ASSISTANCE [patent_app_type] => utility [patent_app_number] => 16/094975 [patent_app_country] => US [patent_app_date] => 2016-04-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8840 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -23 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16094975 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/094975
NETWORK AUTHORIZATION ASSISTANCE Apr 18, 2016 Abandoned
Array ( [id] => 11998493 [patent_doc_number] => 20170302648 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-10-19 [patent_title] => 'Web Service Picture Passwords' [patent_app_type] => utility [patent_app_number] => 15/099380 [patent_app_country] => US [patent_app_date] => 2016-04-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 12667 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099380 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/099380
Generating web service picture passwords with user-specific cypher keys Apr 13, 2016 Issued
Array ( [id] => 11998306 [patent_doc_number] => 20170302461 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-10-19 [patent_title] => 'METHODS AND SYSTEMS TO WIRELESSLY CONNECT TO A VEHICLE' [patent_app_type] => utility [patent_app_number] => 15/099288 [patent_app_country] => US [patent_app_date] => 2016-04-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6200 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099288 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/099288
Connecting a portable computing device to a vehicle by comparing a captured image of a vehicle indicator with stored images of known vehicle indicators Apr 13, 2016 Issued
Array ( [id] => 11996532 [patent_doc_number] => 20170300688 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-10-19 [patent_title] => 'System and Method for Detecting and Preventing Execution of Malicious Instructions within a Processor of a Computing Device' [patent_app_type] => utility [patent_app_number] => 15/099494 [patent_app_country] => US [patent_app_date] => 2016-04-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 3052 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099494 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/099494
Preventing execution of malicious instructions based on address specified in a branch instruction Apr 13, 2016 Issued
Array ( [id] => 12617853 [patent_doc_number] => 20180097781 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-04-05 [patent_title] => DEVICE FOR MANAGING MULTIPLE ACCESSES TO A SECURE MODULE OF A SYSTEM ON CHIP OF AN APPARATUS [patent_app_type] => utility [patent_app_number] => 15/567346 [patent_app_country] => US [patent_app_date] => 2016-04-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4117 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15567346 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/567346
Device for managing multiple accesses to a secure module of a system on chip of an apparatus Apr 12, 2016 Issued
Array ( [id] => 11991445 [patent_doc_number] => 20170295600 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-10-12 [patent_title] => 'Tethering Policy for Network Connectivity via a Tethered Connection' [patent_app_type] => utility [patent_app_number] => 15/096040 [patent_app_country] => US [patent_app_date] => 2016-04-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9421 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15096040 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/096040
Tethering Policy for Network Connectivity via a Tethered Connection Apr 10, 2016 Abandoned
Array ( [id] => 11982500 [patent_doc_number] => 20170286654 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-10-05 [patent_title] => 'SYSTEM AND METHOD FOR SMART WEAPON IMPLEMENTATION AND DEPLOYMENT' [patent_app_type] => utility [patent_app_number] => 15/083419 [patent_app_country] => US [patent_app_date] => 2016-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 8260 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15083419 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/083419
SYSTEM AND METHOD FOR SMART WEAPON IMPLEMENTATION AND DEPLOYMENT Mar 28, 2016 Abandoned
Array ( [id] => 14528191 [patent_doc_number] => 10341369 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-02 [patent_title] => Security system monitoring techniques by mapping received security score with newly identified security score [patent_app_type] => utility [patent_app_number] => 15/083691 [patent_app_country] => US [patent_app_date] => 2016-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4689 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15083691 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/083691
Security system monitoring techniques by mapping received security score with newly identified security score Mar 28, 2016 Issued
Array ( [id] => 14619313 [patent_doc_number] => 10362373 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-23 [patent_title] => Network telemetry with byte distribution and cryptographic protocol data elements [patent_app_type] => utility [patent_app_number] => 15/083586 [patent_app_country] => US [patent_app_date] => 2016-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 8 [patent_no_of_words] => 7657 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 174 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15083586 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/083586
Network telemetry with byte distribution and cryptographic protocol data elements Mar 28, 2016 Issued
Array ( [id] => 15248751 [patent_doc_number] => 10509901 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-12-17 [patent_title] => Method of managing a secure element [patent_app_type] => utility [patent_app_number] => 15/567770 [patent_app_country] => US [patent_app_date] => 2016-03-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 3047 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15567770 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/567770
Method of managing a secure element Mar 22, 2016 Issued
Array ( [id] => 12155535 [patent_doc_number] => 20180026801 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-01-25 [patent_title] => 'Waveguide With Dielectric Light Reflectors' [patent_app_type] => utility [patent_app_number] => 15/548023 [patent_app_country] => US [patent_app_date] => 2016-02-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3658 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15548023 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/548023
Waveguide With Dielectric Light Reflectors Feb 28, 2016 Abandoned
Array ( [id] => 12141931 [patent_doc_number] => 20180020014 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-01-18 [patent_title] => 'MALICIOUS COMMUNICATION PATTERN EXTRACTION DEVICE, MALICIOUS COMMUNICATION PATTERN EXTRACTION SYSTEM, MALICIOUS COMMUNICATION PATTERN EXTRACTION METHOD, AND MALICIOUS COMMUNICATION PATTERN EXTRACTION PROGRAM' [patent_app_type] => utility [patent_app_number] => 15/548263 [patent_app_country] => US [patent_app_date] => 2016-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 7001 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15548263 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/548263
Device, system and method for extraction of malicious communication pattern to detect traffic caused by malware using traffic logs Feb 2, 2016 Issued
Array ( [id] => 16046537 [patent_doc_number] => 10685142 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-06-16 [patent_title] => External resource control of mobile devices [patent_app_type] => utility [patent_app_number] => 15/547402 [patent_app_country] => US [patent_app_date] => 2016-02-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 15844 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15547402 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/547402
External resource control of mobile devices Feb 1, 2016 Issued
Array ( [id] => 11863136 [patent_doc_number] => 09742845 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-08-22 [patent_title] => 'Multi-service cloud storage decision optimization process' [patent_app_type] => utility [patent_app_number] => 14/989944 [patent_app_country] => US [patent_app_date] => 2016-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9148 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 322 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14989944 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/989944
Multi-service cloud storage decision optimization process Jan 6, 2016 Issued
Array ( [id] => 13086997 [patent_doc_number] => 10063576 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-08-28 [patent_title] => Detecting network anomalies by probabilistic modeling of argument strings with markov chains [patent_app_type] => utility [patent_app_number] => 14/982888 [patent_app_country] => US [patent_app_date] => 2015-12-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9071 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14982888 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/982888
Detecting network anomalies by probabilistic modeling of argument strings with markov chains Dec 28, 2015 Issued
Array ( [id] => 10752401 [patent_doc_number] => 20160098552 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-07 [patent_title] => 'WEARABLE USER DEVICE AUTHENTICATION SYSTEM' [patent_app_type] => utility [patent_app_number] => 14/970162 [patent_app_country] => US [patent_app_date] => 2015-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 9618 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14970162 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/970162
WEARABLE USER DEVICE AUTHENTICATION SYSTEM Dec 14, 2015 Abandoned
Array ( [id] => 10739838 [patent_doc_number] => 20160085989 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'Device, System, and Method of Enhancing User Privacy and Security Within a Location-Based Virtual Social Networking Context' [patent_app_type] => utility [patent_app_number] => 14/957014 [patent_app_country] => US [patent_app_date] => 2015-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 52 [patent_figures_cnt] => 52 [patent_no_of_words] => 16753 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14957014 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/957014
Causing a disappearance of a user profile in a location-based virtual social network Dec 1, 2015 Issued
Menu