Search

Mark Hellner

Examiner (ID: 6753, Phone: (571)272-6981 , Office: P/3645 )

Most Active Art Unit
3645
Art Unit(s)
3642, 3662, 3645, 3663, 2202
Total Applications
4179
Issued Applications
3707
Pending Applications
224
Abandoned Applications
288

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 13158245 [patent_doc_number] => 10095849 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-10-09 [patent_title] => Tag-based programming interface authentication [patent_app_type] => utility [patent_app_number] => 14/491922 [patent_app_country] => US [patent_app_date] => 2014-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8659 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491922 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/491922
Tag-based programming interface authentication Sep 18, 2014 Issued
Array ( [id] => 10276390 [patent_doc_number] => 20150161387 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-06-11 [patent_title] => 'NETWORK VIRTUAL USER RISK CONTROL METHOD AND SYSTEM' [patent_app_type] => utility [patent_app_number] => 14/491458 [patent_app_country] => US [patent_app_date] => 2014-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 6693 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491458 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/491458
Determining whether virtual network user is malicious user based on degree of association Sep 18, 2014 Issued
Array ( [id] => 12938803 [patent_doc_number] => 09832197 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-11-28 [patent_title] => Generating link information to access a file stored in a storage area associated with user identification information [patent_app_type] => utility [patent_app_number] => 14/488466 [patent_app_country] => US [patent_app_date] => 2014-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 29 [patent_figures_cnt] => 39 [patent_no_of_words] => 16308 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 302 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14488466 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/488466
Generating link information to access a file stored in a storage area associated with user identification information Sep 16, 2014 Issued
Array ( [id] => 10734249 [patent_doc_number] => 20160080400 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-17 [patent_title] => 'FILE REPUTATION EVALUATION' [patent_app_type] => utility [patent_app_number] => 14/488719 [patent_app_country] => US [patent_app_date] => 2014-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 6570 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14488719 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/488719
Chunk-based file acquisition and file reputation evaluation Sep 16, 2014 Issued
Array ( [id] => 10732095 [patent_doc_number] => 20160078245 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-17 [patent_title] => 'DATA STORAGE SYSTEMS AND METHODS' [patent_app_type] => utility [patent_app_number] => 14/489222 [patent_app_country] => US [patent_app_date] => 2014-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 57881 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14489222 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/489222
Deriving encryption rules based on file content Sep 16, 2014 Issued
Array ( [id] => 10734223 [patent_doc_number] => 20160080373 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-17 [patent_title] => 'Sensor Information Transparency System and Method' [patent_app_type] => utility [patent_app_number] => 14/488695 [patent_app_country] => US [patent_app_date] => 2014-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3111 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14488695 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/488695
Sensor Information Transparency System and Method Sep 16, 2014 Abandoned
Array ( [id] => 10545303 [patent_doc_number] => 09270448 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-23 [patent_title] => 'Encryption key distribution system and method' [patent_app_type] => utility [patent_app_number] => 14/489025 [patent_app_country] => US [patent_app_date] => 2014-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 25 [patent_no_of_words] => 13084 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14489025 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/489025
Encryption key distribution system and method Sep 16, 2014 Issued
Array ( [id] => 13259199 [patent_doc_number] => 10142301 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-11-27 [patent_title] => Encrypted data delivery without intervening decryption [patent_app_type] => utility [patent_app_number] => 14/489161 [patent_app_country] => US [patent_app_date] => 2014-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 13026 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 115 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14489161 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/489161
Encrypted data delivery without intervening decryption Sep 16, 2014 Issued
Array ( [id] => 10427032 [patent_doc_number] => 20150312043 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-29 [patent_title] => 'DIGITAL SIGNATURE SERVER AND USER TERMINAL' [patent_app_type] => utility [patent_app_number] => 14/483293 [patent_app_country] => US [patent_app_date] => 2014-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3991 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14483293 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/483293
DIGITAL SIGNATURE SERVER AND USER TERMINAL Sep 10, 2014 Abandoned
Array ( [id] => 9926624 [patent_doc_number] => 08984612 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-03-17 [patent_title] => 'Method of identifying an electronic device by browser versions and cookie scheduling' [patent_app_type] => utility [patent_app_number] => 14/477351 [patent_app_country] => US [patent_app_date] => 2014-09-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5303 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 223 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14477351 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/477351
Method of identifying an electronic device by browser versions and cookie scheduling Sep 3, 2014 Issued
Array ( [id] => 10526675 [patent_doc_number] => 09253201 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-02 [patent_title] => 'Detecting network anomalies by probabilistic modeling of argument strings with markov chains' [patent_app_type] => utility [patent_app_number] => 14/476142 [patent_app_country] => US [patent_app_date] => 2014-09-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9141 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14476142 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/476142
Detecting network anomalies by probabilistic modeling of argument strings with markov chains Sep 2, 2014 Issued
Array ( [id] => 11848548 [patent_doc_number] => 09736114 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-08-15 [patent_title] => 'Restricting mature content at a network element having an image scanner' [patent_app_type] => utility [patent_app_number] => 14/470262 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10230 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 232 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470262 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/470262
Restricting mature content at a network element having an image scanner Aug 26, 2014 Issued
Array ( [id] => 11796096 [patent_doc_number] => 09405927 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-02 [patent_title] => 'Tri-module data protection system specification' [patent_app_type] => utility [patent_app_number] => 14/466930 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10839 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 714 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14466930 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/466930
Tri-module data protection system specification Aug 26, 2014 Issued
Array ( [id] => 10719461 [patent_doc_number] => 20160065608 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-03 [patent_title] => 'MONITORING SECURITY RISKS TO ENTERPRISE CORRESPONDING TO ACCESS RIGHTS AND ACCESS RISK CALCULATION' [patent_app_type] => utility [patent_app_number] => 14/470588 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7731 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470588 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/470588
Monitoring security risks to enterprise corresponding to access rights and access risk calculation Aug 26, 2014 Issued
Array ( [id] => 12971161 [patent_doc_number] => 09876644 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-23 [patent_title] => Authenticating data packet based on hash image of the data packet in erasure coding-based data transmission [patent_app_type] => utility [patent_app_number] => 14/470051 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5631 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 98 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470051 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/470051
Authenticating data packet based on hash image of the data packet in erasure coding-based data transmission Aug 26, 2014 Issued
Array ( [id] => 9912618 [patent_doc_number] => 20150067821 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-05 [patent_title] => 'METHOD FOR UNLOCKING ELECTRONIC DEVICE' [patent_app_type] => utility [patent_app_number] => 14/470095 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 1476 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470095 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/470095
METHOD FOR UNLOCKING ELECTRONIC DEVICE Aug 26, 2014 Abandoned
Array ( [id] => 9834763 [patent_doc_number] => 08943598 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-01-27 [patent_title] => 'Automatic compromise detection for hardware signature for payment authentication' [patent_app_type] => utility [patent_app_number] => 14/458074 [patent_app_country] => US [patent_app_date] => 2014-08-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 14810 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14458074 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/458074
Automatic compromise detection for hardware signature for payment authentication Aug 11, 2014 Issued
Array ( [id] => 12312810 [patent_doc_number] => 09940652 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-04-10 [patent_title] => Restrictively exchanging and controlling vehicular data between communication devices of a private network [patent_app_type] => utility [patent_app_number] => 14/456182 [patent_app_country] => US [patent_app_date] => 2014-08-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 14 [patent_no_of_words] => 7532 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 205 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14456182 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/456182
Restrictively exchanging and controlling vehicular data between communication devices of a private network Aug 10, 2014 Issued
Array ( [id] => 10249849 [patent_doc_number] => 20150134845 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-05-14 [patent_title] => 'Object Oriented Communication Among Platform Independent Systems over Networks Using SOAP' [patent_app_type] => utility [patent_app_number] => 14/453487 [patent_app_country] => US [patent_app_date] => 2014-08-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5727 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14453487 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/453487
Object Oriented Communication Among Platform Independent Systems over Networks Using SOAP Aug 5, 2014 Abandoned
Array ( [id] => 12339312 [patent_doc_number] => 09949116 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-04-17 [patent_title] => Method and apparatus for establishing SSID-based connection between terminal device and gateway device [patent_app_type] => utility [patent_app_number] => 14/901807 [patent_app_country] => US [patent_app_date] => 2014-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 9 [patent_no_of_words] => 9081 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 206 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14901807 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/901807
Method and apparatus for establishing SSID-based connection between terminal device and gateway device Aug 4, 2014 Issued
Menu