
Mark Hellner
Examiner (ID: 6753, Phone: (571)272-6981 , Office: P/3645 )
| Most Active Art Unit | 3645 |
| Art Unit(s) | 3642, 3662, 3645, 3663, 2202 |
| Total Applications | 4179 |
| Issued Applications | 3707 |
| Pending Applications | 224 |
| Abandoned Applications | 288 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10632395
[patent_doc_number] => 09350556
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-24
[patent_title] => 'Security model for identification and authentication in encrypted communications using delegate certificate chain bound to third party key'
[patent_app_type] => utility
[patent_app_number] => 14/691138
[patent_app_country] => US
[patent_app_date] => 2015-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5098
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 340
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14691138
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/691138 | Security model for identification and authentication in encrypted communications using delegate certificate chain bound to third party key | Apr 19, 2015 | Issued |
Array
(
[id] => 11098431
[patent_doc_number] => 20160295401
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'ANONYMOUS COMMUNICATION OF DEVICES IN WIRELESS NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 14/674859
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7657
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674859
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674859 | Anonymous vehicle communication protocol in vehicle-to-vehicle networks | Mar 30, 2015 | Issued |
Array
(
[id] => 11585057
[patent_doc_number] => 09639701
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-02
[patent_title] => 'Scheduling data protection operations based on data activity'
[patent_app_type] => utility
[patent_app_number] => 14/674438
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3551
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674438
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674438 | Scheduling data protection operations based on data activity | Mar 30, 2015 | Issued |
Array
(
[id] => 11786904
[patent_doc_number] => 09396341
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-19
[patent_title] => 'Data encryption in a de-duplicating storage in a multi-tenant environment'
[patent_app_type] => utility
[patent_app_number] => 14/675252
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 8469
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675252
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675252 | Data encryption in a de-duplicating storage in a multi-tenant environment | Mar 30, 2015 | Issued |
Array
(
[id] => 11488834
[patent_doc_number] => 09594906
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-14
[patent_title] => 'Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes'
[patent_app_type] => utility
[patent_app_number] => 14/675274
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7454
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675274
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675274 | Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes | Mar 30, 2015 | Issued |
Array
(
[id] => 12169242
[patent_doc_number] => 09888018
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-02-06
[patent_title] => 'Configuration management for network activity detectors'
[patent_app_type] => utility
[patent_app_number] => 14/666815
[patent_app_country] => US
[patent_app_date] => 2015-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 7617
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14666815
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/666815 | Configuration management for network activity detectors | Mar 23, 2015 | Issued |
Array
(
[id] => 11509565
[patent_doc_number] => 09600726
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-21
[patent_title] => 'Receiving link approval from remote server to provision remote electronic device associated with user account'
[patent_app_type] => utility
[patent_app_number] => 14/644585
[patent_app_country] => US
[patent_app_date] => 2015-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 27
[patent_no_of_words] => 19366
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644585
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/644585 | Receiving link approval from remote server to provision remote electronic device associated with user account | Mar 10, 2015 | Issued |
Array
(
[id] => 10356892
[patent_doc_number] => 20150241897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'REMOTE POWER CONTROL SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/642468
[patent_app_country] => US
[patent_app_date] => 2015-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6074
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14642468
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/642468 | REMOTE POWER CONTROL SYSTEM | Mar 8, 2015 | Abandoned |
Array
(
[id] => 12153908
[patent_doc_number] => 20180025172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-25
[patent_title] => 'DATA STORAGE APPARATUS, DATA PROCESSING METHOD, AND COMPUTER READABLE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 15/548064
[patent_app_country] => US
[patent_app_date] => 2015-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 33
[patent_no_of_words] => 17691
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15548064
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/548064 | Data storage apparatus, data processing method, and computer readable medium adding a user attribute of a revoked user to an embedded decryption condition while encrypted data remains in an encrypted state | Feb 19, 2015 | Issued |
Array
(
[id] => 10278207
[patent_doc_number] => 20150163204
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-11
[patent_title] => 'DIGITAL CONTENT ACCESS CONTROL'
[patent_app_type] => utility
[patent_app_number] => 14/625874
[patent_app_country] => US
[patent_app_date] => 2015-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5394
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14625874
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/625874 | DIGITAL CONTENT ACCESS CONTROL | Feb 18, 2015 | |
Array
(
[id] => 10478479
[patent_doc_number] => 20150363496
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'METHODS OF PROVIDING FAST SEARCH, ANALYSIS, AND DATA RETRIEVAL OF ENCRYPTED DATA WITHOUT DECRYPTION'
[patent_app_type] => utility
[patent_app_number] => 14/624154
[patent_app_country] => US
[patent_app_date] => 2015-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11064
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14624154
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/624154 | METHODS OF PROVIDING FAST SEARCH, ANALYSIS, AND DATA RETRIEVAL OF ENCRYPTED DATA WITHOUT DECRYPTION | Feb 16, 2015 | Abandoned |
Array
(
[id] => 11511372
[patent_doc_number] => 09602545
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-21
[patent_title] => 'Access policy management using identified roles'
[patent_app_type] => utility
[patent_app_number] => 14/594690
[patent_app_country] => US
[patent_app_date] => 2015-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 20424
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14594690
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/594690 | Access policy management using identified roles | Jan 11, 2015 | Issued |
Array
(
[id] => 12229212
[patent_doc_number] => 09916457
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'Decoupled name security binding for CCN objects'
[patent_app_type] => utility
[patent_app_number] => 14/595052
[patent_app_country] => US
[patent_app_date] => 2015-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 6584
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14595052
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/595052 | Decoupled name security binding for CCN objects | Jan 11, 2015 | Issued |
Array
(
[id] => 10625462
[patent_doc_number] => 09344422
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-17
[patent_title] => 'Method to modify android application life cycle to control its execution in a containerized workspace environment'
[patent_app_type] => utility
[patent_app_number] => 14/594377
[patent_app_country] => US
[patent_app_date] => 2015-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 7555
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14594377
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/594377 | Method to modify android application life cycle to control its execution in a containerized workspace environment | Jan 11, 2015 | Issued |
Array
(
[id] => 11008175
[patent_doc_number] => 20160205127
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-14
[patent_title] => 'DETERMINING A RISK LEVEL FOR SERVER HEALTH CHECK PROCESSING'
[patent_app_type] => utility
[patent_app_number] => 14/592938
[patent_app_country] => US
[patent_app_date] => 2015-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11134
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14592938
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/592938 | Determining a risk level for server health check processing | Jan 8, 2015 | Issued |
Array
(
[id] => 11550818
[patent_doc_number] => 09619670
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-04-11
[patent_title] => 'Detecting user credentials from inputted data'
[patent_app_type] => utility
[patent_app_number] => 14/594016
[patent_app_country] => US
[patent_app_date] => 2015-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5475
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14594016
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/594016 | Detecting user credentials from inputted data | Jan 8, 2015 | Issued |
Array
(
[id] => 11891983
[patent_doc_number] => 09762556
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-12
[patent_title] => 'Registering, managing, and communicating with IOT devices using domain name system processes'
[patent_app_type] => utility
[patent_app_number] => 14/593919
[patent_app_country] => US
[patent_app_date] => 2015-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7924
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14593919
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/593919 | Registering, managing, and communicating with IOT devices using domain name system processes | Jan 8, 2015 | Issued |
Array
(
[id] => 14270945
[patent_doc_number] => 10285058
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Providing secure Wi-Fi in an open Wi-Fi environment
[patent_app_type] => utility
[patent_app_number] => 14/593159
[patent_app_country] => US
[patent_app_date] => 2015-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11153
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14593159
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/593159 | Providing secure Wi-Fi in an open Wi-Fi environment | Jan 8, 2015 | Issued |
Array
(
[id] => 12956659
[patent_doc_number] => 09838396
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-05
[patent_title] => Controlling content-sharing using a privacy list snapshot
[patent_app_type] => utility
[patent_app_number] => 14/594042
[patent_app_country] => US
[patent_app_date] => 2015-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9820
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14594042
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/594042 | Controlling content-sharing using a privacy list snapshot | Jan 8, 2015 | Issued |
Array
(
[id] => 10637869
[patent_doc_number] => 09355374
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-31
[patent_title] => 'Systems and methods for creating fingerprints of encryption devices'
[patent_app_type] => utility
[patent_app_number] => 14/591223
[patent_app_country] => US
[patent_app_date] => 2015-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 20821
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14591223
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/591223 | Systems and methods for creating fingerprints of encryption devices | Jan 6, 2015 | Issued |