
Mark Hellner
Examiner (ID: 6753, Phone: (571)272-6981 , Office: P/3645 )
| Most Active Art Unit | 3645 |
| Art Unit(s) | 3642, 3662, 3645, 3663, 2202 |
| Total Applications | 4179 |
| Issued Applications | 3707 |
| Pending Applications | 224 |
| Abandoned Applications | 288 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11338811
[patent_doc_number] => 20160364566
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'TECHNOLOGIES FOR MULTI-FACTOR SECURITY ANALYSIS AND RUNTIME CONTROL'
[patent_app_type] => utility
[patent_app_number] => 15/166952
[patent_app_country] => US
[patent_app_date] => 2016-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13702
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15166952
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/166952 | Technologies for multi-factor security analysis and runtime control | May 26, 2016 | Issued |
Array
(
[id] => 11044641
[patent_doc_number] => 20160241598
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-18
[patent_title] => 'Method to Modify Android Application Life Cycle to Control Its Execution in a Containerized Workspace Environment'
[patent_app_type] => utility
[patent_app_number] => 15/140404
[patent_app_country] => US
[patent_app_date] => 2016-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7560
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15140404
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/140404 | Method to modify android application life cycle to control its execution in a containerized workspace environment | Apr 26, 2016 | Issued |
Array
(
[id] => 11117487
[patent_doc_number] => 20160314461
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-27
[patent_title] => 'SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES'
[patent_app_type] => utility
[patent_app_number] => 15/139034
[patent_app_country] => US
[patent_app_date] => 2016-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 20809
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15139034
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/139034 | Creating fingerprints of encryption devices for compromise mitigation | Apr 25, 2016 | Issued |
Array
(
[id] => 16996848
[patent_doc_number] => 20210235269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-29
[patent_title] => NETWORK AUTHORIZATION ASSISTANCE
[patent_app_type] => utility
[patent_app_number] => 16/094975
[patent_app_country] => US
[patent_app_date] => 2016-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8840
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16094975
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/094975 | NETWORK AUTHORIZATION ASSISTANCE | Apr 18, 2016 | Abandoned |
Array
(
[id] => 11998493
[patent_doc_number] => 20170302648
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'Web Service Picture Passwords'
[patent_app_type] => utility
[patent_app_number] => 15/099380
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12667
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099380
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/099380 | Generating web service picture passwords with user-specific cypher keys | Apr 13, 2016 | Issued |
Array
(
[id] => 11998306
[patent_doc_number] => 20170302461
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'METHODS AND SYSTEMS TO WIRELESSLY CONNECT TO A VEHICLE'
[patent_app_type] => utility
[patent_app_number] => 15/099288
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6200
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099288
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/099288 | Connecting a portable computing device to a vehicle by comparing a captured image of a vehicle indicator with stored images of known vehicle indicators | Apr 13, 2016 | Issued |
Array
(
[id] => 11996532
[patent_doc_number] => 20170300688
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'System and Method for Detecting and Preventing Execution of Malicious Instructions within a Processor of a Computing Device'
[patent_app_type] => utility
[patent_app_number] => 15/099494
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 3052
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099494
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/099494 | Preventing execution of malicious instructions based on address specified in a branch instruction | Apr 13, 2016 | Issued |
Array
(
[id] => 12617853
[patent_doc_number] => 20180097781
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-05
[patent_title] => DEVICE FOR MANAGING MULTIPLE ACCESSES TO A SECURE MODULE OF A SYSTEM ON CHIP OF AN APPARATUS
[patent_app_type] => utility
[patent_app_number] => 15/567346
[patent_app_country] => US
[patent_app_date] => 2016-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4117
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15567346
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/567346 | Device for managing multiple accesses to a secure module of a system on chip of an apparatus | Apr 12, 2016 | Issued |
Array
(
[id] => 11991445
[patent_doc_number] => 20170295600
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-12
[patent_title] => 'Tethering Policy for Network Connectivity via a Tethered Connection'
[patent_app_type] => utility
[patent_app_number] => 15/096040
[patent_app_country] => US
[patent_app_date] => 2016-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9421
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15096040
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/096040 | Tethering Policy for Network Connectivity via a Tethered Connection | Apr 10, 2016 | Abandoned |
Array
(
[id] => 11982500
[patent_doc_number] => 20170286654
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-05
[patent_title] => 'SYSTEM AND METHOD FOR SMART WEAPON IMPLEMENTATION AND DEPLOYMENT'
[patent_app_type] => utility
[patent_app_number] => 15/083419
[patent_app_country] => US
[patent_app_date] => 2016-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8260
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15083419
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/083419 | SYSTEM AND METHOD FOR SMART WEAPON IMPLEMENTATION AND DEPLOYMENT | Mar 28, 2016 | Abandoned |
Array
(
[id] => 14528191
[patent_doc_number] => 10341369
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Security system monitoring techniques by mapping received security score with newly identified security score
[patent_app_type] => utility
[patent_app_number] => 15/083691
[patent_app_country] => US
[patent_app_date] => 2016-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4689
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15083691
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/083691 | Security system monitoring techniques by mapping received security score with newly identified security score | Mar 28, 2016 | Issued |
Array
(
[id] => 14619313
[patent_doc_number] => 10362373
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-23
[patent_title] => Network telemetry with byte distribution and cryptographic protocol data elements
[patent_app_type] => utility
[patent_app_number] => 15/083586
[patent_app_country] => US
[patent_app_date] => 2016-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 7657
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15083586
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/083586 | Network telemetry with byte distribution and cryptographic protocol data elements | Mar 28, 2016 | Issued |
Array
(
[id] => 15248751
[patent_doc_number] => 10509901
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-17
[patent_title] => Method of managing a secure element
[patent_app_type] => utility
[patent_app_number] => 15/567770
[patent_app_country] => US
[patent_app_date] => 2016-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 3047
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15567770
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/567770 | Method of managing a secure element | Mar 22, 2016 | Issued |
Array
(
[id] => 12155535
[patent_doc_number] => 20180026801
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-25
[patent_title] => 'Waveguide With Dielectric Light Reflectors'
[patent_app_type] => utility
[patent_app_number] => 15/548023
[patent_app_country] => US
[patent_app_date] => 2016-02-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3658
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15548023
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/548023 | Waveguide With Dielectric Light Reflectors | Feb 28, 2016 | Abandoned |
Array
(
[id] => 12141931
[patent_doc_number] => 20180020014
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-18
[patent_title] => 'MALICIOUS COMMUNICATION PATTERN EXTRACTION DEVICE, MALICIOUS COMMUNICATION PATTERN EXTRACTION SYSTEM, MALICIOUS COMMUNICATION PATTERN EXTRACTION METHOD, AND MALICIOUS COMMUNICATION PATTERN EXTRACTION PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 15/548263
[patent_app_country] => US
[patent_app_date] => 2016-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 7001
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15548263
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/548263 | Device, system and method for extraction of malicious communication pattern to detect traffic caused by malware using traffic logs | Feb 2, 2016 | Issued |
Array
(
[id] => 16046537
[patent_doc_number] => 10685142
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-16
[patent_title] => External resource control of mobile devices
[patent_app_type] => utility
[patent_app_number] => 15/547402
[patent_app_country] => US
[patent_app_date] => 2016-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 15844
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15547402
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/547402 | External resource control of mobile devices | Feb 1, 2016 | Issued |
Array
(
[id] => 11863136
[patent_doc_number] => 09742845
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-22
[patent_title] => 'Multi-service cloud storage decision optimization process'
[patent_app_type] => utility
[patent_app_number] => 14/989944
[patent_app_country] => US
[patent_app_date] => 2016-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9148
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 322
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14989944
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/989944 | Multi-service cloud storage decision optimization process | Jan 6, 2016 | Issued |
Array
(
[id] => 13086997
[patent_doc_number] => 10063576
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-28
[patent_title] => Detecting network anomalies by probabilistic modeling of argument strings with markov chains
[patent_app_type] => utility
[patent_app_number] => 14/982888
[patent_app_country] => US
[patent_app_date] => 2015-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9071
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14982888
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/982888 | Detecting network anomalies by probabilistic modeling of argument strings with markov chains | Dec 28, 2015 | Issued |
Array
(
[id] => 10752401
[patent_doc_number] => 20160098552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'WEARABLE USER DEVICE AUTHENTICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/970162
[patent_app_country] => US
[patent_app_date] => 2015-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 9618
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14970162
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/970162 | WEARABLE USER DEVICE AUTHENTICATION SYSTEM | Dec 14, 2015 | Abandoned |
Array
(
[id] => 10739838
[patent_doc_number] => 20160085989
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'Device, System, and Method of Enhancing User Privacy and Security Within a Location-Based Virtual Social Networking Context'
[patent_app_type] => utility
[patent_app_number] => 14/957014
[patent_app_country] => US
[patent_app_date] => 2015-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 52
[patent_figures_cnt] => 52
[patent_no_of_words] => 16753
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14957014
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/957014 | Causing a disappearance of a user profile in a location-based virtual social network | Dec 1, 2015 | Issued |