
Mark Hellner
Examiner (ID: 6753, Phone: (571)272-6981 , Office: P/3645 )
| Most Active Art Unit | 3645 |
| Art Unit(s) | 3642, 3662, 3645, 3663, 2202 |
| Total Applications | 4179 |
| Issued Applications | 3707 |
| Pending Applications | 224 |
| Abandoned Applications | 288 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9961580
[patent_doc_number] => 09009805
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-04-14
[patent_title] => 'Method and system for provisioning an electronic device'
[patent_app_type] => utility
[patent_app_number] => 14/510023
[patent_app_country] => US
[patent_app_date] => 2014-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 27
[patent_no_of_words] => 19320
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14510023
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/510023 | Method and system for provisioning an electronic device | Oct 7, 2014 | Issued |
Array
(
[id] => 11001007
[patent_doc_number] => 20160197954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-07
[patent_title] => 'DEFENDING AGAINST FLOW ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/903189
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3128
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14903189
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/903189 | DEFENDING AGAINST FLOW ATTACKS | Sep 28, 2014 | Abandoned |
Array
(
[id] => 9860215
[patent_doc_number] => 20150040232
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/499237
[patent_app_country] => US
[patent_app_date] => 2014-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13091
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499237
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/499237 | Anti-vulnerability system, method, and computer program product | Sep 27, 2014 | Issued |
Array
(
[id] => 9800500
[patent_doc_number] => 20150012444
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS'
[patent_app_type] => utility
[patent_app_number] => 14/498128
[patent_app_country] => US
[patent_app_date] => 2014-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10749
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498128
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/498128 | MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS | Sep 25, 2014 | Abandoned |
Array
(
[id] => 9807496
[patent_doc_number] => 20150019441
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-15
[patent_title] => 'MOBILE-TO-MOBILE TRANSACTIONS'
[patent_app_type] => utility
[patent_app_number] => 14/498152
[patent_app_country] => US
[patent_app_date] => 2014-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10619
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498152
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/498152 | Mobile-to-mobile transactions | Sep 25, 2014 | Issued |
Array
(
[id] => 15285107
[patent_doc_number] => 10515220
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-24
[patent_title] => Determine whether an appropriate defensive response was made by an application under test
[patent_app_type] => utility
[patent_app_number] => 15/500523
[patent_app_country] => US
[patent_app_date] => 2014-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 6332
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15500523
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/500523 | Determine whether an appropriate defensive response was made by an application under test | Sep 24, 2014 | Issued |
Array
(
[id] => 11347302
[patent_doc_number] => 09531725
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-27
[patent_title] => 'Optimizing infrastructure support based on authenticated access, validation and context related information retrieval'
[patent_app_type] => utility
[patent_app_number] => 14/494762
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8870
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494762
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494762 | Optimizing infrastructure support based on authenticated access, validation and context related information retrieval | Sep 23, 2014 | Issued |
Array
(
[id] => 15063663
[patent_doc_number] => 10462156
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-29
[patent_title] => Determining a reputation of data using a data visa
[patent_app_type] => utility
[patent_app_number] => 14/494723
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 8028
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494723
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494723 | Determining a reputation of data using a data visa | Sep 23, 2014 | Issued |
Array
(
[id] => 10741798
[patent_doc_number] => 20160087949
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'ESTABLISHING SECURE DIGITAL RELATIONSHIP USING SYMBOLOGY'
[patent_app_type] => utility
[patent_app_number] => 14/494802
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8531
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494802
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494802 | ESTABLISHING SECURE DIGITAL RELATIONSHIP USING SYMBOLOGY | Sep 23, 2014 | Abandoned |
Array
(
[id] => 10204258
[patent_doc_number] => 20150089247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'STORAGE MEDIUM HAVING SECURITY FUNCTION AND SECURITY METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/494106
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7267
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494106
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494106 | STORAGE MEDIUM HAVING SECURITY FUNCTION AND SECURITY METHOD THEREOF | Sep 22, 2014 | Abandoned |
Array
(
[id] => 10639450
[patent_doc_number] => 09356969
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-31
[patent_title] => 'Technologies for multi-factor security analysis and runtime control'
[patent_app_type] => utility
[patent_app_number] => 14/493814
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13665
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14493814
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/493814 | Technologies for multi-factor security analysis and runtime control | Sep 22, 2014 | Issued |
Array
(
[id] => 10739541
[patent_doc_number] => 20160085692
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'ENCRYPTION INTEGRITY CHECK IN MEMORY'
[patent_app_type] => utility
[patent_app_number] => 14/493924
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6938
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14493924
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/493924 | Encryption integrity check with CRC encryption in memory using a word count- and address-derived nonce | Sep 22, 2014 | Issued |
Array
(
[id] => 10378845
[patent_doc_number] => 20150263852
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'SECURE STORAGE ON EXTERNAL MEMORY'
[patent_app_type] => utility
[patent_app_number] => 14/493382
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8647
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14493382
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/493382 | Cryptographic operation by applying sub-keys to multiplication units in accordance with galois-field arithmetic | Sep 22, 2014 | Issued |
Array
(
[id] => 11863066
[patent_doc_number] => 09742770
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-22
[patent_title] => 'Dynamic authentication in alternate operating environment'
[patent_app_type] => utility
[patent_app_number] => 14/494003
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12897
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494003
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494003 | Dynamic authentication in alternate operating environment | Sep 22, 2014 | Issued |
Array
(
[id] => 13007925
[patent_doc_number] => 10027643
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-17
[patent_title] => Authenticating home device using device token issued based on identifier of terminal
[patent_app_type] => utility
[patent_app_number] => 14/494019
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 23
[patent_no_of_words] => 7217
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494019
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494019 | Authenticating home device using device token issued based on identifier of terminal | Sep 22, 2014 | Issued |
Array
(
[id] => 10093905
[patent_doc_number] => 09130744
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-08
[patent_title] => 'Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary'
[patent_app_type] => utility
[patent_app_number] => 14/492847
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4380
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492847
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492847 | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary | Sep 21, 2014 | Issued |
Array
(
[id] => 10739834
[patent_doc_number] => 20160085985
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'MULTI-SERVICE CLOUD STORAGE DECISION OPTIMIZATION PROCESS'
[patent_app_type] => utility
[patent_app_number] => 14/492109
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9148
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492109
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492109 | Multi-service cloud storage decision optimization process | Sep 21, 2014 | Issued |
Array
(
[id] => 10739807
[patent_doc_number] => 20160085958
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'METHODS AND APPARATUS FOR MULTI-FACTOR USER AUTHENTICATION WITH TWO DIMENSIONAL CAMERAS'
[patent_app_type] => utility
[patent_app_number] => 14/492163
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10199
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492163
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492163 | METHODS AND APPARATUS FOR MULTI-FACTOR USER AUTHENTICATION WITH TWO DIMENSIONAL CAMERAS | Sep 21, 2014 | Abandoned |
Array
(
[id] => 10204225
[patent_doc_number] => 20150089214
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'ENHANCED AUTHENTICATION AND/OR ENHANCED IDENTIFICATION OF A SECURE ELEMENT OF A COMMUNICATION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/492127
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 7814
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492127
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492127 | Enhanced authentication and/or enhanced identification of a secure element of a communication device | Sep 21, 2014 | Issued |
Array
(
[id] => 10204673
[patent_doc_number] => 20150089660
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'Device, System, and Method of Enhancing User Privacy and Security Within a Location-Based Virtual Social Networking Context'
[patent_app_type] => utility
[patent_app_number] => 14/492151
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 52
[patent_figures_cnt] => 52
[patent_no_of_words] => 16720
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492151
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492151 | Device, system, and method of enhancing user privacy and security within a location-based virtual social networking context | Sep 21, 2014 | Issued |