Search

Mark Hellner

Examiner (ID: 6753, Phone: (571)272-6981 , Office: P/3645 )

Most Active Art Unit
3645
Art Unit(s)
3642, 3662, 3645, 3663, 2202
Total Applications
4179
Issued Applications
3707
Pending Applications
224
Abandoned Applications
288

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9961580 [patent_doc_number] => 09009805 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-04-14 [patent_title] => 'Method and system for provisioning an electronic device' [patent_app_type] => utility [patent_app_number] => 14/510023 [patent_app_country] => US [patent_app_date] => 2014-10-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 27 [patent_no_of_words] => 19320 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 277 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14510023 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/510023
Method and system for provisioning an electronic device Oct 7, 2014 Issued
Array ( [id] => 11001007 [patent_doc_number] => 20160197954 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-07-07 [patent_title] => 'DEFENDING AGAINST FLOW ATTACKS' [patent_app_type] => utility [patent_app_number] => 14/903189 [patent_app_country] => US [patent_app_date] => 2014-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3128 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14903189 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/903189
DEFENDING AGAINST FLOW ATTACKS Sep 28, 2014 Abandoned
Array ( [id] => 9860215 [patent_doc_number] => 20150040232 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-05 [patent_title] => 'ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT' [patent_app_type] => utility [patent_app_number] => 14/499237 [patent_app_country] => US [patent_app_date] => 2014-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 13091 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499237 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/499237
Anti-vulnerability system, method, and computer program product Sep 27, 2014 Issued
Array ( [id] => 9800500 [patent_doc_number] => 20150012444 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-08 [patent_title] => 'MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS' [patent_app_type] => utility [patent_app_number] => 14/498128 [patent_app_country] => US [patent_app_date] => 2014-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 10749 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498128 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/498128
MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS Sep 25, 2014 Abandoned
Array ( [id] => 9807496 [patent_doc_number] => 20150019441 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-15 [patent_title] => 'MOBILE-TO-MOBILE TRANSACTIONS' [patent_app_type] => utility [patent_app_number] => 14/498152 [patent_app_country] => US [patent_app_date] => 2014-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 10619 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498152 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/498152
Mobile-to-mobile transactions Sep 25, 2014 Issued
Array ( [id] => 15285107 [patent_doc_number] => 10515220 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-12-24 [patent_title] => Determine whether an appropriate defensive response was made by an application under test [patent_app_type] => utility [patent_app_number] => 15/500523 [patent_app_country] => US [patent_app_date] => 2014-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 6332 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15500523 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/500523
Determine whether an appropriate defensive response was made by an application under test Sep 24, 2014 Issued
Array ( [id] => 11347302 [patent_doc_number] => 09531725 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-12-27 [patent_title] => 'Optimizing infrastructure support based on authenticated access, validation and context related information retrieval' [patent_app_type] => utility [patent_app_number] => 14/494762 [patent_app_country] => US [patent_app_date] => 2014-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8870 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 241 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494762 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/494762
Optimizing infrastructure support based on authenticated access, validation and context related information retrieval Sep 23, 2014 Issued
Array ( [id] => 15063663 [patent_doc_number] => 10462156 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-29 [patent_title] => Determining a reputation of data using a data visa [patent_app_type] => utility [patent_app_number] => 14/494723 [patent_app_country] => US [patent_app_date] => 2014-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 8028 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494723 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/494723
Determining a reputation of data using a data visa Sep 23, 2014 Issued
Array ( [id] => 10741798 [patent_doc_number] => 20160087949 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'ESTABLISHING SECURE DIGITAL RELATIONSHIP USING SYMBOLOGY' [patent_app_type] => utility [patent_app_number] => 14/494802 [patent_app_country] => US [patent_app_date] => 2014-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8531 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494802 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/494802
ESTABLISHING SECURE DIGITAL RELATIONSHIP USING SYMBOLOGY Sep 23, 2014 Abandoned
Array ( [id] => 10204258 [patent_doc_number] => 20150089247 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'STORAGE MEDIUM HAVING SECURITY FUNCTION AND SECURITY METHOD THEREOF' [patent_app_type] => utility [patent_app_number] => 14/494106 [patent_app_country] => US [patent_app_date] => 2014-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 7267 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494106 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/494106
STORAGE MEDIUM HAVING SECURITY FUNCTION AND SECURITY METHOD THEREOF Sep 22, 2014 Abandoned
Array ( [id] => 10639450 [patent_doc_number] => 09356969 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-05-31 [patent_title] => 'Technologies for multi-factor security analysis and runtime control' [patent_app_type] => utility [patent_app_number] => 14/493814 [patent_app_country] => US [patent_app_date] => 2014-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 13665 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 205 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14493814 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/493814
Technologies for multi-factor security analysis and runtime control Sep 22, 2014 Issued
Array ( [id] => 10739541 [patent_doc_number] => 20160085692 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'ENCRYPTION INTEGRITY CHECK IN MEMORY' [patent_app_type] => utility [patent_app_number] => 14/493924 [patent_app_country] => US [patent_app_date] => 2014-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6938 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14493924 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/493924
Encryption integrity check with CRC encryption in memory using a word count- and address-derived nonce Sep 22, 2014 Issued
Array ( [id] => 10378845 [patent_doc_number] => 20150263852 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'SECURE STORAGE ON EXTERNAL MEMORY' [patent_app_type] => utility [patent_app_number] => 14/493382 [patent_app_country] => US [patent_app_date] => 2014-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8647 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14493382 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/493382
Cryptographic operation by applying sub-keys to multiplication units in accordance with galois-field arithmetic Sep 22, 2014 Issued
Array ( [id] => 11863066 [patent_doc_number] => 09742770 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-08-22 [patent_title] => 'Dynamic authentication in alternate operating environment' [patent_app_type] => utility [patent_app_number] => 14/494003 [patent_app_country] => US [patent_app_date] => 2014-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 12897 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 174 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494003 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/494003
Dynamic authentication in alternate operating environment Sep 22, 2014 Issued
Array ( [id] => 13007925 [patent_doc_number] => 10027643 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-07-17 [patent_title] => Authenticating home device using device token issued based on identifier of terminal [patent_app_type] => utility [patent_app_number] => 14/494019 [patent_app_country] => US [patent_app_date] => 2014-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 23 [patent_no_of_words] => 7217 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 149 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494019 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/494019
Authenticating home device using device token issued based on identifier of terminal Sep 22, 2014 Issued
Array ( [id] => 10093905 [patent_doc_number] => 09130744 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-09-08 [patent_title] => 'Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary' [patent_app_type] => utility [patent_app_number] => 14/492847 [patent_app_country] => US [patent_app_date] => 2014-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4380 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492847 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/492847
Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary Sep 21, 2014 Issued
Array ( [id] => 10739834 [patent_doc_number] => 20160085985 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'MULTI-SERVICE CLOUD STORAGE DECISION OPTIMIZATION PROCESS' [patent_app_type] => utility [patent_app_number] => 14/492109 [patent_app_country] => US [patent_app_date] => 2014-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9148 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492109 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/492109
Multi-service cloud storage decision optimization process Sep 21, 2014 Issued
Array ( [id] => 10739807 [patent_doc_number] => 20160085958 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'METHODS AND APPARATUS FOR MULTI-FACTOR USER AUTHENTICATION WITH TWO DIMENSIONAL CAMERAS' [patent_app_type] => utility [patent_app_number] => 14/492163 [patent_app_country] => US [patent_app_date] => 2014-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10199 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492163 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/492163
METHODS AND APPARATUS FOR MULTI-FACTOR USER AUTHENTICATION WITH TWO DIMENSIONAL CAMERAS Sep 21, 2014 Abandoned
Array ( [id] => 10204225 [patent_doc_number] => 20150089214 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'ENHANCED AUTHENTICATION AND/OR ENHANCED IDENTIFICATION OF A SECURE ELEMENT OF A COMMUNICATION DEVICE' [patent_app_type] => utility [patent_app_number] => 14/492127 [patent_app_country] => US [patent_app_date] => 2014-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 7814 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492127 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/492127
Enhanced authentication and/or enhanced identification of a secure element of a communication device Sep 21, 2014 Issued
Array ( [id] => 10204673 [patent_doc_number] => 20150089660 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'Device, System, and Method of Enhancing User Privacy and Security Within a Location-Based Virtual Social Networking Context' [patent_app_type] => utility [patent_app_number] => 14/492151 [patent_app_country] => US [patent_app_date] => 2014-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 52 [patent_figures_cnt] => 52 [patent_no_of_words] => 16720 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492151 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/492151
Device, system, and method of enhancing user privacy and security within a location-based virtual social networking context Sep 21, 2014 Issued
Menu